Refine
H-BRS Bibliography
- yes (265) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (265) (remove)
Document Type
- Article (265) (remove)
Year of publication
Keywords
- Virtual reality (5)
- virtual reality (5)
- 3D user interface (3)
- ARRs (3)
- Augmented Reality (3)
- Datenanalyse (3)
- Sicherheitslücke (3)
- post-buckling (3)
- ARIMA (2)
- Artificial Intelligence (2)
- BPMS (2)
- Cognition (2)
- Computer Graphics (2)
- Datenschutz (2)
- Datensicherheit (2)
- ERP (2)
- FDI (2)
- Force field (2)
- Humans (2)
- Hybrid systems (2)
- Incremental bond graph (2)
- Intelligent Transport System (2)
- Machine Learning (2)
- Navigation (2)
- Optimization (2)
- Perception (2)
- Performance (2)
- Privacy (2)
- Ray Tracing (2)
- Security (2)
- Software (2)
- Software-Werkzeug (2)
- UAV (2)
- Unternehmen (2)
- Usable Security (2)
- Vehicular Ad hoc Networks (2)
- Virtual Reality (2)
- Visualization (2)
- YAWL (2)
- adaptive fault thresholds (2)
- automated sensor-screening (2)
- biometrics (2)
- bond graph modelling (2)
- computer vision (2)
- confidence level (2)
- data filtering (2)
- fault detection (2)
- foveated rendering (2)
- haptics (2)
- incremental bond graphs (2)
- neural network (2)
- nonlinear stability (2)
- optical sensor (2)
- parallel breadth-first search (2)
- power electronic systems (2)
- semiconducting metal oxide gas sensor array (2)
- short-term load forecasting (2)
- simulation (2)
- spatial updating (2)
- usable privacy (2)
- 16S rRNA gene sequencing (1)
- 3D navigation (1)
- 3D nucleus (1)
- 3D real-time echocardiography (1)
- 3D user interfaces (1)
- ABT-737 (1)
- ACPYPE (1)
- AD (1)
- AI usage in sports (1)
- ALPS (1)
- AMBER (1)
- AML (1)
- API Documentation (1)
- AR (1)
- Absolute nodal coordinate formulation (1)
- Active vision interface (1)
- Acute lymphoblastic leukemia (1)
- Adaptive Control (1)
- Advanced Driver Assistance Systems (1)
- Affordances (1)
- Algorithms (1)
- Alkane (1)
- Altenhilfe (1)
- Antifuse memory (1)
- Assekuranz (1)
- Auditory Cueing (1)
- Augmented reality (1)
- Automation (1)
- Automatisierte Prozesse Rekonstruktio (1)
- Autonomy (1)
- Autotuning (1)
- Available Bandwidth (1)
- B-cell leukemia (1)
- B-cell lymphoma (1)
- B2T (1)
- BCL2 (1)
- BFS (1)
- BH3-mimetic inhibitor (1)
- Background music (1)
- Bacteria, Anaerobic (1)
- Ball tracking (1)
- Bandwidth Estimation (1)
- Basis set (1)
- Bayesian Network (1)
- Bayesian optimization (1)
- Bayessches Netz (1)
- Begriffsbestimmung (1)
- Behörde (1)
- Benchmarking (1)
- Bewertung (1)
- Big Data Analysis (1)
- Blasendiagramm (1)
- Blocking (1)
- Bond Graph modelling and simulation (1)
- Bond graph (1)
- Bond graph modelling (1)
- Bond graphs (1)
- Bundesrepublik Deutschland (1)
- Bundesverfassungsgericht (1)
- Business (1)
- Business Process Intelligence (1)
- Business-to-Thing (1)
- CAS (1)
- CC (1)
- CEHL (1)
- CIBERSORT (1)
- CMMN (1)
- CREBBP (1)
- Camera selection (1)
- Camera view analysis (1)
- Canonical form of state equations and standard interconnection form for robustness study (1)
- Capability framework (1)
- Capacity (1)
- Carbohydrate (1)
- Case Management Model and Notation (1)
- Centrifugation (1)
- Cervical cancer screening (1)
- Cervicovaginal microbiome (1)
- Chalcogenide glass sensor (1)
- Challenges (1)
- Change-Prozess (1)
- Chemical imaging (1)
- Chip ID (1)
- Circular saws (1)
- Classifiers (1)
- Cloud computing (1)
- Co-rotational formulation (1)
- Code Generation (1)
- Cognitive informatics (1)
- Colposcopy (1)
- Company (1)
- Complexity (1)
- Computational causality (1)
- Computational chemistry (1)
- Computational modeling (1)
- Computer (1)
- Computer Automated Design (1)
- Computer Vision System (1)
- Computerkriminalitaet (1)
- Conformation (1)
- Congenital heart disease (1)
- Content Security Policies (1)
- Cooperative Awareness Message (1)
- Counterfeit protection (1)
- Coupled process (1)
- Creative Commons (1)
- Cross-sensitivity (1)
- Crystal structure (1)
- Current research information systems (1)
- Curriculum (1)
- Cutting sticks problem (1)
- Cybersickness (1)
- DNA extraction protocols (1)
- DNA profile (1)
- DOI (1)
- Data Publication (1)
- DataCite (1)
- Database Management Systems (1)
- Datenbanksysteme (1)
- Datenbasierte Prozessanalyse (1)
- Decision Diagram (1)
- Decision Network (1)
- Decision Support (1)
- Demenz (1)
- Demonstration-based training (1)
- Developer Centered Security (1)
- Diagnostic bond graphs (1)
- Dienstgütevereinbarung (1)
- Digital Object Identifier (1)
- Digitale Lehre (1)
- Digitisation (1)
- Disco (1)
- Discrete cosine transform (1)
- Displacement (1)
- Domain-Specific Languages (1)
- Domain-Specific Modeling Languages, (1)
- Domestic service robots (1)
- Drosophila (1)
- Drug resistance (1)
- EEG (1)
- ELM (1)
- EM leakage (1)
- EN-12299 (1)
- ERP system (1)
- ETV6-RUNX1 (1)
- Earth Observation (1)
- Ecosystem simulation (1)
- Educational Data Mining (1)
- Educational Process Mining (1)
- Edutainment (1)
- Efficiency (1)
- Einflussdiagramm (1)
- Electric mobility (1)
- Electromagnetic Fields (1)
- Electronic commerce (1)
- Electronic tongue (1)
- Elephantiasis (1)
- Emotion (1)
- Empfehlung (1)
- Empirical formula (1)
- Encryption (1)
- Enterprise Resource Planning Software (1)
- Enterprise Resource Planning System (1)
- Entropy (1)
- Entscheidungsunterstützung (1)
- Environmental Data (1)
- Escape analysis (1)
- Euler–Bernoulli beam (1)
- Evaluation (1)
- Evaluation als Kommunikationsanlass (1)
- Event detection (1)
- Ewing´s Sarcoma Family of Tumors (1)
- Exchange and reuse of bond graph models (1)
- Executive functions (1)
- Exercise (1)
- Expert system (1)
- External faults (1)
- FGR (1)
- Face and hand gesture recognition (1)
- Factory instrumentation (1)
- Fallbeschreibung (1)
- Fas (1)
- Fault detection and isolation (1)
- Fault handling (1)
- Feedback (1)
- Fehlertoleranz (1)
- Female (1)
- Field sequential imaging (1)
- Finite element modelling (1)
- First-order frequency domain sensitivities (1)
- Flexible multibody system (1)
- Fluency (1)
- Focus plus context (1)
- Foreground segmentation (1)
- Formal definition and validation of the content of a model description (1)
- Forms of mathematical models (1)
- Functional Programming (1)
- Funktionsprinzip (1)
- Fuzzy Mining (1)
- Fuzzy logic (1)
- Fuzzy-System (1)
- GDPR (1)
- GLI (1)
- Gabor filter (1)
- Games (1)
- Garbage collection (1)
- Gaze-contingent depth-of-field (1)
- Genetic Predisposition to Disease (1)
- Genetic algorithm (1)
- Genomics (1)
- Genomics/methods (1)
- Gesamt-Exom-Sequenzierung (1)
- Geschäftsprozess (1)
- Glycam06 (1)
- Goal Programming (1)
- Graph embeddings (1)
- Graph theory (1)
- Gromacs (1)
- Group behavior analysis (1)
- HDAC inhibitor (1)
- HDBR (1)
- HIF1α (1)
- HPV diagnostic (1)
- HSP70 (1)
- HSP90 (1)
- Hacker-Angriff (1)
- Hacking-Technik (1)
- Hand injuries (1)
- Handlungsempfehlung (1)
- Head Mounted Display (1)
- Head-mounted Display (1)
- High hyperdiploidy (1)
- High-resolution displays (1)
- High-speed railway track (1)
- Histograms (1)
- Hochschulehre (1)
- Hochschullehre (1)
- Human computer interaction (1)
- Human factors (1)
- Human orientation perception (1)
- Human robot interaction (1)
- Hybrid models of engineering systems (1)
- Hydraulic orifices (1)
- Hydrocarbon (1)
- IC identification (1)
- IEEE 802.11 (1)
- IT professionals (1)
- IT-Verfügbarkeit (1)
- IaaS (1)
- Ikaros (1)
- Image Processing (1)
- Immersion (1)
- Immersive analytics (1)
- Inductive Visual Mining (1)
- Industry 4.0 (1)
- Influence Diagram (1)
- Informations-, Kommunikations- und Medientechnologie (1)
- Informationssicherheit (1)
- Informationstechnik (1)
- Instantiation (1)
- Instruction design (1)
- Integral backstepping technique (1)
- Intel Xeon Phi (1)
- Interaction Patterns (1)
- Interaction devices (1)
- Internet (1)
- Internet of Things (1)
- Interventionstudie (1)
- It-Diensteanbieter (1)
- Java virtual machine (1)
- Kartographie (1)
- Key recovery (1)
- KiBP (1)
- Knowledge Graphs (1)
- Knowledge Worker (1)
- Knowledge-intensive Business Process (1)
- Kopie digitaler Daten (1)
- Laminar and turbulent flow (1)
- Language Engineering (1)
- Language learning (1)
- Langzeitbehandlung (1)
- Large display interaction (1)
- Large-Scale Online Services (1)
- Lattice Boltzmann Method (1)
- Leakage circuits (1)
- Leg (1)
- Lehr-Lernpsychologie (1)
- Leistungsdaten (1)
- Lernen (1)
- Lernumgebung (1)
- Library model (1)
- Ligands (1)
- Light curtain (1)
- Linear Optimization (1)
- Linear Programming (1)
- Linear quadratic regulator (1)
- Lineare Optimierung (1)
- Locomotion (1)
- Lymphedema (1)
- MAP-Elites (1)
- MBZ (1)
- MOX gas sensors (1)
- MP2.5 (1)
- Machine learning (1)
- Male (1)
- Malware (1)
- Manipulation tasks (1)
- Materialwissenschaften (1)
- Mathematical methods (1)
- Maximal covering location problem (1)
- Measurement (1)
- Media in education (1)
- Memory (1)
- Memory management (1)
- Meteorological Data (1)
- Methodenanalyse (1)
- Methodologies (1)
- Microsoft CRM 2013 (1)
- Mobile robotics (1)
- Mode switching LTI model (1)
- Mode-dependent ARRs (1)
- Model-Driven Engineering (1)
- Model-based failure prognosis (1)
- Model-free control (1)
- Modellbildung (1)
- Modelling (1)
- Molecular rotation (1)
- Molecular structure (1)
- Monitoring (1)
- Motion (1)
- Motion Sickness (1)
- Multi-camera (1)
- Multi-component heavy metal solution (1)
- Multi-objective (1)
- Multi-stage (1)
- Multibody systems (1)
- Multidisciplinary systems (1)
- Multimodal hyperspectral data (1)
- Multisensory cues (1)
- N200 (1)
- NFKB (1)
- NGS (1)
- NLP (1)
- NUMA (1)
- Naive physics (1)
- Neuroscience (1)
- Nonbonded scaling factor (1)
- Nonlinear control quadrotor uav (1)
- Nutzung (1)
- Nvidia graphic processors (1)
- OCT (1)
- OCU (1)
- OER (1)
- Object detection (1)
- Object recognition (1)
- Object-oriented physical systems modelling (1)
- Older adults (1)
- Online-Überwachung (1)
- Ontology (1)
- Open Educational Ressources (1)
- Open innovation (1)
- Open source software (1)
- OpenFlow (1)
- OpenMP (1)
- Optical flow (1)
- Organic compounds and Functional groups (1)
- Out-of-view Objects (1)
- Outside-in process (1)
- P300 (1)
- PAD (1)
- PCR inhibitors (1)
- PSD (1)
- PaaS (1)
- Parameter degradation model (1)
- Parameter uncertainties (1)
- Pattern recognition (1)
- Pedigree (1)
- Perceptual Upright (1)
- Pflegepersonal (1)
- Physical activity (1)
- Plan-based robot control (1)
- Poisson Disc Distribution (1)
- Polymorphism, Single Nucleotide (1)
- Precursor B-Cell Lymphoblastic Leukemia-Lymphoma/genetics (1)
- Prescriptive Analytics (1)
- Presence (1)
- Pressure wire (1)
- Pressure-volume relation (1)
- ProM (1)
- Process Mining (1)
- Process Models (1)
- Process views (1)
- Programmsicherheit (1)
- Pronunciation (1)
- Protective system (1)
- Proximity (1)
- Prozessanalyse (1)
- Prozessmanagement (1)
- Prozessoptimierung (1)
- Präskriptive Analytik (1)
- Pseudonym Concept (1)
- Psychology (1)
- Public Key Infrastructure (1)
- Quality Diversity (1)
- Quality diversity (1)
- Quality of Service (1)
- Qualitätspakt Lehre (1)
- Quantum mechanical methods (1)
- RAS (1)
- RFID (1)
- RMS acceleration (1)
- Raman spectroscopy (1)
- Rapid Prototyping (1)
- RapidMiner (1)
- Ray tracing (1)
- Reader (1)
- Real-time image processing (1)
- Reasoning (1)
- Recht (Gesetzgebung) (1)
- Recommendation (1)
- Recommender systems (1)
- Relapse (1)
- Remaining Useful Life (1)
- Rendering (1)
- Risk-based Authentication (1)
- RoboCup industrial (1)
- Robotersteuerung (1)
- Robotics (1)
- Robustness (1)
- Rule-based production systems (1)
- SAHA (1)
- SIMPACK (1)
- SMPA loop (1)
- SOA (1)
- STAT3 (1)
- SVM (1)
- SaaS (1)
- Saccades (1)
- Saccadic suppression (1)
- Safety guard (1)
- Schadenanalyse (1)
- Schadensprozess (1)
- School experiments (1)
- Schutzmaßnahme (1)
- Secure Coding Practices (1)
- Security architecture (1)
- Security level (1)
- Semantic scene understanding (1)
- Semantic search (1)
- Sense of presence (1)
- Sensitivity matrix in symbolic form (1)
- Service-Level-Agreement (1)
- Service-Roboter (1)
- Service-based cloud computing (1)
- Set partition problem (1)
- Shadow detection (1)
- Sicherheit (1)
- Sicherheitsarchitektur (1)
- Sicherheitsniveau (1)
- Side channels (1)
- Signal detection (1)
- Signal processing (1)
- Simulation (1)
- Single Instruction Multiple Data (SIMD) (1)
- Single-objective (1)
- Skalierbarkeit (1)
- Skin (1)
- Skin detection (1)
- Smart Card (1)
- Smart Card User Interface Design, Interactive Smart Card Applications (1)
- Smart factory (1)
- Social intelligence (1)
- Sociomateriality (1)
- Software Architecture (1)
- Software Framework (1)
- Software-Fehler (1)
- Software-Lebenszyklus (1)
- Software-Sicherheit (1)
- Software-Test (1)
- Software-Testautomatisierung (1)
- Somatogravic Illusion (1)
- SpMV (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Spectroscopy (1)
- Spherical treadmill (1)
- Stabilitätsanalyse (1)
- Stream cipher (1)
- Studenten (1)
- Studienverlauf (1)
- Supervised classification (1)
- Support Vector Machine (1)
- Surrogate Modeling (1)
- System health monitoring (1)
- TEL-AML1 (1)
- TP53 (1)
- Tag (1)
- Taxonomie (1)
- Taxonomy (1)
- Teaching Quality Pact (1)
- Technologie (1)
- Teleconferencing system (1)
- Terrain rendering (1)
- Testing (1)
- Text detection (1)
- Text recognition (1)
- Therapy (1)
- Throughput (1)
- Tracking (1)
- Transformations between various description formats (1)
- Translocation (1)
- Transponder (1)
- Travel Techniques (1)
- Treatment of discontinuities and singularities in ordinary differential equations (1)
- UGV (1)
- USAR (1)
- Umgebung (Umwelt) (1)
- Unity (1)
- Unknown parameter degradation (1)
- Unterstützung (1)
- Usability (1)
- User engagement (1)
- User interface (1)
- User interfaces (1)
- User-Computer Interface (1)
- VR (1)
- VR-based systems (1)
- Vector Units (1)
- Vehicle-2-Vehicle Communication (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Vehicle Com- munication (1)
- Verfassungsbeschwerde (1)
- Verschlüsselung (1)
- Versicherung (1)
- Vertrag (1)
- Vertragsbeendigung (1)
- Vertragspartner (1)
- Vertriebssysteme (1)
- Vibrational microspectroscopy (1)
- Video surveillance (1)
- View selection (1)
- Virtual Environment (1)
- Virtual Memory Palace (1)
- Virtuelle Realität (1)
- Visual Computing (1)
- Visual Cueing (1)
- Visual Discrimination (1)
- Visual perception (1)
- Wang-tiles (1)
- Watermarking (1)
- WiFi (1)
- Wireless backhaul (1)
- Wissensarbeiter (1)
- Wissensintensiver Geschäftsprozess (1)
- Workflow (1)
- Workflow Management (1)
- XML schema for bond graph models (1)
- Young adults (1)
- Zielprogrammierung (1)
- accelerometer (1)
- acute (1)
- adaptive trigger (1)
- aerodynamics (1)
- allopurinol (1)
- analog/digital signal processing (1)
- analytical redundancy relation residuals (1)
- antibody deficiency (1)
- apoptosis (1)
- architectural distortion (1)
- assistive robotics (1)
- atomic operation (1)
- authentication (1)
- autoimmune lymphoproliferative syndrome (1)
- autoinflammatory disease (1)
- automated 3D scanning (1)
- automatic measurement validation (1)
- automation of sample processing (1)
- averaged bond graph models (1)
- back-of-device interaction (1)
- bicausal diagnostic Bond Graphs (1)
- bioinformatics (1)
- bond graph (1)
- bond graphs (1)
- bond-graph-based physical systems modelling (1)
- bootstrapping (1)
- breast cancer (1)
- built environment (1)
- cancer (1)
- change process (1)
- childhood (1)
- childhood cancer syndrome (1)
- closed kinematic chain (1)
- collision (1)
- complete basis set limit (1)
- concrete plate (1)
- constitutional mismatch repair syndrome (1)
- constructive process deviance (1)
- controller design (1)
- curved shell (1)
- cyanide (1)
- cybersickness (1)
- data analysis (1)
- data locality (1)
- deep learning (1)
- degraded DNA (1)
- design process (1)
- detection (1)
- diagnostic bond graphs (1)
- differential algebraic equation systems (1)
- displacement measurement (1)
- distance perception (1)
- dynamic vector fields (1)
- e-Research (1)
- electrochemical sensor (1)
- elite sports (1)
- employee privacy (1)
- enterprise software (1)
- erbliche Krebssyndrome (1)
- estimation (1)
- evaluation as a mean to communication (1)
- execution (1)
- explainable AI (1)
- extraction-linked bias (1)
- extreme learning machine (1)
- eye movement (1)
- eye tracking (1)
- eye-tracking (1)
- factor analysis (1)
- failure prognostic (1)
- fault indicators (1)
- fault scenarios (1)
- feature (1)
- felt obligations (1)
- fingerprint (1)
- finite element method (1)
- fitness-fatigue model (1)
- fixed causalities generation of analytical redundancy relations (1)
- flight zone (1)
- flying (1)
- force sensing (1)
- forensic (1)
- free and open source software (1)
- frequency (1)
- fuel (1)
- gaze (1)
- general plate theory (1)
- genes (1)
- genetic testing (1)
- genetics (1)
- genetische Testung (1)
- geofence (1)
- graphene oxide powder (1)
- graphene oxide powders (1)
- gravito-inertial force (1)
- guidance (1)
- haptic interfaces (1)
- head down bed rest (1)
- heart rate control (1)
- heart rate modeling (1)
- heart rate prediction (1)
- heavy metal (1)
- high degree of diagnostic coverage and reliability (1)
- high diagnostic coverage and reliability (1)
- high dynamic range resistance readout (1)
- high speed railway vehicle (1)
- high-throughput DNA sequencing (1)
- high-throughput sequencing (1)
- hospital environment (1)
- hospital-acquired infections (1)
- human computer interaction (1)
- human microbiome (1)
- human-centred design (1)
- hybrid system models (1)
- hydrocarbon (1)
- ideal switches (1)
- immunodeficiency (1)
- indicators calculation (1)
- informational self-determination (1)
- interactive computer graphics (1)
- intervention mechanisms (1)
- intrinsics (1)
- ion-selective electrodes (1)
- irregularity amplitude (1)
- isolation (1)
- large-high-resolution displays (1)
- latent class analysis (1)
- leaning (1)
- leaning-based interfaces (1)
- learning traces (1)
- leukemia (1)
- lipid (1)
- load control (1)
- locomotion (1)
- locomotion interface (1)
- long short-term memory (1)
- lymphocytic (1)
- massive parallel sequencing (1)
- mathematical modeling (1)
- mebendazole (1)
- memory bandwidth (1)
- mental models (1)
- micro-benchmarks (1)
- microbial community structure (1)
- microbial ecology (1)
- microbiome (1)
- microbiome analyses (1)
- mixed reality (1)
- mobile applications (1)
- mobiler Roboter (1)
- modal superposition (1)
- mode-dependent implicit state space model (1)
- mode-switching linear time-invariant models (1)
- model exchange (1)
- modelling methodology (1)
- monitoring (1)
- mood (1)
- motion estimation (1)
- motion sickness (1)
- mp2 (1)
- multi-channel power sourcing (1)
- multi-solution optimization (1)
- multibody system (1)
- multibond graphs (1)
- multisensory cues (1)
- mutation (1)
- nano-composite (1)
- natural language processing (1)
- navigational search (1)
- near infrared (1)
- neuro-cognitive performance (1)
- next generation sequencing (1)
- numerical computation of residuals (1)
- object-oriented modelling (1)
- octane (1)
- operation mode independent causalities (1)
- optic flow (1)
- optical coherence tomography (1)
- optical flow (1)
- optical triangulation (1)
- opto-electronic protective device (1)
- optoelectronic (1)
- parallel work queue (1)
- parameter estimation (1)
- parameter sensitivity of residuals (1)
- perceived quality (1)
- perception of upright (1)
- performance modeling (1)
- performance prediction (1)
- peripheral vision (1)
- phenomenological approaches (1)
- physical activity (1)
- plasma-enhanced CVD (PECVD) (deposition) (1)
- porous material (1)
- posture analysis (1)
- power spectral density (1)
- pre-optimization (1)
- predictive maintenance (1)
- prefrontal cortex (1)
- presentation attack detection (1)
- presentation attack detection (PAD) (1)
- prioritizable ranking (1)
- privacy at work (1)
- privacy by design (1)
- process (1)
- prognosis (1)
- projection based systems (1)
- propan-2-ol (1)
- psychophysics (1)
- quantitative model-based fault detection (1)
- quantum mechanics (1)
- rapid prototyping tool (1)
- ray tracing (1)
- redundant work (1)
- refined beam theory (1)
- region of interest (1)
- regression testing (1)
- reinforcement learning (1)
- remaining useful life (1)
- repeated trend projection (1)
- residual bond graph sinks (1)
- residual sinks (1)
- reuse of indicators (1)
- ride comfort (1)
- robot behaviour model (1)
- robot control architecture (1)
- robot execution failures (1)
- robot introspection (1)
- robot personalisation (1)
- routing (1)
- run-time adaptation (1)
- scalability (1)
- schädliches Programm (1)
- security and privacy literacy (1)
- self-motion perception (1)
- semi-continuous locomotion (1)
- sensemaking (1)
- sensor fusion (1)
- sensor resilience (1)
- server processors (1)
- shared memory (1)
- shell theory (1)
- short tandem repeat (1)
- signal processing algorithm (1)
- simulation of fault scenarios (1)
- situation awareness (1)
- skill execution models (1)
- slip detection (1)
- slope based signature (1)
- software engineering (1)
- software testing (1)
- software-defined networking (1)
- space flight analog (1)
- spatial augmented reality (1)
- spatial orientation (1)
- spinal posture (1)
- stiffeners (1)
- structural equation modeling (1)
- subjective visual vertical (1)
- switched three-phase power inverter (1)
- system mode independent bond graph representation (1)
- system modes (1)
- tactile sensing (1)
- task planning (1)
- teleoperation (1)
- teleportation (1)
- telomeres (1)
- test case reduction (1)
- text mining (1)
- textual model description languages (1)
- thread mapping (1)
- time series analysis (1)
- tools for education (1)
- trace model (1)
- trace-based system (1)
- track irregularity (1)
- training monitoring (1)
- training performance relationship (1)
- transparency-enhancing technologies (1)
- travel techniques (1)
- tumor microenvironment (1)
- tumor-infiltrating immune cells (1)
- uncertainties (1)
- unrolling (1)
- usable privacy controls (1)
- user modelling (1)
- user study (1)
- vection (1)
- vector units (1)
- vestibular system (1)
- vibration (1)
- view management (1)
- visual attention (1)
- water dimer (1)
- wavelet (1)
- wearable sensor (1)
- wearable sensors (1)
- web services (1)
- weight perception (1)
- whole-exome sequencing (1)
- wind nuisance (1)
- wireless mesh networks (1)
- workday breaks (1)
- zooming interfaces (1)
- Überwachung (1)
- Wavenet (1)
Might the gravity levels found on other planets and on the moon be sufficient to provide an adequate perception of upright for astronauts? Can the amount of gravity required be predicted from the physiological threshold for linear acceleration? The perception of upright is determined not only by gravity but also visual information when available and assumptions about the orientation of the body. Here, we used a human centrifuge to simulate gravity levels from zero to earth gravity along the long-axis of the body and measured observers' perception of upright using the Oriented Character Recognition Test (OCHART) with and without visual cues arranged to indicate a direction of gravity that differed from the body's long axis. This procedure allowed us to assess the relative contribution of the added gravity in determining the perceptual upright. Control experiments off the centrifuge allowed us to measure the relative contributions of normal gravity, vision, and body orientation for each participant. We found that the influence of 1 g in determining the perceptual upright did not depend on whether the acceleration was created by lying on the centrifuge or by normal gravity. The 50% threshold for centrifuge-simulated gravity's ability to influence the perceptual upright was at around 0.15 g, close to the level of moon gravity but much higher than the threshold for detecting linear acceleration along the long axis of the body. This observation may partially explain the instability of moonwalkers but is good news for future missions to Mars.
Structure-activity relationships of thiostrepton derivatives: implications for rational drug design
(2014)
This paper presents recent research on an active multispectral scanning sensor capable of classifying an object's surface material in order to distinguish between different kinds of materials and human skin. The sensor itself has already been presented in previous work and can be used in conjunction with safeguarding equipment at manually-fed machines or robot workplaces, for example. This work shows how an extended sensor system with advanced material classifiers can be used to provide additional value by distinguishing different materials of work pieces in order to suggest different tools or parameters for the machine (e.g. the use of a different saw blade or rotation speed at table saws). Additionally, a first implementation and evaluation of an active multispectral camera system addressing new safety applications is described. Both approaches intend to increase the productivity and the user's acceptance of the sensor technology.
The reciprocal translocation t(12;21)(p13;q22), the most common structural genomic alteration in B-cell precursor acute lymphoblastic leukaemia in children, results in a chimeric transcription factor TEL-AML1 (ETV6-RUNX1). We identified directly and indirectly regulated target genes utilizing an inducible TEL-AML1 system derived from the murine pro B-cell line BA/F3 and a monoclonal antibody directed against TEL-AML1. By integration of promoter binding identified with chromatin immunoprecipitation (ChIP)-on-chip, gene expression and protein output through microarray technology and stable labelling of amino acids in cell culture, we identified 217 directly and 118 indirectly regulated targets of the TEL-AML1 fusion protein. Directly, but not indirectly, regulated promoters were enriched in AML1-binding sites. The majority of promoter regions were specific for the fusion protein and not bound by native AML1 or TEL. Comparison with gene expression profiles from TEL-AML1-positive patients identified 56 concordantly misregulated genes with negative effects on proliferation and cellular transport mechanisms and positive effects on cellular migration, and stress responses including immunological responses. In summary, this work for the first time gives a comprehensive insight into how TEL-AML1 expression may directly and indirectly contribute to alter cells to become prone for leukemic transformation.
Die Vorstandsperspektive
(2013)
In this paper we present the steps towards a well-designed concept of a 5VR6 system for school experiments in scientific domains like physics, biology and chemistry. The steps include the analysis of system requirements in general, the analysis of school experiments and the analysis of input and output devices demands. Based on the results of these steps we show a taxonomy of school experiments and provide a comparison between several currently available devices which can be used for building such a system. We also compare the advantages and shortcomings of 5VR6 and 5AR6 systems in general to show why, in our opinion, 5VR6 systems are better suited for school-use.
Generating and visualizing large areas of vegetation that look natural makes terrain surfaces much more realistic. However, this is a challenging field in computer graphics, because ecological systems are complex and visually appealing plant models are geometrically detailed. This work presents Silva (System for the Instantiation of Large Vegetated Areas), a system to generate and visualize large vegetated areas based on the ecological surrounding. Silva generates vegetation on Wang-tiles with associated reusable distributions enabling multi-level instantiation. This paper presents a method to generate Poisson Disc Distributions (PDDs) with variable radii on Wang-tile sets (without a global optimization) that is able to generate seamless tilings. Because Silva has a freely configurable generation pipeline and can consider plant neighborhoods it is able to incorporate arbitrary abiotic and biotic components during generation. Based on multi-levelinstancing and nested kd-trees, the distributions on the Wang-tiles allow their acceleration structures to be reused during visualization. This enables Silva to visualize large vegetated areas of several hundred square kilometers with low render times and a small memory footprint.
Hybrid system models exploit the modelling abstraction that fast state transitions take place instantaneously so that they encompass discrete events and the continuous time behaviour for the while of a system mode. If a system is in a certain mode, e.g. two rigid bodies stick together, then residuals of analytical redundancy relations (ARRs) within certain small bounds indicate that the system is healthy. An unobserved mode change, however, invalidates the current model for the dynamic behaviour. As a result, ARR residuals may exceed current thresholds indicating faults in system components that have not happened. The paper shows that ARR residuals derived from a bond graph cannot only serve as fault indicators but may also be used for bond graph model-based system mode identification. ARR residuals are numerically computed in an off-line simulation by coupling a bond graph of the faulty system to a non-faulty system bond graph through residual sinks. In real-time simulation, the faulty system model is to be replaced by measurements from the real system. As parameter values are uncertain, it is important to determine adaptive ARR thresholds that, given uncertain parameters, allow to decide whether the dynamic behaviour in a current system mode is the one of the healthy system so that false alarms or overlooking of true faults can be avoided. The paper shows how incremental bond graphs can be used to determine adaptive mode-dependent ARR thresholds for switched linear time-invariant systems with uncertain parameters in order to support robust fault detection. Bond graph-based hybrid system mode identification as well as the determination of adaptive fault thresholds is illustrated by application to a power electronic system easy to survey. Some simulation results have been analytically validated.
Open Source ERP-Systeme
(2012)
Mit Free and Open Source Software können die IT-Kosten in erheblichem Umfang gesenkt werden. Wegen ihres hohen Durchdringungsgrades in Unternehmen und des damit verbundenen Kostenblocks gilt dies insbesondere für Free and Open Source (FOS-) ERP-Systeme. Zwar sind die Verbreitung und die Akzeptanz von FOS-ERP-Systemen in den letzten Jahren schon stark angewachsen, durch eine verbesserte Markttransparenz lassen sich aber noch weitere Potenziale erschließen. Bestehende Marktübersichten für FOS-ERP-Systeme sind jedoch wenig umfassend. Vor diesem Hintergrund wurde ein Marktspiegel mit detaillierten Angaben zu den verschiedenen FOS-ERP-Systemen erstellt.
ERP systems are being used throughout the whole enterprise and are therefore responsible for a high percentage of IT expenses. The use of Free and Open Source ERP systems (FOS ERP systems) can help to reduce these IT costs. Though the acceptance of FOS ERP systems has increased enormously in the last years, even more entreprises would use FOS ERP systems to support their order processing, if the FOS ERP market was more transparent. Existing market surveys are less comprehensive. Therefore, a detailed market guide was developed.
We present our approach to extend a Virtual Reality software framework towards the use for Augmented Reality applications. Although VR and AR applications have very similar requirements in terms of abstract components (like 6DOF input, stereoscopic output, simulation engines), the requirements in terms of hardware and software vary considerably. In this article we would like to share the experience gained from adapting our VR software framework for AR applications. We will address design issues for this task. The result is a VR/AR basic software that allows us to implement interactive applications without fixing their type (VR or AR) beforehand. Switching from VR to AR is a matter of changing the configuration file of the application. We also give an example of the use of the extended framework: Augmenting the magnetic field of bar magnets in physics classes. We describe the setup of the system and the real-time calculation of the magnetic field, using a GPU.
Using virtual environment systems for road safety education requires a realistic simulation of road traffic. Current traffic simulations are either too restricted in their complexity of agent behavior or focus on aspects not important in virtual environments. More importantly, none of them are concerned with modeling misbehavior of traffic participants which is part of every-day traffic and should therefore not be neglected in this context. We present a concept for a traffic simulation that addresses the need for more realistic agent behavior with regard to road safety education. The two major components of this concept are a simulation of persistent agents which minimizes computational overhead and a model of cognitive processes of human drivers combined with psychological personality profiles to allow for individual behavior and misbehavior.
The relative contributions of radial and laminar optic flow to the perception of linear self-motion
(2012)
When illusory self-motion is induced in a stationary observer by optic flow, the perceived distance traveled is generally overestimated relative to the distance of a remembered target (Redlick, Harris, & Jenkin, 2001): subjects feel they have gone further than the simulated distance and indicate that they have arrived at a target's previously seen location too early. In this article we assess how the radial and laminar components of translational optic flow contribute to the perceived distance traveled. Subjects monocularly viewed a target presented in a virtual hallway wallpapered with stripes that periodically changed color to prevent tracking. The target was then extinguished and the visible area of the hallway shrunk to an oval region 40° (h) × 24° (v). Subjects either continued to look centrally or shifted their gaze eccentrically, thus varying the relative amounts of radial and laminar flow visible. They were then presented with visual motion compatible with moving down the hallway toward the target and pressed a button when they perceived that they had reached the target's remembered position. Data were modeled by the output of a leaky spatial integrator (Lappe, Jenkin, & Harris, 2007). The sensory gain varied systematically with viewing eccentricity while the leak constant was independent of viewing eccentricity. Results were modeled as the linear sum of separate mechanisms sensitive to radial and laminar optic flow. Results are compatible with independent channels for processing the radial and laminar flow components of optic flow that add linearly to produce large but predictable errors in perceived distance traveled.
For the case when the abstraction of instantaneous state transitions is adopted, this paper proposes to start fault detection and isolation in an engineering system from a single time-invariant causality bond graph representation of a hybrid model. To that end, the paper picks up on a long-known proposal to model switching devices by a transformer modulated by a Boolean variable and a resistor in fixed conductance causality accounting for its ON resistance. Bond graph representations of hybrid system models developed in this way have been used so far mainly for the purpose of simulation. The paper shows that they can well constitute an approach to the bond-graph-based quantitative fault detection and isolation of hybrid models. Advantages are that the standard sequential causality assignment procedure can be a used without modification. A single set of analytical redundancy relations valid for all physically feasible system modes can be (automatically) derived from the bond graph. Stiff model equations due to small values of the ON resistance in the switch model may be avoided by symbolic reformulation of equations and letting the ON resistance of some switches tend to zero, turning them into ideal switches.
First, for two examples considered in the literature, it is shown that the approach proposed in this paper can produce the same analytical redundancy relations as were obtained from a hybrid bond graph with controlled junctions and the use of a sequential causality assignment procedure especially for fault detection and isolation purpose. Moreover, the usefulness of the proposed approach is illustrated in two case studies by its application to standard switching circuits extensively used in power electronic systems and by simulation of some fault scenarios. The approach, however, is not confined to the fault detection and isolation of such systems. Analytically validated simulation results obtained by means of the program Scilab give confidence in the approach.
A bond graph representation of switching devices known for a long time has been a modulated transformer with a modulus b(t)∈{0,1}∀t≥0 in conjunction with a resistor R:Ron accounting for the ON-resistance of a switch considered non-ideal. Besides other representations, this simple model has been used in bond graphs for simulation of the dynamic behaviour of hybrid systems. A previous article of the author has proposed to use the transformer–resistor pair in bond graphs for fault diagnosis in hybrid systems. Advantages are a unique bond graph for all system modes, the application of the unmodified standard Sequential Causality Assignment Procedure, fixed computational causalities and the derivation of analytical redundancy relations incorporating ‘Boolean’ transformer moduli so that they hold for all system modes. Switches temporarily connect and disconnect model parts. As a result, some independent storage elements may temporarily become dependent, so that the number of state variables is not time-invariant. This article addresses this problem in the context of modelling and simulation of fault scenarios in hybrid systems. In order to keep time-invariant preferred integral causality at storage ports, residual sinks previously introduced by the author are used. When two storage elements become dependent at a switching time instance ts, a residual sink is activated. It enforces that the outputs of two dependent storage elements become immediately equal by imposing the conjugate3 power variable of appropriate value on their inputs. The approach is illustrated by the bond graph modelling and simulation of some fault scenarios in a standard three-phase switched power inverter supplying power into an RL-load in a delta configuration. A well-developed approach to model-based fault detection and isolation is to evaluate the residual of analytical redundancy relations. In this article, analytical redundancy relation residuals have been computed numerically by coupling a bond graph of the faulty system to one of the non-faulty systems by means of residual sinks. The presented approach is not confined to power electronic systems but can be used for hybrid systems in other domains as well. In further work, the RL-load may be replaced by a bond graph model of an alternating current motor in order to study the effect of switch failures in the power inverter on to the dynamic behaviour of the motor.
Ein SLA (Service Level Agreement) legt alle Punkte einer vertraglichen Zusammenarbeit zwischen Unternehmen und Service Provider verbindlich fest. Ein SLA muss sorgfältig erstellt werden, um ein Vertrauensverhältnis zwischen beiden Seiten herzustellen. Dabei geht es um inhaltliche, organisatorische und technische Anforderungen sowie um eine exakte Festlegung auf verwendete Fachbegriffe und Leistungskriterien. Der vorliegende Beitrag beschreibt Punkt für Punkt den Inhalt eines SLA. Das sind u.a. die Benennung der Vetragspartner, die Leistungskriterien, die die Qualität des Dienstes sicherstellen sowie die Überwachung der Erbringung der vereinbarten Leistung und die Dauer des Vertrages.
Fuzzelarbeit: Identifizierung unbekannter Sicherheitslücken und Software-Fehler durch Fuzzing
(2011)
Fuzzing als toolgestützte Identifizierung von Sicherheitslücken wird in der Regel im letzten Stadium der Softwareentwicklung zum Einsatz kommen. Es eignet sich zur Suche nach Sicherheitslücken in jeder Art Software. Die Robustheit der untersuchten Zielsoftware wird beim Fuzzing mit zielgerichteten, unvorhergesehenen Eingabedaten überprüft. Der Fuzzing-Prozess wird im Artikel beschrieben, ebenso die Taxometrie von Fuzzern, die in "dumme" und "intelligente" Fuzzer eingeteilt werden. Die Identifizierung von Sicherheitslücken oder Fehlern in der Zielsoftware erfolgt durch ein umfassendes Monitoring (Debugger, Profiler, Tracker). Die meist große Zahl identifizierter Schwachstellen und Verwundbarkeiten macht eine Bewertung jeder einzelnen erforderlich, weil in der Regel aus Wirtschaftlichkeitsgründen nicht alle behoben werden können. Als wichtige Bewertungsparameter werden genannt: Erkennbarkeit für Dritte, Reproduzierbarkeit, Ausnutzbarkeit, benötigte Zugriffsrechte und generierbarer Schaden. Im Internet werden etwa 300 Tools angeboten. Die Qualität eines Fuzzers lässt sich jedoch nicht pauschal angeben. Die Wirksamkeit und Eignung eines Fuzzers hängen von der Zielsoftware und den individuellen Anforderungen des Testers ab.
Novel Automated Three-Dimensional Genome Scanning Based on the Nuclear Architecture of Telomeres
(2011)
Die Fachhochschulen haben sich als Hochschulen für angewandte Wissenschaften seit ihrer Gründung Anfang der 70er Jahre deutlich gewandelt. Das Fächerportfolio vieler Fachhochschulen ist inzwischen mit jenem der Universitäten vergleichbar. In einigen Fächern bilden die Fachhochschulen sogar den überwiegenden Anteil von Absolventen aus. Die anwendungsorientierte Spitzenforschung gehört zum Selbstverständnis vieler Fachhochschulen. Vor diesem Hintergrund ist es unverständlich und für die wirtschaftliche Zukunftsfähigkeit schädlich, dass Fachhochschulen immer noch deutliche Wettbewerbsnachteile in der Weiterqualifizierung des wissenschaftlichen Nachwuchses haben. Dies gilt umso mehr, wenn mit Fachhochschulen vergleichbaren privaten Hochschulen das Promotionsrecht zugestanden wird.
Zentrale Archivierung und verteilte Kommunikation digitaler Bilddaten in der Pneumokoniosevorsorge
(2010)
Pneumokoniose-Vorsorgeuntersuchungen erfordern die Befundung einer Röntgenthoraxaufnahme nach ILO-Staublungenklassifikation. Inzwischen werden die benötigten Aufnahmen bereits in großem Umfang digital angefertigt und kommuniziert. Hierdurch entstehen neue Anforderungen an verwendete Technik und Workflow-Mechanismen, um einen effizienten Ablauf von Untersuchung, Befundung und Dokumentation zu gewährleisten.
Simultaneous detection of cyanide and heavy metals for environmental analysis by means of µISEs
(2010)
Die Tool-gestützte Identifizierung von Sicherheitslücken kann in verschiedenen Stadien des Software-Entwicklungsprozesses und -Lebenszyklus durchgeführt werden. Mit Fuzzing und Threat-Modeling stehen beispielsweise zwei Methoden zur Verfügung, welche zum Finden von Sicherheitsproblemen auch in produktiv betriebenen Anwendungen eingesetzt werden können. Beim Threat-Modeling handelt es sich um ein heuristisches Verfahren, das die methodische Entwicklung eines vertrauenswürdigen Systementwurfs unterstützt. Mit der Fuzzing-Methode lässt sich die Robustheit der untersuchten Software sowohl mit willkürlichen als auch mit zielgerichteten Daten überprüfen. Im Beitrag werden die Vorgehensweisen beim Einsatz der beiden Methoden skizziert sowie Hinweise auf entsprechende Tools gegeben.
In this paper, residual sinks are used in bond graph model-based quantitative fault detection for the coupling of a model of a faultless process engineering system to a bond graph model of the faulty system. By this way, integral causality can be used as the preferred computational causality in both models. There is no need for numerical differentiation. Furthermore, unknown variables do not need to be eliminated from power continuity equations in order to obtain analytical redundancy relations (ARRs) in symbolic form. Residuals indicating faults are computed numerically as components of a descriptor vector of a differential algebraic equation system derived from the coupled bond graphs. The presented bond graph approach especially aims at models with non-linearities that make it cumbersome or even impossible to derive ARRs from model equations by elimination of unknown variables. For illustration, the approach is applied to a non-controlled as well as to a controlled hydraulic two-tank system. Finally, it is shown that not only the numerical computation of residuals but also the simultaneous numerical computation of their sensitivities with respect to a parameter can be supported by bond graph modelling.
The automated annotation of data from high throughput sequencing and genomics experiments is a significant challenge for bioinformatics. Most current approaches rely on sequential pipelines of gene finding and gene function prediction methods that annotate a gene with information from different reference data sources. Each function prediction method contributes evidence supporting a functional assignment. Such approaches generally ignore the links between the information in the reference datasets. These links, however, are valuable for assessing the plausibility of a function assignment and can be used to evaluate the confidence in a prediction. We are working towards a novel annotation system that uses the network of information supporting the function assignment to enrich the annotation process for use by expert curators and predicting the function of previously unannotated genes. In this paper we describe our success in the first stages of this development. We present the data integration steps that are needed to create the core database of integrated reference databases (UniProt, PFAM, PDB, GO and the pathway database Ara-Cyc) which has been established in the ONDEX data integration system. We also present a comparison between different methods for integration of GO terms as part of the function assignment pipeline and discuss the consequences of this analysis for improving the accuracy of gene function annotation. The methods and algorithms presented in this publication are an integral part of the ONDEX system which is freely available from http://ondex.sf.net/.
Bond graph modelling
(2006)
BGML - a novel XML format for the exchange and the reuse of bond graph models of engineering systems
(2006)
Honeypots und Honeynets
(2004)
RFID security
(2004)
Im vorliegenden Beitrag wird ein prozess- und serviceorientiertes Rahmenmodell vorgeschlagen, das eine strukturelle und begriffliche Orientierung für das Gebiet der elektronischen Bezahlung bietet. Das Rahmenmodell erlaubt eine ganzheitliche Betrachtung über die Merkmale eines einzelnen Zahlungssystems hinaus. Die systemspezifische Sicht auf die elektronische Zahlung wird zu einem prozessorientierten Phasenmodell verallgemeinert. Mit diesem lassen sich die unterstützenden Services für die elektronische Bezahlung aus Kunden- und Händlersicht systematisch zusammenstellen und beschreiben. Die organisatorische Umsetzung der Serviceprozesse führt zur Rolle des Payment Service Providers, der als Mittler zwischen Anbietern und Anwendern elektronischer Zahlungssysteme agiert.
Multidisciplinary systems are described most suitably by bond graphs. In order to determine unnormalized frequency domain sensitivities in symbolic form, this paper proposes to construct in a systematic manner a bond graph from another bond graph, which is called the associated incremental bond graph in this paper. Contrary to other approaches reported in the literature the variables at the bonds of the incremental bond graph are not sensitivities but variations (incremental changes) in the power variables from their nominal values due to parameter changes. Thus their product is power. For linear elements their corresponding model in the incremental bond graph also has a linear characteristic. By deriving the system equations in symbolic state space form from the incremental bond graph in the same way as they are derived from the initial bond graph, the sensitivity matrix of the system can be set up in symbolic form. Its entries are transfer functions depending on the nominal parameter values and on the nominal states and the inputs of the original model. The sensitivities can be determined automatically by the bond graph preprocessor CAMP-G and the widely used program MATLAB together with the Symbolic Toolbox for symbolic mathematical calculation. No particular program is needed for the approach proposed. The initial bond graph model may be non-linear and may contain controlled sources and multiport elements. In that case the sensitivity model is linear time variant and must be solved in the time domain. The rationale and the generality of the proposed approach are presented. For illustration purposes a mechatronic example system, a load positioned by a constant-excitation d.c. motor, is presented and sensitivities are determined in symbolic form by means of CAMP-G/MATLAB.
Bond graph modelling was devised by Professor Paynter at the Massachusetts Institute of Technology in 1959 and subsequently developed into a methodology for modelling multidisciplinary systems at a time when nobody was speaking of object-oriented modelling. On the other hand, so-called object-oriented modelling has become increasingly popular during the last few years. By relating the characteristics of both approaches, it is shown that bond graph modelling, although much older, may be viewed as a special form of object-oriented modelling. For that purpose the new object-oriented modelling language Modelica is used as a working language which aims at supporting multiple formalisms. Although it turns out that bond graph models can be described rather easily, it is obvious that Modelica started from generalized networks and was not designed to support bond graphs. The description of bond graph models in Modelica is illustrated by means of a hydraulic drive. Since VHDL-AMS as an important language standardized and supported by IEEE has been extended to support also modelling of non-electrical systems, it is briefly investigated as to whether it can be used for description of bond graphs. It turns out that currently it does not seem to be suitable.
Zur Erreichung des Sachziels Vertraulichkeit werden Daten (Dokumente, Dateien, E-Mails etc.) bei der Speicherung und Übertragung in lokalen Netzen, Intranets und im Internet häufig vom Endanwender verschlüsselt. Die dazu benutzten Schlüssel müssen bei Bedarf für den Endanwender genauso verfügbar sein wie für das Unternehmen bei Nicht-Verfügbarkeit des Endanwenders. Unternehmensinterne Schlüssel-Archive speichern die benutzten Schlüssel oder speichern die Adressen benutzter Schlüssel oder stellen auf andere Weise die benutzten Schlüssel auf Anforderung Berechtigten wieder bereit. Schlüssel-Archive sind aus der auf dem Escrowed Encryption Standard (EES) basierenden Clipper-Initiative der Vereinigten Staaten entstanden und werden dort als Key Recovery Center bezeichnet.