@article{MaasVosLagemaatetal.2014, author = {Maas, Marnix C. and Vos, Eline K. and Lagemaat, Miriam W. and Bitz, Andreas and Orzada, Stephan and Kobus, Thiele and Kraff, Oliver and Maderwald, Stefan and Ladd, Mark E. and Scheenen, Tom W. J.}, title = {Feasibility of T₂-weighted turbo spin echo imaging of the human prostate at 7 tesla}, series = {Magnetic Resonance in Medicine}, volume = {71}, journal = {Magnetic Resonance in Medicine}, number = {5}, publisher = {Wiley-VCH}, address = {Weinheim}, issn = {1522-2594}, doi = {10.1002/mrm.24818}, pages = {1711 -- 1719}, year = {2014}, abstract = {Purpose To demonstrate that high quality T₂-weighted (T2w) turbo spin-echo (TSE) imaging of the complete prostate can be achieved routinely and within safety limits at 7 T, using an external transceive body array coil only. Methods Nine healthy volunteers and 12 prostate cancer patients were scanned on a 7 T whole-body system. Preparation consisted of B₀ and radiofrequency shimming and localized flip angle calibration. T₁ and T₂ relaxation times were measured and used to define the T2w-TSE protocol. T2w imaging was performed using a TSE sequence (pulse repetition time/echo time 3000-3640/71 ms) with prolonged excitation and refocusing pulses to reduce specific absorption rate. Results High quality T2w TSE imaging was performed in less than 2 min in all subjects. Tumors of patients with gold-standard tumor localization (MR-guided biopsy or prostatectomy) were well visualized on 7 T imaging (n = 3). The number of consecutive slices achievable within a 10-g averaged specific absorption rate limit of 10 W/kg was ≥28 in all subjects, sufficient for full prostate coverage with 3-mm slices in at least one direction. Conclusion High quality T2w TSE prostate imaging can be performed routinely and within specific absorption rate limits at 7 T with an external transceive body array.}, language = {en} } @inproceedings{MaikeLenzWolf2014, author = {Maike, M{\"u}ller and Lenz, Laura and Wolf, Martin}, title = {Steigerung der Effektivit{\"a}t durch Prozessmodellierungs-Tools - {\"A}nderbarkeit und Transparenz von Prozessen am Beispiel der Business Simulation Apollo 13}, series = {Informatik 2014}, booktitle = {Informatik 2014}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Bonn}, isbn = {978-3-88579-626-8}, issn = {1617-5468}, pages = {357 -- 369}, year = {2014}, abstract = {Die Nutzung von Prozessmodellierungsmethoden oder - werkzeugen kann erheblichen Einfluss auf die Effektivit{\"a}t von Prozessen haben. Das gilt insbesondere f{\"u}r Situationen, in denen Personen unter Stress stehen oder unge{\"u}bt sind. In diesen F{\"a}llen geben Prozessmodelle konkrete Empfehlungen, nach denen sich die handelnden Personen richten k{\"o}nnten. In Experimenten mit der Business-Simulation Apollo 13 haben wir den Effekt eines Einsatzes von Prozessmodellierungsmethoden und -werkzeugen untersucht. Bereits bekannte Theorien (z.B. {\"u}ber geeignete Verh{\"a}ltnisse von Kommunikationsinhalten) konnten best{\"a}tigt werden. Dar{\"u}ber hinaus haben wir eine besondere Bedeutung der {\"U}bertragbarkeit von Prozessmodellen in konkrete Handlungen identifiziert.}, language = {de} } @inproceedings{NeugebauerBrutschyMeyeretal.2014, author = {Neugebauer, Georg and Brutschy, Lucas and Meyer, Ulrike and Wetzel, Susanne}, title = {Privacy-preserving multi-party reconciliation secure in the malicious model}, series = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, booktitle = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, editor = {Garcia-Alfaro, Joaquin and Lioudakis, Georgios and Cuppens-Boulahia, Nora and Foley, Simon and Fitzgerald, William M.}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-642-54567-2 (Print)}, doi = {10.1007/978-3-642-54568-9_12}, pages = {178 -- 193}, year = {2014}, abstract = {The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.}, language = {en} }