Refine
H-BRS Bibliography
- yes (74) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (74) (remove)
Document Type
- Conference Object (36)
- Article (20)
- Preprint (7)
- Doctoral Thesis (5)
- Book (monograph, edited volume) (2)
- Part of a Book (2)
- Report (1)
- Working Paper (1)
Year of publication
- 2023 (74) (remove)
Keywords
- Virtual Reality (3)
- GDPR (2)
- Higher education (2)
- Quality diversity (2)
- Risk-based Authentication (2)
- Robotics (2)
- Survey (2)
- robot introspection (2)
- 16S rRNA gene sequencing (1)
- 3D user interface (1)
- 450 MHz (1)
- Account (Datenverarbeitung) (1)
- Agent-Based Modeling (1)
- Air Pollution (1)
- Air pollution modeling (1)
- Attention (1)
- Augmented Reality (1)
- Authentifikation (1)
- Bacteria, Anaerobic (1)
- Bayesian optimization (1)
- Behaviour-Driven Development (1)
- Big Data Analysis (1)
- CNN (1)
- Cervical cancer screening (1)
- Cervicovaginal microbiome (1)
- Climate Risks (1)
- Colposcopy (1)
- Column (1)
- Compositional Pattern Producing Networks (1)
- Computational chemistry (1)
- Computational modeling (1)
- Computer Science - Computer Vision and Pattern Recognition (1)
- Computer Science - Learning (1)
- Computer Vision (1)
- Computersicherheit (1)
- Concurrent repeated failure prognosis (1)
- Crossmedia (1)
- Cybersickness (1)
- DNA extraction protocols (1)
- DNA profile (1)
- Data Fusion (1)
- Data Protection Officer (1)
- Diagnostic bond graph-based online fault diagnosis (1)
- Digital Ecosystem (1)
- EN-12299 (1)
- ERP (1)
- ERP-Software (1)
- Efficiency (1)
- Elephantiasis (1)
- Enterprise Resource Planning (1)
- Euler–Bernoulli beam (1)
- Expert Interviews (1)
- Explainability (1)
- FOS: Computer and information sciences (1)
- Features (1)
- Forests (1)
- Funktionsmodell (1)
- Games and Simulations for Learning (1)
- HPV diagnostic (1)
- High-speed railway track (1)
- Hochschulehre (1)
- Human computer interaction (1)
- Human factors (1)
- Human-Centered Design (1)
- Human-robot interaction (1)
- Humans (1)
- IEC 104 (1)
- IEC 61850 (1)
- Implementation Challenges (1)
- Increasing fault magnitude (1)
- Inductive Logic Programming (1)
- Information Security (1)
- Informations-, Kommunikations- und Medientechnologie (1)
- Interbank Market (1)
- Intermittent faults (1)
- Interventionstudie (1)
- Java <Programmiersprache> (1)
- Knowledge representation (1)
- LTE-M (1)
- Lagerverwaltung (1)
- Large-Scale Online Services (1)
- Lattice Boltzmann Method (1)
- Leg (1)
- Lehr-Lernpsychologie (1)
- Lernen (1)
- Lernumgebung (1)
- Liquidity Crises (1)
- Locomotion (1)
- Login (1)
- Lymphedema (1)
- MQTT (1)
- Machine Learning (1)
- Machine learning (1)
- Materialwissenschaften (1)
- Model-driven engineering (1)
- Motion Sickness (1)
- Multivariate time series classification (1)
- NGS (1)
- Object-Based Image Analysis (OBIA) (1)
- OpenStack (1)
- Optimization (1)
- Outlier Detection (1)
- PCR inhibitors (1)
- PM2.5 estimation (1)
- PSD (1)
- Passwort (1)
- Privacy patterns (1)
- Prudential Regulation (1)
- Python <Programmiersprache> (1)
- RMS acceleration (1)
- RNN (1)
- Reasoning (1)
- Reconstruction Error (1)
- Remaining Useful Life (RUL) estimates (1)
- Requirements (1)
- Requirements Engineering (1)
- Review (1)
- RoboCup (1)
- Robotics (cs.RO) (1)
- Rotating Table Test (1)
- SIMPACK (1)
- SORT (1)
- Serious Games (1)
- Skin (1)
- Smart Grid (1)
- Software (1)
- Spatiotemporality (1)
- Taxonomy (1)
- Temporally-weighted (1)
- Tracking by detection (1)
- Traffic Simulations (1)
- Travel Techniques (1)
- Tree Stumps (1)
- Unmanned Aerial Vehicle (UAV) (1)
- Usable Privacy (1)
- Usable Security (1)
- Usable Security and Privacy (1)
- User experience design (1)
- User-Centered Design (1)
- User-centered privacy engineering (1)
- Virtual Agents (1)
- Virtuelle Realität (1)
- Visual Computing (1)
- Vulnerable Groups (1)
- XGBoost (1)
- YOLO (1)
- analyses (1)
- analysis (1)
- authoring tools (1)
- automation of sample processing (1)
- bioinformatics (1)
- bond graph (1)
- built environment (1)
- cellular automata (1)
- component analyses (1)
- crawling (1)
- database systems (1)
- deep learning (1)
- degraded DNA (1)
- design process (1)
- explainable gesture recognition (1)
- extraction-linked bias (1)
- forensic (1)
- frequency (1)
- guidance (1)
- haptics (1)
- high speed railway vehicle (1)
- high-throughput DNA sequencing (1)
- high-throughput sequencing (1)
- higher education (1)
- hospital environment (1)
- hospital-acquired infections (1)
- human microbiome (1)
- hybrid robot skill representation (1)
- irregularity amplitude (1)
- knowledge graphs (1)
- leaning (1)
- locomotion (1)
- massive parallel sequencing (1)
- microbial community structure (1)
- microbial ecology (1)
- microbiome (1)
- microbiome analyses (1)
- modal superposition (1)
- multi-solution optimization (1)
- multisensory (1)
- natural language processing (1)
- next generation sequencing (1)
- open educational resources (OERs) (1)
- parametric (1)
- power spectral density (1)
- pre-optimization (1)
- question answering (1)
- rds encoding (1)
- remote sensing (1)
- representation (1)
- ride comfort (1)
- robot context awareness (1)
- robot execution failures (1)
- robot failure diagnosis (1)
- robot skill execution failures (1)
- robot skill generalisation (1)
- semi-continuous locomotion (1)
- semi-supervised learning (1)
- sensory perception (1)
- short tandem repeat (1)
- skill execution models (1)
- software engineering (1)
- spatial updating (1)
- teleportation (1)
- text mining (1)
- track irregularity (1)
- traffic surveillance (1)
- transfer learning (1)
- virtual reality (1)
- web (1)
- website (1)
- wind nuisance (1)
- wireless performance (1)
The European General Data Protection Regulation requires the implementation of Technical and Organizational Measures (TOMs) to reduce the risk of illegitimate processing of personal data. For these measures to be effective, they must be applied correctly by employees who process personal data under the authority of their organization. However, even data processing employees often have limited knowledge of data protection policies and regulations, which increases the likelihood of misconduct and privacy breaches. To lower the likelihood of unintentional privacy breaches, TOMs must be developed with employees’ needs, capabilities, and usability requirements in mind. To reduce implementation costs and help organizations and IT engineers with the implementation, privacy patterns have proven to be effective for this purpose. In this chapter, we introduce the privacy pattern Data Cart, which specifically helps to develop TOMs for data processing employees. Based on a user-centered design approach with employees from two public organizations in Germany, we present a concept that illustrates how Privacy by Design can be effectively implemented. Organizations, IT engineers, and researchers will gain insight on how to improve the usability of privacy-compliant tools for managing personal data.
Users should always play a central role in the development of (software) solutions. The human-centered design (HCD) process in the ISO 9241-210 standard proposes a procedure for systematically involving users. However, due to its abstraction level, the HCD process provides little guidance for how it should be implemented in practice. In this chapter, we propose three concrete practical methods that enable the reader to develop usable security and privacy (USP) solutions using the HCD process. This chapter equips the reader with the procedural knowledge and recommendations to: (1) derive mental models with regard to security and privacy, (2) analyze USP needs and privacy-related requirements, and (3) collect user characteristics on privacy and structure them by user group profiles and into privacy personas. Together, these approaches help to design measures for a user-friendly implementation of security and privacy measures based on a firm understanding of the key stakeholders.
This paper presents the b-it-bots RoboCup@Work team and its current hardware and functional architecture for the KUKA youBot robot. We describe the underlying software framework and the developed capabilities required for operating in industrial environments including features such as reliable and precise navigation, flexible manipulation, robust object recognition and task planning. New developments include an approach to grasp vertical objects, placement of objects by considering the empty space on a workstation, and the process of porting our code to ROS2.
Neuromorphic computing aims to mimic the computational principles of the brain in silico and has motivated research into event-based vision and spiking neural networks (SNNs). Event cameras (ECs) capture local, independent changes in brightness, and offer superior power consumption, response latencies, and dynamic ranges compared to frame-based cameras. SNNs replicate neuronal dynamics observed in biological neurons and propagate information in sparse sequences of ”spikes”. Apart from biological fidelity, SNNs have demonstrated potential as an alternative to conventional artificial neural networks (ANNs), such as in reducing energy expenditure and inference time in visual classification. Although potentially beneficial for robotics, the novel event-driven and spike-based paradigms remain scarcely explored outside the domain of aerial robots.
To investigate the utility of brain-inspired sensing and data processing in a robotics application, we developed a neuromorphic approach to real-time, online obstacle avoidance on a manipulator with an onboard camera. Our approach adapts high-level trajectory plans with reactive maneuvers by processing emulated event data in a convolutional SNN, decoding neural activations into avoidance motions, and adjusting plans in a dynamic motion primitive formulation. We conducted simulated and real experiments with a Kinova Gen3 arm performing simple reaching tasks involving static and dynamic obstacles. Our implementation was systematically tuned, validated, and tested in sets of distinct task scenarios, and compared to a non-adaptive baseline through formalized quantitative metrics and qualitative criteria.
The neuromorphic implementation facilitated reliable avoidance of imminent collisions in most scenarios, with 84% and 92% median success rates in simulated and real experiments, where the baseline consistently failed. Adapted trajectories were qualitatively similar to baseline trajectories, indicating low impacts on safety, predictability and smoothness criteria. Among notable properties of the SNN were the correlation of processing time with the magnitude of perceived motions (captured in events) and robustness to different event emulation methods. Preliminary tests with a DAVIS346 EC showed similar performance, validating our experimental event emulation method. These results motivate future efforts to incorporate SNN learning, utilize neuromorphic processors, and target other robot tasks to further explore this approach.
Der Programmier-Trainingsplan für alle, die weiter kommen wollen.
In diesem Übungsbuch trainierst du anhand von kurzweiligen und praxisnahen Aufgaben deine Programmierfähigkeiten. Jedes Kapitel beginnt mit einem kurzen Warmup zum behandelten Programmierkonzept; die Umsetzung übst du dann anhand von zahlreichen Workout-Aufgaben. Du startest mit einfachen Aufgaben und steigerst dich hin zu komplexeren Fragestellungen. Damit dir nicht langweilig wird, gibt es über 150 praxisnahe Übungen. So lernst du z. B. einen BMI-Rechner oder einen PIN-Generator zu programmieren oder wie du eine Zeitangabe mit einer analogen Uhr anzeigen kannst. (Verlagsangaben)