Refine
Departments, institutes and facilities
- Fachbereich Informatik (69)
- Fachbereich Wirtschaftswissenschaften (65)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (42)
- Fachbereich Angewandte Naturwissenschaften (39)
- Fachbereich Ingenieurwissenschaften und Kommunikation (38)
- Institut für Cyber Security & Privacy (ICSP) (25)
- Präsidium (25)
- Institut für Verbraucherinformatik (IVI) (21)
- Institut für funktionale Gen-Analytik (IFGA) (16)
- Institute of Visual Computing (IVC) (15)
Document Type
- Conference Object (105)
- Article (103)
- Part of a Book (33)
- Part of Periodical (26)
- Book (monograph, edited volume) (18)
- Contribution to a Periodical (12)
- Report (9)
- Conference Proceedings (3)
- Doctoral Thesis (2)
- Master's Thesis (2)
Year of publication
- 2016 (318) (remove)
Keywords
- Lehrbuch (6)
- User Experience (3)
- Betriebswirtschaftslehre (2)
- Corporate Social Responsibility (2)
- Dielectric analysis (2)
- E-Business (2)
- Fas (2)
- IEEE802.11 (2)
- Intelligent Transport System (2)
- Kommunikation (2)
Currently, there are a lot of research activities dealing with gamma titanium aluminide (γ-TiAl) alloys as new materials for low pressure turbine (LPT) blades. Even though the scatter in mechanical properties of such intermetallic alloys is more distinctive as in conventional metallic alloys, stochastic investigations on γ -TiAl alloys are very rare. For this reason, we analyzed the scatter in static and dynamic mechanical properties of the cast alloy Ti-48Al-2Cr-2Nb. It was found that this alloy shows a size effect in strength which is less pronounced than the size effect of brittle materials. A weakest-link approach is enhanced for describing a scalable size effect under multiaxial stress states and implemented in a post processing tool for reliability analysis of real components. The presented approach is a first applicable reliability model for semi-brittle materials. The developed reliability tool was integrated into a multidisciplinary optimization of the geometry of a LPT blade. Some processes of the optimization were distributed in a wide area network, so that specialized tools for each discipline could be employed. The optimization results show that it is possible to increase the aerodynamic efficiency and the structural mechanics reliability at the same time, while ensuring the blade can be manufactured in an investment casting process.
Tierexperimentell konnte nachgewiesen werden, dass spezifische Ionenkanäle (vor allem TRPA1) des nozizeptiven Systems nachhaltig durch die Exposition mit blauem Licht moduliert werden können. Durch Nachweis der Wirksamkeit von nicht-visuellen Effekten einer Lichtexposition auf Somatosensorik und Nozizeption beim Menschen könnte der Einsatz einer Lichttherapie bei Patienten mit Erkrankungen des somatosensorischen Systems, insbesondere neuropathischen Schmerzen, von großer Bedeutung sein.
Over the past two decades many low and middle income countries worldwide have started to extend the coverage and improve the functioning of public social protection systems. The research program on international policy diffusion provides empirical evidence that apart from domestic factors international interdependencies matter as well for national policy change in social protection. However, little is known about the governance structures mediating international policy diffusion in social protection.
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
In Fortführung zum erfolgreichen Auftaktworkshop „Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten“ auf der Mensch und Computer 2015 werden in einem zweiten wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer vier Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert. Das Programm bilden Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze, aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop wird das etablierte Forum weiterentwickelt, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee hat die Einreichungen bewertet und daraus die zur Präsentation akzeptierten Beiträge ausgewählt.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.
This paper presents implementation results of several side channel countermeasures for protecting the scalar multiplication of ECC (Elliptic Curve Cryptography) implemented on an ARM Cortex M3 processor that is used in security sensitive wireless sensor nodes. Our implementation was done for the ECC curves P-256, brainpool256r1, and Ed25519. Investigated countermeasures include Double-And-Add Always, Montgomery Ladder, Scalar Randomization, Randomized Scalar Splitting, Coordinate Randomization, and Randomized Sliding Window. Practical side channel tests for SEMA (Simple Electromagnetic Analysis) and MESD (Multiple Exponent, Single Data) are included. Though more advanced side channel attacks are not evaluated, yet, our results show that an appropriate level of resistance against the most relevant attacks can be reached.
Sharpening the Educational Toolset - Promoting Professional Development of University Lecturers
(2016)
Salts and proteins comprise two of the basic molecular components of biological materials. Kosmotropic/chaotropic co-solvation and matching ion water affinities explain basic ionic effects on protein aggregation observed in simple solutions. However, it is unclear how these theories apply to proteins in complex biological environments and what the underlying ionic binding patterns are. Using the positive ion Ca2+ and the negatively charged membrane protein SNAP25, we studied ion effects on protein oligomerization in solution, in native membranes and in molecular dynamics (MD) simulations. We find that concentration-dependent ion-induced protein oligomerization is a fundamental chemico-physical principle applying not only to soluble but also to membrane-anchored proteins in their native environment. Oligomerization is driven by the interaction of Ca2+ ions with the carboxylate groups of aspartate and glutamate. From low up to middle concentrations, salt bridges between Ca2+ ions and two or more protein residues lead to increasingly larger oligomers, while at high concentrations oligomers disperse due to overcharging effects. The insights provide a conceptual framework at the interface of physics, chemistry and biology to explain binding of ions to charged protein surfaces on an atomistic scale, as occurring during protein solubilisation, aggregation and oligomerization both in simple solutions and membrane systems.
Results from the EU-project iStoppFalls : feasibility, effectiveness, approach for fall prevention
(2016)
Internet-Ökonomie
(2016)
Dieses Buch zeigt wie Unternehmen wie Apple, Amazon, Facebook und Google zu den wertvollsten Unternehmen der Welt werden konnten. Ihr Erfolg basiert auf dem Ergreifen von Chancen, die die digitale Welt und das Internet bieten. Traditionelle Geschäftsmodelle werden dadurch verändert und über Jahrzehnte gewachsene Marktstrukturen teilweise in Frage gestellt. Die dritte Auflage dieses Lehrbuchs ist in Form eines modularen Ansatzes grundlegend neu gestaltet.
Der Beitrag stellt auf Basis einer Literaturanalyse den aktuellen Forschungsstand zu Controlling Shared Service Centern dar. Darauf aufbauend wird dieser um die praktischen Erfahrungen bei der Deutschen Telekom ergänzt. Insbesondere der Prozess des Risikomanagements wird hierzu auf seine Eignung für Shared Services auf Grundlage der etwa dreijährigen Erfahrungen des Unternehmens geprüft.
Falls and their consequences are arguably most important events for transition from independent living to institutional care for older adults. Information and communication technology (ICT)-based support of fall prevention and fall risk assessment under the control of the user has a tremendous potential to, over time, prevent falls and reduce associated harm and costs. Our research uses participative design and a persuasive health approach to allow for seamless integration of an ICT-based fall prevention system into older adults’ everyday life. Based on a 6-month field study with 12 participants, we present qualitative results regarding the system use and provide insights into attitudes and practices of older adults concerning fall prevention and ICT-supported self-management of health. Our study demonstrates how it can lead to positive aspects of embodiment and health literacy through continuous monitoring of personal results, improved technical confidence, and quality of life. Implications are provided for designing similar systems.
Die Bilanzierung von Pensionsverpflichtungen hat große Auswirkungen sowohl auf das Eigenkapital eines Unternehmens als auch auf Erfolgsgrößen wie EBIT, Jahresüberschuss, Cashflow. Für die Einschätzung des Unternehmenserfolgs oder die Analyse der Kreditwürdigkeit sind die pensionsrelevanten Informationen von wesentlichem Interesse. Das Werk zeigt, wie man Pensions- und weitere Personalverpflichtungen richtig in den unterschiedlichen Rechenwerken nach handels- und steuerrechtlichen sowie internationalen Regelungen abbildet. Die Neuauflage enthält die aktuelle Rechtsprechnung und neue Richtlinien.
Dieser Beitrag betrachtet den Stand der Entwicklung bei der Vernetzung von Fahrzeugen aus Sicht der IT-Sicherheit. Etablierte Kommunikationssysteme und Verkehrstelematikanwendungen im Automobil werden ebenso vorgestellt und diskutiert wie auch zukünftige Kommunikationstechnologien Car-2-Car und Car-2-X. IT-Sicherheit im Automobil ist ein schwieriges Feld, da es hier um eine Integration von neuen innovativen Anwendungen in eine hochkomplexe bestehende Fahrzeugarchitektur geht, die zu keinen neuen Gefährdungen für die Fahrzeuginsassen führen darf. Zudem bleibt die Funktionsweise dieser Anwendungen mit ihren Auswirkungen auf das informationelle Selbstbestimmungsrecht oft intransparent. Die abschließende Diskussion gibt Handlungsempfehlungen aus Sicht der Verbraucher.
Die Prognose über den Studienerfolg von Studierenden in MINT-Fächern wird häufig an ihre Prüfungsleistungen in mathematischen und naturwissenschaftlichen Veranstaltungen geknüpft. Die Relevanz von sprachlichen Kompetenzen, insbesondere der Textrezeption und -produktion, für Studium und Berufstätigkeit, gerade auch in ingenieurwissenschaftlichen Betätigungsfeldern, wird sowohl von den Studierenden als auch von Dozent*innen nicht erkannt oder zurückgestellt.
An analysis of sharing string objects with the Java Virtual Machine was conducted; they are the most used objects in Java programs and they are immutable - thus they are read-only and easily identified. While the results are promising, it is clear that sharing more objects would result in better performance. Automatic object selection for sharing is non-trivial, because in the current state only read-only objects can be shared. This attribute can not be easily determined during runtime by an algorithm; the developer on the other hand can. This thesis presents the development of an Application Programmer Interface (API) that allows programmers to use the Java Virtual Machine (JVM) internal sharing functionality. Furthermore, we present the usage of the sharing API. Open-source software was used as real-world test cases. Afterwards the evaluation shows that the ratio between memory savings and start-up time overhead is reasonable.
Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revealed by recent security studies. One major reason for this is rooted in usability issues. API Usability research has been deriving recommendations for designing usable APIs in general. Facing the growing relevance of Security APIs, the question arises, whether the observed usability aspects in the general space are already sufficient enough for building usable Security APIs. The currently available findings in the API Usability domain are selective fragments only, though. This still emerging field has not produced a comprehensive model yet. As a consequence, a first contribution of this paper is such a model that provides a consolidated view on the current research coverage of API Usability. On this baseline, the paper continues by conducting an analysis of relevant security studies, which give insights on usability problems developers had, when using Security APIs. This analysis leads to a proposal of eleven specific usability characteristics relevant for Security APIs. These have to be followed up by usability studies in order to evaluate how Security APIs need to be designed in a usable way and which potential trade-offs have to be balanced.
Online media consumption is the main driving force for the recent growth of the Web. As especially realtime media is becoming more and more accessible from a wide range of devices, with contrasting screen resolutions, processing resources and network connectivity, a necessary requirement is providing users with a seamless multimedia experience at the best possible quality, henceforth being able to adapt to the specific device and network conditions. This paper introduces a novel approach for adaptive media streaming in the Web. Despite the pervasive pullbased designs based on HTTP, this paper builds upon a Web-native push-based approach by which both the communication and processing overheads are reduced significantly in comparison to the pull-based counterparts. In order to maintain these properties when enhancing the scheme by adaptation features, a server-side monitoring and control needs to be developed as a consequence. Such an adaptive push-based media streaming approach is intr oduced as main contribution of this work. Moreover, the obtained evaluation results provide the evidence that with an adaptive push-based media delivery, on the one hand, an equivalent quality of experience can be provided at lower costs than by adopting pull-based media streaming. On the other hand, an improved responsiveness in switching between quality levels can be obtained at no extra costs.
This paper presents the b-it-bots@Home team and its mobile service robot called Jenny – a service robot based on the Care-O-bot 3 platform manufactured by the Fraunhofer Institute for Manufacturing Engineering and Automation. In this paper, an overview of the robot control architecture and its capabilities is presented. The capabilities refers to the added functionalities from research and projects carried out within the Bonn-Rhein-Sieg University of Applied Science.
Autonomous mobile robots comprise of several hardware and software components. These components interact with each other continuously in order to achieve autonomity. Due to the complexity of such a task, a monumental responsibility is bestowed upon the developer to make sure that the robot is always operable. Hence, some means of detecting faults should be readily available. In this work, the aforementioned fault-detection system is a robotic black box (RBB) attached to the robot which acquires all the relevant measurements of the system that are needed to achieve a fault-free robot. Due to limited computational and memory resources on-board the RBB, a distributed diagnosis is proposed. That is, the fault diagnosis task (detection and isolation) is shared among an on-board component (the black box) and an off-board component (an external computer). The distribution of the diagnosis task allows for a non-intrusive method of detecting and diagnosing faults, in addition to the ability of remotely diagnosing a robot and potentially issuing a repair command. In addition to decomposing the diagnosis task and allowing remote diagnosability of the robot, another key feature of this work is the addition of expert human knowledge to aid in the fault detection process.
In this paper, a set of micro-benchmarks is proposed to determine basic performance parameters of single-node mainstream hardware architectures for High Performance Computing. Performance parameters of recent processors, including those of accelerators, are determined. The investigated systems are Intel server processor architectures and the two accelerator lines Intel Xeon Phi and Nvidia graphic processors. Additionally, the performance impact of thread mapping on multiprocessors and Intel Xeon Phi is shown. The results show similarities for some parameters between all architectures, but significant differences for others.
Noch sind sich die Experten nicht einig, wie schnell Blockchain das Internet revolutionieren wird. Dass das Potenzial dafür riesig ist, ist sich Professor Jens Böcker sicher. Er unterhält eine Professur für Betriebswirtschaftslehre und Marketing an der Hochschule Bonn-Rhein-Sieg und forscht zu diesem Thema.
MOOCs in POM Education
(2016)
Basic demand from enterprises towards academic education: provide students not only methodological/theoretical knowledge, but also prepare them for the future tasks in the world of works! This contradicts academia’s focus on sustainably teaching basic principles. With the extra-curricular international online program erp4students, we successfully managed to bridge this "conflict-of-interest”.
Noncooperative Game Theory
(2016)
Domestic Robotics
(2016)
Within qualitative interviews we examine attitudes towards driverless cars in order to investigate new mobility services and explore the impact of such services on everyday mobility. We identified three main issues that we would like to discuss in the workshop: (I) Designing beyond a driver-centric approach; (II) Developing mobility services for cars which drive themselves; and (III) Exploring self-driving practices.
Dieser Artikel stützt sich auf das vom 13.10.2015 bis 12.01.2016 gemeinsam durchgeführten Praxisprojekt von ORBIT und der Hochschule Bonn-Rhein-Sieg. Thema des Projekts waren die Methodenevaluation und Automatisierung von Auswertungsprozessen. Speziell ging es um die Überprüfung der von ORBIT entwickelten Methodik zur Anforderungsanalyse und Standortbestimmung – dem ORBIT-Navigator.
Diese Arbeit präsentiert eine Methode zur zuverlässigen Personendetektion für die Absicherung des Arbeitsbereichs von Industrierobotern. Hierzu wird ein im Nahinfrarotbereich (NIR) arbeitendes aktives Kamerasystem eingesetzt, das durch erweiterte und robuste Hauterkennungseigenschaften besonders dazu geeignet ist, zwischen verschiedensten Materialoberflächen und menschlicher Haut zu unterscheiden. So soll zum einen die Erkennungsleistung gegenüber handelsüblichen, im visuellen Bereich arbeitenden RGB-Kamerasystemen gesteigert werden und gleichzeitig eine „intelligente“ Form des Mutings realisiert werden. Die im Rahmen des Projekts „Sichere Personendetektion im Arbeitsbereich von Industrierobotern durch ein aktives NIR-Kamerasystem (SPAI)“ entwickelte und hier vorgestellte Methode erreicht in einer ersten Variante eine pixelweise Personenerkennungsrate von ca. 98,16%.
Design of an Active Multispectral SWIR Camera System for Skin Detection and Face Verification
(2016)
Biometric face recognition is becoming more frequently used in different application scenarios. However, spoofing attacks with facial disguises are still a serious problem for state of the art face recognition algorithms. This work proposes an approach to face verification based on spectral signatures of material surfaces in the short wave infrared (SWIR) range. They allow distinguishing authentic human skin reliably from other materials, independent of the skin type. We present the design of an active SWIR imaging system that acquires four-band multispectral image stacks in real-time. The system uses pulsed small band illumination, which allows for fast image acquisition and high spectral resolution and renders it widely independent of ambient light. After extracting the spectral signatures from the acquired images, detected faces can be verified or rejected by classifying the material as "skin" or "no-skin". The approach is extensively evaluated with respect to both acquisition and classification performance. In addition, we present a database containing RGB and multispectral SWIR face images, as well as spectrometer measurements of a variety of subjects, which is used to evaluate our approach and will be made available to the research community by the time this work is published.
Supported by their large size and high resolution, display walls suit well for different collaboration types. However, in order to foster instead of impede collaboration processes, interaction techniques need to be carefully designed, taking into regard the possibilities and limitations of the display size, and their effects on human perception and performance. In this paper we investigate the impact of visual distractors (which, for instance, might be caused by other collaborators' input) in peripheral vision on short-term memory and attention. The distractors occur frequently when multiple users collaborate in large wall display systems and may draw attention away from the main task, as such potentially affecting performance and cognitive load. Yet, the effect of these distractors is hardly understood. Gaining a better understanding thus may provide valuable input for designing more effective user interfaces. In this article, we report on two interrelated studies that investigated the effect of distractors. Depending on when the distractor is inserted in the task performance sequence, as well as the location of the distractor, user performance can be disturbed: we will show that distractors may not affect short term memory, but do have an effect on attention. We will closely look into the effects, and identify future directions to design more effective interfaces.
Human beings spend much time under the influence of artificial lighting. Often, it is beneficial to adapt lighting to the task, as well as the user’s mental and physical constitution and well-being. This formulates new requirements for lighting - human-centric lighting - and drives a need for new light control methods in interior spaces. In this paper we present a holistic system that provides a novel approach to human-centric lighting by introducing simulation methods into interactive light control, to adapt the lighting based on the user's needs. We look at a simulation and evaluation platform that uses interactive stochastic spectral rendering methods to simulate light sources, allowing for their interactive adjustment and adaption.
Dieses Buch befasst sich auf Basis wissenschaftlicher Erkenntnisse zur Unternehmensführung und Unternehmensentwicklung mit einem Grundmodell für die unternehmensindividuelle Entwicklung eines betriebswirtschaftlich nachhaltigen und wandlungsfähigen Managementsystems. Gerade heute sind Unternehmer, Berater, Führungskräfte und Wissenschaftler herausgefordert, das eigene vorherrschende Geschäftsverständnis zu hinterfragen, neue Quellen der Wirtschaftlichkeit zu erschließen, ihre Organisationen beweglicher und lernfähiger zu gestalten sowie mehrere Strategiehebel gleichzeitig zu bedienen.
Digitaltechnik
(2016)
Marketing und Recht kompakt
(2016)
"Marketing und Recht - was soll das denn?" So oder ähnlich wird der eine oder andere auf den Titel des vorliegenden Buches spontan reagieren. Das verwundert nicht, ist die Buch-Landschaft doch vor allem dadurch geprägt, dass Marketing-Werke und Abhandlungen zu marketingrelevanten Rechtsthemen am Büchermarkt stets "getrennt marschieren". Wer Marketingkonzepte entwirft, Vorhaben im Rahmen der Marketingforschung durchführen will oder beabsichtigt, Entscheidungen im Rahmen des Marketings zu treffen, sollte unseres Erachtens möglichst frühzeitig die gängigen "juristischen Fallstricke" erkennen und in seinen Überlegungen berücksichtigen.
Neues Lizenzmanagement
(2016)
IT-Controlling
(2016)
In this paper, several blocking techniques are applied to matrices that do not have a strong blocked structure. The aim is to efficiently use vectorization with current CPUs, even for matrices without an explicit block structure on nonzero elements. Different approaches are known to find fixed or variable sized blocks of nonzero elements in a matrix. We present a new matrix format for 2D rectangular blocks of variable size, allowing fill-ins per block of explicit zero values up to a user definable threshold. We give a heuristic to detect such 2D blocks in a sparse matrix. The performance of a Sparse Matrix Vector Multiplication for chosen block formats is measured and compared. Results show that the benefit of blocking formats depend – as to be expected – on the structure of the matrix and that variable sized block formats can have advantages over fixed size formats.
Mit den Themen Digitalisierung, Big Data, Industrie 4.0 und Cloud-Computing erfährt auch Geschäftsprozessmanagement immer mehr Aufmerksamkeit. Doch was sind die Treiber und Einflussfaktoren für erfolgreiches Business Process Management? Der BPM-Compass 2016 zeigt, dass Menschen auch während der digitalen Transformation entscheidend für erfolgreich umgesetzte Geschäftsprozesse sind.
This report summarises and integrates two different tracks of research for the purpose of envisioning and preparing a joint research project proposal. Soft- and hardware systems have become increasingly complex and act "concurrently", both with respect to memory access (i.e. information flow) and computational resources (i.e. "services"). The software development metaphor of cloud-storage, cloud-computing and service-oriented design has been anticipated by artificial intelligence (AI) research at least 30 years ago (parallel and distributed computation already dates back to the 1950’s and 1970s). What is known as a "service" today is what in AI is known as the capability of an agent; and the problem of information flow and consistency has been a headstone of information processing ever since. Based on a real-world robotics application we demonstrate how an increasingly abstract description of collaborating or competing agents correspond to a set of concurrent processes.
This paper presents the b-it-bots RoboCup@Work team and its current hardware and functional architecture for the KUKA youBot robot.We describe the underlying software framework and the developed capabilities required for operating in industrial environments including features such as reliable and precise navigation, flexible manipulation and robust object recognition.
The megatrends towards both a digital and a usership economy have changed entire markets in the past and will continue to do so over the next decades. In this work, we outline what this change means for possible futures of the mobility sector, taking the combination of trends in both economies into account. Using a sys-tematic, scenario-based trend analysis, we draft four general future scenarios and adapt the two most relevant scenarios to the automotive sector. Our findings show that combing the trends from both economies provides new insights that have often been neglected in literature because of an isolated view on digital technology only. However, service concepts such as self-driving car sharing or self-driving taxis have a great impact at various levels including microeconomic (e.g., service and product design, business models) and macroeconomic (e.g., with regard to ecological, economical, and social impacts). We give a brief outline of these issues and show which business mo dels could be successful in the most likely future scenarios, before we frame strategic implications for today’s automobile manufacturers.
Mobilitäts- und Nachhaltigkeitsforscher sehen sich bei der Erforschung des Mobilitätsverhaltens von Personen mit einer bunten Palette an Erhebungsmethoden konfrontiert. Erweitert wird diese Vielfalt in der letzten Zeit durch die Möglichkeit, dieses Verhalten direkt über die Smartphones der Probanden zu erfassen. Um die Auswahl geeigneter Methoden zu erleichtern, liefert die vorliegende Literaturstudie einen detaillierten Überblick zu Fragestellungen, Daten und Erhebungsmethoden, die im Bereich der Mobilitätsforschung zur Erfassung von Alltagsmobilität eingesetzt werden.
Scientists and engineers are using a distributed system Remote Component Environment (RCE) to design and simulate complex systems like airplanes, ships and satellites. During the simulation, RCE executes local and remote code. Remote code is classified as untrusted code. The execution of remote code comprises potential security risks for the host system of RCE. Additionally, RCE provides full access to system resources. The objective of this thesis is to implement a sandbox prototype to reduce the vulnerability of RCE during the execution of remote code.