Presentation/präsentation.bbl

163 lines
4.3 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

% $ biblatex auxiliary file $
% $ biblatex bbl format version 3.1 $
% Do not modify the above lines!
%
% This is an auxiliary file used by the 'biblatex' package.
% This file may safely be deleted. It will be recreated as
% required.
%
\begingroup
\makeatletter
\@ifundefined{ver@biblatex.sty}
{\@latex@error
{Missing 'biblatex' package}
{The bibliography requires the 'biblatex' package.}
\aftergroup\endinput}
{}
\endgroup
\datalist[entry]{nty/global//global/global}
\entry{restapi}{thesis}{}
\name{author}{1}{}{%
{{hash=FRT}{%
family={Fielding},
familyi={F\bibinitperiod},
given={Roy\bibnamedelima Thomas},
giveni={R\bibinitperiod\bibinitdelim T\bibinitperiod},
}}%
}
\strng{namehash}{FRT1}
\strng{fullhash}{FRT1}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{sortinit}{F}
\field{sortinithash}{F}
\field{pages}{76}
\field{title}{Architectural Styles and the Design of Network-based Software
Architectures Dissertation}
\list{institution}{1}{%
{University of California, Irvine}%
}
\field{type}{phdthesis}
\field{year}{2000}
\endentry
\entry{surveymodels}{article}{}
\name{author}{3}{}{%
{{hash=PC}{%
family={Phillips},
familyi={P\bibinitperiod},
given={Caleb},
giveni={C\bibinitperiod},
}}%
{{hash=SD}{%
family={Sicker},
familyi={S\bibinitperiod},
given={Douglas},
giveni={D\bibinitperiod},
}}%
{{hash=GD}{%
family={Grunwald},
familyi={G\bibinitperiod},
given={Dirk},
giveni={D\bibinitperiod},
}}%
}
\strng{namehash}{PCSDGD1}
\strng{fullhash}{PCSDGD1}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{sortinit}{P}
\field{sortinithash}{P}
\verb{doi}
\verb 10.1109/SURV.2012.022412.00172
\endverb
\field{pages}{255\bibrangedash 270}
\field{title}{A Survey of Wireless Path Loss Prediction and Coverage
Mapping Methods}
\field{volume}{15}
\field{journaltitle}{Communications Surveys \& Tutorials, IEEE}
\field{month}{01}
\field{year}{2013}
\endentry
\entry{praxisbuch2020}{book}{}
\name{author}{1}{}{%
{{hash=SG}{%
family={Starke},
familyi={S\bibinitperiod},
given={Gernot},
giveni={G\bibinitperiod},
}}%
}
\list{publisher}{1}{%
{Carl Hanser Verlag GmbH Co KG}%
}
\strng{namehash}{SG1}
\strng{fullhash}{SG1}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{sortinit}{S}
\field{sortinithash}{S}
\field{edition}{9. Auflage}
\field{title}{Effektive Softwarearchitekturen: Ein praktischer Leitfaden}
\field{month}{08}
\field{year}{2020}
\endentry
\entry{springprog}{book}{}
\name{author}{1}{}{%
{{hash=WC}{%
family={Walls},
familyi={W\bibinitperiod},
given={Craig},
giveni={C\bibinitperiod},
}}%
}
\list{publisher}{1}{%
{Carl Hanser Verlag GmbH Co KG}%
}
\strng{namehash}{WC1}
\strng{fullhash}{WC1}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{sortinit}{W}
\field{sortinithash}{W}
\field{edition}{3. Auflage}
\field{title}{Spring im Einsatz}
\field{year}{2020}
\endentry
\entry{jnipaper}{article}{}
\name{author}{2}{}{%
{{hash=YKH}{%
family={Yew},
familyi={Y\bibinitperiod},
given={Kwang\bibnamedelima Hooi},
giveni={K\bibinitperiod\bibinitdelim H\bibinitperiod},
}}%
{{hash=OA}{%
family={Oxley},
familyi={O\bibinitperiod},
given={Alan},
giveni={A\bibinitperiod},
}}%
}
\strng{namehash}{YKHOA1}
\strng{fullhash}{YKHOA1}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{sortinit}{Y}
\field{sortinithash}{Y}
\field{number}{2}
\field{pages}{90\bibrangedash 194}
\field{title}{JNI Fault Tolerance Using Java ProcessBuilder}
\field{volume}{1}
\field{journaltitle}{International Journal of Information and Electronics
Engineering}
\field{month}{01}
\field{year}{2011}
\endentry
\enddatalist
\endinput