Refine
H-BRS Bibliography
- yes (186) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (186) (remove)
Document Type
- Article (186) (remove)
Year of publication
Has Fulltext
- no (186) (remove)
Keywords
- Virtual reality (5)
- Datenanalyse (3)
- Sicherheitslücke (3)
- post-buckling (3)
- virtual reality (3)
- 3D user interface (2)
- ARIMA (2)
- ARRs (2)
- Augmented Reality (2)
- Datenschutz (2)
- Datensicherheit (2)
- ERP (2)
- Force field (2)
- Intelligent Transport System (2)
- Navigation (2)
- Optimization (2)
- Performance (2)
- Privacy (2)
- Security (2)
- Software (2)
- Software-Werkzeug (2)
- Unternehmen (2)
- Vehicular Ad hoc Networks (2)
- Visualization (2)
- adaptive fault thresholds (2)
- confidence level (2)
- data filtering (2)
- incremental bond graphs (2)
- neural network (2)
- nonlinear stability (2)
- parallel breadth-first search (2)
- short-term load forecasting (2)
- usable privacy (2)
- 3D nucleus (1)
- 3D real-time echocardiography (1)
- 3D user interfaces (1)
- ABT-737 (1)
- ACPYPE (1)
- AD (1)
- ALPS (1)
- AMBER (1)
- Absolute nodal coordinate formulation (1)
- Active vision interface (1)
- Acute lymphoblastic leukemia (1)
- Adaptive Control (1)
- Advanced Driver Assistance Systems (1)
- Affordances (1)
- Alkane (1)
- Altenhilfe (1)
- Antifuse memory (1)
- Assekuranz (1)
- Auditory Cueing (1)
- Augmented reality (1)
- Automation (1)
- Automatisierte Prozesse Rekonstruktio (1)
- Autonomy (1)
- Autotuning (1)
- Available Bandwidth (1)
- B-cell lymphoma (1)
- B2T (1)
- BCL2 (1)
- BFS (1)
- BH3-mimetic inhibitor (1)
- BPMS (1)
- Background music (1)
- Ball tracking (1)
- Bandwidth Estimation (1)
- Basis set (1)
- Bayesian Network (1)
- Bayesian optimization (1)
- Bayessches Netz (1)
- Begriffsbestimmung (1)
- Behörde (1)
- Benchmarking (1)
- Bewertung (1)
- Blasendiagramm (1)
- Blocking (1)
- Bond Graph modelling and simulation (1)
- Bond graph modelling (1)
- Bond graphs (1)
- Bundesrepublik Deutschland (1)
- Bundesverfassungsgericht (1)
- Business (1)
- Business Process Intelligence (1)
- Business-to-Thing (1)
- CAS (1)
- CIBERSORT (1)
- CMMN (1)
- CREBBP (1)
- Canonical form of state equations and standard interconnection form for robustness study (1)
- Capability framework (1)
- Capacity (1)
- Carbohydrate (1)
- Case Management Model and Notation (1)
- Chalcogenide glass sensor (1)
- Challenges (1)
- Chip ID (1)
- Circular saws (1)
- Classifiers (1)
- Cloud computing (1)
- Co-rotational formulation (1)
- Cognition (1)
- Cognitive informatics (1)
- Company (1)
- Computational causality (1)
- Computational chemistry (1)
- Computational modeling (1)
- Computer (1)
- Computer Automated Design (1)
- Computer Graphics (1)
- Computer Vision System (1)
- Computerkriminalitaet (1)
- Conformation (1)
- Congenital heart disease (1)
- Cooperative Awareness Message (1)
- Counterfeit protection (1)
- Coupled process (1)
- Cross-sensitivity (1)
- Crystal structure (1)
- Curriculum (1)
- Cybersickness (1)
- Datenbasierte Prozessanalyse (1)
- Decision Diagram (1)
- Decision Network (1)
- Decision Support (1)
- Demenz (1)
- Diagnostic bond graphs (1)
- Dienstgütevereinbarung (1)
- Digitisation (1)
- Disco (1)
- Discrete cosine transform (1)
- Displacement (1)
- Domain-Specific Languages (1)
- Domestic service robots (1)
- Drosophila (1)
- Drug resistance (1)
- EEG (1)
- ELM (1)
- EM leakage (1)
- EN-12299 (1)
- ERP system (1)
- Educational Data Mining (1)
- Educational Process Mining (1)
- Efficiency (1)
- Einflussdiagramm (1)
- Electric mobility (1)
- Electronic commerce (1)
- Electronic tongue (1)
- Emotion (1)
- Empfehlung (1)
- Empirical formula (1)
- Encryption (1)
- Enterprise Resource Planning Software (1)
- Enterprise Resource Planning System (1)
- Entscheidungsunterstützung (1)
- Escape analysis (1)
- Euler–Bernoulli beam (1)
- Event detection (1)
- Ewing´s Sarcoma Family of Tumors (1)
- Exchange and reuse of bond graph models (1)
- Exercise (1)
- Expert system (1)
- External faults (1)
- FDI (1)
- FGR (1)
- Face and hand gesture recognition (1)
- Factory instrumentation (1)
- Fallbeschreibung (1)
- Fas (1)
- Fault handling (1)
- Fehlertoleranz (1)
- Female (1)
- Field sequential imaging (1)
- Finite element modelling (1)
- Flexible multibody system (1)
- Fluency (1)
- Focus plus context (1)
- Foreground segmentation (1)
- Formal definition and validation of the content of a model description (1)
- Forms of mathematical models (1)
- Functional Programming (1)
- Funktionsprinzip (1)
- Fuzzy Mining (1)
- Fuzzy logic (1)
- Fuzzy-System (1)
- GDPR (1)
- Gabor filter (1)
- Games (1)
- Garbage collection (1)
- Gaze-contingent depth-of-field (1)
- Genetic Predisposition to Disease (1)
- Genetic algorithm (1)
- Gesamt-Exom-Sequenzierung (1)
- Geschäftsprozess (1)
- Glycam06 (1)
- Goal Programming (1)
- Gromacs (1)
- HDAC inhibitor (1)
- HIF1α (1)
- Hacker-Angriff (1)
- Hacking-Technik (1)
- Hand injuries (1)
- Handlungsempfehlung (1)
- Head Mounted Display (1)
- Head-mounted Display (1)
- High hyperdiploidy (1)
- High-resolution displays (1)
- High-speed railway track (1)
- Histograms (1)
- Human computer interaction (1)
- Human factors (1)
- Human robot interaction (1)
- Humans (1)
- Hybrid systems (1)
- Hydraulic orifices (1)
- Hydrocarbon (1)
- IC identification (1)
- IT professionals (1)
- IT-Verfügbarkeit (1)
- IaaS (1)
- Ikaros (1)
- Image Processing (1)
- Immersion (1)
- Incremental bond graph (1)
- Inductive Visual Mining (1)
- Industry 4.0 (1)
- Influence Diagram (1)
- Informationssicherheit (1)
- Informationstechnik (1)
- Integral backstepping technique (1)
- Intel Xeon Phi (1)
- Interaction Patterns (1)
- Internet (1)
- Internet of Things (1)
- It-Diensteanbieter (1)
- Java virtual machine (1)
- Kartographie (1)
- Key recovery (1)
- KiBP (1)
- Knowledge Worker (1)
- Knowledge-intensive Business Process (1)
- Kopie digitaler Daten (1)
- Laminar and turbulent flow (1)
- Language learning (1)
- Langzeitbehandlung (1)
- Lattice Boltzmann Method (1)
- Leakage circuits (1)
- Leistungsdaten (1)
- Library model (1)
- Ligands (1)
- Light curtain (1)
- Linear Optimization (1)
- Linear Programming (1)
- Linear quadratic regulator (1)
- Lineare Optimierung (1)
- Locomotion (1)
- MAP-Elites (1)
- MP2.5 (1)
- Machine Learning (1)
- Machine learning (1)
- Male (1)
- Malware (1)
- Manipulation tasks (1)
- Mathematical methods (1)
- Maximal covering location problem (1)
- Measurement (1)
- Media in education (1)
- Memory (1)
- Memory management (1)
- Methodenanalyse (1)
- Methodologies (1)
- Microsoft CRM 2013 (1)
- Mobile robotics (1)
- Mode switching LTI model (1)
- Mode-dependent ARRs (1)
- Model-based failure prognosis (1)
- Model-free control (1)
- Modellbildung (1)
- Modelling (1)
- Molecular structure (1)
- Monitoring (1)
- Motion (1)
- Motion Sickness (1)
- Multi-component heavy metal solution (1)
- Multi-objective (1)
- Multi-stage (1)
- Multibody systems (1)
- Multidisciplinary systems (1)
- Multisensory cues (1)
- N200 (1)
- NFKB (1)
- NUMA (1)
- Naive physics (1)
- Nonbonded scaling factor (1)
- Nonlinear control quadrotor uav (1)
- Nutzung (1)
- Nvidia graphic processors (1)
- Object detection (1)
- Object recognition (1)
- Object-oriented physical systems modelling (1)
- Online-Überwachung (1)
- Ontology (1)
- Open innovation (1)
- OpenMP (1)
- Optical flow (1)
- Out-of-view Objects (1)
- Outside-in process (1)
- P300 (1)
- PSD (1)
- PaaS (1)
- Parameter degradation model (1)
- Parameter uncertainties (1)
- Pedigree (1)
- Perception (1)
- Pflegepersonal (1)
- Plan-based robot control (1)
- Polymorphism, Single Nucleotide (1)
- Precursor B-Cell Lymphoblastic Leukemia-Lymphoma/genetics (1)
- Prescriptive Analytics (1)
- Presence (1)
- Pressure wire (1)
- Pressure-volume relation (1)
- ProM (1)
- Process Mining (1)
- Process views (1)
- Programmsicherheit (1)
- Pronunciation (1)
- Protective system (1)
- Prozessanalyse (1)
- Prozessmanagement (1)
- Prozessoptimierung (1)
- Präskriptive Analytik (1)
- Pseudonym Concept (1)
- Public Key Infrastructure (1)
- Quality Diversity (1)
- Quality diversity (1)
- Quality of Service (1)
- RAS (1)
- RFID (1)
- RMS acceleration (1)
- Raman spectroscopy (1)
- Rapid Prototyping (1)
- RapidMiner (1)
- Ray tracing (1)
- Reader (1)
- Real-time image processing (1)
- Reasoning (1)
- Recht (Gesetzgebung) (1)
- Recommendation (1)
- Relapse (1)
- Remaining Useful Life (1)
- RoboCup industrial (1)
- Robotersteuerung (1)
- Robotics (1)
- Robustness (1)
- Rule-based production systems (1)
- SAHA (1)
- SIMPACK (1)
- SOA (1)
- STAT3 (1)
- SVM (1)
- SaaS (1)
- Saccades (1)
- Saccadic suppression (1)
- Safety guard (1)
- Schadenanalyse (1)
- Schadensprozess (1)
- Schutzmaßnahme (1)
- Security architecture (1)
- Security level (1)
- Semantic scene understanding (1)
- Sense of presence (1)
- Service-Level-Agreement (1)
- Service-Roboter (1)
- Service-based cloud computing (1)
- Shadow detection (1)
- Sicherheit (1)
- Sicherheitsarchitektur (1)
- Sicherheitsniveau (1)
- Side channels (1)
- Signal detection (1)
- Signal processing (1)
- Simulation (1)
- Single Instruction Multiple Data (SIMD) (1)
- Single-objective (1)
- Skalierbarkeit (1)
- Smart Card (1)
- Smart Card User Interface Design, Interactive Smart Card Applications (1)
- Smart factory (1)
- Social intelligence (1)
- Sociomateriality (1)
- Software-Fehler (1)
- Software-Lebenszyklus (1)
- Software-Sicherheit (1)
- Software-Test (1)
- Software-Testautomatisierung (1)
- SpMV (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Spherical treadmill (1)
- Stabilitätsanalyse (1)
- Stream cipher (1)
- Studenten (1)
- Studienverlauf (1)
- Support Vector Machine (1)
- Surrogate Modeling (1)
- System health monitoring (1)
- TP53 (1)
- Tag (1)
- Taxonomie (1)
- Taxonomy (1)
- Technologie (1)
- Teleconferencing system (1)
- Testing (1)
- Text detection (1)
- Text recognition (1)
- Therapy (1)
- Throughput (1)
- Tracking (1)
- Transformations between various description formats (1)
- Transponder (1)
- Travel Techniques (1)
- Treatment of discontinuities and singularities in ordinary differential equations (1)
- UAV (1)
- Umgebung (Umwelt) (1)
- Unterstützung (1)
- Usability (1)
- Usable Security (1)
- User engagement (1)
- User interface (1)
- User interfaces (1)
- Vector Units (1)
- Vehicle-2-Vehicle Communication (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Vehicle Com- munication (1)
- Verfassungsbeschwerde (1)
- Verschlüsselung (1)
- Versicherung (1)
- Vertrag (1)
- Vertragsbeendigung (1)
- Vertragspartner (1)
- Vertriebssysteme (1)
- Video surveillance (1)
- Virtual Environment (1)
- Virtual Memory Palace (1)
- Virtual Reality (1)
- Visual Cueing (1)
- Visual Discrimination (1)
- Visual perception (1)
- Watermarking (1)
- Wissensarbeiter (1)
- Wissensintensiver Geschäftsprozess (1)
- XML schema for bond graph models (1)
- YAWL (1)
- Zielprogrammierung (1)
- acute (1)
- aerodynamics (1)
- allopurinol (1)
- antibody deficiency (1)
- apoptosis (1)
- architectural distortion (1)
- atomic operation (1)
- autoimmune lymphoproliferative syndrome (1)
- autoinflammatory disease (1)
- automated 3D scanning (1)
- back-of-device interaction (1)
- bond graph (1)
- bond graph modelling (1)
- breast cancer (1)
- cancer (1)
- childhood (1)
- childhood cancer syndrome (1)
- complete basis set limit (1)
- concrete plate (1)
- constitutional mismatch repair syndrome (1)
- constructive process deviance (1)
- curved shell (1)
- cyanide (1)
- cybersickness (1)
- data locality (1)
- design process (1)
- detection (1)
- displacement measurement (1)
- distance perception (1)
- dynamic vector fields (1)
- electrochemical sensor (1)
- enterprise software (1)
- erbliche Krebssyndrome (1)
- estimation (1)
- execution (1)
- extreme learning machine (1)
- eye-tracking (1)
- fault detection (1)
- felt obligations (1)
- finite element method (1)
- flight zone (1)
- flying (1)
- force sensing (1)
- foveated rendering (1)
- free and open source software (1)
- frequency (1)
- fuel (1)
- general plate theory (1)
- genes (1)
- genetic testing (1)
- genetics (1)
- genetische Testung (1)
- geofence (1)
- graphene oxide powder (1)
- graphene oxide powders (1)
- guidance (1)
- haptic interfaces (1)
- heavy metal (1)
- high speed railway vehicle (1)
- human computer interaction (1)
- human-centred design (1)
- hybrid system models (1)
- hydrocarbon (1)
- immunodeficiency (1)
- intervention mechanisms (1)
- intrinsics (1)
- ion-selective electrodes (1)
- irregularity amplitude (1)
- leaning (1)
- leukemia (1)
- lipid (1)
- locomotion (1)
- long short-term memory (1)
- lymphocytic (1)
- memory bandwidth (1)
- micro-benchmarks (1)
- mobile applications (1)
- mobiler Roboter (1)
- modal superposition (1)
- monitoring (1)
- mood (1)
- motion estimation (1)
- motion sickness (1)
- mp2 (1)
- multi-solution optimization (1)
- multisensory cues (1)
- mutation (1)
- nano-composite (1)
- neuro-cognitive performance (1)
- octane (1)
- optic flow (1)
- optical flow (1)
- optical sensor (1)
- optical triangulation (1)
- opto-electronic protective device (1)
- optoelectronic (1)
- parallel work queue (1)
- peripheral vision (1)
- physical activity (1)
- plasma-enhanced CVD (PECVD) (deposition) (1)
- porous material (1)
- power electronic systems (1)
- power spectral density (1)
- pre-optimization (1)
- prefrontal cortex (1)
- privacy by design (1)
- prognosis (1)
- projection based systems (1)
- propan-2-ol (1)
- quantum mechanics (1)
- ray tracing (1)
- redundant work (1)
- refined beam theory (1)
- regression testing (1)
- ride comfort (1)
- robot control architecture (1)
- robot execution failures (1)
- robot introspection (1)
- run-time adaptation (1)
- scalability (1)
- schädliches Programm (1)
- security and privacy literacy (1)
- self-motion perception (1)
- semi-continuous locomotion (1)
- sensor fusion (1)
- server processors (1)
- shared memory (1)
- shell theory (1)
- signal processing algorithm (1)
- simulation (1)
- situation awareness (1)
- skill execution models (1)
- slip detection (1)
- software testing (1)
- spatial augmented reality (1)
- spatial updating (1)
- stiffeners (1)
- system modes (1)
- tactile sensing (1)
- task planning (1)
- teleportation (1)
- telomeres (1)
- test case reduction (1)
- thread mapping (1)
- track irregularity (1)
- transparency-enhancing technologies (1)
- travel techniques (1)
- tumor microenvironment (1)
- tumor-infiltrating immune cells (1)
- unrolling (1)
- vection (1)
- vector units (1)
- view management (1)
- water dimer (1)
- wavelet (1)
- web services (1)
- whole-exome sequencing (1)
- wind nuisance (1)
- workday breaks (1)
- zooming interfaces (1)
- Überwachung (1)
- Wavenet (1)
In the design of robot skills, the focus generally lies on increasing the flexibility and reliability of the robot execution process; however, typical skill representations are not designed for analysing execution failures if they occur or for explicitly learning from failures. In this paper, we describe a learning-based hybrid representation for skill parameterisation called an execution model, which considers execution failures to be a natural part of the execution process. We then (i) demonstrate how execution contexts can be included in execution models, (ii) introduce a technique for generalising models between object categories by combining generalisation attempts performed by a robot with knowledge about object similarities represented in an ontology, and (iii) describe a procedure that uses an execution model for identifying a likely hypothesis of a parameterisation failure. The feasibility of the proposed methods is evaluated in multiple experiments performed with a physical robot in the context of handle grasping, object grasping, and object pulling. The experimental results suggest that execution models contribute towards avoiding execution failures, but also represent a first step towards more introspective robots that are able to analyse some of their execution failures in an explicit manner.
In order to achieve the highest possible performance, the ray traversal and intersection routines at the core of every high-performance ray tracer are usually hand-coded, heavily optimized, and implemented separately for each hardware platform—even though they share most of their algorithmic core. The results are implementations that heavily mix algorithmic aspects with hardware and implementation details, making the code non-portable and difficult to change and maintain.
In this paper, we present a new approach that offers the ability to define in a functional language a set of conceptual, high-level language abstractions that are optimized away by a special compiler in order to maximize performance. Using this abstraction mechanism we separate a generic ray traversal and intersection algorithm from its low-level aspects that are specific to the target hardware. We demonstrate that our code is not only significantly more flexible, simpler to write, and more concise but also that the compiled results perform as well as state-of-the-art implementations on any of the tested CPU and GPU platforms.
Using Visual and Auditory Cues to Locate Out-of-View Objects in Head-Mounted Augmented Reality
(2021)
Comparing Non-Visual and Visual Guidance Methods for Narrow Field of View Augmented Reality Displays
(2020)
Maßgefertigte Abläufe
(2017)
Foreword to the Special Section on the Symposium on Virtual and Augmented Reality 2019 (SVR 2019)
(2020)
Survival of patients with pediatric acute lymphoblastic leukemia (ALL) after allogeneic hematopoietic stem cell transplantation (allo-SCT) is mainly compromised by leukemia relapse, carrying dismal prognosis. As novel individualized therapeutic approaches are urgently needed, we performed whole-exome sequencing of leukemic blasts of 10 children with post–allo-SCT relapses with the aim of thoroughly characterizing the mutational landscape and identifying druggable mutations. We found that post–allo-SCT ALL relapses display highly diverse and mostly patient-individual genetic lesions. Moreover, mutational cluster analysis showed substantial clonal dynamics during leukemia progression from initial diagnosis to relapse after allo-SCT. Only very few alterations stayed constant over time. This dynamic clonality was exemplified by the detection of thiopurine resistance-mediating mutations in the nucleotidase NT5C2 in 3 patients’ first relapses, which disappeared in the post–allo-SCT relapses on relief of selective pressure of maintenance chemotherapy. Moreover, we identified TP53 mutations in 4 of 10 patients after allo-SCT, reflecting acquired chemoresistance associated with selective pressure of prior antineoplastic treatment. Finally, in 9 of 10 children’s post–allo-SCT relapse, we found alterations in genes for which targeted therapies with novel agents are readily available. We could show efficient targeting of leukemic blasts by APR-246 in 2 patients carrying TP53 mutations. Our findings shed light on the genetic basis of post–allo-SCT relapse and may pave the way for unraveling novel therapeutic strategies in this challenging situation.
Dysregulation of IL12 Signaling As a Novel Cause of an Autoimmune Lymphoproliferative like Syndrome
(2014)
This work addresses the issue of finding an optimal flight zone for a side-by-side tracking and following Unmanned Aerial Vehicle(UAV) adhering to space-restricting factors brought upon by a dynamic Vector Field Extraction (VFE) algorithm. The VFE algorithm demands a relatively perpendicular field of view of the UAV to the tracked vehicle, thereby enforcing the space-restricting factors which are distance, angle and altitude. The objective of the UAV is to perform side-by-side tracking and following of a lightweight ground vehicle while acquiring high quality video of tufts attached to the side of the tracked vehicle. The recorded video is supplied to the VFE algorithm that produces the positions and deformations of the tufts over time as they interact with the surrounding air, resulting in an airflow model of the tracked vehicle. The present limitations of wind tunnel tests and computational fluid dynamics simulation suggest the use of a UAV for real world evaluation of the aerodynamic properties of the vehicle’s exterior. The novelty of the proposed approach is alluded to defining the specific flight zone restricting factors while adhering to the VFE algorithm, where as a result we were capable of formalizing a locally-static and a globally-dynamic geofence attached to the tracked vehicle and enclosing the UAV.
Herein we report an update to ACPYPE, a Python3 tool that now properly converts AMBER to GROMACS topologies for force fields that utilize nondefault and nonuniform 1–4 electrostatic and nonbonded scaling factors or negative dihedral force constants. Prior to this work, ACPYPE only converted AMBER topologies that used uniform, default 1–4 scaling factors and positive dihedral force constants. We demonstrate that the updated ACPYPE accurately transfers the GLYCAM06 force field from AMBER to GROMACS topology files, which employs non-uniform 1–4 scaling factors as well as negative dihedral force constants. Validation was performed using β-d-GlcNAc through gas-phase analysis of dihedral energy curves and probability density functions. The updated ACPYPE retains all of its original functionality, but now allows the simulation of complex glycomolecular systems in GROMACS using AMBER-originated force fields. ACPYPE is available for download at https://github.com/alanwilter/acpype.
Treatment options for acute myeloid leukemia (AML) remain extremely limited and associated with significant toxicity. Nicotinamide phosphoribosyltransferase (NAMPT) is involved in the generation of NAD+ and a potential therapeutic target in AML. We evaluated the effect of KPT-9274, a p21-activated kinase 4/NAMPT inhibitor that possesses a unique NAMPT-binding profile based on in silico modeling compared with earlier compounds pursued against this target. KPT-9274 elicited loss of mitochondrial respiration and glycolysis and induced apoptosis in AML subtypes independent of mutations and genomic abnormalities. These actions occurred mainly through the depletion of NAD+, whereas genetic knockdown of p21-activated kinase 4 did not induce cytotoxicity in AML cell lines or influence the cytotoxic effect of KPT-9274. KPT-9274 exposure reduced colony formation, increased blast differentiation, and diminished the frequency of leukemia-initiating cells from primary AML samples; KPT-9274 was minimally cytotoxic toward normal hematopoietic or immune cells. In addition, KPT-9274 improved overall survival in vivo in 2 different mouse models of AML and reduced tumor development in a patient-derived xenograft model of AML. Overall, KPT-9274 exhibited broad preclinical activity across a variety of AML subtypes and warrants further investigation as a potential therapeutic agent for AML.
In recent years, a variety of methods have been introduced to exploit the decrease in visual acuity of peripheral vision, known as foveated rendering. As more and more computationally involved shading is requested and display resolutions increase, maintaining low latencies is challenging when rendering in a virtual reality context. Here, foveated rendering is a promising approach for reducing the number of shaded samples. However, besides the reduction of the visual acuity, the eye is an optical system, filtering radiance through lenses. The lenses create depth-of-field (DoF) effects when accommodated to objects at varying distances. The central idea of this article is to exploit these effects as a filtering method to conceal rendering artifacts. To showcase the potential of such filters, we present a foveated rendering system, tightly integrated with a gaze-contingent DoF filter. Besides presenting benchmarks of the DoF and rendering pipeline, we carried out a perceptual study, showing that rendering quality is rated almost on par with full rendering when using DoF in our foveated mode, while shaded samples are reduced by more than 69%.
For many different applications, current information about the bandwidth-related metrics of the utilized connection is very useful as they directly impact the performance of throughput sensitive applications such as streaming servers, IPTV and VoIP applications. In literature, several tools have been proposed to estimate major bandwidth-related metrics such as capacity, available bandwidth and achievable throughput. The vast majority of these tools fall into one of Packet Pair (PP), Variable Packet Size (VPS), Self-Loading of Periodic Streams (SLoPS) or Throughput approaches. In this study, seven popular bandwidth estimation tools including nettimer, pathrate, pathchar, pchar, clink, pathload and iperf belonging to these four well-known estimation techniques are presented and experimentally evaluated in a controlled testbed environment. Differently from the rest of studies in literature, all tools have been uniformly classified and evaluated according to an objective and sophisticated classification and evaluation scheme. The performance comparison of the tools incorporates not only the estimation accuracy but also the probing time and overhead caused.
Design optimization techniques are often used at the beginning of the design process to explore the space of possible designs. In these domains illumination algorithms, such as MAP-Elites, are promising alternatives to classic optimization algorithms because they produce diverse, high-quality solutions in a single run, instead of only a single near-optimal solution. Unfortunately, these algorithms currently require a large number of function evaluations, limiting their applicability. In this article we introduce a new illumination algorithm, Surrogate-Assisted Illumination (SAIL), that leverages surrogate modeling techniques to create a map of the design space according to user-defined features while minimizing the number of fitness evaluations. On a two-dimensional airfoil optimization problem SAIL produces hundreds of diverse but high-performing designs with several orders of magnitude fewer evaluations than MAP-Elites or CMA-ES. We demonstrate that SAIL is also capable of producing maps of high-performing designs in realistic three-dimensional aerodynamic tasks with an accurate flow simulation. Data-efficient design exploration with SAIL can help designers understand what is possible, beyond what is optimal, by considering more than pure objective-based optimization.
Preleukemic clones carrying BCR-ABLp190 oncogenic lesions are found in neonatal cord blood, where the majority of preleukemic carriers do not convert into precursor B-cell acute lymphoblastic leukemia (pB-ALL). However, the critical question of how these preleukemic cells transform into pB-ALL remains undefined. Here we model a BCR-ABLp190 preleukemic state and show that limiting BCR-ABLp190 expression to hematopoietic stem/progenitor cells (HS/PC) in mice (Sca1-BCR-ABLp190) causes pB-ALL at low penetrance, which resembles the human disease. pB-ALL blast cells were BCR-ABL-negative and transcriptionally similar to pro-B/pre-B cells, suggesting disease onset upon reduced Pax5 functionality. Consistent with this, double Sca1-BCR-ABLp190+Pax5+/- mice developed pB-ALL with shorter latencies, 90% incidence, and accumulation of genomic alterations in the remaining wild-type Pax5 allele. Mechanistically, the Pax5-deficient leukemic pro-B cells exhibited a metabolic switch towards increased glucose utilization and energy metabolism. Transcriptome analysis revealed that metabolic genes (IDH1, G6PC3, GAPDH, PGK1, MYC, ENO1, ACO1) were upregulated in Pax5-deficient leukemic cells, and a similar metabolic signature could be observed in human leukemia. Our studies unveil the first in vivo evidence that the combination between Sca1-BCR-ABLp190 and metabolic reprogramming imposed by reduced Pax5 expression is sufficient for pB-ALL development. These findings might help to prevent conversion of BCR-ABLp190 preleukemic cells.
Software testing in web services environment faces different challenges in comparison with testing in traditional software environments. Regression testing activities are triggered based on software changes or evolutions. In web services, evolution is not a choice for service clients. They have always to use the current updated version of the software. In addition test execution or invocation is expensive in web services and hence providing algorithms to optimize test case generation and execution is vital. In this environment, we proposed several approach for test cases' selection in web services' regression testing. Testing in this new environment should evolve to be included part of the service contract. Service providers should provide data or usage sessions that can help service clients reduce testing expenses through optimizing the selected and executed test cases.
The Sparse Matrix Vector Multiplication is an important operation on sparse matrices. This operation is the most time consuming operation in iterative solvers and therefore an efficient execution of that operation is of great importance for many applications. Numerous different storage formats that store sparse matrices efficiently have already been established. Often, these storage formats utilize the sparsity pattern of a matrix in an appropiate manner. For one class of sparse matrices the nonzero values occur in small dense blocks and appropriate block storage formats are well suited for such patterns. But on the other side, these formats perform often poor on general matrices without an explicit / regular block structure. In this paper, the newly developed sparse matrix format DynB is introduced. The aim is to efficiently use several optimization approaches and vectorization with current processors, even for matrices without an explicit block structure of nonzero elements. The DynB matrix format uses 2D rectangular blocks of variable size, allowing fill-ins per block of explicit zero values up to a user controllable threshold. We give a simple and fast heuristic to detect such 2D blocks in a sparse matrix. The performance of the Sparse Matrix Vector Multiplication for a selection of different block formats and matrices with different sparsity structures is compared. Results show that the benefit of blocking formats depend – as to be expected – on the structure of the matrix and that variable sized block formats like DynB can have advantages over fixed size formats and deliver good performance results even for general sparse matrices.
A deployment of the Vehicle-2-Vehicle communication technology according to ETSI is in preparation in Europe. Currently, a policy for a necessary Public Key Infrastructure to enrol cryptographic keys and certificates for vehicles and infrastructure component is in discussion to enable an interoperable Vehicle-2-Vehicle communication. Vehicle-2-Vehicle communication means that vehicles periodically send Cooperative Awareness Messages. These messages contain the current geographic position, driving direction, speed, acceleration, and the current time of a vehicle. To protect privacy (location privacy, “speed privacy”) of vehicles and drivers ETSI provides a specific pseudonym concept. We show that the Vehicle-2-Vehicle communication can be misused by an attacker to plot a trace of sequent Cooperative Awareness Messages and to link this trace to a specific vehicle. Such a trace is non-disputable due to the cryptographic signing of the messages. So, the periodically sending of Cooperative Awareness Messages causes privacy problems even if the pseudonym concept is applied.
Infection Exposure Promotes ETV6-RUNX1 Precursor B-cell Leukemia via Impaired H3K4 Demethylases
(2017)
ETV6-RUNX1 is associated with the most common subtype of childhood leukemia. As few ETV6-RUNX1 carriers develop precursor B cell acute lymphocytic leukemia (pB-ALL), the underlying genetic basis for development of full-blown leukemia remains to be identified, but the appearance of leukemia cases in time-space clusters keeps infection as a potential causal factor. Here we present in vivo genetic evidence mechanistically connecting preleukemic ETV6-RUNX1 expression in hematopoetic stem cells/peripheral cells (HSC/PC) and postnatal infections for human-like pB-ALL. In our model, ETV6-RUNX1 conferred a low risk of developing pB-ALL after exposure to common pathogens, corroborating the low incidence observed in humans. Murine preleukemic ETV6-RUNX1 pro/preB cells showed high Rag1/2 expression, known for human ETV6-RUNX1 pB-ALL. Murine and human ETV6-RUNX1 pB-ALL revealed recurrent genomic alterations, with a relevant proportion affecting genes of the lysine demethylase (KDM) family. KDM5C loss-of-function resulted in increased levels of H3K4me3, which co-precipitated with RAG2 in a human cell line model, laying the molecular basis for recombination activity. We conclude that alterations of KDM family members represent a disease-driving mechanism and an explanation for RAG off-target cleavage observed in humans. Our results explain the genetic basis for clonal evolution of an ETV6-RUNX1 preleukemic clone to pB-ALL after infection exposure and offer the possibility of novel therapeutic approaches.
Advances in computer graphics enable us to create digital images of astonishing complexity and realism. However, processing resources are still a limiting factor. Hence, many costly but desirable aspects of realism are often not accounted for, including global illumination, accurate depth of field and motion blur, spectral effects, etc. especially in real‐time rendering. At the same time, there is a strong trend towards more pixels per display due to larger displays, higher pixel densities or larger fields of view. Further observable trends in current display technology include more bits per pixel (high dynamic range, wider color gamut/fidelity), increasing refresh rates (better motion depiction), and an increasing number of displayed views per pixel (stereo, multi‐view, all the way to holographic or lightfield displays). These developments cause significant unsolved technical challenges due to aspects such as limited compute power and bandwidth. Fortunately, the human visual system has certain limitations, which mean that providing the highest possible visual quality is not always necessary. In this report, we present the key research and models that exploit the limitations of perception to tackle visual quality and workload alike. Moreover, we present the open problems and promising future research targeting the question of how we can minimize the effort to compute and display only the necessary pixels while still offering a user full visual experience.
SpMV Runtime Improvements with Program Optimization Techniques on Different Abstraction Levels
(2016)
The multiplication of a sparse matrix with a dense vector is a performance critical computational kernel in many applications, especially in natural and engineering sciences. To speed up this operation, many optimization techniques have been developed in the past, mainly focusing on the data layout for the sparse matrix. Strongly related to the data layout is the program code for the multiplication. But even for a fixed data layout with an accommodated kernel, there are several alternatives for program optimizations. This paper discusses a spectrum of program optimization techniques on different abstraction layers for six different sparse matrix data format and kernels. At the one end of the spectrum, compiler options can be used that hide from the programmer all optimizations done by the compiler internally. On the other end of the spectrum, a multiplication kernel can be programmed that use highly sophisticated intrinsics on an assembler level that ask for a programmer with a deep understanding of processor architectures. These special instructions can be used to efficiently utilize hardware features in processors like vector units that have the potential to speed up sparse matrix computations. The paper compares the programming effort and required knowledge level for certain program optimizations in relation to the gained runtime improvements.
With the rising interest in vehicular communication systems many proposals for secure vehicle-to-vehicle commu- nication were made in recent years. Also, several standard- ization activities concerning the security and privacy measures in these communication systems were initiated in Europe and in US. Here, we discuss some limitations for secure vehicle- to-infrastructure communication in the existing standards of the European Telecommunications Standards Institute. Next, a vulnerability analysis for roadside stations on one side and security and privacy requirements for roadside stations on the other side are given. Afterwards, a proposal for a multi-domain public key architecture for intelligent transport systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, is introduced. The domains of the public key infrastructure are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
The latest advances in the field of smart card technologies allow modern cards to be more than just simple security tokens. Recent developments facilitate the use of interactive components like buttons, displays or even touch-sensors within the card's body thus conquering whole new areas of application. With interactive functionalities the usability aspect becomes the most important one for designing secure and popularly accepted products. Unfortunately, the usability can only be tested fully with completely integrated hence expensive smart card prototypes. This restricts severely application specific research, case studies of new smart card user interfaces and the optimization of design aspects, as well as hardware requirements by making usability and acceptance tests in smart card development very costly and time-consuming. Rapid development and simulation of smart card interfaces and applications can help to avoid this restriction. This paper presents a rapid development process for new smart card interfaces and applications based on common smartphone technology using a tool called SCUID^Sim. We will demonstrate the variety of usability aspects that can be analyzed with such a simulator by discussing some selected example projects.
In this paper, a set of micro-benchmarks is proposed to determine basic performance parameters of single-node mainstream hardware architectures for High Performance Computing. Performance parameters of recent processors, including those of accelerators, are determined. The investigated systems are Intel server processor architectures and the two accelerator lines Intel Xeon Phi and Nvidia graphic processors. Additionally, the performance impact of thread mapping on multiprocessors and Intel Xeon Phi is shown. The results show similarities for some parameters between all architectures, but significant differences for others.
Knowledge-Based Instrumentation and Control for Competitive Industry-Inspired Robotic Domains
(2016)
At present, data publication is one of the most dynamic topics in e-Research. While the fundamental problems of electronic text publication have been solved in the past decade, standards for the external and internal organisation of data repositories are advanced in some research disciplines but underdeveloped in others. We discuss the differences between an electronic text publication and a data publication and the challenges that result from these differences for the data publication process. We place the data publication process in the context of the human knowledge spiral and discuss key factors for the successful acquisition of research data from the point of view of a data repository. For the relevant activities of the publication process, we list some of the measures and best practices of successful data repositories.
We propose an artificial slime mould model (ASMM) inspired by the plasmodium of Physarum polucephalum (P. polucephalum). ASMM consists of plural slimes, and each slime shares energy via a tube with neighboring slimes. Outer slimes sense their environment and conform to it. Outer slimes periodically transmit information about their surrounding environment via a contraction wave to inner slimes. Thus, ASMM shows how slimes can sense a better environment even if that environment is not adjacent to the slimes. The slimes subsequently can move in the direction of an attractant.