Refine
Departments, institutes and facilities
- Fachbereich Informatik (32)
- Institute of Visual Computing (IVC) (17)
- Fachbereich Ingenieurwissenschaften und Kommunikation (14)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (14)
- Fachbereich Wirtschaftswissenschaften (13)
- Institut für Cyber Security & Privacy (ICSP) (11)
- Institut für Verbraucherinformatik (IVI) (11)
- Fachbereich Angewandte Naturwissenschaften (8)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (8)
- Fachbereich Sozialpolitik und Soziale Sicherung (5)
Document Type
- Conference Object (93) (remove)
Year of publication
- 2018 (93) (remove)
Keywords
- ICT (3)
- Dementia (2)
- FPGA (2)
- Non-linear systems (2)
- User Experience (2)
- Virtual Reality (2)
- caregivers (2)
- participatory design (2)
- 3D User Interface (1)
- 3D user interface (1)
- Agilität (1)
- Alternatives (1)
- Blended Learning (1)
- Business English (1)
- Clean Energy and Power Systems (1)
- Co-located work (1)
- Code similarity analysis (1)
- Computer Simulation Techniques (1)
- DMA (1)
- DSC (1)
- Dataflow Programming (1)
- Delph Study (1)
- Delphi-method (1)
- Difference Visualization (1)
- Digitalisierung (1)
- Digitalisierungsstrategie (1)
- Embedded software (1)
- Evaluation (1)
- Exergame (1)
- Explainable artificial intelligence (1)
- Eye Tracking (1)
- Fixed spatial data (1)
- Free-Space Loss (FSL) (1)
- Future (1)
- Future Studies (1)
- Future of Robotics (1)
- Gamification (1)
- Gaze Depth Estimation (1)
- Generation R (1)
- Generative Design (1)
- German paper production industry (1)
- Globally convergent methods (1)
- Group behavior (1)
- Hand Guidance (1)
- Hochschule Bonn-Rhein-Sieg (1)
- IEEE 802.11 (1)
- IP protection (1)
- IT-Management (1)
- IT-Strategie (1)
- Information interaction (1)
- Innovation (1)
- KMU (1)
- Kalman filter (1)
- Kompetenz (1)
- LAA (1)
- LTE-U (1)
- Learning App (1)
- Life Cycle Assessment (LCA) (1)
- LoRa (1)
- LoRa receiver accuracy (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Low-power education (1)
- Megatrends (1)
- Mittelstand (1)
- Multiple Displays (1)
- NEAT (1)
- Navigation (1)
- Neuroevolution (1)
- Nutzerakzeptanz (1)
- Organisation (1)
- Partworth Utilities (1)
- Path loss model (1)
- Performance Analysis (1)
- Pose Estimation (1)
- Privacy (1)
- Pro-MINT-us (1)
- Qualitätspakt Lehre (1)
- Random number generator (1)
- Relative Added Value (1)
- Relativer Mehrwert (1)
- Remote laboratory (1)
- Robotic Governance (1)
- Robotic Natives (1)
- Robotic Revolutions (1)
- Selbstfahrende Autos (1)
- Self-Driving Cars (1)
- Shared Autonomous Vehicles (1)
- Side-channel watermarking (1)
- Similarity matrix (1)
- Software reverse engineering (1)
- Spectrum occupancy (1)
- Stationary network problems (1)
- Surrogate Modeling (1)
- Sustainability (1)
- Swim Stroke Analysis (1)
- Tactile Feedback (1)
- Tactile feedback (1)
- Testing Tool (1)
- Tiled displays (1)
- Travel Mode Choice (1)
- U-NII band (1)
- UUX-Praxis (1)
- Umfrage (1)
- Usability (1)
- User Acceptance (1)
- User Study (1)
- Verkehrsmittelwahl (1)
- Web Browser Cache (1)
- action unit recognition (1)
- adl (1)
- autonomous driving (1)
- auxiliary power supply (1)
- car sharing (1)
- civil society (1)
- client-side component model (1)
- co-located collaboration (1)
- cognitive radio (1)
- deep learning (1)
- dementia (1)
- dependable robots (1)
- digital design (1)
- digital receipt (1)
- dimensionality reduction (1)
- draw ratio (1)
- e-learning (1)
- efficiency (1)
- embedded collaborative learning (1)
- emotion recognition (1)
- environmental impact analysis (1)
- exergame (1)
- exergames (1)
- extrusion blow molding (1)
- facial expression analysis (1)
- farmers (1)
- field study (1)
- flow direction (1)
- food consumption (1)
- forecast (1)
- grass-based pulp (1)
- hand guidance (1)
- holography (1)
- human factors (1)
- human-robot collaboration (1)
- ideation (1)
- immersive systems (1)
- interface design (1)
- machine learning (1)
- medical training (1)
- methodical limits of LCA (1)
- mobile web (1)
- modular web (1)
- mold temperature (1)
- multi-user VR (1)
- municipality (1)
- pain recognition (1)
- photovoltaic (1)
- prototype theory (1)
- pseudo-random number generator (1)
- qualitative empirical research (1)
- quality of life (1)
- quality-diversity (1)
- relatives (1)
- remote diagnosis (1)
- remote-lab (1)
- robot component monitoring (1)
- robotic black box (1)
- security (1)
- serious games (1)
- service robots (1)
- social interactions (1)
- social support (1)
- spectrum sensing (1)
- speech recognition (1)
- speech understanding (1)
- state constraints (1)
- sustainable development (1)
- sustainable mobility (1)
- tiled displays (1)
- travel mode choice (1)
- true random number generator (1)
- ultrasonic sensor (1)
- urban food strategy (1)
- urban food supply (1)
- user study (1)
- video lectures (1)
- wearable photovoltaic system (1)
- web caching (1)
- web components (1)
- web technology (1)
- xorshift-generator (1)
Towards explaining deep learning networks to distinguish facial expressions of pain and emotions
(2018)
Deep learning networks are successfully used for object and face recognition in images and videos. In order to be able to apply such networks in practice, for example in hospitals as a pain recognition tool, the current procedures are only suitable to a limited extent. The advantage of deep learning methods is that they can learn complex non-linear relationships between raw data and target classes without limiting themselves to a set of hand-crafted features provided by humans. However, the disadvantage is that due to the complexity of these networks, it is not possible to interpret the knowledge that is stored inside the network. It is a black-box learning procedure. Explainable Artificial Intelligence (AI) approaches mitigate this problem by extracting explanations for decisions and representing them in a human-interpretable form. The aim of this paper is to investigate the explainable AI method Layer-wise Relevance Propagation (LRP) and apply it to explain how a deep learning network distinguishes facial expressions of pain from facial expressions of emotions such as happiness and disgust.
This paper describes a dynamic, model-based approach for estimating intensities of 22 out of 44 different basic facial muscle movements. These movements are defined as Action Units (AU) in the Facial Action Coding System (FACS) [1]. The maximum facial shape deformations that can be caused by the 22 AUs are represented as vectors in an anatomically based, deformable, point-based face model. The amount of deformation along these vectors represent the AU intensities, and its valid range is [0, 1]. An Extended Kalman Filter (EKF) with state constraints is used to estimate the AU intensities. The focus of this paper is on the modeling of constraints in order to impose the anatomically valid AU intensity range of [0, 1]. Two process models are considered, namely constant velocity and driven mass-spring-damper. The results show the temporal smoothing and disambiguation effect of the constrained EKF approach, when compared to the frame-by-frame model fitting approach ‘Regularized Landmark Mean-Shift (RLMS)’ [2]. This effect led to more than 35% increase in performance on a database of posed facial expressions.
Messkampagnen im Projekt METPVNET zur Verbesserung der PV- Erzeugungsprognose auf Verteilnetzebene
(2018)
In Fortführung zu den drei erfolgreichen „Usable Security und Privacy“ Workshops der letzten drei Jahre, sollen in einem vierten ganztätigen wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer sechs bis acht Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert werden. Vorgesehen sind Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop soll das etablierte Forum weiterentwickelt werden, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee bewertet die Einreichungen und wählt daraus die zur Präsentation akzeptierten Beiträge aus. Diese werden zudem im Poster- und Workshopband der Mensch und Computer 2018 veröffentlicht.
Kontemporäre Service-orientierte Systeme sind hochgradig vernetzt und haben zudem die Eigenschaft massiv-skalierbar zu sein. Diese Charakteristiken stellen im besonderen Maße Anforderungen an die Datensicherheit der Anwender solcher Systeme und damit primär an alle Stakeholder der Softwareentwicklung, die in der Verantwortung sind, passgenaue Sicherheitsmechanismen effektiv in die Softwareprodukte zu bringen. Die Effektivität von Sicherheitsarchitekturen in service-orientierten Systemen hängt maßgeblich von der richtigen Nutzung und Integration von Security-APIs durch eine heterogene Gruppe von Softwareentwicklern ab, bei der nicht per se ein fundiertes Hintergrundwissen über komplexe digitale Sicherheitsmechanismen vorausgesetzt werden kann. Die Diskrepanz zwischen komplexen und in der Anwendung fehleranfälligen APIs und einem fehlenden Verständnis für die zugrundeliegenden Sicherheitskonzepte auf Seiten der Nutzer begünstigt in der Praxis unsichere Softwaresysteme. Aus diesem Grund ist die Gebrauchstauglichkeit von Security-APIs besonders relevant, damit Programmierer den benötigten Funktionsumfang effektiv, effizient und zufriedenstellend verwenden können. Abgeleitet von dieser Problemstellung, konzentriert sich das Dissertationsvorhaben auf die gebrauchstaugliche Ausgestaltung von Security-APIs und den Herausforderungen die sich aus den Methoden zur Evaluation der Usability in typischen Umgebungen der Softwareentwicklung ergeben.
Consolidating Principles and Patterns for Human-centred Usable Security Research and Development
(2018)
We present an evaluation of usable security principles and patterns to facilitate the transfer of existing knowledge to researchers and practitioners. Based on a literature review we extracted 23 common usable security principles and 47 usable security patterns and identified their interconnection. The results indicate that current research tends to focus on only a subset of important principles. The fact that some principles are not yet addressed by any design patterns suggests that further work on refining these patterns is needed. We developed an online repository, which stores the harmonized principles and patterns. The tool enables users to search for relevant patterns and explore them in an interactive and programmatic manner. We argue that both the insights presented in this paper and the repository will be highly valuable for students for getting a good overview, practitioners for implementing usable security and researchers for identifying areas of future research.
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e.g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code.
To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code.
We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.
This paper presents the outcomes of an exploratory field study that examined the social impact of an ICT-based suite of exergames for people with dementia and their caregivers. Qualitative data was collected over a period of 8 months, during which time we studied the daily life of 14 people with dementia and their informal and professional caregivers. We focus on the experiential aspects of the system and examine its social impact when integrated into the daily routines of both people with dementia themselves and their professional and family caregivers. Our findings indicate that relatives were able to regain leisure time, whilst people with dementia were able to recapture certain aspects of their social and daily activities that might otherwise have been lost to them. Results suggest that the system enhanced social-interaction, invigorated relationships, and improved the empowerment of people with dementia and their caregivers to face daily challenges.
Software development is a complex task. Merely focussing on functional requirements is not sufficient any more. Developers are responsible to take many non-functional requirements carefully into account. Security is amongst the most challenging, as getting it wrong will result in a large user-base being potentially at risk. A similar situation exists for administrators. Security defaults have been put into place here to encounter lacking security controls. As first attempts to establish security by default in software development are flourishing, the question on their usability for developers arises.
In this paper we study the effectiveness and efficiency of Content Security Policy (CSP) enforced as security default in a web framework. When deployed correctly, CSP is a valid protection mean in a defence-in-depth strategy against code injection attacks. In this paper we present a first qualitative laboratory study with 30 participants to discover how developers deal with CSP when deployed as security default. Our results emphasize that the deployment as security default has its benefits but requires careful consideration of a comprehensive information flow in order to improve and not weaken security. We provide first insights to inform research about aiding developers in the creation of secure web applications with usable security by default.
The formulation of transport network problems is represented as a translation between two domain specific languages: from a network description language, used by network simulation community, to a problem description language, understood by generic non-linear solvers. A universal algorithm for this translation is developed, an estimation of its computational complexity given, and an efficient application of the algorithm demonstrated on a number of realistic examples. Typically, for a large gas transport network with about 10K elements the translation and solution of non-linear system together require less than 1 sec on the common hardware. The translation procedure incorporates several preprocessing filters, in particular, topological cleaning filters, which accelerate the solution procedure by factor 8.
Möglichkeiten und Grenzen der Baustoffanalytik und anwendungstechnische Prüfungen an Objekten
(2018)