Refine
Departments, institutes and facilities
- Fachbereich Informatik (31)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (15)
- Fachbereich Ingenieurwissenschaften und Kommunikation (14)
- Institut für Verbraucherinformatik (IVI) (13)
- Institute of Visual Computing (IVC) (10)
- Institut für Cyber Security & Privacy (ICSP) (9)
- Fachbereich Wirtschaftswissenschaften (8)
- Zentrum für Innovation und Entwicklung in der Lehre (ZIEL) (4)
- Fachbereich Angewandte Naturwissenschaften (2)
- Institut für Sicherheitsforschung (ISF) (1)
Document Type
- Conference Object (65) (remove)
Year of publication
- 2020 (65) (remove)
Language
- English (65) (remove)
Keywords
- Artificial Intelligence (2)
- Evolutionary computation (2)
- Quality diversity (2)
- Shared autonomous vehicles (2)
- Sustainability (2)
- Usable Security (2)
- robotics (2)
- 2D Level Design (1)
- 3D interfaces (1)
- AMD Family 15h (1)
- ANN (1)
- AOP (1)
- Active Learning (1)
- Application in electrochemistry (1)
- Appropriation (1)
- Authentication (1)
- Autoencoder (1)
- Automatic Short Answer Grading (1)
- Autonomous Driving (1)
- Bayesian optimization (1)
- CPUID instruction (1)
- Cache-independent (1)
- Care (1)
- Caregiver (1)
- Claim personal data (1)
- Co-located Collaboration (1)
- Collaborating industrial robots (1)
- Community (1)
- Complex systems modeling and simulation (1)
- Compliant Manipulation (1)
- Computational fluid dynamics (1)
- Computer-supported Cooperative Work (1)
- Covert channel (1)
- Critical power (1)
- Cross-core (1)
- DC-cascade (1)
- Data takeout (1)
- Dementia (1)
- Digital common goods (1)
- Domestic Robots (1)
- Embedded system (1)
- Exergame (1)
- FPGA (1)
- Folk theories (1)
- Food (1)
- Functional safety (1)
- Future Work (1)
- GDPR (1)
- Gaussian processes (1)
- Grassroots (1)
- Group Behavior (1)
- Groupware (1)
- HFI (1)
- HTTP (1)
- Human-Centered Robotics (1)
- Human-Robot Collaboration (1)
- ICT (1)
- Impaired (1)
- Index-one DAEs (1)
- Information hiding (1)
- Informational self-determination (1)
- Instruction scheduling (1)
- Jobs (1)
- Learning (1)
- Learning analytics (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Maker space (1)
- Makers (1)
- Mental Models (1)
- Mental models (1)
- Misconception (1)
- Mobility (1)
- Modal Shift (1)
- Multi-objective optimization (1)
- Multimodal optimization (1)
- Multithreaded and multicore architecture (1)
- NIR-point sensor (1)
- Non-linear optimization (1)
- OER (1)
- Order reduction (1)
- PID (1)
- Parameter identification (1)
- Passengers (1)
- Password (1)
- Peer-to-Peer (1)
- Perceived AI (1)
- Performance profiling (1)
- Phenotypic niching (1)
- Platform economy (1)
- Privacy (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Probabilistic model (1)
- REST (1)
- Re-authentication (1)
- Remote Work (1)
- Risk-based Authentication (1)
- Risk-based Authentication (RBA) (1)
- Robo-taxi (1)
- Robots (1)
- Rosenbrock-Wanner Methods (1)
- Service Design (1)
- Shared Autonomous Vehicles (1)
- Skin detection (1)
- Smart InGaAs camera-system (1)
- Social sustainability (1)
- Surrogate models (1)
- Sustainable HCI (1)
- TOC (1)
- Task Frame Formalism (1)
- Taxi (1)
- Teleoperation (1)
- Trust (1)
- Two-factor Authentication (1)
- Ultrasonic array (1)
- Usable Privacy (1)
- User Roles (1)
- User studies (1)
- W methods (1)
- WWW (1)
- Web components (1)
- Wizard of Oz (1)
- asset transfer (1)
- blockchain (1)
- carsharing (1)
- change management (1)
- cognitive radio (1)
- connected car (1)
- cooperative path planning (1)
- cooperative sensing (1)
- cryptocurrency (1)
- cryptographic apis (1)
- developer console (1)
- digital design (1)
- e-learning (1)
- end-to-end security (1)
- energy detection (1)
- first-year teaching (1)
- focus groups (1)
- fusion centre (1)
- haptics (1)
- iOER (1)
- medium voltage insulation (1)
- melting heater (1)
- mesoscopic agents (1)
- multi-layer display (1)
- navigation (1)
- neural networks (1)
- ozonation (1)
- ozone (1)
- participatory design (1)
- payment protocol (1)
- permanent magnet synchronous generator (PMSG) (1)
- plastic industry (1)
- power converter (1)
- project passed learning (1)
- rebound effects (1)
- reinforcement learning (1)
- remote lab (1)
- robot action diagnosability (1)
- robot execution failures (1)
- security (1)
- security warning design (1)
- semantic image seg-mentation (1)
- sharing (1)
- signature (1)
- software development (1)
- spectrum sensing (1)
- stereoscopic vision (1)
- technological platform (1)
- telepresence (1)
- temperature controller (1)
- throughput maximization (1)
- ultrapure water (1)
- un-manned aerial vehicle (1)
- unmanned ground vehicle (1)
- usability (1)
- usable secure email (1)
- user interface design (1)
- video lectures (1)
- web caching (1)
- wind energy conversion systems (WECS) (1)
Towards an Interaction-Centered and Dynamically Constructed Episodic Memory for Social Robots
(2020)
Computers can help us to trigger our intuition about how to solve a problem. But how does a computer take into account what a user wants and update these triggers? User preferences are hard to model as they are by nature vague, depend on the user’s background and are not always deterministic, changing depending on the context and process under which they were established. We pose that the process of preference discovery should be the object of interest in computer aided design or ideation. The process should be transparent, informative, interactive and intuitive. We formulate Hyper-Pref, a cyclic co-creative process between human and computer, which triggers the user’s intuition about what is possible and is updated according to what the user wants based on their decisions. We combine quality diversity algorithms, a divergent optimization method that can produce many, diverse solutions, with variational autoencoders to both model that diversity as well as the user’s preferences, discovering the preference hypervolume within large search spaces.
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs
(2020)
Autonomous driving enables new mobility concepts such as shared-autonomous services. Although significant re-search has been done on passenger-car interaction, work on passenger interaction with robo-taxis is still rare. In this paper, we tackle the question of how passengers experience robo-taxis as a service in real-life settings to inform the interaction design. We conducted a Wizard of Oz study with an electric vehicle where the driver was hidden from the passenger to simulate the service experience of a robo-taxi. 10 participants had the opportunity to use the simulated shared-autonomous service in real-life situations for one week. By the week's end, 33 rides were completed and recorded on video. Also, we flanked the study conducting interviews before and after with all participants. The findings provided insights into four design themes that could inform the service design of robo-taxis along the different stages including hailing, pick-up, travel, and drop-off.
This paper aspires to develop a deeper understanding of the sharing/collaborative/platform economy, and in particular of the technical mechanisms upon which the digital platforms supporting it are built. In surveying the research literature, the paper identifies a gap between studies from economical, social or socio-technical angles, and presentations of detailed technical solutions. Most cases study larger, ‘monotechnological’ platforms, rather than local platforms that lend components from several technologies. Almost no literature takes a design perspective. Rooted in Sharing & Caring, an EU COST Action (network), the paper presents work to systematically map out functionalities across domains of the sharing economy. The 145 technical mechanisms we collected illustrate how most platforms are depending on a limited number of functionalities that lack in terms of holding communities together. The paper points to the necessity of a better terminology and concludes by discussing challenges and opportunities for the design of future and more inclusive platforms.
Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional features during login, and when observed feature values differ significantly from previously seen ones, users have to provide additional authentication factors such as a verification code. RBA has the potential to offer more usable authentication, but the usability and the security perceptions of RBA are not studied well.
We present the results of a between-group lab study (n=65) to evaluate usability and security perceptions of two RBA variants, one 2FA variant, and password-only authentication. Our study shows with significant results that RBA is considered to be more usable than the studied 2FA variants, while it is perceived as more secure than password-only authentication in general and comparably secure to 2FA in a variety of application types. We also observed RBA usability problems and provide recommendations for mitigation. Our contribution provides a first deeper understanding of the users' perception of RBA and helps to improve RBA implementations for a broader user acceptance.
When a robotic agent experiences a failure while acting in the world, it should be possible to discover why that failure has occurred, namely to diagnose the failure. In this paper, we argue that the diagnosability of robot actions, at least in a classical sense, is a feature that cannot be taken for granted since it strongly depends on the underlying action representation. We specifically define criteria that determine the diagnosability of robot actions. The diagnosability question is then analysed in the context of a handle manipulation action, such that we discuss two different representations of the action – a composite policy with a learned success model for the action parameters, and a neural network-based monolithic policy – both of which exist on different sides of the diagnosability spectrum. Through this comparison, we conclude that composite actions are more suited to explicit diagnosis, but representations with less prior knowledge are more flexible. This suggests that model learning may provide balance between flexibility and diagnosability; however, data-driven diagnosis methods also need to be enhanced in order to deal with the complexity of modern robots.
Gone But Not Forgotten: Evaluating Performance and Scalability of Real-Time Mesoscopic Agents
(2020)
Telepresence robots allow people to participate in remote spaces, yet they can be difficult to manoeuvre with people and obstacles around. We designed a haptic-feedback system called “FeetBack," which users place their feet in when driving a telepresence robot. When the robot approaches people or obstacles, haptic proximity and collision feedback are provided on the respective sides of the feet, helping inform users about events that are hard to notice through the robot’s camera views. We conducted two studies: one to explore the usage of FeetBack in virtual environments, another focused on real environments.We found that FeetBack can increase spatial presence in simple virtual environments. Users valued the feedback to adjust their behaviour in both types of environments, though it was sometimes too frequent or unneeded for certain situations after a period of time. These results point to the value of foot-based haptic feedback for telepresence robot systems, while also the need to design context-sensitive haptic feedback.
In 1991 the researchers at the center for the Learning Sciences of Carnegie Mellon University were confronted with the confusing question of “where is AI” from the users, who were interacting with AI but did not realize it. Three decades of research and we are still facing the same issue with the AItechnology users. In the lack of users’ awareness and mutual understanding of AI-enabled systems between designers and users, informal theories of the users about how a system works (“Folk theories”) become inevitable but can lead to misconceptions and ineffective interactions. To shape appropriate mental models of AI-based systems, explainable AI has been suggested by AI practitioners. However, a profound understanding of the current users’ perception of AI is still missing. In this study, we introduce the term “Perceived AI” as “AI defined from the perspective of its users”. We then present our preliminary results from deep-interviews with 50 AItechnology users, which provide a framework for our future research approach towards a better understanding of PAI and users’ folk theories.
Efficient and comprehensive assessment of students knowledge is an imperative task in any learning process. Short answer grading is one of the most successful methods in assessing the knowledge of students. Many supervised learning and deep learning approaches have been used to automate the task of short answer grading in the past. We investigate why assistive grading with active learning would be the next logical step in this task as there is no absolute ground truth answer for any question and the task is very subjective in nature. We present a fast and easy method to harness the power of active learning and natural language processing in assisting the task of grading short answer questions. A webbased GUI is designed and implemented to incorporate an interactive short answer grading system. The experiments show that active learning saves the time and effort of graders in assessment and reaches the performance of supervised learning with less amount of graded answers for training.
Evaluation of a Multi-Layer 2.5D display in comparison to conventional 3D stereoscopic glasses
(2020)
In this paper we propose and evaluate a custom-build projection-based multilayer 2.5D display, consisting of three layers of images, and compare performance to a stereoscopic 3D display. Stereoscopic vision can increase the involvement and enhance game experience, however may induce possible side effects, e.g. motion sickness and simulator sickness. To overcome the disadvantage of multiple discrete depths, in our system perspective rendering and head-tracking is used. A study was performed to evaluate this display with 20 participants playing custom-designed games. The results indicated that the multi-layer display caused fewer side effects than the stereoscopic display and provided good usability. The participants also stated a better or equal spatial perception, while the cognitive load stayed the same.
Compliant manipulation is a crucial skill for robots when they are supposed to act as helping hands in everyday household tasks. Still, nowadays, those skills are hand-crafted by experts which frequently requires labor-intensive, manual parameter tuning. Moreover, some tasks are too complex to be specified fully using a task specification. Learning these skills, by contrast, requires a high number of costly and potentially unsafe interactions with the environment. We present a compliant manipulation approach using reinforcement learning guided by the Task Frame Formalism, a task specification method. This allows us to specify the easy to model knowledge about a task while the robot learns the unmodeled components by reinforcement learning. We evaluate the approach by performing a compliant manipulation task with a KUKA LWR 4+ manipulator. The robot was able to learn force control policies directly on the robot without using any simulation.
Long-term variability of solar irradiance and its implications for photovoltaic power in West Africa
(2020)
West Africa is one of the least developed regions in the world regarding the energy availability and energy security. Located close to the equator West Africa receives high amounts of global horizontal irradiance (GHI). Thus, solar power and especially photovoltaic (PV) systems seem to be a promising solution to provide electricity with low environmental impact. To plan and to dimension a PV power system climatological data for global horizontal irradiance (GHI) and its variability need to be taken into account. However, ground based measurements of irradiances are not available continuously and cover only a few discrete locations.
This work presents the development of a measuring system for the quality control of ultrapure water. The new systems combines ozonation and UV radiation for the oxidation of organic substances. The change in conductivity caused by the oxidation is furthermore correlated with the TOC of the solution.
Exploring Future Work - Co-Designing a Human-robot Collaboration Environment for Service Domains
(2020)
There has been increasing interest in the application of humanoid robots in service domains like retail or care homes in recent years. Here, most use cases focus on serving customer needs autonomously. Frequently, human intervention becomes necessary to support the robot in exceptional situations. However, direct intervention of service operators is often not possible and requires specialized personnel. In a co-design process with 13 service operators from a pharmacy, we designed a remote working environment for human-robot collaboration that enables first-time experiences and collaboration with robots. Five participants took part in an assessment study and reported on their experiences about the utility, usability and user experience. Results show that participants were able to control and train the robot through the remote control environment. We discuss implications of our results for future work in service domains and emphasize a shift of focus from full robot automatization to human-robot collaboration forms.
Risk-based Authentication (RBA) is an adaptive security measure that improves the security of password-based authentication by protecting against credential stuffing, password guessing, or phishing attacks. RBA monitors extra features during login and requests for an additional authentication step if the observed feature values deviate from the usual ones in the login history. In state-of-the-art RBA re-authentication deployments, users receive an email with a numerical code in its body, which must be entered on the online service. Although this procedure has a major impact on RBA's time exposure and usability, these aspects were not studied so far.
We introduce two RBA re-authentication variants supplementing the de facto standard with a link-based and another code-based approach. Then, we present the results of a between-group study (N=592) to evaluate these three approaches. Our observations show with significant results that there is potential to speed up the RBA re-authentication process without reducing neither its security properties nor its security perception. The link-based re-authentication via "magic links", however, makes users significantly more anxious than the code-based approaches when perceived for the first time. Our evaluations underline the fact that RBA re-authentication is not a uniform procedure. We summarize our findings and provide recommendations.
The encoding of solutions in black-box optimization is a delicate, handcrafted balance between expressiveness and domain knowledge between exploring a wide variety of solutions, and ensuring that those solutions are useful. Our main insight is that this process can be automated by generating a dataset of high-performing solutions with a quality diversity algorithm (here, MAP-Elites), then learning a representation with a generative model (here, a Varia-tional Autoencoder) from that dataset. Our second insight is that this representation can be used to scale quality diversity optimization to higher dimensions-but only if we carefully mix solutions generated with the learned representation and those generated with traditional variation operators. We demonstrate these capabilities by learning an low-dimensional encoding for the inverse kinemat-ics of a thousand joint planar arm. The results show that learned representations make it possible to solve high-dimensional problems with orders of magnitude fewer evaluations than the standard MAP-Elites, and that, once solved, the produced encoding can be used for rapid optimization of novel, but similar, tasks. The presented techniques not only scale up quality diversity algorithms to high dimensions, but show that black-box optimization encodings can be automatically learned, rather than hand designed.
This paper introduces FaceHaptics, a novel haptic display based on a robot arm attached to a head-mounted virtual reality display. It provides localized, multi-directional and movable haptic cues in the form of wind, warmth, moving and single-point touch events and water spray to dedicated parts of the face not covered by the head-mounted display.The easily extensible system, however, can principally mount any type of compact haptic actuator or object. User study 1 showed that users appreciate the directional resolution of cues, and can judge wind direction well, especially when they move their head and wind direction is adjusted dynamically to compensate for head rotations. Study 2 showed that adding FaceHaptics cues to a VR walkthrough can significantly improve user experience, presence, and emotional responses.
There has been increasing interest in designing for dementia in recent years. Empirical investigation is now needed of the long-term role of caregivers in appropriating ICTs into the complex daily life of people with dementia (PwD). We present here the outcomes of a 4-month evaluation of the individual, social and institutional impact of a videogame-based training system. The everyday behavior and interactions of 52 PwD and 25 caregivers was studied qualitatively, focusing on the role played by caregivers in integrating the system into daily routines. Our results indicate that the successful appropriation of ICT for PwD depends partly on the physical, cognitive and social benefits for PwD, but especially on the added value perceived by their social care-network. We discuss the need for design in dementia to develop more socially embedded innovations that can address the social actors involved and thus contribute to practical solutions for professional and private care.
Trust is the lubricant of the sharing economy. This is true especially in peer-to-peer carsharing, in which one leaves a highly valuable good to a stranger in the hope of getting it back unscathed. Nowadays, ratings of other users are major mechanisms for establishing trust. To foster uptake of peer-to-peer carsharing, connected car technology opens new possibilities to support trust-building, e.g., by adding driving behavior statistics to users' profiles. However, collecting such data intrudes into rentees' privacy. To explore the tension between the need for trust and privacy demands, we conducted three focus group and eight individual interviews. Our results show that connected car technologies can increase trust for car owners and rentees not only before but also during and after rentals. The design of such systems must allow a differentiation between information in terms of type, the context, and the negotiability of information disclosure.