Refine
H-BRS Bibliography
- no (58) (remove)
Departments, institutes and facilities
Document Type
- Article (21)
- Conference Object (20)
- Part of a Book (9)
- Contribution to a Periodical (4)
- Book (monograph, edited volume) (1)
- Conference Proceedings (1)
- Master's Thesis (1)
- Report (1)
Year of publication
- 2016 (58) (remove)
Has Fulltext
- no (58)
Keywords
- API usability (1)
- Adaptive Media Streaming (1)
- Ceramic matrix composite (1)
- Collaborative design (1)
- Crisis management (1)
- Culture (1)
- Data Compression (1)
- Data Reduction (1)
- Data Tiles (1)
- Destination marketing (1)
- Difference-coding (1)
- Disclosive ethics (1)
- E-Learning (1)
- ELSI (1)
- EPHB2 (1)
- Enterprise Resource Planning (1)
- Epithelial-mesenchymal transition (1)
- Evaluation (1)
- FOXA1 (1)
- ICT (1)
- Informationssicherheit (1)
- LEF1 (1)
- MYB (1)
- Market segmentation (1)
- Methodology (1)
- Na+/K+ ATPase (1)
- Privacy (1)
- Push-based Streaming (1)
- SOS calls (1)
- Security (1)
- Security APIs (1)
- Serbian tourism (1)
- Size effect (1)
- Software Security (1)
- Tourist behavior (1)
- Transcriptional enhancer (1)
- Usable Security (1)
- Web (1)
- WebSocket (1)
- Weibull (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- airway (1)
- conceptual culture model (1)
- design science research (1)
- emergency response (1)
- epithelial sodium channels (1)
- erp4students (1)
- failure criterion (1)
- flame tube (1)
- gasotransmitter (1)
- hydrogen sulfide (1)
- hypoxia (1)
- investment casting (1)
- mobile computing (1)
- validity (1)
- visibility (1)
- weakest link (1)
Mensch-Roboter-Kollaboration
(2016)
Eine enge Zusammenarbeit von Mensch und Roboter, die sogenannte Mensch-Roboter-Kollaboration (MRK), könnte eine bisher beispielslose Produktivität entstehen lassen. Bis zur allgemeinen Nutzung der Technologie sind noch zahlreiche Probleme zu lösen, insbesondere die des Arbeits- und Gesundheitsschutzes. Am Institut für Sicherheitsforschung der Hochschule Bonn-Rhein-Sieg wurde in den vergangenen Jahren eine Reihe von Projekten zur Entwicklung von optischen Sensorsystemen für Schutzeinrichtungen durchgeführt. Im Projekt SPAI (Sichere Personendetektion im Arbeitsbereich von Industrierobotern durch ein aktives NIR-Kamerasystem) wurde ein spezielles Kamerasystem für den nahinfraroten (NIR) Spektralbereich entwickelt.
Nicht im Elfenbeinturm
(2016)
Neues Lizenzmanagement
(2016)
This report summarises and integrates two different tracks of research for the purpose of envisioning and preparing a joint research project proposal. Soft- and hardware systems have become increasingly complex and act "concurrently", both with respect to memory access (i.e. information flow) and computational resources (i.e. "services"). The software development metaphor of cloud-storage, cloud-computing and service-oriented design has been anticipated by artificial intelligence (AI) research at least 30 years ago (parallel and distributed computation already dates back to the 1950’s and 1970s). What is known as a "service" today is what in AI is known as the capability of an agent; and the problem of information flow and consistency has been a headstone of information processing ever since. Based on a real-world robotics application we demonstrate how an increasingly abstract description of collaborating or competing agents correspond to a set of concurrent processes.
Job-related migration has been fostered across Europe balancing unemployment in one country with demands for employees in others. However, the numbers of early school leavers and university dropouts significantly increased in the hosting countries. We propose a higher measure of cultural sensitivity in education in order to prevent frustration. The Learning Culture Survey investigates learners’ expectations towards and perceptions of education on international level with the aim to make culture in the context of education better understandable. After a brief introduction, we subsume the steps taken during the past seven years and found results. Subsequently, we introduce a method for the determination of conflict potential, which bases on the understanding of culture as the level to which people within a society accept deviations from the usual. We close with demonstrating the usefulness of the data and insights from our Learning Culture Survey in the context of practical scenarios.
In this paper, we introduce the international program erp4students as general example on how to successfully prepare university students for the world of works without having to give up the basic principle in higher education, i.e., to exclusively provide sustainable education. We start with introducing the basic concept and design of the program and provide information regarding the demographic development over the past decade and implemented quality assurance mechanisms. Subsequently, the scope and design of and hitherto achieved insights from the Learning Culture Survey are outlined. On the basis of found results, we finally discuss how erp4students can deal with possible culture-specific issues that latest might emerge when the program gets available for learners in the Asian context.
Die Festsetzungspraxis des GKV-Spitzenverbands im Festbetragswesen - eine kritische Bestandsaufnahme
(2016)
Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revealed by recent security studies. One major reason for this is rooted in usability issues. API Usability research has been deriving recommendations for designing usable APIs in general. Facing the growing relevance of Security APIs, the question arises, whether the observed usability aspects in the general space are already sufficient enough for building usable Security APIs. The currently available findings in the API Usability domain are selective fragments only, though. This still emerging field has not produced a comprehensive model yet. As a consequence, a first contribution of this paper is such a model that provides a consolidated view on the current research coverage of API Usability. On this baseline, the paper continues by conducting an analysis of relevant security studies, which give insights on usability problems developers had, when using Security APIs. This analysis leads to a proposal of eleven specific usability characteristics relevant for Security APIs. These have to be followed up by usability studies in order to evaluate how Security APIs need to be designed in a usable way and which potential trade-offs have to be balanced.
Online media consumption is the main driving force for the recent growth of the Web. As especially realtime media is becoming more and more accessible from a wide range of devices, with contrasting screen resolutions, processing resources and network connectivity, a necessary requirement is providing users with a seamless multimedia experience at the best possible quality, henceforth being able to adapt to the specific device and network conditions. This paper introduces a novel approach for adaptive media streaming in the Web. Despite the pervasive pullbased designs based on HTTP, this paper builds upon a Web-native push-based approach by which both the communication and processing overheads are reduced significantly in comparison to the pull-based counterparts. In order to maintain these properties when enhancing the scheme by adaptation features, a server-side monitoring and control needs to be developed as a consequence. Such an adaptive push-based media streaming approach is intr oduced as main contribution of this work. Moreover, the obtained evaluation results provide the evidence that with an adaptive push-based media delivery, on the one hand, an equivalent quality of experience can be provided at lower costs than by adopting pull-based media streaming. On the other hand, an improved responsiveness in switching between quality levels can be obtained at no extra costs.
The aim of design science research (DSR) in information systems is the user-centred creation of IT-artifacts with regard to specific social environments. For culture research in the field, which is necessary for a proper localization of IT-artifacts, models and research approaches from social sciences usually are adopted. Descriptive dimension-based culture models most commonly are applied for this purpose, which assume culture being a national phenomenon and tend to reduce it to basic values. Such models are useful for investigations in behavioural culture research because it aims to isolate, describe and explain culture-specific attitudes and characteristics within a selected society. In contrast, with the necessity to deduce concrete decisions for artifact-design, research results from DSR need to go beyond this aim. As hypothesis, this contribution generally questions the applicability of such generic culture dimensions’ models for DSR and focuses on their theoretical foundation, which goes back to Hofstede’s conceptual Onion Model of Culture. The herein applied literature-based analysis confirms the hypothesis. Consequently, an alternative conceptual culture model is being introduced and discussed as theoretical foundation for culture research in DSR.
MOOCs in POM Education
(2016)
Basic demand from enterprises towards academic education: provide students not only methodological/theoretical knowledge, but also prepare them for the future tasks in the world of works! This contradicts academia’s focus on sustainably teaching basic principles. With the extra-curricular international online program erp4students, we successfully managed to bridge this "conflict-of-interest”.
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
In Fortführung zum erfolgreichen Auftaktworkshop „Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten“ auf der Mensch und Computer 2015 werden in einem zweiten wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer vier Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert. Das Programm bilden Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze, aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop wird das etablierte Forum weiterentwickelt, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee hat die Einreichungen bewertet und daraus die zur Präsentation akzeptierten Beiträge ausgewählt.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.
The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2016), held between November 13-17, 2016 - Barcelona, Spain, continued the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies and applications.
We demonstrated previously that phosphocholine and phosphocholine-modified macromolecules efficiently inhibit ATP-dependent release of interleukin-1β from human and murine monocytes by a mechanism involving nicotinic acetylcholine receptors (nAChR). Interleukin-1β is a potent pro-inflammatory cytokine of innate immunity that plays pivotal roles in host defence. Control of interleukin-1β release is vital as excessively high systemic levels cause life threatening inflammatory diseases. In spite of its structural similarity to acetylcholine, there are no other reports on interactions of phosphocholine with nAChR. In this study, we demonstrate that phosphocholine inhibits ion-channel function of ATP receptor P2X7 in monocytic cells via nAChR containing α9 and α10 subunits. In stark contrast to choline, phosphocholine does not evoke ion current responses in Xenopus laevis oocytes, which heterologously express functional homomeric nAChR composed of α9 subunits or heteromeric receptors containing α9 and α10 subunits. Preincubation of these oocytes with phosphocholine, however, attenuated choline-induced ion current changes, suggesting that phosphocholine may act as a silent agonist. We conclude that phophocholine activates immuno-modulatory nAChR expressed by monocytes but does not stimulate canonical ionotropic receptor functions.
Hydrogen sulfide (H2S) is a well-known environmental chemical threat with an unpleasant smell of rotten eggs. Aside from the established toxic effects of high-dose H2S, research over the past decade revealed that cells endogenously produce small amounts of H2S with physiological functions. H2S has therefore been classified as a gasotransmitter. A major challenge for cells and tissues is the maintenance of low physiological concentrations of H2S in order to prevent potential toxicity. Epithelia of the respiratory and gastrointestinal tract are especially faced with this problem, since these barriers are predominantly exposed to exogenous H2S from environmental sources or sulfur-metabolising microbiota. In this paper, we review the cellular mechanisms by which epithelial cells maintain physiological, endogenous H2S concentrations. Furthermore, we suggest a concept by which epithelia use their electrolyte and liquid transport machinery as defence mechanisms in order to eliminate exogenous sources for potentially harmful H2S concentrations.
Hydrogen sulfide contributes to hypoxic inhibition of airway transepithelial sodium absorption
(2016)
An exploratory study: Analysis of Serbian tourism market and identification of major market segments
(2016)
An analysis of sharing string objects with the Java Virtual Machine was conducted; they are the most used objects in Java programs and they are immutable - thus they are read-only and easily identified. While the results are promising, it is clear that sharing more objects would result in better performance. Automatic object selection for sharing is non-trivial, because in the current state only read-only objects can be shared. This attribute can not be easily determined during runtime by an algorithm; the developer on the other hand can. This thesis presents the development of an Application Programmer Interface (API) that allows programmers to use the Java Virtual Machine (JVM) internal sharing functionality. Furthermore, we present the usage of the sharing API. Open-source software was used as real-world test cases. Afterwards the evaluation shows that the ratio between memory savings and start-up time overhead is reasonable.