Refine
Departments, institutes and facilities
- Fachbereich Informatik (606)
- Fachbereich Ingenieurwissenschaften und Kommunikation (235)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (216)
- Institute of Visual Computing (IVC) (210)
- Institut für Cyber Security & Privacy (ICSP) (201)
- Fachbereich Wirtschaftswissenschaften (148)
- Institut für Verbraucherinformatik (IVI) (134)
- Fachbereich Angewandte Naturwissenschaften (75)
- Institut für funktionale Gen-Analytik (IFGA) (56)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (54)
Document Type
- Conference Object (1808) (remove)
Year of publication
Keywords
- FPGA (11)
- Machine Learning (9)
- Usable Security (9)
- Virtual Reality (9)
- Privacy (8)
- Robotics (7)
- Sustainability (7)
- DPA (6)
- Education (6)
- Entrepreneurship (6)
- ICT (6)
- OER (6)
- Usable Privacy (6)
- User Experience (6)
- security (6)
- sustainability (6)
- virtual reality (6)
- Augmented Reality (5)
- CUDA (5)
- E-Learning (5)
- Ghana (5)
- Non-linear systems (5)
- Web (5)
- machine learning (5)
- 3D user interface (4)
- Benchmarking (4)
- Cloud (4)
- Eco-Feedback (4)
- GDPR (4)
- HTTP (4)
- Internet (4)
- Performance (4)
- Power Analysis (4)
- Quality diversity (4)
- Security (4)
- Smart Home (4)
- Sustainable Interaction Design (4)
- Wizard of Oz (4)
- advanced applications (4)
- digital design (4)
- e-learning (4)
- education (4)
- neural networks (4)
- usability (4)
- visualization (4)
- Applications in Energy Transport (3)
- Authentication (3)
- Barriers (3)
- Complex Systems Modeling and Simulation (3)
- Culture (3)
- Dementia (3)
- Design (3)
- Exergame (3)
- Fault analysis (3)
- Human-Robot Interaction (3)
- Hyperspectral image (3)
- IP protection (3)
- Image Processing (3)
- Inclusion (3)
- Information Systems (3)
- Learning Culture Survey (3)
- LoRa (3)
- LoRaWAN (3)
- Measurement (3)
- Navigation (3)
- Open Educational Resources (3)
- Peer-to-Peer (3)
- Public Transport (3)
- QoS (3)
- REST (3)
- Receivers (3)
- Risk-based Authentication (3)
- Robot sensing systems (3)
- Sensors (3)
- SpMV (3)
- Stochastic Model (3)
- Survey (3)
- TLS (3)
- Taxonomy (3)
- User Interface Design (3)
- WiLD (3)
- Workplace (3)
- clustering (3)
- design (3)
- document similarity (3)
- efficiency (3)
- end user development (3)
- evaluation (3)
- interaction design (3)
- interface design (3)
- modeling of complex systems (3)
- participatory design (3)
- remote lab (3)
- robotics (3)
- serious games (3)
- virtual environments (3)
- web caching (3)
- web services (3)
- 3D gaming (2)
- 802.11 (2)
- Adoption (2)
- Aerodynamics (2)
- Agilität (2)
- Algorithms (2)
- Alternatives (2)
- Appropriation (2)
- Artificial Intelligence (2)
- Augmented reality (2)
- Autonomous Driving (2)
- Bag of Features (2)
- Basic Access Control (2)
- Big Data Analysis (2)
- Blockchain (2)
- Boolean Masking (2)
- Claim personal data (2)
- Cloud Security (2)
- Cognitive robot control (2)
- Compositional Pattern Producing Networks (2)
- Computational fluid dynamics (2)
- Computer Graphics (2)
- Computer Vision (2)
- Content Module (2)
- Cooperative Awareness Message (2)
- Corporate Social Responsibility (2)
- Data takeout (2)
- Datenschutz (2)
- Digital Sovereignty (2)
- Digitalisierungsstrategie (2)
- Distributed rendering (2)
- E-Passport (2)
- EBSD (2)
- Economy (2)
- Educational Culture (2)
- Educational institutions (2)
- Embedded software (2)
- Empirical Study (2)
- Empirical study (2)
- Equipment and services (2)
- Euronorm (2)
- Evaluation (2)
- Evolutionary computation (2)
- Explainability (2)
- Explainable robotics (2)
- Eye Tracking (2)
- FDI (2)
- Field programmable gate arrays (2)
- Food (2)
- Fourier transforms (2)
- GPU (2)
- Gamification (2)
- Graphics Cards (2)
- HCI (2)
- Heart Rate Prediction (2)
- Heterodyning (2)
- Higher education (2)
- Hochschule Bonn-Rhein-Sieg (2)
- Host-Based Code Injection Attacks (2)
- Human Factors (2)
- Human computer interaction (2)
- Human-robot interaction (2)
- IEEE 802.11 (2)
- IEEE802.11 (2)
- IT management (2)
- Indirect Encodings (2)
- Inductive Logic Programming (2)
- Informationssicherheit (2)
- Innovation (2)
- Institutions (2)
- Intelligent virtual agents (2)
- Intercultural Communication (2)
- Internet of Things (2)
- Kenya (2)
- Kompetenz (2)
- Large, high-resolution displays (2)
- Learning analytics (2)
- Learning from experience (2)
- Living Lab (2)
- Long-Distance WiFi (2)
- MAP-Elites (2)
- MPLS (2)
- MRTD (2)
- Malware (2)
- Malware analysis (2)
- Management (2)
- Memory forensics (2)
- Microgrid (2)
- Mixed Reality (2)
- Mobility (2)
- Named Entity Recognition (2)
- Natural Language Processing (2)
- Neuroevolution (2)
- Noise (2)
- Noise reduction (2)
- Object recognition (2)
- OpenFlow (2)
- Optics (2)
- Organisation (2)
- Organizational Culture (2)
- Original Story (2)
- Oscillators (2)
- Parallelization (2)
- Password (2)
- Performance Analysis (2)
- Pseudonym Concept (2)
- Pulsars (2)
- Qualitative Study (2)
- Quality Diversity (2)
- RE (2)
- Raman microscopy (2)
- Remote lab (2)
- Remote laboratory (2)
- Risk Perception (2)
- Risk-based Authentication (RBA) (2)
- Robots (2)
- Robustness (2)
- Rosenbrock-Wanner Methods (2)
- SDN (2)
- SME (2)
- SOA (2)
- SOAP (2)
- Self-Driving Cars (2)
- Serious Games (2)
- Service Design (2)
- Service-Oriented Architecture (2)
- Shared Autonomous Vehicles (2)
- Shared autonomous vehicles (2)
- Shopping Experience (2)
- Side Channel Analysis (2)
- Side Channel Cryptanalysis (2)
- Side-channel analysis (2)
- Social Media (2)
- Social Software (2)
- Software (2)
- Spectrometers (2)
- Start-ups (2)
- TEL (2)
- Technology Enhanced Learning (2)
- Telescopes (2)
- Template Attack (2)
- Three-dimensional displays (2)
- Traceability (2)
- Trust (2)
- Usability (2)
- User Acceptance (2)
- User-Centered Design (2)
- Vehicle-to-Vehicle Communication (2)
- Verbraucherinformatik (2)
- Visualization (2)
- WS-Security (2)
- Western Africa (2)
- Word embeddings (2)
- XML (2)
- XML Signature (2)
- XML Signature Wrapping (2)
- active packaging (2)
- analysis (2)
- appropriation (2)
- authoring tools (2)
- biobased (2)
- biodiversity (2)
- blockchain (2)
- caregivers (2)
- classifier combination (2)
- co-design (2)
- cognitive radio (2)
- design case study (2)
- discrete optimisation (2)
- dispatching problem (2)
- edutainment (2)
- embedded systems (2)
- emotion recognition (2)
- energy harvesting (2)
- energy monitoring (2)
- farmers (2)
- feature extraction (2)
- feature selection (2)
- field programmable gate arrays (2)
- food loss (2)
- gas transport networks (2)
- grid-forming converter (2)
- haptics (2)
- higher education (2)
- human factors (2)
- hypermedia (2)
- image fusion (2)
- insect farming and processing (2)
- interferometers (2)
- knowledge learning (2)
- learning outcomes (2)
- low power (2)
- machine vision (2)
- massively parallel calculations (2)
- mathematical and numerical algorithms and methods (2)
- mathematical chemistry (2)
- mathematics (2)
- microcontroller (2)
- motion estimation (2)
- navigation (2)
- network (2)
- object categorization (2)
- observational data and simulations (2)
- pansharpening (2)
- path planning (2)
- project-based learning (2)
- prototyping (2)
- reliability (2)
- resources (2)
- simulation and modeling (2)
- software engineering (2)
- spectrum sensing (2)
- stereoscopic vision (2)
- surrogate modeling (2)
- sustainable mobility (2)
- user study (2)
- video lectures (2)
- wire bonding (2)
- wireless communication (2)
- 2D Level Design (1)
- 3D User Interface (1)
- 3D Visualisierung (1)
- 3D design (1)
- 3D interfaces (1)
- 3D registration (1)
- 3D shape (1)
- 3D user interfaces (1)
- 450 MHz (1)
- 6LoWPAN (1)
- AES (1)
- AES hardware (1)
- AI based translation (1)
- AI-Systems (1)
- AMD Family 15h (1)
- ANN (1)
- ANSYS (1)
- AOP (1)
- API usability (1)
- AR design (1)
- AR development (1)
- AR/VR (1)
- ARM Cortex M3 Processor (1)
- ARRs (1)
- Abstract Syntax Tree (1)
- Acceleration (1)
- Accelerometers (1)
- Acceptance (1)
- Accessibility (1)
- Account Security (1)
- Accretion (1)
- Accuracy (1)
- Actiotope Model (1)
- Active Eco-Tourism in Emerging Tourism (1)
- Active Learning (1)
- Active locomotion (1)
- Actuators (1)
- Adaptation of Software (1)
- Adaptive Media Streaming (1)
- Adaptive optics (1)
- Adoption Factors (1)
- Advance Encryption Standard (1)
- Advances in Design Science Research (1)
- Adversarial Model (1)
- Africa (1)
- Agent-oriented software engineering (1)
- Agil (1)
- AgroTICs (1)
- Air Pollution (1)
- Air pollution modeling (1)
- Air transport (1)
- Alexa (1)
- All-Swap Algorithm (1)
- Alternde Gesellschaft (1)
- Amplifiers (1)
- Aneignungsstudie (1)
- Anthropocene (1)
- Antimicrobial activity (1)
- Application Software (1)
- Application in electrochemistry (1)
- Applied and Practice-Oriented Research (1)
- Appropriateness (1)
- Approximated Jacobian (1)
- Architectural Patterns (1)
- Architecture (1)
- Articulation Work (1)
- Assistive robots (1)
- Astrometric (1)
- Astronomy (1)
- Attacks and Attack Implementations (1)
- Attention (1)
- Attention mechanism (1)
- Authentication features (1)
- Authorship watermark (1)
- Autism Spectrum Disorder (1)
- Autoencoder (1)
- Autoimmune disease (1)
- Automatic Differentiation (1)
- Automatic Short Answer Grading (1)
- Automotive UI (1)
- B2T (1)
- BCL2 (1)
- BFS (1)
- BLOB Detection (1)
- Ballastless track (1)
- Basiswerkstoff (1)
- Bayesian Hierarchical Model (1)
- Bayesian optimization (1)
- Beacon Chain (1)
- Behaviour-Driven Development (1)
- Best practice algorithms (1)
- Betriebliches Informationssystem (1)
- Bewegungsmotivation (1)
- Bicycle Simulator (1)
- Bioinformatics (1)
- Biometric data (1)
- Biometrics (1)
- Biometrics of chips (1)
- Black Hole (1)
- Black-box models (1)
- Blasformen (1)
- Blended Learning (1)
- Blob Detection (1)
- Block cipher (1)
- Blocking (1)
- Bluetooth (1)
- Bond Graph models for fault detection and isolation (1)
- Bond graph modelling (1)
- Boolean and arithmetic operations (1)
- Botnet tracking (1)
- Bound Volume Hierarchy (1)
- Bounding Box (1)
- Branch and cut (1)
- Browser cache (1)
- Business English (1)
- Business Models (1)
- Business Sector (1)
- Business Support System (1)
- Business software (1)
- Business system (1)
- Business-to-Thing (1)
- CNN (1)
- COPACOBANA (1)
- CPA (1)
- CPU (1)
- CPUID instruction (1)
- CRT (1)
- CSR5BC (1)
- Cache Poisoning (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Car Interior Design (1)
- Car Management (1)
- Care (1)
- Caregiver (1)
- Carsharing (1)
- Case-Study (1)
- Cell Processor (1)
- Cell/B.E. (1)
- Center-of-Mass (1)
- Change (1)
- Channel assignment (1)
- Chemicals (1)
- Chiral-nematischer Flüssigkristall (1)
- Chromatography (1)
- Cipher Block Chain (1)
- Clean Energy and Power Systems (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- Clusters (1)
- Co-Design (1)
- Co-located Collaboration (1)
- Co-located work (1)
- Code similarity analysis (1)
- Cognitive processing (1)
- Cognitive robotics (1)
- Collaborating industrial robots (1)
- Collaboration (1)
- Collaboration and e-Services (1)
- Coloured pointclouds (1)
- Column (1)
- Communication breakdown (1)
- Community (1)
- Community of Practice (1)
- Comparative analysis (1)
- Competencies (1)
- Competition (1)
- Complex systems modeling and simulation (1)
- Compliant Manipulation (1)
- Compliant fingers (1)
- Component Models (1)
- Composition of Patterns (1)
- Computer Security (1)
- Computer Simulation Techniques (1)
- Computer Support (1)
- Computer architecture (1)
- Computer graphics (1)
- Computer hardware (1)
- Computer-supported Cooperative Work (1)
- Computing methodologies (1)
- Conceptual model (1)
- Concurrent Kleene Algebra (1)
- Concurrent repeated failure prognosis (1)
- Conformance Testing (1)
- Connected Car (1)
- Connected Car Services (1)
- Constructionism (1)
- Consumer Informatics (1)
- Consumer Online Behaviour (1)
- Consumer behavior (1)
- Consumer protection (1)
- Consumption feedback (1)
- Container Structure (1)
- Containerization (1)
- Content Analysis (1)
- Context-awareness (1)
- Contextualized Attention Metadata (CAM) (1)
- Continual robot learning (1)
- Control (1)
- Conversational Interface (1)
- Conversational user interfaces (1)
- Cooperative Work (1)
- Corporate Bodies (1)
- Correlative Microscopy (1)
- Cortex-M3 (1)
- Covert channel (1)
- Crisis Communication (1)
- Critical power (1)
- Cross-core (1)
- Crossmedia (1)
- Cryptography (1)
- Culinary Tourism (1)
- Cultural Distance (1)
- Culture Awareness (1)
- Culture in Education (1)
- Culture-Related Conflicts in Education (1)
- Culture-Sensible Education (1)
- Current limiter (1)
- Current measurement (1)
- Curriculum (1)
- Curse of dimensionality (1)
- Customization (1)
- Cybersecurity (1)
- Cypher (1)
- DAE systems (1)
- DC-DC converter (1)
- DC-cascade (1)
- DEMA (1)
- DES (1)
- DFA Lab (1)
- DMA (1)
- DNSSEC (1)
- DPA Lab (1)
- DSC (1)
- DSGVO (1)
- Data Compression (1)
- Data Fusion (1)
- Data Generation (1)
- Data Integration (1)
- Data Protection Officer (1)
- Data Reduction (1)
- Data Tiles (1)
- Data literacy (1)
- Data visualization (1)
- Dataflow Programming (1)
- Datalog (1)
- Datenlebenszyklus (1)
- Datenschutzerklärungen (1)
- Datensicherheit (1)
- Defense and security (1)
- Delph Study (1)
- Delphi-method (1)
- Denial of Service (1)
- Design Optimization (1)
- Design Probe (1)
- Design Recommendations (1)
- Design Theory and Practice (1)
- Design automation (1)
- Design patterns (1)
- Design-Fiction (1)
- Development (1)
- Diagnostic bond graph-based online fault diagnosis (1)
- Difference Visualization (1)
- Difference-coding (1)
- Differential Side Channel Cryptanalysis (1)
- Differential analysis (1)
- Differential side-channel analysis (1)
- Digital Ecosystem (1)
- Digital Receipt (1)
- Digital Storytelling (1)
- Digital Twin (1)
- Digital common goods (1)
- Digital design (1)
- Digital watermarking (1)
- Digitaler Konsum (1)
- Digitalisierung (1)
- Digitalisierung & Internationalisierung (1)
- Digitisation (1)
- Digitization (1)
- Diodes (1)
- Directional Antenna (1)
- Directional antennas (1)
- Disaster Area (1)
- Distance Bounding (1)
- Distortion (1)
- Distribute Software Development (1)
- Distributed Robot Systems (1)
- Distribution Grid (1)
- Docker (1)
- Document relevance (1)
- Domain Expert (1)
- Domestic Robots (1)
- Domestic Technology (1)
- Domestic robotics (1)
- Domestic robots (1)
- Driving Simulator (1)
- Droop control (1)
- Dynamic motion primitives (1)
- E-Business (1)
- E-Health (1)
- E-Learning 2.0 (1)
- E-Learning 3.0 (1)
- E-waste (1)
- EEG (1)
- EM Algorithm (1)
- EPCIS (Electronic Product Code Information Services) (1)
- ERP-software (1)
- ERP-system (1)
- Echo chamber (1)
- Echtzeit (1)
- Echtzeitüberwachung (1)
- Eclipse Modeling Framework (1)
- Eco-Cycling (1)
- Eco-system (1)
- Economic Development (1)
- Economics (1)
- Ecosystem (1)
- Educational Standards (1)
- Efficiency (1)
- Ego-Motion Estimation (1)
- Elderly (1)
- Elderly People (1)
- Electric micromobility (1)
- Electrical Energy System (1)
- Electrical and Electronic Equipment (1)
- Electrical noise (1)
- Electromagnetic Analysis (1)
- Electromagnetic wave propagation (1)
- Electronic Immobilizer (1)
- Elliptic Curve Cryptography (1)
- Embedded system (1)
- Empirical studies (1)
- Employee data protection (1)
- Encryption (1)
- Energy System (1)
- Engaging Experience (1)
- Engine Map (1)
- Engineering (1)
- Enterprise Engineering (1)
- Enterprise Information Systems (1)
- Enterprise Resource Planning (1)
- Enterprise software (1)
- Enterprise system (1)
- Entrepreneurial Education (1)
- Estimation (1)
- Ethereum (1)
- Ethernet (1)
- Ethnographic Research (1)
- Evaluation board (1)
- Everyday object manipulation (1)
- Evolutionary algorithms (1)
- Experiment (1)
- Experiment design (1)
- Expert Interviews (1)
- Experten (1)
- Explainable Machine Learning (1)
- Explainable artificial intelligence (1)
- Explanatory dialogues (1)
- Explosives (1)
- FEM-Simulation (1)
- FPGA implementation (1)
- Factor- and cluster analyses (1)
- Fake Link (1)
- Fas (1)
- Fast Moving Consumer Goods Company (1)
- Fault Channel Watermarking Lab (1)
- Fault Detection & Diagnosis (1)
- Fault-channel watermarks (1)
- Feature extraction (1)
- Features (1)
- Field Programmable Gate Array (FPGA) (1)
- Field Study (1)
- File carving (1)
- Fingerprint watermark (1)
- Finite-Elemente-Methode (1)
- Fixed spatial data (1)
- Flexible robots (1)
- Flow control (1)
- Fog (1)
- Folk theories (1)
- Food Practices (1)
- Food Process Quality (1)
- Food Retail (1)
- Food Safety and Security (1)
- Food security (1)
- Force (1)
- Force and tactile sensing (1)
- Force field (1)
- Forecasting (1)
- Forests (1)
- Formteil (1)
- Forschungsdatenmanagement (1)
- Forschungsprojekt (1)
- Fourier optics (1)
- Fourier transform spectra (1)
- Fragmented files (1)
- Framing (1)
- Free space optics (1)
- Free-Space Loss (FSL) (1)
- Frequency conversion (1)
- Frequency measurement (1)
- Frequency planning (1)
- Frequenzauswertung (1)
- Friction (1)
- Frontend architecture (1)
- Fuel Consumption (1)
- Full-text Search (1)
- Fully Autonomous Driving (1)
- Functional Safety Management (1)
- Functional safety (1)
- Fusion (1)
- Future (1)
- Future Studies (1)
- Future Work (1)
- Future of Robotics (1)
- Fuzzy Logic (1)
- Fuzzy logic (1)
- GPGPU (1)
- Game Engine (1)
- Games and Simulations for Learning (1)
- Garbage collection (1)
- Gaussian Mixture Models (1)
- Gaussian processes (1)
- Gaze Behavior (1)
- Gaze Depth Estimation (1)
- Gender (1)
- Gender Issues in Computer Science Education (1)
- Generation R (1)
- Generative Design (1)
- Generative Models (1)
- Geo-tagging (1)
- German paper production industry (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheit (1)
- Gesundheitswesen (1)
- Ghanaian entrepreneurs (1)
- Givens Rotations (1)
- Global Cultural Awareness (1)
- Global Engineering (1)
- Global Illumination (1)
- Global Software Development (1)
- Global horizontal irradiance (1)
- Globally convergent methods (1)
- Government (1)
- Gradient-boosting (1)
- Grailog (1)
- Graphical user interfaces (1)
- Grasping (1)
- Grassroots (1)
- Grid Analyzer (1)
- Grid Control (1)
- Grid Stability (1)
- Grid-forming converters (1)
- Grounded Method (1)
- Group Behavior (1)
- Group behavior (1)
- Groupware (1)
- Guidelines (1)
- Gusspolyamid (1)
- H-BRS (1)
- HCSS (1)
- HFI (1)
- HMAC-construction (1)
- HPC (1)
- HRI (1)
- HTS (1)
- Haco Tiger Brands (1)
- Half-Bridge Series Resonant Converter (HB-SRC) (1)
- Hall-Petch relation (1)
- Hand Guidance (1)
- Hand Tracking (1)
- Hardware (1)
- Hardware Testbed (1)
- Harmonic analysis (1)
- Hauswirtschaft (1)
- Head-Mounted Displays (1)
- Head-mounted Display (1)
- Header whitelisting (1)
- Heat Generator (1)
- Heat shrink tubing (1)
- Hems (1)
- Heterogenes Sensorsystem (1)
- High Power Density Systems (1)
- High-Order Attacks (1)
- High-performance computing (1)
- High-speed track (1)
- Higher Education (1)
- Higher-Order Analysis (1)
- Higher-Order Side Channel Analysis (1)
- Hohlkörper (1)
- Holographic interferometry (1)
- Holography (1)
- Home energy management system (1)
- Hospitality entrepreneurial skills (1)
- Human Food Interaction (1)
- Human autonomy (1)
- Human centered computing (1)
- Human computer interaction (HCI) (1)
- Human factors (1)
- Human-Centered Robotics (1)
- Human-Food-Interaction (1)
- Human-Robot Collaboration (1)
- Human-agent interaction (1)
- Human-centered computing (1)
- Humanoid Robot (1)
- Hybrid (1)
- Hyflex course setting (1)
- HyperNEAT (1)
- ICE (1)
- ICP (1)
- IDEA (1)
- IEC 104 (1)
- IEC 61850 (1)
- IEEE 802.11n (1)
- IEEE 802.21 (1)
- IIoT (Industrial Internet of Things) (1)
- IT organisation (1)
- IT-CMF (1)
- IT-Controlling (1)
- IT-Management (1)
- IT-Projektmanagement (1)
- IT-Strategie (1)
- Illumination algorithms (1)
- Image representation (1)
- Image-based rendering (1)
- Immersive Virtual Environments (1)
- Immersive Visualization Environment (1)
- Impaired (1)
- Implementation Attack (1)
- Implementation Challenges (1)
- Increasing fault magnitude (1)
- Index (1)
- Index-one DAEs (1)
- Individual Empowerment (1)
- Indoor-positioning (1)
- Industrial robots (1)
- Information Communication Technologies (1)
- Information Security (1)
- Information Types (1)
- Information and Communication Technologies (1)
- Information hiding (1)
- Information interaction (1)
- Informational self-determination (1)
- Innovativeness (1)
- Instance-based learning (1)
- Instruction scheduling (1)
- Instructor Support (1)
- Instrumented indentation experiments (1)
- Integer programming (1)
- Integrate Development Environment (1)
- Integrated Household Information System (1)
- Integrated circuit interconnections (1)
- Integration Platform as a Service (1)
- Integrierungsmethodik (1)
- Intel Xeon Phi (1)
- Intel processors (1)
- Intelligence Amplification (1)
- Intelligence Augmentation (1)
- Intelligent Process Automation (1)
- Intelligent Transport System (1)
- Interaction (1)
- Interaction Patterns (1)
- Interactive Artifacts (1)
- Interactive Smart Card Applications (1)
- Interference (1)
- Interkulturelle Kommunikation (1)
- Intermediaries (1)
- Intermittent faults (1)
- International Standard ISO 13849-1 (1)
- Internationalization (1)
- Internet Technology (1)
- Interoperability (1)
- Interpretability (1)
- Interview (1)
- Introductury project (1)
- Inventory (1)
- Inverter (1)
- Invisible AI (1)
- IoT (1)
- Issue Tracking Systems (1)
- Issue Types (1)
- Issue tracking systems (1)
- Issues Monitoring (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- Java virtual machine (1)
- JavaScript (1)
- Jobs (1)
- Joule Machine (1)
- KMU (1)
- KNN (1)
- Kalman filter (1)
- Kanban (1)
- Kenya Vision 2030 (1)
- Key Search Machine (1)
- Knowledge Graphs (1)
- Knowledge representation (1)
- Knowledge sharing (1)
- Koaxiales Elektrospinnen (1)
- Kommunikationsvernetzung (1)
- Kryptologie (1)
- Kunststoff (1)
- Kunststoffhohlkörper (1)
- LAA (1)
- LCA (1)
- LGCSR (1)
- LOTUS Sensor Node (1)
- LTE-M (1)
- LTE-U (1)
- Laboratories (1)
- Laser drilling (1)
- Laser induced breakdown spectroscopy (1)
- Laserbohren (1)
- Lasermaterialbearbeitung (1)
- Last mile problem (1)
- Latin America (1)
- Lattice Basis Reduction (1)
- Lattice Boltzmann Method (1)
- Laws of programming (1)
- Lead userness (1)
- Leapfrogging (1)
- Learner’s Preferences (1)
- Learning (1)
- Learning 2.0 (1)
- Learning 3.0 (1)
- Learning App (1)
- Learning Context (1)
- Learning Culture (1)
- Learning Environments (1)
- Learning Management Systems (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Learning from demonstration (1)
- Learning systems (1)
- Lebensmittelindustrie (1)
- Legal Aspects (1)
- Legal Design (1)
- Liberalization (1)
- Life Cycle Assessment (LCA) (1)
- Lighting simulation (1)
- Linear regression (1)
- Living Labs (1)
- LoRa receiver accuracy (1)
- Long-distance (1)
- Longitudinal Study (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Low power (1)
- Low-Power Wide Area Network (LP-WAN) (1)
- Low-power design (1)
- Low-power digital design (1)
- Low-power education (1)
- Lymphoproliferative disorder (1)
- MAC (1)
- MACE (1)
- MASLOC (1)
- MEMS glass frit (1)
- MESD (1)
- MIMD (1)
- MIMO (1)
- MOOC (1)
- MQTT (1)
- MR (1)
- MR-WMN (1)
- MRTD Cracker (1)
- MSMEs (1)
- Machine learning (1)
- Machine-learning (1)
- Mafia Attack (1)
- Main Memory (1)
- Maker space (1)
- Makers (1)
- Malware Detection (1)
- Manipulator (1)
- Marketing practices (1)
- Marketplaces (1)
- Markov Cluster Algorithm (1)
- Maschinenbau (1)
- Maschinensteuerung (1)
- Materialbeschreibung (1)
- Maximum Likelihood Principle (1)
- Medienverhalten (1)
- Medium Voltage (1)
- Megatrends (1)
- Memory filesystem (1)
- Memory-Constrained Devices (1)
- Mental Models (1)
- Mental models (1)
- Mergers and acquisitions (1)
- Mesh networks (1)
- Message Authentication (1)
- Metals (1)
- Method of lines (1)
- Methods (1)
- Metrics (1)
- Microarchitectural Data Sampling (MDS) (1)
- Micromechanical devices (1)
- Microservices (1)
- Middleware and Programming Environments (1)
- Milieu-specific differences (1)
- Minimum Principle (1)
- Mining Software Repositories (1)
- Mining software repositories (1)
- Misconception (1)
- Mittelstand (1)
- Mixed (1)
- Mixed / augmented reality (1)
- Mixed method evaluation (1)
- Mixed-methods (1)
- Mobile devices (1)
- Mobile manipulation (1)
- Mobile robots (1)
- Mobile technologies (1)
- Mobility Model (1)
- Mobility modeling (1)
- Modal Shift (1)
- Modalities (1)
- Model Fitting (1)
- Model surrogation (1)
- Model-based Approach (1)
- Model-based engineering approaches to AI safety (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Modelica (1)
- Modular software packages (1)
- Modulation (1)
- Molecular modeling (1)
- Morphological box (1)
- Morphological scheme (1)
- Motion Capture (1)
- Motion Generator (1)
- Motion planning (1)
- Motivation (1)
- Motivators (1)
- Motor Control Unit (1)
- Mountain Biking (1)
- Mully Model of Applied Entrepreneurship Teaching (1)
- Multi-Modal Interaction (1)
- Multi-Tenant Application (1)
- Multi-hop Net-works (1)
- Multi-level converters (1)
- Multi-objective optimization (1)
- Multicast communication (1)
- Multilayer interaction (1)
- Multilevel Inverters (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Multimodal (1)
- Multimodal Microspectroscopy (1)
- Multimodal Mobility (1)
- Multimodal optimization (1)
- Multiple Displays (1)
- Multithreaded and multicore architecture (1)
- Multiuser (1)
- Multivariate Side Channel Analysis (1)
- Multivariate Time Series (1)
- Multivariate time series classification (1)
- Musical Performance (1)
- NBSSI (1)
- NEAT (1)
- NETCONF (1)
- NGOs (1)
- NIR (1)
- NIR-point sensor (1)
- NISTPQC (1)
- NLP (1)
- NNS (1)
- NUMA (1)
- NURBS (1)
- NVIDIA Tesla (1)
- Nachhaltigkeit (1)
- Narration Module (1)
- Natural language understanding (1)
- Natural scene text (1)
- Naturkautschuk (1)
- Navigation interface (1)
- Negotiation of Taste (1)
- Network simulation (1)
- Networked Robots (1)
- Neural Machine Translation (1)
- Neuroscience (1)
- Non-linear optimization (1)
- Norm (1)
- Numerical optimization (1)
- Nutzerakzeptanz (1)
- Nvidia graphic processors (1)
- Object detection (1)
- Object-Based Image Analysis (OBIA) (1)
- Observation (1)
- Onion Model of Culture (1)
- Online Services (1)
- Open Educational Practices (1)
- Open source firmware (1)
- Open-ended Robotic Discovery (1)
- Open-source (1)
- OpenACC (1)
- OpenDaylight (1)
- OpenMP, unrolling (1)
- OpenStack (1)
- Optimisation 3D (1)
- Optische Gassensorik (1)
- Order reduction (1)
- Organisationsentwicklung (1)
- Organization Theory (1)
- Outlier Detection (1)
- PDSTSP (1)
- PHR (1)
- PID (1)
- PIR sensor units (1)
- PM2.5 estimation (1)
- PTR-MS (1)
- Pain Reduction (1)
- Paketvermittlung (1)
- Parallel I/O (1)
- Parallel Processing (1)
- Parallel drone scheduling traveling salesman problem (1)
- Parameter identification (1)
- Parameter sensitivities of transfer functions (1)
- Parametric study (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Participatory Design (1)
- Participatory Design Approach (1)
- Partworth Utilities (1)
- Passengers (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Path Loss (1)
- Path loss model (1)
- Peer teaching (1)
- People Detection (1)
- Perceived AI (1)
- Perception (1)
- Performance Evaluation (1)
- Performance Simulation (1)
- Performance benchmarks (1)
- Performance prediction (1)
- Performance profiling (1)
- Periodic structures (1)
- Persistence (1)
- Personal Health Record (1)
- Persuasive Systeme (1)
- Phenotypic niching (1)
- Phishing (1)
- Photoconductors (1)
- Photovoltaic, Inverter (1)
- Physical Security (1)
- Physical exercising game platform (1)
- Platform economy (1)
- Pointing (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Pointing devices (1)
- Policy (1)
- Polyamid 6 (1)
- Pose Estimation (1)
- Post-Quantum Signatures (1)
- Post-merger phase (1)
- Power Hardware-in-the-loop (1)
- Power Supply (1)
- Power dissipation (1)
- Power measurement (1)
- Power train map (1)
- Practice Theory (1)
- Prediction of physiological responses to strain (1)
- Predictive Models (1)
- Privacy Awareness (1)
- Privacy engineering (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Private sector development (1)
- Privatsphäre (1)
- Pro-MINT-us (1)
- Probabilistic model (1)
- Process Automation (1)
- Product Innovation (1)
- Produktsimulation (1)
- Programmentwicklungsmanagement (1)
- Programming (1)
- Project Management (1)
- Project based learning (1)
- Proof of Stake (1)
- Propagation (1)
- Proton-Transfer-Reaction Mass Spectrometry (1)
- Prototypes (1)
- Public Key Infrastructures (1)
- Pulse Width Modulation (PWM) (1)
- Pulse width modulation (1)
- Push-based Streaming (1)
- Pytorch (1)
- Q measurement (1)
- Q-Method, stakeholder perceptions (1)
- QPSK (1)
- Qualitative research (1)
- Quality control (1)
- Qualitäts-Service (1)
- Qualitätspakt Lehre (1)
- RBAR (1)
- RC filters (1)
- RC6 (1)
- REST security (1)
- RF Eavesdropper (1)
- RFID (1)
- RGB-D (1)
- RGB-D data (1)
- RLE-XOR (1)
- RLE-permutation (1)
- RNN (1)
- ROW methods (1)
- RSA (1)
- RSSI (1)
- Radio astronomy (1)
- Radiofrequency identification (1)
- Radix Sort (1)
- Random number generator (1)
- Rank correlation (1)
- Rapid Prototyping (1)
- Rapid prototyping (1)
- Ray Casting (1)
- Ray Tracing (1)
- Ray tracing (1)
- Re-authentication (1)
- Real-Time Simulation (1)
- Reasoning (1)
- Recommendation systems (1)
- Recommender Systems (1)
- Reconstruction Error (1)
- Redes de Sensores inalámbricos (1)
- Refinement (1)
- Reflectance modeling (1)
- Reflectors (1)
- Registration Refinement (1)
- Relational Learning (1)
- Relative Added Value (1)
- Relativer Mehrwert (1)
- Remaining Useful Life (RUL) estimates (1)
- Remote Work (1)
- Render Cache (1)
- Renewable Energy (1)
- Repeat Purchase Recommendations (1)
- Repositories (1)
- Requirements (1)
- Requirements Communication (1)
- Requirements analysis (1)
- Requirements engineering in SMEs (1)
- Research Trajectories (1)
- Research through Design (1)
- Resource Planning (1)
- Restful Web Services (1)
- Restorative Virtual Environments (1)
- Reusable Software (1)
- Reversible Logic Synthesis (1)
- Review (1)
- Revised Onion Model of Culture (1)
- Rfid (Radio-Frequency Identification) (1)
- Rheometer (1)
- Risikoanalyse (1)
- Risikobewertung (1)
- Risikomanagement (1)
- Risk-Based Account Recovery (1)
- River alarm systems (1)
- Robo-taxi (1)
- RoboCup (1)
- Robot commands (1)
- Robot competitions (1)
- Robot failure diagnosis (1)
- Robot kinematics (1)
- Robot learning (1)
- Robot software (1)
- Robot-Assisted Therapy (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Process Automation (1)
- Robotic Revolutions (1)
- Robotics competitions (1)
- Robust grasping (1)
- Rotating Table Test (1)
- Router (Rechnernetz) (1)
- Rube Goldberg machine (1)
- RuleML (1)
- Runtime AI safety monitoring (1)
- Runtime Adaptation (1)
- Rural areas (1)
- Rural communities (1)
- S3D (1)
- S3D Video (1)
- S3D video (1)
- SAML (1)
- SCP (1)
- SCRUM (1)
- SDWN (1)
- SEMA (1)
- SHA-1 (1)
- SIMD (1)
- SIMO (1)
- SLIDE algorithm (1)
- SORT (1)
- SQL (1)
- SVG (1)
- SaaS (1)
- Safety PLC (1)
- Safety of machinery (1)
- Scalability (1)
- Scalable Vector Graphic (1)
- ScalarMultiplication (1)
- Scan and Go (1)
- Scanning (1)
- Scene text recognition, active vision, domestic robot, pantilt, auto-zoom, auto-focus, adaptive aperture control (1)
- Scholarly workbench (1)
- Schrumpfung (1)
- Schwartz's portrait value questionnaire (PVQ) (1)
- Scientific competency development (1)
- Scientific workbench (1)
- Scrum (1)
- Second Cockpit (1)
- Second Life (1)
- Second Screen (1)
- Second-Order DPA (1)
- Secure Cloud Storage (1)
- Security APIs (1)
- Security Approaches (1)
- Security Protocol (1)
- Selbstfahrende Autos (1)
- Self-checkout (1)
- Self-driving (1)
- Self-service (1)
- Self-supervised learning (1)
- Semantic gap (1)
- Semantic models (1)
- Semantic representation (1)
- Semantics (1)
- Semi-Virtual Testbed (1)
- Semiconductor lasers (1)
- Sensor systems (1)
- SensorFusion (1)
- Sensorbasierte Systeme (1)
- Separation algorithm (1)
- Service Robot (1)
- Service robot (1)
- Sgr A⋆ (1)
- Sharing Economy (1)
- SiC (1)
- Sicherheitsanalyse (1)
- Sicherheitslücke (1)
- Side Channel Countermeasures (1)
- Side Channel Cryptanalysis, Stochastic Methods (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side-channel watermarking (1)
- Signal processing algorithms (1)
- Signature Verification (1)
- Silicon Carbide (SiC) (1)
- Silicon biometrics (1)
- Similarity matrix (1)
- Simulation (1)
- Simulationsmodell (1)
- Simulator (1)
- Single Instruction Multiple Data (SIMD) (1)
- Single sideband modulation (1)
- Skin detection (1)
- Slippage detection (1)
- Smart Card (1)
- Smart Contracts (1)
- Smart Grid (1)
- Smart InGaAs camera-system (1)
- SmartMANET Jamming (1)
- Smartphones (1)
- Social Capital (1)
- Social Learning (1)
- Social Media Analysis (1)
- Social Virtual Reality (1)
- Social engagement in university (1)
- Social learning (1)
- Social sustainability (1)
- Soft Switching (1)
- Soft skill (1)
- Software Acquisition (1)
- Software Architectures (1)
- Software Development Process (1)
- Software Feature Request Detection (1)
- Software IP protection (1)
- Software Security (1)
- Software Supply Chain (1)
- Software and Architecture (1)
- Software as a Service (1)
- Software reverse engineering (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Softwareanpassung (1)
- Softwaresystem (1)
- Sonar (1)
- Space exploration (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Sparse matrix format (1)
- Spatial Proximity (1)
- Spatiotemporality (1)
- Spectroscopy (1)
- Spectrum occupancy (1)
- Spectrum optimization (1)
- Speech Act Theory (1)
- Split Axis (1)
- Stakeholder-Analyse (1)
- Standardization (1)
- Standardized Testing (1)
- Standards (1)
- Star Trek (1)
- State machines (1)
- Stationary network problems (1)
- Stereoscopic Rendering (1)
- Stereoscopic rendering (1)
- Stereoscopy (1)
- Story Element (1)
- Strategy (1)
- Streaming (1)
- Stress Management (1)
- Strong Physical Unclonable Functions (PUFs) (1)
- Structural sensitivity (1)
- Student Administration (1)
- Student Life Cycle (1)
- Student Self-Service (1)
- Student-Centered Learning (1)
- Study Island (1)
- Study entrants (1)
- Sub-Saharan Africa (1)
- Submillimeter telescopes (1)
- Supervised learning (1)
- Supply Chain Management (1)
- Supply chains (1)
- Support Vector Machine (1)
- Surrogate Modeling (1)
- Surrogate Modelling (1)
- Surrogate models (1)
- Sustainable Agriculture (1)
- Sustainable Business Model Canvas (1)
- Sustainable Development Goals 2030 (1)
- Sustainable HCI (1)
- Sustainable development (1)
- Swim Stroke Analysis (1)
- Switched power electronic systems (1)
- Switches (1)
- Symmetry detector (1)
- Synthetic perception (1)
- SystemVerilog (1)
- TNT (1)
- TOC (1)
- TOF (1)
- Tactical Wireless Multi-hop Networks (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Tamper-Proof Hardware (1)
- Tampering (1)
- Task Frame Formalism (1)
- Taste (1)
- Taxi (1)
- Telecommunication network reliability (1)
- Telecommunication network routing (1)
- Telematik (1)
- Telematik-Software (1)
- Teleoperation (1)
- Template Attacks (1)
- Template attacks (1)
- Templates (1)
- Temporally-weighted (1)
- Testing (1)
- Testing Tool (1)
- Textual entailment (1)
- Textureless objects (1)
- Theory of Rooted Trees (1)
- Thin Client (1)
- Tiled displays (1)
- Tiled-display walls (1)
- Time measurement (1)
- Timing analysis (1)
- Timing channel (1)
- TinyECC 2.0 (1)
- ToF Camera (1)
- Token (1)
- Topology (1)
- Touchscreen interaction (1)
- Tourism Destination Development (1)
- Tourism Destination Management (1)
- Tourism education (1)
- Toyota HSR (1)
- Trace algebra (1)
- Tracking by detection (1)
- Traffic Simulations (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Approaches (1)
- Training Model (1)
- Training Optimization (1)
- Transfer learning (1)
- Transformers (1)
- Transforms (1)
- Transparency (1)
- Transponder (1)
- Transportation (1)
- Travel Mode Choice (1)
- Tree Stumps (1)
- Trusted Computing (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV (1)
- UAV teleoperation (1)
- UI design (1)
- UI-Dressing (1)
- URI (1)
- UUX-Praxis (1)
- Ubiquity (1)
- Ultrasonic array (1)
- Umfrage (1)
- Unattended Train Operation (1)
- Uncertainty (1)
- Unidirectional thermoplastic composites (1)
- Unifying theories (1)
- Unity (1)
- University IT Teaching (1)
- University–industry linkage (1)
- Unmanned Aerial Vehicle (UAV) (1)
- Unternehmen (1)
- Unternehmensnachfolge (1)
- Urban (1)
- Usable Security and Privacy (1)
- User Experience (1)
- User Requirements (1)
- User Roles (1)
- User Study (1)
- User research (1)
- User studies (1)
- User-Centered Approach (1)
- Users’ repair strategies (1)
- VR (1)
- VR system design (1)
- Value-Added Chain (1)
- Variability Management (1)
- Variability Resolution (1)
- Variational Autoencoder (1)
- Vector Intrinsics (1)
- Vegan (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicular Ad hoc Networks (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Verarbeitungsprozess (1)
- Verbesserungspotenzial (1)
- Verbraucherforschung (1)
- Verification systems (1)
- Verifizierung (1)
- Verilog (1)
- Verkehrsmittelwahl (1)
- Verpacken (1)
- Verpackungsmittel (1)
- Virtual Agents (1)
- Virtual Environments (1)
- Virtual attention (1)
- Virtual environments (1)
- Visual Arts (1)
- Visualization design and evaluation methods (1)
- Visualization systems and tools (1)
- Voice Assistants (1)
- Voice assistant (1)
- Voight-Kampff test (1)
- Volumenrendering (1)
- Vulkanisation (1)
- Vulnerable Groups (1)
- V˙CO2 prediction (1)
- V˙O2 prediction (1)
- W methods (1)
- W-Methods (1)
- WDS (1)
- WRF-Solar (1)
- WSN (1)
- WWW (1)
- Warnings (1)
- Water supply networks (1)
- Water supply systems (1)
- Watermarking (1)
- Web 2.0 (1)
- Web 3.0 (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Content Analysis (1)
- Web Data Mining (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Mining (1)
- Web Portal (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- Web components (1)
- Web-Tracking (1)
- WebSocket (1)
- Weitverkehrsnetz (1)
- Well-being (1)
- West Africa (1)
- Whole body motion (1)
- Wi-Fi (1)
- WiAFirm (1)
- WiFi (1)
- WiFi-based Long Distance (WiLD) (1)
- Wicked Problems (1)
- Wind Energy (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Wind Turbine (1)
- Wireless Backhaul Network (1)
- Wireless Sensor Network (1)
- Wireless back-haul (1)
- Wireless backhaul (1)
- Wireless sensor networks (1)
- Wissensaustausch (1)
- Word embedding (1)
- Workflow (1)
- Worm Hole (1)
- X-in-the-Loop (1)
- XAI (1)
- XGBoost (1)
- XML Security (1)
- XNA Game Studio (1)
- XR (1)
- XSLT (1)
- XSpRES (1)
- Xeon Phi knights landing (1)
- YANG (1)
- YOLO (1)
- Youth Employability (1)
- ZigBee (1)
- ZombieLoad (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- accessibility information and communication technology (1)
- accretion disks (1)
- action unit recognition (1)
- activation function (1)
- adaptive agents (1)
- adaptive binarization (1)
- adaptive filters (1)
- adl (1)
- adoption (1)
- aerodynamics (1)
- affective computing (1)
- aluminum (1)
- ambiguity (1)
- ambulatory monitoring (1)
- analyses (1)
- analytical redundancy relations (1)
- annotation (1)
- anomaly detection (1)
- antenna array correlation (1)
- antimicrobial (1)
- app (1)
- application software (1)
- applications (1)
- armature winding (1)
- artifacts (1)
- artificial neural network (1)
- artificial neural networks (1)
- asset transfer (1)
- atmosphere (1)
- atomic instructions (1)
- attacks (1)
- attitude-behaviour-gap (1)
- audio-tactile feedback (1)
- augmented reality (1)
- augmented, and virtual realities (1)
- authoring (1)
- automation (1)
- autonomous driving (1)
- autonomous sensor system (1)
- autonomous systems (1)
- auxiliary power supply (1)
- background motion (1)
- bagging (1)
- bass-shaker (1)
- battery (1)
- battery charging (1)
- behavioural economics (1)
- bicycle (1)
- biodegradable (1)
- biological object (1)
- biorder (1)
- bloat (1)
- body-centric cues (1)
- bolometers (1)
- boost converter (1)
- brain computer interfaces (1)
- breakdowns (1)
- brightfield microscopy (1)
- brushless motors (1)
- brute force algorithm (1)
- brute force methods (1)
- bus load (1)
- business management principles (1)
- caching (1)
- calculations modeling (1)
- calculations modelling (1)
- camera-based person detection (1)
- can bus (1)
- cancer cells detection (1)
- capillary compression test (1)
- capture and storage (1)
- car sharing (1)
- carbon dioxide (1)
- carbon footprint (1)
- carsharing (1)
- case study (1)
- cause and effect table (1)
- cellular automata (1)
- ceramic (1)
- change management (1)
- channel sounding (1)
- chemical sensors (1)
- citizen participation (1)
- cityplanning (1)
- civil society (1)
- classroom interaction (1)
- client-side component model (1)
- co-located collaboration (1)
- cognitive agents (1)
- collaboration (1)
- collaborative learning (1)
- colorimetry (1)
- commuting (1)
- compensation (1)
- complex problems (1)
- component analyses (1)
- component based (1)
- components (1)
- computational causalities (1)
- computational logic (1)
- computer games (1)
- computer system (1)
- computer-supported collaborative learning (1)
- computer-supported collaborative work (1)
- conceptual framework (1)
- condition monitoring (1)
- connected car (1)
- consumer decision models (1)
- consumer informatics (1)
- consumer research (1)
- control (1)
- cooperation (1)
- cooperative path planning (1)
- cooperative sensing (1)
- coordinated charging (1)
- correlation (1)
- crack growth (1)
- crawling (1)
- creativity (1)
- crisis exercise (1)
- critical consumerism (1)
- cross-disciplinary (1)
- cross-evaluation (1)
- cryogenics (1)
- cryptocurrency (1)
- cryptographic apis (1)
- cuSPARSE (1)
- cultural diversity (1)
- culture of failure (1)
- culture of participation (1)
- curing behavior (1)
- current limiting (1)
- data literacy (1)
- data locality (1)
- data logging (1)
- data science (1)
- data science canvas (1)
- data visualisation (1)
- database systems (1)
- decision support system (1)
- decision tree learning (1)
- deep learning (1)
- delivery (1)
- dementia (1)
- demographic transition (1)
- dependable robots (1)
- depth perception (1)
- design science research (1)
- designer drugs (1)
- developed market (1)
- developer console (1)
- development (1)
- diagnostic bond graphs (1)
- didactical method mix (1)
- dielectric analysis (1)
- differential-algebraic equations (1)
- digital co-creation (1)
- digital control system (1)
- digital fabrication (1)
- digital images (1)
- digital platform ecosystem (1)
- digital receipt (1)
- digital storytelling (1)
- digitale internationale Kooperation (1)
- dimensionality reduction (1)
- direct feedback (1)
- directed hypergraphs (1)
- directional antennas (1)
- disabled people (1)
- distributed authoring (1)
- distributed processing (1)
- distributed systems (1)
- diversity (1)
- doctoral students (1)
- draw ratio (1)
- drivers (1)
- driving (1)
- drone (1)
- drone video quality (1)
- drug detection (1)
- dynamic econometric forecasting models (1)
- dynamic experiment (1)
- dynamic programming (1)
- dynamic vector fields (1)
- e-learning course structure (1)
- ease (1)
- echo state network (1)
- eco-driving (1)
- economic culture (1)
- economic sector (1)
- educational methods (1)
- educational psychology (1)
- einheitliches Internet-Übertragungsprotokoll (1)
- electrical devices (1)
- electrical engineering education (1)
- electromagnetic wave polarisation (1)
- electronics (1)
- embedded collaborative learning (1)
- embodied interfaces (1)
- embroidery machine (1)
- emerging market (1)
- emerging markets (1)
- emotion computing (1)
- employability (1)
- encoding, representation (1)
- end-to-end security (1)
- energy awareness (1)
- energy detection (1)
- energy efficiency (1)
- energy efficient transportation (1)
- energy feedback (1)
- energy optimal driving (1)
- energy saving (1)
- engage exchange model (1)
- engineering (1)
- engineering education (1)
- ensorless control (1)
- entrepreneurial interest (1)
- entrepreneurship development (1)
- entrepreneurship education (1)
- environmental and social impact (1)
- environmental impact analysis (1)
- erp4students (1)
- ethical values (1)
- ethics (1)
- evaluation board development (1)
- evolution strategies (1)
- evolutionary development (1)
- evolutionary illumination (1)
- evolved neural network controller (1)
- evolving look ahead controllers (1)
- exergame (1)
- exergames (1)
- explainable AI (1)
- explainable gesture recognition (1)
- exploration (1)
- explosives detection (1)
- export (1)
- extrusion blow molding (1)
- eye-tracking (1)
- facial emotion recognition (1)
- facial expression analysis (1)
- factor load (1)
- failure (1)
- farmer trainings (1)
- fault ride through (1)
- faults in robotics (1)
- feature (1)
- field study (1)
- finite element model (1)
- first-semester students (1)
- first-year teaching (1)
- five-factor model (1)
- flight zone (1)
- flow direction (1)
- focus groups (1)
- food consumption (1)
- food losses (1)
- food systems (1)
- forecast (1)
- forms of mathematical models (1)
- foveated rendering (1)
- fpga (1)
- fracture mechanic (1)
- fracture toughness (1)
- fruits, vegetables and potatoes (1)
- full-body interface (1)
- fully superconducting (1)
- fusion centre (1)
- fuzzy logic (1)
- game design (1)
- game engine (1)
- gamification (1)
- gaming (1)
- gas lasers (1)
- generation of ARRs (1)
- generative design (1)
- generator (1)
- geofence (1)
- global perspective (1)
- globally convergent solvers (1)
- gold (1)
- graphics processing units (1)
- graphs (1)
- grass-based pulp (1)
- guidance (1)
- hand guidance (1)
- hands-on experiences (1)
- hands-on lab (1)
- hands-on labs (1)
- haptic feedback (1)
- hardware engineering (1)
- harmonic generation (1)
- harmonic generation including higher-order harmonic generation (1)
- headways optimisation (1)
- healthcare (1)
- heat shrink tubes (1)
- heterogeneous networks (1)
- heuristics (1)
- hierarchical clustering (1)
- holistic learning (1)
- holography (1)
- homo oeconomicus (1)
- human-centric lighting (1)
- human-robot collaboration (1)
- hypermedia applications (1)
- iOER (1)
- ideal switches (1)
- ideation (1)
- image processing (1)
- image sequence processing (1)
- immersion (1)
- immersive systems (1)
- implementation (1)
- in-campus internships (1)
- in-home charging (1)
- incremental bond graphs (1)
- indentation (1)
- industrial robots (1)
- industry forces (1)
- information display methods (1)
- information parameter (1)
- information sharing (1)
- injection moulding (1)
- innovation (1)
- innovative work behavior (1)
- input-series output-parallel (1)
- insect protection (1)
- instructional supervisor (1)
- integration governance (1)
- intelligent pedestrian counter (1)
- interaction (1)
- interaction techniques (1)
- interactive distributed rendering (1)
- interactive-learning (1)
- intercultural comparisons (1)
- intercultural learning (1)
- intercultural management (1)
- interdisciplinarity (1)
- interdisciplinary projects (1)
- interdisciplinary virtual exchange (1)
- interference (1)
- interferometric instruments (1)
- interferometry (1)
- international (1)
- international entrepreneurship (1)
- international teams (1)
- internationalization-at-home (1)
- internships (1)
- intrinsics (1)
- inverse model (1)
- inverse parameter identification (1)
- ion viscosity (1)
- isolated DC-transformer (1)
- isothermal (1)
- issue tracker (1)
- job and wealth creation (1)
- knowledge engineering (1)
- knowledge graphs (1)
- knowledge management (1)
- knowledge-management (1)
- land use (1)
- language (1)
- language teaching (1)
- large classrooms (1)
- largescale parameter (1)
- laser diodes (1)
- leaning (1)
- leaning, self-motion perception (1)
- leapfrog (1)
- learning environment (1)
- learning experience (1)
- learning from failure (1)
- learning object repositories (1)
- learning-based fault detection and diagnosis (1)
- life-long learning (1)
- lifetime (1)
- light curtains (1)
- linguistic variable (1)
- linguistic variables (1)
- link calibration (1)
- link optimization (1)
- link quality (1)
- linkage strategy (1)
- literature manual curation (1)
- local material properties (1)
- logistics (1)
- lokales Netz (1)
- long-distance 802.11 (1)
- low detection limits (1)
- low-power design (1)
- mMIMO (1)
- maker communities (1)
- maximum power point tracker (1)
- measurement (1)
- measurements (1)
- mechatronic systems (1)
- medical training (1)
- medium voltage direct current (MVDC) (1)
- medium voltage insulation (1)
- melting heater (1)
- memories (1)
- memory bandwidth (1)
- mesoscopic agents (1)
- metadata (1)
- methodical limits of LCA (1)
- micro chevron (1)
- micro compression test (1)
- microcomputers (1)
- microcontroller education (1)
- microcontrollers (1)
- microwave propagation (1)
- mininig software repositories (1)
- mixed methods (1)
- mixed reality (1)
- mobile Explosivstoffdetektion (1)
- mobile or handheld device (1)
- mobile projection (1)
- mobile robots (1)
- mobile web (1)
- mobility intelligence (1)
- mode switching LTI models (1)
- modelling (1)
- modular reduction (1)
- modular web (1)
- mold temperature (1)
- momentary frequency (1)
- monitoring (1)
- morphological operator (1)
- motion control (1)
- motion cueing (1)
- motion platform (1)
- motion trajectory enhancement (1)
- motivating first year students (1)
- motivation of first year students (1)
- motor drive (1)
- multi causal strain (1)
- multi robot systems (1)
- multi-disciplinary approach (1)
- multi-layer display (1)
- multi-screen visualization environments (1)
- multi-user VR (1)
- multibody systems (1)
- multidisciplinary (1)
- multiple Xbox 360 (1)
- multiple computer systems (1)
- multiresolution analysis (1)
- multisensor data fusion (1)
- multisensory cues (1)
- multisensory interface (1)
- municipality (1)
- naive physics (1)
- natural user interface (1)
- nature-protected areas (1)
- near-infrared (1)
- neural-networks (1)
- neuroevolution (1)
- new business start-ups (1)
- noise suppression (1)
- nomadic text entry (1)
- nonlinear storytelling (1)
- normgerechte Entwicklung (1)
- nostalgia (1)
- object identification (1)
- object-oriented physical systems modelling (1)
- online collaboration (1)
- open educational resources (OERs) (1)
- optical safeguard sensor (1)
- optimal control (1)
- optimal control problem (1)
- optimisation of control system (1)
- optimization of telecommunications systems (1)
- oral history (1)
- organic food (1)
- other holographic techniques (1)
- other low-temperature equipment (1)
- outbreak management (1)
- ozonation (1)
- ozone (1)
- pain recognition (1)
- parallel BFS (1)
- parallel breadth-first search (1)
- parallel computing (1)
- parallel difference visualization (1)
- parameter sensitivities of residuals of ARRs (1)
- parametric (1)
- partial-shaded photovoltaic (1)
- participation (1)
- payment protocol (1)
- pedestrian counting system (1)
- pedestrian movements (1)
- peer-assisted learning (1)
- pen interaction (1)
- performance and training (1)
- performance optimizations (1)
- peripheral vision (1)
- peripheral visual field (1)
- permanent magnet brushless dc motors (1)
- permanent magnet motors (1)
- permanent magnet synchronous generator (PMSG) (1)
- perpendicular (1)
- persistent surveillance (1)
- personal orientation (1)
- personality traits (1)
- personalized behaviour model (1)
- phase angle jump (1)
- photometry (1)
- photovoltaic (1)
- photovoltaic system (1)
- physical activity (1)
- physical model immersive (1)
- physiological monitoring (1)
- pipeline transport (1)
- plant-based and animal-derived organic products (1)
- plastic industry (1)
- plug-in electric vehicle (1)
- power converter (1)
- practical learning (1)
- practical skills (1)
- practitioners (1)
- preprocessing (1)
- primäre Explosivstoffe (1)
- problem based learning (1)
- process model (1)
- professors as mentors (1)
- professors as tutors (1)
- programming (1)
- project management (1)
- project passed learning (1)
- projection (1)
- promotion of organic agriculture (1)
- property-based testing for robots (1)
- prospects and challenges (1)
- prosumption (1)
- prototype theory (1)
- proxemics (1)
- pseudo-random number generator (1)
- qualitative empirical research (1)
- qualitative research methods (1)
- quality of life (1)
- quality-diversity (1)
- question answering (1)
- questionnaire (1)
- quiz formats (1)
- quizzes (1)
- radio transceivers (1)
- radiowave propagation (1)
- rate adaptation (1)
- rate of change of frequency (1)
- reCAPTCHA (1)
- reaction kinetics (1)
- rebound effects (1)
- recommender systems (1)
- recurrent neural network function (1)
- recycling (1)
- redundant work (1)
- reference dataset (1)
- reference model (1)
- refrigerators low-temperature detectors (1)
- regional economies (1)
- regional food production (1)
- regression (1)
- reinforcement learning (1)
- relatives (1)
- relevance assessment (1)
- remembering (1)
- remote diagnosis (1)
- remote sensing (1)
- remote-controlled robots (1)
- remote-lab (1)
- rendering (computer graphics) (1)
- renewable energy (1)
- reproducible node motion (1)
- requirements (1)
- requirements analysis (1)
- requirements management (1)
- residual sinks (1)
- resin for 3D-printing (1)
- resource efficiency (1)
- resource utilization (1)
- responsible consumer (1)
- reverse innovation (1)
- risk communication (1)
- risk taking (1)
- robot action diagnosability (1)
- robot component monitoring (1)
- robot dynamics (1)
- robot execution failures (1)
- robot kinematics (1)
- robotic black box (1)
- robots (1)
- routing metrics (1)
- rules (1)
- rural areas (1)
- safety-related parts of control systems (1)
- scene element representation (1)
- screening (1)
- screens (display) (1)
- security warning design (1)
- see-through display (1)
- see-through head-mounted displays (1)
- self-assessment (1)
- self-configuration (1)
- self-learning exercises (1)
- self-management (1)
- semantic image seg-mentation (1)
- semi-supervised learning (1)
- sensitivity of point forecast (1)
- sensor data acquisition (1)
- sensor data transmission (1)
- sensor systems (1)
- sensor-based fault detection and diagnosis (1)
- sentiment analysis (1)
- service activities (1)
- service robots (1)
- shared mobility (1)
- sharing (1)
- shielding equipment (1)
- short-term memory (1)
- sicherheitsgerichtete Speichersteuerung (1)
- sicherheitsrelevante SPS-Software (1)
- signature (1)
- simulation-based robot testing (1)
- simulator (1)
- skin detection (1)
- small and medium enterprises (1)
- small-group collaboration (1)
- smart agriculture (1)
- smart heating system (1)
- smart meter (1)
- smartcard (1)
- social empirical research (1)
- social interactions (1)
- social media analysis (1)
- social modelling (1)
- social robots (1)
- social support (1)
- socio economic impact (1)
- software development (1)
- software-based feedback agents (1)
- speaking (1)
- spectral rendering (1)
- spectrum scan (1)
- speech emotion recognition (1)
- speech recognition (1)
- speech understanding (1)
- speicherprogrammierte Steuerung (1)
- stakeholder analysis (1)
- stakeholder communication (1)
- state constraints (1)
- state of charge (1)
- stellar radiation (1)
- story authoring (1)
- storytelling (1)
- strain (1)
- stress (1)
- stress detection (1)
- structural equation modeling (1)
- student activating approaches (1)
- submillimeter precision (1)
- superconductor (1)
- supernovae (1)
- supply chain management (1)
- support agencies (1)
- support vector machine (1)
- surface textures (1)
- surface topography (1)
- survival (1)
- sustainable development (1)
- sustainable food systems (1)
- sustainable transition (1)
- switching transitions (1)
- switching-mode power supply (1)
- synchronous generator (1)
- synchronous online & hybrid teaching (1)
- synthetic dataset (1)
- systematic review (1)
- teaching (1)
- teaching topics (1)
- technological literacy (1)
- technological platform (1)
- technology (1)
- telepresence (1)
- temperature controller (1)
- territoriality (1)
- text entry in motion (1)
- text mining (1)
- textbooks (1)
- textile and apparel industry (1)
- thermal comfort modelling (1)
- throughput maximization (1)
- tiled displays (1)
- time series processing (1)
- topological reduction (1)
- tor position (1)
- touchscreen (1)
- traffic surveillance (1)
- transaction costs (1)
- transfer learning (1)
- transport systems (1)
- travel mode choice (1)
- true random number generator (1)
- ultrapure water (1)
- ultrasonic sensor (1)
- un-manned aerial vehicle (1)
- unexpected situations (1)
- unique bond graph representation for all modes of operation (1)
- universal design (1)
- university of applied sciences (1)
- university performance (1)
- unmanned ground vehicle (1)
- unstructured data (1)
- urban food strategy (1)
- urban food supply (1)
- urban green spaces (1)
- usable privacy (1)
- usable secure email (1)
- usage contexts (1)
- usage data analysis (1)
- user acceptance (1)
- user documentation (1)
- user engagement (1)
- user interface (1)
- user interface design (1)
- user-centered AI (1)
- values (1)
- vection (1)
- verification and validation of robot action execution (1)
- verteiltes System (1)
- vibration (1)
- vibration energy (1)
- video (1)
- videos (1)
- virtual environment framework (1)
- virtual international mobility (1)
- virtual locomotion (1)
- virtual or soft keyboard (1)
- virtual reality, XR (1)
- virtual-reality (1)
- virtuelle und hybride Mobilität (1)
- visual quality control (1)
- visualisation (1)
- visuohaptic feedback (1)
- voice interaction (1)
- walking (1)
- wavelength (1)
- wearable photovoltaic system (1)
- web (1)
- web components (1)
- web technology (1)
- web-conferencing (1)
- website (1)
- welfare technology (1)
- whole-body interface (1)
- wind energy conversion systems (WECS) (1)
- wireless back-haul (1)
- wireless networks’ topology (1)
- wireless performance (1)
- wireless sensors (1)
- wmSDN (1)
- workspace awareness (1)
- writing (1)
- xorshift-generator (1)
- youBot (1)
- zero-voltage switching (ZVS) (1)
- zooming interface (1)
- Übertragungsqualität (1)
- “Big Four” agenda (1)
Sprachassistenten wie Alexa oder Google Assistant sind aus dem Alltag vieler VerbraucherInnen nicht mehr wegzudenken. Sie überzeugen insbesondere durch die sprachbasierte und somit freihändige Steuerung und mitunter auch den unterhaltsamen Charakter. Als häuslicher Lebensmittelpunkt sind die häufigsten Aufstellungsorte das Wohnzimmer und die Küche, da sich Haushaltsmitglieder dort die meiste Zeit aufhalten und das alltägliche Leben abspielt. Dies bedeutet allerdings ebenso, dass an diesen Orten potenziell viele Daten erfasst und gesammelt werden können, die nicht für den Sprachassistenten bestimmt sind. Demzufolge ist nicht auszuschließen, dass der Sprachassistent – wenn auch versehentlich – durch Gespräche oder Geräusche aktiviert wird und Aufnahmen speichert, selbst wenn eine Aktivierung unbewusst von Anwesenden bzw. von anderen Geräten (z. B. Fernseher) erfolgt oder aus anderen Räumen kommt. Im Rahmen eines Forschungsprojekts haben wir dazu NutzerInnen über Ihre Nutzungs- und Aufstellungspraktiken der Sprachassistenten befragt und zudem einen Prototyp getestet, der die gespeicherten Interaktionen mit dem Sprachassistenten sichtbar macht. Dieser Beitrag präsentiert basierend auf den Erkenntnissen aus den Interviews und abgeleiteten Leitfäden aus den darauffolgenden Nutzungstests des Prototyps eine Anwendung zur Beantragung und Visualisierung der Interaktionsdaten mit dem Sprachassistenten. Diese ermöglicht es, Interaktionen und die damit zusammenhängende Situation darzustellen, indem sie zu jeder Interaktion die Zeit, das verwendete Gerät sowie den Befehl wiedergibt und unerwartete Verhaltensweisen wie die versehentliche oder falsche Aktivierung sichtbar macht. Dadurch möchten wir VerbraucherInnen für die Fehleranfälligkeit dieser Geräte sensibilisieren und einen selbstbestimmteren und sichereren Umgang ermöglichen.
Diese Arbeit präsentiert eine Methode zur zuverlässigen Personendetektion für die Absicherung des Arbeitsbereichs von Industrierobotern. Hierzu wird ein im Nahinfrarotbereich (NIR) arbeitendes aktives Kamerasystem eingesetzt, das durch erweiterte und robuste Hauterkennungseigenschaften besonders dazu geeignet ist, zwischen verschiedensten Materialoberflächen und menschlicher Haut zu unterscheiden. So soll zum einen die Erkennungsleistung gegenüber handelsüblichen, im visuellen Bereich arbeitenden RGB-Kamerasystemen gesteigert werden und gleichzeitig eine „intelligente“ Form des Mutings realisiert werden. Die im Rahmen des Projekts „Sichere Personendetektion im Arbeitsbereich von Industrierobotern durch ein aktives NIR-Kamerasystem (SPAI)“ entwickelte und hier vorgestellte Methode erreicht in einer ersten Variante eine pixelweise Personenerkennungsrate von ca. 98,16%.
Die Anforderungen an die Tragfähigkeit von Seilrollen aus Guss-Polyamiden nehmen aufgrund der Erwartungen hinsichtlich der maximal zu realisierenden Hublasten bei neueren Förder- und Hebegeräte stetig zu. Die heutige Konstruktionspraxis erlaubt für normale Betriebsbedingungen eine gesicherte Auslegung der Seilrollen. Aus jahrelanger Erfahrung sind hierfür Grenzwerte für maximal zulässigen Belastungen im Betrieb unter verschiedensten Betriebsbedingungen gewonnen worden. Jedoch ist bei steigenden Lasten, besserer Ausnutzung des Werkstoffpotenzials oder Modifikationen des Basiswerkstoffs nur noch eine eingeschränkte Bestimmung der tatsächlichen "Worst-Case"-Tragfähigkeit mit dieser Konstruktionspraxis möglich. Berechnungsmodelle einer neuen Bemessungsgrundlage basieren auf der Anwendung der Finite Elemente Methode. Die ersten Berechnungsmodelle aus der modifizierten Bemessungsgrundlage ermöglichen den Einfluss von geometrischen Änderungen der Form bzw. der Ausführung, von lokalen Materialeigenschaften und von realistischere Lastzustände auf den Deformationsund Spannungszustand einer Seilrolle theoretisch zu beschreiben. Weitere Berechnungsmodelle, die z.B. die Erwärmung der Seilrolle durch die Rollreibung zwischen Seil und Seilrolle sowie des Walkens durch die Bewegung des Seiles bei dynamischer Belastung beschreiben können, sind in der Entwicklung. Für den Konstrukteur werden zudem parametrisierte Geometrie-, Last- und FE-Modelle entwickelt, die eine schnelle und betriebssichere Dimensionierung von Seilrollen aus Guss-Polyamiden ermöglichen. Alle theoretischen Ergebnisse werden z.Z. durch umfangreiche Versuche abgesichert.
Zuverlässige Ad-Hoc Kommunikation mobiler Endgeräte mit satellitengestützter Internet-Anbindung
(2005)
Mobile Datenkommunikation basiert üblicherweise auf der drahtlosen Anbindung eines Endgerätes an eine Basisstation, die ihrerseits an eine feste Infrastruktur angebunden ist. In vielen Szenarien sind diese Voraussetzungen jedoch nicht gegeben. Beispiele hierfür sind Hochwasser, Erdbeben oder Flugzeugabstürze in dünn besiedelten Regionen. Einen Lösungsansatz für sich daraus ergebende Anforderungen bieten dynamisch aufgebaute Ad-Hoc Netze mit einer satellitengestützten Anbindung an eine Festnetz-Infrastruktur. In solchen Netzen stellen die mobilen Terminals die benötigte lokale Infrastruktur selbst dynamisch her. Ziel der hier vorgestellten Arbeiten ist es, die Zuverlässigkeit und Dienstqualität der verwendeten Technologien zu untersuchen und durch geeignete Mechanismen so anzupassen, dass die Anforderungen typischer Applikationen möglichst erfüllt werden. Zur Demonstration wurde ein Prototyp aufgebaut, der unter anderem die Anwendungen "Voice over IP" (VoIP), "Datenbankzugriff im Intranet" und Internetzugang (WWW) untersucht.
Durch die Nutzung von Qualitätsindikatoren für die Zuweisungssteuerung ge-winnt das interne QM eine zentrale Bedeutung für die Zukunftssicherung der Einrichtungen. Zusätzlich untermauert wird dies durch den strukturierten Qualitätsdialog (DRV Bund 2017), der durch eine stärkere Fokussierung auf diese Qualitätsindikatoren Revisionscharakter und zugleich Anreizfunktion für die Rehabilitationseinrichtungen hat. Vor diesem Hintergrund stellt sich für die Einrichtungen die Frage, wie geeignete interne Qualitätskennzahlen genutzt werden können, um Verbesserungsprozesse so frühzeitig zu initiieren, dass die externen Qualitätskennzahlen positiv ausfallen.
Neben der Verbesserung des Gesundheitszustandes sind der Erhalt der Beschäftigungsfähigkeit und die berufliche (Wieder-)Eingliederung zentrale Ziele der Rehabilitationsleistungen der Deutschen Rentenversicherung. In der „Reha-QM-Outcome-Studie“ wurden sowohl mittels Patientenfragebogen Angaben zum subjektiven Nutzen der Behandlung als auch mittels Routinedaten der Rentenversicherung Angaben zum Erwerbsstatus erhoben, so dass eine Gegenüberstellung beider Zieldimensionen erfolgen kann.
Neben der Verbesserung des Gesundheitszustandes sind der Erhalt der Beschäftigungsfähigkeit und die berufliche (Wieder-)Eingliederung zentrale Ziele der Rehabilitationsleistungen der Deutschen Rentenversicherung. In der „Reha-QM-Outcome-Studie“ wurden sowohl mittels Patientenfragebogen Angaben zum subjektiven Nutzen der Behandlung als auch mittels Routinedaten der Rentenversicherung Angaben zum Erwerbsstatus bzw. zur Berentung erhoben, so dass eine Gegenüberstellung beider Zieldimensionen erfolgen kann.
Zumutbarkeit von Arbeit
(1994)
In der Ergebnisdarstellung der Reha-QM-Outcome Studie der DRV Baden-Württemberg und des Qualitätsverbunds Gesundheit konnte gezeigt werden, dass Kliniken eines Verbundes, die ein gemeinsames, auf aktivem Benchmarking und Von-Einander-Lernen gegründetes Qualitätsmanagement (Basis QMS Reha®) anwenden, ein Jahr nach der Reha etwas bessere Ergebnisse in relevanten Outcome-Parametern (u. a. subjektiver Reha-Nutzen, geleistete Rentenversicherungsbeiträge) erzielen als der Durchschnitt der Kliniken (Toepler et al., 2015). Der vorliegende Beitrag stellt die verbundinterne Analyse der Studienergebnisse dar und geht der Frage nach, welche QM-Elemente einen positiven Einfluss auf die Outcome-Parameter ausüben.
Die Detektion von Explosivstoffen stellt ein zentrales Feld der zivilen Sicherheitsforschung dar. Eine besondere Herausforderung liegt hierbei in dem Nachweis verpackter Substanzen, wie es bei Unkonventionellen Spreng- und Brandvorrichtung (USBV) häufig der Fall ist. Derzeit eingesetzte Verfahren arbeiten meist mit bildgebenden Techniken, durch die sich ein Anfangsverdacht ergibt. Der tatsächliche chemische Inhalt der USBV lässt sich jedoch nicht exakt ermitteln. Eine genaue Beurteilung der Gefährdung durch solche Substanzen ist allerdings von großer Bedeutung, insbesondere wenn die Entschärfung des Objekts in bewohntem Gebiet stattfinden muss. In der vorliegenden Arbeit wird ein Verfahren vorgestellt, das sich als Verifikationsverfahren bei bestehendem Anfangsverdacht gezielt einsetzen lässt. Hierzu wird mittels Laserbohrtechnik zunächst die äußere Hülle des zu untersuchenden Gegenstandes durchdrungen. Anschließend finden eine lasergestützte Probenahme des Inhalts sowie die Detektion unter Verwendung geeigneter Analysemöglichkeiten statt. Der Bohr- und Probenahmefortschritt wird über verschiedene spektroskopische und sensorische Verfahren begleitend überwacht. Zukünftig soll das System abstandsfähig auf Entschärfungsrobotern eingesetzt werden.
Along with the success of the digitally revived stereoscopic cinema, other events beyond 3D movies become attractive for movie theater operators, i.e. interactive 3D games. In this paper, we present a case that explores possible challenges and solutions for interactive 3D games to be played by a movie theater audience. We analyze the setting and showcase current issues related to lighting and interaction. Our second focus is to provide gameplay mechanics that make special use of stereoscopy, especially depth-based game design. Based on these results, we present YouDash3D, a game prototype that explores public stereoscopic gameplay in a reduced kiosk setup. It features live 3D HD video stream of a professional stereo camera rig rendered in a real-time game scene. We use the effect to place the stereoscopic effigies of players into the digital game. The game showcases how stereoscopic vision can provide for a novel depth-based game mechanic. Projected trigger zones and distributed clusters of the audience video allow for easy adaptation to larger audiences and 3D movie theater gaming.
XML Encryption and XML Signature are fundamental security standards forming the core for many applications which require to process XML-based data. Due to the increased usage of XML in distributed systems and platforms such as in SOA and Cloud settings, the demand for robust and effective security mechanisms increased as well. Recent research work discovered, however, substantial vulnerabilities in these standards as well as in the vast majority of the available implementations. Amongst them, the so-called XML Signature Wrapping attack belongs to the most relevant ones. With the many possible instances of this attack type, it is feasible to annul security systems relying on XML Signature and to gain access to protected resources as has been successfully demonstrated lately for various Cloud infrastructures and services. This paper contributes a comprehensive approach to robust and effective XML Signatures for SOAP-based Web Services. An architecture is proposed, which integrates the r equired enhancements to ensure a fail-safe and robust signature generation and verification. Following this architecture, a hardened XML Signature library has been implemented. The obtained evaluation results show that the developed concept and library provide the targeted robustness against all kinds of known XML Signature Wrapping attacks. Furthermore the empirical results underline, that these security merits are obtained at low efficiency and performance costs as well as remain compliant with the underlying standards.
In this paper, we present XPERSim, a 3D simulator built on top of open source components that enables users to quickly and easily construct an accurate and photo-realistic simulation for robots of arbitrary morphology and their environments. While many existing robot simulators provide a good dynamics simulation, they often lack the high quality visualization that is now possible with general-purpose hardware. XPERSim achieves such visualization by using the Object-Oriented Graphics Rendering Engine 3D (Ogre) engine to render the simulation whose dynamics are calculated using the Open Dynamics Engine (ODE). Through XPERSim’s integration into a component-based software integration framework used for robotic learning by experimentation, XPERSIF, and the use of the scene-oriented nature of the Ogre engine, the simulation is distributed to numerous users that include researchers and robotic components, thus enabling simultaneous, quasi-realtime observation of the multiple-camera simulations.
XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case study. In doing so, we highlight several deficiencies in defending against XSW. Using this real-world contemporary example as motivation, we introduce a guideline for more secure XML signature processing that provides practitioners with easier access to the effective countermeasures identified in the current state of research.
This paper describes a codesign environment based on the WWW (World Wide Web) and its implementation. Tool invocations and their respective results are linked using hypertext documents. We show how to configure a WWW browser for spawning design tools and how frequent tasks like documentation generation and retrieval are facilitated. The design flow can be adopted to the given application very easily. In addition we introduce the concept of a work flow called ‘design by documentation’. A WWW link to the results is given and experience using it in a codesign project is described.
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
The paper presents a new control strategy of management of transport companies operating in completive transport environment. It is aimed to optimise the headway of transport companies to provide the balance between costs and benefits of operation under competition. The model of transport system build using AnyLogic comprises agent-based and discrete-event techniques. The model combined two transport companies was investigated under condition of the competition between them. It was demonstrated that the control strategy can ensure the balance of interests of transport companies trying to find compromise between cost of operation and quality of service.
Work in progress: Starter-project for first semester students to survey their engineering studies
(2015)
Wissenschaftliches Rechnen
(1999)
In this contribution, we describe the activities and promotion programs installed at the Bonn-Rhein-Sieg University as an institution and at the Department of Computer Science respectively for increasing the total number of computer science students and in particular the female rate. We report about our experiences in addressing gender aspects in education and try to evaluate the outcome of our programs with respect to our equal rights for women strategy. We propose a closer look at mental self-theories enabled by E-portfolios to address also gender issues in Computer Science. Moreover, reasons are identified and discussed which may be responsible for the reduced interest in particular of female young adults to choose a computer science study program.
In education, finding the appropriate learning pace that fits to the members of a large group is a challenging task. This becomes especially evident when teaching multidisciplinary subjects such as epidemiology in medicine or computer science in most study programs, since lecturers have to face a very heterogeneous state of previous knowledge. Approaching this issue requires an individual supervision of each and every student, which is obviously bounded by the available resources. Moreover, when referring back to the second example, writing computer programs requires a complex installation and configuration of development tools. Many beginning programmers already become stuck at this entry stage. This paper introduces WHELP, a Web-based Holistic E-Learning Platform, which provides an integrated environment enabling the learning and teaching of computer science topics without the need to install any software. Moreover, WHELP includes an interactive feedback system for each programming exercise, where lecturers or tutors can supply comments, improvements, code assistance or tips helping the students to accomplish their tasks. Furthermore, WHELP offers a statistical analysis module as well as a real-time classroom polling system both promoting an overview of the state of knowledge of a course. In addition to that, WHELP enables collaborative working including code-sharing and peer-to-peer learning. This feature enables students to work on exercises simultaneously at distinct places. WHELP has been successfully deployed in the winter term 2013 at the Cologne University of Applied Sciences supporting the 120 students and 3 lecturers to learn and teach basic topics of computer science in an engineering study program.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users. To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
This paper aspires to develop a deeper understanding of the sharing/collaborative/platform economy, and in particular of the technical mechanisms upon which the digital platforms supporting it are built. In surveying the research literature, the paper identifies a gap between studies from economical, social or socio-technical angles, and presentations of detailed technical solutions. Most cases study larger, ‘monotechnological’ platforms, rather than local platforms that lend components from several technologies. Almost no literature takes a design perspective. Rooted in Sharing & Caring, an EU COST Action (network), the paper presents work to systematically map out functionalities across domains of the sharing economy. The 145 technical mechanisms we collected illustrate how most platforms are depending on a limited number of functionalities that lack in terms of holding communities together. The paper points to the necessity of a better terminology and concludes by discussing challenges and opportunities for the design of future and more inclusive platforms.
Smart home systems change the way we experience the home. While there are established research fields within HCI for visualizing specific use cases of a smart home, studies targeting user demands on visualizations spanning across multiple use cases are rare. Especially, individual data-related demands pose a challenge for usable visualizations. To investigate potentials of an end-user development (EUD) approach for flexibly supporting such demands, we developed a smart home system featuring both pre-defined visualizations and a visualization creation tool. To evaluate our concept, we installed our prototype in 12 households as part of a Living Lab study. Results are based on three interview studies, a design workshop and system log data. We identified eight overarching interests in home data and show how participants used pre-defined visualizations to get an overview and the creation tool to not only address specific use cases but also to answer questions by creating temporary visualizations.
Application systems are often advertised with features, and features are used heavily for requirements man- agement. However, often software manufacturers only have incomplete information about the features of their software. The information is distributed over different sources, such as requirements documents, issue trackers, user manuals, and code. In this paper, we research the occurrence of feature information in open source software engineering data. We report on a case study with three open source systems. We analyze what information about features can be found in issue trackers and user documentation. Furthermore, we study the abstraction levels on which the features are described, how feature information is related, and we discuss the possibility to discover such information semi-automatically. To mirror the diversity of software development contexts, we choose open source systems, which are quite different, e.g., in the rigor of issue tracker usage. The results differ accordingly. One main result is that the user documentation did not provide more accurate information than the issue tracker compared to a provided feature list. The results also give hints on how the management of feature relevant information can be supported.
In January 2015, German trade and industry announced to support the national animal welfare initiative "Initiative Tierwohl" (ITW) which stands for a more sustainable and animal-friendly meat production. A web content analysis shows that the ITW initiative has been widely picked up and discussed by online media and that user comments are quite heterogeneous. The current study identifies different types of consumers through factor and cluster analysis and is based on an online survey as well as face-to-face interviews. According to our results, the identified consumer groups demonstrate a rather passive comment behaviour on the internet. In fact, the internet was hardly mentioned as an information source for meat production; consumers more frequently referred to brochures, leaflets and personal contacts with sales personnel.
Web-based Editor for YAWL
(2013)
This paper presents a web-based editor that offers YAWL editing capabilities and comprehensive support for the XML format of YAWL. The open-source project Signavio Core Components is extended with a graphical user interface (GUI) for parts of the YAWL Language, and an import-/export component that converts between YAWL and the internal format of Signavio Core Components. This conversion, between the web-based editor and the offcial YAWL Editor, is lossless so both tools may be used together. Compared to the offcial YAWL Editor, the web-based editor is missing some features, but could still facilitate the usage of the YAWL system in use cases that are not supported by a desktop application.
Although much effort is made to prevent risks arising from food, food-borne diseases are an ever present-threat to the consumers’ health. The consumption of fresh food that is contaminated with pathogens like fungi, viruses or bacteria can cause food poisoning that leads to severe health damages or even death. The outbreak of Shiga Toxin-producing enterohemorrhagic E. coli (EHEC) in Germany and neighbouring countries in 2011 has shown this dramatically. Nearly 4.000 people were reported of being affected and more than 50 people died during the so called EHEC-crisis. As a result the consumers’ trust in the safety of fruits and vegetables decreased sharply.
Software development is a complex task. Merely focussing on functional requirements is not sufficient any more. Developers are responsible to take many non-functional requirements carefully into account. Security is amongst the most challenging, as getting it wrong will result in a large user-base being potentially at risk. A similar situation exists for administrators. Security defaults have been put into place here to encounter lacking security controls. As first attempts to establish security by default in software development are flourishing, the question on their usability for developers arises.
In this paper we study the effectiveness and efficiency of Content Security Policy (CSP) enforced as security default in a web framework. When deployed correctly, CSP is a valid protection mean in a defence-in-depth strategy against code injection attacks. In this paper we present a first qualitative laboratory study with 30 participants to discover how developers deal with CSP when deployed as security default. Our results emphasize that the deployment as security default has its benefits but requires careful consideration of a comprehensive information flow in order to improve and not weaken security. We provide first insights to inform research about aiding developers in the creation of secure web applications with usable security by default.
Von Spechten, Regentropfen und Herzschlägen: Vergleichende Frequenzanalyse periodischer Signale
(2017)
Nahezu jede Einleitung allgemeinverständlicher Publikationen zur Herzratenvariabilität beginnt mit dem Wang Shu-He zugeschriebenen Zitat: "Wenn das Herz so regelmäßig wie das Klopfen eines Spechtes oder das Tröpfeln des Regens auf dem Dach wird, wird der Patient innerhalb von 4 Tagen sterben". Trotz der häufigen Verwendung dieses Zitats sind keine vergleichenden Analysen von Herzratenvariabilität, Spechttrommlern und Regentropfen verfügbar. Dies war Anlass zu den hier vorgestellten Messungen und dem Versuch, die gewonnenen Registrierungen durch geeignete Aufbereitung mit dem menschlichen Herzschlag vergleichen und zum Zitat ins Verhältnis setzen zu können.
In diesem Beitrag wird der interaktive Volumenrenderer Volt für die NVIDIA CUDA Architektur vorgestellt. Die Beschleunigung wird durch das Ausnutzen der technischen Eigenschaften des CUDA Device, durch die Partitionierung des Algorithmus und durch die asynchrone Ausführung des CUDA Kernels erreicht. Parallelität wird auf dem Host, auf dem Device und zwischen Host und Device genutzt. Es wird dargestellt, wie die Berechnungen durch den gezielten Einsatz der Ressourcen effizient durchgeführt werden. Die Ergebnisse werden zurückkopiert, so dass der Kernel nicht auf dem zur Anzeige bestimmten Device ausgeführt werden muss. Synchronisation der CUDA Threads ist nicht notwendig.
In this contribution a machine vision inspection system is presented which is designed as a length measuring sensor. It is developed to be applied to a range of heat shrink tubes, varying in length, diameter and color. The challenges of this task were the precision and accuracy demands as well as the real-time applicability of the entire approach since it should be realized in regular industrial line production. In production, heat shrink tubes are cut to specific sizes from a continuous tube. A multi-measurement strategy has been developed, which measures each individual tube segment several times with sub pixel accuracy while being in the visual field. The developed approach allows for a contact-free and fully automatic control of 100% of produced heat shrink tubes according to the given requirements with a measuring precision of 0.1mm. Depending on the color, length and diameter of the tubes considered, a true positive rate of 99.99% to 100% has been reached at a true negative rate of > 99.7.
Dementia not only affects the cognitive capabilities, especially memory and orientation, but also physical capabilities, which are associated with a decrease of physical activities. Here, ICT can play a major role to improve health, quality of life and wellbeing in older adults suffering from dementia and related stakeholders, such as relatives, professional and informal caregivers. The aim of the presented system is to increase physical and cognitive capabilities of people with dementia and their caregivers to support them in daily life activities, reduce the strain of the caregivers and improve both their wellbeing.
Media development cooperation has aimed for decades at enhancing free and independent media in developing countries as well as economies in transition. Within this field of activity, the concept of media viability has gained more and more attention in recent years. This is mainly due to a proposal of UNESCO`s intergovernmental Bureau of the International Programme for the Development of Communication (IPDC). The UNESCO, in partnership with DW Akademie, has drafted a list of indicators that delineate the influencing factors of media viability for media organizations in any given country (UNESCO 2015).
As a consequence of the novelty of the media viability concept, the state of scientific research is restricted. It is frequently focused on isolated case studies without providing a scientific basis for comparison. Empirical studies and comparative analyses are limited to certain media sectors such as the print market, as well as for journalism startups and spin-offs in developed economies.
Echtzeit-orientierte Multimedia-Kommunikation im Internet eröffnet eine Vielzahl neuer Anwendungen. Diese innovative Kommunikationsplattform ist gerade für weltweit operierende Unternehmen von Interesse. So können z.B. durch die Verwendung von VoIP-Lösungen oder Groupware-Applikationen Kosten gesenkt und gleichzeitig die Zusammenarbeit der Mitarbeiter optimiert werden. Dies trifft auch für Video-Konferenzsysteme zu. Anstelle regelmäßiger Meetings, die meist mit Dienstreisen eines Großteils der Teilnehmer verbunden sind, können Konferenzen virtuell durch die Übertragung von Sprachund Videodaten über das Internet abgehalten werden. Die Akzeptanz der beschriebenen Kommunikationsanwendungen hängt stark von den Faktoren Dienstgüte und Sicherheit ab. Die Übertragung der echtzeit-orientierten Mediendaten muss möglichst kontinuierlich erfolgen, so dass sowohl eine ruckelfreie Wiedergabe der Sprache als auch der Bewegtbilder möglich ist. Da Konferenzen firmenintern und vertraulich sind, werden sie hinter verschlossener Tür abgehalten. Das Pendant in der elektronischen Welt muss eine Entsprechung anbieten. Se- curity-Mechanismen haben allerdings einen Einfluss auf Dienstgüteparameter. Dies muss bei der Entwicklung von Techniken zum Schutz multimedialer Kommunikation berücksichtigt und abgestimmt werden. Dieser Beitrag zeigt anhand des Beispiels eines Video-Konferenzsystems für das Internet, wie Sicherheitsmechanismen in echtzeit-orientierte Multimedia-Kommunikationsanwendungen unter Berücksichtigung von Quality of Service (QoS) integriert werden können.
An der Hochschule Bonn-Rhein-Sieg fand am Donnerstag, den 23.9.21 das erste Verbraucherforum für Verbraucherinformatik statt. Im Rahmen der Online-Tagesveranstaltung diskutierten mehr als 30 Teilnehmer:innen über Themen und Ideen rund um den Bereich Verbraucherdatenschutz. Dabei kamen sowohl Beiträge aus der Informatik, den Verbraucher- und Sozialwissenschaften sowie auch der regulatorischen Perspektive zur Sprache. Der folgende Beitrag stellt den Hintergrund der Veranstaltung dar und berichtet über Inhalte der Vorträge sowie Anknüpfungspunkte für die weitere Konstituierung der Verbraucherinformatik. Veranstalter waren das Institut für Verbraucherinformatik an der H-BRS in Zusammenarbeit mit dem Lehrstuhl IT-Sicherheit der Universität Siegen sowie dem Kompetenzzentrum Verbraucherforschung NRW der Verbraucherzentrale NRW e. V. mit Förderung des Bundesministeriums der Justiz und für Verbraucherschutz.