Refine
H-BRS Bibliography
- no (629) (remove)
Departments, institutes and facilities
Document Type
- Conference Object (629) (remove)
Year of publication
Has Fulltext
- no (629) (remove)
Keywords
- Cloud (4)
- DPA (4)
- E-Learning (4)
- Privacy (4)
- Barriers (3)
- HTTP (3)
- OER (3)
- Power Analysis (3)
- REST (3)
- Receivers (3)
- Security (3)
- Stochastic Model (3)
- Web (3)
- end user development (3)
- security (3)
- visualization (3)
- web caching (3)
- web services (3)
- Basic Access Control (2)
- Boolean Masking (2)
- Claim personal data (2)
- Cloud Security (2)
- Culture (2)
- Data takeout (2)
- E-Passport (2)
- EBSD (2)
- Educational Culture (2)
- Equipment and services (2)
- Fourier transforms (2)
- GDPR (2)
- Heterodyning (2)
- Host-Based Code Injection Attacks (2)
- Inclusion (2)
- Learning Culture Survey (2)
- MRTD (2)
- Malware analysis (2)
- Memory forensics (2)
- Mobility (2)
- Non-linear systems (2)
- Open Educational Resources (2)
- Optics (2)
- Oscillators (2)
- Performance Analysis (2)
- SOA (2)
- Sensors (2)
- Shared autonomous vehicles (2)
- Side Channel Cryptanalysis (2)
- Social Software (2)
- Spectrometers (2)
- Sustainability (2)
- TEL (2)
- TLS (2)
- Technology Enhanced Learning (2)
- Telescopes (2)
- Template Attack (2)
- Usable Security (2)
- WS-Security (2)
- design case study (2)
- knowledge learning (2)
- neural networks (2)
- reliability (2)
- virtual reality (2)
- wire bonding (2)
- AES hardware (1)
- API usability (1)
- Adaptive Media Streaming (1)
- Advance Encryption Standard (1)
- Adversarial Model (1)
- Agent-oriented software engineering (1)
- Alternde Gesellschaft (1)
- Appropriateness (1)
- Articulation Work (1)
- Astronomy (1)
- Attacks and Attack Implementations (1)
- Authentication (1)
- Autonomous Driving (1)
- Bewegungsmotivation (1)
- Biometrics (1)
- Black Hole (1)
- Boolean and arithmetic operations (1)
- Botnet tracking (1)
- Browser cache (1)
- COPACOBANA (1)
- CRT (1)
- Cache Poisoning (1)
- Change (1)
- Cipher Block Chain (1)
- Clean Energy and Power Systems (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- Community (1)
- Computer Security (1)
- Computer Simulation Techniques (1)
- Computer Support (1)
- Computer hardware (1)
- Concurrent Kleene Algebra (1)
- Conformance Testing (1)
- Constructionism (1)
- Conversational Interface (1)
- Cooperative Work (1)
- Cryptography (1)
- Cultural Distance (1)
- Culture Awareness (1)
- Culture-Related Conflicts in Education (1)
- Culture-Sensible Education (1)
- DEMA (1)
- DES (1)
- DNSSEC (1)
- DSGVO (1)
- Data Compression (1)
- Data Reduction (1)
- Data Tiles (1)
- Datenschutz (1)
- Datenschutzerklärungen (1)
- Denial of Service (1)
- Design patterns (1)
- Difference-coding (1)
- Differential Side Channel Cryptanalysis (1)
- Differential side-channel analysis (1)
- Digitaler Konsum (1)
- Disaster Area (1)
- Distance Bounding (1)
- Distribute Software Development (1)
- E-Learning 2.0 (1)
- E-Learning 3.0 (1)
- EM Algorithm (1)
- Educational Standards (1)
- Elderly (1)
- Electromagnetic Analysis (1)
- Electromagnetic wave propagation (1)
- Electronic Immobilizer (1)
- Enterprise Resource Planning (1)
- Evaluation (1)
- Explainability (1)
- Explainable artificial intelligence (1)
- Fake Link (1)
- Fault analysis (1)
- File carving (1)
- Food (1)
- Forschungsprojekt (1)
- Fourier optics (1)
- Fourier transform spectra (1)
- Fragmented files (1)
- Frequency conversion (1)
- Frontend architecture (1)
- Full-text Search (1)
- Gaussian Mixture Models (1)
- Gesundheit (1)
- Global Software Development (1)
- Globally convergent methods (1)
- Grassroots (1)
- HCI (1)
- HFI (1)
- HMAC-construction (1)
- Hall-Petch relation (1)
- Hardware Testbed (1)
- Hauswirtschaft (1)
- High-Order Attacks (1)
- Higher-Order Analysis (1)
- Higher-Order Side Channel Analysis (1)
- Holographic interferometry (1)
- Holography (1)
- Human computer interaction (1)
- Human factors (1)
- Human-agent interaction (1)
- IDEA (1)
- IEEE 802.11 (1)
- IEEE 802.11n (1)
- Impaired (1)
- Implementation Attack (1)
- Informational self-determination (1)
- Informationssicherheit (1)
- Instructor Support (1)
- Instrumented indentation experiments (1)
- Integrierungsmethodik (1)
- Intelligence Amplification (1)
- Intelligence Augmentation (1)
- Internet (1)
- Internet Technology (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- Jobs (1)
- Kalman filter (1)
- Key Search Machine (1)
- Knowledge sharing (1)
- Kommunikationsvernetzung (1)
- Laws of programming (1)
- Learner’s Preferences (1)
- Learning (1)
- Learning 2.0 (1)
- Learning 3.0 (1)
- Learning Context (1)
- Learning Environments (1)
- Learning Management Systems (1)
- Legal Design (1)
- Living Labs (1)
- Long-distance (1)
- MEMS glass frit (1)
- MIMO (1)
- MPLS (1)
- MR-WMN (1)
- MRTD Cracker (1)
- Machine Learning (1)
- Mafia Attack (1)
- Malware (1)
- Malware Detection (1)
- Maximum Likelihood Principle (1)
- Mental Models (1)
- Message Authentication (1)
- Microservices (1)
- Minimum Principle (1)
- Mobility Model (1)
- Mobility modeling (1)
- Modal Shift (1)
- Model-based engineering approaches to AI safety (1)
- Motion Generator (1)
- Motivators (1)
- Motor Control Unit (1)
- Multi-hop Net-works (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Multivariate Side Channel Analysis (1)
- Nachhaltigkeit (1)
- Norm (1)
- Onion Model of Culture (1)
- Open Educational Practices (1)
- Paketvermittlung (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Participatory Design (1)
- Participatory Design Approach (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Performance (1)
- Performance Evaluation (1)
- Persuasive Systeme (1)
- Phishing (1)
- Physical Security (1)
- Platform economy (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Privatsphäre (1)
- Pulsars (1)
- Push-based Streaming (1)
- QoS (1)
- Qualitative research (1)
- Qualitäts-Service (1)
- RC6 (1)
- REST security (1)
- RF Eavesdropper (1)
- RFID (1)
- RSA (1)
- Radio astronomy (1)
- Rank correlation (1)
- Refinement (1)
- Reflectors (1)
- Research Trajectories (1)
- Restful Web Services (1)
- Revised Onion Model of Culture (1)
- Router (Rechnernetz) (1)
- Runtime AI safety monitoring (1)
- SHA-1 (1)
- SOAP (1)
- SaaS (1)
- Scanning (1)
- Second-Order DPA (1)
- Secure Cloud Storage (1)
- Security APIs (1)
- Security Approaches (1)
- Security Protocol (1)
- Semantic models (1)
- Semi-Virtual Testbed (1)
- Semiconductor lasers (1)
- Sensorbasierte Systeme (1)
- Service-Oriented Architecture (1)
- Side Channel Analysis (1)
- Side Channel Cryptanalysis, Stochastic Methods (1)
- Single sideband modulation (1)
- Smart Home (1)
- SmartMANET Jamming (1)
- Social Capital (1)
- Social Media (1)
- Social learning (1)
- Social sustainability (1)
- Software Security (1)
- Softwareanpassung (1)
- Softwaresystem (1)
- Spectroscopy (1)
- Standardization (1)
- Stationary network problems (1)
- Structural sensitivity (1)
- Submillimeter telescopes (1)
- Sustainable HCI (1)
- Tactical Wireless Multi-hop Networks (1)
- Tamper-Proof Hardware (1)
- Tampering (1)
- Taxi (1)
- Template attacks (1)
- Templates (1)
- Testing (1)
- Testing Tool (1)
- Thin Client (1)
- Trace algebra (1)
- Transponder (1)
- Transportation (1)
- Trusted Computing (1)
- UI-Dressing (1)
- URI (1)
- Unifying theories (1)
- Usable Privacy (1)
- Verbraucherforschung (1)
- Verbraucherinformatik (1)
- Warnings (1)
- Web 2.0 (1)
- Web 3.0 (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Portal (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- Web-Tracking (1)
- WebSocket (1)
- Weitverkehrsnetz (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Wireless back-haul (1)
- Wizard of Oz (1)
- Workflow (1)
- Worm Hole (1)
- XAI (1)
- XML (1)
- XML Security (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XSpRES (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- action unit recognition (1)
- aluminum (1)
- appropriation (1)
- attacks (1)
- breakdowns (1)
- caching (1)
- capillary compression test (1)
- cognitive agents (1)
- cooperation (1)
- crack growth (1)
- cryptographic apis (1)
- culture of participation (1)
- deep learning (1)
- developer console (1)
- digital fabrication (1)
- distributed systems (1)
- dynamic econometric forecasting models (1)
- einheitliches Internet-Übertragungsprotokoll (1)
- electromagnetic wave polarisation (1)
- emotion recognition (1)
- end-to-end security (1)
- energy feedback (1)
- erp4students (1)
- facial expression analysis (1)
- field programmable gate arrays (1)
- finite element model (1)
- focus groups (1)
- fracture mechanic (1)
- fracture toughness (1)
- gas lasers (1)
- gold (1)
- hardware engineering (1)
- harmonic generation (1)
- harmonic generation including higher-order harmonic generation (1)
- indentation (1)
- interaction design (1)
- interactive-learning (1)
- interferometers (1)
- inverse parameter identification (1)
- knowledge management (1)
- laser diodes (1)
- lifetime (1)
- link optimization (1)
- link quality (1)
- local material properties (1)
- lokales Netz (1)
- maker communities (1)
- metadata (1)
- micro chevron (1)
- micro compression test (1)
- microwave propagation (1)
- modular reduction (1)
- network (1)
- neural-networks (1)
- other holographic techniques (1)
- pain recognition (1)
- participatory design (1)
- prosumption (1)
- qualitative research methods (1)
- radiowave propagation (1)
- rate adaptation (1)
- rebound effects (1)
- reproducible node motion (1)
- routing metrics (1)
- security warning design (1)
- sensitivity of point forecast (1)
- sharing (1)
- signature (1)
- smartcard (1)
- software development (1)
- software engineering (1)
- state constraints (1)
- stellar radiation (1)
- sustainability (1)
- technological platform (1)
- textile and apparel industry (1)
- usability (1)
- usable privacy (1)
- verteiltes System (1)
- virtual-reality (1)
- voice interaction (1)
- wireless back-haul (1)
- Übertragungsqualität (1)
Towards an Interaction-Centered and Dynamically Constructed Episodic Memory for Social Robots
(2020)
Towards self-explaining social robots. Verbal explanation strategies for a needs-based architecture
(2019)
In order to establish long-term relationships with users, social companion robots and their behaviors need to be comprehensible. Purely reactive behavior such as answering questions or following commands can be readily interpreted by users. However, the robot's proactive behaviors, included in order to increase liveliness and improve the user experience, often raise a need for explanation. In this paper, we provide a concept to produce accessible “why-explanations” for the goal-directed behavior an autonomous, lively robot might produce. To this end we present an architecture that provides reasons for behaviors in terms of comprehensible needs and strategies of the robot, and we propose a model for generating different kinds of explanations.
Towards explaining deep learning networks to distinguish facial expressions of pain and emotions
(2018)
Deep learning networks are successfully used for object and face recognition in images and videos. In order to be able to apply such networks in practice, for example in hospitals as a pain recognition tool, the current procedures are only suitable to a limited extent. The advantage of deep learning methods is that they can learn complex non-linear relationships between raw data and target classes without limiting themselves to a set of hand-crafted features provided by humans. However, the disadvantage is that due to the complexity of these networks, it is not possible to interpret the knowledge that is stored inside the network. It is a black-box learning procedure. Explainable Artificial Intelligence (AI) approaches mitigate this problem by extracting explanations for decisions and representing them in a human-interpretable form. The aim of this paper is to investigate the explainable AI method Layer-wise Relevance Propagation (LRP) and apply it to explain how a deep learning network distinguishes facial expressions of pain from facial expressions of emotions such as happiness and disgust.
This paper describes a dynamic, model-based approach for estimating intensities of 22 out of 44 different basic facial muscle movements. These movements are defined as Action Units (AU) in the Facial Action Coding System (FACS) [1]. The maximum facial shape deformations that can be caused by the 22 AUs are represented as vectors in an anatomically based, deformable, point-based face model. The amount of deformation along these vectors represent the AU intensities, and its valid range is [0, 1]. An Extended Kalman Filter (EKF) with state constraints is used to estimate the AU intensities. The focus of this paper is on the modeling of constraints in order to impose the anatomically valid AU intensity range of [0, 1]. Two process models are considered, namely constant velocity and driven mass-spring-damper. The results show the temporal smoothing and disambiguation effect of the constrained EKF approach, when compared to the frame-by-frame model fitting approach ‘Regularized Landmark Mean-Shift (RLMS)’ [2]. This effect led to more than 35% increase in performance on a database of posed facial expressions.
A method for minimum range extension with improved accuracy in triangulation laser range finder
(2011)
Zumutbarkeit von Arbeit
(1994)