Refine
H-BRS Bibliography
- yes (606)
Departments, institutes and facilities
- Fachbereich Informatik (606) (remove)
Document Type
- Conference Object (606) (remove)
Year of publication
Keywords
- Virtual Reality (8)
- Robotics (7)
- Usable Security (7)
- CUDA (5)
- Machine Learning (5)
- 3D user interface (4)
- Benchmarking (4)
- Usable Privacy (4)
- machine learning (4)
- virtual reality (4)
- Human-Robot Interaction (3)
- Hyperspectral image (3)
- IP protection (3)
- Image Processing (3)
- LoRa (3)
- Measurement (3)
- Navigation (3)
- Quality diversity (3)
- Risk-based Authentication (3)
- Robot sensing systems (3)
- SpMV (3)
- Taxonomy (3)
- WiLD (3)
- clustering (3)
- robotics (3)
- security (3)
- serious games (3)
- virtual environments (3)
- 802.11 (2)
- Aerodynamics (2)
- Algorithms (2)
- Alternatives (2)
- Augmented Reality (2)
- Augmented reality (2)
- Authentication (2)
- Bag of Features (2)
- Big Data Analysis (2)
- Cognitive robot control (2)
- Computer Graphics (2)
- Computer Vision (2)
- Content Module (2)
- Cooperative Awareness Message (2)
- DPA (2)
- Distributed rendering (2)
- Educational institutions (2)
- Embedded software (2)
- Empirical study (2)
- Evolutionary computation (2)
- Explainable robotics (2)
- Eye Tracking (2)
- FDI (2)
- FPGA (2)
- Fault analysis (2)
- GDPR (2)
- GPU (2)
- Graphics Cards (2)
- Heart Rate Prediction (2)
- Higher education (2)
- IEEE802.11 (2)
- Indirect Encodings (2)
- Inductive Logic Programming (2)
- Intelligent virtual agents (2)
- Internet (2)
- Large, high-resolution displays (2)
- Learning from experience (2)
- LoRaWAN (2)
- Long-Distance WiFi (2)
- MAP-Elites (2)
- Natural Language Processing (2)
- Neuroevolution (2)
- Object recognition (2)
- OpenFlow (2)
- Original Story (2)
- Parallelization (2)
- Password (2)
- Pseudonym Concept (2)
- QoS (2)
- Quality Diversity (2)
- RE (2)
- Raman microscopy (2)
- Risk-based Authentication (RBA) (2)
- Robustness (2)
- SDN (2)
- Serious Games (2)
- Side-channel analysis (2)
- Software (2)
- Survey (2)
- Three-dimensional displays (2)
- User Interface Design (2)
- Vehicle-to-Vehicle Communication (2)
- Visualization (2)
- analysis (2)
- blockchain (2)
- classifier combination (2)
- edutainment (2)
- embedded systems (2)
- feature extraction (2)
- haptics (2)
- human factors (2)
- hypermedia (2)
- image fusion (2)
- interface design (2)
- machine vision (2)
- motion estimation (2)
- navigation (2)
- object categorization (2)
- pansharpening (2)
- path planning (2)
- surrogate modeling (2)
- 2D Level Design (1)
- 3D User Interface (1)
- 3D Visualisierung (1)
- 3D design (1)
- 3D gaming (1)
- 3D interfaces (1)
- 3D registration (1)
- 3D shape (1)
- 3D user interfaces (1)
- 450 MHz (1)
- AES (1)
- AI based translation (1)
- AMD Family 15h (1)
- ANSYS (1)
- ARM Cortex M3 Processor (1)
- ARRs (1)
- Abstract Syntax Tree (1)
- Acceptance (1)
- Account Security (1)
- Accuracy (1)
- Active Learning (1)
- Active locomotion (1)
- Actuators (1)
- Adaptation of Software (1)
- Air Pollution (1)
- Air pollution modeling (1)
- All-Swap Algorithm (1)
- Architectural Patterns (1)
- Assistive robots (1)
- Attention (1)
- Authentication features (1)
- Authorship watermark (1)
- Autoencoder (1)
- Autoimmune disease (1)
- Automatic Short Answer Grading (1)
- B2T (1)
- BCL2 (1)
- BFS (1)
- BLOB Detection (1)
- Ballastless track (1)
- Bayesian optimization (1)
- Beacon Chain (1)
- Behaviour-Driven Development (1)
- Best practice algorithms (1)
- Bicycle Simulator (1)
- Bioinformatics (1)
- Blob Detection (1)
- Block cipher (1)
- Blocking (1)
- Bond Graph models for fault detection and isolation (1)
- Bond graph modelling (1)
- Bound Volume Hierarchy (1)
- Bounding Box (1)
- Branch and cut (1)
- Business software (1)
- Business system (1)
- Business-to-Thing (1)
- CNN (1)
- CPA (1)
- CPU (1)
- CPUID instruction (1)
- CSR5BC (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Cell Processor (1)
- Cell/B.E. (1)
- Center-of-Mass (1)
- Channel assignment (1)
- Clusters (1)
- Co-located Collaboration (1)
- Co-located work (1)
- Code similarity analysis (1)
- Cognitive robotics (1)
- Collaborating industrial robots (1)
- Coloured pointclouds (1)
- Column (1)
- Comparative analysis (1)
- Compliant Manipulation (1)
- Compliant fingers (1)
- Component Models (1)
- Composition of Patterns (1)
- Compositional Pattern Producing Networks (1)
- Computational fluid dynamics (1)
- Computer architecture (1)
- Computer graphics (1)
- Computer-supported Cooperative Work (1)
- Computing methodologies (1)
- Concurrent repeated failure prognosis (1)
- Container Structure (1)
- Containerization (1)
- Content Analysis (1)
- Contextualized Attention Metadata (CAM) (1)
- Continual robot learning (1)
- Control (1)
- Corporate Social Responsibility (1)
- Correlative Microscopy (1)
- Cortex-M3 (1)
- Covert channel (1)
- Critical power (1)
- Cross-core (1)
- Crossmedia (1)
- Customization (1)
- Cypher (1)
- DAE systems (1)
- DFA Lab (1)
- DPA Lab (1)
- Data Fusion (1)
- Data Generation (1)
- Data Protection Officer (1)
- Dataflow Programming (1)
- Datalog (1)
- Datenschutz (1)
- Datensicherheit (1)
- Delph Study (1)
- Design Optimization (1)
- Design automation (1)
- Diagnostic bond graph-based online fault diagnosis (1)
- Difference Visualization (1)
- Differential analysis (1)
- Digital Ecosystem (1)
- Digital Storytelling (1)
- Digital common goods (1)
- Digital watermarking (1)
- Digitisation (1)
- Directional Antenna (1)
- Directional antennas (1)
- Distributed Robot Systems (1)
- Docker (1)
- Domain Expert (1)
- Domestic Robots (1)
- Domestic robotics (1)
- Domestic robots (1)
- Dynamic motion primitives (1)
- E-Health (1)
- EEG (1)
- ERP-software (1)
- ERP-system (1)
- Echtzeit (1)
- Eclipse Modeling Framework (1)
- Ego-Motion Estimation (1)
- Elderly People (1)
- Elliptic Curve Cryptography (1)
- Embedded system (1)
- Empirical Study (1)
- Employee data protection (1)
- Encryption (1)
- Enterprise software (1)
- Enterprise system (1)
- Estimation (1)
- Ethereum (1)
- Euronorm (1)
- Everyday object manipulation (1)
- Evolutionary algorithms (1)
- Exergame (1)
- Experiment (1)
- Experiment design (1)
- Expert Interviews (1)
- Explainability (1)
- Explainable Machine Learning (1)
- FPGA implementation (1)
- Fas (1)
- Fault Channel Watermarking Lab (1)
- Fault Detection & Diagnosis (1)
- Fault-channel watermarks (1)
- Feature extraction (1)
- Features (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Fingerprint watermark (1)
- Fixed spatial data (1)
- Flexible robots (1)
- Force (1)
- Force and tactile sensing (1)
- Force field (1)
- Forests (1)
- Free-Space Loss (FSL) (1)
- Frequency planning (1)
- Friction (1)
- Functional safety (1)
- Fusion (1)
- Future (1)
- Future Studies (1)
- Future of Robotics (1)
- Fuzzy logic (1)
- GPGPU (1)
- Game Engine (1)
- Games and Simulations for Learning (1)
- Garbage collection (1)
- Gaussian processes (1)
- Gaze Behavior (1)
- Gaze Depth Estimation (1)
- Gender Issues in Computer Science Education (1)
- Generation R (1)
- Generative Design (1)
- Generative Models (1)
- Geo-tagging (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheitswesen (1)
- Givens Rotations (1)
- Global Illumination (1)
- Gradient-boosting (1)
- Grailog (1)
- Graphical user interfaces (1)
- Grasping (1)
- Grounded Method (1)
- Group Behavior (1)
- Group behavior (1)
- Groupware (1)
- HCI (1)
- HCSS (1)
- HPC (1)
- HRI (1)
- HTTP (1)
- Hand Guidance (1)
- Hand Tracking (1)
- Hardware (1)
- Head-Mounted Displays (1)
- Head-mounted Display (1)
- Header whitelisting (1)
- Heat shrink tubing (1)
- High-performance computing (1)
- High-speed track (1)
- Human Factors (1)
- Human centered computing (1)
- Human computer interaction (1)
- Human-Centered Robotics (1)
- Human-robot interaction (1)
- Humanoid Robot (1)
- HyperNEAT (1)
- ICP (1)
- IEC 104 (1)
- IEC 61850 (1)
- IEEE 802.11 (1)
- IEEE 802.21 (1)
- Illumination algorithms (1)
- Image representation (1)
- Image-based rendering (1)
- Immersive Virtual Environments (1)
- Immersive Visualization Environment (1)
- Implementation Challenges (1)
- Increasing fault magnitude (1)
- Industrial robots (1)
- Information Security (1)
- Information Types (1)
- Information hiding (1)
- Information interaction (1)
- Informationssicherheit (1)
- Innovation (1)
- Instance-based learning (1)
- Instruction scheduling (1)
- Integer programming (1)
- Integrate Development Environment (1)
- Integrated circuit interconnections (1)
- Intel Xeon Phi (1)
- Intel processors (1)
- Intelligent Transport System (1)
- Interaction (1)
- Interaction Patterns (1)
- Interactive Smart Card Applications (1)
- Interference (1)
- Intermediaries (1)
- Intermittent faults (1)
- Internet of Things (1)
- Interoperability (1)
- Inventory (1)
- Issue Tracking Systems (1)
- Issue Types (1)
- Issue tracking systems (1)
- Java virtual machine (1)
- JavaScript (1)
- KNN (1)
- Knowledge Graphs (1)
- Knowledge representation (1)
- Kryptologie (1)
- LAA (1)
- LGCSR (1)
- LOTUS Sensor Node (1)
- LTE-M (1)
- LTE-U (1)
- Lattice Basis Reduction (1)
- Lead userness (1)
- Learning analytics (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Learning from demonstration (1)
- Learning systems (1)
- Lighting simulation (1)
- Linear regression (1)
- LoRa receiver accuracy (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Low-Power Wide Area Network (LP-WAN) (1)
- Lymphoproliferative disorder (1)
- MAC (1)
- MACE (1)
- MESD (1)
- MIMD (1)
- MOOC (1)
- MPLS (1)
- MQTT (1)
- Machine learning (1)
- Machine-learning (1)
- Main Memory (1)
- Maker space (1)
- Malware (1)
- Management (1)
- Manipulator (1)
- Markov Cluster Algorithm (1)
- Megatrends (1)
- Memory filesystem (1)
- Memory-Constrained Devices (1)
- Mesh networks (1)
- Microarchitectural Data Sampling (MDS) (1)
- Middleware and Programming Environments (1)
- Mining Software Repositories (1)
- Mining software repositories (1)
- Mixed (1)
- Mixed method evaluation (1)
- Mobile devices (1)
- Mobile manipulation (1)
- Mobile robots (1)
- Modalities (1)
- Model Fitting (1)
- Model-based Approach (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Modelica (1)
- Modular software packages (1)
- Molecular modeling (1)
- Morphological box (1)
- Morphological scheme (1)
- Motion Capture (1)
- Motion planning (1)
- Multi-Modal Interaction (1)
- Multi-Tenant Application (1)
- Multi-objective optimization (1)
- Multicast communication (1)
- Multilayer interaction (1)
- Multimodal (1)
- Multimodal Microspectroscopy (1)
- Multimodal optimization (1)
- Multiple Displays (1)
- Multithreaded and multicore architecture (1)
- Multiuser (1)
- Multivariate Time Series (1)
- Multivariate time series classification (1)
- Musical Performance (1)
- NEAT (1)
- NETCONF (1)
- NIR (1)
- NIR-point sensor (1)
- NISTPQC (1)
- NNS (1)
- NUMA (1)
- NURBS (1)
- NVIDIA Tesla (1)
- Narration Module (1)
- Natural language understanding (1)
- Natural scene text (1)
- Navigation interface (1)
- Networked Robots (1)
- Neural Machine Translation (1)
- Noise (1)
- Noise reduction (1)
- Numerical optimization (1)
- Nvidia graphic processors (1)
- OER (1)
- Object detection (1)
- Object-Based Image Analysis (OBIA) (1)
- Online Services (1)
- Open source firmware (1)
- Open-ended Robotic Discovery (1)
- Open-source (1)
- OpenACC (1)
- OpenDaylight (1)
- OpenMP, unrolling (1)
- OpenStack (1)
- Optimisation 3D (1)
- Outlier Detection (1)
- PDSTSP (1)
- PHR (1)
- PIR sensor units (1)
- PM2.5 estimation (1)
- Pain Reduction (1)
- Parallel I/O (1)
- Parallel Processing (1)
- Parallel drone scheduling traveling salesman problem (1)
- Parameter sensitivities of transfer functions (1)
- Parametric study (1)
- Path Loss (1)
- Path loss model (1)
- People Detection (1)
- Perception (1)
- Performance (1)
- Performance Simulation (1)
- Performance benchmarks (1)
- Performance prediction (1)
- Performance profiling (1)
- Periodic structures (1)
- Personal Health Record (1)
- Phenotypic niching (1)
- Physical exercising game platform (1)
- Pointing (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Pointing devices (1)
- Pose Estimation (1)
- Post-Quantum Signatures (1)
- Power Analysis (1)
- Prediction of physiological responses to strain (1)
- Predictive Models (1)
- Privacy (1)
- Privacy engineering (1)
- Probabilistic model (1)
- Project based learning (1)
- Proof of Stake (1)
- Propagation (1)
- Prototypes (1)
- Public Key Infrastructures (1)
- Q measurement (1)
- Quality control (1)
- RBAR (1)
- RGB-D (1)
- RGB-D data (1)
- RLE-XOR (1)
- RLE-permutation (1)
- RNN (1)
- RSSI (1)
- Radiofrequency identification (1)
- Radix Sort (1)
- Random number generator (1)
- Rapid Prototyping (1)
- Rapid prototyping (1)
- Ray Casting (1)
- Ray Tracing (1)
- Ray tracing (1)
- Re-authentication (1)
- Reasoning (1)
- Reconstruction Error (1)
- Reflectance modeling (1)
- Registration Refinement (1)
- Relational Learning (1)
- Remaining Useful Life (RUL) estimates (1)
- Render Cache (1)
- Repositories (1)
- Requirements (1)
- Requirements Communication (1)
- Requirements analysis (1)
- Requirements engineering in SMEs (1)
- Restorative Virtual Environments (1)
- Reusable Software (1)
- Reversible Logic Synthesis (1)
- Review (1)
- Rfid (Radio-Frequency Identification) (1)
- Risikoanalyse (1)
- Risk-Based Account Recovery (1)
- RoboCup (1)
- Robot commands (1)
- Robot competitions (1)
- Robot failure diagnosis (1)
- Robot kinematics (1)
- Robot learning (1)
- Robot software (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Revolutions (1)
- Robotics competitions (1)
- Robots (1)
- Robust grasping (1)
- Rotating Table Test (1)
- RuleML (1)
- Runtime Adaptation (1)
- Rural areas (1)
- S3D Video (1)
- S3D video (1)
- SAML (1)
- SDWN (1)
- SEMA (1)
- SIMD (1)
- SLIDE algorithm (1)
- SME (1)
- SOAP (1)
- SORT (1)
- SQL (1)
- SVG (1)
- Scalability (1)
- Scalable Vector Graphic (1)
- ScalarMultiplication (1)
- Scene text recognition, active vision, domestic robot, pantilt, auto-zoom, auto-focus, adaptive aperture control (1)
- Scholarly workbench (1)
- Scientific competency development (1)
- Scientific workbench (1)
- Second Life (1)
- Security (1)
- Self-supervised learning (1)
- Semantic gap (1)
- Semantics (1)
- SensorFusion (1)
- Separation algorithm (1)
- Service Robot (1)
- Service-Oriented Architecture (1)
- Sicherheitsanalyse (1)
- Sicherheitslücke (1)
- Side Channel Analysis (1)
- Side Channel Countermeasures (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side-channel watermarking (1)
- Signature Verification (1)
- Similarity matrix (1)
- Simulation (1)
- Simulator (1)
- Single Instruction Multiple Data (SIMD) (1)
- Skin detection (1)
- Slippage detection (1)
- Smart Card (1)
- Smart Grid (1)
- Smart InGaAs camera-system (1)
- Smartphones (1)
- Social Virtual Reality (1)
- Social engagement in university (1)
- Software Architectures (1)
- Software Development Process (1)
- Software Feature Request Detection (1)
- Software IP protection (1)
- Software Supply Chain (1)
- Software and Architecture (1)
- Software reverse engineering (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Validierung (1)
- Software-Zertifizierung (1)
- Sonar (1)
- Space exploration (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Sparse matrix format (1)
- Spatiotemporality (1)
- Spectrum occupancy (1)
- Spectrum optimization (1)
- Speech Act Theory (1)
- Split Axis (1)
- Standards (1)
- Star Trek (1)
- State machines (1)
- Stereoscopic Rendering (1)
- Stereoscopic rendering (1)
- Story Element (1)
- Streaming (1)
- Stress Management (1)
- Supervised learning (1)
- Supply chains (1)
- Support Vector Machine (1)
- Surrogate Modeling (1)
- Surrogate Modelling (1)
- Surrogate models (1)
- Swim Stroke Analysis (1)
- Switched power electronic systems (1)
- Symmetry detector (1)
- Synthetic perception (1)
- SystemVerilog (1)
- TLS (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Task Frame Formalism (1)
- Telecommunication network reliability (1)
- Telecommunication network routing (1)
- Telematik (1)
- Telematik-Software (1)
- Template Attacks (1)
- Temporally-weighted (1)
- Textureless objects (1)
- Tiled displays (1)
- Tiled-display walls (1)
- Time measurement (1)
- Timing analysis (1)
- Timing channel (1)
- TinyECC 2.0 (1)
- ToF Camera (1)
- Token (1)
- Touchscreen interaction (1)
- Toyota HSR (1)
- Traceability (1)
- Tracking by detection (1)
- Traffic Simulations (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Transfer learning (1)
- Transformers (1)
- Transforms (1)
- Transparency (1)
- Tree Stumps (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV (1)
- UAV teleoperation (1)
- UI design (1)
- Ultrasonic array (1)
- Uncertainty (1)
- Unidirectional thermoplastic composites (1)
- Unity (1)
- Unmanned Aerial Vehicle (UAV) (1)
- Urban (1)
- Usability (1)
- Usable Security and Privacy (1)
- User Roles (1)
- User Study (1)
- User-Centered Approach (1)
- VR (1)
- VR system design (1)
- Variability Management (1)
- Variability Resolution (1)
- Variational Autoencoder (1)
- Vector Intrinsics (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicular Ad hoc Networks (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Verifizierung (1)
- Verilog (1)
- Virtual Agents (1)
- Virtual Environments (1)
- Virtual attention (1)
- Virtual environments (1)
- Visualization design and evaluation methods (1)
- Visualization systems and tools (1)
- Volumenrendering (1)
- Vulnerable Groups (1)
- V˙CO2 prediction (1)
- V˙O2 prediction (1)
- WDS (1)
- WWW (1)
- Watermarking (1)
- Web (1)
- Web components (1)
- Whole body motion (1)
- Wi-Fi (1)
- WiAFirm (1)
- WiFi (1)
- WiFi-based Long Distance (WiLD) (1)
- Wireless Backhaul Network (1)
- Wireless Sensor Network (1)
- Wireless backhaul (1)
- XGBoost (1)
- XML (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XNA Game Studio (1)
- XSLT (1)
- Xeon Phi knights landing (1)
- YANG (1)
- YOLO (1)
- ZombieLoad (1)
- activation function (1)
- adaptive agents (1)
- adaptive binarization (1)
- adaptive filters (1)
- aerodynamics (1)
- affective computing (1)
- ambulatory monitoring (1)
- analyses (1)
- analytical redundancy relations (1)
- anomaly detection (1)
- artifacts (1)
- asset transfer (1)
- atomic instructions (1)
- audio-tactile feedback (1)
- augmented, and virtual realities (1)
- authoring tools (1)
- automation (1)
- background motion (1)
- bagging (1)
- bass-shaker (1)
- bicycle (1)
- biorder (1)
- bloat (1)
- body-centric cues (1)
- brain computer interfaces (1)
- brightfield microscopy (1)
- bus load (1)
- camera-based person detection (1)
- can bus (1)
- chemical sensors (1)
- client-side component model (1)
- co-located collaboration (1)
- cognitive radio (1)
- collaboration (1)
- collaborative learning (1)
- colorimetry (1)
- commuting (1)
- compensation (1)
- component analyses (1)
- component based (1)
- computational causalities (1)
- computational logic (1)
- computer games (1)
- computer-supported collaborative work (1)
- cooperative path planning (1)
- correlation (1)
- crawling (1)
- cross-disciplinary (1)
- cryptocurrency (1)
- cuSPARSE (1)
- data locality (1)
- data logging (1)
- data visualisation (1)
- database systems (1)
- decision tree learning (1)
- dependable robots (1)
- depth perception (1)
- diagnostic bond graphs (1)
- digital co-creation (1)
- digital platform ecosystem (1)
- digital storytelling (1)
- dimensionality reduction (1)
- direct feedback (1)
- directed hypergraphs (1)
- directional antennas (1)
- disabled people (1)
- distributed authoring (1)
- distributed processing (1)
- diversity (1)
- driving (1)
- drone video quality (1)
- dynamic vector fields (1)
- e-learning course structure (1)
- echo state network (1)
- eco-driving (1)
- embedded collaborative learning (1)
- embodied interfaces (1)
- emotion computing (1)
- energy efficient transportation (1)
- energy optimal driving (1)
- evolution strategies (1)
- evolutionary illumination (1)
- evolved neural network controller (1)
- evolving look ahead controllers (1)
- explainable gesture recognition (1)
- exploration (1)
- eye-tracking (1)
- faults in robotics (1)
- feature (1)
- feature selection (1)
- flight zone (1)
- forms of mathematical models (1)
- foveated rendering (1)
- fpga (1)
- full-body interface (1)
- fuzzy logic (1)
- game engine (1)
- gamification (1)
- gaming (1)
- generation of ARRs (1)
- generative design (1)
- geofence (1)
- graphs (1)
- guidance (1)
- hand guidance (1)
- haptic feedback (1)
- heat shrink tubes (1)
- heterogeneous networks (1)
- heuristics (1)
- hierarchical clustering (1)
- higher education (1)
- holography (1)
- human-centric lighting (1)
- human-robot collaboration (1)
- hypermedia applications (1)
- iOER (1)
- ideal switches (1)
- ideation (1)
- image sequence processing (1)
- immersion (1)
- immersive systems (1)
- incremental bond graphs (1)
- industrial robots (1)
- information display methods (1)
- innovative work behavior (1)
- intelligent pedestrian counter (1)
- interaction (1)
- interaction techniques (1)
- interactive distributed rendering (1)
- intercultural learning (1)
- interference (1)
- international (1)
- international teams (1)
- intrinsics (1)
- inverse model (1)
- issue tracker (1)
- knowledge engineering (1)
- knowledge graphs (1)
- knowledge-management (1)
- leaning (1)
- leaning, self-motion perception (1)
- learning object repositories (1)
- learning-based fault detection and diagnosis (1)
- light curtains (1)
- linguistic variable (1)
- linguistic variables (1)
- link calibration (1)
- long-distance 802.11 (1)
- measurement (1)
- mechatronic systems (1)
- medical training (1)
- memory bandwidth (1)
- mesoscopic agents (1)
- microcomputers (1)
- microcontroller (1)
- mininig software repositories (1)
- mobile or handheld device (1)
- mobile projection (1)
- mobile robots (1)
- mobile web (1)
- mode switching LTI models (1)
- modular web (1)
- momentary frequency (1)
- monitoring (1)
- morphological operator (1)
- motion control (1)
- motion cueing (1)
- motion platform (1)
- motion trajectory enhancement (1)
- multi causal strain (1)
- multi robot systems (1)
- multi-layer display (1)
- multi-screen visualization environments (1)
- multi-user VR (1)
- multibody systems (1)
- multidisciplinary (1)
- multiple Xbox 360 (1)
- multiple computer systems (1)
- multiresolution analysis (1)
- multisensory cues (1)
- multisensory interface (1)
- naive physics (1)
- natural user interface (1)
- near-infrared (1)
- neural networks (1)
- neuroevolution (1)
- noise suppression (1)
- nomadic text entry (1)
- nonlinear storytelling (1)
- object identification (1)
- object-oriented physical systems modelling (1)
- open educational resources (OERs) (1)
- optical safeguard sensor (1)
- optimal control (1)
- optimal control problem (1)
- parallel BFS (1)
- parallel breadth-first search (1)
- parallel difference visualization (1)
- parameter sensitivities of residuals of ARRs (1)
- payment protocol (1)
- pedestrian counting system (1)
- pedestrian movements (1)
- pen interaction (1)
- performance optimizations (1)
- peripheral vision (1)
- peripheral visual field (1)
- photometry (1)
- physical activity (1)
- physical model immersive (1)
- physiological monitoring (1)
- preprocessing (1)
- project-based learning (1)
- projection (1)
- property-based testing for robots (1)
- prototype theory (1)
- proxemics (1)
- pseudo-random number generator (1)
- quality-diversity (1)
- question answering (1)
- recurrent neural network function (1)
- redundant work (1)
- reference dataset (1)
- regression (1)
- reinforcement learning (1)
- remote diagnosis (1)
- remote sensing (1)
- remote-controlled robots (1)
- rendering (computer graphics) (1)
- requirements (1)
- requirements analysis (1)
- requirements management (1)
- residual sinks (1)
- resource utilization (1)
- robot action diagnosability (1)
- robot component monitoring (1)
- robot dynamics (1)
- robot execution failures (1)
- robot kinematics (1)
- robotic black box (1)
- robots (1)
- rules (1)
- rural areas (1)
- scene element representation (1)
- screens (display) (1)
- see-through display (1)
- see-through head-mounted displays (1)
- self-configuration (1)
- self-management (1)
- semantic image seg-mentation (1)
- semi-supervised learning (1)
- sensor data acquisition (1)
- sensor data transmission (1)
- sensor-based fault detection and diagnosis (1)
- service activities (1)
- service robots (1)
- short-term memory (1)
- simulation-based robot testing (1)
- simulator (1)
- skin detection (1)
- software engineering (1)
- software-based feedback agents (1)
- spectral rendering (1)
- spectrum scan (1)
- spectrum sensing (1)
- speech recognition (1)
- speech understanding (1)
- stereoscopic vision (1)
- story authoring (1)
- strain (1)
- stress (1)
- stress detection (1)
- structural equation modeling (1)
- submillimeter precision (1)
- support vector machine (1)
- surface textures (1)
- surface topography (1)
- synthetic dataset (1)
- teaching (1)
- telepresence (1)
- territoriality (1)
- text entry in motion (1)
- text mining (1)
- tiled displays (1)
- time series processing (1)
- touchscreen (1)
- traffic surveillance (1)
- transfer learning (1)
- true random number generator (1)
- ultrasonic sensor (1)
- un-manned aerial vehicle (1)
- unexpected situations (1)
- unique bond graph representation for all modes of operation (1)
- unmanned ground vehicle (1)
- unstructured data (1)
- usability (1)
- usable secure email (1)
- usage contexts (1)
- usage data analysis (1)
- user documentation (1)
- user engagement (1)
- user interface design (1)
- user study (1)
- vection (1)
- verification and validation of robot action execution (1)
- vibration (1)
- virtual environment framework (1)
- virtual locomotion (1)
- virtual or soft keyboard (1)
- visual quality control (1)
- visualisation (1)
- visualization (1)
- visuohaptic feedback (1)
- walking (1)
- web (1)
- web components (1)
- web technology (1)
- website (1)
- welfare technology (1)
- whole-body interface (1)
- wireless communication (1)
- wireless performance (1)
- wmSDN (1)
- workspace awareness (1)
- xorshift-generator (1)
- youBot (1)
- zooming interface (1)
Selection Performance and Reliability of Eye and Head Gaze Tracking Under Varying Light Conditions
(2024)
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
(2024)
Ziel der neunten Ausgabe des wissenschaftlichen Workshops "Usable Security und Privacy" auf der Mensch und Computer 2023 ist es, aktuelle Forschungs- und Praxisbeiträge auf diesem Gebiet zu präsentieren und mit den Teilnehmer:innen zu diskutieren. Getreu dem Konferenzmotto "Building Bridges" soll mit dem Workshop ein etabliertes Forum fortgeführt und weiterentwickelt werden, in dem sich Expert:innen, Forscher:innen und Praktiker:innen aus unterschiedlichen Domänen transdisziplinär zum Thema Usable Security und Privacy austauschen können. Das Thema betrifft neben dem Usability- und Security-Engineering unterschiedliche Forschungsgebiete und Berufsfelder, z. B. Informatik, Ingenieurwissenschaften, Mediengestaltung und Psychologie. Der Workshop richtet sich an interessierte Wissenschaftler:innen aus all diesen Bereichen, aber auch ausdrücklich an Vertreter:innen der Wirtschaft, Industrie und öffentlichen Verwaltung.
Question Answering (QA) has gained significant attention in recent years, with transformer-based models improving natural language processing. However, issues of explainability remain, as it is difficult to determine whether an answer is based on a true fact or a hallucination. Knowledge-based question answering (KBQA) methods can address this problem by retrieving answers from a knowledge graph. This paper proposes a hybrid approach to KBQA called FRED, which combines pattern-based entity retrieval with a transformer-based question encoder. The method uses an evolutionary approach to learn SPARQL patterns, which retrieve candidate entities from a knowledge base. The transformer-based regressor is then trained to estimate each pattern’s expected F1 score for answering the question, resulting in a ranking ofcandidate entities. Unlike other approaches, FRED can attribute results to learned SPARQL patterns, making them more interpretable. The method is evaluated on two datasets and yields MAP scores of up to 73 percent, with the transformer-based interpretation falling only 4 pp short of an oracle run. Additionally, the learned patterns successfully complement manually generated ones and generalize well to novel questions.
LiDAR-based Indoor Localization with Optimal Particle Filters using Surface Normal Constraints
(2023)
In the project EILD.nrw, Open Educational Resources (OER) have been developed for teaching databases. Lecturers can use the tools and courses in a variety of learning scenarios. Students of computer science and application subjects can learn the complete life cycle of databases. For this purpose, quizzes, interactive tools, instructional videos, and courses for learning management systems are developed and published under a Creative Commons license. We give an overview of the developed OERs according to subject, description, teaching form, and format. Following, we describe how licencing, sustainability, accessibility, contextualization, content description, and technical adaptability are implemented. The feedback of students in ongoing classes are evaluated.
TSEM: Temporally-Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series
(2023)
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
(2023)
Online services have difficulties to replace passwords with more secure user authentication mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that users tend to reject such mechanisms in use cases outside of online banking. Relying on password authentication alone, however, is not an option in light of recent attack patterns such as credential stuffing.
Risk-Based Authentication (RBA) can serve as an interim solution to increase password-based account security until better methods are in place. Unfortunately, RBA is currently used by only a few major online services, even though it is recommended by various standards and has been shown to be effective in scientific studies. This paper contributes to the hypothesis that the low adoption of RBA in practice can be due to the complexity of implementing it. We provide an RBA implementation for the open source cloud management software OpenStack, which is the first fully functional open source RBA implementation based on the Freeman et al. algorithm, along with initial reference tests that can serve as a guiding example and blueprint for developers.
Trojanized software packages used in software supply chain attacks constitute an emerging threat. Unfortunately, there is still a lack of scalable approaches that allow automated and timely detection of malicious software packages and thus most detections are based on manual labor and expertise. However, it has been observed that most attack campaigns comprise multiple packages that share the same or similar malicious code. We leverage that fact to automatically reproduce manually identified clusters of known malicious packages that have been used in real world attacks, thus, reducing the need for expert knowledge and manual inspection. Our approach, AST Clustering using MCL to mimic Expertise (ACME), yields promising results with a 𝐹1 score of 0.99. Signatures are automatically generated based on characteristic code fragments from clusters and are subsequently used to scan the whole npm registry for unreported malicious packages. We are able to identify and report six malicious packages that have been removed from npm consequentially. Therefore, our approach can support the detection by reducing manual labor and hence may be employed by maintainers of package repositories to detect possible software supply chain attacks through trojanized software packages.
Digital ecosystems are driving the digital transformation of business models. Meanwhile, the associated processing of personal data within these complex systems poses challenges to the protection of individual privacy. In this paper, we explore these challenges from the perspective of digital ecosystems' platform providers. To this end, we present the results of an interview study with seven data protection officers representing a total of 12 digital ecosystems in Germany. We identified current and future challenges for the implementation of data protection requirements, covering issues on legal obligations and data subject rights. Our results support stakeholders involved in the implementation of privacy protection measures in digital ecosystems, and form the foundation for future privacy-related studies tailored to the specifics of digital ecosystems.