Refine
Department, Institute
- Fachbereich Informatik (908) (remove)
Document Type
- Conference Object (511)
- Article (193)
- Report (70)
- Part of a Book (42)
- Book (28)
- Preprint (25)
- Conference Proceedings (15)
- Doctoral Thesis (9)
- Master's Thesis (6)
- Research Dataset (3)
Year of publication
Language
- English (763)
- German (140)
- Multiple languages (4)
- No linguistic content (1)
Is part of the Bibliography
- yes (908) (remove)
Keywords
- Virtual Reality (9)
- Robotics (7)
- Lehrbuch (6)
- Navigation (6)
- Robotik (6)
- Virtual reality (6)
- 3D user interface (5)
- computer vision (5)
- robotics (5)
- virtual reality (5)
- ARRs (4)
- Augmented reality (4)
- Benchmarking (4)
- CUDA (4)
- Image Processing (4)
- Open source software (4)
- Quality Diversity (4)
- Robot sensing systems (4)
- Sicherheitslücke (4)
- Software (4)
- SpMV (4)
- Usable Security (4)
- Virtuelle Realität (4)
- Visualization (4)
- 802.11 (3)
- Aerodynamics (3)
- Algorithms (3)
- Bond graph modelling (3)
- Computer Graphics (3)
- Cooperative Awareness Message (3)
- Cutting sticks-Problem (3)
- Datenanalyse (3)
- Datenschutz (3)
- Datensicherheit (3)
- FDI (3)
- FPGA (3)
- Force field (3)
- IP protection (3)
- Intelligent Transport System (3)
- Internet (3)
- MAP-Elites (3)
- Measurement (3)
- Object recognition (3)
- OpenFlow (3)
- Perception (3)
- Privacy (3)
- Pseudonym Concept (3)
- Quality diversity (3)
- Ray Tracing (3)
- Robustness (3)
- Surrogate Modeling (3)
- Taxonomy (3)
- Teilsummenaufteilung (3)
- Theoretische Informatik (3)
- UAV (3)
- Vehicular Ad hoc Networks (3)
- WiLD (3)
- foveated rendering (3)
- machine learning (3)
- motion estimation (3)
- parallel breadth-first search (3)
- path planning (3)
- post-buckling (3)
- power electronic systems (3)
- security (3)
- serious games (3)
- simulation (3)
- virtual environments (3)
- 3D user interfaces (2)
- 3D-Scanner (2)
- AAL-Technik (2)
- ARIMA (2)
- Active Learning (2)
- Adaptive Case Management (2)
- Algebra (2)
- Algorithmus (2)
- Autoencoder (2)
- Automatic Short Answer Grading (2)
- B2T (2)
- BCL2 (2)
- BFS (2)
- BPMS (2)
- Bayesian optimization (2)
- Black-Box Optimization (2)
- Blocking (2)
- Bond graphs (2)
- Business-to-Thing (2)
- CMMN (2)
- Cognition (2)
- Computer science (2)
- Computersicherheit (2)
- Curriculum (2)
- Cutting sticks problem (2)
- DPA (2)
- Deep Learning (2)
- Demenz (2)
- Digitisation (2)
- Disco (2)
- Distributed rendering (2)
- Domestic Robots (2)
- Drosophila (2)
- Dynamic Case Management (2)
- EEG (2)
- ERP (2)
- Educational institutions (2)
- Embedded software (2)
- Emotion (2)
- Empirical study (2)
- Encryption (2)
- Engineering (2)
- Enterprise-Resource-Planning (2)
- Evolutionary Computation (2)
- Evolutionary computation (2)
- Eye Tracking (2)
- Fas (2)
- Fault analysis (2)
- Fault detection and isolation (2)
- Fuzzy logic (2)
- GPU (2)
- Garbage collection (2)
- Graphentheorie (2)
- Grasping (2)
- Heart Rate Prediction (2)
- Human-Centered Robotics (2)
- Human-Robot Interaction (2)
- Hybrid systems (2)
- Hyper-parameter Tuning (2)
- Hyperspectral image (2)
- IEEE 802.11 (2)
- IEEE802.11 (2)
- Incremental bond graph (2)
- Indirect Encodings (2)
- Informationssicherheit (2)
- Intel Xeon Phi (2)
- Intelligent virtual agents (2)
- Interaction Patterns (2)
- Interaktion (2)
- Internet of Things (2)
- Java virtual machine (2)
- Knowledge Worker (2)
- LOTUS Sensor Node (2)
- Large, high-resolution displays (2)
- Learning and Adaptive Systems (2)
- Long-Distance WiFi (2)
- MESD (2)
- Machine Learning (2)
- Mengenpartitionsproblem (2)
- Mensch-Maschine-Kommunikation (2)
- Mobile robots (2)
- Modelica (2)
- NUMA (2)
- Naive physics (2)
- Neuroevolution (2)
- Nvidia graphic processors (2)
- Object Detection (2)
- Open Source (2)
- Perceptual Upright (2)
- Performance (2)
- ProM (2)
- Process Mining (2)
- RE (2)
- RGB-D (2)
- Raman microscopy (2)
- Rapid Prototyping (2)
- RapidMiner (2)
- Ray tracing (2)
- Rendering (2)
- Risk-based Authentication (RBA) (2)
- SDN (2)
- SEMA (2)
- Scale Tuning (2)
- Service-Roboter (2)
- Set partition problem (2)
- Side Channel Analysis (2)
- Side-channel analysis (2)
- Simulation (2)
- Single Instruction Multiple Data (SIMD) (2)
- Smart Card (2)
- Software-Werkzeug (2)
- Sparse Matrix Vector Multiplication (2)
- Sparse Matrix Vector multiply (SpMV) (2)
- Studienverlauf (2)
- Support Vector Machine (2)
- Three-dimensional displays (2)
- TinyECC 2.0 (2)
- Unity (2)
- Unternehmen (2)
- Usability (2)
- User Interface Design (2)
- VR (2)
- Vehicle-to-Vehicle Communication (2)
- Verkehrssimulation (2)
- Watermarking (2)
- WiFi (2)
- Wireless Sensor Network (2)
- Wireless backhaul (2)
- adaptive fault thresholds (2)
- aerodynamics (2)
- automated sensor-screening (2)
- bond graph modelling (2)
- clustering (2)
- confidence level (2)
- data filtering (2)
- data locality (2)
- diagnostic bond graphs (2)
- diversity (2)
- domestic robots (2)
- dynamic vector fields (2)
- edutainment (2)
- embedded systems (2)
- estimation (2)
- external faults (2)
- eye-tracking (2)
- fault detection (2)
- flight zone (2)
- geofence (2)
- haptics (2)
- human factors (2)
- hypermedia (2)
- ideal switches (2)
- image fusion (2)
- incremental bond graphs (2)
- industrial robots (2)
- interaction (2)
- interface design (2)
- intrinsics (2)
- machine vision (2)
- memory bandwidth (2)
- navigation (2)
- neural network (2)
- nonlinear stability (2)
- object detection (2)
- pansharpening (2)
- peripheral vision (2)
- physical activity (2)
- redundant work (2)
- residual sinks (2)
- robot competitions (2)
- robot dynamics (2)
- semiconducting metal oxide gas sensor array (2)
- service robots (2)
- short-term load forecasting (2)
- speech understanding (2)
- surrogate modeling (2)
- user study (2)
- vection (2)
- virtuelle Umgebungen (2)
- 0-1-Integer-Problem (1)
- 2D Level Design (1)
- 3D User Interface (1)
- 3D Visualisierung (1)
- 3D design (1)
- 3D gaming (1)
- 3D interfaces (1)
- 3D nucleus (1)
- 3D real-time echocardiography (1)
- 3D registration (1)
- 3D shape (1)
- ABT-737 (1)
- ACPYPE (1)
- AES (1)
- ALPS (1)
- AMBER (1)
- AMD Family 15h (1)
- AR (1)
- ARM Cortex M3 Processor (1)
- Absolute nodal coordinate formulation (1)
- Acceptance (1)
- Accuracy (1)
- Active locomotion (1)
- Active vision interface (1)
- Actuators (1)
- Acute lymphoblastic leukemia (1)
- AdaBoost (1)
- Adaptation of Software (1)
- Adaptive Behavior (1)
- Adaptive Control (1)
- Advanced Driver Assistance Systems (1)
- Affordances (1)
- Agents (1)
- Algorithm design and analysis (1)
- Algorithmen (1)
- Algorithmische Informationstheorie (1)
- Alkane (1)
- Allgegenwärtige Spiele (1)
- Altengerechte Technik (1)
- Altenhilfe (1)
- Altenpflege (1)
- Alternatives (1)
- Analyse (1)
- Analysis of Bond Graph Models (1)
- Anschlussteil (1)
- Antifuse memory (1)
- Apprenticeship Learning (1)
- Architectural Patterns (1)
- Art (1)
- Artificial Intelligence and Natural Language Processing (1)
- Assekuranz (1)
- Assistenzsystem (1)
- Aufrecht (1)
- Augmented Reality (1)
- Ausbreitung (1)
- Authentication (1)
- Authentication features (1)
- Authorship watermark (1)
- Autoimmune disease (1)
- Automated Modelling (1)
- Automated design (1)
- Automation (1)
- Automatisierte Prozesse Rekonstruktio (1)
- Autonomy (1)
- Autotuning (1)
- Available Bandwidth (1)
- B-cell leukemia (1)
- B-cell lymphoma (1)
- BERT (1)
- BG-Klinik (1)
- BH3-mimetic inhibitor (1)
- BLOB Detection (1)
- Background music (1)
- Bag of Features (1)
- Ball Tracking (1)
- Ball tracking (1)
- Bandwidth Estimation (1)
- Basis set (1)
- Bayesian Deep Learning (1)
- Bayesian Network (1)
- Bayessches Netz (1)
- Begriffsbestimmung (1)
- Behörde (1)
- Benchmark (1)
- Berechenbarkeit (1)
- Berufskrankheiten (1)
- Best practice algorithms (1)
- Bewertung (1)
- Bicycle Simulator (1)
- Big Data Analysis (1)
- Bilddatenbank (1)
- Bildverarbeitung (1)
- Blasendiagramm (1)
- Blob Detection (1)
- Block cipher (1)
- Blockchain (1)
- Bond Graph Modelling (1)
- Bond Graph modelling and simulation (1)
- Bond Graph models for fault detection and isolation (1)
- Bond graph (1)
- Bondgraph (1)
- Boolean circuits (1)
- Boolesche Algebra (1)
- Bounding Box (1)
- Bubble-Chart (1)
- Bundesrepublik Deutschland (1)
- Bundesverfassungsgericht (1)
- Business (1)
- Business Case (1)
- Business Process Intelligence (1)
- Business software (1)
- Business system (1)
- CAD flow (1)
- CAS (1)
- CIBERSORT (1)
- CPA (1)
- CPU (1)
- CPUID instruction (1)
- CREBBP (1)
- CSR5BC (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Calibration (1)
- Canonical form of state equations and standard interconnection form for robustness study (1)
- Capability framework (1)
- Capacity (1)
- Carbohydrate (1)
- Case Management Model and Notation (1)
- Case-Based Reasoning (1)
- Cell/B.E. (1)
- Center-of-Mass (1)
- Centrifugation (1)
- Centrifuge (1)
- Chaitin-Konstante (1)
- Chalcogenide glass sensor (1)
- Challenges (1)
- Change-Prozess (1)
- Channel assignment (1)
- Chemical imaging (1)
- Chip ID (1)
- Circular saws (1)
- Cleaning Task (1)
- Cloud Computing (1)
- Clusteranalyse (1)
- Clusters (1)
- Co-located Collaboration (1)
- Co-located work (1)
- Co-rotational formulation (1)
- Code Generation (1)
- Code similarity analysis (1)
- Codierung (1)
- Cognitive informatics (1)
- Cognitive robot control (1)
- Collaborating industrial robots (1)
- Collaboration/Cooperation (1)
- Coloured pointclouds (1)
- Common Criteria (1)
- Company (1)
- Comparative Analysis (1)
- Comparative analysis (1)
- Complex Event Processing (1)
- Compliant Manipulation (1)
- Component Models (1)
- Composition of Patterns (1)
- Compositional Pattern Producing Networks (1)
- Computational Fluid Dynamics (1)
- Computational causality (1)
- Computational fluid dynamics (1)
- Computer (1)
- Computer Automated Design (1)
- Computer Vision (1)
- Computer Vision System (1)
- Computer architecture (1)
- Computer graphics (1)
- Computer-supported Cooperative Work (1)
- Computergrafik (1)
- Computerkriminalitaet (1)
- Computerprogramm (1)
- Computersimulation (1)
- Concurrent Kleene Algebra (1)
- Congenital heart disease (1)
- Connectivity in rural areas (1)
- Containerization (1)
- Content Analysis (1)
- Contextualized Attention Metadata (CAM) (1)
- Control (1)
- Convexity (1)
- Cooperative Intelligent Transport Systems (ITS) (1)
- Counterfeit protection (1)
- Coupled process (1)
- Covert channel (1)
- Created Gravity (1)
- Critical power (1)
- Cross-core (1)
- Cross-sensitivity (1)
- Cryptography (1)
- Customization (1)
- CyberGlove (1)
- Cybersickness (1)
- DAE systems (1)
- DCF (1)
- DFA Lab (1)
- DHF-Reduktase (1)
- DNSSEC (1)
- DOI (1)
- DPA Lab (1)
- Data Publication (1)
- DataCite (1)
- Database Management Systems (1)
- Databases and Data Mining (1)
- Datalog (1)
- Datenbasierte Prozessanalyse (1)
- Decision Diagram (1)
- Decision Network (1)
- Decision Support (1)
- Declarative Process Modeling (1)
- Deklarative Prozessmodellierung (1)
- Delph Study (1)
- Design Optimization (1)
- Design automation (1)
- Deskriptive Datenanalyse (1)
- Diagnostic bond graphs (1)
- Dienstgütevereinbarung (1)
- Differential analysis (1)
- Digital Object Identifier (1)
- Digital common goods (1)
- Digital watermarking (1)
- Dimensionsreduktion (1)
- Directed Acyclic Graph (1)
- Directional Antenna (1)
- Directional antennas (1)
- Discrete cosine transform (1)
- Displacement (1)
- Distributed Robot Systems (1)
- Docker (1)
- Domain-Specific Language (1)
- Domain-Specific Modeling Languages, (1)
- Domestic robotics (1)
- Domestic robots (1)
- Domestic service robots (1)
- Drahtloses lokales Netz (1)
- Drug resistance (1)
- Dynamic motion primitives (1)
- E-Government (1)
- ELMo (1)
- EM leakage (1)
- ERP system (1)
- ERP-software (1)
- ERP-system (1)
- ETV6-RUNX1 (1)
- Echtzeit (1)
- Ecosystem simulation (1)
- Educational Data Mining (1)
- Educational Process Mining (1)
- Educational Science (1)
- Edutainment (1)
- Ego-Motion Estimation (1)
- Eigenfunktion (1)
- Einflussdiagramm (1)
- Einführung (1)
- Eingebettetes System (1)
- Elderly People (1)
- Electric mobility (1)
- Electromagnetic Fields (1)
- Electronic commerce (1)
- Electronic tongue (1)
- Elementare Zahlentheorie (1)
- Elliptic Curve Cryptography (1)
- Embedded system (1)
- Empfehlung (1)
- Empirical Study (1)
- Empirical formula (1)
- EnOcean (1)
- Enterprise Resource Planning Software (1)
- Enterprise Resource Planning System (1)
- Enterprise software (1)
- Enterprise system (1)
- Entscheidungsunterstützung (1)
- Environmental Data (1)
- Error-correcting output codes (1)
- Erweiterte Realität (1)
- Escape analysis (1)
- Euronorm (1)
- Evaluation (1)
- Evaluation als Kommunikationsanlass (1)
- Event detection (1)
- Everyday object manipulation (1)
- Evolutionary algorithms (1)
- Evolutionary optimization (1)
- Ewing´s Sarcoma Family of Tumors (1)
- Exchange and reuse of bond graph models (1)
- Executive functions (1)
- Exercise (1)
- Exergame (1)
- Experiment design (1)
- Expert system (1)
- Explainable robotics (1)
- External faults (1)
- FGR (1)
- FIVIS (1)
- FPGA architecture exploration (1)
- FPGA implementation (1)
- FS20 (1)
- Face and hand gesture recognition (1)
- Face normalization (1)
- Facial Emotion Recognition (1)
- Facial expression recognition (1)
- Factory instrumentation (1)
- Fahrradfahrsimulator (1)
- Fahrsimulator (1)
- Failure Prognosis (1)
- Fallbeschreibung (1)
- Fault Channel Watermarking Lab (1)
- Fault Diagnosis (1)
- Fault accommodation (1)
- Fault diagnosis (1)
- Fault handling (1)
- Fault simulation (1)
- Fault-channel watermarks (1)
- Feature Model (1)
- Fehlertoleranz (1)
- Female (1)
- Field Study (1)
- Field sequential imaging (1)
- Filtering (1)
- Fingerprint watermark (1)
- Finite element modelling (1)
- First-order frequency domain sensitivities (1)
- Five Factor Model (1)
- Fixed spatial data (1)
- Flexible multibody system (1)
- Flexible robots (1)
- Flussnetz (1)
- Flying (1)
- Focus plus context (1)
- Force (1)
- Force and tactile sensing (1)
- Foreground segmentation (1)
- Formal definition and validation of the content of a model description (1)
- Forms of mathematical models (1)
- Forschungsschwerpunkte (1)
- Free-Space Loss (FSL) (1)
- Frequency planning (1)
- Friction (1)
- Functional safety (1)
- Funktionsprinzip (1)
- Fusion (1)
- Future (1)
- Future Studies (1)
- Future of Robotics (1)
- Fuzzy Miner (1)
- Fuzzy Mining (1)
- Fuzzy-Logik (1)
- Fuzzy-System (1)
- GDDL (1)
- GPGPU (1)
- GPT (1)
- GPT-2 (1)
- Gabor features (1)
- Gabor filters (1)
- Game Engine (1)
- Games (1)
- Gaussian processes (1)
- Gaze Behavior (1)
- Gaze Depth Estimation (1)
- Gaze-contingent depth-of-field (1)
- Gefahrenprävention (1)
- Gefühl (1)
- Gender Issues in Computer Science Education (1)
- Generation R (1)
- Genetic Predisposition to Disease (1)
- Genetic algorithm (1)
- Genomics (1)
- Genomics/methods (1)
- Geo-tagging (1)
- Gesamt-Exom-Sequenzierung (1)
- Geschäftsprozess (1)
- Gesundheitswesen (1)
- Global Illumination (1)
- Glycam06 (1)
- Gnu Linear Programming Kit (1)
- Goal Programming (1)
- Gradient-boosting (1)
- Grailog (1)
- Graphical user interfaces (1)
- Graphics Cards (1)
- Graphik (1)
- Graphikkarte (1)
- Grasp Domain Definition Language (1)
- Grasp Planner (1)
- Gromacs (1)
- Grounded Method (1)
- Group Behavior (1)
- Group behavior (1)
- Group behavior analysis (1)
- Groupware (1)
- HCI (1)
- HCSS (1)
- HDAC inhibitor (1)
- HIF1α (1)
- HPC (1)
- Hacker-Angriff (1)
- Hacking-Technik (1)
- Hand Guidance (1)
- Hand Tracking (1)
- Hand injuries (1)
- Handlungsempfehlung (1)
- Handzeichenerkennung (1)
- Hardware (1)
- Hardware design languages (1)
- Hauptkomponentenanalyse (1)
- Haushaltswesen (1)
- Head Mounted Display (1)
- Head-Mounted Displays (1)
- Head-mounted Display (1)
- Healthcare logistics (1)
- Heat shrink tubing (1)
- High hyperdiploidy (1)
- High-performance computing (1)
- High-resolution displays (1)
- Histograms (1)
- HomeMatic (1)
- Hough Forests (1)
- Human Factors (1)
- Human computer interaction (1)
- Human factors (1)
- Human robot interaction (1)
- Human-Computer-Interaction (HCI) (1)
- Humanoider Roboter (1)
- Humans (1)
- Hybrid Failure Prognosis (1)
- Hybrid Systems (1)
- Hybrid models (1)
- Hybrid models of engineering systems (1)
- Hydraulic orifices (1)
- Hydrocarbon (1)
- HyperNEAT (1)
- IC identification (1)
- ICF (1)
- ICP (1)
- IEEE 802.21 (1)
- ISO 27000 (1)
- ISO9999 (1)
- IT professionals (1)
- IT-Sicherheitsanforderungen (1)
- IT-Verfügbarkeit (1)
- Ikaros (1)
- Illumination algorithms (1)
- Image Classification (1)
- Image-based rendering (1)
- Immersion (1)
- Immersive Virtual Environments (1)
- Immersive Visualization Environment (1)
- Immersive analytics (1)
- Incremental true bond graphs (1)
- Inductive Visual Miner (1)
- Inductive Visual Mining (1)
- Industrial robots (1)
- Industry 4.0 (1)
- Influence Diagram (1)
- Information Types (1)
- Information hiding (1)
- Information interaction (1)
- Informationskomplexität (1)
- Informationstechnik (1)
- Innovation (1)
- Input reconstruction (1)
- Instance-based learning (1)
- Instantaneous assignment (1)
- Instantiation (1)
- Institut für Arbeit und Gesundheit (1)
- Institut für Arbeitsschutz (1)
- Institut für Prävention und Arbeitsmedizin (1)
- Instruction scheduling (1)
- Integral backstepping technique (1)
- Integrated circuit interconnections (1)
- Intel processors (1)
- Intelligent Autonomous Systems (1)
- Interaction (1)
- Interaction devices (1)
- Interactive Object Detection (1)
- Interactive Smart Card Applications (1)
- Interference (1)
- Interferenz (1)
- Interoperability (1)
- Inventory (1)
- Inverse simulation (1)
- Issue Tracking Systems (1)
- Issue Types (1)
- Issue tracking systems (1)
- It-Diensteanbieter (1)
- JavaScript (1)
- KNN (1)
- KNX (1)
- Kartographie (1)
- Key recovery (1)
- KiBP (1)
- Knowledge Management (1)
- Knowledge-intensive Business Process (1)
- Knowledge-intensive Process (1)
- Kollaboration/Kooperation (1)
- Kolmogorov-Komplexität (1)
- Kombinatorische Optimierung (1)
- Komplexitätsklassen (1)
- Kompression und Zufälligkeit von Zeichenketten (1)
- Kopie digitaler Daten (1)
- Kryptologie (1)
- Künstliche Gravitation (1)
- LAA (1)
- LBP (1)
- LDP (1)
- LGCSR (1)
- LP-Heuristik (1)
- LTE-U (1)
- Lagerlogistik (1)
- Laminar and turbulent flow (1)
- Language Engineering (1)
- Langzeitbehandlung (1)
- Large display interaction (1)
- Lattice Boltzmann Method (1)
- Laufzeit-Komplexität (1)
- Laws of programming (1)
- Lead userness (1)
- Leakage circuits (1)
- Learning analytics (1)
- Learning data mining (1)
- Learning from demonstration (1)
- Learning systems (1)
- Leistungsdaten (1)
- Level-of-Detail (1)
- Library model (1)
- Light curtain (1)
- Lighting simulation (1)
- Linear Optimization (1)
- Linear Programming (1)
- Linear inverse models (1)
- Linear quadratic regulator (1)
- Linear regression (1)
- Lineare Algebra (1)
- Lineare Optimierung (1)
- Lineare Programmierung (1)
- LoRa (1)
- LoRa receiver accuracy (1)
- Long-Term Autonomy (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Lymphoproliferative disorder (1)
- MAC (1)
- MACE (1)
- METEOR score (1)
- MIMD (1)
- MOOC (1)
- MP2.5 (1)
- MPLS (1)
- Machine learning (1)
- Maker space (1)
- Male (1)
- Malware (1)
- Management (1)
- Manipulation tasks (1)
- Manipulator (1)
- Manipulators (1)
- Mathematische Logik (1)
- Maximal covering location problem (1)
- Maximalflussproblem (1)
- Media in education (1)
- Megatrends (1)
- Memory (1)
- Memory management (1)
- Mengenlehre (1)
- Mengenpartitionierungsproblem (1)
- Mensch-Computer-Interaktion (1)
- Mesh networks (1)
- Meteorological Data (1)
- Methodenanalyse (1)
- Methodologies (1)
- Microarchitectural Data Sampling (MDS) (1)
- Microsoft CRM 2013 (1)
- Middleware and Programming Environments (1)
- Minimaler Schnitt (1)
- Mining Software Repositories (1)
- Mining software repositories (1)
- Mixed-Reality (MR) (1)
- Mobile computing (1)
- Mobile devices (1)
- Mobile manipulation (1)
- Mobile robotics (1)
- Mobiler Roboter (1)
- Modalities (1)
- Mode switching LTI model (1)
- Mode-dependent ARRs (1)
- Model Fitting (1)
- Model-Driven Engineering (1)
- Model-based Approach (1)
- Model-based Fault Diagnosis (1)
- Model-based failure prognosis (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Model-free control (1)
- Modellbildung (1)
- Models of Variable Structure (1)
- Modular software packages (1)
- Molecular modeling (1)
- Molecular rotation (1)
- Molekulare Deskriptoren (1)
- Monitoring (1)
- Morphological box (1)
- Morphological scheme (1)
- Motion (1)
- Motion Capture (1)
- Motion Sickness (1)
- Motion planning (1)
- Multi-Modal Interaction (1)
- Multi-Solution Optimization (1)
- Multi-Tenant Application (1)
- Multi-component heavy metal solution (1)
- Multi-objective (1)
- Multi-objective optimization (1)
- Multi-robot systems (1)
- Multi-stage (1)
- Multibody systems (1)
- Multicast communication (1)
- Multidisciplinary systems (1)
- Multidisciplinary Dynamic Systems (1)
- Multilayer interaction (1)
- Multimodal (1)
- Multimodal hyperspectral data (1)
- Multimodal optimization (1)
- Multisensory cues (1)
- Multithreaded and multicore architecture (1)
- Multiuser (1)
- Multivariate Time Series (1)
- Musical Performance (1)
- N200 (1)
- NEAT (1)
- NETCONF (1)
- NFKB (1)
- NIR (1)
- NIR-point sensor (1)
- NNS (1)
- NP-Vollständigkeit (1)
- NURBS (1)
- NVIDIA Tesla (1)
- Natural Language Processing (1)
- Natural language understanding (1)
- Navigation interface (1)
- Network simulation verification (1)
- Networked Robots (1)
- Noise (1)
- Nonbonded scaling factor (1)
- Nonlinear control quadrotor uav (1)
- Numerical optimization (1)
- Nutzung (1)
- OCU (1)
- OER (1)
- Object detection (1)
- Object-oriented physical systems modelling (1)
- Odin II (1)
- Older adults (1)
- One-vs-One multi-classification (1)
- Online-Überwachung (1)
- Open innovation (1)
- Open source firmware (1)
- Open-ended Robotic Discovery (1)
- Open-source (1)
- OpenACC (1)
- OpenDaylight (1)
- OpenMP (1)
- OpenMP, unrolling (1)
- Operation Research (1)
- Optical Flow (1)
- Optical flow (1)
- Optimierungsproblem (1)
- Optimisation 3D (1)
- Optimization (1)
- Organic compounds and Functional groups (1)
- Out Of Distribution (OOD) data (1)
- Outer Space Research (1)
- Outside-in process (1)
- P300 (1)
- PAIS (1)
- PDE-5A (1)
- PIR sensor units (1)
- Pain Reduction (1)
- Parallel Processing (1)
- Parallelization (1)
- Parameter degradation model (1)
- Parameter sensitivities of the residuals of analytical redundancy relations (1)
- Parameter sensitivities of transfer functions (1)
- Parameter uncertainties (1)
- Password (1)
- Path loss model (1)
- Path-Packing (1)
- Pattern recognition (1)
- Pedigree (1)
- People Detection (1)
- Performance Simulation (1)
- Performance benchmarks (1)
- Performance prediction (1)
- Performance profiling (1)
- Periodic structures (1)
- Personality (1)
- Pervasive Gaming (1)
- Pflegeinformatik (1)
- Pflegepersonal (1)
- Phenotypic niching (1)
- Physical activity (1)
- Physical exercising game platform (1)
- Plagiat (1)
- Plan-based robot control (1)
- Point Clouds (1)
- Pointing (1)
- Pointing devices (1)
- Poisson Disc Distribution (1)
- Polymorphism, Single Nucleotide (1)
- Pose Estimation (1)
- Power Analysis (1)
- Precursor B-Cell Lymphoblastic Leukemia-Lymphoma/genetics (1)
- Prediction of physiological responses to strain (1)
- Predictive Models (1)
- Prescriptive Analytics (1)
- Presence (1)
- Pressure wire (1)
- Pressure-volume relation (1)
- Probabilistic model (1)
- Process Automation (1)
- Produktfindung (1)
- Programmsicherheit (1)
- Proof-of-Stake (1)
- Proof-of-Work (1)
- Propagation (1)
- Protective system (1)
- Prototypes (1)
- Prozessanalyse (1)
- Prozessautomation (1)
- Prozessmanagement (1)
- Prozessoptimierung (1)
- Präskriptive Analytik (1)
- Prävention (1)
- Public Key Infrastructure (1)
- Public Key Infrastructures (1)
- Q measurement (1)
- QoS (1)
- Qualitative reasoning (1)
- Quality of Service (1)
- Qualitätspakt Lehre (1)
- Quantenrechner (1)
- Quantum mechanical methods (1)
- RAS (1)
- RFID (1)
- RGB-D data (1)
- RLE-XOR (1)
- RLE-permutation (1)
- ROPOD (1)
- RSSI (1)
- Radfahren (1)
- Radiofrequency identification (1)
- Raman spectroscopy (1)
- Random number generator (1)
- Rapid prototyping (1)
- Ray Casting (1)
- Re-authentication (1)
- Reader (1)
- Real-Time Image Processing (1)
- Real-time image processing (1)
- Reasoning (1)
- Recht (Gesetz) (1)
- Recht (Gesetzgebung) (1)
- Recommendation (1)
- Reduktionsverfahren (1)
- Reference Architectural Model Automotive (RAMA) (1)
- Refinement (1)
- Rehabilitation (1)
- Relapse (1)
- Relational Learning (1)
- Relative Energies (1)
- Remaining Useful Life (1)
- Render Cache (1)
- Repositories (1)
- Requirements Communication (1)
- Requirements analysis (1)
- Requirements engineering in SMEs (1)
- Restorative Virtual Environments (1)
- Reusable Software (1)
- Reversible Logic Synthesis (1)
- Rfid (Radio-Frequency Identification) (1)
- Risikoanalyse (1)
- Risk-based Authentication (1)
- RoboCup industrial (1)
- Robot Perception (1)
- Robot commands (1)
- Robot competitions (1)
- Robot kinematics (1)
- Robot learning (1)
- Robotersteuerung (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Revolutions (1)
- Robotic Technology (1)
- Robotic faults (1)
- Robots (1)
- Roleplaying Game (RPG) (1)
- Rollenspiel (1)
- Rollenspiele (1)
- Rucksack (1)
- Rucksackproblem (1)
- Rule-based production systems (1)
- RuleML (1)
- Runtime Adaptation (1)
- Rural areas (1)
- S3D Video (1)
- S3D video (1)
- SAHA (1)
- SARS-CoV-2 (1)
- SDWN (1)
- SIMD (1)
- SLIDE algorithm (1)
- SME (1)
- SOA (1)
- STAT3 (1)
- SVG (1)
- Saccades (1)
- Saccadic suppression (1)
- Safety guard (1)
- ScalarMultiplication (1)
- Scene text recognition, active vision, domestic robot, pantilt, auto-zoom, auto-focus, adaptive aperture control (1)
- Scene understanding through Deep Learning (1)
- Schadenanalyse (1)
- Schadensprozess (1)
- Scholarly workbench (1)
- School experiments (1)
- Schutzmaßnahme (1)
- Schutzobjekte (1)
- Scientific workbench (1)
- Second Life (1)
- Security (1)
- Security architecture (1)
- Security level (1)
- Segmentation (1)
- Semantic models (1)
- Semantic scene understanding (1)
- Semantics (1)
- Sense of presence (1)
- Sensitivity matrix in symbolic form (1)
- SensorFusion (1)
- Serious Games (1)
- Service Robot (1)
- Service-Level-Agreement (1)
- Service-Oriented Architecture (1)
- Serviceroboter (1)
- Shadow detection (1)
- Sichere Kommunikation Kritische Infrastrukturen (1)
- Sicherheit (1)
- Sicherheitsanalyse (1)
- Sicherheitsarchitektur (1)
- Sicherheitsniveau (1)
- Side Channel Countermeasures (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side channels (1)
- Side-channel watermarking (1)
- Signal (1)
- Signal detection (1)
- Signal processing (1)
- Similarity matrix (1)
- Single-objective (1)
- Skalierbarkeit (1)
- Skin detection (1)
- Smart Card User Interface Design, Interactive Smart Card Applications (1)
- Smart Home (1)
- Smart InGaAs camera-system (1)
- Smart factory (1)
- Smartphones (1)
- Social Virtual Reality (1)
- Social intelligence (1)
- Sociomateriality (1)
- Software Architectures (1)
- Software Feature Request Detection (1)
- Software Framework (1)
- Software IP protection (1)
- Software and Architecture (1)
- Software libraries (1)
- Software reverse engineering (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Fehler (1)
- Software-Lebenszyklus (1)
- Software-Sicherheit (1)
- Software-Test (1)
- Software-Testautomatisierung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Somatogravic Illusion (1)
- Space exploration (1)
- Sparse matrix format (1)
- Spatio-Temporal (1)
- Spectral Analysis (1)
- Spectral Clustering (1)
- Spectrum occupancy (1)
- Spectrum optimization (1)
- Speech Act Theory (1)
- Spherical Treadmill (1)
- Spherical treadmill (1)
- Stabilitätsanalyse (1)
- Standards (1)
- State machines (1)
- Stereoscopic Rendering (1)
- Stereoscopic rendering (1)
- Stream cipher (1)
- Stress Management (1)
- Studenten (1)
- Supervised classification (1)
- Supply chains (1)
- Support Vector Machines (1)
- Surrogate Modelling (1)
- Surrogate models (1)
- Swim Stroke Analysis (1)
- Switched power electronic systems (1)
- Symmetry detector (1)
- Synthetic perception (1)
- System health monitoring (1)
- SystemVerilog (1)
- TEL-AML1 (1)
- TP53 (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Tag (1)
- Task Frame Formalism (1)
- Task allocation (1)
- Taxonomie (1)
- Teaching Quality Pact (1)
- Technologie (1)
- Telecommunication network reliability (1)
- Telecommunication network routing (1)
- Teleconferencing system (1)
- Telematik (1)
- Telematik-Software (1)
- Template Attacks (1)
- Temporal constraints (1)
- Terrain rendering (1)
- Testing (1)
- Text detection (1)
- Text recognition (1)
- Textureless objects (1)
- Therapy (1)
- Throughput (1)
- Tiled displays (1)
- Tiled-display walls (1)
- Time extended assignment (1)
- Time measurement (1)
- Timing analysis (1)
- Timing channel (1)
- ToF Camera (1)
- Token (1)
- Touchscreen interaction (1)
- Toyota HSR (1)
- Trace algebra (1)
- Traceability (1)
- Tracking (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Transfer Learning (1)
- Transformations between various description formats (1)
- Transforms (1)
- Translocation (1)
- Transparency (1)
- Transponder (1)
- Travel Techniques (1)
- Treatment of discontinuities and singularities in ordinary differential equations (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV teleoperation (1)
- UGV (1)
- UI design (1)
- USAR (1)
- Ultrasonic array (1)
- Umgebung (Umwelt) (1)
- Uncertainty (1)
- Uncertainty Estimation (1)
- Uncertainty Quantification (1)
- Unifying theories (1)
- Unknown parameter degradation (1)
- Unterstützung (1)
- Usable Privacy (1)
- User Roles (1)
- User Study (1)
- User engagement (1)
- User interface (1)
- User interfaces (1)
- User-Centered Approach (1)
- User-Computer Interface (1)
- VHDL (1)
- VR system design (1)
- VR-based systems (1)
- Vacuum Cleaner (1)
- Variability Management (1)
- Variability Resolution (1)
- Vector Intrinsics (1)
- Vector Units (1)
- Vehicle-2-Infrastructure Kommunikation (1)
- Vehicle-2-Vehicle Communication (1)
- Vehicle-2-Vehicle Kommunikation (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicle-to-Vehicle Com- munication (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Verbindungsteil (1)
- Verfassungsbeschwerde (1)
- Verifizierung (1)
- Verilog (1)
- Verilog source code (1)
- Verkehrserziehung (1)
- Verkehrsnetz (1)
- Verkehrsnetzwerke (1)
- Verschlüsselung (1)
- Versicherung (1)
- Vertrag (1)
- Vertragsbeendigung (1)
- Vertragspartner (1)
- Vertriebssysteme (1)
- Vibrational microspectroscopy (1)
- Video surveillance (1)
- Virtual Environment (1)
- Virtual Environments (1)
- Virtual Memory Palace (1)
- Virtual attention (1)
- Virtual environments (1)
- Visual perception (1)
- Visuelle Wahrnehmung (1)
- Volumenrendering (1)
- V˙CO2 prediction (1)
- V˙O2 prediction (1)
- WDS (1)
- WWW (1)
- Wahrnehmung (1)
- Wang-tiles (1)
- Warencode (1)
- Web components (1)
- Weltraumforschung (1)
- WfMS (1)
- Whole body motion (1)
- Wi-Fi (1)
- WiAFirm (1)
- WiFi-based Long Distance (WiLD) (1)
- WiFi-based Long Distance networks (1)
- Wireless Backhaul Network (1)
- Wissensarbeit (1)
- Wissensarbeiter (1)
- Wissensintensive Geschäftsprozesse (1)
- Wissensintensiver Geschäftsprozess (1)
- Workflow (1)
- Workflow Management (1)
- XML (1)
- XML schema for bond graph models (1)
- XNA Game Studio (1)
- XSLT (1)
- Xeon Phi knights landing (1)
- YANG (1)
- YAWL (1)
- Young adults (1)
- ZWave (1)
- Zeichenerkennung (1)
- Zentrifuge (1)
- Zielprogrammierung (1)
- ZigBee (1)
- ZombieLoad (1)
- accelerometer (1)
- activation function (1)
- acute (1)
- adaptive agents (1)
- adaptive filters (1)
- affective computing (1)
- allopurinol (1)
- ambulatory monitoring (1)
- analytical redundancy relation residuals (1)
- analytical redundancy relations (1)
- anomaly detection (1)
- antibody deficiency (1)
- apoptosis (1)
- artifacts (1)
- asset transfer (1)
- assistive robots (1)
- atomic instructions (1)
- atomic operation (1)
- audio-tactile feedback (1)
- augmented, and virtual realities (1)
- autoimmune lymphoproliferative syndrome (1)
- autoinflammatory disease (1)
- automated 3D scanning (1)
- automation (1)
- automatisierte Netzwerkgenerierung (1)
- autonomous driving (1)
- averaged bond graph models (1)
- back-of-device interaction (1)
- background motion (1)
- bagging (1)
- bass-shaker (1)
- benchmarking (1)
- bicausal diagnostic Bond Graphs (1)
- bicycle (1)
- binary classification (1)
- biorder (1)
- bloat (1)
- blockchain (1)
- body-centric cues (1)
- bond graphs (1)
- bond-graph-based physical systems modelling (1)
- bootstrapping (1)
- brain computer interfaces (1)
- brightfield microscopy (1)
- building automation (1)
- caching (1)
- camera (1)
- camera-based person detection (1)
- cancer (1)
- change process (1)
- chemical sensors (1)
- childhood (1)
- childhood cancer syndrome (1)
- chloroquine (1)
- classifier combination (1)
- client-side component model (1)
- closed kinematic chain (1)
- co-located collaboration (1)
- cognitive radio (1)
- collaboration (1)
- collaborative learning (1)
- colorimetry (1)
- commuting (1)
- compensation (1)
- complete basis set limit (1)
- computational causalities (1)
- computational logic (1)
- computer games (1)
- computer-supported collaborative work (1)
- concrete plate (1)
- conformations (1)
- constitutional mismatch repair syndrome (1)
- constraint relaxation (1)
- constructive process deviance (1)
- control (1)
- control architectures (1)
- convex optimization (1)
- convolutional neural networks (1)
- cooperative path planning (1)
- correlation (1)
- cross-disciplinary (1)
- cryptanalytic attacks (1)
- cryptocurrency (1)
- cuSPARSE (1)
- curved shell (1)
- cyanide (1)
- data analysis (1)
- data glove (1)
- data visualisation (1)
- database (1)
- decision tree learning (1)
- deep learning (1)
- denial-of-service (1)
- dependable robots (1)
- depth perception (1)
- designing air flow (1)
- detection (1)
- differential algebraic equation systems (1)
- digital platform ecosystem (1)
- digital storytelling (1)
- dimensionality reduction (1)
- direct feedback (1)
- directed hypergraphs (1)
- directional antennas (1)
- disabled people (1)
- displacement measurement (1)
- distance perception (1)
- distributed authoring (1)
- distributed processing (1)
- driving (1)
- drone video quality (1)
- drugs (1)
- dynamics (1)
- e-Research (1)
- eavesdropping (1)
- echo state network (1)
- eco-driving (1)
- electrochemical sensor (1)
- embedded collaborative learning (1)
- embodied interfaces (1)
- emotion computing (1)
- energy (1)
- energy efficient transportation (1)
- energy optimal driving (1)
- energy saving (1)
- enterprise software (1)
- erbliche Krebssyndrome (1)
- evaluation as a mean to communication (1)
- evolution strategies (1)
- evolutionary illumination (1)
- evolved neural network controller (1)
- evolving look ahead controllers (1)
- execution (1)
- exploration (1)
- eye movement (1)
- eye tracking (1)
- facial expression recognition (1)
- failure prognostic (1)
- fault indicators (1)
- fault scenarios (1)
- fault handling (1)
- feature (1)
- feature discovery (1)
- feature extraction (1)
- feature selection (1)
- felt obligations (1)
- fiducial marker (1)
- field programmable gate arrays (1)
- finite element method (1)
- fitness-fatigue model (1)
- fixed causalities generation of analytical redundancy relations (1)
- force sensing (1)
- forms of mathematical models (1)
- free and open source software (1)
- fuel (1)
- full-body interface (1)
- fuzzy logic (1)
- game engine (1)
- gamification (1)
- gaming (1)
- ganze Zahl (1)
- gaze (1)
- general plate theory (1)
- generation of ARRs (1)
- generative design (1)
- genes (1)
- genetic neutrality (1)
- genetic testing (1)
- genetics (1)
- genetische Testung (1)
- global illumination (1)
- graphene oxide powder (1)
- graphene oxide powders (1)
- graphical user interface (1)
- graphische Darstellung (1)
- graphs (1)
- grasp motions (1)
- grasping (1)
- gravito-inertial force (1)
- guidance (1)
- hand guidance (1)
- haptic feedback (1)
- haptic interfaces (1)
- hardware description languages (1)
- hardware functionality (1)
- hardware resources (1)
- heart rate control (1)
- heart rate modeling (1)
- heart rate prediction (1)
- heat shrink tubes (1)
- heavy metal (1)
- heterogeneous networks (1)
- heuristics (1)
- hierarchical clustering (1)
- high degree of diagnostic coverage and reliability (1)
- high diagnostic coverage and reliability (1)
- high dynamic range resistance readout (1)
- holography (1)
- human computer interaction (1)
- human-centric lighting (1)
- human-robot collaboration (1)
- hybrid dynamics solver (1)
- hybrid system models (1)
- hydrocarbon (1)
- hypermedia applications (1)
- iOER (1)
- ideation (1)
- image captioning (1)
- image sequence processing (1)
- immersion (1)
- immersive Visualisierung (1)
- immersive systems (1)
- immunodeficiency (1)
- information display methods (1)
- infrared pattern (1)
- innovative work behavior (1)
- instance segmentation (1)
- intelligent pedestrian counter (1)
- intelligente Agenten (1)
- intelligente virtuelle Agenten (1)
- interaction techniques (1)
- interactive computer graphics (1)
- interactive distributed rendering (1)
- intercultural learning (1)
- interfaces harmonization (1)
- interference (1)
- international (1)
- international teams (1)
- ion-selective electrodes (1)
- isolation (1)
- issue tracker (1)
- knowledge engineering (1)
- knowledge-management (1)
- large-high-resolution displays (1)
- leaning (1)
- leaning, self-motion perception (1)
- learning object repositories (1)
- learning-based fault detection and diagnosis (1)
- leukemia (1)
- light curtains (1)
- linguistic variable (1)
- linguistic variables (1)
- link calibration (1)
- lipid (1)
- load control (1)
- long short-term memory (1)
- long-distance 802.11 (1)
- long-distance modeling (1)
- lymphocytic (1)
- manipulation (1)
- mathematical modeling (1)
- measurement (1)
- mechatronic systems (1)
- medical training (1)
- mesoscopic agents (1)
- micro-benchmarks (1)
- microcomputers (1)
- mininig software repositories (1)
- mixed reality (1)
- mobile applications (1)
- mobile manipulation planning algorithms (1)
- mobile manipulators (1)
- mobile or handheld device (1)
- mobile projection (1)
- mobile robots (1)
- mobile web (1)
- mobiler Roboter (1)
- mobility assistance system (1)
- mode switching LTI models (1)
- mode-dependent implicit state space model (1)
- mode-switching linear time-invariant models (1)
- model exchange (1)
- modeling (1)
- modelling methodology (1)
- modular web (1)
- momentary frequency (1)
- monitoring (1)
- mood (1)
- morphological operator (1)
- motion capture (1)
- motion control (1)
- motion cueing (1)
- motion platform (1)
- motion trajectory enhancement (1)
- mp2 (1)
- multi causal strain (1)
- multi-channel power sourcing (1)
- multi-layer display (1)
- multi-objective optimization (1)
- multi-screen visualization environments (1)
- multi-user VR (1)
- multibody system (1)
- multibody systems (1)
- multibond graphs (1)
- multidisciplinary (1)
- multimodal optimization (1)
- multiple Xbox 360 (1)
- multiple computer systems (1)
- multiresolution analysis (1)
- multisensory cues (1)
- multisensory interface (1)
- mutation (1)
- naive physics (1)
- nano-composite (1)
- natural user interface (1)
- near-infrared (1)
- neural networks (1)
- neuro-cognitive performance (1)
- neuroevolution (1)
- noise suppression (1)
- nomadic text entry (1)
- nonlinear storytelling (1)
- numerical computation of residuals (1)
- object categorization (1)
- object-oriented modelling (1)
- object-oriented physical systems modelling (1)
- octane (1)
- operation mode independent causalities (1)
- optic flow (1)
- optical character recognition (1)
- optical flow (1)
- optical safeguard sensor (1)
- optical sensor (1)
- optical tracking (1)
- optical triangulation (1)
- optimal control (1)
- optimal control problem (1)
- optimized geometries (1)
- optische Zeichenerkennung (1)
- opto-electronic protective device (1)
- optoelectronic (1)
- parallel BFS (1)
- parallel difference visualization (1)
- parallel work queue (1)
- parameter estimation (1)
- parameter sensitivity of residuals (1)
- payment protocol (1)
- pedestrian counting system (1)
- pedestrian movements (1)
- pen interaction (1)
- perceived quality (1)
- perception of upright (1)
- performance modeling (1)
- performance optimizations (1)
- performance prediction (1)
- peripheral visual field (1)
- person and object detection and recognition (1)
- phenomenological approaches (1)
- phenotypic diversity (1)
- phenotypic feature (1)
- phenotypic niching (1)
- photometry (1)
- physical model immersive (1)
- physiological monitoring (1)
- plasma-enhanced CVD (PECVD) (deposition) (1)
- porous material (1)
- posture analysis (1)
- predictive maintenance (1)
- prefrontal cortex (1)
- prehensile motions (1)
- preprocessing (1)
- process (1)
- prognosis (1)
- project-based learning (1)
- projection (1)
- projection based systems (1)
- propan-2-ol (1)
- prototype theory (1)
- proxemics (1)
- pseudo-random number generator (1)
- qualitative reasoning (1)
- quality-diversity (1)
- quantitative model-based fault detection (1)
- quantum mechanics (1)
- radio-frequency identification (RFID) systems (1)
- rapid prototyping tool (1)
- ray tracing (1)
- recurrent neural network function (1)
- refactoring (1)
- reference dataset (1)
- refined beam theory (1)
- region of interest (1)
- regression (1)
- regression testing (1)
- reinforcement learning (1)
- remaining useful life (1)
- remote diagnosis (1)
- remote-controlled robots (1)
- rendering (computer graphics) (1)
- repeated trend projection (1)
- requirements (1)
- requirements analysis (1)
- requirements management (1)
- residual bond graph sinks (1)
- resource utilization (1)
- road (1)
- robot action diagnosability (1)
- robot component monitoring (1)
- robot control (1)
- robot control architecture (1)
- robot execution failures (1)
- robot kinematics (1)
- robotic arm (1)
- robotic black box (1)
- robotic evaluation (1)
- robots (1)
- routing (1)
- rules (1)
- run-time adaptation (1)
- rural areas (1)
- scalability (1)
- scene element representation (1)
- scene-segmentation (1)
- scenes (1)
- schädliches Programm (1)
- screens (display) (1)
- see-through display (1)
- see-through head-mounted displays (1)
- self-configuration (1)
- self-management (1)
- self-motion perception (1)
- semantic image seg-mentation (1)
- semantic mapping (1)
- sensemaking (1)
- sensor data acquisition (1)
- sensor data transmission (1)
- sensor fusion (1)
- sensor-based fault detection and diagnosis (1)
- server processors (1)
- service activities (1)
- shared memory (1)
- shell theory (1)
- short-term memory (1)
- signal processing algorithm (1)
- simulation of fault scenarios (1)
- simulator (1)
- skin detection (1)
- slip detection (1)
- small molecule (1)
- software (1)
- software architecture (1)
- software engineering (1)
- software frameworks (1)
- software testing (1)
- software-based feedback agents (1)
- software-defined networking (1)
- spatial augmented reality (1)
- spectral rendering (1)
- spectrum scan (1)
- spectrum sensing (1)
- speech recognition (1)
- spinal posture (1)
- static friction (1)
- stereoscopic vision (1)
- stiffeners (1)
- story authoring (1)
- strain (1)
- stress (1)
- stress detection (1)
- structural equation modeling (1)
- strukturelle Komplexität von Daten (1)
- submillimeter precision (1)
- surface textures (1)
- surface topography (1)
- surrogate assisted phenotypic niching (1)
- surrogate models (1)
- switched three-phase power inverter (1)
- system mode independent bond graph representation (1)
- system modes (1)
- tactile sensing (1)
- task models (1)
- task planning (1)
- taxonomie (1)
- teaching (1)
- technology mapping (1)
- teleoperation (1)
- telepresence (1)
- telomeres (1)
- territoriality (1)
- test case reduction (1)
- text detection (1)
- text entry in motion (1)
- text localization (1)
- text mining (1)
- textual model description languages (1)
- thread mapping (1)
- tiled displays (1)
- time series processing (1)
- tools for education (1)
- touchscreen (1)
- traffic sign detection (1)
- traffic sign localization (1)
- training monitoring (1)
- training performance relationship (1)
- true random number generator (1)
- tumor microenvironment (1)
- tumor-infiltrating immune cells (1)
- ultrasonic sensor (1)
- un-manned aerial vehicle (1)
- uncertainties (1)
- unique bond graph representation for all modes of operation (1)
- unmanned ground vehicle (1)
- unrolling (1)
- unstructured data (1)
- usability (1)
- usable secure email (1)
- usage contexts (1)
- usage data analysis (1)
- user Interface Design (1)
- user documentation (1)
- user engagement (1)
- user input (1)
- user interaction (1)
- vector units (1)
- vestibular system (1)
- vibration (1)
- virtual environment framework (1)
- virtual locomotion (1)
- virtual or soft keyboard (1)
- visual attention (1)
- visual quality control (1)
- visualisation (1)
- visualization (1)
- visualization support (1)
- visuohaptic feedback (1)
- walking (1)
- water dimer (1)
- wavelet (1)
- wearable sensor (1)
- wearable sensors (1)
- web components (1)
- web services (1)
- web technology (1)
- welfare technology (1)
- whole-body interface (1)
- whole-exome sequencing (1)
- wind nuisance threshold (1)
- wireless communication (1)
- wireless mesh networks (1)
- wmSDN (1)
- workday breaks (1)
- workspace awareness (1)
- xorshift-generator (1)
- youBot (1)
- zooming interface (1)
- zooming interfaces (1)
- Öffentliche Verwaltung (1)
- Überwachung (1)
- öffentlicher Schlüssel (1)
- Wavenet (1)
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users.
To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
With the digital transformation, software systems have become an integral part of our society and economy. In every part of our life, software systems are increasingly utilized to, e.g., simplify housework or to optimize business processes. All these applications are connected to the Internet, which already includes millions of software services consumed by billions of people. Applications which process such a magnitude of users and data traffic requires to be highly scalable and are therefore denoted as Ultra Large Scale (ULS) systems. Roy Fielding has defined one of the first approaches which allows designing modern ULS software systems. In his doctoral thesis, Fielding introduced the architectural style Representational State Transfer (REST) which builds the theoretical foundation of the web. At present, the web is considered as the world's largest ULS system. Due to a large number of users and the significance of software for society and the economy, the security of ULS systems is another crucial quality factor besides high scalability.
This book shows in a comprehensive presentation how Bond Graph methodology can support model-based control, model-based fault diagnosis, fault accommodation, and failure prognosis by reviewing the state-of-the-art, presenting a hybrid integrated approach to Bond Graph model-based fault diagnosis and failure prognosis, and by providing a review of software that can be used for these tasks.
Telepresence robots allow users to be spatially and socially present in remote environments. Yet, it can be challenging to remotely operate telepresence robots, especially in dense environments such as academic conferences or workplaces. In this paper, we primarily focus on the effect that a speed control method, which automatically slows the telepresence robot down when getting closer to obstacles, has on user behaviors. In our first user study, participants drove the robot through a static obstacle course with narrow sections. Results indicate that the automatic speed control method significantly decreases the number of collisions. For the second study we designed a more naturalistic, conference-like experimental environment with tasks that require social interaction, and collected subjective responses from the participants when they were asked to navigate through the environment. While about half of the participants preferred automatic speed control because it allowed for smoother and safer navigation, others did not want to be influenced by an automatic mechanism. Overall, the results suggest that automatic speed control simplifies the user interface for telepresence robots in static dense environments, but should be considered as optionally available, especially in situations involving social interactions.
The ability to finely segment different instances of various objects in an environment forms a critical tool in the perception tool-box of any autonomous agent. Traditionally instance segmentation is treated as a multi-label pixel-wise classification problem. This formulation has resulted in networks that are capable of producing high-quality instance masks but are extremely slow for real-world usage, especially on platforms with limited computational capabilities. This thesis investigates an alternate regression-based formulation of instance segmentation to achieve a good trade-off between mask precision and run-time. Particularly the instance masks are parameterized and a CNN is trained to regress to these parameters, analogous to bounding box regression performed by an object detection network.
In this investigation, the instance segmentation masks in the Cityscape dataset are approximated using irregular octagons and an existing object detector network (i.e., SqueezeDet) is modified to regresses to the parameters of these octagonal approximations. The resulting network is referred to as SqueezeDetOcta. At the image boundaries, object instances are only partially visible. Due to the convolutional nature of most object detection networks, special handling of the boundary adhering object instances is warranted. However, the current object detection techniques seem to be unaffected by this and handle all the object instances alike. To this end, this work proposes selectively learning only partial, untainted parameters of the bounding box approximation of the boundary adhering object instances. Anchor-based object detection networks like SqueezeDet and YOLOv2 have a discrepancy between the ground-truth encoding/decoding scheme and the coordinate space used for clustering, to generate the prior anchor shapes. To resolve this disagreement, this work proposes clustering in a space defined by two coordinate axes representing the natural log transformations of the width and height of the ground-truth bounding boxes.
When both SqueezeDet and SqueezeDetOcta were trained from scratch, SqueezeDetOcta lagged behind the SqueezeDet network by a massive ≈ 6.19 mAP. Further analysis revealed that the sparsity of the annotated data was the reason for this lackluster performance of the SqueezeDetOcta network. To mitigate this issue transfer-learning was used to fine-tune the SqueezeDetOcta network starting from the trained weights of the SqueezeDet network. When all the layers of the SqueezeDetOcta were fine-tuned, it outperformed the SqueezeDet network paired with logarithmically extracted anchors by ≈ 0.77 mAP. In addition to this, the forward pass latencies of both SqueezeDet and SqueezeDetOcta are close to ≈ 19ms. Boundary adhesion considerations, during training, resulted in an improvement of ≈ 2.62 mAP of the baseline SqueezeDet network. A SqueezeDet network paired with logarithmically extracted anchors improved the performance of the baseline SqueezeDet network by ≈ 1.85 mAP.
In summary, this work demonstrates that if given sufficient fine instance annotated data, an existing object detection network can be modified to predict much finer approximations (i.e., irregular octagons) of the instance annotations, whilst having the same forward pass latency as that of the bounding box predicting network. The results justify the merits of logarithmically extracted anchors to boost the performance of any anchor-based object detection network. The results also showed that the special handling of image boundary adhering object instances produces more performant object detectors.
The simultaneous operation of multiple different semiconducting metal oxide (MOX) gas sensors is demanding for the readout circuitry. The challenge results from the strongly varying signal intensities of the various sensor types to the target gas. While some sensors change their resistance only slightly, other types can react with a resistive change over a range of several decades. Therefore, a suitable readout circuit has to be able to capture all these resistive variations, requiring it to have a very large dynamic range. This work presents a compact embedded system that provides a full, high range input interface (readout and heater management) for MOX sensor operation. The system is modular and consists of a central mainboard that holds up to eight sensor-modules, each capable of supporting up to two MOX sensors, therefore supporting a total maximum of 16 different sensors. Its wide input range is archived using the resistance-to-time measurement method. The system is solely built with commercial off-the-shelf components and tested over a range spanning from 100Ω to 5 GΩ (9.7 decades) with an average measurement error of 0.27% and a maximum error of 2.11%. The heater management uses a well-tested power-circuit and supports multiple modes of operation, hence enabling the system to be used in highly automated measurement applications. The experimental part of this work presents the results of an exemplary screening of 16 sensors, which was performed to evaluate the system’s performance.
Object detectors have improved considerably in the last years by using advanced CNN architectures. However, many detector hyper-parameters are generally manually tuned, or they are used with values set by the detector authors. Automatic Hyper-parameter optimization has not been explored in improving CNN-based object detectors hyper-parameters. In this work, we propose the use of Black-box optimization methods to tune the prior/default box scales in Faster R-CNN and SSD, using Bayesian Optimization, SMAC, and CMA-ES. We show that by tuning the input image size and prior box anchor scale on Faster R-CNN mAP increases by 2% on PASCAL VOC 2007, and by 3% with SSD. On the COCO dataset with SSD there are mAP improvement in the medium and large objects, but mAP decreases by 1% in small objects. We also perform a regression analysis to find the significant hyper-parameters to tune.
In this paper we introduce the Perception for Autonomous Systems (PAZ) software library. PAZ is a hierarchical perception library that allow users to manipulate multiple levels of abstraction in accordance to their requirements or skill level. More specifically, PAZ is divided into three hierarchical levels which we refer to as pipelines, processors, and backends. These abstractions allows users to compose functions in a hierarchical modular scheme that can be applied for preprocessing, data-augmentation, prediction and postprocessing of inputs and outputs of machine learning (ML) models. PAZ uses these abstractions to build reusable training and prediction pipelines for multiple robot perception tasks such as: 2D keypoint estimation, 2D object detection, 3D keypoint discovery, 6D pose estimation, emotion classification, face recognition, instance segmentation, and attention mechanisms.
Reinforcement learning (RL) algorithms should learn as much as possible about the environment but not the properties of the physics engines that generate the environment. There are multiple algorithms that solve the task in a physics engine based environment but there is no work done so far to understand if the RL algorithms can generalize across physics engines. In this work, we compare the generalization performance of various deep reinforcement learning algorithms on a variety of control tasks. Our results show that MuJoCo is the best engine to transfer the learning to other engines. On the other hand, none of the algorithms generalize when trained on PyBullet. We also found out that various algorithms have a promising generalizability if the effect of random seeds can be minimized on their performance.
An internal model of self-motion provides a fundamental basis for action in our daily lives, yet little is known about its development. The ability to control self-motion develops in youth and often deteriorates with advanced age. Self-motion generates relative motion between the viewer and the environment. Thus, the smoothness of the visual motion created will vary as control improves. Here, we study the influence of the smoothness of visually simulated self-motion on an observer's ability to judge how far they have travelled over a wide range of ages. Previous studies were typically highly controlled and concentrated on university students. But are such populations representative of the general public? And are there developmental and sex effects? Here, estimates of distance travelled (visual odometry) during visually induced self-motion were obtained from 466 participants drawn from visitors to a public science museum. Participants were presented with visual motion that simulated forward linear self-motion through a field of lollipops using a head-mounted virtual reality display. They judged the distance of their simulated motion by indicating when they had reached the position of a previously presented target. The simulated visual motion was presented with or without horizontal or vertical sinusoidal jitter. Participants' responses indicated that they felt they travelled further in the presence of vertical jitter. The effectiveness of the display increased with age over all jitter conditions. The estimated time for participants to feel that they had started to move also increased slightly with age. There were no differences between the sexes. These results suggest that age should be taken into account when generating motion in a virtual reality environment. Citizen science studies like this can provide a unique and valuable insight into perceptual processes in a truly representative sample of people.
OSC data
(2020)
Optimization plays an essential role in industrial design, but is not limited to minimization of a simple function, such as cost or strength. These tools are also used in conceptual phases, to better understand what is possible. To support this exploration we focus on Quality Diversity (QD) algorithms, which produce sets of varied, high performing solutions. These techniques often require the evaluation of millions of solutions -- making them impractical in design cases. In this thesis we propose methods to radically improve the data-efficiency of QD with machine learning, enabling its application to design. In our first contribution, we develop a method of modeling the performance of evolved neural networks used for control and design. The structures of these networks grow and change, making them difficult to model -- but with a new method we are able to estimate their performance based on their heredity, improving data-efficiency by several times. In our second contribution we combine model-based optimization with MAP-Elites, a QD algorithm. A model of performance is created from known designs, and MAP-Elites creates a new set of designs using this approximation. A subset of these designs are the evaluated to improve the model, and the process repeats. We show that this approach improves the efficiency of MAP-Elites by orders of magnitude. Our third contribution integrates generative models into MAP-Elites to learn domain specific encodings. A variational autoencoder is trained on the solutions produced by MAP-Elites, capturing the common “recipe” for high performance. This learned encoding can then be reused by other algorithms for rapid optimization, including MAP-Elites. Throughout this thesis, though the focus of our vision is design, we examine applications in other fields, such as robotics. These advances are not exclusive to design, but serve as foundational work on the integration of QD and machine learning.
Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional features during login, and when observed feature values differ significantly from previously seen ones, users have to provide additional authentication factors such as a verification code. RBA has the potential to offer more usable authentication, but the usability and the security perceptions of RBA are not studied well.
We present the results of a between-group lab study (n=65) to evaluate usability and security perceptions of two RBA variants, one 2FA variant, and password-only authentication. Our study shows with significant results that RBA is considered to be more usable than the studied 2FA variants, while it is perceived as more secure than password-only authentication in general and comparably secure to 2FA in a variety of application types. We also observed RBA usability problems and provide recommendations for mitigation. Our contribution provides a first deeper understanding of the users' perception of RBA and helps to improve RBA implementations for a broader user acceptance.
When a robotic agent experiences a failure while acting in the world, it should be possible to discover why that failure has occurred, namely to diagnose the failure. In this paper, we argue that the diagnosability of robot actions, at least in a classical sense, is a feature that cannot be taken for granted since it strongly depends on the underlying action representation. We specifically define criteria that determine the diagnosability of robot actions. The diagnosability question is then analysed in the context of a handle manipulation action, such that we discuss two different representations of the action – a composite policy with a learned success model for the action parameters, and a neural network-based monolithic policy – both of which exist on different sides of the diagnosability spectrum. Through this comparison, we conclude that composite actions are more suited to explicit diagnosis, but representations with less prior knowledge are more flexible. This suggests that model learning may provide balance between flexibility and diagnosability; however, data-driven diagnosis methods also need to be enhanced in order to deal with the complexity of modern robots.
Comparing Non-Visual and Visual Guidance Methods for Narrow Field of View Augmented Reality Displays
(2020)
Gone But Not Forgotten: Evaluating Performance and Scalability of Real-Time Mesoscopic Agents
(2020)
Telepresence robots allow people to participate in remote spaces, yet they can be difficult to manoeuvre with people and obstacles around. We designed a haptic-feedback system called “FeetBack," which users place their feet in when driving a telepresence robot. When the robot approaches people or obstacles, haptic proximity and collision feedback are provided on the respective sides of the feet, helping inform users about events that are hard to notice through the robot’s camera views. We conducted two studies: one to explore the usage of FeetBack in virtual environments, another focused on real environments.We found that FeetBack can increase spatial presence in simple virtual environments. Users valued the feedback to adjust their behaviour in both types of environments, though it was sometimes too frequent or unneeded for certain situations after a period of time. These results point to the value of foot-based haptic feedback for telepresence robot systems, while also the need to design context-sensitive haptic feedback.
This paper utilizes machine learning to investigate the classification of encryption applied to network traffic and the underlying activities. It is firstly motivated by the difficulty of traditional traffic classification caused by additional encryption as ports and headers are hidden. Secondly, the results also present the effectiveness of currently available privacy-enhancing technologies. A new dataset is created, containing Pure (without additional encryption), Tor, Tor with obfuscation, VPN and VPN+Tor network traffic. Additionally, there are five different activities performed during each kind of traffic recording, namely audio streaming, browsing, P2P/SFTP file transfers and video conferencing. The traffic is classified by extracting features based on flows calculated by ARGUS and CICFlowMeter, combining three classifiers with seven feature selection algorithms. The results for the classification of the encryption clearly indicate the possibility of using this detection system in a modified fashion within a practical application. For the detection of activities inside encrypted network traffic, the results show that the disguise is ineffective. Overall, this reveals the need to improve the resistance of commonly used techniques for the protection of network traffic against machine learning.
Graph drawing with spring embedders employs a V ×V computation phase over the graph’s vertex set to compute repulsive forces. Here, the efficacy of forces diminishes with distance: a vertex can effectively only influence other vertices in a certain radius around its position. Therefore, the algorithm lends itself to an implementation using search data structures to reduce the runtime complexity. NVIDIA RT cores implement hierarchical tree traversal in hardware. We show how to map the problem of finding graph layouts with force-directed methods to a ray tracing problem that can subsequently be implemented with dedicated ray tracing hardware. With that, we observe speedups of 4× to 13× over a CUDA software implementation.
A Comparative Study of Uncertainty Estimation Methods in Deep Learning Based Classification Models
(2020)
Deep learning models produce overconfident predictions even for misclassified data. This work aims to improve the safety guarantees of software-intensive systems that use deep learning based classification models for decision making by performing comparative evaluation of different uncertainty estimation methods to identify possible misclassifications.
In this work, uncertainty estimation methods applicable to deep learning models are reviewed and those which can be seamlessly integrated to existing deployed deep learning architectures are selected for evaluation. The different uncertainty estimation methods, deep ensembles, test-time data augmentation and Monte Carlo dropout with its variants, are empirically evaluated on two standard datasets (CIFAR-10 and CIFAR-100) and two custom classification datasets (optical inspection and RoboCup@Work dataset). A relative ranking between the methods is provided by evaluating the deep learning classifiers on various aspects such as uncertainty quality, classifier performance and calibration. Standard metrics like entropy, cross-entropy, mutual information, and variance, combined with a rank histogram based method to identify uncertain predictions by thresholding on these metrics, are used to evaluate uncertainty quality.
The results indicate that Monte Carlo dropout combined with test-time data augmentation outperforms all other methods by identifying more than 95% of the misclassifications and representing uncertainty in the highest number of samples in the test set. It also yields a better classifier performance and calibration in terms of higher accuracy and lower Expected Calibration Error (ECE), respectively. A python based uncertainty estimation library for training and real-time uncertainty estimation of deep learning based classification models is also developed.
We have designed an inexpensive intelligent pedestrian counting system. The pedestrian counting system consists of several counters that can be connected together in a distributed fashion and communicate over the wireless channel. The motion pattern is recorded using a set of passive infrared (PIR) sensors. Each counter has one wireless sensor node that processes the PIR sensor data and transmits it to a base station. Then echo state network, a special kind of recurrent neural network, is used to predict the pedestrian count from the input pattern. The evaluation of the performance of such networks in a novel kind of application is one focus of this work. The counter gave a performance of 80.4% which is better than the commercially available low-priced pedestrian counters. The article reports the experiments we did for analyzing the counterperformance and lists the strengths and limitations of the current implementation. It will also report the preliminary test results obtained by substituting the PIR sensors with low-cost active IR distance sensors which can improve the counter performance further.
Human and robot tasks in household environments include actions such as carrying an object, cleaning a surface, etc. These tasks are performed by means of dexterous manipulation, and for humans, they are straightforward to accomplish. Moreover, humans perform these actions with reasonable accuracy and precision but with much less energy and stress on the actuators (muscles) than the robots do. The high agility in controlling their forces and motions is actually due to "laziness", i.e. humans exploit the existing natural forces and constraints to execute the tasks.
The above-mentioned properties of the human lazy strategy motivate us to relax the problem of controlling robot motions and forces, and solve it with the help of the environment. Therefore, in this work, we developed a lazy control strategy, i.e. task specification models and control architectures that relax several aspects of robot control by exploiting prior knowledge about the task and environment. The developed control strategy is realized in four different robotics use cases. In this work, the Popov-Vereshchagin hybrid dynamics solver is used as one of the building blocks in the proposed control architectures. An extension of the solver’s interface with the artificial Cartesian force and feed-forward joint torque task-drivers is proposed in this thesis.
To validate the proposed lazy control approach, an experimental evaluation was performed in a simulation environment and on a real robot platform.
Comparative Evaluation of Pretrained Transfer Learning Models on Automatic Short Answer Grading
(2020)
Automatic Short Answer Grading (ASAG) is the process of grading the student answers by computational approaches given a question and the desired answer. Previous works implemented the methods of concept mapping, facet mapping, and some used the conventional word embeddings for extracting semantic features. They extracted multiple features manually to train on the corresponding datasets. We use pretrained embeddings of the transfer learning models, ELMo, BERT, GPT, and GPT-2 to assess their efficiency on this task. We train with a single feature, cosine similarity, extracted from the embeddings of these models. We compare the RMSE scores and correlation measurements of the four models with previous works on Mohler dataset. Our work demonstrates that ELMo outperformed the other three models. We also, briefly describe the four transfer learning models and conclude with the possible causes of poor results of transfer learning models.
Graph drawing with spring embedders employs a V x V computation phase over the graph's vertex set to compute repulsive forces. Here, the efficacy of forces diminishes with distance: a vertex can effectively only influence other vertices in a certain radius around its position. Therefore, the algorithm lends itself to an implementation using search data structures to reduce the runtime complexity. NVIDIA RT cores implement hierarchical tree traversal in hardware. We show how to map the problem of finding graph layouts with force-directed methods to a ray tracing problem that can subsequently be implemented with dedicated ray tracing hardware. With that, we observe speedups of 4x to 13x over a CUDA software implementation.
Bei der sechsten Ausgabe des wissenschaftlichen Workshops ”Usable Security und Privacy” auf der Mensch und Computer 2020 werden wie in den vergangenen Jahren aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmenden diskutiert. Drei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, einer mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert*innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security-Engineering, transdisziplinär austauschen können.
Facial emotion recognition is the task to classify human emotions in face images. It is a difficult task due to high aleatoric uncertainty and visual ambiguity. A large part of the literature aims to show progress by increasing accuracy on this task, but this ignores the inherent uncertainty and ambiguity in the task. In this paper we show that Bayesian Neural Networks, as approximated using MC-Dropout, MC-DropConnect, or an Ensemble, are able to model the aleatoric uncertainty in facial emotion recognition, and produce output probabilities that are closer to what a human expects. We also show that calibration metrics show strange behaviors for this task, due to the multiple classes that can be considered correct, which motivates future work. We believe our work will motivate other researchers to move away from Classical and into Bayesian Neural Networks.
YAWL (Yet Another Workflow Language) is an open source Business Process Management System, first released in 2003. YAWL grew out of a university research environment to become a unique system that has been deployed worldwide as a laboratory environment for research in Business Process Management and as a productive system in other scientific domains.
Efficient and comprehensive assessment of students knowledge is an imperative task in any learning process. Short answer grading is one of the most successful methods in assessing the knowledge of students. Many supervised learning and deep learning approaches have been used to automate the task of short answer grading in the past. We investigate why assistive grading with active learning would be the next logical step in this task as there is no absolute ground truth answer for any question and the task is very subjective in nature. We present a fast and easy method to harness the power of active learning and natural language processing in assisting the task of grading short answer questions. A webbased GUI is designed and implemented to incorporate an interactive short answer grading system. The experiments show that active learning saves the time and effort of graders in assessment and reaches the performance of supervised learning with less amount of graded answers for training.
Evaluation of a Multi-Layer 2.5D display in comparison to conventional 3D stereoscopic glasses
(2020)
In this paper we propose and evaluate a custom-build projection-based multilayer 2.5D display, consisting of three layers of images, and compare performance to a stereoscopic 3D display. Stereoscopic vision can increase the involvement and enhance game experience, however may induce possible side effects, e.g. motion sickness and simulator sickness. To overcome the disadvantage of multiple discrete depths, in our system perspective rendering and head-tracking is used. A study was performed to evaluate this display with 20 participants playing custom-designed games. The results indicated that the multi-layer display caused fewer side effects than the stereoscopic display and provided good usability. The participants also stated a better or equal spatial perception, while the cognitive load stayed the same.
This work provides a short but technical introduction to the main building blocks of a blockchain. It argues that a blockchain is not a revolutionary technology but rather a clever combination of three fields: cryptography, decentralization and game theory. In addition, it summaries the differences between a public, private and federate blockchain model and the two prominent consensus mechanism Proof-of-Work (POW) and Proof-of-Stake (POS).
Dieses Buch bietet einen leicht verständlichen Einstieg in die Thematik des Data Minings und der Prädiktiven Analyseverfahren. Als Methodensammlung gedacht, bietet es zu jedem Verfahren zunächst eine kurze Darstellung der Theorie und erklärt die zum Verständnis notwendigen Formeln. Es folgt jeweils eine Illustration der Verfahren mit Hilfe von Beispielen, die mit dem Programmpaket R erarbeitet werden.
Zum Abschluss wird eine einfache Möglichkeit präsentiert, mit der die Performancewerte verschiedener Verfahren mit statistischen Mitteln verglichen werden können. Zum Einsatz kommen hierbei geeignete Grafiken und Konfidenzintervalle.
Das Buch verzichtet nicht auf Theorie, es präsentiert jedoch so wenig Theorie wie möglich, aber so viel wie nötig und ist somit optimal für Studium und Selbststudium geeignet.
Compliant manipulation is a crucial skill for robots when they are supposed to act as helping hands in everyday household tasks. Still, nowadays, those skills are hand-crafted by experts which frequently requires labor-intensive, manual parameter tuning. Moreover, some tasks are too complex to be specified fully using a task specification. Learning these skills, by contrast, requires a high number of costly and potentially unsafe interactions with the environment. We present a compliant manipulation approach using reinforcement learning guided by the Task Frame Formalism, a task specification method. This allows us to specify the easy to model knowledge about a task while the robot learns the unmodeled components by reinforcement learning. We evaluate the approach by performing a compliant manipulation task with a KUKA LWR 4+ manipulator. The robot was able to learn force control policies directly on the robot without using any simulation.
Emotion and gender recognition from facial features are important properties of human empathy. Robots should also have these capabilities. For this purpose we have designed special convolutional modules that allow a model to recognize emotions and gender with a considerable lower number of parameters, enabling real-time evaluation on a constrained platform. We report accuracies of 96% in the IMDB gender dataset and 66% in the FER-2013 emotion dataset, while requiring a computation time of less than 0.008 seconds on a Core i7 CPU. All our code, demos and pre-trained architectures have been released under an open-source license in our repository at https://github.com/oarriaga/face classification.
Deep learning models are extensively used in various safety critical applications. Hence these models along with being accurate need to be highly reliable. One way of achieving this is by quantifying uncertainty. Bayesian methods for UQ have been extensively studied for Deep Learning models applied on images but have been less explored for 3D modalities such as point clouds often used for Robots and Autonomous Systems. In this work, we evaluate three uncertainty quantification methods namely Deep Ensembles, MC-Dropout and MC-DropConnect on the DarkNet21Seg 3D semantic segmentation model and comprehensively analyze the impact of various parameters such as number of models in ensembles or forward passes, and drop probability values, on task performance and uncertainty estimate quality. We find that Deep Ensembles outperforms other methods in both performance and uncertainty metrics. Deep ensembles outperform other methods by a margin of 2.4% in terms of mIOU, 1.3% in terms of accuracy, while providing reliable uncertainty for decision making.
Autonomous mobile robots comprise of several hardware and software components. These components interact with each other continuously in order to achieve autonomity. Due to the complexity of such a task, a monumental responsibility is bestowed upon the developer to make sure that the robot is always operable. Hence, some means of detecting faults should be readily available. In this work, the aforementioned fault-detection system is a robotic black box (RBB) attached to the robot which acquires all the relevant measurements of the system that are needed to achieve a fault-free robot. Due to limited computational and memory resources on-board the RBB, a distributed diagnosis is proposed. That is, the fault diagnosis task (detection and isolation) is shared among an on-board component (the black box) and an off-board component (an external computer). The distribution of the diagnosis task allows for a non-intrusive method of detecting and diagnosing faults, in addition to the ability of remotely diagnosing a robot and potentially issuing a repair command. In addition to decomposing the diagnosis task and allowing remote diagnosability of the robot, another key feature of this work is the addition of expert human knowledge to aid in the fault detection process.
Representation and Experience-Based Learning of Explainable Models for Robot Action Execution
(2021)
For robots acting in human-centered environments, the ability to improve based on experience is essential for reliable and adaptive operation; however, particularly in the context of robot failure analysis, experience-based improvement is only useful if robots are also able to reason about and explain the decisions they make during execution. In this paper, we describe and analyse a representation of execution-specific knowledge that combines (i) a relational model in the form of qualitative attributes that describe the conditions under which actions can be executed successfully and (ii) a continuous model in the form of a Gaussian process that can be used for generating parameters for action execution, but also for evaluating the expected execution success given a particular action parameterisation. The proposed representation is based on prior, modelled knowledge about actions and is combined with a learning process that is supervised by a teacher. We analyse the benefits of this representation in the context of two actions – grasping handles and pulling an object on a table – such that the experiments demonstrate that the joint relational-continuous model allows a robot to improve its execution based on experience, while reducing the severity of failures experienced during execution.
Risk-based Authentication (RBA) is an adaptive security measure that improves the security of password-based authentication by protecting against credential stuffing, password guessing, or phishing attacks. RBA monitors extra features during login and requests for an additional authentication step if the observed feature values deviate from the usual ones in the login history. In state-of-the-art RBA re-authentication deployments, users receive an email with a numerical code in its body, which must be entered on the online service. Although this procedure has a major impact on RBA's time exposure and usability, these aspects were not studied so far.
We introduce two RBA re-authentication variants supplementing the de facto standard with a link-based and another code-based approach. Then, we present the results of a between-group study (N=592) to evaluate these three approaches. Our observations show with significant results that there is potential to speed up the RBA re-authentication process without reducing neither its security properties nor its security perception. The link-based re-authentication via "magic links", however, makes users significantly more anxious than the code-based approaches when perceived for the first time. Our evaluations underline the fact that RBA re-authentication is not a uniform procedure. We summarize our findings and provide recommendations.
Domestic Robotics
(2016)
Domestic Robotics
(2008)
Are There Extended Cognitive Improvements from Different Kinds of Acute Bouts of Physical Activity?
(2020)
Acute bouts of physical activity of at least moderate intensity have shown to enhance cognition in young as well as older adults. This effect has been observed for different kinds of activities such as aerobic or strength and coordination training. However, only few studies have directly compared these activities regarding their effectiveness. Further, most previous studies have mainly focused on inhibition and have not examined other important core executive functions (i.e., updating, switching) which are essential for our behavior in daily life (e.g., staying focused, resisting temptations, thinking before acting), as well. Therefore, this study aimed to directly compare two kinds of activities, aerobic and coordinative, and examine how they might affect executive functions (i.e., inhibition, updating, and switching) in a test-retest protocol. It is interesting for practical implications, as coordinative exercises, for example, require little space and would be preferable in settings such as an office or a classroom. Furthermore, we designed our experiment in such a way that learning effects were controlled. Then, we tested the influence of acute bouts of physical activity on the executive functioning in both young and older adults (young 16–22 years, old 65–80 years). Overall, we found no differences between aerobic and coordinative activities and, in fact, benefits from physical activities occurred only in the updating tasks in young adults. Additionally, we also showed some learning effects that might influence the results. Thus, it is important to control cognitive tests for learning effects in test-retest studies as well as to analyze effects from physical activity on a construct level of executive functions.
Despite the advances in research on usable secureemail, the majority of mail user agents found in practicestill violates best practices in UI design and uses ineffectiveand inhomogeneous design strategies to communicate and let users control the security status of an email message. We propose a novel interaction and design concept that we refer to as persuasive message design. Our approach is derived from heuristics and a systematic meta-study ofexisting HCI literature on email management, usable secureemail and phishing research. Concluding on this body ofknowledge we propose the design of interfaces that sup-presses weak cues and instead manipulates the display of emails according to their technical security level. Persuasive message design addresses several shortcomings of currentsecure email user interfaces and provides a consistent user experience that can be deployed even by email providers.
Object detectors have improved considerably in the last years by using advanced Convolutional Neural Networks (CNNs) architectures. However, many detector hyper-parameters are not generally tuned, and they are used with values set by the detector authors. Blackbox optimization methods have gained more attention in recent years because of its ability to optimize the hyper-parameters of various machine learning algorithms and deep learning models. However, these methods are not explored in improving CNN-based object detector's hyper-parameters. In this research work, we propose the use of blackbox optimization methods such as Gaussian Process based Bayesian Optimization (BOGP), Sequential Model-based Algorithm Configuration (SMAC), and Covariance Matrix Adaptation Evolution Strategy (CMA-ES) to tune the hyper-parameters in Faster R-CNN and Single Shot MultiBox Detector (SSD). In Faster R-CNN, tuning the input image size, prior box anchor scales and ratios using BOGP, SMAC, and CMA-ES has increased the performance around 1.5% in terms of Mean Average Precision (mAP) on PASCAL VOC. Tuning the anchor scales of SSD has increased the mAP by 3% on PASCAL VOC and marine debris datasets. On the COCO dataset with SSD, mAP improvement is observed in the medium and large objects, but mAP decreases by 1% in small objects. The experimental results show that the blackbox optimization methods have proved to increase the mAP performance by optimizing the object detectors. Moreover, it has achieved better results than the hand-tuned configurations in most of the cases.
Maßgefertigte Abläufe
(2017)
In complex, expensive optimization domains we often narrowly focus on finding high performing solutions, instead of expanding our understanding of the domain itself. But what if we could quickly understand the complex behaviors that can emerge in said domains instead? We introduce surrogate-assisted phenotypic niching, a quality diversity algorithm which allows to discover a large, diverse set of behaviors by using computationally expensive phenotypic features. In this work we discover the types of air flow in a 2D fluid dynamics optimization problem. A fast GPU-based fluid dynamics solver is used in conjunction with surrogate models to accurately predict fluid characteristics from the shapes that produce the air flow. We show that these features can be modeled in a data-driven way while sampling to improve performance, rather than explicitly sampling to improve feature models. Our method can reduce the need to run an infeasibly large set of simulations while still being able to design a large diversity of air flows and the shapes that cause them. Discovering diversity of behaviors helps engineers to better understand expensive domains and their solutions.
The encoding of solutions in black-box optimization is a delicate, handcrafted balance between expressiveness and domain knowledge between exploring a wide variety of solutions, and ensuring that those solutions are useful. Our main insight is that this process can be automated by generating a dataset of high-performing solutions with a quality diversity algorithm (here, MAP-Elites), then learning a representation with a generative model (here, a Varia-tional Autoencoder) from that dataset. Our second insight is that this representation can be used to scale quality diversity optimization to higher dimensions-but only if we carefully mix solutions generated with the learned representation and those generated with traditional variation operators. We demonstrate these capabilities by learning an low-dimensional encoding for the inverse kinemat-ics of a thousand joint planar arm. The results show that learned representations make it possible to solve high-dimensional problems with orders of magnitude fewer evaluations than the standard MAP-Elites, and that, once solved, the produced encoding can be used for rapid optimization of novel, but similar, tasks. The presented techniques not only scale up quality diversity algorithms to high dimensions, but show that black-box optimization encodings can be automatically learned, rather than hand designed.
This paper introduces FaceHaptics, a novel haptic display based on a robot arm attached to a head-mounted virtual reality display. It provides localized, multi-directional and movable haptic cues in the form of wind, warmth, moving and single-point touch events and water spray to dedicated parts of the face not covered by the head-mounted display.The easily extensible system, however, can principally mount any type of compact haptic actuator or object. User study 1 showed that users appreciate the directional resolution of cues, and can judge wind direction well, especially when they move their head and wind direction is adjusted dynamically to compensate for head rotations. Study 2 showed that adding FaceHaptics cues to a VR walkthrough can significantly improve user experience, presence, and emotional responses.
Abschlussbericht zum BMBF-Fördervorhaben Enabling Infrastructure for HPC-Applications (EI-HPC)
(2020)
Quantum mechanical theories are used to search and optimized the conformations of proposed small molecule candidates for treatment of SARS-CoV-2. These candidate compounds are taken from what is reported in the news and in other pre-peer-reviewed literature (e.g. ChemRxiv, bioRxiv). The goal herein is to provided predicted structures and relative conformational stabilities for selected drug and ligand candidates, in the hopes that other research groups can make use of them for developing a treatment.
Failure prognostic builds up on constant data acquisition and processing and fault diagnosis and is an essential part of predictive maintenance of smart manufacturing systems enabling condition based maintenance, optimised use of plant equipment, improved uptime and yield and to prevent safety problems. Given known control inputs into a plant and real sensor outputs or simulated measurements, the model-based part of the proposed hybrid method provides numerical values of unknown parameter degradation functions at sampling time points by the evaluation of equations that have been derived offline from a bicausal diagnostic bond graph. These numerical values are computed concurrently to the constant monitoring of a system and are stored in a buffer of fixed length. The data-driven part of the method provides a sequence of remaining useful life estimates by repeated projection of the parameter degradation into the future based on the use of values in a sliding time window. Existing software can be used to determine the best fitting function and can account for its random parameters. The continuous parameter estimation and their projection into the future can be performed in parallel for multiple isolated simultaneous parametric faults on a multicore, multiprocessor computer.
The proposed hybrid bond graph model-based, data-driven method is verified by an offline simulation case study of a typical power electronic circuit. It can be used to implement embedded systems that enable cooperating machines in smart manufacturing to perform prognostic themselves.
Zur Schätzung der Exposition von Oberflächengewässern durch Pflanzenschutzmittel werden PEC-Werte mit Hilfe eines probabilistischen Verfahrens ermittelt. Hierfür werden zunächst verschiedene Regressionsanalysen zur Modellierung der Abdrift durchgeführt. Anschließend wird die ausgewählte Abdriftverteilung mit verschiedenen Verteilungsansätzen für die Aufwandmenge und das Gewässervolumen kombiniert.
Grasp verification is advantageous for autonomous manipulation robots as they provide the feedback required for higher level planning components about successful task completion. However, a major obstacle in doing grasp verification is sensor selection. In this paper, we propose a vision based grasp verification system using machine vision cameras, with the verification problem formulated as an image classification task. Machine vision cameras consist of a camera and a processing unit capable of on-board deep learning inference. The inference in these low-power hardware are done near the data source, reducing the robot's dependence on a centralized server, leading to reduced latency, and improved reliability. Machine vision cameras provide the deep learning inference capabilities using different neural accelerators. Although, it is not clear from the documentation of these cameras what is the effect of these neural accelerators on performance metrics such as latency and throughput. To systematically benchmark these machine vision cameras, we propose a parameterized model generator that generates end to end models of Convolutional Neural Networks(CNN). Using these generated models we benchmark latency and throughput of two machine vision cameras, JeVois A33 and Sipeed Maix Bit. Our experiments demonstrate that the selected machine vision camera and the deep learning models can robustly verify grasp with 97% per frame accuracy.
In optimization methods that return diverse solution sets, three interpretations of diversity can be distinguished: multi-objective optimization which searches diversity in objective space, multimodal optimization which tries spreading out the solutions in genetic space, and quality diversity which performs diversity maintenance in phenotypic space. We introduce niching methods that provide more flexibility to the analysis of diversity and a simple domain to compare and provide insights about the paradigms. We show that multiobjective optimization does not always produce much diversity, quality diversity is not sensitive to genetic neutrality and creates the most diverse set of solutions, and multimodal optimization produces higher fitness solutions. An autoencoder is used to discover phenotypic features automatically, producing an even more diverse solution set. Finally, we make recommendations about when to use which approach.
Die Wahrnehmung des perzeptionellen Aufrecht (perceptual upright, PU) variiert in Abhängigkeit der Gewichtung verschiedener gravitationsbezogener und körperbasierter Merkmale zwischen Kontexten und aufgrund individueller Unterschiede. Ziel des Vorhabens war es, systematisch zu untersuchen, welche Zusammenhänge zwischen visuellen und gravitationsbedingten Merkmalen bestehen. Das Vorhaben baute auf vorangegangen Untersuchungen auf, deren Ergebnisse indizieren, dass eine Gravitation von ca. 0,15g notwendig ist, um effiziente Selbstorientierungsinformationen bereit zu stellen (Herpers et. al, 2015; Harris et. al, 2014).
In dem hier beschriebenen Vorhaben wurden nun gezielt künstliche Gravitationsbedingungen berücksichtigt, um die Gravitationsschwelle, ab der ein wahrnehmbarer Einfluss beobachtbar ist, genauer zu quantifizieren bzw. die oben genannte Hypothese zu bestätigen. Es konnte gezeigt werden, dass die zentripetale Kraft, die auf einer rotierenden Zentrifuge entlang der Längsachse des Körpers wirkt, genauso efektiv wie Stehen mit normaler Schwerkraft ist, um das Gefühl des perzeptionellen Aufrechts auszulösen. Die erzielten Daten deuten zudem darauf hin, dass ein Gravitationsfeld von mindestens 0,15 g notwendig ist, um eine efektive Orientierungsinformation für die Wahrnehmung von Aufrecht zu liefern. Dies entspricht in etwa der Gravitationskraft von 0,17 g, die auf dem Mond besteht. Für eine lineare Beschleunigung des Körpers liegt der vestibulare Schwellenwert bei etwa 0,1 m/s2 und somit liegt der Wert für die Situation auf dem Mond von 1,6 m/s2 deutlich über diesem Schwellenwert.
AErOmAt Abschlussbericht
(2020)
Das Projekt AErOmAt hatte zum Ziel, neue Methoden zu entwickeln, um einen erheblichen Teil aerodynamischer Simulationen bei rechenaufwändigen Optimierungsdomänen einzusparen. Die Hochschule Bonn-Rhein-Sieg (H-BRS) hat auf diesem Weg einen gesellschaftlich relevanten und gleichzeitig wirtschaftlich verwertbaren Beitrag zur Energieeffizienzforschung geleistet. Das Projekt führte außerdem zu einer schnelleren Integration der neuberufenen Antragsteller in die vorhandenen Forschungsstrukturen.
This paper presents groupware to study group behavior while conducting a creative task on large, high-resolution displays. Moreover, we present the results of a between-subjects study. In the study, 12 groups with two participants each prototyped a 2D level on a 7m x 2.5m large, high-resolution display using tablet-PCs for interaction. Six groups underwent a condition where group members had equal roles and interaction possibilities. Another six groups worked in a condition where group members had different roles: level designer and 2D artist. The results revealed that in the different roles condition, the participants worked significantly more tightly and created more assets. We could also detect some shortcomings for that configuration. We discuss the gained insights regarding system configuration, groupware interfaces, and groups behavior.
The way solutions are represented, or encoded, is usually the result of domain knowledge and experience. In this work, we combine MAP-Elites with Variational Autoencoders to learn a Data-Driven Encoding (DDE) that captures the essence of the highest-performing solutions while still able to encode a wide array of solutions. Our approach learns this data-driven encoding during optimization by balancing between exploiting the DDE to generalize the knowledge contained in the current archive of elites and exploring new representations that are not yet captured by the DDE. Learning representation during optimization allows the algorithm to solve high-dimensional problems, and provides a low-dimensional representation which can be then be re-used. We evaluate the DDE approach by evolving solutions for inverse kinematics of a planar arm (200 joint angles) and for gaits of a 6-legged robot in action space (a sequence of 60 positions for each of the 12 joints). We show that the DDE approach not only accelerates and improves optimization, but produces a powerful encoding that captures a bias for high performance while expressing a variety of solutions.
Modern Monte-Carlo-based rendering systems still suffer from the computational complexity involved in the generation of noise-free images, making it challenging to synthesize interactive previews. We present a framework suited for rendering such previews of static scenes using a caching technique that builds upon a linkless octree. Our approach allows for memory-efficient storage and constant-time lookup to cache diffuse illumination at multiple hitpoints along the traced paths. Non-diffuse surfaces are dealt with in a hybrid way in order to reconstruct view-dependent illumination while maintaining interactive frame rates. By evaluating the visual fidelity against ground truth sequences and by benchmarking, we show that our approach compares well to low-noise path-traced results, but with a greatly reduced computational complexity, allowing for interactive frame rates. This way, our caching technique provides a useful tool for global illumination previews and multi-view rendering.
Modern Monte-Carlo-based rendering systems still suffer from the computational complexity involved in the generation of noise-free images, making it challenging to synthesize interactive previews. We present a framework suited for rendering such previews of static scenes using a caching technique that builds upon a linkless octree. Our approach allows for memory-efficient storage and constant-time lookup to cache diffuse illumination at multiple hitpoints along the traced paths. Non-diffuse surfaces are dealt with in a hybrid way in order to reconstruct view-dependent illumination while maintaining interactive frame rates. By evaluating the visual fidelity against ground truth sequences and by benchmarking, we show that our approach compares well to low-noise path traced results, but with a greatly reduced computational complexity allowing for interactive frame rates. This way, our caching technique provides a useful tool for global illumination previews and multi-view rendering.
An essential measure of autonomy in service robots designed to assist humans is adaptivity to the various contexts of human-oriented tasks. These robots may have to frequently execute the same action, but subject to subtle variations in task parameters that determine optimal behaviour. Such actions are traditionally executed by robots using pre-determined, generic motions, but a better approach could utilize robot arm maneuverability to learn and execute different trajectories that work best in each context.
In this project, we explore a robot skill acquisition procedure that allows incorporating contextual knowledge, adjusting executions according to context, and improvement through experience, as a step towards more adaptive service robots. We propose an apprenticeship learning approach to achieving context-aware action generalisation on the task of robot-to-human object hand-over. The procedure combines learning from demonstration, with which a robot learns to imitate a demonstrator’s execution of the task, and a reinforcement learning strategy, which enables subsequent experiential learning of contextualized policies, guided by information about context that is integrated into the learning process. By extending the initial, static hand-over policy to a contextually adaptive one, the robot derives and executes variants of the demonstrated action that most appropriately suit the current context. We use dynamic movement primitives (DMPs) as compact motion representations, and a model-based Contextual Relative Entropy Policy Search (C-REPS) algorithm for learning policies that can specify hand-over position, trajectory shape, and execution speed, conditioned on context variables. Policies are learned using simulated task executions, before transferring them to the robot and evaluating emergent behaviours.
We demonstrate the algorithm’s ability to learn context-dependent hand-over positions, and new trajectories, guided by suitable reward functions, and show that the current DMP implementation limits learning context-dependent execution speeds. We additionally conduct a user study involving participants assuming different postures and receiving an object from the robot, which executes hand-overs by either exclusively imitating a demonstrated motion, or selecting hand-over positions based on learned contextual policies and adapting its motion accordingly. The results confirm the hypothesized improvements in the robot’s perceived behaviour when it is context-aware and adaptive, and provide useful insights that can inform future developments.
Evaluation and Optimization of IEEE802.11 multi-hop Backhaul Networks with Directional Antennas
(2020)
A major problem for rural areas is the inaccessibility to affordable broadband Internet connections. In these areas distances are large, and digging a cable into the ground is extremely expensive, considering the small number of potential customers at the end of that cable. This leads to a digital divide, where urban areas enjoy a high-quality service at low cost, while rural areas suffer from the reverse.
This work is dedicated to an alternative technical approach aiming to reduce the cost for Internet Service Provider in rural areas: WiFi-based Long Distance networks. A set of significant contributions of technology related aspects of WiFi-based Long Distance networks is described in three different fields: Propagation on long distance Wi-Fi links, MAC-layer scheduling and Interference modeling and Channel Assignment with directional antennas.
For each field, the author composes and discusses the state-of-the-art. Afterwards, the author derives research questions and tackles several open issues to develop these kinds of networks further towards a suitable technology for the backhaul segment.
More and more devices will be connected to the internet [3]. Many devicesare part of the so-called Internet of Things (IoT) which contains many low-powerdevices often powered by a battery. These devices mainly communicate with the manufacturers back-end and deliver personal data and secrets like passwords.
Computer graphics research strives to synthesize images of a high visual realism that are indistinguishable from real visual experiences. While modern image synthesis approaches enable to create digital images of astonishing complexity and beauty, processing resources remain a limiting factor. Here, rendering efficiency is a central challenge involving a trade-off between visual fidelity and interactivity. For that reason, there is still a fundamental difference between the perception of the physical world and computer-generated imagery. At the same time, advances in display technologies drive the development of novel display devices. The dynamic range, the pixel densities, and refresh rates are constantly increasing. Display systems enable a larger visual field to be addressed by covering a wider field-of-view, due to either their size or in the form of head-mounted devices. Currently, research prototypes are ranging from stereo and multi-view systems, head-mounted devices with adaptable lenses, up to retinal projection, and lightfield/holographic displays. Computer graphics has to keep step with, as driving these devices presents us with immense challenges, most of which are currently unsolved. Fortunately, the human visual system has certain limitations, which means that providing the highest possible visual quality is not always necessary. Visual input passes through the eye’s optics, is filtered, and is processed at higher level structures in the brain. Knowledge of these processes helps to design novel rendering approaches that allow the creation of images at a higher quality and within a reduced time-frame. This thesis presents the state-of-the-art research and models that exploit the limitations of perception in order to increase visual quality but also to reduce workload alike - a concept we call perception-driven rendering. This research results in several practical rendering approaches that allow some of the fundamental challenges of computer graphics to be tackled. By using different tracking hardware, display systems, and head-mounted devices, we show the potential of each of the presented systems. The capturing of specific processes of the human visual system can be improved by combining multiple measurements using machine learning techniques. Different sampling, filtering, and reconstruction techniques aid the visual quality of the synthesized images. An in-depth evaluation of the presented systems including benchmarks, comparative examination with image metrics as well as user studies and experiments demonstrated that the methods introduced are visually superior or on the same qualitative level as ground truth, whilst having a significantly reduced computational complexity.
Foreword to the Special Section on the Symposium on Virtual and Augmented Reality 2019 (SVR 2019)
(2020)
An essential measure of autonomy in assistive service robots is adaptivity to the various contexts of human-oriented tasks, which are subject to subtle variations in task parameters that determine optimal behaviour. In this work, we propose an apprenticeship learning approach to achieving context-aware action generalization on the task of robot-to-human object hand-over. The procedure combines learning from demonstration and reinforcement learning: a robot first imitates a demonstrator’s execution of the task and then learns contextualized variants of the demonstrated action through experience. We use dynamic movement primitives as compact motion representations, and a model-based C-REPS algorithm for learning policies that can specify hand-over position, conditioned on context variables. Policies are learned using simulated task executions, before transferring them to the robot and evaluating emergent behaviours. We additionally conduct a user study involving participants assuming different postures and receiving an object from a robot, which executes hand-overs by either imitating a demonstrated motion, or adapting its motion to hand-over positions suggested by the learned policy. The results confirm the hypothesized improvements in the robot’s perceived behaviour when it is context-aware and adaptive, and provide useful insights that can inform future developments.
Modern Monte-Carlo-based rendering systems still suffer from the computational complexity involved in the generation of noise-free images, making it challenging to synthesize interactive previews. We present a framework suited for rendering such previews ofstatic scenes using a caching technique that builds upon a linkless octree. Our approach allows for memory-efficient storage and constant-time lookup to cache diffuse illumination at multiple hitpoints along the traced paths. Non-diffuse surfaces are dealt with in a hybrid way in order to reconstruct view-dependent illumination while maintaining interactive frame rates. By evaluating the visual fidelity against ground truth sequences and by benchmarking, we show that our approach compares well to low-noise path traced results, but with a greatly reduced computational complexity allowing for interactive frame rates. This way, our caching technique provides a useful tool for global illumination previews and multi-view rendering.