Refine
H-BRS Bibliography
- yes (606) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (606) (remove)
Document Type
- Conference Object (606) (remove)
Year of publication
Keywords
- Virtual Reality (8)
- Robotics (7)
- Usable Security (7)
- CUDA (5)
- Machine Learning (5)
- 3D user interface (4)
- Benchmarking (4)
- Usable Privacy (4)
- machine learning (4)
- virtual reality (4)
- Human-Robot Interaction (3)
- Hyperspectral image (3)
- IP protection (3)
- Image Processing (3)
- LoRa (3)
- Measurement (3)
- Navigation (3)
- Quality diversity (3)
- Risk-based Authentication (3)
- Robot sensing systems (3)
- SpMV (3)
- Taxonomy (3)
- WiLD (3)
- clustering (3)
- robotics (3)
- security (3)
- serious games (3)
- virtual environments (3)
- 802.11 (2)
- Aerodynamics (2)
- Algorithms (2)
- Alternatives (2)
- Augmented Reality (2)
- Augmented reality (2)
- Authentication (2)
- Bag of Features (2)
- Big Data Analysis (2)
- Cognitive robot control (2)
- Computer Graphics (2)
- Computer Vision (2)
- Content Module (2)
- Cooperative Awareness Message (2)
- DPA (2)
- Distributed rendering (2)
- Educational institutions (2)
- Embedded software (2)
- Empirical study (2)
- Evolutionary computation (2)
- Explainable robotics (2)
- Eye Tracking (2)
- FDI (2)
- FPGA (2)
- Fault analysis (2)
- GDPR (2)
- GPU (2)
- Graphics Cards (2)
- Heart Rate Prediction (2)
- Higher education (2)
- IEEE802.11 (2)
- Indirect Encodings (2)
- Inductive Logic Programming (2)
- Intelligent virtual agents (2)
- Internet (2)
- Large, high-resolution displays (2)
- Learning from experience (2)
- LoRaWAN (2)
- Long-Distance WiFi (2)
- MAP-Elites (2)
- Natural Language Processing (2)
- Neuroevolution (2)
- Object recognition (2)
- OpenFlow (2)
- Original Story (2)
- Parallelization (2)
- Password (2)
- Pseudonym Concept (2)
- QoS (2)
- Quality Diversity (2)
- RE (2)
- Raman microscopy (2)
- Risk-based Authentication (RBA) (2)
- Robustness (2)
- SDN (2)
- Serious Games (2)
- Side-channel analysis (2)
- Software (2)
- Survey (2)
- Three-dimensional displays (2)
- User Interface Design (2)
- Vehicle-to-Vehicle Communication (2)
- Visualization (2)
- analysis (2)
- blockchain (2)
- classifier combination (2)
- edutainment (2)
- embedded systems (2)
- feature extraction (2)
- haptics (2)
- human factors (2)
- hypermedia (2)
- image fusion (2)
- interface design (2)
- machine vision (2)
- motion estimation (2)
- navigation (2)
- object categorization (2)
- pansharpening (2)
- path planning (2)
- surrogate modeling (2)
- 2D Level Design (1)
- 3D User Interface (1)
- 3D Visualisierung (1)
- 3D design (1)
- 3D gaming (1)
- 3D interfaces (1)
- 3D registration (1)
- 3D shape (1)
- 3D user interfaces (1)
- 450 MHz (1)
- AES (1)
- AI based translation (1)
- AMD Family 15h (1)
- ANSYS (1)
- ARM Cortex M3 Processor (1)
- ARRs (1)
- Abstract Syntax Tree (1)
- Acceptance (1)
- Account Security (1)
- Accuracy (1)
- Active Learning (1)
- Active locomotion (1)
- Actuators (1)
- Adaptation of Software (1)
- Air Pollution (1)
- Air pollution modeling (1)
- All-Swap Algorithm (1)
- Architectural Patterns (1)
- Assistive robots (1)
- Attention (1)
- Authentication features (1)
- Authorship watermark (1)
- Autoencoder (1)
- Autoimmune disease (1)
- Automatic Short Answer Grading (1)
- B2T (1)
- BCL2 (1)
- BFS (1)
- BLOB Detection (1)
- Ballastless track (1)
- Bayesian optimization (1)
- Beacon Chain (1)
- Behaviour-Driven Development (1)
- Best practice algorithms (1)
- Bicycle Simulator (1)
- Bioinformatics (1)
- Blob Detection (1)
- Block cipher (1)
- Blocking (1)
- Bond Graph models for fault detection and isolation (1)
- Bond graph modelling (1)
- Bound Volume Hierarchy (1)
- Bounding Box (1)
- Branch and cut (1)
- Business software (1)
- Business system (1)
- Business-to-Thing (1)
- CNN (1)
- CPA (1)
- CPU (1)
- CPUID instruction (1)
- CSR5BC (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Cell Processor (1)
- Cell/B.E. (1)
- Center-of-Mass (1)
- Channel assignment (1)
- Clusters (1)
- Co-located Collaboration (1)
- Co-located work (1)
- Code similarity analysis (1)
- Cognitive robotics (1)
- Collaborating industrial robots (1)
- Coloured pointclouds (1)
- Column (1)
- Comparative analysis (1)
- Compliant Manipulation (1)
- Compliant fingers (1)
- Component Models (1)
- Composition of Patterns (1)
- Compositional Pattern Producing Networks (1)
- Computational fluid dynamics (1)
- Computer architecture (1)
- Computer graphics (1)
- Computer-supported Cooperative Work (1)
- Computing methodologies (1)
- Concurrent repeated failure prognosis (1)
- Container Structure (1)
- Containerization (1)
- Content Analysis (1)
- Contextualized Attention Metadata (CAM) (1)
- Continual robot learning (1)
- Control (1)
- Corporate Social Responsibility (1)
- Correlative Microscopy (1)
- Cortex-M3 (1)
- Covert channel (1)
- Critical power (1)
- Cross-core (1)
- Crossmedia (1)
- Customization (1)
- Cypher (1)
- DAE systems (1)
- DFA Lab (1)
- DPA Lab (1)
- Data Fusion (1)
- Data Generation (1)
- Data Protection Officer (1)
- Dataflow Programming (1)
- Datalog (1)
- Datenschutz (1)
- Datensicherheit (1)
- Delph Study (1)
- Design Optimization (1)
- Design automation (1)
- Diagnostic bond graph-based online fault diagnosis (1)
- Difference Visualization (1)
- Differential analysis (1)
- Digital Ecosystem (1)
- Digital Storytelling (1)
- Digital common goods (1)
- Digital watermarking (1)
- Digitisation (1)
- Directional Antenna (1)
- Directional antennas (1)
- Distributed Robot Systems (1)
- Docker (1)
- Domain Expert (1)
- Domestic Robots (1)
- Domestic robotics (1)
- Domestic robots (1)
- Dynamic motion primitives (1)
- E-Health (1)
- EEG (1)
- ERP-software (1)
- ERP-system (1)
- Echtzeit (1)
- Eclipse Modeling Framework (1)
- Ego-Motion Estimation (1)
- Elderly People (1)
- Elliptic Curve Cryptography (1)
- Embedded system (1)
- Empirical Study (1)
- Employee data protection (1)
- Encryption (1)
- Enterprise software (1)
- Enterprise system (1)
- Estimation (1)
- Ethereum (1)
- Euronorm (1)
- Everyday object manipulation (1)
- Evolutionary algorithms (1)
- Exergame (1)
- Experiment (1)
- Experiment design (1)
- Expert Interviews (1)
- Explainability (1)
- Explainable Machine Learning (1)
- FPGA implementation (1)
- Fas (1)
- Fault Channel Watermarking Lab (1)
- Fault Detection & Diagnosis (1)
- Fault-channel watermarks (1)
- Feature extraction (1)
- Features (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Fingerprint watermark (1)
- Fixed spatial data (1)
- Flexible robots (1)
- Force (1)
- Force and tactile sensing (1)
- Force field (1)
- Forests (1)
- Free-Space Loss (FSL) (1)
- Frequency planning (1)
- Friction (1)
- Functional safety (1)
- Fusion (1)
- Future (1)
- Future Studies (1)
- Future of Robotics (1)
- Fuzzy logic (1)
- GPGPU (1)
- Game Engine (1)
- Games and Simulations for Learning (1)
- Garbage collection (1)
- Gaussian processes (1)
- Gaze Behavior (1)
- Gaze Depth Estimation (1)
- Gender Issues in Computer Science Education (1)
- Generation R (1)
- Generative Design (1)
- Generative Models (1)
- Geo-tagging (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheitswesen (1)
- Givens Rotations (1)
- Global Illumination (1)
- Gradient-boosting (1)
- Grailog (1)
- Graphical user interfaces (1)
- Grasping (1)
- Grounded Method (1)
- Group Behavior (1)
- Group behavior (1)
- Groupware (1)
- HCI (1)
- HCSS (1)
- HPC (1)
- HRI (1)
- HTTP (1)
- Hand Guidance (1)
- Hand Tracking (1)
- Hardware (1)
- Head-Mounted Displays (1)
- Head-mounted Display (1)
- Header whitelisting (1)
- Heat shrink tubing (1)
- High-performance computing (1)
- High-speed track (1)
- Human Factors (1)
- Human centered computing (1)
- Human computer interaction (1)
- Human-Centered Robotics (1)
- Human-robot interaction (1)
- Humanoid Robot (1)
- HyperNEAT (1)
- ICP (1)
- IEC 104 (1)
- IEC 61850 (1)
- IEEE 802.11 (1)
- IEEE 802.21 (1)
- Illumination algorithms (1)
- Image representation (1)
- Image-based rendering (1)
- Immersive Virtual Environments (1)
- Immersive Visualization Environment (1)
- Implementation Challenges (1)
- Increasing fault magnitude (1)
- Industrial robots (1)
- Information Security (1)
- Information Types (1)
- Information hiding (1)
- Information interaction (1)
- Informationssicherheit (1)
- Innovation (1)
- Instance-based learning (1)
- Instruction scheduling (1)
- Integer programming (1)
- Integrate Development Environment (1)
- Integrated circuit interconnections (1)
- Intel Xeon Phi (1)
- Intel processors (1)
- Intelligent Transport System (1)
- Interaction (1)
- Interaction Patterns (1)
- Interactive Smart Card Applications (1)
- Interference (1)
- Intermediaries (1)
- Intermittent faults (1)
- Internet of Things (1)
- Interoperability (1)
- Inventory (1)
- Issue Tracking Systems (1)
- Issue Types (1)
- Issue tracking systems (1)
- Java virtual machine (1)
- JavaScript (1)
- KNN (1)
- Knowledge Graphs (1)
- Knowledge representation (1)
- Kryptologie (1)
- LAA (1)
- LGCSR (1)
- LOTUS Sensor Node (1)
- LTE-M (1)
- LTE-U (1)
- Lattice Basis Reduction (1)
- Lead userness (1)
- Learning analytics (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Learning from demonstration (1)
- Learning systems (1)
- Lighting simulation (1)
- Linear regression (1)
- LoRa receiver accuracy (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Low-Power Wide Area Network (LP-WAN) (1)
- Lymphoproliferative disorder (1)
- MAC (1)
- MACE (1)
- MESD (1)
- MIMD (1)
- MOOC (1)
- MPLS (1)
- MQTT (1)
- Machine learning (1)
- Machine-learning (1)
- Main Memory (1)
- Maker space (1)
- Malware (1)
- Management (1)
- Manipulator (1)
- Markov Cluster Algorithm (1)
- Megatrends (1)
- Memory filesystem (1)
- Memory-Constrained Devices (1)
- Mesh networks (1)
- Microarchitectural Data Sampling (MDS) (1)
- Middleware and Programming Environments (1)
- Mining Software Repositories (1)
- Mining software repositories (1)
- Mixed (1)
- Mixed method evaluation (1)
- Mobile devices (1)
- Mobile manipulation (1)
- Mobile robots (1)
- Modalities (1)
- Model Fitting (1)
- Model-based Approach (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Modelica (1)
- Modular software packages (1)
- Molecular modeling (1)
- Morphological box (1)
- Morphological scheme (1)
- Motion Capture (1)
- Motion planning (1)
- Multi-Modal Interaction (1)
- Multi-Tenant Application (1)
- Multi-objective optimization (1)
- Multicast communication (1)
- Multilayer interaction (1)
- Multimodal (1)
- Multimodal Microspectroscopy (1)
- Multimodal optimization (1)
- Multiple Displays (1)
- Multithreaded and multicore architecture (1)
- Multiuser (1)
- Multivariate Time Series (1)
- Multivariate time series classification (1)
- Musical Performance (1)
- NEAT (1)
- NETCONF (1)
- NIR (1)
- NIR-point sensor (1)
- NISTPQC (1)
- NNS (1)
- NUMA (1)
- NURBS (1)
- NVIDIA Tesla (1)
- Narration Module (1)
- Natural language understanding (1)
- Natural scene text (1)
- Navigation interface (1)
- Networked Robots (1)
- Neural Machine Translation (1)
- Noise (1)
- Noise reduction (1)
- Numerical optimization (1)
- Nvidia graphic processors (1)
- OER (1)
- Object detection (1)
- Object-Based Image Analysis (OBIA) (1)
- Online Services (1)
- Open source firmware (1)
- Open-ended Robotic Discovery (1)
- Open-source (1)
- OpenACC (1)
- OpenDaylight (1)
- OpenMP, unrolling (1)
- OpenStack (1)
- Optimisation 3D (1)
- Outlier Detection (1)
- PDSTSP (1)
- PHR (1)
- PIR sensor units (1)
- PM2.5 estimation (1)
- Pain Reduction (1)
- Parallel I/O (1)
- Parallel Processing (1)
- Parallel drone scheduling traveling salesman problem (1)
- Parameter sensitivities of transfer functions (1)
- Parametric study (1)
- Path Loss (1)
- Path loss model (1)
- People Detection (1)
- Perception (1)
- Performance (1)
- Performance Simulation (1)
- Performance benchmarks (1)
- Performance prediction (1)
- Performance profiling (1)
- Periodic structures (1)
- Personal Health Record (1)
- Phenotypic niching (1)
- Physical exercising game platform (1)
- Pointing (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Pointing devices (1)
- Pose Estimation (1)
- Post-Quantum Signatures (1)
- Power Analysis (1)
- Prediction of physiological responses to strain (1)
- Predictive Models (1)
- Privacy (1)
- Privacy engineering (1)
- Probabilistic model (1)
- Project based learning (1)
- Proof of Stake (1)
- Propagation (1)
- Prototypes (1)
- Public Key Infrastructures (1)
- Q measurement (1)
- Quality control (1)
- RBAR (1)
- RGB-D (1)
- RGB-D data (1)
- RLE-XOR (1)
- RLE-permutation (1)
- RNN (1)
- RSSI (1)
- Radiofrequency identification (1)
- Radix Sort (1)
- Random number generator (1)
- Rapid Prototyping (1)
- Rapid prototyping (1)
- Ray Casting (1)
- Ray Tracing (1)
- Ray tracing (1)
- Re-authentication (1)
- Reasoning (1)
- Reconstruction Error (1)
- Reflectance modeling (1)
- Registration Refinement (1)
- Relational Learning (1)
- Remaining Useful Life (RUL) estimates (1)
- Render Cache (1)
- Repositories (1)
- Requirements (1)
- Requirements Communication (1)
- Requirements analysis (1)
- Requirements engineering in SMEs (1)
- Restorative Virtual Environments (1)
- Reusable Software (1)
- Reversible Logic Synthesis (1)
- Review (1)
- Rfid (Radio-Frequency Identification) (1)
- Risikoanalyse (1)
- Risk-Based Account Recovery (1)
- RoboCup (1)
- Robot commands (1)
- Robot competitions (1)
- Robot failure diagnosis (1)
- Robot kinematics (1)
- Robot learning (1)
- Robot software (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Revolutions (1)
- Robotics competitions (1)
- Robots (1)
- Robust grasping (1)
- Rotating Table Test (1)
- RuleML (1)
- Runtime Adaptation (1)
- Rural areas (1)
- S3D Video (1)
- S3D video (1)
- SAML (1)
- SDWN (1)
- SEMA (1)
- SIMD (1)
- SLIDE algorithm (1)
- SME (1)
- SOAP (1)
- SORT (1)
- SQL (1)
- SVG (1)
- Scalability (1)
- Scalable Vector Graphic (1)
- ScalarMultiplication (1)
- Scene text recognition, active vision, domestic robot, pantilt, auto-zoom, auto-focus, adaptive aperture control (1)
- Scholarly workbench (1)
- Scientific competency development (1)
- Scientific workbench (1)
- Second Life (1)
- Security (1)
- Self-supervised learning (1)
- Semantic gap (1)
- Semantics (1)
- SensorFusion (1)
- Separation algorithm (1)
- Service Robot (1)
- Service-Oriented Architecture (1)
- Sicherheitsanalyse (1)
- Sicherheitslücke (1)
- Side Channel Analysis (1)
- Side Channel Countermeasures (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side-channel watermarking (1)
- Signature Verification (1)
- Similarity matrix (1)
- Simulation (1)
- Simulator (1)
- Single Instruction Multiple Data (SIMD) (1)
- Skin detection (1)
- Slippage detection (1)
- Smart Card (1)
- Smart Grid (1)
- Smart InGaAs camera-system (1)
- Smartphones (1)
- Social Virtual Reality (1)
- Social engagement in university (1)
- Software Architectures (1)
- Software Development Process (1)
- Software Feature Request Detection (1)
- Software IP protection (1)
- Software Supply Chain (1)
- Software and Architecture (1)
- Software reverse engineering (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Sonar (1)
- Space exploration (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Sparse matrix format (1)
- Spatiotemporality (1)
- Spectrum occupancy (1)
- Spectrum optimization (1)
- Speech Act Theory (1)
- Split Axis (1)
- Standards (1)
- Star Trek (1)
- State machines (1)
- Stereoscopic Rendering (1)
- Stereoscopic rendering (1)
- Story Element (1)
- Streaming (1)
- Stress Management (1)
- Supervised learning (1)
- Supply chains (1)
- Support Vector Machine (1)
- Surrogate Modeling (1)
- Surrogate Modelling (1)
- Surrogate models (1)
- Swim Stroke Analysis (1)
- Switched power electronic systems (1)
- Symmetry detector (1)
- Synthetic perception (1)
- SystemVerilog (1)
- TLS (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Task Frame Formalism (1)
- Telecommunication network reliability (1)
- Telecommunication network routing (1)
- Telematik (1)
- Telematik-Software (1)
- Template Attacks (1)
- Temporally-weighted (1)
- Textureless objects (1)
- Tiled displays (1)
- Tiled-display walls (1)
- Time measurement (1)
- Timing analysis (1)
- Timing channel (1)
- TinyECC 2.0 (1)
- ToF Camera (1)
- Token (1)
- Touchscreen interaction (1)
- Toyota HSR (1)
- Traceability (1)
- Tracking by detection (1)
- Traffic Simulations (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Transfer learning (1)
- Transformers (1)
- Transforms (1)
- Transparency (1)
- Tree Stumps (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV (1)
- UAV teleoperation (1)
- UI design (1)
- Ultrasonic array (1)
- Uncertainty (1)
- Unidirectional thermoplastic composites (1)
- Unity (1)
- Unmanned Aerial Vehicle (UAV) (1)
- Urban (1)
- Usability (1)
- Usable Security and Privacy (1)
- User Roles (1)
- User Study (1)
- User-Centered Approach (1)
- VR (1)
- VR system design (1)
- Variability Management (1)
- Variability Resolution (1)
- Variational Autoencoder (1)
- Vector Intrinsics (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicular Ad hoc Networks (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Verifizierung (1)
- Verilog (1)
- Virtual Agents (1)
- Virtual Environments (1)
- Virtual attention (1)
- Virtual environments (1)
- Visualization design and evaluation methods (1)
- Visualization systems and tools (1)
- Volumenrendering (1)
- Vulnerable Groups (1)
- V˙CO2 prediction (1)
- V˙O2 prediction (1)
- WDS (1)
- WWW (1)
- Watermarking (1)
- Web (1)
- Web components (1)
- Whole body motion (1)
- Wi-Fi (1)
- WiAFirm (1)
- WiFi (1)
- WiFi-based Long Distance (WiLD) (1)
- Wireless Backhaul Network (1)
- Wireless Sensor Network (1)
- Wireless backhaul (1)
- XGBoost (1)
- XML (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XNA Game Studio (1)
- XSLT (1)
- Xeon Phi knights landing (1)
- YANG (1)
- YOLO (1)
- ZombieLoad (1)
- activation function (1)
- adaptive agents (1)
- adaptive binarization (1)
- adaptive filters (1)
- aerodynamics (1)
- affective computing (1)
- ambulatory monitoring (1)
- analyses (1)
- analytical redundancy relations (1)
- anomaly detection (1)
- artifacts (1)
- asset transfer (1)
- atomic instructions (1)
- audio-tactile feedback (1)
- augmented, and virtual realities (1)
- authoring tools (1)
- automation (1)
- background motion (1)
- bagging (1)
- bass-shaker (1)
- bicycle (1)
- biorder (1)
- bloat (1)
- body-centric cues (1)
- brain computer interfaces (1)
- brightfield microscopy (1)
- bus load (1)
- camera-based person detection (1)
- can bus (1)
- chemical sensors (1)
- client-side component model (1)
- co-located collaboration (1)
- cognitive radio (1)
- collaboration (1)
- collaborative learning (1)
- colorimetry (1)
- commuting (1)
- compensation (1)
- component analyses (1)
- component based (1)
- computational causalities (1)
- computational logic (1)
- computer games (1)
- computer-supported collaborative work (1)
- cooperative path planning (1)
- correlation (1)
- crawling (1)
- cross-disciplinary (1)
- cryptocurrency (1)
- cuSPARSE (1)
- data locality (1)
- data logging (1)
- data visualisation (1)
- database systems (1)
- decision tree learning (1)
- dependable robots (1)
- depth perception (1)
- diagnostic bond graphs (1)
- digital co-creation (1)
- digital platform ecosystem (1)
- digital storytelling (1)
- dimensionality reduction (1)
- direct feedback (1)
- directed hypergraphs (1)
- directional antennas (1)
- disabled people (1)
- distributed authoring (1)
- distributed processing (1)
- diversity (1)
- driving (1)
- drone video quality (1)
- dynamic vector fields (1)
- e-learning course structure (1)
- echo state network (1)
- eco-driving (1)
- embedded collaborative learning (1)
- embodied interfaces (1)
- emotion computing (1)
- energy efficient transportation (1)
- energy optimal driving (1)
- evolution strategies (1)
- evolutionary illumination (1)
- evolved neural network controller (1)
- evolving look ahead controllers (1)
- explainable gesture recognition (1)
- exploration (1)
- eye-tracking (1)
- faults in robotics (1)
- feature (1)
- feature selection (1)
- flight zone (1)
- forms of mathematical models (1)
- foveated rendering (1)
- fpga (1)
- full-body interface (1)
- fuzzy logic (1)
- game engine (1)
- gamification (1)
- gaming (1)
- generation of ARRs (1)
- generative design (1)
- geofence (1)
- graphs (1)
- guidance (1)
- hand guidance (1)
- haptic feedback (1)
- heat shrink tubes (1)
- heterogeneous networks (1)
- heuristics (1)
- hierarchical clustering (1)
- higher education (1)
- holography (1)
- human-centric lighting (1)
- human-robot collaboration (1)
- hypermedia applications (1)
- iOER (1)
- ideal switches (1)
- ideation (1)
- image sequence processing (1)
- immersion (1)
- immersive systems (1)
- incremental bond graphs (1)
- industrial robots (1)
- information display methods (1)
- innovative work behavior (1)
- intelligent pedestrian counter (1)
- interaction (1)
- interaction techniques (1)
- interactive distributed rendering (1)
- intercultural learning (1)
- interference (1)
- international (1)
- international teams (1)
- intrinsics (1)
- inverse model (1)
- issue tracker (1)
- knowledge engineering (1)
- knowledge graphs (1)
- knowledge-management (1)
- leaning (1)
- leaning, self-motion perception (1)
- learning object repositories (1)
- learning-based fault detection and diagnosis (1)
- light curtains (1)
- linguistic variable (1)
- linguistic variables (1)
- link calibration (1)
- long-distance 802.11 (1)
- measurement (1)
- mechatronic systems (1)
- medical training (1)
- memory bandwidth (1)
- mesoscopic agents (1)
- microcomputers (1)
- microcontroller (1)
- mininig software repositories (1)
- mobile or handheld device (1)
- mobile projection (1)
- mobile robots (1)
- mobile web (1)
- mode switching LTI models (1)
- modular web (1)
- momentary frequency (1)
- monitoring (1)
- morphological operator (1)
- motion control (1)
- motion cueing (1)
- motion platform (1)
- motion trajectory enhancement (1)
- multi causal strain (1)
- multi robot systems (1)
- multi-layer display (1)
- multi-screen visualization environments (1)
- multi-user VR (1)
- multibody systems (1)
- multidisciplinary (1)
- multiple Xbox 360 (1)
- multiple computer systems (1)
- multiresolution analysis (1)
- multisensory cues (1)
- multisensory interface (1)
- naive physics (1)
- natural user interface (1)
- near-infrared (1)
- neural networks (1)
- neuroevolution (1)
- noise suppression (1)
- nomadic text entry (1)
- nonlinear storytelling (1)
- object identification (1)
- object-oriented physical systems modelling (1)
- open educational resources (OERs) (1)
- optical safeguard sensor (1)
- optimal control (1)
- optimal control problem (1)
- parallel BFS (1)
- parallel breadth-first search (1)
- parallel difference visualization (1)
- parameter sensitivities of residuals of ARRs (1)
- payment protocol (1)
- pedestrian counting system (1)
- pedestrian movements (1)
- pen interaction (1)
- performance optimizations (1)
- peripheral vision (1)
- peripheral visual field (1)
- photometry (1)
- physical activity (1)
- physical model immersive (1)
- physiological monitoring (1)
- preprocessing (1)
- project-based learning (1)
- projection (1)
- property-based testing for robots (1)
- prototype theory (1)
- proxemics (1)
- pseudo-random number generator (1)
- quality-diversity (1)
- question answering (1)
- recurrent neural network function (1)
- redundant work (1)
- reference dataset (1)
- regression (1)
- reinforcement learning (1)
- remote diagnosis (1)
- remote sensing (1)
- remote-controlled robots (1)
- rendering (computer graphics) (1)
- requirements (1)
- requirements analysis (1)
- requirements management (1)
- residual sinks (1)
- resource utilization (1)
- robot action diagnosability (1)
- robot component monitoring (1)
- robot dynamics (1)
- robot execution failures (1)
- robot kinematics (1)
- robotic black box (1)
- robots (1)
- rules (1)
- rural areas (1)
- scene element representation (1)
- screens (display) (1)
- see-through display (1)
- see-through head-mounted displays (1)
- self-configuration (1)
- self-management (1)
- semantic image seg-mentation (1)
- semi-supervised learning (1)
- sensor data acquisition (1)
- sensor data transmission (1)
- sensor-based fault detection and diagnosis (1)
- service activities (1)
- service robots (1)
- short-term memory (1)
- simulation-based robot testing (1)
- simulator (1)
- skin detection (1)
- software engineering (1)
- software-based feedback agents (1)
- spectral rendering (1)
- spectrum scan (1)
- spectrum sensing (1)
- speech recognition (1)
- speech understanding (1)
- stereoscopic vision (1)
- story authoring (1)
- strain (1)
- stress (1)
- stress detection (1)
- structural equation modeling (1)
- submillimeter precision (1)
- support vector machine (1)
- surface textures (1)
- surface topography (1)
- synthetic dataset (1)
- teaching (1)
- telepresence (1)
- territoriality (1)
- text entry in motion (1)
- text mining (1)
- tiled displays (1)
- time series processing (1)
- touchscreen (1)
- traffic surveillance (1)
- transfer learning (1)
- true random number generator (1)
- ultrasonic sensor (1)
- un-manned aerial vehicle (1)
- unexpected situations (1)
- unique bond graph representation for all modes of operation (1)
- unmanned ground vehicle (1)
- unstructured data (1)
- usability (1)
- usable secure email (1)
- usage contexts (1)
- usage data analysis (1)
- user documentation (1)
- user engagement (1)
- user interface design (1)
- user study (1)
- vection (1)
- verification and validation of robot action execution (1)
- vibration (1)
- virtual environment framework (1)
- virtual locomotion (1)
- virtual or soft keyboard (1)
- visual quality control (1)
- visualisation (1)
- visualization (1)
- visuohaptic feedback (1)
- walking (1)
- web (1)
- web components (1)
- web technology (1)
- website (1)
- welfare technology (1)
- whole-body interface (1)
- wireless communication (1)
- wireless performance (1)
- wmSDN (1)
- workspace awareness (1)
- xorshift-generator (1)
- youBot (1)
- zooming interface (1)
Selection Performance and Reliability of Eye and Head Gaze Tracking Under Varying Light Conditions
(2024)
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
(2024)
Ziel der neunten Ausgabe des wissenschaftlichen Workshops "Usable Security und Privacy" auf der Mensch und Computer 2023 ist es, aktuelle Forschungs- und Praxisbeiträge auf diesem Gebiet zu präsentieren und mit den Teilnehmer:innen zu diskutieren. Getreu dem Konferenzmotto "Building Bridges" soll mit dem Workshop ein etabliertes Forum fortgeführt und weiterentwickelt werden, in dem sich Expert:innen, Forscher:innen und Praktiker:innen aus unterschiedlichen Domänen transdisziplinär zum Thema Usable Security und Privacy austauschen können. Das Thema betrifft neben dem Usability- und Security-Engineering unterschiedliche Forschungsgebiete und Berufsfelder, z. B. Informatik, Ingenieurwissenschaften, Mediengestaltung und Psychologie. Der Workshop richtet sich an interessierte Wissenschaftler:innen aus all diesen Bereichen, aber auch ausdrücklich an Vertreter:innen der Wirtschaft, Industrie und öffentlichen Verwaltung.
Question Answering (QA) has gained significant attention in recent years, with transformer-based models improving natural language processing. However, issues of explainability remain, as it is difficult to determine whether an answer is based on a true fact or a hallucination. Knowledge-based question answering (KBQA) methods can address this problem by retrieving answers from a knowledge graph. This paper proposes a hybrid approach to KBQA called FRED, which combines pattern-based entity retrieval with a transformer-based question encoder. The method uses an evolutionary approach to learn SPARQL patterns, which retrieve candidate entities from a knowledge base. The transformer-based regressor is then trained to estimate each pattern’s expected F1 score for answering the question, resulting in a ranking ofcandidate entities. Unlike other approaches, FRED can attribute results to learned SPARQL patterns, making them more interpretable. The method is evaluated on two datasets and yields MAP scores of up to 73 percent, with the transformer-based interpretation falling only 4 pp short of an oracle run. Additionally, the learned patterns successfully complement manually generated ones and generalize well to novel questions.
LiDAR-based Indoor Localization with Optimal Particle Filters using Surface Normal Constraints
(2023)
In the project EILD.nrw, Open Educational Resources (OER) have been developed for teaching databases. Lecturers can use the tools and courses in a variety of learning scenarios. Students of computer science and application subjects can learn the complete life cycle of databases. For this purpose, quizzes, interactive tools, instructional videos, and courses for learning management systems are developed and published under a Creative Commons license. We give an overview of the developed OERs according to subject, description, teaching form, and format. Following, we describe how licencing, sustainability, accessibility, contextualization, content description, and technical adaptability are implemented. The feedback of students in ongoing classes are evaluated.
TSEM: Temporally-Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series
(2023)
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
(2023)
Online services have difficulties to replace passwords with more secure user authentication mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that users tend to reject such mechanisms in use cases outside of online banking. Relying on password authentication alone, however, is not an option in light of recent attack patterns such as credential stuffing.
Risk-Based Authentication (RBA) can serve as an interim solution to increase password-based account security until better methods are in place. Unfortunately, RBA is currently used by only a few major online services, even though it is recommended by various standards and has been shown to be effective in scientific studies. This paper contributes to the hypothesis that the low adoption of RBA in practice can be due to the complexity of implementing it. We provide an RBA implementation for the open source cloud management software OpenStack, which is the first fully functional open source RBA implementation based on the Freeman et al. algorithm, along with initial reference tests that can serve as a guiding example and blueprint for developers.
Trojanized software packages used in software supply chain attacks constitute an emerging threat. Unfortunately, there is still a lack of scalable approaches that allow automated and timely detection of malicious software packages and thus most detections are based on manual labor and expertise. However, it has been observed that most attack campaigns comprise multiple packages that share the same or similar malicious code. We leverage that fact to automatically reproduce manually identified clusters of known malicious packages that have been used in real world attacks, thus, reducing the need for expert knowledge and manual inspection. Our approach, AST Clustering using MCL to mimic Expertise (ACME), yields promising results with a 𝐹1 score of 0.99. Signatures are automatically generated based on characteristic code fragments from clusters and are subsequently used to scan the whole npm registry for unreported malicious packages. We are able to identify and report six malicious packages that have been removed from npm consequentially. Therefore, our approach can support the detection by reducing manual labor and hence may be employed by maintainers of package repositories to detect possible software supply chain attacks through trojanized software packages.
Digital ecosystems are driving the digital transformation of business models. Meanwhile, the associated processing of personal data within these complex systems poses challenges to the protection of individual privacy. In this paper, we explore these challenges from the perspective of digital ecosystems' platform providers. To this end, we present the results of an interview study with seven data protection officers representing a total of 12 digital ecosystems in Germany. We identified current and future challenges for the implementation of data protection requirements, covering issues on legal obligations and data subject rights. Our results support stakeholders involved in the implementation of privacy protection measures in digital ecosystems, and form the foundation for future privacy-related studies tailored to the specifics of digital ecosystems.
A PM2.5 concentration prediction framework with vehicle tracking system: From cause to effect
(2023)
Ziel der achten Auflage des wissenschaftlichen Workshops “Usable Security and Privacy” auf der Mensch und Computer 2022 ist es, aktuelle Forschungs- und Praxisbeiträge zu präsentieren und anschließend mit den Teilnehmenden zu diskutieren. Der Workshop soll ein etabliertes Forum fortführen und weiterentwickeln, in dem sich Experten aus verschiedenen Bereichen, z. B. Usability und Security Engineering, transdisziplinär austauschen können.
Auch die mittlerweile siebte Ausgabe des wissenschaftlichen Workshops “Usable Security und Privacy” auf der Mensch und Computer 2021 wird aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmer:innen diskutiert. Zwei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, zwei mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert:innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security- Engineering, transdisziplinär austauschen können.
Computers can help us to trigger our intuition about how to solve a problem. But how does a computer take into account what a user wants and update these triggers? User preferences are hard to model as they are by nature vague, depend on the user’s background and are not always deterministic, changing depending on the context and process under which they were established. We pose that the process of preference discovery should be the object of interest in computer aided design or ideation. The process should be transparent, informative, interactive and intuitive. We formulate Hyper-Pref, a cyclic co-creative process between human and computer, which triggers the user’s intuition about what is possible and is updated according to what the user wants based on their decisions. We combine quality diversity algorithms, a divergent optimization method that can produce many, diverse solutions, with variational autoencoders to both model that diversity as well as the user’s preferences, discovering the preference hypervolume within large search spaces.
We describe a systematic approach for rendering time-varying simulation data produced by exa-scale simulations, using GPU workstations. The data sets we focus on use adaptive mesh refinement (AMR) to overcome memory bandwidth limitations by representing interesting regions in space with high detail. Particularly, our focus is on data sets where the AMR hierarchy is fixed and does not change over time. Our study is motivated by the NASA Exajet, a large computational fluid dynamics simulation of a civilian cargo aircraft that consists of 423 simulation time steps, each storing 2.5 GB of data per scalar field, amounting to a total of 4 TB. We present strategies for rendering this time series data set with smooth animation and at interactive rates using current generation GPUs. We start with an unoptimized baseline and step by step extend that to support fast streaming updates. Our approach demonstrates how to push current visualization workstations and modern visualization APIs to their limits to achieve interactive visualization of exa-scale time series data sets.
Graph databases employ graph structures such as nodes, attributes and edges to model and store relationships among data. To access this data, graph query languages (GQL) such as Cypher are typically used, which might be difficult to master for end-users. In the context of relational databases, sequence to SQL models, which translate natural language questions to SQL queries, have been proposed. While these Neural Machine Translation (NMT) models increase the accessibility of relational databases, NMT models for graph databases are not yet available mainly due to the lack of suitable parallel training data. In this short paper we sketch an architecture which enables the generation of synthetic training data for the graph query language Cypher.
The accurate forecasting of solar radiation plays an important role for predictive control applications for energy systems with a high share of photovoltaic (PV) energy. Especially off-grid microgrid applications using predictive control applications can benefit from forecasts with a high temporal resolution to address sudden fluctuations of PV-power. However, cloud formation processes and movements are subject to ongoing research. For now-casting applications, all-sky-imagers (ASI) are used to offer an appropriate forecasting for aforementioned application. Recent research aims to achieve these forecasts via deep learning approaches, either as an image segmentation task to generate a DNI forecast through a cloud vectoring approach to translate the DNI to a GHI with ground-based measurement (Fabel et al., 2022; Nouri et al., 2021), or as an end-to-end regression task to generate a GHI forecast directly from the images (Paletta et al., 2021; Yang et al., 2021). While end-to-end regression might be the more attractive approach for off-grid scenarios, literature reports increased performance compared to smart-persistence but do not show satisfactory forecasting patterns (Paletta et al., 2021). This work takes a step back and investigates the possibility to translate ASI-images to current GHI to deploy the neural network as a feature extractor. An ImageNet pre-trained deep learning model is used to achieve such translation on an openly available dataset by the University of California San Diego (Pedro et al., 2019). The images and measurements were collected in Folsom, California. Results show that the neural network can successfully translate ASI-images to GHI for a variety of cloud situations without the need of any external variables. Extending the neural network to a forecasting task also shows promising forecasting patterns, which shows that the neural network extracts both temporal and momentarily features within the images to generate GHI forecasts.
ProtSTonKGs: A Sophisticated Transformer Trained on Protein Sequences, Text, and Knowledge Graphs
(2022)
While most approaches individually exploit unstructured data from the biomedical literature or structured data from biomedical knowledge graphs, their union can better exploit the advantages of such approaches, ultimately improving representations of biology. Using multimodal transformers for such purposes can improve performance on context dependent classication tasks, as demonstrated by our previous model, the Sophisticated Transformer Trained on Biomedical Text and Knowledge Graphs (STonKGs). In this work, we introduce ProtSTonKGs, a transformer aimed at learning all-encompassing representations of protein-protein interactions. ProtSTonKGs presents an extension to our previous work by adding textual protein descriptions and amino acid sequences (i.e., structural information) to the text- and knowledge graph-based input sequence used in STonKGs. We benchmark ProtSTonKGs against STonKGs, resulting in improved F1 scores by up to 0.066 (i.e., from 0.204 to 0.270) in several tasks such as predicting protein interactions in several contexts. Our work demonstrates how multimodal transformers can be used to integrate heterogeneous sources of information, paving the foundation for future approaches that use multiple modalities for biomedical applications.
We benchmark the robustness of maximum likelihood based uncertainty estimation methods to outliers in training data for regression tasks. Outliers or noisy labels in training data results in degraded performances as well as incorrect estimation of uncertainty. We propose the use of a heavy-tailed distribution (Laplace distribution) to improve the robustness to outliers. This property is evaluated using standard regression benchmarks and on a high-dimensional regression task of monocular depth estimation, both containing outliers. In particular, heavy-tailed distribution based maximum likelihood provides better uncertainty estimates, better separation in uncertainty for out-of-distribution data, as well as better detection of adversarial attacks in the presence of outliers.
In Robot-Assisted Therapy for children with Autism Spectrum Disorder, the therapists’ workload is increased due to the necessity of controlling the robot manually. The solution for this problem is to increase the level of autonomy of the system, namely the robot should interpret and adapt to the behaviour of the child under therapy. The problem that we are adressing is to develop a behaviour model that will be used for the robot decision-making process, which will learn how to adequately react to certain child reactions. We propose the use of the reinforcement learning technique for this task, where feedback for learning is obtained from the therapist’s evaluation of a robot’s behaviour.
Die Blockchain-Technologie ist einer der großen Innovationstreiber der letzten Jahre. Mit einer zugrundeliegenden Blockchain-Technologie ist auch der Betrieb von verteilten Anwendungen, sogenannter Decentralized Applications (DApps), bereits technisch umsetzbar. Dieser Beitrag verfolgt das Ziel, Gestaltungsmöglichkeiten der digitalen Verbraucherteilhabe an Blockchain-Anwendungen zu untersuchen. Hierzu enthält der Beitrag eine Einführung in die digitale Verbraucherteilhabe und die technischen Grundlagen und Eigenschaften der Blockchain-Technologie, einschließlich darauf basierender DApps. Abschließend werden technische, ethisch-organisatorische, rechtliche und sonstige Anforderungsbereiche für die Umsetzung von digitaler Verbraucherteilhabe in Blockchain-Anwendungen adressiert.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users. To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
Low-Cost In-Hand Slippage Detection and Avoidance for Robust Robotic Grasping with Compliant Fingers
(2021)
Designs for decorative surfaces, such as flooring, must cover several square meters to avoid visible repeats. While the use of desktop systems is feasible to support the designer, it is challenging for a non-domain expert to get the right impression of the appearances of surfaces due to limited display sizes and a potentially unnatural interaction with digital designs. At the same time, large-format editing of structure and gloss is becoming increasingly important. Advances in the printing industry allow for more faithful reproduction of such surface details. Unfortunately, existing systems for visualizing surface designs cannot adequately account for gloss, especially for non-domain experts. Here, the complex interaction of light sources and the camera position must be controlled using software controls. As a result, only small parts of the data set can be properly inspected at a time. Also, real-world lighting is not considered here. This work presents a system for the processing and realistic visualization of large decorative surface designs. To this end, we present a tabletop solution that is coupled to a live 360° video feed and a spatial tracking system. This allows for reproducing natural view-dependent effects like real-world reflections, live image-based lighting, and the interaction with the design using virtual light sources employing natural interaction techniques that allow for a more accurate inspection even for non-domain experts.
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against account takeover attacks, such as those using stolen passwords. RBA is recommended by NIST and NCSC to strengthen password-based authentication, and is already used by major online services. Also, users consider RBA to be more usable than two-factor authentication and just as secure. However, users currently obtain RBA's high security and usability benefits at the cost of exposing potentially sensitive personal data (e.g., IP address or browser information). This conflicts with user privacy and requires to consider user rights regarding the processing of personal data. We outline potential privacy challenges regarding different attacker models and propose improvements to balance privacy in RBA systems. To estimate the properties of the privacy-preserving RBA enhancements in practical environments, we evaluated a subset of them with long-term data from 780 users of a real-world online service. Our results show the potential to increase privacy in RBA solutions. However, it is limited to certain parameters that should guide RBA design to protect privacy. We outline research directions that need to be considered to achieve a widespread adoption of privacy preserving RBA with high user acceptance.
Components and Architecture for the Implementation of Technology-Driven Employee Data Protection
(2021)
In the field of service robots, dealing with faults is crucial to promote user acceptance. In this context, this work focuses on some specific faults which arise from the interaction of a robot with its real world environment due to insufficient knowledge for action execution. In our previous work [1], we have shown that such missing knowledge can be obtained through learning by experimentation. The combination of symbolic and geometric models allows us to represent action execution knowledge effectively. However we did not propose a suitable representation of the symbolic model. In this work we investigate such symbolic representation and evaluate its learning capability. The experimental analysis is performed on four use cases using four different learning paradigms. As a result, the symbolic representation together with the most suitable learning paradigm are identified.
Target meaning representations for semantic parsing tasks are often based on programming or query languages, such as SQL, and can be formalized by a context-free grammar. Assuming a priori knowledge of the target domain, such grammars can be exploited to enforce syntactical constraints when predicting logical forms. To that end, we assess how syntactical parsers can be integrated into modern encoder-decoder frameworks. Specifically, we implement an attentional SEQ2SEQ model that uses an LR parser to maintain syntactically valid sequences throughout the decoding procedure. Compared to other approaches to grammar-guided decoding that modify the underlying neural network architecture or attempt to derive full parse trees, our approach is conceptually simpler, adds less computational overhead during inference and integrates seamlessly with current SEQ2SEQ frameworks. We present preliminary evaluation results against a recurrent SEQ2SEQ baseline on GEOQUERY and ATIS and demonstrate improved performance while enforcing grammatical constraints.
Execution monitoring is essential for robots to detect and respond to failures. Since it is impossible to enumerate all failures for a given task, we learn from successful executions of the task to detect visual anomalies during runtime. Our method learns to predict the motions that occur during the nominal execution of a task, including camera and robot body motion. A probabilistic U-Net architecture is used to learn to predict optical flow, and the robot's kinematics and 3D model are used to model camera and body motion. The errors between the observed and predicted motion are used to calculate an anomaly score. We evaluate our method on a dataset of a robot placing a book on a shelf, which includes anomalies such as falling books, camera occlusions, and robot disturbances. We find that modeling camera and body motion, in addition to the learning-based optical flow prediction, results in an improvement of the area under the receiver operating characteristic curve from 0.752 to 0.804, and the area under the precision-recall curve from 0.467 to 0.549.
Property-Based Testing in Simulation for Verifying Robot Action Execution in Tabletop Manipulation
(2021)
An important prerequisite for the reliability and robustness of a service robot is ensuring the robot’s correct behavior when it performs various tasks of interest. Extensive testing is one established approach for ensuring behavioural correctness; this becomes even more important with the integration of learning-based methods into robot software architectures, as there are often no theoretical guarantees about the performance of such methods in varying scenarios. In this paper, we aim towards evaluating the correctness of robot behaviors in tabletop manipulation through automatic generation of simulated test scenarios in which a robot assesses its performance using property-based testing. In particular, key properties of interest for various robot actions are encoded in an action ontology and are then verified and validated within a simulated environment. We evaluate our framework with a Toyota Human Support Robot (HSR) which is tested in a Gazebo simulation. We show that our framework can correctly and consistently identify various failed actions in a variety of randomised tabletop manipulation scenarios, in addition to providing deeper insights into the type and location of failures for each designed property.
When an autonomous robot learns how to execute actions, it is of interest to know if and when the execution policy can be generalised to variations of the learning scenarios. This can inform the robot about the necessity of additional learning, as using incomplete or unsuitable policies can lead to execution failures. Generalisation is particularly relevant when a robot has to deal with a large variety of objects and in different contexts. In this paper, we propose and analyse a strategy for generalising parameterised execution models of manipulation actions over different objects based on an object ontology. In particular, a robot transfers a known execution model to objects of related classes according to the ontology, but only if there is no other evidence that the model may be unsuitable. This allows using ontological knowledge as prior information that is then refined by the robot’s own experiences. We verify our algorithm for two actions – grasping and stowing everyday objects – such that we show that the robot can deduce cases in which an existing policy can generalise to other objects and when additional execution knowledge has to be acquired.
We consider multi-solution optimization and generative models for the generation of diverse artifacts and the discovery of novel solutions. In cases where the domain's factors of variation are unknown or too complex to encode manually, generative models can provide a learned latent space to approximate these factors. When used as a search space, however, the range and diversity of possible outputs are limited to the expressivity and generative capabilities of the learned model. We compare the output diversity of a quality diversity evolutionary search performed in two different search spaces: 1) a predefined parameterized space and 2) the latent space of a variational autoencoder model. We find that the search on an explicit parametric encoding creates more diverse artifact sets than searching the latent space. A learned model is better at interpolating between known data points than at extrapolating or expanding towards unseen examples. We recommend using a generative model's latent space primarily to measure similarity between artifacts rather than for search and generation. Whenever a parametric encoding is obtainable, it should be preferred over a learned representation as it produces a higher diversity of solutions.
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems
(2021)
The web is the most wide-spread digital system in the world and is used for many crucial applications. This makes web application security extremely important and, although there are already many security measures, new vulnerabilities are constantly being discovered. One reason for some of the recent discoveries lies in the presence of intermediate systems—e.g. caches, message routers, and load balancers—on the way between a client and a web application server. The implementations of such intermediaries may interpret HTTP messages differently, which leads to a semantically different understanding of the same message. This so-called semantic gap can cause weaknesses in the entire HTTP message processing chain.
In this paper we introduce the header whitelisting (HWL) approach to address the semantic gap in HTTP message processing pipelines. The basic idea is to normalize and reduce an HTTP request header to the minimum required fields using a whitelist before processing it in an intermediary or on the server, and then restore the original request for the next hop. Our results show that HWL can avoid misinterpretations of HTTP messages in the different components and thus prevent many attacks rooted in a semantic gap including request smuggling, cache poisoning, and authentication bypass.
XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case study. In doing so, we highlight several deficiencies in defending against XSW. Using this real-world contemporary example as motivation, we introduce a guideline for more secure XML signature processing that provides practitioners with easier access to the effective countermeasures identified in the current state of research.
Threats to passwords are still very relevant due to attacks like phishing or credential stuffing. One way to solve this problem is to remove passwords completely. User studies on passwordless FIDO2 authentication using security tokens demonstrated the potential to replace passwords. However, widespread acceptance of FIDO2 depends, among other things, on how user accounts can be recovered when the security token becomes permanently unavailable. For this reason, we provide a heuristic evaluation of 12 account recovery mechanisms regarding their properties for FIDO2 passwordless authentication. Our results show that the currently used methods have many drawbacks. Some even rely on passwords, taking passwordless authentication ad absurdum. Still, our evaluation identifies promising account recovery solutions and provides recommendations for further studies.