Refine
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (1243)
- Fachbereich Informatik (1148)
- Fachbereich Angewandte Naturwissenschaften (766)
- Fachbereich Ingenieurwissenschaften und Kommunikation (636)
- Institut für funktionale Gen-Analytik (IFGA) (584)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (485)
- Präsidium (403)
- Fachbereich Sozialpolitik und Soziale Sicherung (402)
- Institute of Visual Computing (IVC) (313)
- Institut für Cyber Security & Privacy (ICSP) (307)
Document Type
- Article (2431)
- Conference Object (1806)
- Part of a Book (942)
- Book (monograph, edited volume) (452)
- Part of Periodical (411)
- Report (201)
- Contribution to a Periodical (118)
- Doctoral Thesis (106)
- Working Paper (94)
- Preprint (90)
Year of publication
Keywords
- Lehrbuch (88)
- Deutschland (34)
- Nachhaltigkeit (30)
- Controlling (25)
- Unternehmen (25)
- Management (20)
- Corporate Social Responsibility (18)
- Betriebswirtschaftslehre (17)
- Digitalisierung (17)
- Machine Learning (17)
XML Encryption and XML Signature are fundamental security standards forming the core for many applications which require to process XML-based data. Due to the increased usage of XML in distributed systems and platforms such as in SOA and Cloud settings, the demand for robust and effective security mechanisms increased as well. Recent research work discovered, however, substantial vulnerabilities in these standards as well as in the vast majority of the available implementations. Amongst them, the so-called XML Signature Wrapping attack belongs to the most relevant ones. With the many possible instances of this attack type, it is feasible to annul security systems relying on XML Signature and to gain access to protected resources as has been successfully demonstrated lately for various Cloud infrastructures and services. This paper contributes a comprehensive approach to robust and effective XML Signatures for SOAP-based Web Services. An architecture is proposed, which integrates the r equired enhancements to ensure a fail-safe and robust signature generation and verification. Following this architecture, a hardened XML Signature library has been implemented. The obtained evaluation results show that the developed concept and library provide the targeted robustness against all kinds of known XML Signature Wrapping attacks. Furthermore the empirical results underline, that these security merits are obtained at low efficiency and performance costs as well as remain compliant with the underlying standards.
This article concerns with the accessibility of Business process modelling tools (BPMo tools) and business process modelling languages (BPMo languages). Therefore the reader will be introduced to business process management and the authors' motivation behind this inquiry. Afterwards, the paper will reflect problems when applying inaccessible BPMo tools. To illustrate these problems the authors distinguish between two different categories of issues and provide practical examples. Finally the article will present three approaches to improve the accessibility of BPMo tools and BPMo languages.
Transient up-regulation of P2 receptors influence differentiation of human mesenchymal stem cells
(2012)
Germany
(2012)
The work presented in this paper focuses on the comparison of well-known and new fault-diagnosis algorithms in the robot domain. The main challenge for fault diagnosis is to allow the robot to effectively cope not only with internal hardware and software faults but with external disturbances and errors from dynamic and complex environments as well. Based on a study of literature covering fault-diagnosis algorithms, I selected four of these methods based on both linear and non-linear models, analysed and implemented them in a mathematical robot-model, representing a four-wheels-OMNI robot. In experiments I tested the ability of the algorithms to detect and identify abnormal behaviour and to optimize the model parameters for the given training data. The final goal was to point out the strengths of each algorithm and to figure out which method would best suit the demands of fault diagnosis for a particular robot.
This article concerns the design and development of Information- and Communication Technology, in particular computer systems in regard to the demographic transition which will influence user capabilities. It is questionable if current applied computer systems are able to meet the requirements of altered user groups with diversified capabilities. Such an enquiry is necessary based on actual forecasts leading to the assumption that the average age of employees in enterprises will increase significantly within the next 50-60 years, while the percentage of computer aided business tasks, operated by human individuals, rises from year to year. This progress will precipitate specific consequences for enterprises regarding the design and application of computer systems. If computer systems are not adapted to altered user requirements, efficient and productive utilisation could be negatively influenced. These consequences constitute the motivation to extend traditional design methodologies and thereby ensure the application of computer systems that are usable, independent of user capabilities.
IT-Radar für BPM und ERP
(2012)
Mit dem IT-Radar für BPM und ERP liegt ein Instrument zur Unterstützung der aktiven Steuerung und Validierung der IT-Strategie vor. Die ersten Ergebnisse zeigen, dass klassische Aufgaben des BMP- und ERP-Managements wie Prozessintegration nach wie vor hohe Aktualität haben und neue Themen wie die dienstliche Nutzung privater Endgeräte (BYOD - Bring Your Own Device), die Verarbeitung von sehr großen Datenmengen (Big Data) und Echtzeitverarbeitung (In-Memory Computing) zwar intensiv auf die Agenda des Chief Information Officers (CIO) drängen, aber klassische Aufgaben nicht verdrängen.
IT-Controlling
(2012)
Big Data
(2012)
The ability of detecting people has become a crucial subtask, especially in robotic systems which aim an application in public or domestic environments. Robots already provide their services e.g. in real home improvement markets and guide people to a desired product. In such a scenario many robot internal tasks would benefit from the knowledge of knowing the number and positions of people in the vicinity. The navigation for example could treat them as dynamical moving objects and also predict their next motion directions in order to compute a much safer path. Or the robot could specifically approach customers and offer its services. This requires to detect a person or even a group of people in a reasonable range in front of the robot. Challenges of such a real-world task are e.g. changing lightning conditions, a dynamic environment and different people shapes. In this thesis a 3D people detection approach based on point cloud data provided by the Microsoft Kinect is implemented and integrated on mobile service robot. A Top-Down/Bottom-Up segmentation is applied to increase the systems flexibility and provided the capability to the detect people even if they are partially occluded. A feature set is proposed to detect people in various pose configurations and motions using a machine learning technique. The system can detect people up to a distance of 5 meters. The experimental evaluation compared different machine learning techniques and showed that standing people can be detected with a rate of 87.29% and sitting people with 74.94% using a Random Forest classifier. Certain objects caused several false detections. To elimante those a verification is proposed which further evaluates the persons shape in the 2D space. The detection component has been implemented as s sequential (frame rate of 10 Hz) and a parallel application (frame rate of 16 Hz). Finally, the component has been embedded into complete people search task which explorates the environment, find all people and approach each detected person.
In the realm of service robots recovery from faults is indispensable to foster user acceptance. Here fault is to be understood not in the sense of robot internal, rather as interaction faults while situated in and interacting with an environment (aka ex-ternal faults). We reason along the most frequent failures in typical scenarios which we observed during real-world demonstrations and competitions using our Care-O-bot III 1 robot. They take place in an apartment-like environments which is known as closed world. We suggest four different -for now adhoc -fault categories caused by disturbances, imperfect per-ception, inadequate planning or chaining of action sequences. The fault are categorized and then mapped to a handful of partly known, partly extended fault handling techniques. Among them we applied qualitative reasoning, use of simu-lation as oracle, learning for planning (aka en-hancement of plan operators) or -in future -case-based reasoning. Having laid out this frame we mainly ask open questions related to the applicability of the pre-sented approach. Amongst them: how to find new categories, how to extend them, how to as-sure disjointness, how to identify old and label new faults on the fly.
The work presented in this paper focuses on the comparison of well-known and new techniques for designing robust fault diagnosis schemes in the robot domain. The main challenge for fault diagnosis is to allow the robot to effectively cope not only with internal hardware and software faults but with external disturbances and errors from dynamic and complex environments as well.
Novel Automated Three-Dimensional Genome Scanning Based on the Nuclear Architecture of Telomeres
(2011)
A method for minimum range extension with improved accuracy in triangulation laser range finder
(2011)
While industrialized countries are becoming service economies, all countries are becoming global. As competition becomes more global, understanding and accommodating the needs of international customers with different cultural backgrounds has become increasingly important. This study highlights cross-cultural perceptions of service problems in the tourist industry.
Nowadays, we input text not only on stationary devices, but also on handheld devices while walking, driving, or commuting. Text entry on the move, which we term as nomadic text entry, is generally slower. This is partially due to the need for users to move their visual focus from the device to their surroundings for navigational purposes and back. To investigate if better feedback about users' surroundings on the device can improve performance, we present a number of new and existing feedback systems: textual, visual, textual & visual, and textual & visual via translucent keyboard. Experimental comparisons between the conventional and these techniques established that increased ambient awareness for mobile users enhances nomadic text entry performance. Results showed that the textual and the textual & visual via translucent keyboard conditions increased text entry speed by 14% and 11%, respectively, and reduced the error rate by 13% compared to the regular technique. The two methods also significantly reduced the number of collisions with obstacles.
Das Thema Querdenken ist so aktuell, spannend und interessant, dass sich Prof. Dr. Jens Böcker von der Hochschule Bonn-Rhein-Sieg nach unseren ersten Gesprächen dazu entschlossen hat, eine Projektarbeit für seine Studenten zu diesem Thema zu vergeben. Prof. Dr. Böcker ist Professor im Fachbereich Wirtschaftswissenschaften für BWL mit dem Schwerpunkt Marketing. Das „Forschungsprojekt Querdenken“ wurde von einer Gruppe Studenten um Manuel Hammes als Projektleiter im Sommersemester 2010 bei Prof. Dr. Böcker durchgeführt.
Aufgrund der zunehmenden Behandlung von sozialen Netzwerken in den Medien war es das Ziel der Arbeit das Geschäftsmodell von sozialen Netzwerken näher zu analysieren. Die Arbeit zeigt, dass soziale Online-Netzwerke zu den Diensten im Internet gehören, die zwar schon länger existieren, ihren eigentlichen Durchbruch aber erst in den letzten Jahren erlebten. Zu Beginn als reine Kommunikationsplattform genutzt, werden sie heute zur allgemeinen Freizeitgestaltung verwendet und integrieren sich zunehmend in das alltägliche Leben. Die Arbeit beschäftigt sich mit den ökonomischen Besonderheiten von sozialen Online-Netzwerken. Analysiert werden Netzwerkeffekte, Angebots- und Nachfrageverhalten, kritische Masse-Phänomene, Tippy markets, Netzwerkgesetze, Lock-In-Effekte und Wechselkosten. Es wird untersucht, ob und inwieweit sich hinter den sozialen Online-Netzwerken auch klar erkennbare Geschäftsmodelle verbergen. Aufbauend auf einer kritischen Auseinandersetzung mit der Vielfalt existierender Geschäftsmodelle erfolgt die Entwicklung eines eigenen tragfähigen Ansatzes. Auf dieser Basis wird eine Analyse existierender Online-Netzwerke und eine Beurteilung ihres Innovationsgrades vorgenommen.
Hochschulbibliotheken haben heutzutage neben der traditionellen Aufgabe der Literaturversorgung und Informationsversorgung auch die Aufgabe, über ihre Website im Internet präsent zu sein und sich dort als zentraler Informationsanbieter zu positionieren. Die Webauftritte haben dabei die Funktionen als Zugangspunkt und Vermittlungsstelle für Informationen sowie als Werbemittel bzw. Instrument der Öffentlichkeitsarbeit. Im Hinblick auf die immer stärkere Benutzerorientierung der Bibliotheken werden die Webangebote von fünf Universitätsbibliotheken und einer Fachhochschulbibliothek nach diversen Kriterien analysiert: es wird herausgearbeitet, welche Inhalte auf den Websites zu finden sind, die Struktur wird näher betrachtet, ebenso wie die Navigationsmöglichkeiten, die Sprache und Textgestaltung und das Design.