Refine
Departments, institutes and facilities
- Fachbereich Informatik (69)
- Fachbereich Wirtschaftswissenschaften (65)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (42)
- Fachbereich Angewandte Naturwissenschaften (39)
- Fachbereich Ingenieurwissenschaften und Kommunikation (38)
- Institut für Cyber Security & Privacy (ICSP) (25)
- Institut für Verbraucherinformatik (IVI) (21)
- Institut für funktionale Gen-Analytik (IFGA) (16)
- Institute of Visual Computing (IVC) (15)
- Fachbereich Sozialpolitik und Soziale Sicherung (14)
Document Type
- Conference Object (105)
- Article (103)
- Part of a Book (33)
- Book (monograph, edited volume) (18)
- Contribution to a Periodical (12)
- Report (9)
- Part of Periodical (4)
- Conference Proceedings (3)
- Doctoral Thesis (2)
- Master's Thesis (2)
Year of publication
- 2016 (296) (remove)
Keywords
- Lehrbuch (6)
- User Experience (3)
- Betriebswirtschaftslehre (2)
- Corporate Social Responsibility (2)
- Dielectric analysis (2)
- E-Business (2)
- Fas (2)
- IEEE802.11 (2)
- Intelligent Transport System (2)
- Kommunikation (2)
Mensch-Roboter-Kollaboration
(2016)
Eine enge Zusammenarbeit von Mensch und Roboter, die sogenannte Mensch-Roboter-Kollaboration (MRK), könnte eine bisher beispielslose Produktivität entstehen lassen. Bis zur allgemeinen Nutzung der Technologie sind noch zahlreiche Probleme zu lösen, insbesondere die des Arbeits- und Gesundheitsschutzes. Am Institut für Sicherheitsforschung der Hochschule Bonn-Rhein-Sieg wurde in den vergangenen Jahren eine Reihe von Projekten zur Entwicklung von optischen Sensorsystemen für Schutzeinrichtungen durchgeführt. Im Projekt SPAI (Sichere Personendetektion im Arbeitsbereich von Industrierobotern durch ein aktives NIR-Kamerasystem) wurde ein spezielles Kamerasystem für den nahinfraroten (NIR) Spektralbereich entwickelt.
Nicht im Elfenbeinturm
(2016)
Domestic Robotics
(2016)
Over the past two decades many low and middle income countries worldwide have started to extend the coverage and improve the functioning of public social protection systems. The research program on international policy diffusion provides empirical evidence that apart from domestic factors international interdependencies matter as well for national policy change in social protection. However, little is known about the governance structures mediating international policy diffusion in social protection.
Dieser Artikel stützt sich auf das vom 13.10.2015 bis 12.01.2016 gemeinsam durchgeführten Praxisprojekt von ORBIT und der Hochschule Bonn-Rhein-Sieg. Thema des Projekts waren die Methodenevaluation und Automatisierung von Auswertungsprozessen. Speziell ging es um die Überprüfung der von ORBIT entwickelten Methodik zur Anforderungsanalyse und Standortbestimmung – dem ORBIT-Navigator.
Dieses Buch befasst sich auf Basis wissenschaftlicher Erkenntnisse zur Unternehmensführung und Unternehmensentwicklung mit einem Grundmodell für die unternehmensindividuelle Entwicklung eines betriebswirtschaftlich nachhaltigen und wandlungsfähigen Managementsystems. Gerade heute sind Unternehmer, Berater, Führungskräfte und Wissenschaftler herausgefordert, das eigene vorherrschende Geschäftsverständnis zu hinterfragen, neue Quellen der Wirtschaftlichkeit zu erschließen, ihre Organisationen beweglicher und lernfähiger zu gestalten sowie mehrere Strategiehebel gleichzeitig zu bedienen.
Neues Lizenzmanagement
(2016)
This report summarises and integrates two different tracks of research for the purpose of envisioning and preparing a joint research project proposal. Soft- and hardware systems have become increasingly complex and act "concurrently", both with respect to memory access (i.e. information flow) and computational resources (i.e. "services"). The software development metaphor of cloud-storage, cloud-computing and service-oriented design has been anticipated by artificial intelligence (AI) research at least 30 years ago (parallel and distributed computation already dates back to the 1950’s and 1970s). What is known as a "service" today is what in AI is known as the capability of an agent; and the problem of information flow and consistency has been a headstone of information processing ever since. Based on a real-world robotics application we demonstrate how an increasingly abstract description of collaborating or competing agents correspond to a set of concurrent processes.
Mit den Themen Digitalisierung, Big Data, Industrie 4.0 und Cloud-Computing erfährt auch Geschäftsprozessmanagement immer mehr Aufmerksamkeit. Doch was sind die Treiber und Einflussfaktoren für erfolgreiches Business Process Management? Der BPM-Compass 2016 zeigt, dass Menschen auch während der digitalen Transformation entscheidend für erfolgreich umgesetzte Geschäftsprozesse sind.
Die Bilanzierung von Pensionsverpflichtungen hat große Auswirkungen sowohl auf das Eigenkapital eines Unternehmens als auch auf Erfolgsgrößen wie EBIT, Jahresüberschuss, Cashflow. Für die Einschätzung des Unternehmenserfolgs oder die Analyse der Kreditwürdigkeit sind die pensionsrelevanten Informationen von wesentlichem Interesse. Das Werk zeigt, wie man Pensions- und weitere Personalverpflichtungen richtig in den unterschiedlichen Rechenwerken nach handels- und steuerrechtlichen sowie internationalen Regelungen abbildet. Die Neuauflage enthält die aktuelle Rechtsprechnung und neue Richtlinien.
Job-related migration has been fostered across Europe balancing unemployment in one country with demands for employees in others. However, the numbers of early school leavers and university dropouts significantly increased in the hosting countries. We propose a higher measure of cultural sensitivity in education in order to prevent frustration. The Learning Culture Survey investigates learners’ expectations towards and perceptions of education on international level with the aim to make culture in the context of education better understandable. After a brief introduction, we subsume the steps taken during the past seven years and found results. Subsequently, we introduce a method for the determination of conflict potential, which bases on the understanding of culture as the level to which people within a society accept deviations from the usual. We close with demonstrating the usefulness of the data and insights from our Learning Culture Survey in the context of practical scenarios.
In this paper, we introduce the international program erp4students as general example on how to successfully prepare university students for the world of works without having to give up the basic principle in higher education, i.e., to exclusively provide sustainable education. We start with introducing the basic concept and design of the program and provide information regarding the demographic development over the past decade and implemented quality assurance mechanisms. Subsequently, the scope and design of and hitherto achieved insights from the Learning Culture Survey are outlined. On the basis of found results, we finally discuss how erp4students can deal with possible culture-specific issues that latest might emerge when the program gets available for learners in the Asian context.
Marketing und Recht kompakt
(2016)
"Marketing und Recht - was soll das denn?" So oder ähnlich wird der eine oder andere auf den Titel des vorliegenden Buches spontan reagieren. Das verwundert nicht, ist die Buch-Landschaft doch vor allem dadurch geprägt, dass Marketing-Werke und Abhandlungen zu marketingrelevanten Rechtsthemen am Büchermarkt stets "getrennt marschieren". Wer Marketingkonzepte entwirft, Vorhaben im Rahmen der Marketingforschung durchführen will oder beabsichtigt, Entscheidungen im Rahmen des Marketings zu treffen, sollte unseres Erachtens möglichst frühzeitig die gängigen "juristischen Fallstricke" erkennen und in seinen Überlegungen berücksichtigen.
Die Festsetzungspraxis des GKV-Spitzenverbands im Festbetragswesen - eine kritische Bestandsaufnahme
(2016)
Der Beitrag stellt auf Basis einer Literaturanalyse den aktuellen Forschungsstand zu Controlling Shared Service Centern dar. Darauf aufbauend wird dieser um die praktischen Erfahrungen bei der Deutschen Telekom ergänzt. Insbesondere der Prozess des Risikomanagements wird hierzu auf seine Eignung für Shared Services auf Grundlage der etwa dreijährigen Erfahrungen des Unternehmens geprüft.
Results from the EU-project iStoppFalls : feasibility, effectiveness, approach for fall prevention
(2016)
Falls and their consequences are arguably most important events for transition from independent living to institutional care for older adults. Information and communication technology (ICT)-based support of fall prevention and fall risk assessment under the control of the user has a tremendous potential to, over time, prevent falls and reduce associated harm and costs. Our research uses participative design and a persuasive health approach to allow for seamless integration of an ICT-based fall prevention system into older adults’ everyday life. Based on a 6-month field study with 12 participants, we present qualitative results regarding the system use and provide insights into attitudes and practices of older adults concerning fall prevention and ICT-supported self-management of health. Our study demonstrates how it can lead to positive aspects of embodiment and health literacy through continuous monitoring of personal results, improved technical confidence, and quality of life. Implications are provided for designing similar systems.
Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revealed by recent security studies. One major reason for this is rooted in usability issues. API Usability research has been deriving recommendations for designing usable APIs in general. Facing the growing relevance of Security APIs, the question arises, whether the observed usability aspects in the general space are already sufficient enough for building usable Security APIs. The currently available findings in the API Usability domain are selective fragments only, though. This still emerging field has not produced a comprehensive model yet. As a consequence, a first contribution of this paper is such a model that provides a consolidated view on the current research coverage of API Usability. On this baseline, the paper continues by conducting an analysis of relevant security studies, which give insights on usability problems developers had, when using Security APIs. This analysis leads to a proposal of eleven specific usability characteristics relevant for Security APIs. These have to be followed up by usability studies in order to evaluate how Security APIs need to be designed in a usable way and which potential trade-offs have to be balanced.
Online media consumption is the main driving force for the recent growth of the Web. As especially realtime media is becoming more and more accessible from a wide range of devices, with contrasting screen resolutions, processing resources and network connectivity, a necessary requirement is providing users with a seamless multimedia experience at the best possible quality, henceforth being able to adapt to the specific device and network conditions. This paper introduces a novel approach for adaptive media streaming in the Web. Despite the pervasive pullbased designs based on HTTP, this paper builds upon a Web-native push-based approach by which both the communication and processing overheads are reduced significantly in comparison to the pull-based counterparts. In order to maintain these properties when enhancing the scheme by adaptation features, a server-side monitoring and control needs to be developed as a consequence. Such an adaptive push-based media streaming approach is intr oduced as main contribution of this work. Moreover, the obtained evaluation results provide the evidence that with an adaptive push-based media delivery, on the one hand, an equivalent quality of experience can be provided at lower costs than by adopting pull-based media streaming. On the other hand, an improved responsiveness in switching between quality levels can be obtained at no extra costs.
Effects of Workspace Awareness and Territoriality in Environments with Large, Shared Displays
(2016)
Synchronous cooperative work of multiple collaborators in large, high-resolution display systems comprises such psychological phenomena like workspace awareness and human territoriality. The phenomena and interplay between them can cause a significant impact on human-human and human-environment interaction. In a non-digital environment humans rely on their own physical abilities, utilities, and social protocols to control those phenomena (e.g. close eyes, or use earplugs to reduce workspace awareness; rotate oneself towards collaborators to increase workspace awareness). Digital environments, on the other hand, provide us with a possibility to ease, automate, and unify control processes, thus taking off that burden from users. Yet, we have to understand first, what effects workspace awareness and territoriality have within a collaborative environment. The aim of this doctoral thesis is to investigate effects of workspace awareness and territoriality on users and interaction processes in mixed-focus scenarios of various collaborative settings.
The aim of design science research (DSR) in information systems is the user-centred creation of IT-artifacts with regard to specific social environments. For culture research in the field, which is necessary for a proper localization of IT-artifacts, models and research approaches from social sciences usually are adopted. Descriptive dimension-based culture models most commonly are applied for this purpose, which assume culture being a national phenomenon and tend to reduce it to basic values. Such models are useful for investigations in behavioural culture research because it aims to isolate, describe and explain culture-specific attitudes and characteristics within a selected society. In contrast, with the necessity to deduce concrete decisions for artifact-design, research results from DSR need to go beyond this aim. As hypothesis, this contribution generally questions the applicability of such generic culture dimensions’ models for DSR and focuses on their theoretical foundation, which goes back to Hofstede’s conceptual Onion Model of Culture. The herein applied literature-based analysis confirms the hypothesis. Consequently, an alternative conceptual culture model is being introduced and discussed as theoretical foundation for culture research in DSR.
MOOCs in POM Education
(2016)
Basic demand from enterprises towards academic education: provide students not only methodological/theoretical knowledge, but also prepare them for the future tasks in the world of works! This contradicts academia’s focus on sustainably teaching basic principles. With the extra-curricular international online program erp4students, we successfully managed to bridge this "conflict-of-interest”.
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
Dieser Beitrag betrachtet den Stand der Entwicklung bei der Vernetzung von Fahrzeugen aus Sicht der IT-Sicherheit. Etablierte Kommunikationssysteme und Verkehrstelematikanwendungen im Automobil werden ebenso vorgestellt und diskutiert wie auch zukünftige Kommunikationstechnologien Car-2-Car und Car-2-X. IT-Sicherheit im Automobil ist ein schwieriges Feld, da es hier um eine Integration von neuen innovativen Anwendungen in eine hochkomplexe bestehende Fahrzeugarchitektur geht, die zu keinen neuen Gefährdungen für die Fahrzeuginsassen führen darf. Zudem bleibt die Funktionsweise dieser Anwendungen mit ihren Auswirkungen auf das informationelle Selbstbestimmungsrecht oft intransparent. Die abschließende Diskussion gibt Handlungsempfehlungen aus Sicht der Verbraucher.
Fault-Channel Watermarks
(2016)
This paper presents implementation results of several side channel countermeasures for protecting the scalar multiplication of ECC (Elliptic Curve Cryptography) implemented on an ARM Cortex M3 processor that is used in security sensitive wireless sensor nodes. Our implementation was done for the ECC curves P-256, brainpool256r1, and Ed25519. Investigated countermeasures include Double-And-Add Always, Montgomery Ladder, Scalar Randomization, Randomized Scalar Splitting, Coordinate Randomization, and Randomized Sliding Window. Practical side channel tests for SEMA (Simple Electromagnetic Analysis) and MESD (Multiple Exponent, Single Data) are included. Though more advanced side channel attacks are not evaluated, yet, our results show that an appropriate level of resistance against the most relevant attacks can be reached.
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
In Fortführung zum erfolgreichen Auftaktworkshop „Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten“ auf der Mensch und Computer 2015 werden in einem zweiten wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer vier Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert. Das Programm bilden Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze, aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop wird das etablierte Forum weiterentwickelt, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee hat die Einreichungen bewertet und daraus die zur Präsentation akzeptierten Beiträge ausgewählt.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.
Noch sind sich die Experten nicht einig, wie schnell Blockchain das Internet revolutionieren wird. Dass das Potenzial dafür riesig ist, ist sich Professor Jens Böcker sicher. Er unterhält eine Professur für Betriebswirtschaftslehre und Marketing an der Hochschule Bonn-Rhein-Sieg und forscht zu diesem Thema.
Ohne Zweifel kein Wissen und keine Innovation, dies gilt für die Forschung im Allgemeinen und natürlich auch an unserer Hochschule. Gerade in der Wissenschaft ist der methodische Zweifel oft der Ausgangspunkt einer spezifischen Untersuchung. Er soll dabei behilflich sein, Klarheit zu erlangen. Frei nach dem Philosophen Rene Descartes: Was kann ich eigentlich mit Sicherheit wissen? Nur wer ab und an zweifelt, der schaut um die Ecke, stellt sich, andere und seine Umwelt in Frage, sucht nach neuen Wegen, Antworten und strebt nach Veränderung. Und auch dort, wo Wissenschaft vermittelt wird, also im Seminar, in einer Übung oder Vorlesung, muss Platz sein für eine selbstreflexive Grundhaltung. An der H-BRS ist Zweifeln also nicht nur erlaubt, sondern erwünscht.
Salts and proteins comprise two of the basic molecular components of biological materials. Kosmotropic/chaotropic co-solvation and matching ion water affinities explain basic ionic effects on protein aggregation observed in simple solutions. However, it is unclear how these theories apply to proteins in complex biological environments and what the underlying ionic binding patterns are. Using the positive ion Ca2+ and the negatively charged membrane protein SNAP25, we studied ion effects on protein oligomerization in solution, in native membranes and in molecular dynamics (MD) simulations. We find that concentration-dependent ion-induced protein oligomerization is a fundamental chemico-physical principle applying not only to soluble but also to membrane-anchored proteins in their native environment. Oligomerization is driven by the interaction of Ca2+ ions with the carboxylate groups of aspartate and glutamate. From low up to middle concentrations, salt bridges between Ca2+ ions and two or more protein residues lead to increasingly larger oligomers, while at high concentrations oligomers disperse due to overcharging effects. The insights provide a conceptual framework at the interface of physics, chemistry and biology to explain binding of ions to charged protein surfaces on an atomistic scale, as occurring during protein solubilisation, aggregation and oligomerization both in simple solutions and membrane systems.
Noncooperative Game Theory
(2016)
Doubting - Path to Science
(2016)
Background: Falls are common in older adults and can result in serious injuries. Due to demographic changes, falls and related healthcare costs are likely to increase over the next years. Participation and motivation of older adults in fall prevention measures remain a challenge. The iStoppFalls project developed an information and communication technology (ICT)-based system for older adults to use at home in order to reduce common fall risk factors such as impaired balance and muscle weakness. The system aims at increasing older adults’ motivation to participate in ICT-based fall prevention measures. This article reports on usability, user-experience and user-acceptance aspects affecting the use of the iStoppFalls system by older adults.
Methods: In the course of a 16-week international multicenter study, 153 community-dwelling older adults aged 65+ participated in the iStoppFalls randomized controlled trial, of which half used the system in their home to exercise and assess their risk of falling. During the study, 60 participants completed questionnaires regarding the usability, user experience and user acceptance of the iStoppFalls system. Usability was measured with the System Usability Scale (SUS). For user experience the Physical Activity Enjoyment Scale (PACES) was applied. User acceptance was assessed with the Dynamic Acceptance Model for the Re-evaluation of Technologies (DART). To collect more detailed data on usability, user experience and user acceptance, additional qualitative interviews and observations were conducted with participants.
Results: Participants evaluated the usability of the system with an overall score of 62 (Standard Deviation, SD 15.58) out of 100, which suggests good usability. Most users enjoyed the iStoppFalls games and assessments, as shown by the overall PACES score of 31 (SD 8.03). With a score of 0.87 (SD 0.26), user acceptance results showed that participants accepted the iStoppFalls system for use in their own home. Interview data suggested that certain factors such as motivation, complexity or graphical design were different for gender and age.
Conclusions: The results suggest that the iStoppFalls system has good usability, user experience and user acceptance. It will be important to take these along with factors such as motivation, gender and age into consideration when designing and further developing ICT-based fall prevention systems.
The analysis of Δ9-tetrahydrocannabinol (THC) and its metabolites 11-hydroxy-Δ9-tetrahydrocannabinol (11-OH-THC), and 11-nor-9-carboxy-Δ9-tetrahydrocannabinol (THC-COOH) from blood serum is a routine task in forensic toxicology laboratories. For examination of consumption habits, the concentration of the phase I metabolite THC-COOH is used. Recommendations for interpretation of analysis values in medical-psychological assessments (regranting of driver’s licenses, Germany) include threshold values for the free, unconjugated THC-COOH. Using a fully automated two-step liquid-liquid extraction, THC, 11-OH-THC, and free, unconjugated THC-COOH were extracted from blood serum, silylated with N-methyl-N-(trimethylsilyl) trifluoroacetamide (MSTFA), and analyzed by GC/MS. The automation was carried out by an x-y-z sample robot equipped with modules for shaking, centrifugation, and solvent evaporation. This method was based on a previously developed manual sample preparation method. Validation guidelines of the Society of Toxicological and Forensic Chemistry (GTFCh) were fulfilled for both methods, at which the focus of this article is the automated one. Limits of detection and quantification for THC were 0.3 and 0.6 μg/L, for 11-OH-THC were 0.1 and 0.8 μg/L, and for THC-COOH were 0.3 and 1.1 μg/L, when extracting only 0.5 mL of blood serum. Therefore, the required limit of quantification for THC of 1 μg/L in driving under the influence of cannabis cases in Germany (and other countries) can be reached and the method can be employed in that context. Real and external control samples were analyzed, and a round robin test was passed successfully. To date, the method is employed in the Institute of Legal Medicine in Giessen, Germany, in daily routine. Automation helps in avoiding errors during sample preparation and reduces the workload of the laboratory personnel. Due to its flexibility, the analysis system can be employed for other liquid-liquid extractions as well. To the best of our knowledge, this is the first publication on a comprehensively automated classical liquid-liquid extraction workflow in the field of forensic toxicological analysis.
The development of advanced robotic systems is challenging as expertise from multiple domains needs to be integrated conceptually and technically. Model-driven engineering promises an efficient and flexible approach for developing robotics applications that copes with this challenge. Domain-specific modeling allows to describe robotics concerns with concepts and notations closer to the respective problem domain. This raises the level of abstraction and results in models that are easier to understand and validate. Furthermore, model-driven engineering allows to increase the level of automation, e.g. through code generation, and to bridge the gap between modeling and implementation. The anticipated results are improved efficiency and quality of the robotics systems engineering process. Within this contribution, we survey the available literature on domain-specific modeling and languages that target core robotics concerns. In total 137 publications were identified that comply with a set of defined criteria, which we consider essential for contributions in this field. With the presented survey, we provide an overview on the state-of-the-art of domain-specific modeling approaches in robotics. The surveyed publications are investigated from the perspective of users and developers of model-based approaches in robotics along a set of quantitative and qualitative research questions. The presented quantitative analysis clearly indicates the rising popularity of applying domain-specific modeling approaches to robotics in the academic community. Beyond this statistical analysis, we map the selected publications to a defined set of robotics subdomains and typical development phases in robotic systems engineering as reference for potential users. Furthermore, we analyze these contributions from a language engineering viewpoint and discuss aspects such as the methods and tools used for their implementation as well as their documentation status, platform integration, typical use cases and the evaluation strategies used for validation of the proposed approaches. Finally, we conclude with recommendations for discussion in the model-driven engineering and robotics community based on the insights gained in this survey.
The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2016), held between November 13-17, 2016 - Barcelona, Spain, continued the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies and applications.
With the rising interest in vehicular communication systems many proposals for secure vehicle-to-vehicle commu- nication were made in recent years. Also, several standard- ization activities concerning the security and privacy measures in these communication systems were initiated in Europe and in US. Here, we discuss some limitations for secure vehicle- to-infrastructure communication in the existing standards of the European Telecommunications Standards Institute. Next, a vulnerability analysis for roadside stations on one side and security and privacy requirements for roadside stations on the other side are given. Afterwards, a proposal for a multi-domain public key architecture for intelligent transport systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, is introduced. The domains of the public key infrastructure are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
Steigende psychische Arbeitsanforderungen werden im betrieblichen Alltag zunehmend als Normalität empfunden. Trotz erhöhtem Leistungsdruck werden Arbeitspausen oftmals unregelmäßig bis gar nicht wahrgenommen, obwohl mit einer Pause eine gesteigerte Erholung und eine erhöhte Produktivität einhergehen. Der vorliegende Artikel zeigt auf, wie Arbeitspausen und deren systematische Implementierung zu einem "gesunden Unternehmen" beitragen können.