Refine
Departments, institutes and facilities
- Fachbereich Informatik (34)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (18)
- Institut für Verbraucherinformatik (IVI) (18)
- Fachbereich Ingenieurwissenschaften und Kommunikation (14)
- Fachbereich Wirtschaftswissenschaften (12)
- Institut für Cyber Security & Privacy (ICSP) (12)
- Institute of Visual Computing (IVC) (10)
- Fachbereich Sozialpolitik und Soziale Sicherung (4)
- Zentrum für Innovation und Entwicklung in der Lehre (ZIEL) (4)
- Fachbereich Angewandte Naturwissenschaften (3)
Document Type
- Conference Object (83) (remove)
Year of publication
- 2020 (83) (remove)
Keywords
- Usable Security (3)
- Artificial Intelligence (2)
- Evolutionary computation (2)
- Peer-to-Peer (2)
- Quality diversity (2)
- Shared autonomous vehicles (2)
- Sustainability (2)
- Usable Privacy (2)
- robotics (2)
- sustainability (2)
- usability (2)
- 2D Level Design (1)
- 3D interfaces (1)
- AMD Family 15h (1)
- ANN (1)
- AOP (1)
- Active Learning (1)
- Antimicrobial activity (1)
- Application in electrochemistry (1)
- Appropriation (1)
- Authentication (1)
- Autoencoder (1)
- Automatic Short Answer Grading (1)
- Autonomous Driving (1)
- Bayesian optimization (1)
- Blockchain (1)
- CPUID instruction (1)
- Cache-independent (1)
- Care (1)
- Caregiver (1)
- Claim personal data (1)
- Co-located Collaboration (1)
- Collaborating industrial robots (1)
- Community (1)
- Complex systems modeling and simulation (1)
- Compliant Manipulation (1)
- Computational fluid dynamics (1)
- Computer-supported Cooperative Work (1)
- Covert channel (1)
- Critical power (1)
- Cross-core (1)
- DC-cascade (1)
- Data takeout (1)
- Datenschutz (1)
- Datenschutzerklärungen (1)
- Dementia (1)
- Digital common goods (1)
- Domestic Robots (1)
- Economy (1)
- Embedded system (1)
- Exergame (1)
- FPGA (1)
- Folk theories (1)
- Food (1)
- Food security (1)
- Functional safety (1)
- Future Work (1)
- GDPR (1)
- Gaussian processes (1)
- Grassroots (1)
- Group Behavior (1)
- Groupware (1)
- HFI (1)
- HTTP (1)
- Human computer interaction (1)
- Human-Centered Robotics (1)
- Human-Robot Collaboration (1)
- ICT (1)
- Impaired (1)
- Index-one DAEs (1)
- Information hiding (1)
- Informational self-determination (1)
- Instruction scheduling (1)
- Jobs (1)
- Kompetenz (1)
- Learning (1)
- Learning analytics (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Legal Design (1)
- Maker space (1)
- Makers (1)
- Mental Models (1)
- Mental models (1)
- Misconception (1)
- Mobility (1)
- Modal Shift (1)
- Multi-objective optimization (1)
- Multimodal optimization (1)
- Multithreaded and multicore architecture (1)
- NIR-point sensor (1)
- Non-linear optimization (1)
- OER (1)
- Order reduction (1)
- Organisation (1)
- Organisationsentwicklung (1)
- PID (1)
- Parameter identification (1)
- Passengers (1)
- Password (1)
- Perceived AI (1)
- Performance profiling (1)
- Phenotypic niching (1)
- Platform economy (1)
- Privacy (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Probabilistic model (1)
- REST (1)
- Re-authentication (1)
- Remote Work (1)
- Risk-based Authentication (1)
- Risk-based Authentication (RBA) (1)
- Robo-taxi (1)
- Robots (1)
- Rosenbrock-Wanner Methods (1)
- Service Design (1)
- Shared Autonomous Vehicles (1)
- Sharing Economy (1)
- Skin detection (1)
- Smart Contracts (1)
- Smart InGaAs camera-system (1)
- Social sustainability (1)
- Surrogate models (1)
- Sustainable HCI (1)
- TOC (1)
- Task Frame Formalism (1)
- Taxi (1)
- Teleoperation (1)
- Trust (1)
- Two-factor Authentication (1)
- Ultrasonic array (1)
- User Experience (1)
- User Roles (1)
- User studies (1)
- W methods (1)
- WWW (1)
- Web components (1)
- Western Africa (1)
- Wizard of Oz (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- active packaging (1)
- appropriation (1)
- asset transfer (1)
- biobased (1)
- biodegradable (1)
- blockchain (1)
- breakdowns (1)
- carsharing (1)
- change management (1)
- cognitive radio (1)
- connected car (1)
- cooperative path planning (1)
- cooperative sensing (1)
- cryptocurrency (1)
- cryptographic apis (1)
- developer console (1)
- digital design (1)
- e-learning (1)
- end-to-end security (1)
- energy detection (1)
- farmer trainings (1)
- first-year teaching (1)
- focus groups (1)
- food loss (1)
- fusion centre (1)
- haptics (1)
- iOER (1)
- insect farming and processing (1)
- medium voltage insulation (1)
- melting heater (1)
- mesoscopic agents (1)
- multi-layer display (1)
- navigation (1)
- neural networks (1)
- ozonation (1)
- ozone (1)
- participatory design (1)
- payment protocol (1)
- permanent magnet synchronous generator (PMSG) (1)
- plastic industry (1)
- power converter (1)
- project passed learning (1)
- rebound effects (1)
- reinforcement learning (1)
- remote lab (1)
- robot action diagnosability (1)
- robot execution failures (1)
- security (1)
- security warning design (1)
- semantic image seg-mentation (1)
- sharing (1)
- signature (1)
- software development (1)
- spectrum sensing (1)
- stereoscopic vision (1)
- technological platform (1)
- telepresence (1)
- temperature controller (1)
- throughput maximization (1)
- ultrapure water (1)
- un-manned aerial vehicle (1)
- unmanned ground vehicle (1)
- usable secure email (1)
- user interface design (1)
- video lectures (1)
- voice interaction (1)
- web caching (1)
- wind energy conversion systems (WECS) (1)
Towards an Interaction-Centered and Dynamically Constructed Episodic Memory for Social Robots
(2020)
Computers can help us to trigger our intuition about how to solve a problem. But how does a computer take into account what a user wants and update these triggers? User preferences are hard to model as they are by nature vague, depend on the user’s background and are not always deterministic, changing depending on the context and process under which they were established. We pose that the process of preference discovery should be the object of interest in computer aided design or ideation. The process should be transparent, informative, interactive and intuitive. We formulate Hyper-Pref, a cyclic co-creative process between human and computer, which triggers the user’s intuition about what is possible and is updated according to what the user wants based on their decisions. We combine quality diversity algorithms, a divergent optimization method that can produce many, diverse solutions, with variational autoencoders to both model that diversity as well as the user’s preferences, discovering the preference hypervolume within large search spaces.
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs
(2020)
Validierung einer Web-Applikation zum Fern-Monitoring von Belastungs- und Erholungsparametern
(2020)
Simultan zur agilen Entwicklung einer Web-Applikation, die Parameter der Belastungs- und Beanspruchungssteuerung erfasst, wurden die implementierten Belastungs- und Erholungs-parameter an freiwilligen Testern/innen in der Praxis überprüft. Um sowohl die Applikation als auch die z.T. selbst entwickelten Kenngrößen auf ihre externe Validität hin zu bewerten, werden diese regressionsanalytisch bearbeitet.
Autonomous driving enables new mobility concepts such as shared-autonomous services. Although significant re-search has been done on passenger-car interaction, work on passenger interaction with robo-taxis is still rare. In this paper, we tackle the question of how passengers experience robo-taxis as a service in real-life settings to inform the interaction design. We conducted a Wizard of Oz study with an electric vehicle where the driver was hidden from the passenger to simulate the service experience of a robo-taxi. 10 participants had the opportunity to use the simulated shared-autonomous service in real-life situations for one week. By the week's end, 33 rides were completed and recorded on video. Also, we flanked the study conducting interviews before and after with all participants. The findings provided insights into four design themes that could inform the service design of robo-taxis along the different stages including hailing, pick-up, travel, and drop-off.
This paper aspires to develop a deeper understanding of the sharing/collaborative/platform economy, and in particular of the technical mechanisms upon which the digital platforms supporting it are built. In surveying the research literature, the paper identifies a gap between studies from economical, social or socio-technical angles, and presentations of detailed technical solutions. Most cases study larger, ‘monotechnological’ platforms, rather than local platforms that lend components from several technologies. Almost no literature takes a design perspective. Rooted in Sharing & Caring, an EU COST Action (network), the paper presents work to systematically map out functionalities across domains of the sharing economy. The 145 technical mechanisms we collected illustrate how most platforms are depending on a limited number of functionalities that lack in terms of holding communities together. The paper points to the necessity of a better terminology and concludes by discussing challenges and opportunities for the design of future and more inclusive platforms.
Diese Studie untersucht die Aneignung und Nutzung von Sprachassistenten wie Google Assistant oder Amazon Alexa in Privathaushalten. Unsere Forschung basiert auf zehn Tiefeninterviews mit Nutzern von Sprachassistenten sowie der Evaluation bestimmter Interaktionen in der Interaktionshistorie. Unsere Ergebnisse illustrieren, zu welchen Anlässen Sprachassistenten im heimischen Umfeld genutzt werden, welche Strategien sich die Nutzer in der Interaktion mit Sprachassistenten angeeignet haben, wie die Interaktion abläuft und welche Schwierigkeiten sich bei der Einrichtung und Nutzung des Sprachassistenten ergeben haben. Ein besonderer Fokus der Studie liegt auf Fehlinteraktionen, also Situationen, in denen die Interaktion scheitert oder zu scheitern droht. Unsere Studie zeigt, dass das Nutzungspotenzial der Assistenten häufig nicht ausgeschöpft wird, da die Interaktion in komplexeren Anwendungsfällen häufig misslingt. Die Nutzer verwenden daher den Sprachassistenten eher in einfachen Anwendungsfällen und neue Apps und Anwendungsfälle werden gar nicht erst ausprobiert. Eine Analyse der Aneignungsstrategien, beispielsweise durch eine selbst erstellte Liste mit Befehlen, liefert Erkenntnisse für die Gestaltung von Unterstützungswerkzeugen sowie die Weiterentwicklung und Optimierung von sprachbasierten Mensch-Maschine-Interfaces.
Die nutzerInnenfreundliche Formulierung von Zwecken der Datenverarbeitung von Sprachassistenten
(2020)
2019 wurde bekannt, dass mehrere Anbieter von Sprachassistenten Sprachaufnahmen ihrer NutzerInnen systematisch ausgewertet haben. Da in den Datenschutzhinweisen angegeben war, dass Daten auch zur Verbesserung des Dienstes genutzt würden, war diese Nutzung legal. Für die NutzerInnen stellte diese Auswertung jedoch einen deutlichen Bruch mit ihren Privatheitsvorstellungen dar. Das Zweckbindungsprinzip der DSGVO mit seiner Komponente der Zweckspezifizierung fordert neben Flexibilität für den Verarbeiter auch Transparenz für den Verbraucher. Vor dem Hintergrund dieses Interessenkonflikts stellt sich für die HCI die Frage, wie Verarbeitungszwecke von Sprachassistenten gestaltet sein sollten, um beide Anforderungen zu erfüllen. Für die Erhebung einer Nutzerperspektive analysiert diese Studie zunächst Zweckangaben in den Datenschutzhinweisen der dominierenden Sprachassistenten. Darauf aufbauend präsentieren wir Ergebnisse von Fokusgruppen, die sich mit der wahrgenommenen Verarbeitung von Daten von Sprachassistenten aus Nutzersicht befassen. Es zeigt sich, dass bestehende Zweckformulierungen für VerbraucherInnen kaum Transparenz über Folgen der Datenverarbeitung bieten und keine einschränkende Wirkung im Hinblick auf legale Datennutzung erzielen. Unsere Ergebnisse über von Nutzern wahrgenommene Risiken erlauben dabei Rückschlüsse auf die anwenderfreundliche Gestaltung von Verarbeitungszwecken im Sinne einer Design-Ressource.
Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional features during login, and when observed feature values differ significantly from previously seen ones, users have to provide additional authentication factors such as a verification code. RBA has the potential to offer more usable authentication, but the usability and the security perceptions of RBA are not studied well.
We present the results of a between-group lab study (n=65) to evaluate usability and security perceptions of two RBA variants, one 2FA variant, and password-only authentication. Our study shows with significant results that RBA is considered to be more usable than the studied 2FA variants, while it is perceived as more secure than password-only authentication in general and comparably secure to 2FA in a variety of application types. We also observed RBA usability problems and provide recommendations for mitigation. Our contribution provides a first deeper understanding of the users' perception of RBA and helps to improve RBA implementations for a broader user acceptance.
When a robotic agent experiences a failure while acting in the world, it should be possible to discover why that failure has occurred, namely to diagnose the failure. In this paper, we argue that the diagnosability of robot actions, at least in a classical sense, is a feature that cannot be taken for granted since it strongly depends on the underlying action representation. We specifically define criteria that determine the diagnosability of robot actions. The diagnosability question is then analysed in the context of a handle manipulation action, such that we discuss two different representations of the action – a composite policy with a learned success model for the action parameters, and a neural network-based monolithic policy – both of which exist on different sides of the diagnosability spectrum. Through this comparison, we conclude that composite actions are more suited to explicit diagnosis, but representations with less prior knowledge are more flexible. This suggests that model learning may provide balance between flexibility and diagnosability; however, data-driven diagnosis methods also need to be enhanced in order to deal with the complexity of modern robots.
Gone But Not Forgotten: Evaluating Performance and Scalability of Real-Time Mesoscopic Agents
(2020)
Telepresence robots allow people to participate in remote spaces, yet they can be difficult to manoeuvre with people and obstacles around. We designed a haptic-feedback system called “FeetBack," which users place their feet in when driving a telepresence robot. When the robot approaches people or obstacles, haptic proximity and collision feedback are provided on the respective sides of the feet, helping inform users about events that are hard to notice through the robot’s camera views. We conducted two studies: one to explore the usage of FeetBack in virtual environments, another focused on real environments.We found that FeetBack can increase spatial presence in simple virtual environments. Users valued the feedback to adjust their behaviour in both types of environments, though it was sometimes too frequent or unneeded for certain situations after a period of time. These results point to the value of foot-based haptic feedback for telepresence robot systems, while also the need to design context-sensitive haptic feedback.
Usability und User Experience (UX) haben als Design-Aspekte in der Produktentwicklung zunehmend an Bedeutung gewonnen. Daher ist es sinnvoll, die organisationale Kompetenz zur Entwicklung von Produkten mit einer positiven UX zu stärken. Veränderungen in Organisationen sind jedoch mit großem Aufwand verbunden. Deshalb müssen Organisationen entscheiden, welche Aktivitäten zur Veränderung der eigenen Kompetenz durchgeführt werden sollen und welche nicht. Die bisherige Forschung hat sich weitgehend auf die Anwendbarkeit bestimmter Methoden im Projekt- und Produktkontext konzentriert. Um geeignete Aktivitäten zur Verbesserung der organisationalen UX-Kompetenz zu identifizieren, wurden 17 UX-Professionals befragt. Diese UX-Professionals haben mindestens zehn Jahre Erfahrung durch die Arbeit in mehreren Unternehmen und durch die Übernahme einer Führungsrolle im Bereich UX gesammelt. Aus diesen Interviews wurden 13 mögliche Maßnahmen zur Steigerung der UX-Kompetenz von Organisationen abgeleitet. Dazu gehören beispielsweise die Erhöhung der Kompetenz einzelner Mitarbeiter, das Teilen von UX-Erfolgsgeschichten oder das Ermöglichen von User Research.
In 1991 the researchers at the center for the Learning Sciences of Carnegie Mellon University were confronted with the confusing question of “where is AI” from the users, who were interacting with AI but did not realize it. Three decades of research and we are still facing the same issue with the AItechnology users. In the lack of users’ awareness and mutual understanding of AI-enabled systems between designers and users, informal theories of the users about how a system works (“Folk theories”) become inevitable but can lead to misconceptions and ineffective interactions. To shape appropriate mental models of AI-based systems, explainable AI has been suggested by AI practitioners. However, a profound understanding of the current users’ perception of AI is still missing. In this study, we introduce the term “Perceived AI” as “AI defined from the perspective of its users”. We then present our preliminary results from deep-interviews with 50 AItechnology users, which provide a framework for our future research approach towards a better understanding of PAI and users’ folk theories.
Bei der sechsten Ausgabe des wissenschaftlichen Workshops ”Usable Security und Privacy” auf der Mensch und Computer 2020 werden wie in den vergangenen Jahren aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmenden diskutiert. Drei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, einer mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert*innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security-Engineering, transdisziplinär austauschen können.
Efficient and comprehensive assessment of students knowledge is an imperative task in any learning process. Short answer grading is one of the most successful methods in assessing the knowledge of students. Many supervised learning and deep learning approaches have been used to automate the task of short answer grading in the past. We investigate why assistive grading with active learning would be the next logical step in this task as there is no absolute ground truth answer for any question and the task is very subjective in nature. We present a fast and easy method to harness the power of active learning and natural language processing in assisting the task of grading short answer questions. A webbased GUI is designed and implemented to incorporate an interactive short answer grading system. The experiments show that active learning saves the time and effort of graders in assessment and reaches the performance of supervised learning with less amount of graded answers for training.
Evaluation of a Multi-Layer 2.5D display in comparison to conventional 3D stereoscopic glasses
(2020)
In this paper we propose and evaluate a custom-build projection-based multilayer 2.5D display, consisting of three layers of images, and compare performance to a stereoscopic 3D display. Stereoscopic vision can increase the involvement and enhance game experience, however may induce possible side effects, e.g. motion sickness and simulator sickness. To overcome the disadvantage of multiple discrete depths, in our system perspective rendering and head-tracking is used. A study was performed to evaluate this display with 20 participants playing custom-designed games. The results indicated that the multi-layer display caused fewer side effects than the stereoscopic display and provided good usability. The participants also stated a better or equal spatial perception, while the cognitive load stayed the same.
Compliant manipulation is a crucial skill for robots when they are supposed to act as helping hands in everyday household tasks. Still, nowadays, those skills are hand-crafted by experts which frequently requires labor-intensive, manual parameter tuning. Moreover, some tasks are too complex to be specified fully using a task specification. Learning these skills, by contrast, requires a high number of costly and potentially unsafe interactions with the environment. We present a compliant manipulation approach using reinforcement learning guided by the Task Frame Formalism, a task specification method. This allows us to specify the easy to model knowledge about a task while the robot learns the unmodeled components by reinforcement learning. We evaluate the approach by performing a compliant manipulation task with a KUKA LWR 4+ manipulator. The robot was able to learn force control policies directly on the robot without using any simulation.
Long-term variability of solar irradiance and its implications for photovoltaic power in West Africa
(2020)
West Africa is one of the least developed regions in the world regarding the energy availability and energy security. Located close to the equator West Africa receives high amounts of global horizontal irradiance (GHI). Thus, solar power and especially photovoltaic (PV) systems seem to be a promising solution to provide electricity with low environmental impact. To plan and to dimension a PV power system climatological data for global horizontal irradiance (GHI) and its variability need to be taken into account. However, ground based measurements of irradiances are not available continuously and cover only a few discrete locations.