Refine
H-BRS Bibliography
- yes (970) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (970) (remove)
Document Type
- Conference Object (574)
- Article (186)
- Preprint (45)
- Part of a Book (42)
- Report (33)
- Book (monograph, edited volume) (31)
- Doctoral Thesis (22)
- Conference Proceedings (17)
- Research Data (11)
- Contribution to a Periodical (5)
- Patent (2)
- Other (1)
- Working Paper (1)
Year of publication
Has Fulltext
- no (970) (remove)
Keywords
- Robotics (12)
- Virtual Reality (10)
- virtual reality (8)
- Quality diversity (7)
- 3D user interface (6)
- Lehrbuch (6)
- Machine Learning (6)
- Augmented Reality (5)
- Benchmarking (5)
- CUDA (5)
- Navigation (5)
- Software (5)
- Usable Security (5)
- Virtual reality (5)
- Image Processing (4)
- Measurement (4)
- Quality Diversity (4)
- Sicherheitslücke (4)
- SpMV (4)
- Taxonomy (4)
- Usable Privacy (4)
- Visualization (4)
- embedded systems (4)
- machine learning (4)
- ARRs (3)
- Aerodynamics (3)
- Augmented reality (3)
- Bayesian optimization (3)
- Bond graph modelling (3)
- Computer Graphics (3)
- Computersicherheit (3)
- Cooperative Awareness Message (3)
- Datenanalyse (3)
- Datenschutz (3)
- Datensicherheit (3)
- ERP (3)
- FDI (3)
- Force field (3)
- Human-Robot Interaction (3)
- Hyperspectral image (3)
- IP protection (3)
- Intelligent Transport System (3)
- Internet (3)
- LoRa (3)
- LoRaWAN (3)
- MAP-Elites (3)
- Object recognition (3)
- Open source software (3)
- Performance (3)
- Privacy (3)
- Pseudonym Concept (3)
- Ray tracing (3)
- Robot sensing systems (3)
- Robustness (3)
- Security (3)
- Surrogate Modeling (3)
- Theoretische Informatik (3)
- Vehicular Ad hoc Networks (3)
- clustering (3)
- guidance (3)
- haptics (3)
- incremental bond graphs (3)
- motion estimation (3)
- parallel breadth-first search (3)
- post-buckling (3)
- robotics (3)
- serious games (3)
- vection (3)
- virtual environments (3)
- 3D user interfaces (2)
- AAL-Technik (2)
- ARIMA (2)
- Algebra (2)
- Algorithms (2)
- Alternatives (2)
- Autoencoder (2)
- Automatic Short Answer Grading (2)
- B2T (2)
- BCL2 (2)
- BFS (2)
- BPMS (2)
- Bag of Features (2)
- Blocking (2)
- Bond graphs (2)
- Business-to-Thing (2)
- CMMN (2)
- Cognitive robot control (2)
- Compositional Pattern Producing Networks (2)
- Computer Vision (2)
- Content Module (2)
- Control Systems and Automation (2)
- DPA (2)
- Deep Learning (2)
- Demenz (2)
- Digitisation (2)
- Distributed rendering (2)
- EEG (2)
- Educational institutions (2)
- Electrical Machines and Power Electronics (2)
- Embedded software (2)
- Empirical study (2)
- Encryption (2)
- Engineering (2)
- Enterprise-Resource-Planning (2)
- Evolutionary Computation (2)
- Evolutionary computation (2)
- Evolutionary optimization (2)
- Explainable robotics (2)
- Eye Tracking (2)
- FPGA (2)
- Fas (2)
- Fault analysis (2)
- Fuzzy logic (2)
- GDPR (2)
- GPU (2)
- Garbage collection (2)
- Generative Models (2)
- Graphics Cards (2)
- Head-mounted Display (2)
- Heart Rate Prediction (2)
- Higher education (2)
- Human computer interaction (2)
- Human factors (2)
- Human-Computer Interaction (2)
- Indirect Encodings (2)
- Inductive Logic Programming (2)
- Informationssicherheit (2)
- Innovation (2)
- Intel Xeon Phi (2)
- Intelligent controls (2)
- Intelligent virtual agents (2)
- Interaction Patterns (2)
- Internet of Things (2)
- Java virtual machine (2)
- Large, high-resolution displays (2)
- Lattice Boltzmann Method (2)
- Learning from experience (2)
- Low-Power Wide Area Network (LP-WAN) (2)
- Machine learning (2)
- Modelica (2)
- NUMA (2)
- Natural Language Processing (2)
- Neuroevolution (2)
- Nvidia graphic processors (2)
- Object detection (2)
- Open Source (2)
- OpenFlow (2)
- Optimization (2)
- Original Story (2)
- Parallelization (2)
- Parameter sensitivities of transfer functions (2)
- Path Loss (2)
- Perception (2)
- QoS (2)
- RE (2)
- Raman microscopy (2)
- Rapid Prototyping (2)
- Reasoning (2)
- Renewable Energy Systems (2)
- SDN (2)
- Serious Games (2)
- Side-channel analysis (2)
- Single Instruction Multiple Data (SIMD) (2)
- Smart Card (2)
- Software-Werkzeug (2)
- Sparse Matrix Vector Multiplication (2)
- Sparse Matrix Vector multiply (SpMV) (2)
- Support Vector Machine (2)
- Survey (2)
- Three-dimensional displays (2)
- UAV (2)
- Unternehmen (2)
- Urban (2)
- Usability (2)
- User Interface Design (2)
- Vehicle-to-Vehicle Communication (2)
- Watermarking (2)
- adaptive fault thresholds (2)
- aerodynamics (2)
- analysis (2)
- blockchain (2)
- classifier combination (2)
- confidence level (2)
- data filtering (2)
- data locality (2)
- diversity (2)
- dynamic vector fields (2)
- edutainment (2)
- eye-tracking (2)
- feature extraction (2)
- flight zone (2)
- foveated rendering (2)
- geofence (2)
- human factors (2)
- hypermedia (2)
- image fusion (2)
- interface design (2)
- intrinsics (2)
- leaning (2)
- machine vision (2)
- memory bandwidth (2)
- monitoring (2)
- multisensory cues (2)
- naive physics (2)
- navigation (2)
- neural network (2)
- nonlinear stability (2)
- object categorization (2)
- optic flow (2)
- pansharpening (2)
- path planning (2)
- peripheral vision (2)
- physical activity (2)
- power electronic systems (2)
- redundant work (2)
- robot execution failures (2)
- robot introspection (2)
- security (2)
- self-motion perception (2)
- service robots (2)
- short-term load forecasting (2)
- simulation (2)
- surrogate modeling (2)
- traffic surveillance (2)
- usable privacy (2)
- 2D Level Design (1)
- 3D User Interface (1)
- 3D Visualisierung (1)
- 3D design (1)
- 3D gaming (1)
- 3D interfaces (1)
- 3D nucleus (1)
- 3D real-time echocardiography (1)
- 3D registration (1)
- 3D shape (1)
- 450 MHz (1)
- ABT-737 (1)
- ACPYPE (1)
- AD (1)
- AES (1)
- AI based translation (1)
- ALPS (1)
- AMBER (1)
- AMD Family 15h (1)
- AML (1)
- ANSYS (1)
- API Gebrauchstauglichkeit (1)
- API usability (1)
- ARM Cortex M3 Processor (1)
- Absolute nodal coordinate formulation (1)
- Acceptance (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Accuracy (1)
- Active Learning (1)
- Active locomotion (1)
- Active vision interface (1)
- Actuators (1)
- Acute lymphoblastic leukemia (1)
- Adaptation of Software (1)
- Adaptive Case Management (1)
- Adaptive Control (1)
- Advanced Driver Assistance Systems (1)
- Affordances (1)
- Agent-Based Modeling (1)
- Air Pollution (1)
- Air Pollution Monitoring (1)
- Air pollution modeling (1)
- Algorithmen (1)
- Algorithmus (1)
- Alkane (1)
- All-Swap Algorithm (1)
- Altengerechte Technik (1)
- Altenhilfe (1)
- Altenpflege (1)
- Analysis of Bond Graph Models (1)
- Antifuse memory (1)
- Architectural Patterns (1)
- Artificial Intelligence (cs.AI) (1)
- Artificial Intelligence and Natural Language Processing (1)
- Assekuranz (1)
- Assistive robots (1)
- Attention (1)
- Auditory Cueing (1)
- Ausbreitung (1)
- Authentication (1)
- Authentifikation (1)
- Authorship watermark (1)
- Autoimmune disease (1)
- Automated Modelling (1)
- Automated design (1)
- Automation (1)
- Automatisierte Prozesse Rekonstruktio (1)
- Autonomous Driving (1)
- Autonomous Systems (1)
- Autonomy (1)
- Autotuning (1)
- Available Bandwidth (1)
- B-cell lymphoma (1)
- BERT (1)
- BG-Klinik (1)
- BH3-mimetic inhibitor (1)
- BLOB Detection (1)
- Background music (1)
- Ball tracking (1)
- Ballastless track (1)
- Bandwidth Estimation (1)
- Basis set (1)
- Bayesian Deep Learning (1)
- Bayesian Network (1)
- Bayessches Netz (1)
- Beacon Chain (1)
- Begriffsbestimmung (1)
- Behaviour-Driven Development (1)
- Behörde (1)
- Berechenbarkeit (1)
- Berufskrankheiten (1)
- Best practice algorithms (1)
- Bewertung (1)
- Bicycle Simulator (1)
- Bioinformatics (1)
- Black-Box Optimization (1)
- Blasendiagramm (1)
- Blob Detection (1)
- Block cipher (1)
- Bond Graph Modelling (1)
- Bond Graph modelling and simulation (1)
- Bond Graph models for fault detection and isolation (1)
- Bondgraph (1)
- Boolesche Algebra (1)
- Bound Volume Hierarchy (1)
- Bounding Box (1)
- Branch and cut (1)
- Bundesrepublik Deutschland (1)
- Bundesverfassungsgericht (1)
- Business (1)
- Business Case (1)
- Business Process Intelligence (1)
- Business software (1)
- Business system (1)
- CAS (1)
- CIBERSORT (1)
- CNN (1)
- CPA (1)
- CPU (1)
- CPUID instruction (1)
- CREBBP (1)
- CSR5BC (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Canonical form of state equations and standard interconnection form for robustness study (1)
- Capability framework (1)
- Capacity (1)
- Carbohydrate (1)
- Case Management Model and Notation (1)
- Case-Based Reasoning (1)
- Cell Processor (1)
- Cell/B.E. (1)
- Center-of-Mass (1)
- Chalcogenide glass sensor (1)
- Challenges (1)
- Channel assignment (1)
- Chip ID (1)
- Circular saws (1)
- Classifiers (1)
- Cleaning Task (1)
- Climate Risks (1)
- Cloud computing (1)
- Clusteranalyse (1)
- Clustering (1)
- Clusters (1)
- Co-creative processes (1)
- Co-located Collaboration (1)
- Co-located work (1)
- Co-rotational formulation (1)
- Code similarity analysis (1)
- Cognition (1)
- Cognitive informatics (1)
- Cognitive robotics (1)
- Collaborating industrial robots (1)
- Coloured pointclouds (1)
- Column (1)
- Common Criteria (1)
- Company (1)
- Comparative analysis (1)
- Complex Event Processing (1)
- Compliant Manipulation (1)
- Compliant fingers (1)
- Component Models (1)
- Composition of Patterns (1)
- Computational Fluid Dynamics (1)
- Computational causality (1)
- Computational chemistry (1)
- Computational creativity (1)
- Computational fluid dynamics (1)
- Computational modeling (1)
- Computer (1)
- Computer Automated Design (1)
- Computer Science - Computer Vision and Pattern Recognition (1)
- Computer Science - Learning (1)
- Computer Vision System (1)
- Computer architecture (1)
- Computer graphics (1)
- Computer science (1)
- Computer-supported Cooperative Work (1)
- Computergrafik (1)
- Computerkriminalitaet (1)
- Computersimulation (1)
- Computing methodologies (1)
- Concurrent Kleene Algebra (1)
- Concurrent repeated failure prognosis (1)
- Conformation (1)
- Congenital heart disease (1)
- Connectivity in rural areas (1)
- Container Structure (1)
- Containerization (1)
- Content Analysis (1)
- Contextualized Attention Metadata (CAM) (1)
- Continual robot learning (1)
- Control (1)
- Cooperative Intelligent Transport Systems (ITS) (1)
- Corporate Social Responsibility (1)
- Correlative Microscopy (1)
- Cortex-M3 (1)
- Counterfeit protection (1)
- Coupled process (1)
- Covert channel (1)
- Critical power (1)
- Cross-core (1)
- Cross-sensitivity (1)
- Crossmedia (1)
- Crystal structure (1)
- Curriculum (1)
- Customization (1)
- Cutting sticks problem (1)
- Cybersickness (1)
- Cypher (1)
- DAE systems (1)
- DFA Lab (1)
- DHF-Reduktase (1)
- DNSSEC (1)
- DPA Lab (1)
- Data Fusion (1)
- Data Generation (1)
- Databases and Data Mining (1)
- Dataflow Programming (1)
- Datalog (1)
- Datenbasierte Prozessanalyse (1)
- Decision Diagram (1)
- Decision Network (1)
- Decision Support (1)
- Deklarative Prozessmodellierung (1)
- Delph Study (1)
- Design Optimization (1)
- Design automation (1)
- Deskriptive Datenanalyse (1)
- Diagnostic bond graph-based online fault diagnosis (1)
- Diagnostic bond graphs (1)
- Dienstgütevereinbarung (1)
- Difference Visualization (1)
- Differential analysis (1)
- Digital Storytelling (1)
- Digital common goods (1)
- Digital watermarking (1)
- Dimensionality reduction (1)
- Dimensionsreduktion (1)
- Disco (1)
- Discrete cosine transform (1)
- Displacement (1)
- Distance Perception (1)
- Distributed Robot Systems (1)
- Divergent optimization (1)
- Docker (1)
- Domain Expert (1)
- Domain-Specific Languages (1)
- Domestic Robots (1)
- Domestic robotics (1)
- Domestic robots (1)
- Domestic service robots (1)
- Drahtloses lokales Netz (1)
- Drosophila (1)
- Drug (1)
- Drug resistance (1)
- Dynamic Case Management (1)
- Dynamic motion primitives (1)
- E-Government (1)
- ELM (1)
- ELMo (1)
- EM leakage (1)
- EN-12299 (1)
- ERP system (1)
- ERP-Software (1)
- ERP-software (1)
- ERP-system (1)
- Echtzeit (1)
- Eclipse Modeling Framework (1)
- Educational Data Mining (1)
- Educational Process Mining (1)
- Educational Science (1)
- Efficiency (1)
- Ego-Motion Estimation (1)
- Einflussdiagramm (1)
- Einführung (1)
- Eingebettetes System (1)
- Elderly People (1)
- Electric mobility (1)
- Electronic commerce (1)
- Electronic tongue (1)
- Elementare Zahlentheorie (1)
- Elliptic Curve Cryptography (1)
- Embedded system (1)
- Emotion (1)
- Empfehlung (1)
- Empirical Study (1)
- Empirical formula (1)
- Employee Privacy (1)
- Employee data protection (1)
- Enterprise Resource Planning (1)
- Enterprise Resource Planning Software (1)
- Enterprise Resource Planning System (1)
- Enterprise software (1)
- Enterprise system (1)
- Entscheidungsunterstützung (1)
- Environment Perception (1)
- Escape analysis (1)
- Estimation (1)
- Ethereum (1)
- Euler–Bernoulli beam (1)
- Euronorm (1)
- Event detection (1)
- Everyday object manipulation (1)
- Evolutionary algorithms (1)
- Ewing´s Sarcoma Family of Tumors (1)
- Exchange and reuse of bond graph models (1)
- Exercise (1)
- Exergame (1)
- Experiment (1)
- Experiment design (1)
- Expert system (1)
- Explainability (1)
- Explainable Machine Learning (1)
- External faults (1)
- FGR (1)
- FOS: Computer and information sciences (1)
- FPGA implementation (1)
- Face and hand gesture recognition (1)
- Facial Emotion Recognition (1)
- Factory instrumentation (1)
- Failure Prognosis (1)
- Fallbeschreibung (1)
- Fault Channel Watermarking Lab (1)
- Fault Detection & Diagnosis (1)
- Fault Diagnosis (1)
- Fault accommodation (1)
- Fault detection and isolation (1)
- Fault diagnosis (1)
- Fault handling (1)
- Fault simulation (1)
- Fault-channel watermarks (1)
- Feature Model (1)
- Feature extraction (1)
- Features (1)
- Fehlertoleranz (1)
- Female (1)
- Festschrift (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Field sequential imaging (1)
- Filtering (1)
- Fingerprint watermark (1)
- Finite element modelling (1)
- Fixed spatial data (1)
- Flexible multibody system (1)
- Flexible robots (1)
- Fluency (1)
- Focus plus context (1)
- Force (1)
- Force and tactile sensing (1)
- Foreground segmentation (1)
- Forests (1)
- Formal definition and validation of the content of a model description (1)
- Forms of mathematical models (1)
- Forschung (1)
- Forschungsschwerpunkte (1)
- Foveated rendering (1)
- Frequency planning (1)
- Friction (1)
- Functional Programming (1)
- Functional safety (1)
- Funktionsmodell (1)
- Funktionsprinzip (1)
- Fusion (1)
- Future (1)
- Future Studies (1)
- Future of Robotics (1)
- Fuzzy Mining (1)
- Fuzzy-Logik (1)
- Fuzzy-System (1)
- GPGPU (1)
- GPT (1)
- GPT-2 (1)
- Gabor filter (1)
- Game Engine (1)
- Games (1)
- Games and Simulations for Learning (1)
- Gaussian processes (1)
- Gaze Behavior (1)
- Gaze Depth Estimation (1)
- Gaze-contingent depth-of-field (1)
- Gefühl (1)
- Gender Issues in Computer Science Education (1)
- Generation R (1)
- Generative Design (1)
- Genetic Predisposition to Disease (1)
- Genetic algorithm (1)
- Geo-tagging (1)
- Gesamt-Exom-Sequenzierung (1)
- Geschäftsprozess (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheitswesen (1)
- Givens Rotations (1)
- Global Illumination (1)
- Global illumination (1)
- Glycam06 (1)
- Goal Programming (1)
- Gradient-boosting (1)
- Grailog (1)
- Graphentheorie (1)
- Graphical user interfaces (1)
- Grasping (1)
- Gromacs (1)
- Grounded Method (1)
- Group Behavior (1)
- Group behavior (1)
- Groupware (1)
- HCI (1)
- HCSS (1)
- HDAC inhibitor (1)
- HIF1α (1)
- HPC (1)
- HRI (1)
- HSP90 (1)
- Hacker-Angriff (1)
- Hacking-Technik (1)
- Hand Guidance (1)
- Hand Tracking (1)
- Hand injuries (1)
- Handlungsempfehlung (1)
- Hardware (1)
- Head Mounted Display (1)
- Head-Mounted Displays (1)
- Heat Shock Protein (1)
- Heat shrink tubing (1)
- High hyperdiploidy (1)
- High-performance computing (1)
- High-resolution displays (1)
- High-speed railway track (1)
- High-speed track (1)
- Highly Automated Driving (1)
- Histograms (1)
- Hochleistungssport (1)
- Hochschule Bonn-Rhein-Sieg (1)
- Human Factors (1)
- Human centered computing (1)
- Human robot interaction (1)
- Human-Centered Design (1)
- Human-Centered Robotics (1)
- Human-robot interaction (1)
- Humanoid Robot (1)
- Humanoider Roboter (1)
- Humans (1)
- Hybrid Failure Prognosis (1)
- Hybrid Systems (1)
- Hybrid models (1)
- Hybrid systems (1)
- Hydraulic orifices (1)
- Hydrocarbon (1)
- Hyper-parameter Tuning (1)
- HyperNEAT (1)
- IC identification (1)
- ICP (1)
- IEC 104 (1)
- IEC 61850 (1)
- IEEE 802.21 (1)
- ISO 27000 (1)
- IT professionals (1)
- IT-Sicherheitsanforderungen (1)
- IT-Verfügbarkeit (1)
- IaaS (1)
- Ikaros (1)
- Illumination algorithms (1)
- Image representation (1)
- Image-based rendering (1)
- Immersion (1)
- Immersive Virtual Environments (1)
- Immersive Visualization Environment (1)
- Increasing fault magnitude (1)
- Incremental bond graph (1)
- Incremental true bond graphs (1)
- Inductive Visual Mining (1)
- Industrial robots (1)
- Industry 4.0 (1)
- Influence Diagram (1)
- Information Privacy (1)
- Information Security (1)
- Information Types (1)
- Information hiding (1)
- Information interaction (1)
- Informationsflüsse (1)
- Informationsgewinnung (1)
- Informationskomplexität (1)
- Informationstechnik (1)
- Informationsverarbeitung (1)
- Input reconstruction (1)
- Instance-based learning (1)
- Institut für Arbeit und Gesundheit (1)
- Institut für Arbeitsschutz (1)
- Institut für Prävention und Arbeitsmedizin (1)
- Instruction scheduling (1)
- Integer programming (1)
- Integral backstepping technique (1)
- Integrate Development Environment (1)
- Integrated circuit interconnections (1)
- Intel processors (1)
- Intelligent Autonomous Systems (1)
- Interaction (1)
- Interactive Smart Card Applications (1)
- Interaktion (1)
- Interbank Market (1)
- Interferenz (1)
- Intermittent faults (1)
- Interoperability (1)
- Inventory (1)
- Inverse simulation (1)
- IoT (1)
- Issue Tracking Systems (1)
- Issue Types (1)
- Issue tracking systems (1)
- It-Diensteanbieter (1)
- Java <Programmiersprache> (1)
- JavaScript (1)
- KNN (1)
- Kartographie (1)
- Key recovery (1)
- KiBP (1)
- Knowledge Graphs (1)
- Knowledge Management (1)
- Knowledge Worker (1)
- Knowledge representation (1)
- Knowledge-intensive Business Process (1)
- Komplexitätsklassen (1)
- Kopie digitaler Daten (1)
- Kryptologie (1)
- Künstliche Intelligenz (1)
- LGCSR (1)
- LOTUS Sensor Node (1)
- LTE-M (1)
- Lagerverwaltung (1)
- Laminar and turbulent flow (1)
- Language learning (1)
- Langzeitbehandlung (1)
- Large high-resolution displays (1)
- Lattice Basis Reduction (1)
- Laufzeit-Komplexität (1)
- Laws of programming (1)
- Lead userness (1)
- Leakage circuits (1)
- Learning analytics (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Learning from demonstration (1)
- Learning systems (1)
- Leistungsdaten (1)
- Leistungsdiagnostik (1)
- Leistungssport (1)
- Lennard-Jones parameters (1)
- Leukemia (1)
- Level-of-Detail (1)
- Library model (1)
- Ligands (1)
- Light curtain (1)
- Lighting simulation (1)
- Linear Optimization (1)
- Linear Programming (1)
- Linear inverse models (1)
- Linear quadratic regulator (1)
- Linear regression (1)
- Lineare Algebra (1)
- Lineare Optimierung (1)
- Liquidity Crises (1)
- Locomotion (1)
- Login (1)
- Lymphoproliferative disorder (1)
- MACE (1)
- MESD (1)
- MIMD (1)
- MOOC (1)
- MP2.5 (1)
- MPLS (1)
- MQTT (1)
- Machine Learning (cs.LG) (1)
- Machine-learning (1)
- Main Memory (1)
- Maker space (1)
- Male (1)
- Malware (1)
- Management (1)
- Manipulation tasks (1)
- Manipulator (1)
- Mathematical methods (1)
- Mathematische Logik (1)
- Maximal covering location problem (1)
- Mebendazole (1)
- Media in education (1)
- Megatrends (1)
- Memory (1)
- Memory filesystem (1)
- Memory management (1)
- Memory-Constrained Devices (1)
- Mengenlehre (1)
- Mensch-Maschine-Kommunikation (1)
- Mesh networks (1)
- Methodenanalyse (1)
- Methodik (1)
- Methodologies (1)
- Microarchitectural Data Sampling (MDS) (1)
- Microgravity (1)
- Microsoft CRM 2013 (1)
- Middleware and Programming Environments (1)
- Mining Software Repositories (1)
- Mining software repositories (1)
- Mixed (1)
- Mixed method evaluation (1)
- Mobile devices (1)
- Mobile manipulation (1)
- Mobile robotics (1)
- Mobile robots (1)
- Modalities (1)
- Mode switching LTI model (1)
- Mode-dependent ARRs (1)
- Model Fitting (1)
- Model-Based Software Development (1)
- Model-based Approach (1)
- Model-based Fault Diagnosis (1)
- Model-based failure prognosis (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Model-free control (1)
- Modellbildung (1)
- Modelling (1)
- Models of Variable Structure (1)
- Modular software packages (1)
- Molecular dynamics (1)
- Molecular modeling (1)
- Molecular structure (1)
- Molekulare Deskriptoren (1)
- Monitoring (1)
- Morphological box (1)
- Morphological scheme (1)
- Motion (1)
- Motion Capture (1)
- Motion Sickness (1)
- Motion planning (1)
- Multi-Modal Interaction (1)
- Multi-Solution Optimization (1)
- Multi-Tenant Application (1)
- Multi-component heavy metal solution (1)
- Multi-objective (1)
- Multi-objective optimization (1)
- Multi-stage (1)
- Multibody systems (1)
- Multicast communication (1)
- Multidisciplinary systems (1)
- Multidisciplinary Dynamic Systems (1)
- Multilayer interaction (1)
- Multimodal (1)
- Multimodal Microspectroscopy (1)
- Multimodal optimization (1)
- Multiple Displays (1)
- Multisensory cues (1)
- Multithreaded and multicore architecture (1)
- Multiuser (1)
- Multivariate Time Series (1)
- Multivariate time series classification (1)
- Musical Performance (1)
- N200 (1)
- NEAT (1)
- NETCONF (1)
- NFKB (1)
- NIR (1)
- NIR-point sensor (1)
- NISTPQC (1)
- NNS (1)
- NURBS (1)
- NVIDIA Tesla (1)
- Naive physics (1)
- Narration Module (1)
- Natural language understanding (1)
- Natural scene text (1)
- Navigation interface (1)
- Network simulation verification (1)
- Networked Robots (1)
- Neural Machine Translation (1)
- Noise (1)
- Noise reduction (1)
- Nonbonded scaling factor (1)
- Nonlinear control quadrotor uav (1)
- Numerical optimization (1)
- Nutzung (1)
- OER (1)
- Object-Based Image Analysis (OBIA) (1)
- Object-oriented physical systems modelling (1)
- Online Services (1)
- Online-Überwachung (1)
- Ontology (1)
- Open Access (1)
- Open innovation (1)
- Open source firmware (1)
- Open-ended Robotic Discovery (1)
- Open-source (1)
- OpenACC (1)
- OpenDaylight (1)
- OpenMP (1)
- OpenMP, unrolling (1)
- Optical flow (1)
- Optimisation 3D (1)
- Out-of-view Objects (1)
- Outlier Detection (1)
- Outside-in process (1)
- P300 (1)
- PAIS (1)
- PDE-5A (1)
- PDSTSP (1)
- PIR sensor units (1)
- PM2.5 estimation (1)
- PSD (1)
- PaaS (1)
- Pain Reduction (1)
- Parallel I/O (1)
- Parallel Processing (1)
- Parallel drone scheduling traveling salesman problem (1)
- Parameter degradation model (1)
- Parameter sensitivities of the residuals of analytical redundancy relations (1)
- Parameter uncertainties (1)
- Parametric study (1)
- Passwort (1)
- Pedigree (1)
- People Detection (1)
- Performance Simulation (1)
- Performance benchmarks (1)
- Performance prediction (1)
- Performance profiling (1)
- Periodic structures (1)
- Pflegeinformatik (1)
- Pflegepersonal (1)
- Phenotypic niching (1)
- Physical exercising game platform (1)
- Plagiat (1)
- Plan-based robot control (1)
- Pointing (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Pointing devices (1)
- Polymorphism, Single Nucleotide (1)
- Pose Estimation (1)
- Post-Quantum Signatures (1)
- Power Analysis (1)
- Precursor B-Cell Lymphoblastic Leukemia-Lymphoma/genetics (1)
- Prediction of physiological responses to strain (1)
- Predictive Models (1)
- Prescriptive Analytics (1)
- Presence (1)
- Pressure wire (1)
- Pressure-volume relation (1)
- Privacy engineering (1)
- ProM (1)
- Probabilistic model (1)
- Process Mining (1)
- Process views (1)
- Programmsicherheit (1)
- Project based learning (1)
- Pronunciation (1)
- Proof of Stake (1)
- Protective system (1)
- Prototypes (1)
- Prozessanalyse (1)
- Prozessmanagement (1)
- Prozessoptimierung (1)
- Prudential Regulation (1)
- Präskriptive Analytik (1)
- Prävention (1)
- Public Key Infrastructure (1)
- Public Key Infrastructures (1)
- Python <Programmiersprache> (1)
- Q measurement (1)
- Quality control (1)
- Quality of Service (1)
- Quantum mechanics (1)
- RAS (1)
- RBAR (1)
- RFID (1)
- RGB-D (1)
- RGB-D data (1)
- RLE-XOR (1)
- RLE-permutation (1)
- RMS acceleration (1)
- RNN (1)
- Radiance caching (1)
- Radiofrequency identification (1)
- Radix Sort (1)
- Raman spectroscopy (1)
- Rapid prototyping (1)
- RapidMiner (1)
- Ray Casting (1)
- Ray Tracing (1)
- Reader (1)
- Real-time image processing (1)
- Recht (Gesetzgebung) (1)
- Recommendation (1)
- Reconstruction Error (1)
- Reference Architectural Model Automotive (RAMA) (1)
- Refinement (1)
- Reflectance modeling (1)
- Registration Refinement (1)
- Rehabilitation (1)
- Relapse (1)
- Relational Learning (1)
- Remaining Useful Life (1)
- Remaining Useful Life (RUL) estimates (1)
- Render Cache (1)
- Rendering (1)
- Repositories (1)
- Requirements (1)
- Requirements Communication (1)
- Requirements analysis (1)
- Requirements engineering in SMEs (1)
- Restorative Virtual Environments (1)
- Reusable Software (1)
- Reversible Logic Synthesis (1)
- Review (1)
- Rfid (Radio-Frequency Identification) (1)
- Right to Informational Self-Determination (1)
- Risikoanalyse (1)
- Risk-Based Account Recovery (1)
- RoboCup (1)
- RoboCup industrial (1)
- Robot Perception (1)
- Robot commands (1)
- Robot competitions (1)
- Robot failure diagnosis (1)
- Robot kinematics (1)
- Robot learning (1)
- Robot software (1)
- Robotersteuerung (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Revolutions (1)
- Robotic Technology (1)
- Robotics competitions (1)
- Robots (1)
- Robust grasping (1)
- Rotating Table Test (1)
- Rule-based production systems (1)
- RuleML (1)
- Runtime Adaptation (1)
- Rural areas (1)
- S3D Video (1)
- S3D video (1)
- SAHA (1)
- SDWN (1)
- SEMA (1)
- SIMD (1)
- SIMPACK (1)
- SLIDE algorithm (1)
- SME (1)
- SOA (1)
- SORT (1)
- SQL (1)
- STAT3 (1)
- SVG (1)
- SVM (1)
- SaaS (1)
- Saccades (1)
- Saccadic suppression (1)
- Safety (1)
- Safety guard (1)
- Scalability (1)
- Scalable Vector Graphic (1)
- ScalarMultiplication (1)
- Scale Tuning (1)
- Scene text recognition, active vision, domestic robot, pantilt, auto-zoom, auto-focus, adaptive aperture control (1)
- Schadenanalyse (1)
- Schadensprozess (1)
- Scholarly workbench (1)
- Schutzmaßnahme (1)
- Schutzobjekte (1)
- Scientific competency development (1)
- Scientific workbench (1)
- Second Life (1)
- Security architecture (1)
- Security level (1)
- Self-motion perception (1)
- Self-supervised learning (1)
- Semantic models (1)
- Semantic scene understanding (1)
- Semantics (1)
- Sense of presence (1)
- SensorFusion (1)
- Separation algorithm (1)
- Service Robot (1)
- Service-Level-Agreement (1)
- Service-Oriented Architecture (1)
- Service-Roboter (1)
- Service-based cloud computing (1)
- Serviceroboter (1)
- Set partition problem (1)
- Shadow detection (1)
- Sichere Kommunikation Kritische Infrastrukturen (1)
- Sicherheit (1)
- Sicherheits-APIs (1)
- Sicherheitsanalyse (1)
- Sicherheitsarchitektur (1)
- Sicherheitsniveau (1)
- Side Channel Analysis (1)
- Side Channel Countermeasures (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side channels (1)
- Side-channel watermarking (1)
- Signal (1)
- Signal detection (1)
- Signal processing (1)
- Signature Verification (1)
- Similarity matrix (1)
- Simulation (1)
- Simulator (1)
- Single-objective (1)
- Skalierbarkeit (1)
- Skin detection (1)
- Slippage detection (1)
- Smart Card User Interface Design, Interactive Smart Card Applications (1)
- Smart Grid (1)
- Smart Home (1)
- Smart InGaAs camera-system (1)
- Smart factory (1)
- Smartphone (1)
- Smartphones (1)
- Social Virtual Reality (1)
- Social engagement in university (1)
- Social intelligence (1)
- Sociomateriality (1)
- Software Architectures (1)
- Software Development Process (1)
- Software Feature Request Detection (1)
- Software IP protection (1)
- Software and Architecture (1)
- Software reverse engineering (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Fehler (1)
- Software-Lebenszyklus (1)
- Software-Sicherheit (1)
- Software-Test (1)
- Software-Testautomatisierung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Softwareentwicklung (1)
- Sonar (1)
- Space exploration (1)
- Sparse matrix format (1)
- Spatiotemporality (1)
- Spectrum optimization (1)
- Speech Act Theory (1)
- Spherical treadmill (1)
- Spielanalyse (1)
- Split Axis (1)
- Stabilitätsanalyse (1)
- Standards (1)
- Star Trek (1)
- State machines (1)
- Stereoscopic Rendering (1)
- Stereoscopic rendering (1)
- Story Element (1)
- Stream cipher (1)
- Streaming (1)
- Stress Management (1)
- Studenten (1)
- Studienverlauf (1)
- Supervised learning (1)
- Supply chains (1)
- Surrogate Modelling (1)
- Surrogate models (1)
- Surrogate-assistance (1)
- Swim Stroke Analysis (1)
- Switched power electronic systems (1)
- Symmetry detector (1)
- Synergetik (1)
- Synthetic perception (1)
- System health monitoring (1)
- SystemVerilog (1)
- TLS (1)
- TP53 (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Tag (1)
- Task Frame Formalism (1)
- Tautomers (1)
- Taxonomie (1)
- Technologie (1)
- Telecommunication network reliability (1)
- Telecommunication network routing (1)
- Teleconferencing system (1)
- Telematik (1)
- Telematik-Software (1)
- Template Attacks (1)
- Temporally-weighted (1)
- Testing (1)
- Text detection (1)
- Text recognition (1)
- Textureless objects (1)
- Therapy (1)
- Throughput (1)
- Tiled displays (1)
- Tiled-display walls (1)
- Time measurement (1)
- Timing analysis (1)
- Timing channel (1)
- TinyECC 2.0 (1)
- ToF Camera (1)
- Touchscreen interaction (1)
- Touchscreens (1)
- Toyota HSR (1)
- Trace algebra (1)
- Traceability (1)
- Tracking (1)
- Tracking by detection (1)
- Traffic Simulations (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Trainingssteuerung (1)
- Transfer Learning (1)
- Transfer learning (1)
- Transformations between various description formats (1)
- Transformers (1)
- Transforms (1)
- Transparency (1)
- Transponder (1)
- Travel Techniques (1)
- Treatment of discontinuities and singularities in ordinary differential equations (1)
- Tree Stumps (1)
- UAV teleoperation (1)
- UI design (1)
- Ultrasonic array (1)
- Umgebung (Umwelt) (1)
- Uncertainty (1)
- Uncertainty Quantification (1)
- Underwater (1)
- Unidirectional thermoplastic composites (1)
- Unifying theories (1)
- Unity (1)
- Unmanned Aerial Vehicle (UAV) (1)
- Unterstützung (1)
- User Roles (1)
- User Study (1)
- User engagement (1)
- User interface (1)
- User interfaces (1)
- User-Centered Approach (1)
- VR (1)
- VR system design (1)
- Vacuum Cleaner (1)
- Variability Management (1)
- Variability Resolution (1)
- Variational Autoencoder (1)
- Vector Intrinsics (1)
- Vector Units (1)
- Vehicle-2-Infrastructure Kommunikation (1)
- Vehicle-2-Vehicle Communication (1)
- Vehicle-2-Vehicle Kommunikation (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicle-to-Vehicle Com- munication (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Verfassungsbeschwerde (1)
- Verifizierung (1)
- Verilog (1)
- Verschlüsselung (1)
- Versicherung (1)
- Vertrag (1)
- Vertragsbeendigung (1)
- Vertragspartner (1)
- Vertriebssysteme (1)
- Video surveillance (1)
- Virtual Agents (1)
- Virtual Environment (1)
- Virtual Environments (1)
- Virtual Memory Palace (1)
- Virtual attention (1)
- Virtual environments (1)
- Virtuelle Realität (1)
- Visual Cueing (1)
- Visual Discrimination (1)
- Visual perception (1)
- Visualization design and evaluation methods (1)
- Visualization systems and tools (1)
- Visuelle Wahrnehmung (1)
- Volumenrendering (1)
- Vulnerable Groups (1)
- V˙CO2 prediction (1)
- V˙O2 prediction (1)
- WDS (1)
- WWW (1)
- Warencode (1)
- Web components (1)
- Wettkampfanalyse (1)
- WfMS (1)
- Whole body motion (1)
- WiAFirm (1)
- WiFi (1)
- WiFi-based Long Distance networks (1)
- Wireless Backhaul Network (1)
- Wireless Sensor Network (1)
- Wireless backhaul (1)
- Wissensarbeit (1)
- Wissensarbeiter (1)
- Wissensintensive Geschäftsprozesse (1)
- Wissensintensiver Geschäftsprozess (1)
- XGBoost (1)
- XML (1)
- XML schema for bond graph models (1)
- XNA Game Studio (1)
- XSLT (1)
- Xeon Phi knights landing (1)
- YANG (1)
- YAWL (1)
- YOLO (1)
- Zielprogrammierung (1)
- ZombieLoad (1)
- activation function (1)
- acute (1)
- adaptive agents (1)
- adaptive binarization (1)
- adaptive filters (1)
- affective computing (1)
- allopurinol (1)
- ambulatory monitoring (1)
- analyses (1)
- analytical redundancy relations (1)
- anomaly detection (1)
- antibody deficiency (1)
- apoptosis (1)
- architectural distortion (1)
- artifacts (1)
- asset transfer (1)
- atomic instructions (1)
- atomic operation (1)
- audio-tactile feedback (1)
- augmented, and virtual realities (1)
- authoring tools (1)
- autoimmune lymphoproliferative syndrome (1)
- autoinflammatory disease (1)
- automated 3D scanning (1)
- automation (1)
- back-of-device interaction (1)
- background motion (1)
- bagging (1)
- bass-shaker (1)
- bicycle (1)
- biorder (1)
- bloat (1)
- body-centric cues (1)
- bond graph (1)
- bond graph modelling (1)
- brain computer interfaces (1)
- breast cancer (1)
- brightfield microscopy (1)
- bus load (1)
- caching (1)
- camera-based person detection (1)
- can bus (1)
- cancer (1)
- cellular automata (1)
- chemical sensors (1)
- childhood (1)
- childhood cancer syndrome (1)
- client-side component model (1)
- co-located collaboration (1)
- collaboration (1)
- collaborative learning (1)
- colorimetry (1)
- commuting (1)
- compensation (1)
- complete basis set limit (1)
- component analyses (1)
- component based (1)
- computational causalities (1)
- computational logic (1)
- computer games (1)
- computer vision (1)
- computer-supported collaborative work (1)
- concrete plate (1)
- constitutional mismatch repair syndrome (1)
- constructive process deviance (1)
- convolutional neural networks (1)
- cooperative path planning (1)
- correlation (1)
- crawling (1)
- cross-disciplinary (1)
- cryptanalytic attacks (1)
- cryptocurrency (1)
- cuSPARSE (1)
- curved shell (1)
- cyanide (1)
- cybersickness (1)
- data logging (1)
- data visualisation (1)
- decision tree learning (1)
- denial-of-service (1)
- dependable robots (1)
- depth perception (1)
- design process (1)
- designing air flow (1)
- detection (1)
- developer centered security (1)
- diagnostic bond graphs (1)
- digital co-creation (1)
- digital platform ecosystem (1)
- digital storytelling (1)
- dimensionality reduction (1)
- direct feedback (1)
- directed hypergraphs (1)
- disabled people (1)
- displacement measurement (1)
- distance perception (1)
- distributed authoring (1)
- distributed processing (1)
- domain adaptation (1)
- driving (1)
- drone video quality (1)
- e-learning course structure (1)
- eavesdropping (1)
- echo state network (1)
- eco-driving (1)
- electrochemical sensor (1)
- embedded collaborative learning (1)
- embodied interfaces (1)
- emotion computing (1)
- energy efficient transportation (1)
- energy optimal driving (1)
- enterprise software (1)
- entwicklerzentrierte Sicherheit (1)
- erbliche Krebssyndrome (1)
- estimation (1)
- evolution strategies (1)
- evolutionary illumination (1)
- evolved neural network controller (1)
- evolving look ahead controllers (1)
- execution (1)
- explainable gesture recognition (1)
- exploration (1)
- external faults (1)
- extreme learning machine (1)
- fault detection (1)
- fault handling (1)
- faults in robotics (1)
- feature (1)
- feature discovery (1)
- feature selection (1)
- felt obligations (1)
- finite element method (1)
- flying (1)
- force field (1)
- force sensing (1)
- forms of mathematical models (1)
- fpga (1)
- free and open source software (1)
- frequency (1)
- fuel (1)
- full-body interface (1)
- fuzzy logic (1)
- game engine (1)
- gamification (1)
- gaming (1)
- general plate theory (1)
- generation of ARRs (1)
- generative design (1)
- genes (1)
- genetic neutrality (1)
- genetic testing (1)
- genetics (1)
- genetische Testung (1)
- global illumination (1)
- graphene oxide powder (1)
- graphene oxide powders (1)
- graphs (1)
- hand guidance (1)
- haptic feedback (1)
- haptic interfaces (1)
- heat shrink tubes (1)
- heavy metal (1)
- heterogeneous networks (1)
- heuristics (1)
- hierarchical clustering (1)
- high speed railway vehicle (1)
- holography (1)
- human computer interaction (1)
- human-centred design (1)
- human-centric lighting (1)
- human-robot collaboration (1)
- hybrid robot skill representation (1)
- hybrid system models (1)
- hydrocarbon (1)
- hypermedia applications (1)
- iOER (1)
- ideal switches (1)
- ideation (1)
- image sequence processing (1)
- immersion (1)
- immersive systems (1)
- immunodeficiency (1)
- industrial robots (1)
- information display methods (1)
- information flows (1)
- innovative work behavior (1)
- intelligent pedestrian counter (1)
- interaction (1)
- interaction techniques (1)
- interactive distributed rendering (1)
- intercultural learning (1)
- international (1)
- international teams (1)
- intervention mechanisms (1)
- inverse model (1)
- ion-selective electrodes (1)
- irregularity amplitude (1)
- issue tracker (1)
- knowledge engineering (1)
- knowledge-management (1)
- leaning, self-motion perception (1)
- learning object repositories (1)
- learning-based fault detection and diagnosis (1)
- leukemia (1)
- light curtains (1)
- linguistic variable (1)
- linguistic variables (1)
- link calibration (1)
- lipid (1)
- local optimization (1)
- locomotion (1)
- long short-term memory (1)
- low-cost air sensor (1)
- lymphocytic (1)
- manipulation (1)
- measurement (1)
- mechatronic systems (1)
- medical training (1)
- mesoscopic agents (1)
- micro-benchmarks (1)
- microcomputers (1)
- microcontroller (1)
- mininig software repositories (1)
- mobile applications (1)
- mobile or handheld device (1)
- mobile projection (1)
- mobile robots (1)
- mobile web (1)
- mobiler Roboter (1)
- modal superposition (1)
- mode switching LTI models (1)
- modeling (1)
- modular web (1)
- momentary frequency (1)
- mood (1)
- morphological operator (1)
- motion control (1)
- motion cueing (1)
- motion platform (1)
- motion sickness (1)
- motion trajectory enhancement (1)
- mp2 (1)
- multi causal strain (1)
- multi robot systems (1)
- multi-layer display (1)
- multi-objective optimization (1)
- multi-screen visualization environments (1)
- multi-solution optimization (1)
- multi-user VR (1)
- multibody systems (1)
- multidisciplinary (1)
- multimodal optimization (1)
- multiple Xbox 360 (1)
- multiple computer systems (1)
- multiresolution analysis (1)
- multiscale parameterization (1)
- multisensory (1)
- multisensory interface (1)
- mutation (1)
- nano-composite (1)
- natural user interface (1)
- near-infrared (1)
- neural networks (1)
- neuro-cognitive performance (1)
- neuroevolution (1)
- neutral buoyancy (1)
- noise suppression (1)
- nomadic text entry (1)
- non-linear projection (1)
- nonlinear storytelling (1)
- object detection (1)
- object identification (1)
- object-oriented physical systems modelling (1)
- objective function (1)
- octane (1)
- optical flow (1)
- optical safeguard sensor (1)
- optical sensor (1)
- optical triangulation (1)
- optimal control (1)
- optimal control problem (1)
- opto-electronic protective device (1)
- optoelectronic (1)
- parallel BFS (1)
- parallel difference visualization (1)
- parallel work queue (1)
- parameter sensitivities of residuals of ARRs (1)
- parametric (1)
- payment protocol (1)
- pedestrian counting system (1)
- pedestrian movements (1)
- pen interaction (1)
- performance optimizations (1)
- peripheral visual field (1)
- phenotypic diversity (1)
- phenotypic feature (1)
- phenotypic niching (1)
- photometry (1)
- physical model immersive (1)
- physiological monitoring (1)
- plasma-enhanced CVD (PECVD) (deposition) (1)
- porous material (1)
- power spectral density (1)
- pre-optimization (1)
- prefrontal cortex (1)
- preprocessing (1)
- privacy by design (1)
- prognosis (1)
- project-based learning (1)
- projection (1)
- projection based systems (1)
- propan-2-ol (1)
- property-based testing for robots (1)
- prototype theory (1)
- proxemics (1)
- qualitative reasoning (1)
- quality-diversity (1)
- quantum mechanics (1)
- radio-frequency identification (RFID) systems (1)
- ray tracing (1)
- rds encoding (1)
- recurrent neural network function (1)
- reference dataset (1)
- refined beam theory (1)
- regression (1)
- regression testing (1)
- reinforcement learning (1)
- remote diagnosis (1)
- remote sensing (1)
- remote-controlled robots (1)
- rendering (computer graphics) (1)
- representation (1)
- requirements (1)
- requirements analysis (1)
- requirements management (1)
- residual sinks (1)
- resource utilization (1)
- ride comfort (1)
- robot action diagnosability (1)
- robot component monitoring (1)
- robot context awareness (1)
- robot control architecture (1)
- robot dynamics (1)
- robot failure diagnosis (1)
- robot kinematics (1)
- robot skill execution failures (1)
- robot skill generalisation (1)
- robotic black box (1)
- robots (1)
- rules (1)
- run-time adaptation (1)
- scalability (1)
- scene element representation (1)
- schädliches Programm (1)
- screens (display) (1)
- security APIs (1)
- security and privacy literacy (1)
- see-through display (1)
- see-through head-mounted displays (1)
- self-configuration (1)
- self-management (1)
- semantic image seg-mentation (1)
- semi-continuous locomotion (1)
- semi-supervised learning (1)
- sensor data acquisition (1)
- sensor data transmission (1)
- sensor fusion (1)
- sensor-based fault detection and diagnosis (1)
- sensory perception (1)
- server processors (1)
- service activities (1)
- shared memory (1)
- shell theory (1)
- short-term memory (1)
- signal processing algorithm (1)
- simulation-based robot testing (1)
- simulator (1)
- situation awareness (1)
- skill execution models (1)
- skin detection (1)
- slip detection (1)
- software (1)
- software development (1)
- software engineering (1)
- software testing (1)
- software-based feedback agents (1)
- spatial augmented reality (1)
- spatial updating (1)
- spectral rendering (1)
- speech recognition (1)
- speech understanding (1)
- stereoscopic vision (1)
- stiffeners (1)
- story authoring (1)
- strain (1)
- stress (1)
- stress detection (1)
- structural equation modeling (1)
- strukturelle Komplexität von Daten (1)
- submillimeter precision (1)
- support vector machine (1)
- surface textures (1)
- surface topography (1)
- surrogate assisted phenotypic niching (1)
- surrogate models (1)
- synthetic dataset (1)
- system modes (1)
- tactile sensing (1)
- task planning (1)
- teaching (1)
- teleportation (1)
- telepresence (1)
- telomeres (1)
- territoriality (1)
- test case reduction (1)
- text entry in motion (1)
- text mining (1)
- thread mapping (1)
- tiled displays (1)
- time series processing (1)
- touchscreen (1)
- track irregularity (1)
- transfer learning (1)
- transparency-enhancing technologies (1)
- travel techniques (1)
- tumor microenvironment (1)
- tumor-infiltrating immune cells (1)
- ultrasonic sensor (1)
- un-manned aerial vehicle (1)
- unexpected situations (1)
- unique bond graph representation for all modes of operation (1)
- unmanned ground vehicle (1)
- unrolling (1)
- unstructured data (1)
- unsupervised learning (1)
- usability (1)
- usable secure email (1)
- usage contexts (1)
- usage data analysis (1)
- user documentation (1)
- user engagement (1)
- user interface design (1)
- user study (1)
- vector units (1)
- verification and validation of robot action execution (1)
- vibration (1)
- view management (1)
- virtual environment framework (1)
- virtual locomotion (1)
- virtual or soft keyboard (1)
- visual quality control (1)
- visualisation (1)
- visualization (1)
- visuohaptic feedback (1)
- walking (1)
- water dimer (1)
- wavelet (1)
- web (1)
- web components (1)
- web services (1)
- web technology (1)
- website (1)
- weighting factors (1)
- welfare technology (1)
- whole-body interface (1)
- whole-exome sequencing (1)
- wind nuisance (1)
- wind nuisance threshold (1)
- wireless communication (1)
- wireless performance (1)
- wmSDN (1)
- workday breaks (1)
- workspace awareness (1)
- youBot (1)
- zooming interface (1)
- zooming interfaces (1)
- Öffentlicher Sektor (1)
- Überwachung (1)
- Wavenet (1)
Selection Performance and Reliability of Eye and Head Gaze Tracking Under Varying Light Conditions
(2024)
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
(2024)
Force field (FF) based molecular modeling is an often used method to investigate and study structural and dynamic properties of (bio-)chemical substances and systems. When such a system is modeled or refined, the force field parameters need to be adjusted. This force field parameter optimization can be a tedious task and is always a trade-off in terms of errors regarding the targeted properties. To better control the balance of various properties’ errors, in this study we introduce weighting factors for the optimization objectives. Different weighting strategies are compared to fine-tune the balance between bulk-phase density and relative conformational energies (RCE), using n-octane as a representative system. Additionally, a non-linear projection of the individual property-specific parts of the optimized loss function is deployed to further improve the balance between them. The results show that the overall error is reduced. One interesting outcome is a large variety in the resulting optimized force field parameters (FFParams) and corresponding errors, suggesting that the optimization landscape is multi-modal and very dependent on the weighting factor setup. We conclude that adjusting the weighting factors can be a very important feature to lower the overall error in the FF optimization procedure, giving researchers the possibility to fine-tune their FFs.
In vision tasks, a larger effective receptive field (ERF) is associated with better performance. While attention natively supports global context, convolution requires multiple stacked layers and a hierarchical structure for large context. In this work, we extend Hyena, a convolution-based attention replacement, from causal sequences to the non-causal two-dimensional image space. We scale the Hyena convolution kernels beyond the feature map size up to 191$\times$191 to maximize the ERF while maintaining sub-quadratic complexity in the number of pixels. We integrate our two-dimensional Hyena, HyenaPixel, and bidirectional Hyena into the MetaFormer framework. For image categorization, HyenaPixel and bidirectional Hyena achieve a competitive ImageNet-1k top-1 accuracy of 83.0% and 83.5%, respectively, while outperforming other large-kernel networks. Combining HyenaPixel with attention further increases accuracy to 83.6%. We attribute the success of attention to the lack of spatial bias in later stages and support this finding with bidirectional Hyena.
Der Programmier-Trainingsplan für alle, die weiter kommen wollen.
In diesem Übungsbuch trainierst du anhand von kurzweiligen und praxisnahen Aufgaben deine Programmierfähigkeiten. Jedes Kapitel beginnt mit einem kurzen Warmup zum behandelten Programmierkonzept; die Umsetzung übst du dann anhand von zahlreichen Workout-Aufgaben. Du startest mit einfachen Aufgaben und steigerst dich hin zu komplexeren Fragestellungen. Damit dir nicht langweilig wird, gibt es über 150 praxisnahe Übungen. So lernst du z. B. einen BMI-Rechner oder einen PIN-Generator zu programmieren oder wie du eine Zeitangabe mit einer analogen Uhr anzeigen kannst. (Verlagsangaben)
Ziel der neunten Ausgabe des wissenschaftlichen Workshops "Usable Security und Privacy" auf der Mensch und Computer 2023 ist es, aktuelle Forschungs- und Praxisbeiträge auf diesem Gebiet zu präsentieren und mit den Teilnehmer:innen zu diskutieren. Getreu dem Konferenzmotto "Building Bridges" soll mit dem Workshop ein etabliertes Forum fortgeführt und weiterentwickelt werden, in dem sich Expert:innen, Forscher:innen und Praktiker:innen aus unterschiedlichen Domänen transdisziplinär zum Thema Usable Security und Privacy austauschen können. Das Thema betrifft neben dem Usability- und Security-Engineering unterschiedliche Forschungsgebiete und Berufsfelder, z. B. Informatik, Ingenieurwissenschaften, Mediengestaltung und Psychologie. Der Workshop richtet sich an interessierte Wissenschaftler:innen aus all diesen Bereichen, aber auch ausdrücklich an Vertreter:innen der Wirtschaft, Industrie und öffentlichen Verwaltung.
Eine Überprüfung der Leistungsentwicklung im Radsport geht bis heute mit der Durchführung einer spezifischen Leistungsdiagnostik unter Verwendung vorgegebener Testprotokolle einher. Durch die zwischenzeitlich stark gestiegene Popularität von »wearable devices« ist es gleichzeitig heutzutage sehr einfach, die Herzfrequenz im Alltag und bei sportlichen Aktivitäten aufzuzeichnen. Doch eine geeignete Modellierung der Herzfrequenz, die es ermöglicht, Rückschlüsse über die Leistungsentwicklung ziehen zu können, fehlt bislang. Die Herzfrequenzaufzeichnungen in Kombination mit einer phänomenologisch interpretierbaren Modellierung zu nutzen, um auf möglichst direkte Weise und ohne spezifische Anforderungen an die Trainingsfahrten Rückschlüsse über die Leistungsentwicklung ziehen zu können, bietet die Chance, sowohl im professionellen Radsport wie auch in der ambitionierten Radsportpraxis den Erkenntnisgewinn über die eigene Leistungsentwicklung maßgeblich zu vereinfachen. In der vorliegenden Arbeit wird ein neuartiges und phänomenologisch interpretierbares Modell zur Simulation und Prädiktion der Herzfrequenz beim Radsport vorgestellt und im Rahmen einer empirischen Studie validiert. Dieses Modell ermöglicht es, die Herzfrequenz (sowie andere Beanspruchungsparameter aus Atemgasanalysen) mit adäquater Genauigkeit zu simulieren und bei vorgegebener Wattbelastung zu prognostizieren. Weiterhin wird eine Methode zur Reduktion der Anzahl der kalibrierbaren freien Modellparameter vorgestellt und in zwei empirischen Studien validiert. Nach einer individualisierten Parameterreduktion kann das Modell mit lediglich einem einzigen freien Parameter verwendet werden. Dieser verbleibende freie Parameter bietet schließlich die Möglichkeit, im zeitlichen Verlauf mit dem Verlauf der Leistungsentwicklung verglichen zu werden. In zwei unterschiedlichen Studien zeigt sich, dass der freie Modellparameter grundsätzlich in der Lage zu sein scheint, den Verlauf der Leistungsentwicklung über die Zeit abzubilden.
This paper addresses the classification of Arabic text data in the field of Natural Language Processing (NLP), with a particular focus on Natural Language Inference (NLI) and Contradiction Detection (CD). Arabic is considered a resource-poor language, meaning that there are few data sets available, which leads to limited availability of NLP methods. To overcome this limitation, we create a dedicated data set from publicly available resources. Subsequently, transformer-based machine learning models are being trained and evaluated. We find that a language-specific model (AraBERT) performs competitively with state-of-the-art multilingual approaches, when we apply linguistically informed pre-training methods such as Named Entity Recognition (NER). To our knowledge, this is the first large-scale evaluation for this task in Arabic, as well as the first application of multi-task pre-training in this context.
Loading of shipping containers for dairy products often includes a press-fit task, which involves manually stacking milk cartons in a container without using pallets or packaging. Automating this task with a mobile manipulator can reduce worker strain, and also enhance the efficiency and safety of the container loading process. This paper proposes an approach called Adaptive Compliant Control with Integrated Failure Recovery (ACCIFR), which enables a mobile manipulator to reliably perform the press-fit task. We base the approach on a demonstration learning-based compliant control framework, such that we integrate a monitoring and failure recovery mechanism for successful task execution. Concretely, we monitor the execution through distance and force feedback, detect collisions while the robot is performing the press-fit task, and use wrench measurements to classify the direction of collision; this information informs the subsequent recovery process. We evaluate the method on a miniature container setup, considering variations in the (i) starting position of the end effector, (ii) goal configuration, and (iii) object grasping position. The results demonstrate that the proposed approach outperforms the baseline demonstration-based learning framework regarding adaptability to environmental variations and the ability to recover from collision failures, making it a promising solution for practical press-fit applications.
Although climate-induced liquidity risks can cause significant disruptions and instabilities in the financial sector, they are frequently overlooked in current debates and policy discussions. This paper proposes a macro-financial agent-based integrated assessment model to investigate the transmission channels of climate risks to financial instability and study the emergence of liquidity crises through interbank market dynamics. Our simulations show that the financial system could experience serious funding and market liquidity shortages due to climate-induced liquidity crises. Our investigation contributes to our understanding of the impact - and possible solutions - to climate-induced liquidity crises, besides the issue of asset stranding related to transition risks usually considered in the existing studies.
This research investigates the efficacy of multisensory cues for locating targets in Augmented Reality (AR). Sensory constraints can impair perception and attention in AR, leading to reduced performance due to factors such as conflicting visual cues or a restricted field of view. To address these limitations, the research proposes head-based multisensory guidance methods that leverage audio-tactile cues to direct users' attention towards target locations. The research findings demonstrate that this approach can effectively reduce the influence of sensory constraints, resulting in improved search performance in AR. Additionally, the thesis discusses the limitations of the proposed methods and provides recommendations for future research.
LiDAR-based Indoor Localization with Optimal Particle Filters using Surface Normal Constraints
(2023)
Dieses Buch wurde im Rahmen eines Wirtschaftsinformatik-Projektes an der Hochschule Bonn-Rhein-Sieg unter Aufsicht von Prof. Dr. Alexandra Kees geschrieben. Ziel des Projektes war die Erstellung eines Funktionsreferenzmodells für Enterprise Resource Planning (ERP-) Software, welches in Form eines Buches veröffentlicht werden sollte. Die Studierenden haben für das Projekt jeweils verschiedene Teilbereiche, die in einem ERP-System gewöhnlich Anwendung finden, zugeteilt bekommen. In diesem Teil wird der Bereich Lagerverwaltung näher betrachtet.
Risikobasierte Authentifizierung (RBA) ist ein adaptiver Ansatz zur Stärkung der Passwortauthentifizierung. Er überwacht eine Reihe von Merkmalen, die sich auf das Loginverhalten während der Passworteingabe beziehen. Wenn sich die beobachteten Merkmalswerte signifikant von denen früherer Logins unterscheiden, fordert RBA zusätzliche Identitätsnachweise an. Regierungsbehörden und ein Erlass des US-Präsidenten empfehlen RBA, um Onlineaccounts vor Angriffen mit gestohlenen Passwörtern zu schützen. Trotz dieser Tatsachen litt RBA unter einem Mangel an offenem Wissen. Es gab nur wenige bis keine Untersuchungen über die Usability, Sicherheit und Privatsphäre von RBA. Das Verständnis dieser Aspekte ist jedoch wichtig für eine breite Akzeptanz.
Diese Arbeit soll ein umfassendes Verständnis von RBA mit einer Reihe von Studien vermitteln. Die Ergebnisse ermöglichen es, datenschutzfreundliche RBA-Lösungen zu schaffen, die die Authentifizierung stärken bei gleichzeitig hoher Menschenakzeptanz.
Saliency methods are frequently used to explain Deep Neural Network-based models. Adebayo et al.'s work on evaluating saliency methods for classification models illustrate certain explanation methods fail the model and data randomization tests. However, on extending the tests for various state of the art object detectors we illustrate that the ability to explain a model is more dependent on the model itself than the explanation method. We perform sanity checks for object detection and define new qualitative criteria to evaluate the saliency explanations, both for object classification and bounding box decisions, using Guided Backpropagation, Integrated Gradients, and their Smoothgrad versions, together with Faster R-CNN, SSD, and EfficientDet-D0, trained on COCO. In addition, the sensitivity of the explanation method to model parameters and data labels varies class-wise motivating to perform the sanity checks for each class. We find that EfficientDet-D0 is the most interpretable method independent of the saliency method, which passes the sanity checks with little problems.
Robots applied in therapeutic scenarios, for instance in the therapy of individuals with Autism Spectrum Disorder, are sometimes used for imitation learning activities in which a person needs to repeat motions by the robot. To simplify the task of incorporating new types of motions that a robot can perform, it is desirable that the robot has the ability to learn motions by observing demonstrations from a human, such as a therapist. In this paper, we investigate an approach for acquiring motions from skeleton observations of a human, which are collected by a robot-centric RGB-D camera. Given a sequence of observations of various joints, the joint positions are mapped to match the configuration of a robot before being executed by a PID position controller. We evaluate the method, in particular the reproduction error, by performing a study with QTrobot in which the robot acquired different upper-body dance moves from multiple participants. The results indicate the method's overall feasibility, but also indicate that the reproduction quality is affected by noise in the skeleton observations.
Intelligent virtual agents provide a framework for simulating more life-like behavior and increasing plausibility in virtual training environments. They can improve the learning process if they portray believable behavior that can also be controlled to support the training objectives. In the context of this thesis, cognitive agents are considered a subset of intelligent virtual agents (IVA) with the focus on emulating cognitive processes to achieve believable behavior. The complexity of employed algorithms, however, is often limited since multiple agents need to be simulated in real-time. Available solutions focus on a subset of the indicated aspects: plausibility, controllability, or real-time capability (scalability). Within this thesis project, an agent architecture for attentive cognitive agents is developed that considers all three aspects at once. The result is a lightweight cognitive agent architecture that is customizable to application-specific requirements. A generic trait-based personality model influences all cognitive processes, facilitating the generation of consistent and individual behavior. An additional mapping process provides a formalized mechanism to transfer results of psychological studies to the architecture. Personality profiles are combined with an emotion model to achieve situational behavior adaptation. Which action an agent selects in a situation also influences plausibility. An integral element of this selection process is an agent's knowledge about its world. Therefore, synthetic perception is modeled and integrated into the architecture to provide a credible knowledge base. The developed perception module includes a unified sensor interface, a memory hierarchy, and an attention process. With the presented realization of the architecture (CAARVE), it is possible for the first time to simulate cognitive agents, whose behaviors are simultaneously computable in real-time and controllable. The architecture's applicability is demonstrated by integrating an agent-based traffic simulation built with CAARVE into a bicycle simulator for road-safety education. The developed ideas and their realization are evaluated within this work using different strategies and scenarios. For example, it is shown how CAARVE agents utilize personality profiles and emotions to plausibly resolve deadlocks in traffic simulations. Controllability and adaptability are demonstrated in additional scenarios. Using the realization, 200 agents can be simulated in real-time (50 FPS), illustrating scalability. The achieved results verify that the developed architecture can generate plausible and controllable agent behavior in real-time. The presented concepts and realizations provide sound fundamentals to everyone interested in simulating IVA in real-time environments.
The representation, or encoding, utilized in evolutionary algorithms has a substantial effect on their performance. Examination of the suitability of widely used representations for quality diversity optimization (QD) in robotic domains has yielded inconsistent results regarding the most appropriate encoding method. Given the domain-dependent nature of QD, additional evidence from other domains is necessary. This study compares the impact of several representations, including direct encoding, a dictionary-based representation, parametric encoding, compositional pattern producing networks, and cellular automata, on the generation of voxelized meshes in an architecture setting. The results reveal that some indirect encodings outperform direct encodings and can generate more diverse solution sets, especially when considering full phenotypic diversity. The paper introduces a multi-encoding QD approach that incorporates all evaluated representations in the same archive. Species of encodings compete on the basis of phenotypic features, leading to an approach that demonstrates similar performance to the best single-encoding QD approach. This is noteworthy, as it does not always require the contribution of the best-performing single encoding.
Skill generalisation and experience acquisition for predicting and avoiding execution failures
(2023)
For performing tasks in their target environments, autonomous robots usually execute and combine skills. Robot skills in general and learning-based skills in particular are usually designed so that flexible skill acquisition is possible, but without an explicit consideration of execution failures, the impact that failure analysis can have on the skill learning process, or the benefits of introspection for effective coexistence with humans. Particularly in human-centered environments, the ability to understand, explain, and appropriately react to failures can affect a robot's trustworthiness and, consequently, its overall acceptability. Thus, in this dissertation, we study the questions of how parameterised skills can be designed so that execution-level decisions are associated with semantic knowledge about the execution process, and how such knowledge can be utilised for avoiding and analysing execution failures. The first major segment of this work is dedicated to developing a representation for skill parameterisation whose objective is to improve the transparency of the skill parameterisation process and enable a semantic analysis of execution failures. We particularly develop a hybrid learning-based representation for parameterising skills, called an execution model, which combines qualitative success preconditions with a function that maps parameters to predicted execution success. The second major part of this work focuses on applications of the execution model representation to address different types of execution failures. We first present a diagnosis algorithm that, given parameters that have resulted in a failure, finds a failure hypothesis by searching for violations of the qualitative model, as well as an experience correction algorithm that uses the found hypothesis to identify parameters that are likely to correct the failure. Furthermore, we present an extension of execution models that allows multiple qualitative execution contexts to be considered so that context-specific execution failures can be avoided. Finally, to enable the avoidance of model generalisation failures, we propose an adaptive ontology-assisted strategy for execution model generalisation between object categories that aims to combine the benefits of model-based and data-driven methods; for this, information about category similarities as encoded in an ontology is integrated with outcomes of model generalisation attempts performed by a robot. The proposed methods are exemplified in terms of various use cases - object and handle grasping, object stowing, pulling, and hand-over - and evaluated in multiple experiments performed with a physical robot. The main contributions of this work include a formalisation of the skill parameterisation problem by considering execution failures as an integral part of the skill design and learning process, a demonstration of how a hybrid representation for parameterising skills can contribute towards improving the introspective properties of robot skills, as well as an extensive evaluation of the proposed methods in various experiments. We believe that this work constitutes a small first step towards more failure-aware robots that are suitable to be used in human-centered environments.
Quality diversity algorithms can be used to efficiently create a diverse set of solutions to inform engineers' intuition. But quality diversity is not efficient in very expensive problems, needing 100.000s of evaluations. Even with the assistance of surrogate models, quality diversity needs 100s or even 1000s of evaluations, which can make it use infeasible. In this study we try to tackle this problem by using a pre-optimization strategy on a lower-dimensional optimization problem and then map the solutions to a higher-dimensional case. For a use case to design buildings that minimize wind nuisance, we show that we can predict flow features around 3D buildings from 2D flow features around building footprints. For a diverse set of building designs, by sampling the space of 2D footprints with a quality diversity algorithm, a predictive model can be trained that is more accurate than when trained on a set of footprints that were selected with a space-filling algorithm like the Sobol sequence. Simulating only 16 buildings in 3D, a set of 1024 building designs with low predicted wind nuisance is created. We show that we can produce better machine learning models by producing training data with quality diversity instead of using common sampling techniques. The method can bootstrap generative design in a computationally expensive 3D domain and allow engineers to sweep the design space, understanding wind nuisance in early design phases.
Representing 3D surfaces as level sets of continuous functions over R3 is the common denominator of neural implicit representations, which recently enabled remarkable progress in geometric deep learning and computer vision tasks. In order to represent 3D motion within this framework, it is often assumed (either explicitly or implicitly) that the transformations which a surface may undergo are homeomorphic: this is not necessarily true, for instance, in the case of fluid dynamics. In order to represent more general classes of deformations, we propose to apply this theoretical framework as regularizers for the optimization of simple 4D implicit functions (such as signed distance fields). We show that our representation is capable of capturing both homeomorphic and topology-changing deformations, while also defining correspondences over the continuously-reconstructed surfaces.
TSEM: Temporally-Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series
(2023)
A PM2.5 concentration prediction framework with vehicle tracking system: From cause to effect
(2023)
In the design of robot skills, the focus generally lies on increasing the flexibility and reliability of the robot execution process; however, typical skill representations are not designed for analysing execution failures if they occur or for explicitly learning from failures. In this paper, we describe a learning-based hybrid representation for skill parameterisation called an execution model, which considers execution failures to be a natural part of the execution process. We then (i) demonstrate how execution contexts can be included in execution models, (ii) introduce a technique for generalising models between object categories by combining generalisation attempts performed by a robot with knowledge about object similarities represented in an ontology, and (iii) describe a procedure that uses an execution model for identifying a likely hypothesis of a parameterisation failure. The feasibility of the proposed methods is evaluated in multiple experiments performed with a physical robot in the context of handle grasping, object grasping, and object pulling. The experimental results suggest that execution models contribute towards avoiding execution failures, but also represent a first step towards more introspective robots that are able to analyse some of their execution failures in an explicit manner.
State-of-the-art object detectors are treated as black boxes due to their highly non-linear internal computations. Even with unprecedented advancements in detector performance, the inability to explain how their outputs are generated limits their use in safety-critical applications. Previous work fails to produce explanations for both bounding box and classification decisions, and generally make individual explanations for various detectors. In this paper, we propose an open-source Detector Explanation Toolkit (DExT) which implements the proposed approach to generate a holistic explanation for all detector decisions using certain gradient-based explanation methods. We suggests various multi-object visualization methods to merge the explanations of multiple objects detected in an image as well as the corresponding detections in a single image. The quantitative evaluation show that the Single Shot MultiBox Detector (SSD) is more faithfully explained compared to other detectors regardless of the explanation methods. Both quantitative and human-centric evaluations identify that SmoothGrad with Guided Backpropagation (GBP) provides more trustworthy explanations among selected methods across all detectors. We expect that DExT will motivate practitioners to evaluate object detectors from the interpretability perspective by explaining both bounding box and classification decisions.
21 pages, with supplementary
This open access book brings together the latest developments from industry and research on automated driving and artificial intelligence.
Environment perception for highly automated driving heavily employs deep neural networks, facing many challenges. How much data do we need for training and testing? How to use synthetic data to save labeling costs for training? How do we increase robustness and decrease memory usage? For inevitably poor conditions: How do we know that the network is uncertain about its decisions? Can we understand a bit more about what actually happens inside neural networks? This leads to a very practical problem particularly for DNNs employed in automated driving: What are useful validation techniques and how about safety?
This book unites the views from both academia and industry, where computer vision and machine learning meet environment perception for highly automated driving. Naturally, aspects of data, robustness, uncertainty quantification, and, last but not least, safety are at the core of it. This book is unique: In its first part, an extended survey of all the relevant aspects is provided. The second part contains the detailed technical elaboration of the various questions mentioned above.
Vietnam requires a sustainable urbanization, for which city sensing is used in planning and de-cision-making. Large cities need portable, scalable, and inexpensive digital technology for this purpose. End-to-end air quality monitoring companies such as AirVisual and Plume Air have shown their reliability with portable devices outfitted with superior air sensors. They are pricey, yet homeowners use them to get local air data without evaluating the causal effect. Our air quality inspection system is scalable, reasonably priced, and flexible. Minicomputer of the sys-tem remotely monitors PMS7003 and BME280 sensor data through a microcontroller processor. The 5-megapixel camera module enables researchers to infer the causal relationship between traffic intensity and dust concentration. The design enables inexpensive, commercial-grade hardware, with Azure Blob storing air pollution data and surrounding-area imagery and pre-venting the system from physically expanding. In addition, by including an air channel that re-plenishes and distributes temperature, the design improves ventilation and safeguards electrical components. The gadget allows for the analysis of the correlation between traffic and air quali-ty data, which might aid in the establishment of sustainable urban development plans and poli-cies.
Fatigue strength estimation is a costly manual material characterization process in which state-of-the-art approaches follow a standardized experiment and analysis procedure. In this paper, we examine a modular, Machine Learning-based approach for fatigue strength estimation that is likely to reduce the number of experiments and, thus, the overall experimental costs. Despite its high potential, deployment of a new approach in a real-life lab requires more than the theoretical definition and simulation. Therefore, we study the robustness of the approach against misspecification of the prior and discretization of the specified loads. We identify its applicability and its advantageous behavior over the state-of-the-art methods, potentially reducing the number of costly experiments.
Safety-critical applications like autonomous driving use Deep Neural Networks (DNNs) for object detection and segmentation. The DNNs fail to predict when they observe an Out-of-Distribution (OOD) input leading to catastrophic consequences. Existing OOD detection methods were extensively studied for image inputs but have not been explored much for LiDAR inputs. So in this study, we proposed two datasets for benchmarking OOD detection in 3D semantic segmentation. We used Maximum Softmax Probability and Entropy scores generated using Deep Ensembles and Flipout versions of RandLA-Net as OOD scores. We observed that Deep Ensembles out perform Flipout model in OOD detection with greater AUROC scores for both datasets.
Login Data Set for Risk-Based Authentication
Synthesized login feature data of >33M login attempts and >3.3M users on a large-scale online service in Norway. Original data collected between February 2020 and February 2021.
This data sets aims to foster research and development for <a href="https://riskbasedauthentication.org">Risk-Based Authentication (RBA) systems. The data was synthesized from the real-world login behavior of more than 3.3M users at a large-scale single sign-on (SSO) online service in Norway.
Ziel der achten Auflage des wissenschaftlichen Workshops “Usable Security and Privacy” auf der Mensch und Computer 2022 ist es, aktuelle Forschungs- und Praxisbeiträge zu präsentieren und anschließend mit den Teilnehmenden zu diskutieren. Der Workshop soll ein etabliertes Forum fortführen und weiterentwickeln, in dem sich Experten aus verschiedenen Bereichen, z. B. Usability und Security Engineering, transdisziplinär austauschen können.
Auch die mittlerweile siebte Ausgabe des wissenschaftlichen Workshops “Usable Security und Privacy” auf der Mensch und Computer 2021 wird aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmer:innen diskutiert. Zwei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, zwei mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert:innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security- Engineering, transdisziplinär austauschen können.
The processing of employee personal data is dramatically increasing. To protect employees' fundamental right to privacy, the law provides for the implementation of privacy controls, including transparency and intervention. At present, however, the stakeholders responsible for putting these obligations into action, such as employers and software engineers, simply lack the fundamental knowledge needed to design and implement the necessary controls. Indeed, privacy research has so far focused mainly on consumer relations in the private context. In contrast, privacy in the employment context is less well studied. However, since privacy is highly context-dependent, existing knowledge and privacy controls from other contexts cannot simply be adopted to the employment context. In particular, privacy in employment is subject to different legal and social norms, which require a different conceptualization of the right to privacy than is usual in other contexts. To adequately address these aspects, there is broad consensus that privacy must be regarded as a socio-technical concept in which human factors must be considered alongside technical-legal factors. Today, however, there is a particular lack of knowledge about human factors in employee privacy. Disregarding the needs and concerns of individuals or lack of usability, though, are common reasons for the failure of privacy and security measures in practice. This dissertation addresses key knowledge gaps on human factors in employee privacy by presenting the results of a total of three in-depth studies with employees in Germany. The results provide insights into employees' perceptions of the right to privacy, as well as their perceptions and expectations regarding the processing of employee personal data. The insights gained provide a foundation for the human-centered design and implementation of employee-centric privacy controls, i.e., privacy controls that incorporate the views, expectations, and capabilities of employees. Specifically, this dissertation presents the first mental models of employees on the right to informational self-determination, the German equivalent of the right to privacy. The results provide insights into employees' (1) perceptions of categories of data, (2) familiarity and expectations of the right to privacy, and (3) perceptions of data processing, data flow, safeguards, and threat models. In addition, three major types of mental models are presented, each with a different conceptualization of the right to privacy and a different desire for control. Moreover, this dissertation provides multiple insights into employees' perceptions of data sensitivity and willingness to disclose personal data in employment. Specifically, it highlights the uniqueness of the employment context compared to other contexts and breaks down the multi-dimensionality of employees' perceptions of personal data. As a result, the dimensions in which employees perceive data are presented, and differences among employees are highlighted. This is complemented by identifying personal characteristics and attitudes toward employers, as well as toward the right to privacy, that influence these perceptions. Furthermore, this dissertation provides insights into practical aspects for the implementation of personal data management solutions to safeguard employee privacy. Specifically, it presents the results of a user-centered design study with employees who process personal data of other employees as part of their job. Based on the results obtained, a privacy pattern is presented that harmonizes privacy obligations with personal data processing activities. The pattern is useful for designing privacy controls that help these employees handle employee personal data in a privacy-compliant manner, taking into account their skills and knowledge, thus helping to protect employee privacy. The outcome of this dissertation benefits a wide range of stakeholders who are involved in the protection of employee privacy. For example, it highlights the challenges to be considered by employers and software engineers when conceptualizing and designing employee-centric privacy controls. Policymakers and researchers gain a better understanding of employees' perceptions of privacy and obtain fundamental knowledge for future research into theoretical and abstract concepts or practical issues of employee privacy. Employers, IT engineers, and researchers gain insights into ways to empower data processing employees to handle employee personal data in a privacy-compliant manner, enabling employers to improve and promote compliance. Since the basic principles underlying informational self-determination have been incorporated into European privacy legislation, we are confident that our results are also of relevance to stakeholders outside Germany.
Künstliche Intelligenz (KI) ist aus der heutigen Gesellschaft kaum noch wegzudenken. Auch im Sport haben Methoden der KI in den letzten Jahren mehr und mehr Einzug gehalten. Ob und inwieweit dabei allerdings die derzeitigen Potenziale der KI tatsächlich ausgeschöpft werden, ist bislang nicht untersucht worden. Der Nutzen von Methoden der KI im Sport ist unbestritten, jedoch treten bei der Umsetzung in die Praxis gravierende Probleme auf, was den Zugang zu Ressourcen, die Verfügbarkeit von Experten und den Umgang mit den Methoden und Daten betrifft. Die Ursache für die, verglichen mit anderen Anwendungsgebieten, langsame An- bzw. Übernahme von Methoden der KI in den Spitzensport ist nach Hypothese des Autorenteams auf mehrere Mismatches zwischen dem Anwendungsfeld und den KI-Methoden zurückzuführen. Diese Mismatches sind methodischer, struktureller und auch kommunikativer Art. In der vorliegenden Expertise werden Vorschläge abgeleitet, die zur Auflösung der Mismatches führen können und zugleich neue Transfer- und Synergiemöglichkeiten aufzeigen. Außerdem wurden drei Use Cases zu Trainingssteuerung, Leistungsdiagnostik und Wettkampfdiagnostik exemplarisch umgesetzt. Dies erfolgte in Form entsprechender Projektbeschreibungen. Dabei zeigt die Ausarbeitung, auf welche Art und Weise Probleme, die heute noch bei der Verbindung zwischen KI und Sport bestehen, möglichst ausgeräumt werden können. Eine empirische Umsetzung des Use Case Trainingssteuerung erfolgte im Radsport, weshalb dieser ausführlicher dargestellt wird.
In robot-assisted therapy for individuals with Autism Spectrum Disorder, the workload of therapists during a therapeutic session is increased if they have to control the robot manually. To allow therapists to focus on the interaction with the person instead, the robot should be more autonomous, namely it should be able to interpret the person's state and continuously adapt its actions according to their behaviour. In this paper, we develop a personalised robot behaviour model that can be used in the robot decision-making process during an activity; this behaviour model is trained with the help of a user model that has been learned from real interaction data. We use Q-learning for this task, such that the results demonstrate that the policy requires about 10,000 iterations to converge. We thus investigate policy transfer for improving the convergence speed; we show that this is a feasible solution, but an inappropriate initial policy can lead to a suboptimal final return.
Short summary
Accompanying dataset for our paper
A. Mitrevski, P. G. Plöger, and G. Lakemeyer, "Robot Action Diagnosis and Experience Correction by Falsifying Parameterised Execution Models," in Proceedings of the IEEE International Conference on Robotics and Automation (ICRA), 2021.
Contents
The dataset includes a single zip archive, containing data from the experiment described in the paper (conducted with a Toyota HSR). The zip archive contains three subdirectories:
handle_grasping_failure_database: A dump of a MongoDB database containing data from the handle grasping experiment, including ground-truth grasping failure annotations
pre_arm_motion_images: Images collected from the robot's hand camera before moving the robot's hand towards the handle
pregrasp_images: Images collected from the robot's hand camera just before closing the gripper for grasping
The image names include the time stamp at which the images were taken; this allows matching each image with the execution data in the database.
Database usage
After unzipping the archive, the database can be restored with the command
mongorestore handle_grasping_failure_database
This will create a MongoDB database with the name drawer_handle_grasping_failures.
Code for processing the data and failure analysis can be found in our <a href="https://github.com/alex-mitrevski/explainable-robot-execution-models">GitHub repository.
The dataset contains the following data from successful and failed executions of the Toyota HSR robot placing a book on a shelf.
RGB images from the robot's head camera
Depth images from the robot's head camera
Rendered images of the robot's 3D model from the point of view of the robot's head camera
Force-torque readings from a wrist-mounted force-torque sensor
Joint efforts, velocities and positions
extrinsic and intrinsic camera calibration parameters
frame-level anomaly annotations
The anomalies that occur during execution include:
the manipulated book falling down
books on the shelf being disturbed significantly
camera occlusions
robot being disturbed by an external collision
The dataset is split into a train, validation and test set with the following number of trials:
Train: 48 successful trials
Validation: 6 successful trials
Test: 60 anomalous trials and 7 successful trials
Contents
There are two zip archives included (grasping.zip and throwing.zip), corresponding to two experiments (grasping objects and throwing them in a drawer), both performed with a Toyota HSR. Each archive contains two directories - learning and generalisation - with object-specific learning and generalisation data. For each object, we provide a dump of a MongoDB database, which contains data sufficient for learning the models used in our experiments.
Usage
After unzipping the archives, each database can be restored with the command
mongorestore [data_directory_name]
This will create a MongoDB database with the name of the directory. Code for processing the data and model learning can be found in our <a href="https://github.com/alex-mitrevski/explainable-robot-execution-models">GitHub repository.
Short summary
This dataset accompanies our paper
A. Mitrevski, P. G. Plöger, and G. Lakemeyer, "Representation and Experience-Based Learning of Explainable Models for Robot Action Execution," in Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2020.
Contents
There are three zip archives included, each of them a dump of a MongoDB database corresponding to one of the three experiments in the paper:
Grasping a drawer handle (handle_drawer_logs.zip)
Grasping a fridge handle (handle_fridge_logs.zip)
Pulling an object (pull_logs.zip)
All three experiments were performed with a Toyota HSR. Only the data necessary for learning the models used in our experiments are included here.
Usage
After unzipping the archives, each database can be restored with the command
mongorestore [directory_name]
This will create a MongoDB database with the name of the directory (handle_drawer_logs, handle_fridge_logs, and pull_logs).
Code for processing the data and model learning can be found in our <a href="https://github.com/alex-mitrevski/explainable-robot-execution-models">GitHub repository.
Modern Monte-Carlo-based rendering systems still suffer from the computational complexity involved in the generation of noise-free images, making it challenging to synthesize interactive previews. We present a framework suited for rendering such previews of static scenes using a caching technique that builds upon a linkless octree. Our approach allows for memory-efficient storage and constant-time lookup to cache diffuse illumination at multiple hitpoints along the traced paths. Non-diffuse surfaces are dealt with in a hybrid way in order to reconstruct view-dependent illumination while maintaining interactive frame rates. By evaluating the visual fidelity against ground truth sequences and by benchmarking, we show that our approach compares well to low-noise path traced results, but with a greatly reduced computational complexity allowing for interactive frame rates. This way, our caching technique provides a useful tool for global illumination previews and multi-view rendering.
Graph databases employ graph structures such as nodes, attributes and edges to model and store relationships among data. To access this data, graph query languages (GQL) such as Cypher are typically used, which might be difficult to master for end-users. In the context of relational databases, sequence to SQL models, which translate natural language questions to SQL queries, have been proposed. While these Neural Machine Translation (NMT) models increase the accessibility of relational databases, NMT models for graph databases are not yet available mainly due to the lack of suitable parallel training data. In this short paper we sketch an architecture which enables the generation of synthetic training data for the graph query language Cypher.
Kollaborative Industrieroboter werden für produzierende Unternehmen immer kosteneffizienter. Während diese Systeme für den menschlichen Mitarbeiter eine große Hilfe sein können, stellen sie gleichzeitig ein ernstes Gesundheitsrisiko dar, wenn die zwingend notwendigen Sicherheitsmaßnahmen nur unzureichend umgesetzt werden. Herkömmliche Sicherheitseinrichtungen wie Zäune oder Lichtvorhänge bieten einen guten Schutz, aber solch statische Schutzvorrichtungen sind in neuen, hochdynamischen Arbeitsszenarien problematisch.
Im Forschungsprojekt BeyondSPAI wurde ein Funktionsmuster eines Multisensorsystems zur Absicherung solcher dynamischer Arbeitsszenarien entworfen, implementiert und im Feld getestet. Kern des Systems ist eine robuste optische Materialklassifikation, die mit Hilfe eines intelligenten InGaAs-Kamerasystems Haut von anderen typischen Werkstückoberflächen (z.B. Holz, Metalle od. Kunststoffe) unterscheiden kann. Diese einzigartige Eigenschaft wird genutzt, um menschliche Mitarbeiter zuverlässig zu erkennen, so dass ein konventioneller Roboter in Folge als personenbewusster Cobot arbeiten kann.
Das System ist modular und kann leicht mit weiteren Sensoren verschiedenster Art erweitert werden. Es kann an verschiedene Marken von Industrierobotern angepasst werden und lässt sich schnell an bestehenden Robotersystemen integrieren. Die vier vom System bereitgestellten Sicherheitsausgänge können dazu verwendet werden - abhängig von der durchdrungenen Überwachungszone - entweder eine Warnung auszugeben, die Bewegung des Roboters auf eine sichere Geschwindigkeit zu verlangsamen, oder den Roboter sicher anzuhalten. Sobald alle Zonen wieder als „eindeutig frei von Personen“ identifiziert sind, kann der Roboter wieder beschleunigen, seine ursprüngliche Bewegung wiederaufnehmen und die Arbeit fortsetzen.