Refine
H-BRS Bibliography
- yes (606) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (606) (remove)
Document Type
- Conference Object (606) (remove)
Year of publication
Keywords
- Virtual Reality (8)
- Robotics (7)
- Usable Security (7)
- CUDA (5)
- Machine Learning (5)
- 3D user interface (4)
- Benchmarking (4)
- Usable Privacy (4)
- machine learning (4)
- virtual reality (4)
- Human-Robot Interaction (3)
- Hyperspectral image (3)
- IP protection (3)
- Image Processing (3)
- LoRa (3)
- Measurement (3)
- Navigation (3)
- Quality diversity (3)
- Risk-based Authentication (3)
- Robot sensing systems (3)
- SpMV (3)
- Taxonomy (3)
- WiLD (3)
- clustering (3)
- robotics (3)
- security (3)
- serious games (3)
- virtual environments (3)
- 802.11 (2)
- Aerodynamics (2)
- Algorithms (2)
- Alternatives (2)
- Augmented Reality (2)
- Augmented reality (2)
- Authentication (2)
- Bag of Features (2)
- Big Data Analysis (2)
- Cognitive robot control (2)
- Computer Graphics (2)
- Computer Vision (2)
- Content Module (2)
- Cooperative Awareness Message (2)
- DPA (2)
- Distributed rendering (2)
- Educational institutions (2)
- Embedded software (2)
- Empirical study (2)
- Evolutionary computation (2)
- Explainable robotics (2)
- Eye Tracking (2)
- FDI (2)
- FPGA (2)
- Fault analysis (2)
- GDPR (2)
- GPU (2)
- Graphics Cards (2)
- Heart Rate Prediction (2)
- Higher education (2)
- IEEE802.11 (2)
- Indirect Encodings (2)
- Inductive Logic Programming (2)
- Intelligent virtual agents (2)
- Internet (2)
- Large, high-resolution displays (2)
- Learning from experience (2)
- LoRaWAN (2)
- Long-Distance WiFi (2)
- MAP-Elites (2)
- Natural Language Processing (2)
- Neuroevolution (2)
- Object recognition (2)
- OpenFlow (2)
- Original Story (2)
- Parallelization (2)
- Password (2)
- Pseudonym Concept (2)
- QoS (2)
- Quality Diversity (2)
- RE (2)
- Raman microscopy (2)
- Risk-based Authentication (RBA) (2)
- Robustness (2)
- SDN (2)
- Serious Games (2)
- Side-channel analysis (2)
- Software (2)
- Survey (2)
- Three-dimensional displays (2)
- User Interface Design (2)
- Vehicle-to-Vehicle Communication (2)
- Visualization (2)
- analysis (2)
- blockchain (2)
- classifier combination (2)
- edutainment (2)
- embedded systems (2)
- feature extraction (2)
- haptics (2)
- human factors (2)
- hypermedia (2)
- image fusion (2)
- interface design (2)
- machine vision (2)
- motion estimation (2)
- navigation (2)
- object categorization (2)
- pansharpening (2)
- path planning (2)
- surrogate modeling (2)
- 2D Level Design (1)
- 3D User Interface (1)
- 3D Visualisierung (1)
- 3D design (1)
- 3D gaming (1)
- 3D interfaces (1)
- 3D registration (1)
- 3D shape (1)
- 3D user interfaces (1)
- 450 MHz (1)
- AES (1)
- AI based translation (1)
- AMD Family 15h (1)
- ANSYS (1)
- ARM Cortex M3 Processor (1)
- ARRs (1)
- Abstract Syntax Tree (1)
- Acceptance (1)
- Account Security (1)
- Accuracy (1)
- Active Learning (1)
- Active locomotion (1)
- Actuators (1)
- Adaptation of Software (1)
- Air Pollution (1)
- Air pollution modeling (1)
- All-Swap Algorithm (1)
- Architectural Patterns (1)
- Assistive robots (1)
- Attention (1)
- Authentication features (1)
- Authorship watermark (1)
- Autoencoder (1)
- Autoimmune disease (1)
- Automatic Short Answer Grading (1)
- B2T (1)
- BCL2 (1)
- BFS (1)
- BLOB Detection (1)
- Ballastless track (1)
- Bayesian optimization (1)
- Beacon Chain (1)
- Behaviour-Driven Development (1)
- Best practice algorithms (1)
- Bicycle Simulator (1)
- Bioinformatics (1)
- Blob Detection (1)
- Block cipher (1)
- Blocking (1)
- Bond Graph models for fault detection and isolation (1)
- Bond graph modelling (1)
- Bound Volume Hierarchy (1)
- Bounding Box (1)
- Branch and cut (1)
- Business software (1)
- Business system (1)
- Business-to-Thing (1)
- CNN (1)
- CPA (1)
- CPU (1)
- CPUID instruction (1)
- CSR5BC (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Cell Processor (1)
- Cell/B.E. (1)
- Center-of-Mass (1)
- Channel assignment (1)
- Clusters (1)
- Co-located Collaboration (1)
- Co-located work (1)
- Code similarity analysis (1)
- Cognitive robotics (1)
- Collaborating industrial robots (1)
- Coloured pointclouds (1)
- Column (1)
- Comparative analysis (1)
- Compliant Manipulation (1)
- Compliant fingers (1)
- Component Models (1)
- Composition of Patterns (1)
- Compositional Pattern Producing Networks (1)
- Computational fluid dynamics (1)
- Computer architecture (1)
- Computer graphics (1)
- Computer-supported Cooperative Work (1)
- Computing methodologies (1)
- Concurrent repeated failure prognosis (1)
- Container Structure (1)
- Containerization (1)
- Content Analysis (1)
- Contextualized Attention Metadata (CAM) (1)
- Continual robot learning (1)
- Control (1)
- Corporate Social Responsibility (1)
- Correlative Microscopy (1)
- Cortex-M3 (1)
- Covert channel (1)
- Critical power (1)
- Cross-core (1)
- Crossmedia (1)
- Customization (1)
- Cypher (1)
- DAE systems (1)
- DFA Lab (1)
- DPA Lab (1)
- Data Fusion (1)
- Data Generation (1)
- Data Protection Officer (1)
- Dataflow Programming (1)
- Datalog (1)
- Datenschutz (1)
- Datensicherheit (1)
- Delph Study (1)
- Design Optimization (1)
- Design automation (1)
- Diagnostic bond graph-based online fault diagnosis (1)
- Difference Visualization (1)
- Differential analysis (1)
- Digital Ecosystem (1)
- Digital Storytelling (1)
- Digital common goods (1)
- Digital watermarking (1)
- Digitisation (1)
- Directional Antenna (1)
- Directional antennas (1)
- Distributed Robot Systems (1)
- Docker (1)
- Domain Expert (1)
- Domestic Robots (1)
- Domestic robotics (1)
- Domestic robots (1)
- Dynamic motion primitives (1)
- E-Health (1)
- EEG (1)
- ERP-software (1)
- ERP-system (1)
- Echtzeit (1)
- Eclipse Modeling Framework (1)
- Ego-Motion Estimation (1)
- Elderly People (1)
- Elliptic Curve Cryptography (1)
- Embedded system (1)
- Empirical Study (1)
- Employee data protection (1)
- Encryption (1)
- Enterprise software (1)
- Enterprise system (1)
- Estimation (1)
- Ethereum (1)
- Euronorm (1)
- Everyday object manipulation (1)
- Evolutionary algorithms (1)
- Exergame (1)
- Experiment (1)
- Experiment design (1)
- Expert Interviews (1)
- Explainability (1)
- Explainable Machine Learning (1)
- FPGA implementation (1)
- Fas (1)
- Fault Channel Watermarking Lab (1)
- Fault Detection & Diagnosis (1)
- Fault-channel watermarks (1)
- Feature extraction (1)
- Features (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Fingerprint watermark (1)
- Fixed spatial data (1)
- Flexible robots (1)
- Force (1)
- Force and tactile sensing (1)
- Force field (1)
- Forests (1)
- Free-Space Loss (FSL) (1)
- Frequency planning (1)
- Friction (1)
- Functional safety (1)
- Fusion (1)
- Future (1)
- Future Studies (1)
- Future of Robotics (1)
- Fuzzy logic (1)
- GPGPU (1)
- Game Engine (1)
- Games and Simulations for Learning (1)
- Garbage collection (1)
- Gaussian processes (1)
- Gaze Behavior (1)
- Gaze Depth Estimation (1)
- Gender Issues in Computer Science Education (1)
- Generation R (1)
- Generative Design (1)
- Generative Models (1)
- Geo-tagging (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheitswesen (1)
- Givens Rotations (1)
- Global Illumination (1)
- Gradient-boosting (1)
- Grailog (1)
- Graphical user interfaces (1)
- Grasping (1)
- Grounded Method (1)
- Group Behavior (1)
- Group behavior (1)
- Groupware (1)
- HCI (1)
- HCSS (1)
- HPC (1)
- HRI (1)
- HTTP (1)
- Hand Guidance (1)
- Hand Tracking (1)
- Hardware (1)
- Head-Mounted Displays (1)
- Head-mounted Display (1)
- Header whitelisting (1)
- Heat shrink tubing (1)
- High-performance computing (1)
- High-speed track (1)
- Human Factors (1)
- Human centered computing (1)
- Human computer interaction (1)
- Human-Centered Robotics (1)
- Human-robot interaction (1)
- Humanoid Robot (1)
- HyperNEAT (1)
- ICP (1)
- IEC 104 (1)
- IEC 61850 (1)
- IEEE 802.11 (1)
- IEEE 802.21 (1)
- Illumination algorithms (1)
- Image representation (1)
- Image-based rendering (1)
- Immersive Virtual Environments (1)
- Immersive Visualization Environment (1)
- Implementation Challenges (1)
- Increasing fault magnitude (1)
- Industrial robots (1)
- Information Security (1)
- Information Types (1)
- Information hiding (1)
- Information interaction (1)
- Informationssicherheit (1)
- Innovation (1)
- Instance-based learning (1)
- Instruction scheduling (1)
- Integer programming (1)
- Integrate Development Environment (1)
- Integrated circuit interconnections (1)
- Intel Xeon Phi (1)
- Intel processors (1)
- Intelligent Transport System (1)
- Interaction (1)
- Interaction Patterns (1)
- Interactive Smart Card Applications (1)
- Interference (1)
- Intermediaries (1)
- Intermittent faults (1)
- Internet of Things (1)
- Interoperability (1)
- Inventory (1)
- Issue Tracking Systems (1)
- Issue Types (1)
- Issue tracking systems (1)
- Java virtual machine (1)
- JavaScript (1)
- KNN (1)
- Knowledge Graphs (1)
- Knowledge representation (1)
- Kryptologie (1)
- LAA (1)
- LGCSR (1)
- LOTUS Sensor Node (1)
- LTE-M (1)
- LTE-U (1)
- Lattice Basis Reduction (1)
- Lead userness (1)
- Learning analytics (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Learning from demonstration (1)
- Learning systems (1)
- Lighting simulation (1)
- Linear regression (1)
- LoRa receiver accuracy (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Low-Power Wide Area Network (LP-WAN) (1)
- Lymphoproliferative disorder (1)
- MAC (1)
- MACE (1)
- MESD (1)
- MIMD (1)
- MOOC (1)
- MPLS (1)
- MQTT (1)
- Machine learning (1)
- Machine-learning (1)
- Main Memory (1)
- Maker space (1)
- Malware (1)
- Management (1)
- Manipulator (1)
- Markov Cluster Algorithm (1)
- Megatrends (1)
- Memory filesystem (1)
- Memory-Constrained Devices (1)
- Mesh networks (1)
- Microarchitectural Data Sampling (MDS) (1)
- Middleware and Programming Environments (1)
- Mining Software Repositories (1)
- Mining software repositories (1)
- Mixed (1)
- Mixed method evaluation (1)
- Mobile devices (1)
- Mobile manipulation (1)
- Mobile robots (1)
- Modalities (1)
- Model Fitting (1)
- Model-based Approach (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Modelica (1)
- Modular software packages (1)
- Molecular modeling (1)
- Morphological box (1)
- Morphological scheme (1)
- Motion Capture (1)
- Motion planning (1)
- Multi-Modal Interaction (1)
- Multi-Tenant Application (1)
- Multi-objective optimization (1)
- Multicast communication (1)
- Multilayer interaction (1)
- Multimodal (1)
- Multimodal Microspectroscopy (1)
- Multimodal optimization (1)
- Multiple Displays (1)
- Multithreaded and multicore architecture (1)
- Multiuser (1)
- Multivariate Time Series (1)
- Multivariate time series classification (1)
- Musical Performance (1)
- NEAT (1)
- NETCONF (1)
- NIR (1)
- NIR-point sensor (1)
- NISTPQC (1)
- NNS (1)
- NUMA (1)
- NURBS (1)
- NVIDIA Tesla (1)
- Narration Module (1)
- Natural language understanding (1)
- Natural scene text (1)
- Navigation interface (1)
- Networked Robots (1)
- Neural Machine Translation (1)
- Noise (1)
- Noise reduction (1)
- Numerical optimization (1)
- Nvidia graphic processors (1)
- OER (1)
- Object detection (1)
- Object-Based Image Analysis (OBIA) (1)
- Online Services (1)
- Open source firmware (1)
- Open-ended Robotic Discovery (1)
- Open-source (1)
- OpenACC (1)
- OpenDaylight (1)
- OpenMP, unrolling (1)
- OpenStack (1)
- Optimisation 3D (1)
- Outlier Detection (1)
- PDSTSP (1)
- PHR (1)
- PIR sensor units (1)
- PM2.5 estimation (1)
- Pain Reduction (1)
- Parallel I/O (1)
- Parallel Processing (1)
- Parallel drone scheduling traveling salesman problem (1)
- Parameter sensitivities of transfer functions (1)
- Parametric study (1)
- Path Loss (1)
- Path loss model (1)
- People Detection (1)
- Perception (1)
- Performance (1)
- Performance Simulation (1)
- Performance benchmarks (1)
- Performance prediction (1)
- Performance profiling (1)
- Periodic structures (1)
- Personal Health Record (1)
- Phenotypic niching (1)
- Physical exercising game platform (1)
- Pointing (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Pointing devices (1)
- Pose Estimation (1)
- Post-Quantum Signatures (1)
- Power Analysis (1)
- Prediction of physiological responses to strain (1)
- Predictive Models (1)
- Privacy (1)
- Privacy engineering (1)
- Probabilistic model (1)
- Project based learning (1)
- Proof of Stake (1)
- Propagation (1)
- Prototypes (1)
- Public Key Infrastructures (1)
- Q measurement (1)
- Quality control (1)
- RBAR (1)
- RGB-D (1)
- RGB-D data (1)
- RLE-XOR (1)
- RLE-permutation (1)
- RNN (1)
- RSSI (1)
- Radiofrequency identification (1)
- Radix Sort (1)
- Random number generator (1)
- Rapid Prototyping (1)
- Rapid prototyping (1)
- Ray Casting (1)
- Ray Tracing (1)
- Ray tracing (1)
- Re-authentication (1)
- Reasoning (1)
- Reconstruction Error (1)
- Reflectance modeling (1)
- Registration Refinement (1)
- Relational Learning (1)
- Remaining Useful Life (RUL) estimates (1)
- Render Cache (1)
- Repositories (1)
- Requirements (1)
- Requirements Communication (1)
- Requirements analysis (1)
- Requirements engineering in SMEs (1)
- Restorative Virtual Environments (1)
- Reusable Software (1)
- Reversible Logic Synthesis (1)
- Review (1)
- Rfid (Radio-Frequency Identification) (1)
- Risikoanalyse (1)
- Risk-Based Account Recovery (1)
- RoboCup (1)
- Robot commands (1)
- Robot competitions (1)
- Robot failure diagnosis (1)
- Robot kinematics (1)
- Robot learning (1)
- Robot software (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Revolutions (1)
- Robotics competitions (1)
- Robots (1)
- Robust grasping (1)
- Rotating Table Test (1)
- RuleML (1)
- Runtime Adaptation (1)
- Rural areas (1)
- S3D Video (1)
- S3D video (1)
- SAML (1)
- SDWN (1)
- SEMA (1)
- SIMD (1)
- SLIDE algorithm (1)
- SME (1)
- SOAP (1)
- SORT (1)
- SQL (1)
- SVG (1)
- Scalability (1)
- Scalable Vector Graphic (1)
- ScalarMultiplication (1)
- Scene text recognition, active vision, domestic robot, pantilt, auto-zoom, auto-focus, adaptive aperture control (1)
- Scholarly workbench (1)
- Scientific competency development (1)
- Scientific workbench (1)
- Second Life (1)
- Security (1)
- Self-supervised learning (1)
- Semantic gap (1)
- Semantics (1)
- SensorFusion (1)
- Separation algorithm (1)
- Service Robot (1)
- Service-Oriented Architecture (1)
- Sicherheitsanalyse (1)
- Sicherheitslücke (1)
- Side Channel Analysis (1)
- Side Channel Countermeasures (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side-channel watermarking (1)
- Signature Verification (1)
- Similarity matrix (1)
- Simulation (1)
- Simulator (1)
- Single Instruction Multiple Data (SIMD) (1)
- Skin detection (1)
- Slippage detection (1)
- Smart Card (1)
- Smart Grid (1)
- Smart InGaAs camera-system (1)
- Smartphones (1)
- Social Virtual Reality (1)
- Social engagement in university (1)
- Software Architectures (1)
- Software Development Process (1)
- Software Feature Request Detection (1)
- Software IP protection (1)
- Software Supply Chain (1)
- Software and Architecture (1)
- Software reverse engineering (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Sonar (1)
- Space exploration (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Sparse matrix format (1)
- Spatiotemporality (1)
- Spectrum occupancy (1)
- Spectrum optimization (1)
- Speech Act Theory (1)
- Split Axis (1)
- Standards (1)
- Star Trek (1)
- State machines (1)
- Stereoscopic Rendering (1)
- Stereoscopic rendering (1)
- Story Element (1)
- Streaming (1)
- Stress Management (1)
- Supervised learning (1)
- Supply chains (1)
- Support Vector Machine (1)
- Surrogate Modeling (1)
- Surrogate Modelling (1)
- Surrogate models (1)
- Swim Stroke Analysis (1)
- Switched power electronic systems (1)
- Symmetry detector (1)
- Synthetic perception (1)
- SystemVerilog (1)
- TLS (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Task Frame Formalism (1)
- Telecommunication network reliability (1)
- Telecommunication network routing (1)
- Telematik (1)
- Telematik-Software (1)
- Template Attacks (1)
- Temporally-weighted (1)
- Textureless objects (1)
- Tiled displays (1)
- Tiled-display walls (1)
- Time measurement (1)
- Timing analysis (1)
- Timing channel (1)
- TinyECC 2.0 (1)
- ToF Camera (1)
- Token (1)
- Touchscreen interaction (1)
- Toyota HSR (1)
- Traceability (1)
- Tracking by detection (1)
- Traffic Simulations (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Transfer learning (1)
- Transformers (1)
- Transforms (1)
- Transparency (1)
- Tree Stumps (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV (1)
- UAV teleoperation (1)
- UI design (1)
- Ultrasonic array (1)
- Uncertainty (1)
- Unidirectional thermoplastic composites (1)
- Unity (1)
- Unmanned Aerial Vehicle (UAV) (1)
- Urban (1)
- Usability (1)
- Usable Security and Privacy (1)
- User Roles (1)
- User Study (1)
- User-Centered Approach (1)
- VR (1)
- VR system design (1)
- Variability Management (1)
- Variability Resolution (1)
- Variational Autoencoder (1)
- Vector Intrinsics (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicular Ad hoc Networks (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Verifizierung (1)
- Verilog (1)
- Virtual Agents (1)
- Virtual Environments (1)
- Virtual attention (1)
- Virtual environments (1)
- Visualization design and evaluation methods (1)
- Visualization systems and tools (1)
- Volumenrendering (1)
- Vulnerable Groups (1)
- V˙CO2 prediction (1)
- V˙O2 prediction (1)
- WDS (1)
- WWW (1)
- Watermarking (1)
- Web (1)
- Web components (1)
- Whole body motion (1)
- Wi-Fi (1)
- WiAFirm (1)
- WiFi (1)
- WiFi-based Long Distance (WiLD) (1)
- Wireless Backhaul Network (1)
- Wireless Sensor Network (1)
- Wireless backhaul (1)
- XGBoost (1)
- XML (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XNA Game Studio (1)
- XSLT (1)
- Xeon Phi knights landing (1)
- YANG (1)
- YOLO (1)
- ZombieLoad (1)
- activation function (1)
- adaptive agents (1)
- adaptive binarization (1)
- adaptive filters (1)
- aerodynamics (1)
- affective computing (1)
- ambulatory monitoring (1)
- analyses (1)
- analytical redundancy relations (1)
- anomaly detection (1)
- artifacts (1)
- asset transfer (1)
- atomic instructions (1)
- audio-tactile feedback (1)
- augmented, and virtual realities (1)
- authoring tools (1)
- automation (1)
- background motion (1)
- bagging (1)
- bass-shaker (1)
- bicycle (1)
- biorder (1)
- bloat (1)
- body-centric cues (1)
- brain computer interfaces (1)
- brightfield microscopy (1)
- bus load (1)
- camera-based person detection (1)
- can bus (1)
- chemical sensors (1)
- client-side component model (1)
- co-located collaboration (1)
- cognitive radio (1)
- collaboration (1)
- collaborative learning (1)
- colorimetry (1)
- commuting (1)
- compensation (1)
- component analyses (1)
- component based (1)
- computational causalities (1)
- computational logic (1)
- computer games (1)
- computer-supported collaborative work (1)
- cooperative path planning (1)
- correlation (1)
- crawling (1)
- cross-disciplinary (1)
- cryptocurrency (1)
- cuSPARSE (1)
- data locality (1)
- data logging (1)
- data visualisation (1)
- database systems (1)
- decision tree learning (1)
- dependable robots (1)
- depth perception (1)
- diagnostic bond graphs (1)
- digital co-creation (1)
- digital platform ecosystem (1)
- digital storytelling (1)
- dimensionality reduction (1)
- direct feedback (1)
- directed hypergraphs (1)
- directional antennas (1)
- disabled people (1)
- distributed authoring (1)
- distributed processing (1)
- diversity (1)
- driving (1)
- drone video quality (1)
- dynamic vector fields (1)
- e-learning course structure (1)
- echo state network (1)
- eco-driving (1)
- embedded collaborative learning (1)
- embodied interfaces (1)
- emotion computing (1)
- energy efficient transportation (1)
- energy optimal driving (1)
- evolution strategies (1)
- evolutionary illumination (1)
- evolved neural network controller (1)
- evolving look ahead controllers (1)
- explainable gesture recognition (1)
- exploration (1)
- eye-tracking (1)
- faults in robotics (1)
- feature (1)
- feature selection (1)
- flight zone (1)
- forms of mathematical models (1)
- foveated rendering (1)
- fpga (1)
- full-body interface (1)
- fuzzy logic (1)
- game engine (1)
- gamification (1)
- gaming (1)
- generation of ARRs (1)
- generative design (1)
- geofence (1)
- graphs (1)
- guidance (1)
- hand guidance (1)
- haptic feedback (1)
- heat shrink tubes (1)
- heterogeneous networks (1)
- heuristics (1)
- hierarchical clustering (1)
- higher education (1)
- holography (1)
- human-centric lighting (1)
- human-robot collaboration (1)
- hypermedia applications (1)
- iOER (1)
- ideal switches (1)
- ideation (1)
- image sequence processing (1)
- immersion (1)
- immersive systems (1)
- incremental bond graphs (1)
- industrial robots (1)
- information display methods (1)
- innovative work behavior (1)
- intelligent pedestrian counter (1)
- interaction (1)
- interaction techniques (1)
- interactive distributed rendering (1)
- intercultural learning (1)
- interference (1)
- international (1)
- international teams (1)
- intrinsics (1)
- inverse model (1)
- issue tracker (1)
- knowledge engineering (1)
- knowledge graphs (1)
- knowledge-management (1)
- leaning (1)
- leaning, self-motion perception (1)
- learning object repositories (1)
- learning-based fault detection and diagnosis (1)
- light curtains (1)
- linguistic variable (1)
- linguistic variables (1)
- link calibration (1)
- long-distance 802.11 (1)
- measurement (1)
- mechatronic systems (1)
- medical training (1)
- memory bandwidth (1)
- mesoscopic agents (1)
- microcomputers (1)
- microcontroller (1)
- mininig software repositories (1)
- mobile or handheld device (1)
- mobile projection (1)
- mobile robots (1)
- mobile web (1)
- mode switching LTI models (1)
- modular web (1)
- momentary frequency (1)
- monitoring (1)
- morphological operator (1)
- motion control (1)
- motion cueing (1)
- motion platform (1)
- motion trajectory enhancement (1)
- multi causal strain (1)
- multi robot systems (1)
- multi-layer display (1)
- multi-screen visualization environments (1)
- multi-user VR (1)
- multibody systems (1)
- multidisciplinary (1)
- multiple Xbox 360 (1)
- multiple computer systems (1)
- multiresolution analysis (1)
- multisensory cues (1)
- multisensory interface (1)
- naive physics (1)
- natural user interface (1)
- near-infrared (1)
- neural networks (1)
- neuroevolution (1)
- noise suppression (1)
- nomadic text entry (1)
- nonlinear storytelling (1)
- object identification (1)
- object-oriented physical systems modelling (1)
- open educational resources (OERs) (1)
- optical safeguard sensor (1)
- optimal control (1)
- optimal control problem (1)
- parallel BFS (1)
- parallel breadth-first search (1)
- parallel difference visualization (1)
- parameter sensitivities of residuals of ARRs (1)
- payment protocol (1)
- pedestrian counting system (1)
- pedestrian movements (1)
- pen interaction (1)
- performance optimizations (1)
- peripheral vision (1)
- peripheral visual field (1)
- photometry (1)
- physical activity (1)
- physical model immersive (1)
- physiological monitoring (1)
- preprocessing (1)
- project-based learning (1)
- projection (1)
- property-based testing for robots (1)
- prototype theory (1)
- proxemics (1)
- pseudo-random number generator (1)
- quality-diversity (1)
- question answering (1)
- recurrent neural network function (1)
- redundant work (1)
- reference dataset (1)
- regression (1)
- reinforcement learning (1)
- remote diagnosis (1)
- remote sensing (1)
- remote-controlled robots (1)
- rendering (computer graphics) (1)
- requirements (1)
- requirements analysis (1)
- requirements management (1)
- residual sinks (1)
- resource utilization (1)
- robot action diagnosability (1)
- robot component monitoring (1)
- robot dynamics (1)
- robot execution failures (1)
- robot kinematics (1)
- robotic black box (1)
- robots (1)
- rules (1)
- rural areas (1)
- scene element representation (1)
- screens (display) (1)
- see-through display (1)
- see-through head-mounted displays (1)
- self-configuration (1)
- self-management (1)
- semantic image seg-mentation (1)
- semi-supervised learning (1)
- sensor data acquisition (1)
- sensor data transmission (1)
- sensor-based fault detection and diagnosis (1)
- service activities (1)
- service robots (1)
- short-term memory (1)
- simulation-based robot testing (1)
- simulator (1)
- skin detection (1)
- software engineering (1)
- software-based feedback agents (1)
- spectral rendering (1)
- spectrum scan (1)
- spectrum sensing (1)
- speech recognition (1)
- speech understanding (1)
- stereoscopic vision (1)
- story authoring (1)
- strain (1)
- stress (1)
- stress detection (1)
- structural equation modeling (1)
- submillimeter precision (1)
- support vector machine (1)
- surface textures (1)
- surface topography (1)
- synthetic dataset (1)
- teaching (1)
- telepresence (1)
- territoriality (1)
- text entry in motion (1)
- text mining (1)
- tiled displays (1)
- time series processing (1)
- touchscreen (1)
- traffic surveillance (1)
- transfer learning (1)
- true random number generator (1)
- ultrasonic sensor (1)
- un-manned aerial vehicle (1)
- unexpected situations (1)
- unique bond graph representation for all modes of operation (1)
- unmanned ground vehicle (1)
- unstructured data (1)
- usability (1)
- usable secure email (1)
- usage contexts (1)
- usage data analysis (1)
- user documentation (1)
- user engagement (1)
- user interface design (1)
- user study (1)
- vection (1)
- verification and validation of robot action execution (1)
- vibration (1)
- virtual environment framework (1)
- virtual locomotion (1)
- virtual or soft keyboard (1)
- visual quality control (1)
- visualisation (1)
- visualization (1)
- visuohaptic feedback (1)
- walking (1)
- web (1)
- web components (1)
- web technology (1)
- website (1)
- welfare technology (1)
- whole-body interface (1)
- wireless communication (1)
- wireless performance (1)
- wmSDN (1)
- workspace awareness (1)
- xorshift-generator (1)
- youBot (1)
- zooming interface (1)
Diese Arbeit präsentiert eine Methode zur zuverlässigen Personendetektion für die Absicherung des Arbeitsbereichs von Industrierobotern. Hierzu wird ein im Nahinfrarotbereich (NIR) arbeitendes aktives Kamerasystem eingesetzt, das durch erweiterte und robuste Hauterkennungseigenschaften besonders dazu geeignet ist, zwischen verschiedensten Materialoberflächen und menschlicher Haut zu unterscheiden. So soll zum einen die Erkennungsleistung gegenüber handelsüblichen, im visuellen Bereich arbeitenden RGB-Kamerasystemen gesteigert werden und gleichzeitig eine „intelligente“ Form des Mutings realisiert werden. Die im Rahmen des Projekts „Sichere Personendetektion im Arbeitsbereich von Industrierobotern durch ein aktives NIR-Kamerasystem (SPAI)“ entwickelte und hier vorgestellte Methode erreicht in einer ersten Variante eine pixelweise Personenerkennungsrate von ca. 98,16%.
Zuverlässige Ad-Hoc Kommunikation mobiler Endgeräte mit satellitengestützter Internet-Anbindung
(2005)
Mobile Datenkommunikation basiert üblicherweise auf der drahtlosen Anbindung eines Endgerätes an eine Basisstation, die ihrerseits an eine feste Infrastruktur angebunden ist. In vielen Szenarien sind diese Voraussetzungen jedoch nicht gegeben. Beispiele hierfür sind Hochwasser, Erdbeben oder Flugzeugabstürze in dünn besiedelten Regionen. Einen Lösungsansatz für sich daraus ergebende Anforderungen bieten dynamisch aufgebaute Ad-Hoc Netze mit einer satellitengestützten Anbindung an eine Festnetz-Infrastruktur. In solchen Netzen stellen die mobilen Terminals die benötigte lokale Infrastruktur selbst dynamisch her. Ziel der hier vorgestellten Arbeiten ist es, die Zuverlässigkeit und Dienstqualität der verwendeten Technologien zu untersuchen und durch geeignete Mechanismen so anzupassen, dass die Anforderungen typischer Applikationen möglichst erfüllt werden. Zur Demonstration wurde ein Prototyp aufgebaut, der unter anderem die Anwendungen "Voice over IP" (VoIP), "Datenbankzugriff im Intranet" und Internetzugang (WWW) untersucht.
Along with the success of the digitally revived stereoscopic cinema, other events beyond 3D movies become attractive for movie theater operators, i.e. interactive 3D games. In this paper, we present a case that explores possible challenges and solutions for interactive 3D games to be played by a movie theater audience. We analyze the setting and showcase current issues related to lighting and interaction. Our second focus is to provide gameplay mechanics that make special use of stereoscopy, especially depth-based game design. Based on these results, we present YouDash3D, a game prototype that explores public stereoscopic gameplay in a reduced kiosk setup. It features live 3D HD video stream of a professional stereo camera rig rendered in a real-time game scene. We use the effect to place the stereoscopic effigies of players into the digital game. The game showcases how stereoscopic vision can provide for a novel depth-based game mechanic. Projected trigger zones and distributed clusters of the audience video allow for easy adaptation to larger audiences and 3D movie theater gaming.
In this paper, we present XPERSim, a 3D simulator built on top of open source components that enables users to quickly and easily construct an accurate and photo-realistic simulation for robots of arbitrary morphology and their environments. While many existing robot simulators provide a good dynamics simulation, they often lack the high quality visualization that is now possible with general-purpose hardware. XPERSim achieves such visualization by using the Object-Oriented Graphics Rendering Engine 3D (Ogre) engine to render the simulation whose dynamics are calculated using the Open Dynamics Engine (ODE). Through XPERSim’s integration into a component-based software integration framework used for robotic learning by experimentation, XPERSIF, and the use of the scene-oriented nature of the Ogre engine, the simulation is distributed to numerous users that include researchers and robotic components, thus enabling simultaneous, quasi-realtime observation of the multiple-camera simulations.
XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case study. In doing so, we highlight several deficiencies in defending against XSW. Using this real-world contemporary example as motivation, we introduce a guideline for more secure XML signature processing that provides practitioners with easier access to the effective countermeasures identified in the current state of research.
In this contribution, we describe the activities and promotion programs installed at the Bonn-Rhein-Sieg University as an institution and at the Department of Computer Science respectively for increasing the total number of computer science students and in particular the female rate. We report about our experiences in addressing gender aspects in education and try to evaluate the outcome of our programs with respect to our equal rights for women strategy. We propose a closer look at mental self-theories enabled by E-portfolios to address also gender issues in Computer Science. Moreover, reasons are identified and discussed which may be responsible for the reduced interest in particular of female young adults to choose a computer science study program.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users. To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
Application systems are often advertised with features, and features are used heavily for requirements man- agement. However, often software manufacturers only have incomplete information about the features of their software. The information is distributed over different sources, such as requirements documents, issue trackers, user manuals, and code. In this paper, we research the occurrence of feature information in open source software engineering data. We report on a case study with three open source systems. We analyze what information about features can be found in issue trackers and user documentation. Furthermore, we study the abstraction levels on which the features are described, how feature information is related, and we discuss the possibility to discover such information semi-automatically. To mirror the diversity of software development contexts, we choose open source systems, which are quite different, e.g., in the rigor of issue tracker usage. The results differ accordingly. One main result is that the user documentation did not provide more accurate information than the issue tracker compared to a provided feature list. The results also give hints on how the management of feature relevant information can be supported.
Web-based Editor for YAWL
(2013)
This paper presents a web-based editor that offers YAWL editing capabilities and comprehensive support for the XML format of YAWL. The open-source project Signavio Core Components is extended with a graphical user interface (GUI) for parts of the YAWL Language, and an import-/export component that converts between YAWL and the internal format of Signavio Core Components. This conversion, between the web-based editor and the offcial YAWL Editor, is lossless so both tools may be used together. Compared to the offcial YAWL Editor, the web-based editor is missing some features, but could still facilitate the usage of the YAWL system in use cases that are not supported by a desktop application.
In diesem Beitrag wird der interaktive Volumenrenderer Volt für die NVIDIA CUDA Architektur vorgestellt. Die Beschleunigung wird durch das Ausnutzen der technischen Eigenschaften des CUDA Device, durch die Partitionierung des Algorithmus und durch die asynchrone Ausführung des CUDA Kernels erreicht. Parallelität wird auf dem Host, auf dem Device und zwischen Host und Device genutzt. Es wird dargestellt, wie die Berechnungen durch den gezielten Einsatz der Ressourcen effizient durchgeführt werden. Die Ergebnisse werden zurückkopiert, so dass der Kernel nicht auf dem zur Anzeige bestimmten Device ausgeführt werden muss. Synchronisation der CUDA Threads ist nicht notwendig.
In this contribution a machine vision inspection system is presented which is designed as a length measuring sensor. It is developed to be applied to a range of heat shrink tubes, varying in length, diameter and color. The challenges of this task were the precision and accuracy demands as well as the real-time applicability of the entire approach since it should be realized in regular industrial line production. In production, heat shrink tubes are cut to specific sizes from a continuous tube. A multi-measurement strategy has been developed, which measures each individual tube segment several times with sub pixel accuracy while being in the visual field. The developed approach allows for a contact-free and fully automatic control of 100% of produced heat shrink tubes according to the given requirements with a measuring precision of 0.1mm. Depending on the color, length and diameter of the tubes considered, a true positive rate of 99.99% to 100% has been reached at a true negative rate of > 99.7.