Refine
H-BRS Bibliography
- yes (36) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (27)
- Institute of Visual Computing (IVC) (12)
- Fachbereich Ingenieurwissenschaften und Kommunikation (9)
- Institut für Sicherheitsforschung (ISF) (3)
- Institut für Cyber Security & Privacy (ICSP) (2)
- Institut für funktionale Gen-Analytik (IFGA) (2)
- Fachbereich Sozialpolitik und Soziale Sicherung (1)
- Fachbereich Wirtschaftswissenschaften (1)
Document Type
- Conference Object (36) (remove)
Year of publication
- 2010 (36) (remove)
Has Fulltext
- no (36)
Keywords
- Human-Robot Interaction (2)
- Acceptance (1)
- Accuracy (1)
- Blob Detection (1)
- Computer architecture (1)
- Datenschutz (1)
- Datensicherheit (1)
- Elderly People (1)
- Encryption (1)
- Estimation (1)
- Euronorm (1)
- FDI (1)
- FPGA (1)
- Gender Issues in Computer Science Education (1)
- Geo-tagging (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheitswesen (1)
- HRI (1)
- Human Factors (1)
- Image Processing (1)
- Kryptologie (1)
- Management (1)
- Measurement (1)
- Mobile devices (1)
- Mobile robots (1)
- Multivariate Time Series (1)
- Navigation (1)
- Open-ended Robotic Discovery (1)
- Parallelization (1)
- Parameter sensitivities of transfer functions (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Prototypes (1)
- Radiofrequency identification (1)
- Relational Learning (1)
- Repositories (1)
- Risikoanalyse (1)
- Robot sensing systems (1)
- Robustness (1)
- Scholarly workbench (1)
- Scientific workbench (1)
- Service Robot (1)
- Sicherheitsanalyse (1)
- Sicherheitslücke (1)
- Smartphones (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Supply chains (1)
- SystemVerilog (1)
- Telematik (1)
- Telematik-Software (1)
- Verifizierung (1)
- educational methods (1)
- edutainment (1)
- electronics (1)
- feature selection (1)
- hypermedia (1)
- incremental bond graphs (1)
- inverse model (1)
- life-long learning (1)
- parameter sensitivities of residuals of ARRs (1)
- story authoring (1)
- technological literacy (1)
Publikation von Umweltdaten
(2010)
On an Integration of an Information Security Management System into an Enterprise Architecture
(2010)
In the past RE research targeted mainly the needs of RE practice in the context of larger enterprises. However, Small and Medium Enterprises (SME) develop, customize and maintain a considerable part of software. Often, these companies are unable to apply RE methods and techniques without modifications. Besides, shortcomings in applying RE methods due to time constraints or limited resources may arise.
Microcontroller-based sensor systems offer great opportunities for the implementation of safety features for potentially dangerous machinery. However, in general they are difficult to assess with regard to their reliability and failure rate. This paper describes the safety assessment of hardware and software of a new and innovative sensor system. The hardware is assessed by standardized methods according to norm EN ISO 13849-1, while the use of model checking is presented as an approach to solve the problem of validating the software.
In this paper, we introduce an optical sensor system, which is integrated into an industrial push-button. The sensor allows to classify the type of material that is in contact with the button when pressed into different material categories on the basis of the material's so called "spectral signature". An approach for a safety sensor system at circular table saws on the same base has been introduced previously on SIAS-2007. This contactless working sensor is able to distinguish reliably between skin, textiles, leather and various other kinds of materials. A typical application for this intelligent push-button is the use at possibly dangerous machines, whose operating instructions include either the prohibition or the obligation to wear gloves during the work at the machine. An exemple of machines at which no gloves are allowed are pillar drilling machines, because of the risk of getting caught in the drill chuck and being turned in by the machine. In many cases this causes very serious hand injuries. Depending on the application needs, the sensor system integrated into the push-button can be configured flexibly by software to prevent the operator from accidentally starting a machine with or without gloves, which can decrease the risk of severe accidents significantly. Especially two-hand controls are incentive to manipulation for easier handling. By equipping both push-buttons of a two-hand control with material classification properties, the user is forced to operate the controls with his bare fingers. That limitation disallows the manipulation of a two-hand control by a simple rodding device.
This work presents a person independent pointing gesture recognition application. It uses simple but effective features for the robust tracking of the head and the hand of the user in an undefined environment. The application is able to detect if the tracking is lost and can be reinitialized automatically. The pointing gesture recognition accuracy is improved by the proposed fingertip detection algorithm and by the detection of the width of the face. The experimental evaluation with eight different subjects shows that the overall average pointing gesture recognition rate of the system for distances up to 250 cm (head to pointing target) is 86.63% (with a distance between objects of 23 cm). Considering just frontal pointing gestures for distances up to 250 cm the gesture recognition rate is 90.97% and for distances up to 194 cm even 95.31%. The average error angle is 7.28◦.
Qualifikation für gute Lehre
(2010)
Eine von insgesamt sechs Arbeitsgruppen der Jahrestagung des HRK Bologna-Zentrums 2009 beschäftigte sich mit dem Themenbereich "Qualifikation für gute Lehre". Nach zwei Impulsvorträgen diskutierten die Teilnehmer, wie Hochschulangehörige noch stärker als bisher für die Lehre
qualifiziert werden können.
Threat Modeling ermöglicht als heuristisches Verfahren die methodische Überprüfung eines Systementwurfs oder einer Softwarearchitektur, um Sicherheitslücken kostengünstig und frühzeitig - idealerweise in der Design Phase - im Software-Entwicklungsprozess zu identifizieren, einzugrenzen und zu beheben. Threat Modeling lässt sich aber auch noch erfolgreich in der Verifikationsphase oder noch später - nach dem Release - zur Auditierung der Software einsetzen. Durch die Früherkennung von Sicherheitslücken können die Kosten zur Behebung bis auf ein Hundertstel reduziert werden. Die auf dem Markt verfügbaren Threat Modeling Tools werden identifiziert, analysiert und hinsichtlich Ihrer Eignung zur Erstellung komplexer, vollständiger Threat Models mit entwickelten Bewertungsparametern einem einfachen Bewertungsverfahren unterworfen.
In Mixed Reality (MR) Environments, the user's view is augmented with virtual, artificial objects. To visualize virtual objects, the position and orientation of the user's view or the camera is needed. Tracking of the user's viewpoint is an essential area in MR applications, especially for interaction and navigation. In present systems, the initialization is often complex. For this reason, we introduce a new method for fast initialization of markerless object tracking. This method is based on Speed Up Robust Features and paradoxically on a traditional marker-based library. Most markerless tracking algorithms can be divided into two parts: an offline and an online stage. The focus of this paper is optimization of the offline stage, which is often time-consuming.
This contribution presents an easy to implement 3D tracking approach that works with a single standard webcam. We describe the algorithm and show that it is well suited for being used as an intuitive interaction method in 3D video games. The algorithm can detect and distinguish multiple objects in real-time and obtain their orientation and position relative to the camera. The trackable objects are equipped with planar patterns of five visual markers. By tracking (stereo) glasses worn by the user and adjusting the in-game camera's viewing frustum accordingly, the well-known immersive "screen as a window" effect can be achieved, even without the use of any special tracking equipment.