Refine
H-BRS Bibliography
- yes (1148) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (1148) (remove)
Document Type
- Conference Object (606)
- Article (265)
- Report (77)
- Part of a Book (50)
- Preprint (50)
- Book (monograph, edited volume) (32)
- Doctoral Thesis (22)
- Conference Proceedings (18)
- Research Data (11)
- Master's Thesis (7)
Year of publication
Keywords
- Virtual Reality (13)
- Robotics (12)
- Machine Learning (10)
- Usable Security (10)
- virtual reality (10)
- 3D user interface (7)
- Quality diversity (7)
- Augmented Reality (6)
- Lehrbuch (6)
- Navigation (6)
- Robotik (6)
- Benchmarking (5)
- CUDA (5)
- Measurement (5)
- Software (5)
- Virtual reality (5)
- Virtuelle Realität (5)
- computer vision (5)
- haptics (5)
- robotics (5)
- ARRs (4)
- Big Data Analysis (4)
- Computer Graphics (4)
- Computer Vision (4)
- Deep Learning (4)
- FDI (4)
- GDPR (4)
- Image Processing (4)
- Knowledge Graphs (4)
- LoRa (4)
- Natural Language Processing (4)
- Open source software (4)
- Perception (4)
- Quality Diversity (4)
- Risk-based Authentication (4)
- Sicherheitslücke (4)
- SpMV (4)
- Taxonomy (4)
- Usable Privacy (4)
- Visualization (4)
- embedded systems (4)
- machine learning (4)
- security (4)
- 802.11 (3)
- Aerodynamics (3)
- Algorithms (3)
- Augmented reality (3)
- BPMS (3)
- Bayesian optimization (3)
- Bioinformatics (3)
- Bond graph modelling (3)
- Computersicherheit (3)
- Cooperative Awareness Message (3)
- Cutting sticks-Problem (3)
- Datenanalyse (3)
- Datenschutz (3)
- Datensicherheit (3)
- ERP (3)
- FPGA (3)
- Force field (3)
- Human-Robot Interaction (3)
- Hyperspectral image (3)
- IP protection (3)
- Intelligent Transport System (3)
- Internet (3)
- LoRaWAN (3)
- MAP-Elites (3)
- Object recognition (3)
- OpenFlow (3)
- Perceptual Upright (3)
- Performance (3)
- Privacy (3)
- Pseudonym Concept (3)
- Ray Tracing (3)
- Ray tracing (3)
- Risk-based Authentication (RBA) (3)
- Robot sensing systems (3)
- Robustness (3)
- Security (3)
- Surrogate Modeling (3)
- Teilsummenaufteilung (3)
- Theoretische Informatik (3)
- Transformers (3)
- UAV (3)
- Vehicular Ad hoc Networks (3)
- WiLD (3)
- clustering (3)
- foveated rendering (3)
- guidance (3)
- incremental bond graphs (3)
- motion estimation (3)
- parallel breadth-first search (3)
- post-buckling (3)
- power electronic systems (3)
- serious games (3)
- simulation (3)
- vection (3)
- virtual environments (3)
- 3D user interfaces (2)
- 3D-Scanner (2)
- AAL-Technik (2)
- AML (2)
- ARIMA (2)
- Active Learning (2)
- Adaptive Case Management (2)
- Algebra (2)
- Alternatives (2)
- Artificial Intelligence (2)
- Authentication (2)
- Authentication features (2)
- Autoencoder (2)
- Automatic Short Answer Grading (2)
- B2T (2)
- BCL2 (2)
- BFS (2)
- Bag of Features (2)
- Black-Box Optimization (2)
- Blocking (2)
- Bond graphs (2)
- Business-to-Thing (2)
- CMMN (2)
- Cognition (2)
- Cognitive robot control (2)
- Compositional Pattern Producing Networks (2)
- Content Module (2)
- Control Systems and Automation (2)
- Curriculum (2)
- Cutting sticks problem (2)
- DPA (2)
- Demenz (2)
- Digitisation (2)
- Disco (2)
- Distributed rendering (2)
- Domestic Robots (2)
- Drosophila (2)
- Dynamic Case Management (2)
- EEG (2)
- Educational institutions (2)
- Electrical Machines and Power Electronics (2)
- Embedded software (2)
- Emotion (2)
- Empirical study (2)
- Encryption (2)
- Engineering (2)
- Enterprise-Resource-Planning (2)
- Evolutionary Computation (2)
- Evolutionary computation (2)
- Evolutionary optimization (2)
- Explainable robotics (2)
- Eye Tracking (2)
- FOS: Computer and information sciences (2)
- Fas (2)
- Fault analysis (2)
- Fault detection and isolation (2)
- Forschungsbericht (2)
- Fuzzy logic (2)
- GPU (2)
- Garbage collection (2)
- Generative Models (2)
- Graphentheorie (2)
- Graphics Cards (2)
- Grasping (2)
- Gravitation (2)
- HSP90 (2)
- Head-mounted Display (2)
- Heart Rate Prediction (2)
- Higher education (2)
- Human computer interaction (2)
- Human factors (2)
- Human-Centered Design (2)
- Human-Centered Robotics (2)
- Human-Computer Interaction (2)
- Humans (2)
- Hybrid systems (2)
- Hyper-parameter Tuning (2)
- IEEE 802.11 (2)
- IEEE802.11 (2)
- Incremental bond graph (2)
- Indirect Encodings (2)
- Inductive Logic Programming (2)
- Informationssicherheit (2)
- Innovation (2)
- Intel Xeon Phi (2)
- Intelligent controls (2)
- Intelligent virtual agents (2)
- Interaction Patterns (2)
- Interaktion (2)
- Internet of Things (2)
- Java virtual machine (2)
- Knowledge Worker (2)
- LOTUS Sensor Node (2)
- Large, high-resolution displays (2)
- Lattice Boltzmann Method (2)
- Learning and Adaptive Systems (2)
- Learning from experience (2)
- Long-Distance WiFi (2)
- Low-Power Wide Area Network (LP-WAN) (2)
- MESD (2)
- Machine learning (2)
- Malware (2)
- Mengenpartitionsproblem (2)
- Mensch-Maschine-Kommunikation (2)
- Modelica (2)
- NUMA (2)
- Naive physics (2)
- Neuroevolution (2)
- Nvidia graphic processors (2)
- OER (2)
- Object Detection (2)
- Object detection (2)
- Open Source (2)
- Optimization (2)
- Original Story (2)
- Parallelization (2)
- Parameter sensitivities of transfer functions (2)
- Password (2)
- Path Loss (2)
- ProM (2)
- Process Mining (2)
- QoS (2)
- RE (2)
- RGB-D (2)
- Raman microscopy (2)
- Rapid Prototyping (2)
- RapidMiner (2)
- Raumwahrnehmung (2)
- Reasoning (2)
- Rendering (2)
- Renewable Energy Systems (2)
- SDN (2)
- SEMA (2)
- Scale Tuning (2)
- Serious Games (2)
- Set partition problem (2)
- Side Channel Analysis (2)
- Side-channel analysis (2)
- Simulation (2)
- Single Instruction Multiple Data (SIMD) (2)
- Skin detection (2)
- Smart Card (2)
- Software-Werkzeug (2)
- Sparse Matrix Vector Multiplication (2)
- Sparse Matrix Vector multiply (SpMV) (2)
- Studienverlauf (2)
- Support Vector Machine (2)
- Survey (2)
- Three-dimensional displays (2)
- TinyECC 2.0 (2)
- Unity (2)
- Unternehmen (2)
- Urban (2)
- Usability (2)
- Usable Security and Privacy (2)
- User Interface Design (2)
- VR (2)
- Vehicle-to-Vehicle Communication (2)
- Verkehrssimulation (2)
- Watermarking (2)
- WiFi (2)
- Wireless Sensor Network (2)
- Wireless backhaul (2)
- YAWL (2)
- adaptive fault thresholds (2)
- aerodynamics (2)
- analysis (2)
- automated sensor-screening (2)
- biometrics (2)
- blockchain (2)
- bond graph modelling (2)
- classifier combination (2)
- confidence level (2)
- convolutional neural networks (2)
- data filtering (2)
- data locality (2)
- deep learning (2)
- diagnostic bond graphs (2)
- diversity (2)
- domestic robots (2)
- dynamic vector fields (2)
- edutainment (2)
- external faults (2)
- eye-tracking (2)
- fault detection (2)
- feature (2)
- feature extraction (2)
- flight zone (2)
- geofence (2)
- human factors (2)
- hypermedia (2)
- ideal switches (2)
- image fusion (2)
- industrial robots (2)
- interaction (2)
- interface design (2)
- intrinsics (2)
- leaning (2)
- machine vision (2)
- memory bandwidth (2)
- monitoring (2)
- multisensory cues (2)
- naive physics (2)
- navigation (2)
- neural network (2)
- nonlinear stability (2)
- object categorization (2)
- object detection (2)
- optic flow (2)
- optical sensor (2)
- pansharpening (2)
- path planning (2)
- peripheral vision (2)
- physical activity (2)
- redundant work (2)
- reinforcement learning (2)
- residual sinks (2)
- robot competitions (2)
- robot dynamics (2)
- robot execution failures (2)
- robot introspection (2)
- self-motion perception (2)
- semiconducting metal oxide gas sensor array (2)
- service robots (2)
- short-term load forecasting (2)
- software engineering (2)
- spatial updating (2)
- speech understanding (2)
- structural equation modeling (2)
- surrogate modeling (2)
- text mining (2)
- traffic surveillance (2)
- transfer learning (2)
- usable privacy (2)
- user study (2)
- vibration (2)
- virtuelle Umgebungen (2)
- 0-1-Integer-Problem (1)
- 16S rRNA gene sequencing (1)
- 2D Level Design (1)
- 3D Segmentation (1)
- 3D User Interface (1)
- 3D Visualisierung (1)
- 3D design (1)
- 3D gaming (1)
- 3D interfaces (1)
- 3D navigation (1)
- 3D nucleus (1)
- 3D real-time echocardiography (1)
- 3D registration (1)
- 3D shape (1)
- 450 MHz (1)
- ABT-737 (1)
- ACPYPE (1)
- AD (1)
- AES (1)
- AI based translation (1)
- AI usage in sports (1)
- ALPS (1)
- AMBER (1)
- AMD Family 15h (1)
- ANSYS (1)
- API Documentation (1)
- API Gebrauchstauglichkeit (1)
- API usability (1)
- AR (1)
- ARM Cortex M3 Processor (1)
- Absolute nodal coordinate formulation (1)
- Abstract Syntax Tree (1)
- Acceptance (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Accuracy (1)
- Active locomotion (1)
- Active vision interface (1)
- Actuators (1)
- Acute lymphoblastic leukemia (1)
- Adaptation of Software (1)
- Adaptive Behavior (1)
- Adaptive Control (1)
- Advanced Driver Assistance Systems (1)
- Affordances (1)
- Agent-Based Modeling (1)
- Agents (1)
- Air Pollution (1)
- Air Pollution Monitoring (1)
- Air pollution modeling (1)
- Algorithmen (1)
- Algorithmische Informationstheorie (1)
- Algorithmus (1)
- Alkane (1)
- All-Swap Algorithm (1)
- Allgegenwärtige Spiele (1)
- Altengerechte Technik (1)
- Altenhilfe (1)
- Altenpflege (1)
- Analyse (1)
- Analysis of Bond Graph Models (1)
- Antifuse memory (1)
- Apprenticeship Learning (1)
- Architectural Patterns (1)
- Artificial Intelligence (cs.AI) (1)
- Artificial Intelligence and Natural Language Processing (1)
- Assekuranz (1)
- Assistenzsystem (1)
- Assistive robots (1)
- Attention (1)
- Auditory Cueing (1)
- Aufrecht (1)
- Ausbreitung (1)
- Authentifikation (1)
- Authorship watermark (1)
- Autoimmune disease (1)
- Automated Modelling (1)
- Automated design (1)
- Automation (1)
- Automatisierte Prozesse Rekonstruktio (1)
- Autonomous Driving (1)
- Autonomous Systems (1)
- Autonomy (1)
- Autotuning (1)
- Available Bandwidth (1)
- B-cell leukemia (1)
- B-cell lymphoma (1)
- BERT (1)
- BG-Klinik (1)
- BH3-mimetic inhibitor (1)
- BLOB Detection (1)
- Background music (1)
- Bacteria, Anaerobic (1)
- Ball Tracking (1)
- Ball tracking (1)
- Ballastless track (1)
- Bandwidth Estimation (1)
- Basis set (1)
- Bayesian Deep Learning (1)
- Bayesian Network (1)
- Bayessches Netz (1)
- Beacon Chain (1)
- Begriffsbestimmung (1)
- Behaviour-Driven Development (1)
- Behörde (1)
- Benchmark (1)
- Berechenbarkeit (1)
- Berufskrankheiten (1)
- Best practice algorithms (1)
- Bewertung (1)
- Bicycle Simulator (1)
- Bildverarbeitung (1)
- Blasendiagramm (1)
- Blob Detection (1)
- Block cipher (1)
- Blockchain (1)
- Bond Graph Modelling (1)
- Bond Graph modelling and simulation (1)
- Bond Graph models for fault detection and isolation (1)
- Bond graph (1)
- Bondgraph (1)
- Boolesche Algebra (1)
- Bound Volume Hierarchy (1)
- Bounding Box (1)
- Bounding box explanations (1)
- Branch and cut (1)
- Bubble-Chart (1)
- Bundesrepublik Deutschland (1)
- Bundesverfassungsgericht (1)
- Business (1)
- Business Case (1)
- Business Process Intelligence (1)
- Business software (1)
- Business system (1)
- CAS (1)
- CC (1)
- CEHL (1)
- CIBERSORT (1)
- CNN (1)
- CPA (1)
- CPU (1)
- CPUID instruction (1)
- CREBBP (1)
- CSR5BC (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Calibration (1)
- Camera selection (1)
- Camera view analysis (1)
- Canonical form of state equations and standard interconnection form for robustness study (1)
- Capability framework (1)
- Capacity (1)
- Carbohydrate (1)
- Case Management Model and Notation (1)
- Case-Based Reasoning (1)
- Cell Processor (1)
- Cell/B.E. (1)
- Center-of-Mass (1)
- Centrifugation (1)
- Centrifuge (1)
- Cervical cancer screening (1)
- Cervicovaginal microbiome (1)
- Chaitin-Konstante (1)
- Chalcogenide glass sensor (1)
- Challenges (1)
- Change-Prozess (1)
- Channel assignment (1)
- Chemical imaging (1)
- Chip ID (1)
- Chloroquine (1)
- Circular saws (1)
- Classification explanations (1)
- Classifiers (1)
- Cleaning Task (1)
- Climate Risks (1)
- Cloud Computing (1)
- Cloud computing (1)
- Clusteranalyse (1)
- Clustering (1)
- Clusters (1)
- Co-creative processes (1)
- Co-located Collaboration (1)
- Co-located work (1)
- Co-rotational formulation (1)
- Code Generation (1)
- Code similarity analysis (1)
- Codierung (1)
- Cognitive informatics (1)
- Cognitive robotics (1)
- Collaborating industrial robots (1)
- Collaboration/Cooperation (1)
- Coloured pointclouds (1)
- Colposcopy (1)
- Column (1)
- Common Criteria (1)
- Company (1)
- Comparative Analysis (1)
- Comparative analysis (1)
- Complex Event Processing (1)
- Complexity (1)
- Compliant Manipulation (1)
- Compliant fingers (1)
- Component Models (1)
- Composition of Patterns (1)
- Computational Fluid Dynamics (1)
- Computational causality (1)
- Computational chemistry (1)
- Computational creativity (1)
- Computational fluid dynamics (1)
- Computational modeling (1)
- Computer (1)
- Computer Automated Design (1)
- Computer Science - Computer Vision and Pattern Recognition (1)
- Computer Science - Learning (1)
- Computer Vision System (1)
- Computer architecture (1)
- Computer graphics (1)
- Computer science (1)
- Computer-supported Cooperative Work (1)
- Computergrafik (1)
- Computerkriminalitaet (1)
- Computersimulation (1)
- Computing methodologies (1)
- Concurrent Kleene Algebra (1)
- Concurrent repeated failure prognosis (1)
- Conformation (1)
- Congenital heart disease (1)
- Connectivity in rural areas (1)
- Container Structure (1)
- Containerization (1)
- Content Analysis (1)
- Content Security Policies (1)
- Contextualized Attention Metadata (CAM) (1)
- Continual robot learning (1)
- Control (1)
- Convexity (1)
- Cooperative Intelligent Transport Systems (ITS) (1)
- Corporate Social Responsibility (1)
- Correlative Microscopy (1)
- Cortex-M3 (1)
- Counterfeit protection (1)
- Coupled process (1)
- Covert channel (1)
- Created Gravity (1)
- Creative Commons (1)
- Critical power (1)
- Cross-core (1)
- Cross-sensitivity (1)
- Crossmedia (1)
- Cryptography (1)
- Crystal structure (1)
- Current research information systems (1)
- Customization (1)
- CyberGlove (1)
- Cybersickness (1)
- Cypher (1)
- DAE systems (1)
- DCF (1)
- DFA Lab (1)
- DHF-Reduktase (1)
- DNA extraction protocols (1)
- DNA profile (1)
- DNSSEC (1)
- DOI (1)
- DPA Lab (1)
- Data Fusion (1)
- Data Generation (1)
- Data Protection Officer (1)
- Data Publication (1)
- DataCite (1)
- Database Management Systems (1)
- Databases and Data Mining (1)
- Dataflow Programming (1)
- Datalog (1)
- Datenbanksysteme (1)
- Datenbasierte Prozessanalyse (1)
- Decision Diagram (1)
- Decision Network (1)
- Decision Support (1)
- Declarative Process Modeling (1)
- Deklarative Prozessmodellierung (1)
- Delph Study (1)
- Demonstration-based training (1)
- Design Optimization (1)
- Design automation (1)
- Deskriptive Datenanalyse (1)
- Developer Centered Security (1)
- Diagnostic bond graph-based online fault diagnosis (1)
- Diagnostic bond graphs (1)
- Dienstgütevereinbarung (1)
- Difference Visualization (1)
- Differential analysis (1)
- Digital Ecosystem (1)
- Digital Object Identifier (1)
- Digital Storytelling (1)
- Digital common goods (1)
- Digital watermarking (1)
- Digitale Lehre (1)
- Digitaler Stress (1)
- Dimensionality reduction (1)
- Dimensionsreduktion (1)
- Directed Acyclic Graph (1)
- Directional Antenna (1)
- Directional antennas (1)
- Discrete cosine transform (1)
- Displacement (1)
- Distance Perception (1)
- Distributed Robot Systems (1)
- Divergent optimization (1)
- Docker (1)
- Domain Expert (1)
- Domain-Specific Language (1)
- Domain-Specific Languages (1)
- Domain-Specific Modeling Languages, (1)
- Domestic robotics (1)
- Domestic robots (1)
- Domestic service robots (1)
- Drahtloses lokales Netz (1)
- Drug (1)
- Drug resistance (1)
- Dynamic motion primitives (1)
- E-Government (1)
- E-Health (1)
- ELM (1)
- ELMo (1)
- EM leakage (1)
- EN-12299 (1)
- ERP system (1)
- ERP-Software (1)
- ERP-software (1)
- ERP-system (1)
- ETV6-RUNX1 (1)
- Earth Observation (1)
- Echtzeit (1)
- Eclipse Modeling Framework (1)
- Ecosystem simulation (1)
- Educational Data Mining (1)
- Educational Process Mining (1)
- Educational Science (1)
- Edutainment (1)
- Efficiency (1)
- Ego-Motion Estimation (1)
- Einflussdiagramm (1)
- Einführung (1)
- Eingebettetes System (1)
- Elderly People (1)
- Electric mobility (1)
- Electromagnetic Fields (1)
- Electronic commerce (1)
- Electronic tongue (1)
- Elementare Zahlentheorie (1)
- Elephantiasis (1)
- Elliptic Curve Cryptography (1)
- Embedded system (1)
- Empfehlung (1)
- Empirical Study (1)
- Empirical formula (1)
- Employee Privacy (1)
- Employee data protection (1)
- EnOcean (1)
- Enterprise Resource Planning (1)
- Enterprise Resource Planning Software (1)
- Enterprise Resource Planning System (1)
- Enterprise software (1)
- Enterprise system (1)
- Entropy (1)
- Entscheidungsunterstützung (1)
- Environment Perception (1)
- Environmental Data (1)
- Eriodictyol (1)
- Erweiterte Realität (1)
- Escape analysis (1)
- Estimation (1)
- Ethereum (1)
- Euler–Bernoulli beam (1)
- Euronorm (1)
- Evaluation (1)
- Evaluation als Kommunikationsanlass (1)
- Event detection (1)
- Everyday object manipulation (1)
- Evolutionary algorithms (1)
- Ewing´s Sarcoma Family of Tumors (1)
- Exchange and reuse of bond graph models (1)
- Executive functions (1)
- Exercise (1)
- Exergame (1)
- Experiment (1)
- Experiment design (1)
- Expert Interviews (1)
- Expert system (1)
- Explainability (1)
- Explainable Artificial Intelligence (XAI) (1)
- Explainable Machine Learning (1)
- External faults (1)
- FGR (1)
- FIVIS (1)
- FPGA implementation (1)
- FS20 (1)
- Face and hand gesture recognition (1)
- Facial Emotion Recognition (1)
- Factory instrumentation (1)
- Fahrradfahrsimulator (1)
- Fahrsimulator (1)
- Failure Prognosis (1)
- Fallbeschreibung (1)
- Fault Channel Watermarking Lab (1)
- Fault Detection & Diagnosis (1)
- Fault Diagnosis (1)
- Fault accommodation (1)
- Fault diagnosis (1)
- Fault handling (1)
- Fault simulation (1)
- Fault-channel watermarks (1)
- Feature Model (1)
- Feature extraction (1)
- Features (1)
- Feedback (1)
- Fehlertoleranz (1)
- Female (1)
- Festschrift (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Field sequential imaging (1)
- Filtering (1)
- Fingerprint watermark (1)
- Finite element modelling (1)
- First-order frequency domain sensitivities (1)
- Five Factor Model (1)
- Fixed spatial data (1)
- Flexible multibody system (1)
- Flexible robots (1)
- Fluency (1)
- Flussnetz (1)
- Focus plus context (1)
- Force (1)
- Force and tactile sensing (1)
- Foreground segmentation (1)
- Forests (1)
- Formal definition and validation of the content of a model description (1)
- Forms of mathematical models (1)
- Forschung (1)
- Forschungsschwerpunkte (1)
- Foveated rendering (1)
- Free-Space Loss (FSL) (1)
- Frequency planning (1)
- Friction (1)
- Functional Programming (1)
- Functional safety (1)
- Funktionsmodell (1)
- Funktionsprinzip (1)
- Fusion (1)
- Future (1)
- Future Studies (1)
- Future of Robotics (1)
- Fuzzy Miner (1)
- Fuzzy Mining (1)
- Fuzzy-Logik (1)
- Fuzzy-System (1)
- GDDL (1)
- GLI (1)
- GPGPU (1)
- GPT (1)
- GPT-2 (1)
- Gabor filter (1)
- Gabor filters (1)
- Game Engine (1)
- Games (1)
- Games and Simulations for Learning (1)
- Gaussian processes (1)
- Gaze Behavior (1)
- Gaze Depth Estimation (1)
- Gaze-contingent depth-of-field (1)
- Gefahrenprävention (1)
- Gefühl (1)
- Gender Issues in Computer Science Education (1)
- Generation R (1)
- Generative Design (1)
- Genetic Predisposition to Disease (1)
- Genetic algorithm (1)
- Genomics (1)
- Genomics/methods (1)
- Geo-tagging (1)
- Gesamt-Exom-Sequenzierung (1)
- Geschäftsprozess (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheitswesen (1)
- Givens Rotations (1)
- Global Illumination (1)
- Global illumination (1)
- Glycam06 (1)
- Gnu Linear Programming Kit (1)
- Goal Programming (1)
- Gradient-based explanation methods (1)
- Gradient-boosting (1)
- Grailog (1)
- Graph Convolutional Neural Networks (1)
- Graph embeddings (1)
- Graph theory (1)
- Graphical user interfaces (1)
- Grasp Domain Definition Language (1)
- Grasp Planner (1)
- Gromacs (1)
- Grounded Method (1)
- Group Behavior (1)
- Group behavior (1)
- Group behavior analysis (1)
- Groupware (1)
- HCI (1)
- HCSS (1)
- HDAC inhibitor (1)
- HDBR (1)
- HIF1α (1)
- HPC (1)
- HPV diagnostic (1)
- HRI (1)
- HSP70 (1)
- HTTP (1)
- Hacker-Angriff (1)
- Hacking-Technik (1)
- Hand Guidance (1)
- Hand Tracking (1)
- Hand injuries (1)
- Handlungsempfehlung (1)
- Handzeichenerkennung (1)
- Hardware (1)
- Head Mounted Display (1)
- Head-Mounted Displays (1)
- Header whitelisting (1)
- Healthcare logistics (1)
- Heat Shock Protein (1)
- Heat shrink tubing (1)
- High hyperdiploidy (1)
- High-performance computing (1)
- High-resolution displays (1)
- High-speed railway track (1)
- High-speed track (1)
- Highly Automated Driving (1)
- Histograms (1)
- Hochleistungssport (1)
- Hochschule Bonn-Rhein-Sieg (1)
- Hochschulehre (1)
- Hochschullehre (1)
- HomeMatic (1)
- Hough Forests (1)
- Human Factors (1)
- Human centered computing (1)
- Human orientation perception (1)
- Human robot interaction (1)
- Human-Computer-Interaction (HCI) (1)
- Human-robot interaction (1)
- Humanoid Robot (1)
- Humanoider Roboter (1)
- Hybrid Failure Prognosis (1)
- Hybrid Systems (1)
- Hybrid models (1)
- Hybrid models of engineering systems (1)
- Hydraulic orifices (1)
- Hydrocarbon (1)
- Hydroxychloroquine (1)
- HyperNEAT (1)
- IC identification (1)
- ICF (1)
- ICP (1)
- IEC 104 (1)
- IEC 61850 (1)
- IEEE 802.21 (1)
- ISO 27000 (1)
- ISO9999 (1)
- IT professionals (1)
- IT-Sicherheitsanforderungen (1)
- IT-Verfügbarkeit (1)
- IaaS (1)
- Ikaros (1)
- Illumination algorithms (1)
- Image Classification (1)
- Image representation (1)
- Image-based rendering (1)
- Immersion (1)
- Immersive Virtual Environments (1)
- Immersive Visualization Environment (1)
- Immersive analytics (1)
- Implementation Challenges (1)
- Increasing fault magnitude (1)
- Incremental true bond graphs (1)
- Inductive Visual Miner (1)
- Inductive Visual Mining (1)
- Industrial robots (1)
- Industry 4.0 (1)
- Influence Diagram (1)
- Information Privacy (1)
- Information Security (1)
- Information Types (1)
- Information hiding (1)
- Information interaction (1)
- Informations-, Kommunikations- und Medientechnologie (1)
- Informationsflüsse (1)
- Informationsgewinnung (1)
- Informationskomplexität (1)
- Informationstechnik (1)
- Informationsverarbeitung (1)
- Input reconstruction (1)
- Instance-based learning (1)
- Instantaneous assignment (1)
- Instantiation (1)
- Institut für Arbeit und Gesundheit (1)
- Institut für Arbeitsschutz (1)
- Institut für Prävention und Arbeitsmedizin (1)
- Instruction design (1)
- Instruction scheduling (1)
- Integer programming (1)
- Integral backstepping technique (1)
- Integrate Development Environment (1)
- Integrated circuit interconnections (1)
- Intel processors (1)
- Intelligent Autonomous Systems (1)
- Interaction (1)
- Interaction devices (1)
- Interactive Object Detection (1)
- Interactive Smart Card Applications (1)
- Interbank Market (1)
- Interference (1)
- Interferenz (1)
- Intermediaries (1)
- Intermittent faults (1)
- Interoperability (1)
- Interventionstudie (1)
- Inventory (1)
- Inverse simulation (1)
- IoT (1)
- Issue Tracking Systems (1)
- Issue Types (1)
- Issue tracking systems (1)
- It-Diensteanbieter (1)
- Java <Programmiersprache> (1)
- JavaScript (1)
- KNN (1)
- KNX (1)
- Kartographie (1)
- Key recovery (1)
- KiBP (1)
- Knowledge Management (1)
- Knowledge representation (1)
- Knowledge-intensive Business Process (1)
- Knowledge-intensive Process (1)
- Kollaboration/Kooperation (1)
- Kolmogorov-Komplexität (1)
- Kombinatorische Optimierung (1)
- Komplexitätsklassen (1)
- Kompression und Zufälligkeit von Zeichenketten (1)
- Kopie digitaler Daten (1)
- Kryptologie (1)
- Künstliche Gravitation (1)
- Künstliche Intelligenz (1)
- LAA (1)
- LBP (1)
- LDP (1)
- LGCSR (1)
- LP-Heuristik (1)
- LSTM (1)
- LTE-M (1)
- LTE-U (1)
- Lagerlogistik (1)
- Lagerverwaltung (1)
- Laminar and turbulent flow (1)
- Language Engineering (1)
- Language learning (1)
- Langzeitbehandlung (1)
- Large display interaction (1)
- Large high-resolution displays (1)
- Large-Scale Online Services (1)
- Lattice Basis Reduction (1)
- Laufzeit-Komplexität (1)
- Laws of programming (1)
- Lead userness (1)
- Leakage circuits (1)
- Learning analytics (1)
- Learning data mining (1)
- Learning from demonstration (1)
- Learning systems (1)
- Leg (1)
- Lehr-Lernpsychologie (1)
- Leistungsdaten (1)
- Leistungsdiagnostik (1)
- Leistungssport (1)
- Lennard-Jones parameters (1)
- Lernen (1)
- Lernumgebung (1)
- Leukemia (1)
- Level-of-Detail (1)
- Library model (1)
- Ligands (1)
- Light curtain (1)
- Lighting simulation (1)
- Linear Optimization (1)
- Linear Programming (1)
- Linear inverse models (1)
- Linear quadratic regulator (1)
- Linear regression (1)
- Lineare Algebra (1)
- Lineare Optimierung (1)
- Lineare Programmierung (1)
- Liquidity Crises (1)
- LoRa receiver accuracy (1)
- Locomotion (1)
- Login (1)
- Long-Term Autonomy (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Lymphedema (1)
- Lymphoproliferative disorder (1)
- MAC (1)
- MACE (1)
- MBZ (1)
- METEOR score (1)
- MIMD (1)
- MOOC (1)
- MOX gas sensors (1)
- MP2.5 (1)
- MPLS (1)
- MQTT (1)
- Machine Learning (cs.LG) (1)
- Machine-learning (1)
- Main Memory (1)
- Maker space (1)
- Male (1)
- Management (1)
- Manipulation tasks (1)
- Manipulator (1)
- Markov Cluster Algorithm (1)
- Materialwissenschaften (1)
- Mathematical methods (1)
- Mathematische Logik (1)
- Maximal covering location problem (1)
- Maximalflussproblem (1)
- Mebendazole (1)
- Media in education (1)
- Megatrends (1)
- Memory (1)
- Memory filesystem (1)
- Memory management (1)
- Memory-Constrained Devices (1)
- Mengenlehre (1)
- Mengenpartitionierungsproblem (1)
- Mensch-Computer-Interaktion (1)
- Mesh networks (1)
- Meteorological Data (1)
- Methodenanalyse (1)
- Methodik (1)
- Methodologies (1)
- Microarchitectural Data Sampling (MDS) (1)
- Microgravity (1)
- Microsoft CRM 2013 (1)
- Middleware and Programming Environments (1)
- Minimaler Schnitt (1)
- Mining Software Repositories (1)
- Mining software repositories (1)
- Mixed (1)
- Mixed method evaluation (1)
- Mixed-Reality (MR) (1)
- Mobile devices (1)
- Mobile manipulation (1)
- Mobile robotics (1)
- Mobile robots (1)
- Mobiler Roboter (1)
- Modalities (1)
- Mode switching LTI model (1)
- Mode-dependent ARRs (1)
- Model Fitting (1)
- Model-Based Software Development (1)
- Model-Driven Engineering (1)
- Model-based Approach (1)
- Model-based Fault Diagnosis (1)
- Model-based failure prognosis (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Model-free control (1)
- Modellbildung (1)
- Modelling (1)
- Models of Variable Structure (1)
- Modular software packages (1)
- Molecular dynamics (1)
- Molecular modeling (1)
- Molecular rotation (1)
- Molecular structure (1)
- Molekulare Deskriptoren (1)
- Monitoring (1)
- Morphological box (1)
- Morphological scheme (1)
- Motion (1)
- Motion Capture (1)
- Motion Sickness (1)
- Motion planning (1)
- Multi-Modal Interaction (1)
- Multi-Solution Optimization (1)
- Multi-Tenant Application (1)
- Multi-camera (1)
- Multi-component heavy metal solution (1)
- Multi-object visualization (1)
- Multi-objective (1)
- Multi-objective optimization (1)
- Multi-robot systems (1)
- Multi-stage (1)
- Multibody systems (1)
- Multicast communication (1)
- Multidisciplinary systems (1)
- Multidisciplinary Dynamic Systems (1)
- Multilayer interaction (1)
- Multimodal (1)
- Multimodal Microspectroscopy (1)
- Multimodal hyperspectral data (1)
- Multimodal optimization (1)
- Multiple Displays (1)
- Multisensory cues (1)
- Multithreaded and multicore architecture (1)
- Multiuser (1)
- Multivariate Time Series (1)
- Multivariate time series classification (1)
- Musical Performance (1)
- N200 (1)
- NEAT (1)
- NETCONF (1)
- NFKB (1)
- NGS (1)
- NIR (1)
- NIR-point sensor (1)
- NISTPQC (1)
- NLP (1)
- NNS (1)
- NP-Vollständigkeit (1)
- NURBS (1)
- NVIDIA Tesla (1)
- Narration Module (1)
- Natural language understanding (1)
- Natural scene text (1)
- Navigation interface (1)
- Network simulation verification (1)
- Networked Robots (1)
- Neural Machine Translation (1)
- Neuroscience (1)
- Noise (1)
- Noise reduction (1)
- Nonbonded scaling factor (1)
- Nonlinear control quadrotor uav (1)
- Numerical optimization (1)
- Nutzung (1)
- OCT (1)
- OCU (1)
- Object Segmentation (1)
- Object detectors (1)
- Object-Based Image Analysis (OBIA) (1)
- Object-oriented physical systems modelling (1)
- Older adults (1)
- Online Services (1)
- Online-Überwachung (1)
- Ontology (1)
- Open Access (1)
- Open Educational Ressources (1)
- Open innovation (1)
- Open source firmware (1)
- Open-ended Robotic Discovery (1)
- Open-source (1)
- OpenACC (1)
- OpenDaylight (1)
- OpenMP (1)
- OpenMP, unrolling (1)
- OpenStack (1)
- Operation Research (1)
- Optical Flow (1)
- Optical flow (1)
- Optimierungsproblem (1)
- Optimisation 3D (1)
- Organic compounds and Functional groups (1)
- Out Of Distribution (OOD) data (1)
- Out-of-view Objects (1)
- Outer Space Research (1)
- Outlier Detection (1)
- Outside-in process (1)
- P300 (1)
- PAD (1)
- PAIS (1)
- PCR inhibitors (1)
- PDE-5A (1)
- PDSTSP (1)
- PHR (1)
- PIR sensor units (1)
- PM2.5 estimation (1)
- PSD (1)
- PaaS (1)
- Pain Reduction (1)
- Parallel I/O (1)
- Parallel Processing (1)
- Parallel drone scheduling traveling salesman problem (1)
- Parameter degradation model (1)
- Parameter sensitivities of the residuals of analytical redundancy relations (1)
- Parameter uncertainties (1)
- Parametric study (1)
- Part Segmentation (1)
- Passwort (1)
- Path loss model (1)
- Path-Packing (1)
- Pattern recognition (1)
- Pedigree (1)
- People Detection (1)
- Performance Simulation (1)
- Performance benchmarks (1)
- Performance prediction (1)
- Performance profiling (1)
- Periodic structures (1)
- Personal Health Record (1)
- Personality (1)
- Persönlichkeit (1)
- Persönlichkeitseigenschaften (1)
- Persönlichkeitsfaktor (1)
- Pervasive Gaming (1)
- Pflegeinformatik (1)
- Pflegepersonal (1)
- Phenotypic niching (1)
- Physical activity (1)
- Physical exercising game platform (1)
- Plagiat (1)
- Plan-based robot control (1)
- Point Cloud Segmentation (1)
- Point Clouds (1)
- Pointing (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Pointing devices (1)
- Poisson Disc Distribution (1)
- Polymorphism, Single Nucleotide (1)
- Pose Estimation (1)
- Post-Quantum Signatures (1)
- Power Analysis (1)
- Precursor B-Cell Lymphoblastic Leukemia-Lymphoma/genetics (1)
- Prediction of physiological responses to strain (1)
- Predictive Models (1)
- Prescriptive Analytics (1)
- Presence (1)
- Pressure wire (1)
- Pressure-volume relation (1)
- Privacy engineering (1)
- Privacy patterns (1)
- Probabilistic model (1)
- Process Automation (1)
- Process Models (1)
- Process views (1)
- Programmsicherheit (1)
- Project based learning (1)
- Pronunciation (1)
- Proof of Stake (1)
- Proof-of-Stake (1)
- Proof-of-Work (1)
- Propagation (1)
- Protective system (1)
- Prototypes (1)
- Proximity (1)
- Prozessanalyse (1)
- Prozessautomation (1)
- Prozessmanagement (1)
- Prozessoptimierung (1)
- Prudential Regulation (1)
- Präskriptive Analytik (1)
- Prävention (1)
- Psychology (1)
- Public Key Infrastructure (1)
- Public Key Infrastructures (1)
- Python <Programmiersprache> (1)
- Q measurement (1)
- Qualitative reasoning (1)
- Quality control (1)
- Quality of Service (1)
- Qualitätspakt Lehre (1)
- Quantitative analysis of explanations (1)
- Quantum mechanical methods (1)
- Quantum mechanics (1)
- RAS (1)
- RBAR (1)
- RFID (1)
- RGB-D data (1)
- RLE-XOR (1)
- RLE-permutation (1)
- RMS acceleration (1)
- RNN (1)
- ROPOD (1)
- RSSI (1)
- Radfahren (1)
- Radiance caching (1)
- Radiofrequency identification (1)
- Radix Sort (1)
- Raman spectroscopy (1)
- Random number generator (1)
- Rapid prototyping (1)
- Ray Casting (1)
- Re-authentication (1)
- Reader (1)
- Real-Time Image Processing (1)
- Real-time image processing (1)
- Recht (Gesetzgebung) (1)
- Recommendation (1)
- Recommender systems (1)
- Reconstruction Error (1)
- Reference Architectural Model Automotive (RAMA) (1)
- Refinement (1)
- Reflectance modeling (1)
- Registration Refinement (1)
- Rehabilitation (1)
- Relapse (1)
- Relational Learning (1)
- Relative Energies (1)
- Remaining Useful Life (1)
- Remaining Useful Life (RUL) estimates (1)
- Render Cache (1)
- Repositories (1)
- Requirements (1)
- Requirements Communication (1)
- Requirements Engineering (1)
- Requirements analysis (1)
- Requirements engineering in SMEs (1)
- Restorative Virtual Environments (1)
- Reusable Software (1)
- Reversible Logic Synthesis (1)
- Review (1)
- Rfid (Radio-Frequency Identification) (1)
- Right to Informational Self-Determination (1)
- Risikoanalyse (1)
- Risk-Based Account Recovery (1)
- RoboCup (1)
- RoboCup industrial (1)
- Robot Perception (1)
- Robot commands (1)
- Robot competitions (1)
- Robot failure diagnosis (1)
- Robot kinematics (1)
- Robot learning (1)
- Robot software (1)
- Robotersteuerung (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Revolutions (1)
- Robotic Technology (1)
- Robotic faults (1)
- Robotics (cs.RO) (1)
- Robotics competitions (1)
- Robots (1)
- Robust grasping (1)
- Roleplaying Game (RPG) (1)
- Rollenspiel (1)
- Rollenspiele (1)
- Rotating Table Test (1)
- Rucksackproblem (1)
- Rule-based production systems (1)
- RuleML (1)
- Runtime Adaptation (1)
- Rural areas (1)
- S3D Video (1)
- S3D video (1)
- SAHA (1)
- SAML (1)
- SARS-CoV-2 (1)
- SDWN (1)
- SIMD (1)
- SIMPACK (1)
- SLIDE algorithm (1)
- SME (1)
- SMPA loop (1)
- SOA (1)
- SOAP (1)
- SORT (1)
- SQL (1)
- STAT3 (1)
- SVG (1)
- SVM (1)
- SaaS (1)
- Saccades (1)
- Saccadic suppression (1)
- Safety (1)
- Safety guard (1)
- Saliency maps (1)
- Sanity checks for explaining detectors (1)
- Scalability (1)
- Scalable Vector Graphic (1)
- ScalarMultiplication (1)
- Scene text recognition, active vision, domestic robot, pantilt, auto-zoom, auto-focus, adaptive aperture control (1)
- Scene understanding through Deep Learning (1)
- Schadenanalyse (1)
- Schadensprozess (1)
- Scholarly workbench (1)
- School experiments (1)
- Schutzmaßnahme (1)
- Schutzobjekte (1)
- Scientific competency development (1)
- Scientific workbench (1)
- Second Life (1)
- Secure Coding Practices (1)
- Security architecture (1)
- Security level (1)
- Segmentation (1)
- Self-motion perception (1)
- Self-supervised learning (1)
- Semantic Segmentation (1)
- Semantic gap (1)
- Semantic models (1)
- Semantic scene understanding (1)
- Semantic search (1)
- Semantics (1)
- Sense of presence (1)
- Sensitivity matrix in symbolic form (1)
- SensorFusion (1)
- Separation algorithm (1)
- Service Robot (1)
- Service-Level-Agreement (1)
- Service-Oriented Architecture (1)
- Service-Roboter (1)
- Service-based cloud computing (1)
- Serviceroboter (1)
- Shadow detection (1)
- Sichere Kommunikation Kritische Infrastrukturen (1)
- Sicherheit (1)
- Sicherheits-APIs (1)
- Sicherheitsanalyse (1)
- Sicherheitsarchitektur (1)
- Sicherheitsniveau (1)
- Side Channel Countermeasures (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side channels (1)
- Side-channel watermarking (1)
- Signal (1)
- Signal detection (1)
- Signal processing (1)
- Signature Verification (1)
- Silmitasertib (1)
- Similarity matrix (1)
- Simulator (1)
- Single-objective (1)
- Skalierbarkeit (1)
- Skin (1)
- Slippage detection (1)
- Smart Card User Interface Design, Interactive Smart Card Applications (1)
- Smart Grid (1)
- Smart Home (1)
- Smart InGaAs camera-system (1)
- Smart factory (1)
- Smartphone (1)
- Smartphones (1)
- Social Virtual Reality (1)
- Social engagement in university (1)
- Social intelligence (1)
- Sociomateriality (1)
- Software Architecture (1)
- Software Architectures (1)
- Software Development Process (1)
- Software Feature Request Detection (1)
- Software Framework (1)
- Software IP protection (1)
- Software Supply Chain (1)
- Software and Architecture (1)
- Software reverse engineering (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Fehler (1)
- Software-Lebenszyklus (1)
- Software-Sicherheit (1)
- Software-Test (1)
- Software-Testautomatisierung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Softwareentwicklung (1)
- Somatogravic Illusion (1)
- Sonar (1)
- Space exploration (1)
- Sparse matrix format (1)
- Spatio-Temporal (1)
- Spatiotemporality (1)
- Spectral Analysis (1)
- Spectral Clustering (1)
- Spectroscopy (1)
- Spectrum occupancy (1)
- Spectrum optimization (1)
- Speech Act Theory (1)
- Spherical Treadmill (1)
- Spherical treadmill (1)
- Spielanalyse (1)
- Split Axis (1)
- Stabilitätsanalyse (1)
- Standards (1)
- Star Trek (1)
- State machines (1)
- Stereoscopic Rendering (1)
- Stereoscopic rendering (1)
- Story Element (1)
- Stream cipher (1)
- Streaming (1)
- Stress Management (1)
- Studenten (1)
- Supervised classification (1)
- Supervised learning (1)
- Supply chains (1)
- Surrogate Modelling (1)
- Surrogate models (1)
- Surrogate-assistance (1)
- Swim Stroke Analysis (1)
- Switched power electronic systems (1)
- Symmetry detector (1)
- Synergetik (1)
- Synthetic perception (1)
- System health monitoring (1)
- SystemVerilog (1)
- TEL-AML1 (1)
- TLS (1)
- TP53 (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Tag (1)
- Task Frame Formalism (1)
- Task allocation (1)
- Tautomers (1)
- Taxonomie (1)
- Teaching Quality Pact (1)
- Technologie (1)
- Telecommunication network reliability (1)
- Telecommunication network routing (1)
- Teleconferencing system (1)
- Telematik (1)
- Telematik-Software (1)
- Template Attacks (1)
- Temporal constraints (1)
- Temporally-weighted (1)
- Terrain rendering (1)
- Testing (1)
- Text detection (1)
- Text recognition (1)
- Textureless objects (1)
- Therapy (1)
- Throughput (1)
- Tiled displays (1)
- Tiled-display walls (1)
- Time extended assignment (1)
- Time measurement (1)
- Timing analysis (1)
- Timing channel (1)
- ToF Camera (1)
- Token (1)
- Touchscreen interaction (1)
- Touchscreens (1)
- Toyota HSR (1)
- Trace algebra (1)
- Traceability (1)
- Tracking (1)
- Tracking by detection (1)
- Traffic Simulations (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Trainingssteuerung (1)
- Transfer Learning (1)
- Transfer learning (1)
- Transformations between various description formats (1)
- Transforms (1)
- Translocation (1)
- Transparency (1)
- Transponder (1)
- Travel Techniques (1)
- Treatment of discontinuities and singularities in ordinary differential equations (1)
- Tree Stumps (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV teleoperation (1)
- UGV (1)
- UI design (1)
- USAR (1)
- Ultrasonic array (1)
- Umgebung (Umwelt) (1)
- Uncertainty (1)
- Uncertainty Estimation (1)
- Uncertainty Quantification (1)
- Underwater (1)
- Unidirectional thermoplastic composites (1)
- Unifying theories (1)
- Unknown parameter degradation (1)
- Unmanned Aerial Vehicle (UAV) (1)
- Unterstützung (1)
- User Roles (1)
- User Study (1)
- User engagement (1)
- User experience design (1)
- User interface (1)
- User interfaces (1)
- User-Centered Approach (1)
- User-Centered Design (1)
- User-Computer Interface (1)
- User-centered privacy engineering (1)
- VR system design (1)
- VR-based systems (1)
- Vacuum Cleaner (1)
- Valproic acid (1)
- Variability Management (1)
- Variability Resolution (1)
- Variational Autoencoder (1)
- Vector Intrinsics (1)
- Vector Units (1)
- Vehicle-2-Infrastructure Kommunikation (1)
- Vehicle-2-Vehicle Communication (1)
- Vehicle-2-Vehicle Kommunikation (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicle-to-Vehicle Com- munication (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Verfassungsbeschwerde (1)
- Verifizierung (1)
- Verilog (1)
- Verkehrserziehung (1)
- Verkehrsnetz (1)
- Verkehrsnetzwerke (1)
- Verschlüsselung (1)
- Versicherung (1)
- Vertrag (1)
- Vertragsbeendigung (1)
- Vertragspartner (1)
- Vertriebssysteme (1)
- Vibrational microspectroscopy (1)
- Video surveillance (1)
- View selection (1)
- Virtual Agents (1)
- Virtual Environment (1)
- Virtual Environments (1)
- Virtual Memory Palace (1)
- Virtual attention (1)
- Virtual environments (1)
- Visual Computing (1)
- Visual Cueing (1)
- Visual Discrimination (1)
- Visual perception (1)
- Visualization design and evaluation methods (1)
- Visualization systems and tools (1)
- Visuelle Wahrnehmung (1)
- Volumenrendering (1)
- Vulnerable Groups (1)
- V˙CO2 prediction (1)
- V˙O2 prediction (1)
- WDS (1)
- WWW (1)
- Wahrnehmung (1)
- Wang-tiles (1)
- Warencode (1)
- Web (1)
- Web components (1)
- Weltraumforschung (1)
- Wettkampfanalyse (1)
- WfMS (1)
- Whole body motion (1)
- Wi-Fi (1)
- WiAFirm (1)
- WiFi-based Long Distance (WiLD) (1)
- WiFi-based Long Distance networks (1)
- Wireless Backhaul Network (1)
- Wissensarbeit (1)
- Wissensarbeiter (1)
- Wissensintensive Geschäftsprozesse (1)
- Wissensintensiver Geschäftsprozess (1)
- Workflow (1)
- Workflow Management (1)
- XGBoost (1)
- XML (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XML schema for bond graph models (1)
- XNA Game Studio (1)
- XSLT (1)
- Xeon Phi knights landing (1)
- YANG (1)
- YOLO (1)
- Young adults (1)
- ZWave (1)
- Zentrifuge (1)
- Zielprogrammierung (1)
- ZigBee (1)
- ZombieLoad (1)
- accelerometer (1)
- activation function (1)
- acute (1)
- adaptive agents (1)
- adaptive binarization (1)
- adaptive filters (1)
- adaptive trigger (1)
- affective computing (1)
- allopurinol (1)
- ambulatory monitoring (1)
- analog/digital signal processing (1)
- analyses (1)
- analytical redundancy relation residuals (1)
- analytical redundancy relations (1)
- anomaly detection (1)
- antibody deficiency (1)
- apoptosis (1)
- architectural distortion (1)
- artifacts (1)
- asset transfer (1)
- assistive robotics (1)
- assistive robots (1)
- atomic instructions (1)
- atomic operation (1)
- audio-tactile feedback (1)
- augmented, and virtual realities (1)
- authentication (1)
- authoring tools (1)
- autoimmune lymphoproliferative syndrome (1)
- autoinflammatory disease (1)
- automated 3D scanning (1)
- automatic measurement validation (1)
- automatic music generation (1)
- automation (1)
- automation of sample processing (1)
- automatisierte Netzwerkgenerierung (1)
- autonomous driving (1)
- averaged bond graph models (1)
- back-of-device interaction (1)
- background motion (1)
- bagging (1)
- bass-shaker (1)
- benchmarking (1)
- bicausal diagnostic Bond Graphs (1)
- bicycle (1)
- binary classification (1)
- bioinformatics (1)
- biorder (1)
- bloat (1)
- body-centric cues (1)
- bond graph (1)
- bond graphs (1)
- bond-graph-based physical systems modelling (1)
- bootstrapping (1)
- brain computer interfaces (1)
- breast cancer (1)
- brightfield microscopy (1)
- building automation (1)
- built environment (1)
- bus load (1)
- caching (1)
- camera (1)
- camera-based person detection (1)
- can bus (1)
- cancer (1)
- cellular automata (1)
- change process (1)
- chemical sensors (1)
- childhood (1)
- childhood cancer syndrome (1)
- client-side component model (1)
- closed kinematic chain (1)
- co-located collaboration (1)
- cognitive radio (1)
- collaboration (1)
- collaborative learning (1)
- collision (1)
- colorimetry (1)
- commuting (1)
- compensation (1)
- complete basis set limit (1)
- component analyses (1)
- component based (1)
- computational causalities (1)
- computational logic (1)
- computer games (1)
- computer-supported collaborative work (1)
- concrete plate (1)
- conformations (1)
- constitutional mismatch repair syndrome (1)
- constraint relaxation (1)
- constructive process deviance (1)
- control (1)
- control architectures (1)
- controller design (1)
- convex optimization (1)
- cooperative path planning (1)
- correlation (1)
- crawling (1)
- cross-disciplinary (1)
- cryptanalytic attacks (1)
- cryptocurrency (1)
- cuSPARSE (1)
- curved shell (1)
- cyanide (1)
- cybersickness (1)
- data analysis (1)
- data glove (1)
- data logging (1)
- data visualisation (1)
- database (1)
- database systems (1)
- decision tree learning (1)
- degraded DNA (1)
- denial-of-service (1)
- dependable robots (1)
- depth perception (1)
- design process (1)
- designing air flow (1)
- detection (1)
- developer centered security (1)
- differential algebraic equation systems (1)
- digital co-creation (1)
- digital platform ecosystem (1)
- digital storytelling (1)
- dimensionality reduction (1)
- direct feedback (1)
- directed hypergraphs (1)
- directional antennas (1)
- disabled people (1)
- displacement measurement (1)
- distance perception (1)
- distributed authoring (1)
- distributed processing (1)
- domain adaptation (1)
- driving (1)
- drone video quality (1)
- drugs (1)
- dynamics (1)
- e-Research (1)
- e-learning course structure (1)
- eavesdropping (1)
- echo state network (1)
- eco-driving (1)
- electrochemical sensor (1)
- elite sports (1)
- embedded collaborative learning (1)
- embodied interfaces (1)
- emotion computing (1)
- employee privacy (1)
- energy (1)
- energy efficient transportation (1)
- energy optimal driving (1)
- energy saving (1)
- enterprise software (1)
- entwicklerzentrierte Sicherheit (1)
- erbliche Krebssyndrome (1)
- estimation (1)
- evaluation as a mean to communication (1)
- evolution strategies (1)
- evolutionary illumination (1)
- evolved neural network controller (1)
- evolving look ahead controllers (1)
- execution (1)
- explainable AI (1)
- explainable gesture recognition (1)
- exploration (1)
- extraction-linked bias (1)
- extreme learning machine (1)
- eye movement (1)
- eye tracking (1)
- facial expression recognition (1)
- factor analysis (1)
- failure prognostic (1)
- fault indicators (1)
- fault scenarios (1)
- fault handling (1)
- faults in robotics (1)
- feature discovery (1)
- feature selection (1)
- felt obligations (1)
- fiducial marker (1)
- fingerprint (1)
- finite element method (1)
- fitness-fatigue model (1)
- fixed causalities generation of analytical redundancy relations (1)
- flying (1)
- force field (1)
- force sensing (1)
- forensic (1)
- forms of mathematical models (1)
- fpga (1)
- free and open source software (1)
- frequency (1)
- fuel (1)
- full-body interface (1)
- fuzzy logic (1)
- game engine (1)
- gamification (1)
- gaming (1)
- gaze (1)
- general plate theory (1)
- generation of ARRs (1)
- generative design (1)
- genes (1)
- genetic neutrality (1)
- genetic testing (1)
- genetics (1)
- genetische Testung (1)
- global illumination (1)
- graphene oxide powder (1)
- graphene oxide powders (1)
- graphs (1)
- grasp motions (1)
- grasping (1)
- gravito-inertial force (1)
- hand guidance (1)
- haptic feedback (1)
- haptic interfaces (1)
- head down bed rest (1)
- heart rate control (1)
- heart rate modeling (1)
- heart rate prediction (1)
- heat shrink tubes (1)
- heavy metal (1)
- heterogeneous networks (1)
- heuristics (1)
- hierarchical clustering (1)
- high degree of diagnostic coverage and reliability (1)
- high diagnostic coverage and reliability (1)
- high dynamic range resistance readout (1)
- high speed railway vehicle (1)
- high-throughput DNA sequencing (1)
- high-throughput sequencing (1)
- higher education (1)
- holography (1)
- hospital environment (1)
- hospital-acquired infections (1)
- human computer interaction (1)
- human microbiome (1)
- human-centred design (1)
- human-centric lighting (1)
- human-robot collaboration (1)
- hybrid dynamics solver (1)
- hybrid robot skill representation (1)
- hybrid system (1)
- hybrid system models (1)
- hydrocarbon (1)
- hypermedia applications (1)
- iOER (1)
- ideation (1)
- image captioning (1)
- image sequence processing (1)
- immersion (1)
- immersive Visualisierung (1)
- immersive systems (1)
- immunodeficiency (1)
- indicators calculation (1)
- information display methods (1)
- information flows (1)
- informational self-determination (1)
- infrared pattern (1)
- innovative work behavior (1)
- instance segmentation (1)
- intelligent pedestrian counter (1)
- intelligente Agenten (1)
- intelligente virtuelle Agenten (1)
- interaction techniques (1)
- interactive computer graphics (1)
- interactive distributed rendering (1)
- intercultural learning (1)
- interference (1)
- international (1)
- international teams (1)
- intervention mechanisms (1)
- inverse model (1)
- ion-selective electrodes (1)
- irregularity amplitude (1)
- isolation (1)
- issue tracker (1)
- knowledge engineering (1)
- knowledge graphs (1)
- knowledge-management (1)
- large-high-resolution displays (1)
- latent class analysis (1)
- leaning, self-motion perception (1)
- leaning-based interfaces (1)
- learning object repositories (1)
- learning traces (1)
- learning-based fault detection and diagnosis (1)
- leukemia (1)
- light curtains (1)
- linguistic variable (1)
- linguistic variables (1)
- link calibration (1)
- lipid (1)
- load control (1)
- local optimization (1)
- locomotion (1)
- locomotion interface (1)
- long short-term memory (1)
- long-distance 802.11 (1)
- long-distance modeling (1)
- low-cost air sensor (1)
- lymphocytic (1)
- manipulation (1)
- massive parallel sequencing (1)
- mathematical modeling (1)
- measurement (1)
- mebendazole (1)
- mechatronic systems (1)
- medical training (1)
- mental models (1)
- mesoscopic agents (1)
- micro-benchmarks (1)
- microbial community structure (1)
- microbial ecology (1)
- microbiome (1)
- microbiome analyses (1)
- microcomputers (1)
- microcontroller (1)
- mininig software repositories (1)
- mixed reality (1)
- mobile applications (1)
- mobile manipulators (1)
- mobile or handheld device (1)
- mobile projection (1)
- mobile robots (1)
- mobile web (1)
- mobiler Roboter (1)
- mobility assistance system (1)
- modal superposition (1)
- mode switching LTI models (1)
- mode-dependent implicit state space model (1)
- mode-switching linear time-invariant models (1)
- model exchange (1)
- modeling (1)
- modelling methodology (1)
- modular web (1)
- momentary frequency (1)
- mood (1)
- morphological operator (1)
- motion capture (1)
- motion control (1)
- motion cueing (1)
- motion platform (1)
- motion sickness (1)
- motion trajectory enhancement (1)
- mp2 (1)
- multi causal strain (1)
- multi robot systems (1)
- multi-channel power sourcing (1)
- multi-layer display (1)
- multi-objective optimization (1)
- multi-screen visualization environments (1)
- multi-solution optimization (1)
- multi-user VR (1)
- multibody system (1)
- multibody systems (1)
- multibond graphs (1)
- multidisciplinary (1)
- multimodal optimization (1)
- multiple Xbox 360 (1)
- multiple computer systems (1)
- multiresolution analysis (1)
- multiscale parameterization (1)
- multisensory (1)
- multisensory interface (1)
- music analysis (1)
- mutation (1)
- nano-composite (1)
- natural language processing (1)
- natural user interface (1)
- navigational search (1)
- near infrared (1)
- near-infrared (1)
- neural networks (1)
- neuro-cognitive performance (1)
- neuroevolution (1)
- neutral buoyancy (1)
- next generation sequencing (1)
- noise suppression (1)
- nomadic text entry (1)
- non-linear projection (1)
- nonlinear storytelling (1)
- numerical computation of residuals (1)
- object identification (1)
- object-oriented modelling (1)
- object-oriented physical systems modelling (1)
- objective function (1)
- octane (1)
- open educational resources (OERs) (1)
- operation mode independent causalities (1)
- optical character recognition (1)
- optical coherence tomography (1)
- optical flow (1)
- optical safeguard sensor (1)
- optical tracking (1)
- optical triangulation (1)
- optimal control (1)
- optimal control problem (1)
- optimized geometries (1)
- opto-electronic protective device (1)
- optoelectronic (1)
- parallel BFS (1)
- parallel difference visualization (1)
- parallel work queue (1)
- parameter estimation (1)
- parameter sensitivities of residuals of ARRs (1)
- parameter sensitivity of residuals (1)
- parametric (1)
- payment protocol (1)
- pedestrian counting system (1)
- pedestrian movements (1)
- pen interaction (1)
- perceived quality (1)
- perception of upright (1)
- performance modeling (1)
- performance optimizations (1)
- performance prediction (1)
- peripheral visual field (1)
- person and object detection and recognition (1)
- phenomenological approaches (1)
- phenotypic diversity (1)
- phenotypic feature (1)
- phenotypic niching (1)
- photometry (1)
- physical model immersive (1)
- physiological monitoring (1)
- plasma-enhanced CVD (PECVD) (deposition) (1)
- porous material (1)
- posture analysis (1)
- power spectral density (1)
- pre-optimization (1)
- predictive maintenance (1)
- prefrontal cortex (1)
- prehensile motions (1)
- preprocessing (1)
- presentation attack detection (1)
- presentation attack detection (PAD) (1)
- prioritizable ranking (1)
- privacy at work (1)
- privacy by design (1)
- process (1)
- prognosis (1)
- project-based learning (1)
- projection (1)
- projection based systems (1)
- propan-2-ol (1)
- property-based testing for robots (1)
- prototype theory (1)
- proxemics (1)
- pseudo-random number generator (1)
- psychophysics (1)
- qualitative reasoning (1)
- quality-diversity (1)
- quantitative model-based fault detection (1)
- quantum mechanics (1)
- question answering (1)
- radio-frequency identification (RFID) systems (1)
- rapid prototyping tool (1)
- ray tracing (1)
- rds encoding (1)
- recurrent neural network function (1)
- reference dataset (1)
- refined beam theory (1)
- region of interest (1)
- regression (1)
- regression testing (1)
- remaining useful life (1)
- remote diagnosis (1)
- remote sensing (1)
- remote-controlled robots (1)
- rendering (computer graphics) (1)
- repeated trend projection (1)
- representation (1)
- representation learning (1)
- requirements (1)
- requirements analysis (1)
- requirements management (1)
- residual bond graph sinks (1)
- resource utilization (1)
- reuse of indicators (1)
- ride comfort (1)
- road (1)
- robot action diagnosability (1)
- robot behaviour model (1)
- robot component monitoring (1)
- robot context awareness (1)
- robot control (1)
- robot control architecture (1)
- robot failure diagnosis (1)
- robot kinematics (1)
- robot personalisation (1)
- robot skill execution failures (1)
- robot skill generalisation (1)
- robotic arm (1)
- robotic black box (1)
- robotic evaluation (1)
- robots (1)
- routing (1)
- rules (1)
- run-time adaptation (1)
- rural areas (1)
- scalability (1)
- scene element representation (1)
- scene-segmentation (1)
- scenes (1)
- schädliches Programm (1)
- screens (display) (1)
- security APIs (1)
- security and privacy literacy (1)
- see-through display (1)
- see-through head-mounted displays (1)
- self-configuration (1)
- self-management (1)
- semantic image seg-mentation (1)
- semantic mapping (1)
- semi-continuous locomotion (1)
- semi-supervised learning (1)
- sensemaking (1)
- sensor data acquisition (1)
- sensor data transmission (1)
- sensor fusion (1)
- sensor resilience (1)
- sensor-based fault detection and diagnosis (1)
- sensory perception (1)
- server processors (1)
- service activities (1)
- shared memory (1)
- shell theory (1)
- short tandem repeat (1)
- short-term memory (1)
- signal processing algorithm (1)
- simulation of fault scenarios (1)
- simulation-based robot testing (1)
- simulator (1)
- situation awareness (1)
- skill execution models (1)
- skin detection (1)
- slip detection (1)
- slope based signature (1)
- small molecule (1)
- software (1)
- software development (1)
- software testing (1)
- software-based feedback agents (1)
- software-defined networking (1)
- space flight analog (1)
- spatial augmented reality (1)
- spatial orientation (1)
- spectral rendering (1)
- spectrum scan (1)
- spectrum sensing (1)
- speech recognition (1)
- spinal posture (1)
- static friction (1)
- stereoscopic vision (1)
- stiffeners (1)
- story authoring (1)
- strain (1)
- stress (1)
- stress detection (1)
- strukturelle Komplexität von Daten (1)
- subjective visual vertical (1)
- submillimeter precision (1)
- support vector machine (1)
- surface textures (1)
- surface topography (1)
- surrogate assisted phenotypic niching (1)
- surrogate models (1)
- switched three-phase power inverter (1)
- synthetic dataset (1)
- system mode independent bond graph representation (1)
- system modes (1)
- tactile sensing (1)
- task models (1)
- task planning (1)
- taxonomie (1)
- teaching (1)
- technology mapping (1)
- teleoperation (1)
- teleportation (1)
- telepresence (1)
- telomeres (1)
- territoriality (1)
- test case reduction (1)
- text detection (1)
- text entry in motion (1)
- text localization (1)
- textual model description languages (1)
- thread mapping (1)
- tiled displays (1)
- time series analysis (1)
- time series processing (1)
- tools for education (1)
- touchscreen (1)
- trace model (1)
- trace-based system (1)
- track irregularity (1)
- traffic sign detection (1)
- traffic sign localization (1)
- training monitoring (1)
- training performance relationship (1)
- transparency-enhancing technologies (1)
- travel techniques (1)
- true random number generator (1)
- tumor microenvironment (1)
- tumor-infiltrating immune cells (1)
- ultrasonic sensor (1)
- un-manned aerial vehicle (1)
- uncertainties (1)
- unexpected situations (1)
- unique bond graph representation for all modes of operation (1)
- unmanned ground vehicle (1)
- unrolling (1)
- unstructured data (1)
- unsupervised learning (1)
- usability (1)
- usable privacy controls (1)
- usable secure email (1)
- usage contexts (1)
- usage data analysis (1)
- user documentation (1)
- user engagement (1)
- user input (1)
- user interaction (1)
- user interface design (1)
- user modelling (1)
- vector units (1)
- verification and validation of robot action execution (1)
- vestibular system (1)
- view management (1)
- virtual environment framework (1)
- virtual locomotion (1)
- virtual or soft keyboard (1)
- visual attention (1)
- visual quality control (1)
- visualisation (1)
- visualization (1)
- visuohaptic feedback (1)
- walking (1)
- water dimer (1)
- wavelet (1)
- wearable sensor (1)
- wearable sensors (1)
- web (1)
- web components (1)
- web services (1)
- web technology (1)
- website (1)
- weight perception (1)
- weighting factors (1)
- welfare technology (1)
- whole-body interface (1)
- whole-exome sequencing (1)
- wind nuisance (1)
- wind nuisance threshold (1)
- wireless communication (1)
- wireless mesh networks (1)
- wireless performance (1)
- wmSDN (1)
- workday breaks (1)
- workspace awareness (1)
- xorshift-generator (1)
- youBot (1)
- zooming interface (1)
- zooming interfaces (1)
- Öffentlicher Sektor (1)
- Überwachung (1)
- Wavenet (1)
Safety-critical applications like autonomous driving use Deep Neural Networks (DNNs) for object detection and segmentation. The DNNs fail to predict when they observe an Out-of-Distribution (OOD) input leading to catastrophic consequences. Existing OOD detection methods were extensively studied for image inputs but have not been explored much for LiDAR inputs. So in this study, we proposed two datasets for benchmarking OOD detection in 3D semantic segmentation. We used Maximum Softmax Probability and Entropy scores generated using Deep Ensembles and Flipout versions of RandLA-Net as OOD scores. We observed that Deep Ensembles out perform Flipout model in OOD detection with greater AUROC scores for both datasets.
Login Data Set for Risk-Based Authentication
Synthesized login feature data of >33M login attempts and >3.3M users on a large-scale online service in Norway. Original data collected between February 2020 and February 2021.
This data sets aims to foster research and development for <a href="https://riskbasedauthentication.org">Risk-Based Authentication (RBA) systems. The data was synthesized from the real-world login behavior of more than 3.3M users at a large-scale single sign-on (SSO) online service in Norway.
Robust Identification and Segmentation of the Outer Skin Layers in Volumetric Fingerprint Data
(2022)
Despite the long history of fingerprint biometrics and its use to authenticate individuals, there are still some unsolved challenges with fingerprint acquisition and presentation attack detection (PAD). Currently available commercial fingerprint capture devices struggle with non-ideal skin conditions, including soft skin in infants. They are also susceptible to presentation attacks, which limits their applicability in unsupervised scenarios such as border control. Optical coherence tomography (OCT) could be a promising solution to these problems. In this work, we propose a digital signal processing chain for segmenting two complementary fingerprints from the same OCT fingertip scan: One fingerprint is captured as usual from the epidermis (“outer fingerprint”), whereas the other is taken from inside the skin, at the junction between the epidermis and the underlying dermis (“inner fingerprint”). The resulting 3D fingerprints are then converted to a conventional 2D grayscale representation from which minutiae points can be extracted using existing methods. Our approach is device-independent and has been proven to work with two different time domain OCT scanners. Using efficient GPGPU computing, it took less than a second to process an entire gigabyte of OCT data. To validate the results, we captured OCT fingerprints of 130 individual fingers and compared them with conventional 2D fingerprints of the same fingers. We found that both the outer and inner OCT fingerprints were backward compatible with conventional 2D fingerprints, with the inner fingerprint generally being less damaged and, therefore, more reliable.
Ziel der achten Auflage des wissenschaftlichen Workshops “Usable Security and Privacy” auf der Mensch und Computer 2022 ist es, aktuelle Forschungs- und Praxisbeiträge zu präsentieren und anschließend mit den Teilnehmenden zu diskutieren. Der Workshop soll ein etabliertes Forum fortführen und weiterentwickeln, in dem sich Experten aus verschiedenen Bereichen, z. B. Usability und Security Engineering, transdisziplinär austauschen können.
Auch die mittlerweile siebte Ausgabe des wissenschaftlichen Workshops “Usable Security und Privacy” auf der Mensch und Computer 2021 wird aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmer:innen diskutiert. Zwei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, zwei mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert:innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security- Engineering, transdisziplinär austauschen können.
The visual and auditory quality of computer-mediated stimuli for virtual and extended reality (VR/XR) is rapidly improving. Still, it remains challenging to provide a fully embodied sensation and awareness of objects surrounding, approaching, or touching us in a 3D environment, though it can greatly aid task performance in a 3D user interface. For example, feedback can provide warning signals for potential collisions (e.g., bumping into an obstacle while navigating) or pinpointing areas where one’s attention should be directed to (e.g., points of interest or danger). These events inform our motor behaviour and are often associated with perception mechanisms associated with our so-called peripersonal and extrapersonal space models that relate our body to object distance, direction, and contact point/impact. We will discuss these references spaces to explain the role of different cues in our motor action responses that underlie 3D interaction tasks. However, providing proximity and collision cues can be challenging. Various full-body vibration systems have been developed that stimulate body parts other than the hands, but can have limitations in their applicability and feasibility due to their cost and effort to operate, as well as hygienic considerations associated with e.g., Covid-19. Informed by results of a prior study using low-frequencies for collision feedback, in this paper we look at an unobtrusive way to provide spatial, proximal and collision cues. Specifically, we assess the potential of foot sole stimulation to provide cues about object direction and relative distance, as well as collision direction and force of impact. Results indicate that in particular vibration-based stimuli could be useful within the frame of peripersonal and extrapersonal space perception that support 3DUI tasks. Current results favor the feedback combination of continuous vibrotactor cues for proximity, and bass-shaker cues for body collision. Results show that users could rather easily judge the different cues at a reasonably high granularity. This granularity may be sufficient to support common navigation tasks in a 3DUI.
The processing of employee personal data is dramatically increasing. To protect employees' fundamental right to privacy, the law provides for the implementation of privacy controls, including transparency and intervention. At present, however, the stakeholders responsible for putting these obligations into action, such as employers and software engineers, simply lack the fundamental knowledge needed to design and implement the necessary controls. Indeed, privacy research has so far focused mainly on consumer relations in the private context. In contrast, privacy in the employment context is less well studied. However, since privacy is highly context-dependent, existing knowledge and privacy controls from other contexts cannot simply be adopted to the employment context. In particular, privacy in employment is subject to different legal and social norms, which require a different conceptualization of the right to privacy than is usual in other contexts. To adequately address these aspects, there is broad consensus that privacy must be regarded as a socio-technical concept in which human factors must be considered alongside technical-legal factors. Today, however, there is a particular lack of knowledge about human factors in employee privacy. Disregarding the needs and concerns of individuals or lack of usability, though, are common reasons for the failure of privacy and security measures in practice. This dissertation addresses key knowledge gaps on human factors in employee privacy by presenting the results of a total of three in-depth studies with employees in Germany. The results provide insights into employees' perceptions of the right to privacy, as well as their perceptions and expectations regarding the processing of employee personal data. The insights gained provide a foundation for the human-centered design and implementation of employee-centric privacy controls, i.e., privacy controls that incorporate the views, expectations, and capabilities of employees. Specifically, this dissertation presents the first mental models of employees on the right to informational self-determination, the German equivalent of the right to privacy. The results provide insights into employees' (1) perceptions of categories of data, (2) familiarity and expectations of the right to privacy, and (3) perceptions of data processing, data flow, safeguards, and threat models. In addition, three major types of mental models are presented, each with a different conceptualization of the right to privacy and a different desire for control. Moreover, this dissertation provides multiple insights into employees' perceptions of data sensitivity and willingness to disclose personal data in employment. Specifically, it highlights the uniqueness of the employment context compared to other contexts and breaks down the multi-dimensionality of employees' perceptions of personal data. As a result, the dimensions in which employees perceive data are presented, and differences among employees are highlighted. This is complemented by identifying personal characteristics and attitudes toward employers, as well as toward the right to privacy, that influence these perceptions. Furthermore, this dissertation provides insights into practical aspects for the implementation of personal data management solutions to safeguard employee privacy. Specifically, it presents the results of a user-centered design study with employees who process personal data of other employees as part of their job. Based on the results obtained, a privacy pattern is presented that harmonizes privacy obligations with personal data processing activities. The pattern is useful for designing privacy controls that help these employees handle employee personal data in a privacy-compliant manner, taking into account their skills and knowledge, thus helping to protect employee privacy. The outcome of this dissertation benefits a wide range of stakeholders who are involved in the protection of employee privacy. For example, it highlights the challenges to be considered by employers and software engineers when conceptualizing and designing employee-centric privacy controls. Policymakers and researchers gain a better understanding of employees' perceptions of privacy and obtain fundamental knowledge for future research into theoretical and abstract concepts or practical issues of employee privacy. Employers, IT engineers, and researchers gain insights into ways to empower data processing employees to handle employee personal data in a privacy-compliant manner, enabling employers to improve and promote compliance. Since the basic principles underlying informational self-determination have been incorporated into European privacy legislation, we are confident that our results are also of relevance to stakeholders outside Germany.
The following work presents algorithms for semi-automatic validation, feature extraction and ranking of time series measurements acquired from MOX gas sensors. Semi-automatic measurement validation is accomplished by extending established curve similarity algorithms with a slope-based signature calculation. Furthermore, a feature-based ranking metric is introduced. It allows for individual prioritization of each feature and can be used to find the best performing sensors regarding multiple research questions. Finally, the functionality of the algorithms, as well as the developed software suite, are demonstrated with an exemplary scenario, illustrating how to find the most power-efficient MOX gas sensor in a data set collected during an extensive screening consisting of 16,320 measurements, all taken with different sensors at various temperatures and analytes.
Künstliche Intelligenz (KI) ist aus der heutigen Gesellschaft kaum noch wegzudenken. Auch im Sport haben Methoden der KI in den letzten Jahren mehr und mehr Einzug gehalten. Ob und inwieweit dabei allerdings die derzeitigen Potenziale der KI tatsächlich ausgeschöpft werden, ist bislang nicht untersucht worden. Der Nutzen von Methoden der KI im Sport ist unbestritten, jedoch treten bei der Umsetzung in die Praxis gravierende Probleme auf, was den Zugang zu Ressourcen, die Verfügbarkeit von Experten und den Umgang mit den Methoden und Daten betrifft. Die Ursache für die, verglichen mit anderen Anwendungsgebieten, langsame An- bzw. Übernahme von Methoden der KI in den Spitzensport ist nach Hypothese des Autorenteams auf mehrere Mismatches zwischen dem Anwendungsfeld und den KI-Methoden zurückzuführen. Diese Mismatches sind methodischer, struktureller und auch kommunikativer Art. In der vorliegenden Expertise werden Vorschläge abgeleitet, die zur Auflösung der Mismatches führen können und zugleich neue Transfer- und Synergiemöglichkeiten aufzeigen. Außerdem wurden drei Use Cases zu Trainingssteuerung, Leistungsdiagnostik und Wettkampfdiagnostik exemplarisch umgesetzt. Dies erfolgte in Form entsprechender Projektbeschreibungen. Dabei zeigt die Ausarbeitung, auf welche Art und Weise Probleme, die heute noch bei der Verbindung zwischen KI und Sport bestehen, möglichst ausgeräumt werden können. Eine empirische Umsetzung des Use Case Trainingssteuerung erfolgte im Radsport, weshalb dieser ausführlicher dargestellt wird.
Computers can help us to trigger our intuition about how to solve a problem. But how does a computer take into account what a user wants and update these triggers? User preferences are hard to model as they are by nature vague, depend on the user’s background and are not always deterministic, changing depending on the context and process under which they were established. We pose that the process of preference discovery should be the object of interest in computer aided design or ideation. The process should be transparent, informative, interactive and intuitive. We formulate Hyper-Pref, a cyclic co-creative process between human and computer, which triggers the user’s intuition about what is possible and is updated according to what the user wants based on their decisions. We combine quality diversity algorithms, a divergent optimization method that can produce many, diverse solutions, with variational autoencoders to both model that diversity as well as the user’s preferences, discovering the preference hypervolume within large search spaces.
We describe a systematic approach for rendering time-varying simulation data produced by exa-scale simulations, using GPU workstations. The data sets we focus on use adaptive mesh refinement (AMR) to overcome memory bandwidth limitations by representing interesting regions in space with high detail. Particularly, our focus is on data sets where the AMR hierarchy is fixed and does not change over time. Our study is motivated by the NASA Exajet, a large computational fluid dynamics simulation of a civilian cargo aircraft that consists of 423 simulation time steps, each storing 2.5 GB of data per scalar field, amounting to a total of 4 TB. We present strategies for rendering this time series data set with smooth animation and at interactive rates using current generation GPUs. We start with an unoptimized baseline and step by step extend that to support fast streaming updates. Our approach demonstrates how to push current visualization workstations and modern visualization APIs to their limits to achieve interactive visualization of exa-scale time series data sets.
In robot-assisted therapy for individuals with Autism Spectrum Disorder, the workload of therapists during a therapeutic session is increased if they have to control the robot manually. To allow therapists to focus on the interaction with the person instead, the robot should be more autonomous, namely it should be able to interpret the person's state and continuously adapt its actions according to their behaviour. In this paper, we develop a personalised robot behaviour model that can be used in the robot decision-making process during an activity; this behaviour model is trained with the help of a user model that has been learned from real interaction data. We use Q-learning for this task, such that the results demonstrate that the policy requires about 10,000 iterations to converge. We thus investigate policy transfer for improving the convergence speed; we show that this is a feasible solution, but an inappropriate initial policy can lead to a suboptimal final return.
This paper explores the role of artificial intelligence (AI) in elite sports. We approach the topic from two perspectives. Firstly, we provide a literature based overview of AI success stories in areas other than sports. We identified multiple approaches in the area of Machine Perception, Machine Learning and Modeling, Planning and Optimization as well as Interaction and Intervention, holding a potential for improving training and competition. Secondly, we discover the present status of AI use in elite sports. Therefore, in addition to another literature review, we interviewed leading sports scientist, which are closely connected to the main national service institute for elite sports in their countries. The analysis of this literature review and the interviews show that the most activity is carried out in the methodical categories of signal and image processing. However, projects in the field of modeling & planning have become increasingly popular within the last years. Based on these two perspectives, we extract deficits, issues and opportunities and summarize them in six key challenges faced by the sports analytics community. These challenges include data collection, controllability of an AI by the practitioners and explainability of AI results.
Short summary
Accompanying dataset for our paper
A. Mitrevski, P. G. Plöger, and G. Lakemeyer, "Robot Action Diagnosis and Experience Correction by Falsifying Parameterised Execution Models," in Proceedings of the IEEE International Conference on Robotics and Automation (ICRA), 2021.
Contents
The dataset includes a single zip archive, containing data from the experiment described in the paper (conducted with a Toyota HSR). The zip archive contains three subdirectories:
handle_grasping_failure_database: A dump of a MongoDB database containing data from the handle grasping experiment, including ground-truth grasping failure annotations
pre_arm_motion_images: Images collected from the robot's hand camera before moving the robot's hand towards the handle
pregrasp_images: Images collected from the robot's hand camera just before closing the gripper for grasping
The image names include the time stamp at which the images were taken; this allows matching each image with the execution data in the database.
Database usage
After unzipping the archive, the database can be restored with the command
mongorestore handle_grasping_failure_database
This will create a MongoDB database with the name drawer_handle_grasping_failures.
Code for processing the data and failure analysis can be found in our <a href="https://github.com/alex-mitrevski/explainable-robot-execution-models">GitHub repository.
The dataset contains the following data from successful and failed executions of the Toyota HSR robot placing a book on a shelf.
RGB images from the robot's head camera
Depth images from the robot's head camera
Rendered images of the robot's 3D model from the point of view of the robot's head camera
Force-torque readings from a wrist-mounted force-torque sensor
Joint efforts, velocities and positions
extrinsic and intrinsic camera calibration parameters
frame-level anomaly annotations
The anomalies that occur during execution include:
the manipulated book falling down
books on the shelf being disturbed significantly
camera occlusions
robot being disturbed by an external collision
The dataset is split into a train, validation and test set with the following number of trials:
Train: 48 successful trials
Validation: 6 successful trials
Test: 60 anomalous trials and 7 successful trials
Contents
There are two zip archives included (grasping.zip and throwing.zip), corresponding to two experiments (grasping objects and throwing them in a drawer), both performed with a Toyota HSR. Each archive contains two directories - learning and generalisation - with object-specific learning and generalisation data. For each object, we provide a dump of a MongoDB database, which contains data sufficient for learning the models used in our experiments.
Usage
After unzipping the archives, each database can be restored with the command
mongorestore [data_directory_name]
This will create a MongoDB database with the name of the directory. Code for processing the data and model learning can be found in our <a href="https://github.com/alex-mitrevski/explainable-robot-execution-models">GitHub repository.
Short summary
This dataset accompanies our paper
A. Mitrevski, P. G. Plöger, and G. Lakemeyer, "Representation and Experience-Based Learning of Explainable Models for Robot Action Execution," in Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2020.
Contents
There are three zip archives included, each of them a dump of a MongoDB database corresponding to one of the three experiments in the paper:
Grasping a drawer handle (handle_drawer_logs.zip)
Grasping a fridge handle (handle_fridge_logs.zip)
Pulling an object (pull_logs.zip)
All three experiments were performed with a Toyota HSR. Only the data necessary for learning the models used in our experiments are included here.
Usage
After unzipping the archives, each database can be restored with the command
mongorestore [directory_name]
This will create a MongoDB database with the name of the directory (handle_drawer_logs, handle_fridge_logs, and pull_logs).
Code for processing the data and model learning can be found in our <a href="https://github.com/alex-mitrevski/explainable-robot-execution-models">GitHub repository.
Modern Monte-Carlo-based rendering systems still suffer from the computational complexity involved in the generation of noise-free images, making it challenging to synthesize interactive previews. We present a framework suited for rendering such previews of static scenes using a caching technique that builds upon a linkless octree. Our approach allows for memory-efficient storage and constant-time lookup to cache diffuse illumination at multiple hitpoints along the traced paths. Non-diffuse surfaces are dealt with in a hybrid way in order to reconstruct view-dependent illumination while maintaining interactive frame rates. By evaluating the visual fidelity against ground truth sequences and by benchmarking, we show that our approach compares well to low-noise path traced results, but with a greatly reduced computational complexity allowing for interactive frame rates. This way, our caching technique provides a useful tool for global illumination previews and multi-view rendering.
Graph databases employ graph structures such as nodes, attributes and edges to model and store relationships among data. To access this data, graph query languages (GQL) such as Cypher are typically used, which might be difficult to master for end-users. In the context of relational databases, sequence to SQL models, which translate natural language questions to SQL queries, have been proposed. While these Neural Machine Translation (NMT) models increase the accessibility of relational databases, NMT models for graph databases are not yet available mainly due to the lack of suitable parallel training data. In this short paper we sketch an architecture which enables the generation of synthetic training data for the graph query language Cypher.
Die Digitalisierung und der Einsatz von Informations- und Kommunikationstechnologien (ICT) hat im Arbeits- und Privatleben neben einer höheren Produktivität auch zu neuen Formen von psychischem Stress geführt. Das Stresserleben, das mit dem Einsatz von ICT verbunden ist, wird in der Literatur auch als Technostress bezeichnet. Die Forschung zu diesem Thema zeigt, dass die Entstehung von Technostress von individuellen Faktoren abhängt. Die Persönlichkeit von ICT-Anwenderinnen und Anwendern bestimmt nicht nur das Auftreten von Technostress, sondern hat auch Einfluss auf dessen gesundheitliche und leistungsbezogene Folgen. In diesem Literaturreview wird der Forschungsstand zu der Rolle von Persönlichkeitsunterschieden bei der Entstehung von Technostress und dessen Folgen systematisch zusammengefasst. Die Auswertung der relevanten Forschungsartikel erfolgt hinsichtlich verwendeter Variablen, Stichproben und Studiendesigns, statistischer Methoden, Theorien und Frameworks. Abschließend werden der aktuelle Forschungsstand eingeordnet und Forschungslücken aufgezeigt.
The accurate forecasting of solar radiation plays an important role for predictive control applications for energy systems with a high share of photovoltaic (PV) energy. Especially off-grid microgrid applications using predictive control applications can benefit from forecasts with a high temporal resolution to address sudden fluctuations of PV-power. However, cloud formation processes and movements are subject to ongoing research. For now-casting applications, all-sky-imagers (ASI) are used to offer an appropriate forecasting for aforementioned application. Recent research aims to achieve these forecasts via deep learning approaches, either as an image segmentation task to generate a DNI forecast through a cloud vectoring approach to translate the DNI to a GHI with ground-based measurement (Fabel et al., 2022; Nouri et al., 2021), or as an end-to-end regression task to generate a GHI forecast directly from the images (Paletta et al., 2021; Yang et al., 2021). While end-to-end regression might be the more attractive approach for off-grid scenarios, literature reports increased performance compared to smart-persistence but do not show satisfactory forecasting patterns (Paletta et al., 2021). This work takes a step back and investigates the possibility to translate ASI-images to current GHI to deploy the neural network as a feature extractor. An ImageNet pre-trained deep learning model is used to achieve such translation on an openly available dataset by the University of California San Diego (Pedro et al., 2019). The images and measurements were collected in Folsom, California. Results show that the neural network can successfully translate ASI-images to GHI for a variety of cloud situations without the need of any external variables. Extending the neural network to a forecasting task also shows promising forecasting patterns, which shows that the neural network extracts both temporal and momentarily features within the images to generate GHI forecasts.
Kollaborative Industrieroboter werden für produzierende Unternehmen immer kosteneffizienter. Während diese Systeme für den menschlichen Mitarbeiter eine große Hilfe sein können, stellen sie gleichzeitig ein ernstes Gesundheitsrisiko dar, wenn die zwingend notwendigen Sicherheitsmaßnahmen nur unzureichend umgesetzt werden. Herkömmliche Sicherheitseinrichtungen wie Zäune oder Lichtvorhänge bieten einen guten Schutz, aber solch statische Schutzvorrichtungen sind in neuen, hochdynamischen Arbeitsszenarien problematisch.
Im Forschungsprojekt BeyondSPAI wurde ein Funktionsmuster eines Multisensorsystems zur Absicherung solcher dynamischer Arbeitsszenarien entworfen, implementiert und im Feld getestet. Kern des Systems ist eine robuste optische Materialklassifikation, die mit Hilfe eines intelligenten InGaAs-Kamerasystems Haut von anderen typischen Werkstückoberflächen (z.B. Holz, Metalle od. Kunststoffe) unterscheiden kann. Diese einzigartige Eigenschaft wird genutzt, um menschliche Mitarbeiter zuverlässig zu erkennen, so dass ein konventioneller Roboter in Folge als personenbewusster Cobot arbeiten kann.
Das System ist modular und kann leicht mit weiteren Sensoren verschiedenster Art erweitert werden. Es kann an verschiedene Marken von Industrierobotern angepasst werden und lässt sich schnell an bestehenden Robotersystemen integrieren. Die vier vom System bereitgestellten Sicherheitsausgänge können dazu verwendet werden - abhängig von der durchdrungenen Überwachungszone - entweder eine Warnung auszugeben, die Bewegung des Roboters auf eine sichere Geschwindigkeit zu verlangsamen, oder den Roboter sicher anzuhalten. Sobald alle Zonen wieder als „eindeutig frei von Personen“ identifiziert sind, kann der Roboter wieder beschleunigen, seine ursprüngliche Bewegung wiederaufnehmen und die Arbeit fortsetzen.
Risk-based authentication (RBA) aims to protect users against attacks involving stolen passwords. RBA monitors features during login, and requests re-authentication when feature values widely differ from those previously observed. It is recommended by various national security organizations, and users perceive it more usable than and equally secure to equivalent two-factor authentication. Despite that, RBA is still used by very few online services. Reasons for this include a lack of validated open resources on RBA properties, implementation, and configuration. This effectively hinders the RBA research, development, and adoption progress.
To close this gap, we provide the first long-term RBA analysis on a real-world large-scale online service. We collected feature data of 3.3 million users and 31.3 million login attempts over more than 1 year. Based on the data, we provide (i) studies on RBA’s real-world characteristics plus its configurations and enhancements to balance usability, security, and privacy; (ii) a machine learning–based RBA parameter optimization method to support administrators finding an optimal configuration for their own use case scenario; (iii) an evaluation of the round-trip time feature’s potential to replace the IP address for enhanced user privacy; and (iv) a synthesized RBA dataset to reproduce this research and to foster future RBA research. Our results provide insights on selecting an optimized RBA configuration so that users profit from RBA after just a few logins. The open dataset enables researchers to study, test, and improve RBA for widespread deployment in the wild.
We introduce canonical weight normalization for convolutional neural networks. Inspired by the canonical tensor decomposition, we express the weight tensors in so-called canonical networks as scaled sums of outer vector products. In particular, we train network weights in the decomposed form, where scale weights are optimized separately for each mode. Additionally, similarly to weight normalization, we include a global scaling parameter. We study the initialization of the canonical form by running the power method and by drawing randomly from Gaussian or uniform distributions. Our results indicate that we can replace the power method with cheaper initializations drawn from standard distributions. The canonical re-parametrization leads to competitive normalization performance on the MNIST, CIFAR10, and SVHN data sets. Moreover, the formulation simplifies network compression. Once training has converged, the canonical form allows convenient model-compression by truncating the parameter sums.
TSEM: Temporally Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series
(2022)
Deep learning has become a one-size-fits-all solution for technical and business domains thanks to its flexibility and adaptability. It is implemented using opaque models, which unfortunately undermines the outcome trustworthiness. In order to have a better understanding of the behavior of a system, particularly one driven by time series, a look inside a deep learning model so-called posthoc eXplainable Artificial Intelligence (XAI) approaches, is important. There are two major types of XAI for time series data, namely model-agnostic and model-specific. Model-specific approach is considered in this work. While other approaches employ either Class Activation Mapping (CAM) or Attention Mechanism, we merge the two strategies into a single system, simply called the Temporally Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series (TSEM). TSEM combines the capabilities of RNN and CNN models in such a way that RNN hidden units are employed as attention weights for the CNN feature maps temporal axis. The result shows that TSEM outperforms XCM. It is similar to STAM in terms of accuracy, while also satisfying a number of interpretability criteria, including causality, fidelity, and spatiotemporality.
Comparative study of 3D object detection frameworks based on LiDAR data and sensor fusion techniques
(2022)
Estimating and understanding the surroundings of the vehicle precisely forms the basic and crucial step for the autonomous vehicle. The perception system plays a significant role in providing an accurate interpretation of a vehicle's environment in real-time. Generally, the perception system involves various subsystems such as localization, obstacle (static and dynamic) detection, and avoidance, mapping systems, and others. For perceiving the environment, these vehicles will be equipped with various exteroceptive (both passive and active) sensors in particular cameras, Radars, LiDARs, and others. These systems are equipped with deep learning techniques that transform the huge amount of data from the sensors into semantic information on which the object detection and localization tasks are performed. For numerous driving tasks, to provide accurate results, the location and depth information of a particular object is necessary. 3D object detection methods, by utilizing the additional pose data from the sensors such as LiDARs, stereo cameras, provides information on the size and location of the object. Based on recent research, 3D object detection frameworks performing object detection and localization on LiDAR data and sensor fusion techniques show significant improvement in their performance. In this work, a comparative study of the effect of using LiDAR data for object detection frameworks and the performance improvement seen by using sensor fusion techniques are performed. Along with discussing various state-of-the-art methods in both the cases, performing experimental analysis, and providing future research directions.
As cameras are ubiquitous in autonomous systems, object detection is a crucial task. Object detectors are widely used in applications such as autonomous driving, healthcare, and robotics. Given an image, an object detector outputs both the bounding box coordinates as well as classification probabilities for each object detected. The state-of-the-art detectors are treated as black boxes due to their highly non-linear internal computations. Even with unprecedented advancements in detector performance, the inability to explain how their outputs are generated limits their use in safety-critical applications in particular. It is therefore crucial to explain the reason behind each detector decision in order to gain user trust, enhance detector performance, and analyze their failure.
Previous work fails to explain as well as evaluate both bounding box and classification decisions individually for various detectors. Moreover, no tools explain each detector decision, evaluate the explanations, and also identify the reasons for detector failures. This restricts the flexibility to analyze detectors. The main contribution presented here is an open-source Detector Explanation Toolkit (DExT). It is used to explain the detector decisions, evaluate the explanations, and analyze detector errors. The detector decisions are explained visually by highlighting the image pixels that most influence a particular decision. The toolkit implements the proposed approach to generate a holistic explanation for all detector decisions using certain gradient-based explanation methods. To the author’s knowledge, this is the first work to conduct extensive qualitative and novel quantitative evaluations of different explanation methods across various detectors. The qualitative evaluation incorporates a visual analysis of the explanations carried out by the author as well as a human-centric evaluation. The human-centric evaluation includes a user study to understand user trust in the explanations generated across various explanation methods for different detectors. Four multi-object visualization methods are provided to merge the explanations of multiple objects detected in an image as well as the corresponding detector outputs in a single image. Finally, DExT implements the procedure to analyze detector failures using the formulated approach.
The visual analysis illustrates that the ability to explain a model is more dependent on the model itself than the actual ability of the explanation method. In addition, the explanations are affected by the object explained, the decision explained, detector architecture, training data labels, and model parameters. The results of the quantitative evaluation show that the Single Shot MultiBox Detector (SSD) is more faithfully explained compared to other detectors regardless of the explanation methods. In addition, a single explanation method cannot generate more faithful explanations than other methods for both the bounding box and the classification decision across different detectors. Both the quantitative and human-centric evaluations identify that SmoothGrad with Guided Backpropagation (GBP) provides more trustworthy explanations among selected methods across all detectors. Finally, a convex polygon-based multi-object visualization method provides more human-understandable visualization than other methods.
The author expects that DExT will motivate practitioners to evaluate object detectors from the interpretability perspective by explaining both bounding box and classification decisions.
Self-supervised learning has proved to be a powerful approach to learn image representations without the need of large labeled datasets. For underwater robotics, it is of great interest to design computer vision algorithms to improve perception capabilities such as sonar image classification. Due to the confidential nature of sonar imaging and the difficulty to interpret sonar images, it is challenging to create public large labeled sonar datasets to train supervised learning algorithms. In this work, we investigate the potential of three self-supervised learning methods (RotNet, Denoising Autoencoders, and Jigsaw) to learn high-quality sonar image representation without the need of human labels. We present pre-training and transfer learning results on real-life sonar image datasets. Our results indicate that self-supervised pre-training yields classification performance comparable to supervised pre-training in a few-shot transfer learning setup across all three methods. Code and self-supervised pre-trained models are be available at https://github.com/agrija9/ssl-sonar-images
ProtSTonKGs: A Sophisticated Transformer Trained on Protein Sequences, Text, and Knowledge Graphs
(2022)
While most approaches individually exploit unstructured data from the biomedical literature or structured data from biomedical knowledge graphs, their union can better exploit the advantages of such approaches, ultimately improving representations of biology. Using multimodal transformers for such purposes can improve performance on context dependent classication tasks, as demonstrated by our previous model, the Sophisticated Transformer Trained on Biomedical Text and Knowledge Graphs (STonKGs). In this work, we introduce ProtSTonKGs, a transformer aimed at learning all-encompassing representations of protein-protein interactions. ProtSTonKGs presents an extension to our previous work by adding textual protein descriptions and amino acid sequences (i.e., structural information) to the text- and knowledge graph-based input sequence used in STonKGs. We benchmark ProtSTonKGs against STonKGs, resulting in improved F1 scores by up to 0.066 (i.e., from 0.204 to 0.270) in several tasks such as predicting protein interactions in several contexts. Our work demonstrates how multimodal transformers can be used to integrate heterogeneous sources of information, paving the foundation for future approaches that use multiple modalities for biomedical applications.
Vection underwater
(2022)
This edited volume on “Recent Advances in Renewable Energy” presents a selection of refereed papers presented at the 1st International Conference on Electrical Systems and Automation. The book provides rigorous discussions, the state of the art, and recent developments in the field of renewable energy sources supported by examples and case studies, making it an educational tool for relevant undergraduate and graduate courses. The book will be a valuable reference for beginners, researchers, and professionals interested in renewable energy.
This book which is the second part of two volumes on ''Control of Electrical and Electronic Systems” presents a compilation of selected contributions to the 1st International Conference on Electrical Systems & Automation. The book provides rigorous discussions, the state of the art, and recent developments in the modelling, simulation and control of power electronics, industrial systems, and embedded systems. The book will be a valuable reference for beginners, researchers, and professionals interested in control of electrical and electronic systems.
Contextual information is widely considered for NLP and knowledge discovery in life sciences since it highly influences the exact meaning of natural language. The scientific challenge is not only to extract such context data, but also to store this data for further query and discovery approaches. Classical approaches use RDF triple stores, which have serious limitations. Here, we propose a multiple step knowledge graph approach using labeled property graphs based on polyglot persistence systems to utilize context data for context mining, graph queries, knowledge discovery and extraction. We introduce the graph-theoretic foundation for a general context concept within semantic networks and show a proof of concept based on biomedical literature and text mining. Our test system contains a knowledge graph derived from the entirety of PubMed and SCAIView data and is enriched with text mining data and domain-specific language data using Biological Expression Language. Here, context is a more general concept than annotations. This dense graph has more than 71M nodes and 850M relationships. We discuss the impact of this novel approach with 27 real-world use cases represented by graph queries. Storing and querying a giant knowledge graph as a labeled property graph is still a technological challenge. Here, we demonstrate how our data model is able to support the understanding and interpretation of biomedical data. We present several real-world use cases that utilize our massive, generated knowledge graph derived from PubMed data and enriched with additional contextual data. Finally, we show a working example in context of biologically relevant information using SCAIView.
Effective Neighborhood Feature Exploitation in Graph CNNs for Point Cloud Object-Part Segmentation
(2022)
Part segmentation is the task of semantic segmentation applied on objects and carries a wide range of applications from robotic manipulation to medical imaging. This work deals with the problem of part segmentation on raw, unordered point clouds of 3D objects. While pioneering works on deep learning for point clouds typically ignore taking advantage of local geometric structure around individual points, the subsequent methods proposed to extract features by exploiting local geometry have not yielded significant improvements either. In order to investigate further, a graph convolutional network (GCN) is used in this work in an attempt to increase the effectiveness of such neighborhood feature exploitation approaches. Most of the previous works also focus only on segmenting complete point cloud data. Considering the impracticality of such approaches, taking into consideration the real world scenarios where complete point clouds are scarcely available, this work proposes approaches to deal with partial point cloud segmentation.
In the attempt to better capture neighborhood features, this work proposes a novel method to learn regional part descriptors which guide and refine the segmentation predictions. The proposed approach helps the network achieve state-of-the-art performance of 86.4% mIoU on the ShapeNetPart dataset for methods which do not use any preprocessing techniques or voting strategies. In order to better deal with partial point clouds, this work also proposes new strategies to train and test on partial data. While achieving significant improvements compared to the baseline performance, the problem of partial point cloud segmentation is also viewed through an alternate lens of semantic shape completion.
Semantic shape completion networks not only help deal with partial point cloud segmentation but also enrich the information captured by the system by predicting complete point clouds with corresponding semantic labels for each point. To this end, a new network architecture for semantic shape completion is also proposed based on point completion network (PCN) which takes advantage of a graph convolution based hierarchical decoder for completion as well as segmentation. In addition to predicting complete point clouds, results indicate that the network is capable of reaching within a margin of 5% to the mIoU performance of dedicated segmentation networks for partial point cloud segmentation.
The processing of employees’ personal data is dramatically increasing, yet there is a lack of tools that allow employees to manage their privacy. In order to develop these tools, one needs to understand what sensitive personal data are and what factors influence employees’ willingness to disclose. Current privacy research, however, lacks such insights, as it has focused on other contexts in recent decades. To fill this research gap, we conducted a cross-sectional survey with 553 employees from Germany. Our survey provides multiple insights into the relationships between perceived data sensitivity and willingness to disclose in the employment context. Among other things, we show that the perceived sensitivity of certain types of data differs substantially from existing studies in other contexts. Moreover, currently used legal and contextual distinctions between different types of data do not accurately reflect the subtleties of employees’ perceptions. Instead, using 62 different data elements, we identified four groups of personal data that better reflect the multi-dimensionality of perceptions. However, previously found common disclosure antecedents in the context of online privacy do not seem to affect them. We further identified three groups of employees that differ in their perceived data sensitivity and willingness to disclose, but neither in their privacy beliefs nor in their demographics. Our findings thus provide employers, policy makers, and researchers with a better understanding of employees’ privacy perceptions and serve as a basis for future targeted research
on specific types of personal data and employees.
We benchmark the robustness of maximum likelihood based uncertainty estimation methods to outliers in training data for regression tasks. Outliers or noisy labels in training data results in degraded performances as well as incorrect estimation of uncertainty. We propose the use of a heavy-tailed distribution (Laplace distribution) to improve the robustness to outliers. This property is evaluated using standard regression benchmarks and on a high-dimensional regression task of monocular depth estimation, both containing outliers. In particular, heavy-tailed distribution based maximum likelihood provides better uncertainty estimates, better separation in uncertainty for out-of-distribution data, as well as better detection of adversarial attacks in the presence of outliers.
In Robot-Assisted Therapy for children with Autism Spectrum Disorder, the therapists’ workload is increased due to the necessity of controlling the robot manually. The solution for this problem is to increase the level of autonomy of the system, namely the robot should interpret and adapt to the behaviour of the child under therapy. The problem that we are adressing is to develop a behaviour model that will be used for the robot decision-making process, which will learn how to adequately react to certain child reactions. We propose the use of the reinforcement learning technique for this task, where feedback for learning is obtained from the therapist’s evaluation of a robot’s behaviour.
Collaboration among multiple users on large screens leads to complicated behavior patterns and group dynamics. To gain a deeper understanding of collaboration on vertical, large, high-resolution screens, this dissertation builds on previous research and gains novel insights through new observational studies. Among other things, the collected results reveal new patterns of collaborative coupling, suggest that territorial behavior is less critical than shown in previous research, and demonstrate that workspace awareness can also negatively affect the effectiveness of individual users.
In this thesis it is posed that the central object of preference discovery is a co-creative process in which the Other can be represented by a machine. It explores efficient methods to enhance introverted intuition using extraverted intuition's communication lines. Possible implementations of such processes are presented using novel algorithms that perform divergent search to feed the users' intuition with many examples of high quality solutions, allowing them to take influence interactively. The machine feeds and reflects upon human intuition, combining both what is possible and preferred. The machine model and the divergent optimization algorithms are the motor behind this co-creative process, in which machine and users co-create and interactively choose branches of an ad hoc hierarchical decomposition of the solution space.
The proposed co-creative process consists of several elements: a formal model for interactive co-creative processes, evolutionary divergent search, diversity and similarity, data-driven methods to discover diversity, limitations of artificial creative agents, matters of efficiency in behavioral and morphological modeling, visualization, a connection to prototype theory, and methods to allow users to influence artificial creative agents. This thesis helps putting the human back into the design loop in generative AI and optimization.
Recent advances in Natural Language Processing have substantially improved contextualized representations of language. However, the inclusion of factual knowledge, particularly in the biomedical domain, remains challenging. Hence, many Language Models (LMs) are extended by Knowledge Graphs (KGs), but most approaches require entity linking (i.e., explicit alignment between text and KG entities). Inspired by single-stream multimodal Transformers operating on text, image and video data, this thesis proposes the Sophisticated Transformer trained on biomedical text and Knowledge Graphs (STonKGs). STonKGs incorporates a novel multimodal architecture based on a cross encoder that uses the attention mechanism on a concatenation of input sequences derived from text and KG triples, respectively. Over 13 million so-called text-triple pairs, coming from PubMed and assembled using the Integrated Network and Dynamical Reasoning Assembler (INDRA), were used in an unsupervised pre-training procedure to learn representations of biomedical knowledge in STonKGs. By comparing STonKGs to an NLP- and a KG-baseline (operating on either text or KG data) on a benchmark consisting of eight fine-tuning tasks, the proposed knowledge integration method applied in STonKGs was empirically validated. Specifically, on tasks with a comparatively small dataset size and a larger number of classes, STonKGs resulted in considerable performance gains, beating the F1-score of the best baseline by up to 0.083. Both the source code as well as the code used to implement STonKGs are made publicly available so that the proposed method of this thesis can be extended to many other biomedical applications.
MOTIVATION
The majority of biomedical knowledge is stored in structured databases or as unstructured text in scientific publications. This vast amount of information has led to numerous machine learning-based biological applications using either text through natural language processing (NLP) or structured data through knowledge graph embedding models (KGEMs). However, representations based on a single modality are inherently limited.
RESULTS
To generate better representations of biological knowledge, we propose STonKGs, a Sophisticated Transformer trained on biomedical text and Knowledge Graphs (KGs). This multimodal Transformer uses combined input sequences of structured information from KGs and unstructured text data from biomedical literature to learn joint representations in a shared embedding space. First, we pre-trained STonKGs on a knowledge base assembled by the Integrated Network and Dynamical Reasoning Assembler (INDRA) consisting of millions of text-triple pairs extracted from biomedical literature by multiple NLP systems. Then, we benchmarked STonKGs against three baseline models trained on either one of the modalities (i.e., text or KG) across eight different classification tasks, each corresponding to a different biological application. Our results demonstrate that STonKGs outperforms both baselines, especially on the more challenging tasks with respect to the number of classes, improving upon the F1-score of the best baseline by up to 0.084 (i.e., from 0.881 to 0.965). Finally, our pre-trained model as well as the model architecture can be adapted to various other transfer learning applications.
AVAILABILITY
We make the source code and the Python package of STonKGs available at GitHub (https://github.com/stonkgs/stonkgs) and PyPI (https://pypi.org/project/stonkgs/). The pre-trained STonKGs models and the task-specific classification models are respectively available at https://huggingface.co/stonkgs/stonkgs-150k and https://zenodo.org/communities/stonkgs.
SUPPLEMENTARY INFORMATION
Supplementary data are available at Bioinformatics online.
It is challenging to provide users with a haptic weight sensation of virtual objects in VR since current consumer VR controllers and software-based approaches such as pseudo-haptics cannot render appropriate haptic stimuli. To overcome these limitations, we developed a haptic VR controller named Triggermuscle that adjusts its trigger resistance according to the weight of a virtual object. Therefore, users need to adapt their index finger force to grab objects of different virtual weights. Dynamic and continuous adjustment is enabled by a spring mechanism inside the casing of an HTC Vive controller. In two user studies, we explored the effect on weight perception and found large differences between participants for sensing change in trigger resistance and thus for discriminating virtual weights. The variations were easily distinguished and associated with weight by some participants while others did not notice them at all. We discuss possible limitations, confounding factors, how to overcome them in future research and the pros and cons of this novel technology.
In order to achieve the highest possible performance, the ray traversal and intersection routines at the core of every high-performance ray tracer are usually hand-coded, heavily optimized, and implemented separately for each hardware platform—even though they share most of their algorithmic core. The results are implementations that heavily mix algorithmic aspects with hardware and implementation details, making the code non-portable and difficult to change and maintain.
In this paper, we present a new approach that offers the ability to define in a functional language a set of conceptual, high-level language abstractions that are optimized away by a special compiler in order to maximize performance. Using this abstraction mechanism we separate a generic ray traversal and intersection algorithm from its low-level aspects that are specific to the target hardware. We demonstrate that our code is not only significantly more flexible, simpler to write, and more concise but also that the compiled results perform as well as state-of-the-art implementations on any of the tested CPU and GPU platforms.
Object-Based Trace Model for Automatic Indicator Computation in the Human Learning Environments
(2021)
This paper proposes a traces model in the form of an object or class model (in the UML sense) which allows the automatic calculation of indicators of various kinds and independently of the computer environment for human learning (CEHL). The model is based on the establishment of a trace-based system that encompasses all the logic of traces collecting and indicators calculation. It is im-plemented in the form of a trace database. It is an important contribution in the field of the exploitation of the traces of apprenticeship in a CEHL because it pro-vides a general formalism for modeling the traces and allowing the calculation of several indicators at the same time. Also, with the inclusion of calculated indica-tors as potential learning traces, our model provides a formalism for classifying the various indicators in the form of inheritance relationships, which promotes the reuse of indicators already calculated. Economically, the model can allow organi-zations with different learning platforms to invest only in one traces Management System. At the social level, it can allow a better sharing of trace databases be-tween the various research institutions in the field of CEHL.
Die Blockchain-Technologie ist einer der großen Innovationstreiber der letzten Jahre. Mit einer zugrundeliegenden Blockchain-Technologie ist auch der Betrieb von verteilten Anwendungen, sogenannter Decentralized Applications (DApps), bereits technisch umsetzbar. Dieser Beitrag verfolgt das Ziel, Gestaltungsmöglichkeiten der digitalen Verbraucherteilhabe an Blockchain-Anwendungen zu untersuchen. Hierzu enthält der Beitrag eine Einführung in die digitale Verbraucherteilhabe und die technischen Grundlagen und Eigenschaften der Blockchain-Technologie, einschließlich darauf basierender DApps. Abschließend werden technische, ethisch-organisatorische, rechtliche und sonstige Anforderungsbereiche für die Umsetzung von digitaler Verbraucherteilhabe in Blockchain-Anwendungen adressiert.
BACKGROUND: Humans demonstrate many physiological changes in microgravity for which long-duration head down bed rest (HDBR) is a reliable analog. However, information on how HDBR affects sensory processing is lacking.
OBJECTIVE: We previously showed [25] that microgravity alters the weighting applied to visual cues in determining the perceptual upright (PU), an effect that lasts long after return. Does long-duration HDBR have comparable effects?
METHODS: We assessed static spatial orientation using the luminous line test (subjective visual vertical, SVV) and the oriented character recognition test (PU) before, during and after 21 days of 6° HDBR in 10 participants. Methods were essentially identical as previously used in orbit [25].
RESULTS: Overall, HDBR had no effect on the reliance on visual relative to body cues in determining the PU. However, when considering the three critical time points (pre-bed rest, end of bed rest, and 14 days post-bed rest) there was a significant decrease in reliance on visual relative to body cues, as found in microgravity. The ratio had an average time constant of 7.28 days and returned to pre-bed-rest levels within 14 days. The SVV was unaffected.
CONCLUSIONS: We conclude that bed rest can be a useful analog for the study of the perception of static self-orientation during long-term exposure to microgravity. More detailed work on the precise time course of our effects is needed in both bed rest and microgravity conditions.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users. To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
Low-Cost In-Hand Slippage Detection and Avoidance for Robust Robotic Grasping with Compliant Fingers
(2021)
Mebendazole Mediates Proteasomal Degradation of GLI Transcription Factors in Acute Myeloid Leukemia
(2021)
The prognosis of elderly AML patients is still poor due to chemotherapy resistance. The Hedgehog (HH) pathway is important for leukemic transformation because of aberrant activation of GLI transcription factors. MBZ is a well-tolerated anthelmintic that exhibits strong antitumor effects. Herein, we show that MBZ induced strong, dose-dependent anti-leukemic effects on AML cells, including the sensitization of AML cells to chemotherapy with cytarabine. MBZ strongly reduced intracellular protein levels of GLI1/GLI2 transcription factors. Consequently, MBZ reduced the GLI promoter activity as observed in luciferase-based reporter assays in AML cell lines. Further analysis revealed that MBZ mediates its anti-leukemic effects by promoting the proteasomal degradation of GLI transcription factors via inhibition of HSP70/90 chaperone activity. Extensive molecular dynamics simulations were performed on the MBZ-HSP90 complex, showing a stable binding interaction at the ATP binding site. Importantly, two patients with refractory AML were treated with MBZ in an off-label setting and MBZ effectively reduced the GLI signaling activity in a modified plasma inhibitory assay, resulting in a decrease in peripheral blood blast counts in one patient. Our data prove that MBZ is an effective GLI inhibitor that should be evaluated in combination to conventional chemotherapy in the clinical setting.
It has been well proved that deep networks are efficient at extracting features from a given (source) labeled dataset. However, it is not always the case that they can generalize well to other (target) datasets which very often have a different underlying distribution. In this report, we evaluate four different domain adaptation techniques for image classification tasks: DeepCORAL, DeepDomainConfusion, CDAN and CDAN+E. These techniques are unsupervised given that the target dataset dopes not carry any labels during training phase. We evaluate model performance on the office-31 dataset. A link to the github repository of this report can be found here: https://github.com/agrija9/Deep-Unsupervised-Domain-Adaptation.
Recent experimental evidence suggest that mebendazole, a popular antiparasitic drug, binds to heat shock protein 90 (Hsp90) and inhibit acute myeloid leukemia cell growth. In this study we use quantum mechanics (QM), molecular similarity and molecular dynamics (MD) calculations to predict possible binding poses of mebendazole to the adenosine triphosphate (ATP) binding site of Hsp90. Extensive conformational searches and minimization of the five tautomers of mebendazole using MP2/aug-cc-pVTZ theory level resulting in 152 minima being identified. Mebendazole-Hsp90 complex models were created using the QM optimized conformations and protein coordinates obtained from experimental crystal structures that were chosen through similarity calculations. Nine different poses were identified from a total of 600 ns of explicit solvent, all-atom MD simulations using two different force fields. All simulations support the hypothesis that mebendazole is able to bind to the ATP binding site of Hsp90.
When users in virtual reality cannot physically walk and self-motions are instead only visually simulated, spatial updating is often impaired. In this paper, we report on a study that investigated if HeadJoystick, an embodied leaning-based flying interface, could improve performance in a 3D navigational search task that relies on maintaining situational awareness and spatial updating in VR. We compared it to Gamepad, a standard flying interface. For both interfaces, participants were seated on a swivel chair and controlled simulated rotations by physically rotating. They either leaned (forward/backward, right/left, up/down) or used the Gamepad thumbsticks for simulated translation. In a gamified 3D navigational search task, participants had to find eight balls within 5 min. Those balls were hidden amongst 16 randomly positioned boxes in a dark environment devoid of any landmarks. Compared to the Gamepad, participants collected more balls using the HeadJoystick. It also minimized the distance travelled, motion sickness, and mental task demand. Moreover, the HeadJoystick was rated better in terms of ease of use, controllability, learnability, overall usability, and self-motion perception. However, participants rated HeadJoystick could be more physically fatiguing after a long use. Overall, participants felt more engaged with HeadJoystick, enjoyed it more, and preferred it. Together, this provides evidence that leaning-based interfaces like HeadJoystick can provide an affordable and effective alternative for flying in VR and potentially telepresence drones.
Urban LoRa networks promise to provide a cost-efficient and scalable communication backbone for smart cities. One core challenge in rolling out and operating these networks is radio network planning, i.e., precise predictions about possible new locations and their impact on network coverage. Path loss models aid in this task, but evaluating and comparing different models requires a sufficiently large set of high-quality received packet power samples. In this paper, we report on a corresponding large-scale measurement study covering an urban area of 200km2 over a period of 230 days using sensors deployed on garbage trucks, resulting in more than 112 thousand high-quality samples for received packet power. Using this data, we compare eleven previously proposed path loss models and additionally provide new coefficients for the Log-distance model. Our results reveal that the Log-distance model and other well-known empirical models such as Okumura or Winner+ provide reasonable estimations in an urban environment, and terrain based models such as ITM or ITWOM have no advantages. In addition, we derive estimations for the needed sample size in similar measurement campaigns. To stimulate further research in this direction, we make all our data publicly available.
Designs for decorative surfaces, such as flooring, must cover several square meters to avoid visible repeats. While the use of desktop systems is feasible to support the designer, it is challenging for a non-domain expert to get the right impression of the appearances of surfaces due to limited display sizes and a potentially unnatural interaction with digital designs. At the same time, large-format editing of structure and gloss is becoming increasingly important. Advances in the printing industry allow for more faithful reproduction of such surface details. Unfortunately, existing systems for visualizing surface designs cannot adequately account for gloss, especially for non-domain experts. Here, the complex interaction of light sources and the camera position must be controlled using software controls. As a result, only small parts of the data set can be properly inspected at a time. Also, real-world lighting is not considered here. This work presents a system for the processing and realistic visualization of large decorative surface designs. To this end, we present a tabletop solution that is coupled to a live 360° video feed and a spatial tracking system. This allows for reproducing natural view-dependent effects like real-world reflections, live image-based lighting, and the interaction with the design using virtual light sources employing natural interaction techniques that allow for a more accurate inspection even for non-domain experts.
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against account takeover attacks, such as those using stolen passwords. RBA is recommended by NIST and NCSC to strengthen password-based authentication, and is already used by major online services. Also, users consider RBA to be more usable than two-factor authentication and just as secure. However, users currently obtain RBA's high security and usability benefits at the cost of exposing potentially sensitive personal data (e.g., IP address or browser information). This conflicts with user privacy and requires to consider user rights regarding the processing of personal data. We outline potential privacy challenges regarding different attacker models and propose improvements to balance privacy in RBA systems. To estimate the properties of the privacy-preserving RBA enhancements in practical environments, we evaluated a subset of them with long-term data from 780 users of a real-world online service. Our results show the potential to increase privacy in RBA solutions. However, it is limited to certain parameters that should guide RBA design to protect privacy. We outline research directions that need to be considered to achieve a widespread adoption of privacy preserving RBA with high user acceptance.
Components and Architecture for the Implementation of Technology-Driven Employee Data Protection
(2021)
In the field of service robots, dealing with faults is crucial to promote user acceptance. In this context, this work focuses on some specific faults which arise from the interaction of a robot with its real world environment due to insufficient knowledge for action execution. In our previous work [1], we have shown that such missing knowledge can be obtained through learning by experimentation. The combination of symbolic and geometric models allows us to represent action execution knowledge effectively. However we did not propose a suitable representation of the symbolic model. In this work we investigate such symbolic representation and evaluate its learning capability. The experimental analysis is performed on four use cases using four different learning paradigms. As a result, the symbolic representation together with the most suitable learning paradigm are identified.
The majority of biomedical knowledge is stored in structured databases or as unstructured text in scientific publications. This vast amount of information has led to numerous machine learning-based biological applications using either text through natural language processing (NLP) or structured data through knowledge graph embedding models (KGEMs). However, representations based on a single modality are inherently limited. To generate better representations of biological knowledge, we propose STonKGs, a Sophisticated Transformer trained on biomedical text and Knowledge Graphs. This multimodal Transformer uses combined input sequences of structured information from KGs and unstructured text data from biomedical literature to learn joint representations. First, we pre-trained STonKGs on a knowledge base assembled by the Integrated Network and Dynamical Reasoning Assembler (INDRA) consisting of millions of text-triple pairs extracted from biomedical literature by multiple NLP systems. Then, we benchmarked STonKGs against two baseline models trained on either one of the modalities (i.e., text or KG) across eight different classification tasks, each corresponding to a different biological application. Our results demonstrate that STonKGs outperforms both baselines, especially on the more challenging tasks with respect to the number of classes, improving upon the F1-score of the best baseline by up to 0.083. Additionally, our pre-trained model as well as the model architecture can be adapted to various other transfer learning applications. Finally, the source code and pre-trained STonKGs models are available at https://github.com/stonkgs/stonkgs and https://huggingface.co/stonkgs/stonkgs-150k.
Application of underwater robots are on the rise, most of them are dependent on sonar for underwater vision, but the lack of strong perception capabilities limits them in this task. An important issue in sonar perception is matching image patches, which can enable other techniques like localization, change detection, and mapping. There is a rich literature for this problem in color images, but for acoustic images, it is lacking, due to the physics that produce these images. In this paper we improve on our previous results for this problem (Valdenegro-Toro et al, 2017), instead of modeling features manually, a Convolutional Neural Network (CNN) learns a similarity function and predicts if two input sonar images are similar or not. With the objective of improving the sonar image matching problem further, three state of the art CNN architectures are evaluated on the Marine Debris dataset, namely DenseNet, and VGG, with a siamese or two-channel architecture, and contrastive loss. To ensure a fair evaluation of each network, thorough hyper-parameter optimization is executed. We find that the best performing models are DenseNet Two-Channel network with 0.955 AUC, VGG-Siamese with contrastive loss at 0.949 AUC and DenseNet Siamese with 0.921 AUC. By ensembling the top performing DenseNet two-channel and DenseNet-Siamese models overall highest prediction accuracy obtained is 0.978 AUC, showing a large improvement over the 0.91 AUC in the state of the art.