Refine
H-BRS Bibliography
- yes (606)
Departments, institutes and facilities
- Fachbereich Informatik (606) (remove)
Document Type
- Conference Object (606) (remove)
Year of publication
Keywords
- Virtual Reality (8)
- Robotics (7)
- Usable Security (7)
- CUDA (5)
- Machine Learning (5)
- 3D user interface (4)
- Benchmarking (4)
- Usable Privacy (4)
- machine learning (4)
- virtual reality (4)
- Human-Robot Interaction (3)
- Hyperspectral image (3)
- IP protection (3)
- Image Processing (3)
- LoRa (3)
- Measurement (3)
- Navigation (3)
- Quality diversity (3)
- Risk-based Authentication (3)
- Robot sensing systems (3)
- SpMV (3)
- Taxonomy (3)
- WiLD (3)
- clustering (3)
- robotics (3)
- security (3)
- serious games (3)
- virtual environments (3)
- 802.11 (2)
- Aerodynamics (2)
- Algorithms (2)
- Alternatives (2)
- Augmented Reality (2)
- Augmented reality (2)
- Authentication (2)
- Bag of Features (2)
- Big Data Analysis (2)
- Cognitive robot control (2)
- Computer Graphics (2)
- Computer Vision (2)
- Content Module (2)
- Cooperative Awareness Message (2)
- DPA (2)
- Distributed rendering (2)
- Educational institutions (2)
- Embedded software (2)
- Empirical study (2)
- Evolutionary computation (2)
- Explainable robotics (2)
- Eye Tracking (2)
- FDI (2)
- FPGA (2)
- Fault analysis (2)
- GDPR (2)
- GPU (2)
- Graphics Cards (2)
- Heart Rate Prediction (2)
- Higher education (2)
- IEEE802.11 (2)
- Indirect Encodings (2)
- Inductive Logic Programming (2)
- Intelligent virtual agents (2)
- Internet (2)
- Large, high-resolution displays (2)
- Learning from experience (2)
- LoRaWAN (2)
- Long-Distance WiFi (2)
- MAP-Elites (2)
- Natural Language Processing (2)
- Neuroevolution (2)
- Object recognition (2)
- OpenFlow (2)
- Original Story (2)
- Parallelization (2)
- Password (2)
- Pseudonym Concept (2)
- QoS (2)
- Quality Diversity (2)
- RE (2)
- Raman microscopy (2)
- Risk-based Authentication (RBA) (2)
- Robustness (2)
- SDN (2)
- Serious Games (2)
- Side-channel analysis (2)
- Software (2)
- Survey (2)
- Three-dimensional displays (2)
- User Interface Design (2)
- Vehicle-to-Vehicle Communication (2)
- Visualization (2)
- analysis (2)
- blockchain (2)
- classifier combination (2)
- edutainment (2)
- embedded systems (2)
- feature extraction (2)
- haptics (2)
- human factors (2)
- hypermedia (2)
- image fusion (2)
- interface design (2)
- machine vision (2)
- motion estimation (2)
- navigation (2)
- object categorization (2)
- pansharpening (2)
- path planning (2)
- surrogate modeling (2)
- 2D Level Design (1)
- 3D User Interface (1)
- 3D Visualisierung (1)
- 3D design (1)
- 3D gaming (1)
- 3D interfaces (1)
- 3D registration (1)
- 3D shape (1)
- 3D user interfaces (1)
- 450 MHz (1)
- AES (1)
- AI based translation (1)
- AMD Family 15h (1)
- ANSYS (1)
- ARM Cortex M3 Processor (1)
- ARRs (1)
- Abstract Syntax Tree (1)
- Acceptance (1)
- Account Security (1)
- Accuracy (1)
- Active Learning (1)
- Active locomotion (1)
- Actuators (1)
- Adaptation of Software (1)
- Air Pollution (1)
- Air pollution modeling (1)
- All-Swap Algorithm (1)
- Architectural Patterns (1)
- Assistive robots (1)
- Attention (1)
- Authentication features (1)
- Authorship watermark (1)
- Autoencoder (1)
- Autoimmune disease (1)
- Automatic Short Answer Grading (1)
- B2T (1)
- BCL2 (1)
- BFS (1)
- BLOB Detection (1)
- Ballastless track (1)
- Bayesian optimization (1)
- Beacon Chain (1)
- Behaviour-Driven Development (1)
- Best practice algorithms (1)
- Bicycle Simulator (1)
- Bioinformatics (1)
- Blob Detection (1)
- Block cipher (1)
- Blocking (1)
- Bond Graph models for fault detection and isolation (1)
- Bond graph modelling (1)
- Bound Volume Hierarchy (1)
- Bounding Box (1)
- Branch and cut (1)
- Business software (1)
- Business system (1)
- Business-to-Thing (1)
- CNN (1)
- CPA (1)
- CPU (1)
- CPUID instruction (1)
- CSR5BC (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Cell Processor (1)
- Cell/B.E. (1)
- Center-of-Mass (1)
- Channel assignment (1)
- Clusters (1)
- Co-located Collaboration (1)
- Co-located work (1)
- Code similarity analysis (1)
- Cognitive robotics (1)
- Collaborating industrial robots (1)
- Coloured pointclouds (1)
- Column (1)
- Comparative analysis (1)
- Compliant Manipulation (1)
- Compliant fingers (1)
- Component Models (1)
- Composition of Patterns (1)
- Compositional Pattern Producing Networks (1)
- Computational fluid dynamics (1)
- Computer architecture (1)
- Computer graphics (1)
- Computer-supported Cooperative Work (1)
- Computing methodologies (1)
- Concurrent repeated failure prognosis (1)
- Container Structure (1)
- Containerization (1)
- Content Analysis (1)
- Contextualized Attention Metadata (CAM) (1)
- Continual robot learning (1)
- Control (1)
- Corporate Social Responsibility (1)
- Correlative Microscopy (1)
- Cortex-M3 (1)
- Covert channel (1)
- Critical power (1)
- Cross-core (1)
- Crossmedia (1)
- Customization (1)
- Cypher (1)
- DAE systems (1)
- DFA Lab (1)
- DPA Lab (1)
- Data Fusion (1)
- Data Generation (1)
- Data Protection Officer (1)
- Dataflow Programming (1)
- Datalog (1)
- Datenschutz (1)
- Datensicherheit (1)
- Delph Study (1)
- Design Optimization (1)
- Design automation (1)
- Diagnostic bond graph-based online fault diagnosis (1)
- Difference Visualization (1)
- Differential analysis (1)
- Digital Ecosystem (1)
- Digital Storytelling (1)
- Digital common goods (1)
- Digital watermarking (1)
- Digitisation (1)
- Directional Antenna (1)
- Directional antennas (1)
- Distributed Robot Systems (1)
- Docker (1)
- Domain Expert (1)
- Domestic Robots (1)
- Domestic robotics (1)
- Domestic robots (1)
- Dynamic motion primitives (1)
- E-Health (1)
- EEG (1)
- ERP-software (1)
- ERP-system (1)
- Echtzeit (1)
- Eclipse Modeling Framework (1)
- Ego-Motion Estimation (1)
- Elderly People (1)
- Elliptic Curve Cryptography (1)
- Embedded system (1)
- Empirical Study (1)
- Employee data protection (1)
- Encryption (1)
- Enterprise software (1)
- Enterprise system (1)
- Estimation (1)
- Ethereum (1)
- Euronorm (1)
- Everyday object manipulation (1)
- Evolutionary algorithms (1)
- Exergame (1)
- Experiment (1)
- Experiment design (1)
- Expert Interviews (1)
- Explainability (1)
- Explainable Machine Learning (1)
- FPGA implementation (1)
- Fas (1)
- Fault Channel Watermarking Lab (1)
- Fault Detection & Diagnosis (1)
- Fault-channel watermarks (1)
- Feature extraction (1)
- Features (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Fingerprint watermark (1)
- Fixed spatial data (1)
- Flexible robots (1)
- Force (1)
- Force and tactile sensing (1)
- Force field (1)
- Forests (1)
- Free-Space Loss (FSL) (1)
- Frequency planning (1)
- Friction (1)
- Functional safety (1)
- Fusion (1)
- Future (1)
- Future Studies (1)
- Future of Robotics (1)
- Fuzzy logic (1)
- GPGPU (1)
- Game Engine (1)
- Games and Simulations for Learning (1)
- Garbage collection (1)
- Gaussian processes (1)
- Gaze Behavior (1)
- Gaze Depth Estimation (1)
- Gender Issues in Computer Science Education (1)
- Generation R (1)
- Generative Design (1)
- Generative Models (1)
- Geo-tagging (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheitswesen (1)
- Givens Rotations (1)
- Global Illumination (1)
- Gradient-boosting (1)
- Grailog (1)
- Graphical user interfaces (1)
- Grasping (1)
- Grounded Method (1)
- Group Behavior (1)
- Group behavior (1)
- Groupware (1)
- HCI (1)
- HCSS (1)
- HPC (1)
- HRI (1)
- HTTP (1)
- Hand Guidance (1)
- Hand Tracking (1)
- Hardware (1)
- Head-Mounted Displays (1)
- Head-mounted Display (1)
- Header whitelisting (1)
- Heat shrink tubing (1)
- High-performance computing (1)
- High-speed track (1)
- Human Factors (1)
- Human centered computing (1)
- Human computer interaction (1)
- Human-Centered Robotics (1)
- Human-robot interaction (1)
- Humanoid Robot (1)
- HyperNEAT (1)
- ICP (1)
- IEC 104 (1)
- IEC 61850 (1)
- IEEE 802.11 (1)
- IEEE 802.21 (1)
- Illumination algorithms (1)
- Image representation (1)
- Image-based rendering (1)
- Immersive Virtual Environments (1)
- Immersive Visualization Environment (1)
- Implementation Challenges (1)
- Increasing fault magnitude (1)
- Industrial robots (1)
- Information Security (1)
- Information Types (1)
- Information hiding (1)
- Information interaction (1)
- Informationssicherheit (1)
- Innovation (1)
- Instance-based learning (1)
- Instruction scheduling (1)
- Integer programming (1)
- Integrate Development Environment (1)
- Integrated circuit interconnections (1)
- Intel Xeon Phi (1)
- Intel processors (1)
- Intelligent Transport System (1)
- Interaction (1)
- Interaction Patterns (1)
- Interactive Smart Card Applications (1)
- Interference (1)
- Intermediaries (1)
- Intermittent faults (1)
- Internet of Things (1)
- Interoperability (1)
- Inventory (1)
- Issue Tracking Systems (1)
- Issue Types (1)
- Issue tracking systems (1)
- Java virtual machine (1)
- JavaScript (1)
- KNN (1)
- Knowledge Graphs (1)
- Knowledge representation (1)
- Kryptologie (1)
- LAA (1)
- LGCSR (1)
- LOTUS Sensor Node (1)
- LTE-M (1)
- LTE-U (1)
- Lattice Basis Reduction (1)
- Lead userness (1)
- Learning analytics (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Learning from demonstration (1)
- Learning systems (1)
- Lighting simulation (1)
- Linear regression (1)
- LoRa receiver accuracy (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Low-Power Wide Area Network (LP-WAN) (1)
- Lymphoproliferative disorder (1)
- MAC (1)
- MACE (1)
- MESD (1)
- MIMD (1)
- MOOC (1)
- MPLS (1)
- MQTT (1)
- Machine learning (1)
- Machine-learning (1)
- Main Memory (1)
- Maker space (1)
- Malware (1)
- Management (1)
- Manipulator (1)
- Markov Cluster Algorithm (1)
- Megatrends (1)
- Memory filesystem (1)
- Memory-Constrained Devices (1)
- Mesh networks (1)
- Microarchitectural Data Sampling (MDS) (1)
- Middleware and Programming Environments (1)
- Mining Software Repositories (1)
- Mining software repositories (1)
- Mixed (1)
- Mixed method evaluation (1)
- Mobile devices (1)
- Mobile manipulation (1)
- Mobile robots (1)
- Modalities (1)
- Model Fitting (1)
- Model-based Approach (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Modelica (1)
- Modular software packages (1)
- Molecular modeling (1)
- Morphological box (1)
- Morphological scheme (1)
- Motion Capture (1)
- Motion planning (1)
- Multi-Modal Interaction (1)
- Multi-Tenant Application (1)
- Multi-objective optimization (1)
- Multicast communication (1)
- Multilayer interaction (1)
- Multimodal (1)
- Multimodal Microspectroscopy (1)
- Multimodal optimization (1)
- Multiple Displays (1)
- Multithreaded and multicore architecture (1)
- Multiuser (1)
- Multivariate Time Series (1)
- Multivariate time series classification (1)
- Musical Performance (1)
- NEAT (1)
- NETCONF (1)
- NIR (1)
- NIR-point sensor (1)
- NISTPQC (1)
- NNS (1)
- NUMA (1)
- NURBS (1)
- NVIDIA Tesla (1)
- Narration Module (1)
- Natural language understanding (1)
- Natural scene text (1)
- Navigation interface (1)
- Networked Robots (1)
- Neural Machine Translation (1)
- Noise (1)
- Noise reduction (1)
- Numerical optimization (1)
- Nvidia graphic processors (1)
- OER (1)
- Object detection (1)
- Object-Based Image Analysis (OBIA) (1)
- Online Services (1)
- Open source firmware (1)
- Open-ended Robotic Discovery (1)
- Open-source (1)
- OpenACC (1)
- OpenDaylight (1)
- OpenMP, unrolling (1)
- OpenStack (1)
- Optimisation 3D (1)
- Outlier Detection (1)
- PDSTSP (1)
- PHR (1)
- PIR sensor units (1)
- PM2.5 estimation (1)
- Pain Reduction (1)
- Parallel I/O (1)
- Parallel Processing (1)
- Parallel drone scheduling traveling salesman problem (1)
- Parameter sensitivities of transfer functions (1)
- Parametric study (1)
- Path Loss (1)
- Path loss model (1)
- People Detection (1)
- Perception (1)
- Performance (1)
- Performance Simulation (1)
- Performance benchmarks (1)
- Performance prediction (1)
- Performance profiling (1)
- Periodic structures (1)
- Personal Health Record (1)
- Phenotypic niching (1)
- Physical exercising game platform (1)
- Pointing (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Pointing devices (1)
- Pose Estimation (1)
- Post-Quantum Signatures (1)
- Power Analysis (1)
- Prediction of physiological responses to strain (1)
- Predictive Models (1)
- Privacy (1)
- Privacy engineering (1)
- Probabilistic model (1)
- Project based learning (1)
- Proof of Stake (1)
- Propagation (1)
- Prototypes (1)
- Public Key Infrastructures (1)
- Q measurement (1)
- Quality control (1)
- RBAR (1)
- RGB-D (1)
- RGB-D data (1)
- RLE-XOR (1)
- RLE-permutation (1)
- RNN (1)
- RSSI (1)
- Radiofrequency identification (1)
- Radix Sort (1)
- Random number generator (1)
- Rapid Prototyping (1)
- Rapid prototyping (1)
- Ray Casting (1)
- Ray Tracing (1)
- Ray tracing (1)
- Re-authentication (1)
- Reasoning (1)
- Reconstruction Error (1)
- Reflectance modeling (1)
- Registration Refinement (1)
- Relational Learning (1)
- Remaining Useful Life (RUL) estimates (1)
- Render Cache (1)
- Repositories (1)
- Requirements (1)
- Requirements Communication (1)
- Requirements analysis (1)
- Requirements engineering in SMEs (1)
- Restorative Virtual Environments (1)
- Reusable Software (1)
- Reversible Logic Synthesis (1)
- Review (1)
- Rfid (Radio-Frequency Identification) (1)
- Risikoanalyse (1)
- Risk-Based Account Recovery (1)
- RoboCup (1)
- Robot commands (1)
- Robot competitions (1)
- Robot failure diagnosis (1)
- Robot kinematics (1)
- Robot learning (1)
- Robot software (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Revolutions (1)
- Robotics competitions (1)
- Robots (1)
- Robust grasping (1)
- Rotating Table Test (1)
- RuleML (1)
- Runtime Adaptation (1)
- Rural areas (1)
- S3D Video (1)
- S3D video (1)
- SAML (1)
- SDWN (1)
- SEMA (1)
- SIMD (1)
- SLIDE algorithm (1)
- SME (1)
- SOAP (1)
- SORT (1)
- SQL (1)
- SVG (1)
- Scalability (1)
- Scalable Vector Graphic (1)
- ScalarMultiplication (1)
- Scene text recognition, active vision, domestic robot, pantilt, auto-zoom, auto-focus, adaptive aperture control (1)
- Scholarly workbench (1)
- Scientific competency development (1)
- Scientific workbench (1)
- Second Life (1)
- Security (1)
- Self-supervised learning (1)
- Semantic gap (1)
- Semantics (1)
- SensorFusion (1)
- Separation algorithm (1)
- Service Robot (1)
- Service-Oriented Architecture (1)
- Sicherheitsanalyse (1)
- Sicherheitslücke (1)
- Side Channel Analysis (1)
- Side Channel Countermeasures (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side-channel watermarking (1)
- Signature Verification (1)
- Similarity matrix (1)
- Simulation (1)
- Simulator (1)
- Single Instruction Multiple Data (SIMD) (1)
- Skin detection (1)
- Slippage detection (1)
- Smart Card (1)
- Smart Grid (1)
- Smart InGaAs camera-system (1)
- Smartphones (1)
- Social Virtual Reality (1)
- Social engagement in university (1)
- Software Architectures (1)
- Software Development Process (1)
- Software Feature Request Detection (1)
- Software IP protection (1)
- Software Supply Chain (1)
- Software and Architecture (1)
- Software reverse engineering (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Sonar (1)
- Space exploration (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Sparse matrix format (1)
- Spatiotemporality (1)
- Spectrum occupancy (1)
- Spectrum optimization (1)
- Speech Act Theory (1)
- Split Axis (1)
- Standards (1)
- Star Trek (1)
- State machines (1)
- Stereoscopic Rendering (1)
- Stereoscopic rendering (1)
- Story Element (1)
- Streaming (1)
- Stress Management (1)
- Supervised learning (1)
- Supply chains (1)
- Support Vector Machine (1)
- Surrogate Modeling (1)
- Surrogate Modelling (1)
- Surrogate models (1)
- Swim Stroke Analysis (1)
- Switched power electronic systems (1)
- Symmetry detector (1)
- Synthetic perception (1)
- SystemVerilog (1)
- TLS (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Task Frame Formalism (1)
- Telecommunication network reliability (1)
- Telecommunication network routing (1)
- Telematik (1)
- Telematik-Software (1)
- Template Attacks (1)
- Temporally-weighted (1)
- Textureless objects (1)
- Tiled displays (1)
- Tiled-display walls (1)
- Time measurement (1)
- Timing analysis (1)
- Timing channel (1)
- TinyECC 2.0 (1)
- ToF Camera (1)
- Token (1)
- Touchscreen interaction (1)
- Toyota HSR (1)
- Traceability (1)
- Tracking by detection (1)
- Traffic Simulations (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Transfer learning (1)
- Transformers (1)
- Transforms (1)
- Transparency (1)
- Tree Stumps (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV (1)
- UAV teleoperation (1)
- UI design (1)
- Ultrasonic array (1)
- Uncertainty (1)
- Unidirectional thermoplastic composites (1)
- Unity (1)
- Unmanned Aerial Vehicle (UAV) (1)
- Urban (1)
- Usability (1)
- Usable Security and Privacy (1)
- User Roles (1)
- User Study (1)
- User-Centered Approach (1)
- VR (1)
- VR system design (1)
- Variability Management (1)
- Variability Resolution (1)
- Variational Autoencoder (1)
- Vector Intrinsics (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicular Ad hoc Networks (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Verifizierung (1)
- Verilog (1)
- Virtual Agents (1)
- Virtual Environments (1)
- Virtual attention (1)
- Virtual environments (1)
- Visualization design and evaluation methods (1)
- Visualization systems and tools (1)
- Volumenrendering (1)
- Vulnerable Groups (1)
- V˙CO2 prediction (1)
- V˙O2 prediction (1)
- WDS (1)
- WWW (1)
- Watermarking (1)
- Web (1)
- Web components (1)
- Whole body motion (1)
- Wi-Fi (1)
- WiAFirm (1)
- WiFi (1)
- WiFi-based Long Distance (WiLD) (1)
- Wireless Backhaul Network (1)
- Wireless Sensor Network (1)
- Wireless backhaul (1)
- XGBoost (1)
- XML (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XNA Game Studio (1)
- XSLT (1)
- Xeon Phi knights landing (1)
- YANG (1)
- YOLO (1)
- ZombieLoad (1)
- activation function (1)
- adaptive agents (1)
- adaptive binarization (1)
- adaptive filters (1)
- aerodynamics (1)
- affective computing (1)
- ambulatory monitoring (1)
- analyses (1)
- analytical redundancy relations (1)
- anomaly detection (1)
- artifacts (1)
- asset transfer (1)
- atomic instructions (1)
- audio-tactile feedback (1)
- augmented, and virtual realities (1)
- authoring tools (1)
- automation (1)
- background motion (1)
- bagging (1)
- bass-shaker (1)
- bicycle (1)
- biorder (1)
- bloat (1)
- body-centric cues (1)
- brain computer interfaces (1)
- brightfield microscopy (1)
- bus load (1)
- camera-based person detection (1)
- can bus (1)
- chemical sensors (1)
- client-side component model (1)
- co-located collaboration (1)
- cognitive radio (1)
- collaboration (1)
- collaborative learning (1)
- colorimetry (1)
- commuting (1)
- compensation (1)
- component analyses (1)
- component based (1)
- computational causalities (1)
- computational logic (1)
- computer games (1)
- computer-supported collaborative work (1)
- cooperative path planning (1)
- correlation (1)
- crawling (1)
- cross-disciplinary (1)
- cryptocurrency (1)
- cuSPARSE (1)
- data locality (1)
- data logging (1)
- data visualisation (1)
- database systems (1)
- decision tree learning (1)
- dependable robots (1)
- depth perception (1)
- diagnostic bond graphs (1)
- digital co-creation (1)
- digital platform ecosystem (1)
- digital storytelling (1)
- dimensionality reduction (1)
- direct feedback (1)
- directed hypergraphs (1)
- directional antennas (1)
- disabled people (1)
- distributed authoring (1)
- distributed processing (1)
- diversity (1)
- driving (1)
- drone video quality (1)
- dynamic vector fields (1)
- e-learning course structure (1)
- echo state network (1)
- eco-driving (1)
- embedded collaborative learning (1)
- embodied interfaces (1)
- emotion computing (1)
- energy efficient transportation (1)
- energy optimal driving (1)
- evolution strategies (1)
- evolutionary illumination (1)
- evolved neural network controller (1)
- evolving look ahead controllers (1)
- explainable gesture recognition (1)
- exploration (1)
- eye-tracking (1)
- faults in robotics (1)
- feature (1)
- feature selection (1)
- flight zone (1)
- forms of mathematical models (1)
- foveated rendering (1)
- fpga (1)
- full-body interface (1)
- fuzzy logic (1)
- game engine (1)
- gamification (1)
- gaming (1)
- generation of ARRs (1)
- generative design (1)
- geofence (1)
- graphs (1)
- guidance (1)
- hand guidance (1)
- haptic feedback (1)
- heat shrink tubes (1)
- heterogeneous networks (1)
- heuristics (1)
- hierarchical clustering (1)
- higher education (1)
- holography (1)
- human-centric lighting (1)
- human-robot collaboration (1)
- hypermedia applications (1)
- iOER (1)
- ideal switches (1)
- ideation (1)
- image sequence processing (1)
- immersion (1)
- immersive systems (1)
- incremental bond graphs (1)
- industrial robots (1)
- information display methods (1)
- innovative work behavior (1)
- intelligent pedestrian counter (1)
- interaction (1)
- interaction techniques (1)
- interactive distributed rendering (1)
- intercultural learning (1)
- interference (1)
- international (1)
- international teams (1)
- intrinsics (1)
- inverse model (1)
- issue tracker (1)
- knowledge engineering (1)
- knowledge graphs (1)
- knowledge-management (1)
- leaning (1)
- leaning, self-motion perception (1)
- learning object repositories (1)
- learning-based fault detection and diagnosis (1)
- light curtains (1)
- linguistic variable (1)
- linguistic variables (1)
- link calibration (1)
- long-distance 802.11 (1)
- measurement (1)
- mechatronic systems (1)
- medical training (1)
- memory bandwidth (1)
- mesoscopic agents (1)
- microcomputers (1)
- microcontroller (1)
- mininig software repositories (1)
- mobile or handheld device (1)
- mobile projection (1)
- mobile robots (1)
- mobile web (1)
- mode switching LTI models (1)
- modular web (1)
- momentary frequency (1)
- monitoring (1)
- morphological operator (1)
- motion control (1)
- motion cueing (1)
- motion platform (1)
- motion trajectory enhancement (1)
- multi causal strain (1)
- multi robot systems (1)
- multi-layer display (1)
- multi-screen visualization environments (1)
- multi-user VR (1)
- multibody systems (1)
- multidisciplinary (1)
- multiple Xbox 360 (1)
- multiple computer systems (1)
- multiresolution analysis (1)
- multisensory cues (1)
- multisensory interface (1)
- naive physics (1)
- natural user interface (1)
- near-infrared (1)
- neural networks (1)
- neuroevolution (1)
- noise suppression (1)
- nomadic text entry (1)
- nonlinear storytelling (1)
- object identification (1)
- object-oriented physical systems modelling (1)
- open educational resources (OERs) (1)
- optical safeguard sensor (1)
- optimal control (1)
- optimal control problem (1)
- parallel BFS (1)
- parallel breadth-first search (1)
- parallel difference visualization (1)
- parameter sensitivities of residuals of ARRs (1)
- payment protocol (1)
- pedestrian counting system (1)
- pedestrian movements (1)
- pen interaction (1)
- performance optimizations (1)
- peripheral vision (1)
- peripheral visual field (1)
- photometry (1)
- physical activity (1)
- physical model immersive (1)
- physiological monitoring (1)
- preprocessing (1)
- project-based learning (1)
- projection (1)
- property-based testing for robots (1)
- prototype theory (1)
- proxemics (1)
- pseudo-random number generator (1)
- quality-diversity (1)
- question answering (1)
- recurrent neural network function (1)
- redundant work (1)
- reference dataset (1)
- regression (1)
- reinforcement learning (1)
- remote diagnosis (1)
- remote sensing (1)
- remote-controlled robots (1)
- rendering (computer graphics) (1)
- requirements (1)
- requirements analysis (1)
- requirements management (1)
- residual sinks (1)
- resource utilization (1)
- robot action diagnosability (1)
- robot component monitoring (1)
- robot dynamics (1)
- robot execution failures (1)
- robot kinematics (1)
- robotic black box (1)
- robots (1)
- rules (1)
- rural areas (1)
- scene element representation (1)
- screens (display) (1)
- see-through display (1)
- see-through head-mounted displays (1)
- self-configuration (1)
- self-management (1)
- semantic image seg-mentation (1)
- semi-supervised learning (1)
- sensor data acquisition (1)
- sensor data transmission (1)
- sensor-based fault detection and diagnosis (1)
- service activities (1)
- service robots (1)
- short-term memory (1)
- simulation-based robot testing (1)
- simulator (1)
- skin detection (1)
- software engineering (1)
- software-based feedback agents (1)
- spectral rendering (1)
- spectrum scan (1)
- spectrum sensing (1)
- speech recognition (1)
- speech understanding (1)
- stereoscopic vision (1)
- story authoring (1)
- strain (1)
- stress (1)
- stress detection (1)
- structural equation modeling (1)
- submillimeter precision (1)
- support vector machine (1)
- surface textures (1)
- surface topography (1)
- synthetic dataset (1)
- teaching (1)
- telepresence (1)
- territoriality (1)
- text entry in motion (1)
- text mining (1)
- tiled displays (1)
- time series processing (1)
- touchscreen (1)
- traffic surveillance (1)
- transfer learning (1)
- true random number generator (1)
- ultrasonic sensor (1)
- un-manned aerial vehicle (1)
- unexpected situations (1)
- unique bond graph representation for all modes of operation (1)
- unmanned ground vehicle (1)
- unstructured data (1)
- usability (1)
- usable secure email (1)
- usage contexts (1)
- usage data analysis (1)
- user documentation (1)
- user engagement (1)
- user interface design (1)
- user study (1)
- vection (1)
- verification and validation of robot action execution (1)
- vibration (1)
- virtual environment framework (1)
- virtual locomotion (1)
- virtual or soft keyboard (1)
- visual quality control (1)
- visualisation (1)
- visualization (1)
- visuohaptic feedback (1)
- walking (1)
- web (1)
- web components (1)
- web technology (1)
- website (1)
- welfare technology (1)
- whole-body interface (1)
- wireless communication (1)
- wireless performance (1)
- wmSDN (1)
- workspace awareness (1)
- xorshift-generator (1)
- youBot (1)
- zooming interface (1)
In verteilten und offenen Systemen wollen Kommunikationspartner beim Electronic Commerce Dokumente vertraulich, integer und rechtsverbindlich sowie zuordnungsbar authentisch und nachweisbar senden und empfangen. Für die an der Kommunikation beteiligten Kommunikationspartner muß dazu nachvollziehbar sein, wer wann mit wem welche Dokumente ausgetauscht hat. Zur Erreichung des Sachziels 'Vertraulichkeit' werden Dokumente bei der Speicherung auf einem Server und bei der Übertragung (über lokale Netzte, Intranets, Extranets und im Internet) vom Endanwender verschlüsselt. Dazu müssen die benutzten Schlüssel gegen unberechtigte Kenntnisnahme geschützt werden. Gleichzeitig muß auch die Verfügbarkeit der Schlüssel sichergestellt werden: Verschlüsselte Dokumente können nämlich nur dann wieder benutzbar gemacht werden, wenn sie bei berechtigtem Bedarf wieder entschlüsselt werden können. Im Unternehmen ist es deshalb erforderlich, Verfahren einzuführen, die die Verfügbarkeit gespeicherter Dokumente sicherstellen - auch wenn der originäre Inhaber dieser Dokumente nicht verfügbar ist (Reise, Urlaub, Krankheit, Ausscheiden). Schlüssel-Archive - sog. Enterprise Key Recovery Server - bieten die Möglichkeit, verschlüsselt gespeicherte Konzelationsschlüssel Berechtigten wieder zu Verfügung zu stellen. Damit können verschlüsselt gespeicherte Dokumente gespeichert werden. Enterprise Key Recovery Server werden im Rahmen des Projekts SECFORS - Secure Electronic Commerce an der Fachhochschule Rhein-Sieg zusammen mit Studierenden installiert und unter einer Reihe von Aspekten im Rahmen des vom Bundeswirtschaftsministerium geförderten Kompetenzzentrums Electronic Commerce Bonn Rhein-Sieg (KompEC) evaluiert; dazu werden Anforderungen an vertrauenswürdige Enterprise Key Recovery Server formuliert. Der Einsatz von Enterprise Key Recovery Servern ist in den USA Stand der Technik; in deutschen Unternehmen wird der Bedarf insbesondere deswegen differenziert gesehen, weil eine Verschlüsselung gespeicherter und übertragener Daten noch nicht flächendeckend durchgeführt wird.
In this paper we present a new storytelling approach, called Hypermedia Novel (HYMN), that extends the classical narration concept of a story. We develop an underlying modular concept – the narration module – that facilitates a new manner of reception as well as creation of a story. The HYMN focuses on the recipient and his role of consuming a story and a heterogeneous group of creative authors by providing narration modules and their interfaces without defining the granularity of the modules. Using several kinds ofmultimedia elements and a hyperlink structure, we present a first demonstrator that implements this new concept. We also discuss improvements, e.g. MPEG-4/7, that support both reception by the audience, and the process of creating the story by a dispersed team of authors.
Clusters of commodity PCs are widely considered as the way to go to improve rendering performance and quality in many real-time rendering applications. We describe the design and implementation of our parallel rendering system for real-time rendering applications. Major design objectives for our system are: usage of commodity hardware for all system components, ease of integration into existing Virtual Environments software, and flexibility in applying different rendering techniques, e.g. using ray tracing to render distinct objects with a particularly high quality.
In der Informationsgesellschaft nehmen auch in Deutschland aggressive und kriminelle Handlungen (Computermißbrauch) ausweislich der jährlichen Kriminalstatistik [BMI02] zu. Weniger Bedeutung wird in Deutschland bisher politisch-motivierten Aktionen beigemessen. Weltweit werden klassische Verfahren wie ziviler Ungehorsam, innere Unruhen und Bürgerkrieg zunehmend durch IT-gestützte Verfahren ergänzt und ersetzt (Transformation). Durch die weltweite Verfügbarkeit der IT-gestützten Verfahren und des Internet muß der - auf einen Staat begrenzte - Begriff des zivilen Ungehorsams genauso wie der der inneren Unruhen und der des klassischen Bürgerkriegs transformiert werden in den ubiquitären Cyberspace. Angesichts zunehmender gewalttätiger Aktivitäten unterhalb der Kriegsschwelle im Cyberspace muß die Sensibilität für die Auswirkungen dieser Aktivitäten dringend geschaffen werden und angemessene Reaktionen müssen auf allen Ebenen (Private, Unternehmen und Behörden) erarbeitet werden.