Refine
Departments, institutes and facilities
- Fachbereich Informatik (62)
- Fachbereich Wirtschaftswissenschaften (61)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (39)
- Fachbereich Angewandte Naturwissenschaften (35)
- Fachbereich Ingenieurwissenschaften und Kommunikation (33)
- Institut für Cyber Security & Privacy (ICSP) (23)
- Institut für Verbraucherinformatik (IVI) (19)
- Institute of Visual Computing (IVC) (15)
- Fachbereich Sozialpolitik und Soziale Sicherung (14)
- Institut für funktionale Gen-Analytik (IFGA) (13)
Document Type
- Conference Object (99)
- Article (92)
- Part of a Book (32)
- Book (monograph, edited volume) (18)
- Contribution to a Periodical (11)
- Report (8)
- Conference Proceedings (3)
- Doctoral Thesis (2)
- Bachelor Thesis (1)
- Research Data (1)
Year of publication
- 2016 (270) (remove)
Has Fulltext
- no (270) (remove)
Keywords
- Lehrbuch (6)
- Betriebswirtschaftslehre (2)
- Corporate Social Responsibility (2)
- Dielectric analysis (2)
- E-Business (2)
- Fas (2)
- Intelligent Transport System (2)
- Kommunikation (2)
- Large, high-resolution displays (2)
- Lignin (2)
Hydrogen sulfide contributes to hypoxic inhibition of airway transepithelial sodium absorption
(2016)
We demonstrated previously that phosphocholine and phosphocholine-modified macromolecules efficiently inhibit ATP-dependent release of interleukin-1β from human and murine monocytes by a mechanism involving nicotinic acetylcholine receptors (nAChR). Interleukin-1β is a potent pro-inflammatory cytokine of innate immunity that plays pivotal roles in host defence. Control of interleukin-1β release is vital as excessively high systemic levels cause life threatening inflammatory diseases. In spite of its structural similarity to acetylcholine, there are no other reports on interactions of phosphocholine with nAChR. In this study, we demonstrate that phosphocholine inhibits ion-channel function of ATP receptor P2X7 in monocytic cells via nAChR containing α9 and α10 subunits. In stark contrast to choline, phosphocholine does not evoke ion current responses in Xenopus laevis oocytes, which heterologously express functional homomeric nAChR composed of α9 subunits or heteromeric receptors containing α9 and α10 subunits. Preincubation of these oocytes with phosphocholine, however, attenuated choline-induced ion current changes, suggesting that phosphocholine may act as a silent agonist. We conclude that phophocholine activates immuno-modulatory nAChR expressed by monocytes but does not stimulate canonical ionotropic receptor functions.
Hydrogen sulfide (H2S) is a well-known environmental chemical threat with an unpleasant smell of rotten eggs. Aside from the established toxic effects of high-dose H2S, research over the past decade revealed that cells endogenously produce small amounts of H2S with physiological functions. H2S has therefore been classified as a gasotransmitter. A major challenge for cells and tissues is the maintenance of low physiological concentrations of H2S in order to prevent potential toxicity. Epithelia of the respiratory and gastrointestinal tract are especially faced with this problem, since these barriers are predominantly exposed to exogenous H2S from environmental sources or sulfur-metabolising microbiota. In this paper, we review the cellular mechanisms by which epithelial cells maintain physiological, endogenous H2S concentrations. Furthermore, we suggest a concept by which epithelia use their electrolyte and liquid transport machinery as defence mechanisms in order to eliminate exogenous sources for potentially harmful H2S concentrations.
An exploratory study: Analysis of Serbian tourism market and identification of major market segments
(2016)
Currently, there are a lot of research activities dealing with gamma titanium aluminide (γ-TiAl) alloys as new materials for low pressure turbine (LPT) blades. Even though the scatter in mechanical properties of such intermetallic alloys is more distinctive as in conventional metallic alloys, stochastic investigations on γ -TiAl alloys are very rare. For this reason, we analyzed the scatter in static and dynamic mechanical properties of the cast alloy Ti-48Al-2Cr-2Nb. It was found that this alloy shows a size effect in strength which is less pronounced than the size effect of brittle materials. A weakest-link approach is enhanced for describing a scalable size effect under multiaxial stress states and implemented in a post processing tool for reliability analysis of real components. The presented approach is a first applicable reliability model for semi-brittle materials. The developed reliability tool was integrated into a multidisciplinary optimization of the geometry of a LPT blade. Some processes of the optimization were distributed in a wide area network, so that specialized tools for each discipline could be employed. The optimization results show that it is possible to increase the aerodynamic efficiency and the structural mechanics reliability at the same time, while ensuring the blade can be manufactured in an investment casting process.
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
In Fortführung zum erfolgreichen Auftaktworkshop „Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten“ auf der Mensch und Computer 2015 werden in einem zweiten wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer vier Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert. Das Programm bilden Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze, aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop wird das etablierte Forum weiterentwickelt, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee hat die Einreichungen bewertet und daraus die zur Präsentation akzeptierten Beiträge ausgewählt.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.
Online media consumption is the main driving force for the recent growth of the Web. As especially realtime media is becoming more and more accessible from a wide range of devices, with contrasting screen resolutions, processing resources and network connectivity, a necessary requirement is providing users with a seamless multimedia experience at the best possible quality, henceforth being able to adapt to the specific device and network conditions. This paper introduces a novel approach for adaptive media streaming in the Web. Despite the pervasive pullbased designs based on HTTP, this paper builds upon a Web-native push-based approach by which both the communication and processing overheads are reduced significantly in comparison to the pull-based counterparts. In order to maintain these properties when enhancing the scheme by adaptation features, a server-side monitoring and control needs to be developed as a consequence. Such an adaptive push-based media streaming approach is intr oduced as main contribution of this work. Moreover, the obtained evaluation results provide the evidence that with an adaptive push-based media delivery, on the one hand, an equivalent quality of experience can be provided at lower costs than by adopting pull-based media streaming. On the other hand, an improved responsiveness in switching between quality levels can be obtained at no extra costs.
Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revealed by recent security studies. One major reason for this is rooted in usability issues. API Usability research has been deriving recommendations for designing usable APIs in general. Facing the growing relevance of Security APIs, the question arises, whether the observed usability aspects in the general space are already sufficient enough for building usable Security APIs. The currently available findings in the API Usability domain are selective fragments only, though. This still emerging field has not produced a comprehensive model yet. As a consequence, a first contribution of this paper is such a model that provides a consolidated view on the current research coverage of API Usability. On this baseline, the paper continues by conducting an analysis of relevant security studies, which give insights on usability problems developers had, when using Security APIs. This analysis leads to a proposal of eleven specific usability characteristics relevant for Security APIs. These have to be followed up by usability studies in order to evaluate how Security APIs need to be designed in a usable way and which potential trade-offs have to be balanced.
Results from the EU-project iStoppFalls : feasibility, effectiveness, approach for fall prevention
(2016)
Autonomous mobile robots comprise of several hardware and software components. These components interact with each other continuously in order to achieve autonomity. Due to the complexity of such a task, a monumental responsibility is bestowed upon the developer to make sure that the robot is always operable. Hence, some means of detecting faults should be readily available. In this work, the aforementioned fault-detection system is a robotic black box (RBB) attached to the robot which acquires all the relevant measurements of the system that are needed to achieve a fault-free robot. Due to limited computational and memory resources on-board the RBB, a distributed diagnosis is proposed. That is, the fault diagnosis task (detection and isolation) is shared among an on-board component (the black box) and an off-board component (an external computer). The distribution of the diagnosis task allows for a non-intrusive method of detecting and diagnosing faults, in addition to the ability of remotely diagnosing a robot and potentially issuing a repair command. In addition to decomposing the diagnosis task and allowing remote diagnosability of the robot, another key feature of this work is the addition of expert human knowledge to aid in the fault detection process.
Domestic Robotics
(2016)
Gleichlaufgelenke als Teil der Antriebswellen (Seitenwellen und Längswellen) sind in allen maßgeblichen Triebstrangkonfigurationen im direkten Leistungsfluss angeordnet. Ihre Hauptfunktion ist die Übertragung einer Antriebsleistung unter Ermöglichung von Abbeugung und Axialverschiebung. Dieser Beitrag soll einen Überblick zu den wesentlichen, auf dem heutigen Markt verbreiteten Bauweisen und ihren jeweiligen Einsatzgebieten geben. Besonders berücksichtigt werden hierbei neue Gelenkkonzepte, die sich aufgrund ihrer besonderen Gestaltung durch deutlich höhere Wirkungsgrade auszeichnen. Der Einfluss auf den Energieverbrauch soll quantifiziert werden, hierzu wird ein neuartiger Berechnungsansatz vorgestellt, der eine einfache Abschätzung des Einflusses von Wirkungsgradverbesserungen auf den Energieverbrauch für verschiedener Antriebskonzepte (ICE / Hybrid / E-Fahrzeuge) erlaubt.
The aim of design science research (DSR) in information systems is the user-centred creation of IT-artifacts with regard to specific social environments. For culture research in the field, which is necessary for a proper localization of IT-artifacts, models and research approaches from social sciences usually are adopted. Descriptive dimension-based culture models most commonly are applied for this purpose, which assume culture being a national phenomenon and tend to reduce it to basic values. Such models are useful for investigations in behavioural culture research because it aims to isolate, describe and explain culture-specific attitudes and characteristics within a selected society. In contrast, with the necessity to deduce concrete decisions for artifact-design, research results from DSR need to go beyond this aim. As hypothesis, this contribution generally questions the applicability of such generic culture dimensions’ models for DSR and focuses on their theoretical foundation, which goes back to Hofstede’s conceptual Onion Model of Culture. The herein applied literature-based analysis confirms the hypothesis. Consequently, an alternative conceptual culture model is being introduced and discussed as theoretical foundation for culture research in DSR.
MOOCs in POM Education
(2016)
Basic demand from enterprises towards academic education: provide students not only methodological/theoretical knowledge, but also prepare them for the future tasks in the world of works! This contradicts academia’s focus on sustainably teaching basic principles. With the extra-curricular international online program erp4students, we successfully managed to bridge this "conflict-of-interest”.
In this paper, we introduce the international program erp4students as general example on how to successfully prepare university students for the world of works without having to give up the basic principle in higher education, i.e., to exclusively provide sustainable education. We start with introducing the basic concept and design of the program and provide information regarding the demographic development over the past decade and implemented quality assurance mechanisms. Subsequently, the scope and design of and hitherto achieved insights from the Learning Culture Survey are outlined. On the basis of found results, we finally discuss how erp4students can deal with possible culture-specific issues that latest might emerge when the program gets available for learners in the Asian context.
Job-related migration has been fostered across Europe balancing unemployment in one country with demands for employees in others. However, the numbers of early school leavers and university dropouts significantly increased in the hosting countries. We propose a higher measure of cultural sensitivity in education in order to prevent frustration. The Learning Culture Survey investigates learners’ expectations towards and perceptions of education on international level with the aim to make culture in the context of education better understandable. After a brief introduction, we subsume the steps taken during the past seven years and found results. Subsequently, we introduce a method for the determination of conflict potential, which bases on the understanding of culture as the level to which people within a society accept deviations from the usual. We close with demonstrating the usefulness of the data and insights from our Learning Culture Survey in the context of practical scenarios.
Der zunehmende Wunsch der Verbraucher nach einem natürlichen Lebensstil führt unter anderem zu einem erhöhten Konsum von Rohmilch und Milchprodukten aus unpasteurisierter Milch (Hudopisk et al., 2013). Rohmilchkonsumenten bevorzugen Rohmilch zum Einen wegen des subjektiven Eindrucks eines besseren Geschmacks und zum Anderen versprechen sie sich gesundheitliche Vorteile, wie eine reduzierte Empfindlichkeit gegen Allergien und eine bessere Qualität der enthaltenen Nährstoffe, durch den Verzehr unbehandelter Milch (Claeys et al., 2014). Mit dem Konsum von Rohmilch gehen allerdings mikrobiologische Risiken einher, da Rohmilch aufgrund ihres neutralen pH-Wertes, dem hohen Nährstoffgehalt und der hohen Wasseraktivität einen guten Nährboden für mikrobielles Wachstum darstellt. Das Wachstum von verschiedenen Mikroorganismen wird dabei größtenteils durch die Temperatur, die kompetitive Begleitflora und die Anwesenheit von Hemmstoffen beeinflusst (Claeys et al., 2013).Mögliche Kontaminationen der Rohmilch resultieren entweder aus einer direkten Abgabe von Mikroorganismen durch das Euter, als Konsequenz von Entzündungen oder durch eine indirekte Kontamination während des Melkvorgangs oder der späteren Handhabung (EFSA, 2015).
Noch sind sich die Experten nicht einig, wie schnell Blockchain das Internet revolutionieren wird. Dass das Potenzial dafür riesig ist, ist sich Professor Jens Böcker sicher. Er unterhält eine Professur für Betriebswirtschaftslehre und Marketing an der Hochschule Bonn-Rhein-Sieg und forscht zu diesem Thema.
Die Festsetzungspraxis des GKV-Spitzenverbands im Festbetragswesen - eine kritische Bestandsaufnahme
(2016)
Marketing und Recht kompakt
(2016)
"Marketing und Recht - was soll das denn?" So oder ähnlich wird der eine oder andere auf den Titel des vorliegenden Buches spontan reagieren. Das verwundert nicht, ist die Buch-Landschaft doch vor allem dadurch geprägt, dass Marketing-Werke und Abhandlungen zu marketingrelevanten Rechtsthemen am Büchermarkt stets "getrennt marschieren". Wer Marketingkonzepte entwirft, Vorhaben im Rahmen der Marketingforschung durchführen will oder beabsichtigt, Entscheidungen im Rahmen des Marketings zu treffen, sollte unseres Erachtens möglichst frühzeitig die gängigen "juristischen Fallstricke" erkennen und in seinen Überlegungen berücksichtigen.
Within qualitative interviews we examine attitudes towards driverless cars in order to investigate new mobility services and explore the impact of such services on everyday mobility. We identified three main issues that we would like to discuss in the workshop: (I) Designing beyond a driver-centric approach; (II) Developing mobility services for cars which drive themselves; and (III) Exploring self-driving practices.
Mobilitäts- und Nachhaltigkeitsforscher sehen sich bei der Erforschung des Mobilitätsverhaltens von Personen mit einer bunten Palette an Erhebungsmethoden konfrontiert. Erweitert wird diese Vielfalt in der letzten Zeit durch die Möglichkeit, dieses Verhalten direkt über die Smartphones der Probanden zu erfassen. Um die Auswahl geeigneter Methoden zu erleichtern, liefert die vorliegende Literaturstudie einen detaillierten Überblick zu Fragestellungen, Daten und Erhebungsmethoden, die im Bereich der Mobilitätsforschung zur Erfassung von Alltagsmobilität eingesetzt werden.
Dieser Artikel stützt sich auf das vom 13.10.2015 bis 12.01.2016 gemeinsam durchgeführten Praxisprojekt von ORBIT und der Hochschule Bonn-Rhein-Sieg. Thema des Projekts waren die Methodenevaluation und Automatisierung von Auswertungsprozessen. Speziell ging es um die Überprüfung der von ORBIT entwickelten Methodik zur Anforderungsanalyse und Standortbestimmung – dem ORBIT-Navigator.
An analysis of sharing string objects with the Java Virtual Machine was conducted; they are the most used objects in Java programs and they are immutable - thus they are read-only and easily identified. While the results are promising, it is clear that sharing more objects would result in better performance. Automatic object selection for sharing is non-trivial, because in the current state only read-only objects can be shared. This attribute can not be easily determined during runtime by an algorithm; the developer on the other hand can. This thesis presents the development of an Application Programmer Interface (API) that allows programmers to use the Java Virtual Machine (JVM) internal sharing functionality. Furthermore, we present the usage of the sharing API. Open-source software was used as real-world test cases. Afterwards the evaluation shows that the ratio between memory savings and start-up time overhead is reasonable.
SpMV Runtime Improvements with Program Optimization Techniques on Different Abstraction Levels
(2016)
The multiplication of a sparse matrix with a dense vector is a performance critical computational kernel in many applications, especially in natural and engineering sciences. To speed up this operation, many optimization techniques have been developed in the past, mainly focusing on the data layout for the sparse matrix. Strongly related to the data layout is the program code for the multiplication. But even for a fixed data layout with an accommodated kernel, there are several alternatives for program optimizations. This paper discusses a spectrum of program optimization techniques on different abstraction layers for six different sparse matrix data format and kernels. At the one end of the spectrum, compiler options can be used that hide from the programmer all optimizations done by the compiler internally. On the other end of the spectrum, a multiplication kernel can be programmed that use highly sophisticated intrinsics on an assembler level that ask for a programmer with a deep understanding of processor architectures. These special instructions can be used to efficiently utilize hardware features in processors like vector units that have the potential to speed up sparse matrix computations. The paper compares the programming effort and required knowledge level for certain program optimizations in relation to the gained runtime improvements.
The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2016), held between November 13-17, 2016 - Barcelona, Spain, continued the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies and applications.
With the rising interest in vehicular communication systems many proposals for secure vehicle-to-vehicle commu- nication were made in recent years. Also, several standard- ization activities concerning the security and privacy measures in these communication systems were initiated in Europe and in US. Here, we discuss some limitations for secure vehicle- to-infrastructure communication in the existing standards of the European Telecommunications Standards Institute. Next, a vulnerability analysis for roadside stations on one side and security and privacy requirements for roadside stations on the other side are given. Afterwards, a proposal for a multi-domain public key architecture for intelligent transport systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, is introduced. The domains of the public key infrastructure are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
A deployment of the Vehicle-to-Vehicle communication technology according to ETSI is in preparation in Europe. Currently, a Public Key Infrastructure policy for Intelligent Transport Systems in Europe is in discussion to enable V2V communication. This policy set aside two classes of keys and certificates for ITS vehicle stations: long term authentication keys and pseudonymous keys and certificates. We show that from our point of view the periodic sent Cooperative Awareness Messages with extensive data have technical limitations and together with the pseudonym concept cause privacy problems.
Die Klausur: VWL
(2016)
IT-Controlling
(2016)
Die Klausur: VWL
(2016)