Refine
Departments, institutes and facilities
- Fachbereich Informatik (45)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (37)
- Fachbereich Ingenieurwissenschaften und Kommunikation (22)
- Fachbereich Angewandte Naturwissenschaften (18)
- Institut für Cyber Security & Privacy (ICSP) (18)
- Fachbereich Wirtschaftswissenschaften (13)
- Institute of Visual Computing (IVC) (13)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (8)
- Institut für Detektionstechnologien (IDT) (5)
- Institut für Verbraucherinformatik (IVI) (5)
Document Type
- Conference Object (135) (remove)
Year of publication
- 2017 (135) (remove)
Keywords
- Entrepreneurship (3)
- Aerodynamics (2)
- Intercultural Communication (2)
- Object recognition (2)
- Virtual Reality (2)
- discrete optimisation (2)
- dispatching problem (2)
- massively parallel calculations (2)
- surrogate modeling (2)
- 3D design (1)
Usable security puts the users into the center of cyber security developments. Software developers are a very specific user group in this respect, since their points of contact with security are application programming interfaces (APIs). In contrast to APIs providing functionalities of other domains than security, security APIs are not approachable by habitual means. Learning by doing exploration exercises is not well supported. Reasons for this range from missing documentation, tutorials and examples to lacking tools and impenetrable APIs, that makes this complex matter accessible. In this paper we study what abstraction level of security APIs is more suitable to meet common developers’ needs and expectations. For this purpose, we firstly define the term security API. Following this definition, we introduce a classification of security APIs according to their abstraction level. We then adopted this classification in two studies. In one we gathered the current coverage of the distinct classes by the standard set of security functionality provided by popular software development kits. The other study has been an online questionnaire in which we asked 55 software developers about their experiences and opinion in respect of integrating security mechanisms into their coding projects. Our findings emphasize that the right abstraction level of a security API is one important aspect to consider in usable security API design that has not been addressed much so far.
Solar energy is one option to serve the rising global energy demand with low environmental impact. Building an energy system with a considerable share of solar power requires long-term investment and a careful investigation of potential sites. Therefore, understanding the impacts from varying regionally and locally determined meteorological conditions on solar energy production will influence energy yield projections.
Reliable and regional differentiated power forecasts are required to guarantee an efficient and economic energy transition towards renewable energies. Amongst other renewable energy technologies, e.g. wind mills, photovoltaic (PV) systems are an essential component of this transition being cost-efficient and simply to install. Reliable power forecasts are however required for a grid integration of photovoltaic systems, which among other data requires high-resolution spatio-temporal global irradiance data.
This paper presents the b-it-bots RoboCup@Work team and its current hardware and functional architecture for the KUKA youBot robot. We describe the underlying software framework and the developed capabilities required for operating in industrial environments including features such as reliable and precise navigation, flexible manipulation and robust object recognition.