Refine
Departments, institutes and facilities
- Fachbereich Informatik (45)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (37)
- Fachbereich Ingenieurwissenschaften und Kommunikation (22)
- Fachbereich Angewandte Naturwissenschaften (18)
- Institut für Cyber Security & Privacy (ICSP) (18)
- Fachbereich Wirtschaftswissenschaften (13)
- Institute of Visual Computing (IVC) (13)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (8)
- Institut für Detektionstechnologien (IDT) (5)
- Institut für Verbraucherinformatik (IVI) (5)
Document Type
- Conference Object (135) (remove)
Year of publication
- 2017 (135) (remove)
Keywords
- Entrepreneurship (3)
- Aerodynamics (2)
- Intercultural Communication (2)
- Object recognition (2)
- Virtual Reality (2)
- discrete optimisation (2)
- dispatching problem (2)
- massively parallel calculations (2)
- surrogate modeling (2)
- 3D design (1)
- 6LoWPAN (1)
- Active locomotion (1)
- Adaptation of Software (1)
- AgroTICs (1)
- Alternatives (1)
- Amplifiers (1)
- Approximated Jacobian (1)
- Architectural Patterns (1)
- Automotive UI (1)
- Benchmarking (1)
- Bluetooth (1)
- CPU (1)
- CSR5BC (1)
- Car Management (1)
- Chemicals (1)
- Chromatography (1)
- Collaboration (1)
- Coloured pointclouds (1)
- Competencies (1)
- Computer Graphics (1)
- Concurrent Kleene Algebra (1)
- Connected Car Services (1)
- Consumer behavior (1)
- Containerization (1)
- Cooperative Awareness Message (1)
- Corporate Bodies (1)
- Culture (1)
- Defense and security (1)
- Design (1)
- Design patterns (1)
- Development (1)
- Diodes (1)
- Distributed rendering (1)
- Docker (1)
- Domestic robotics (1)
- Domestic robots (1)
- E-waste (1)
- Echo chamber (1)
- Economic Development (1)
- Education (1)
- Elderly (1)
- Electrical and Electronic Equipment (1)
- Entrepreneurial Education (1)
- Ethernet (1)
- Evolutionary algorithms (1)
- Explosives (1)
- Eye Tracking (1)
- Factor- and cluster analyses (1)
- Frontend architecture (1)
- Fully Autonomous Driving (1)
- Fusion (1)
- GPU (1)
- Gaze Behavior (1)
- Gender (1)
- Ghana (1)
- Ghanaian entrepreneurs (1)
- Global Cultural Awareness (1)
- Government (1)
- HCSS (1)
- Head-mounted Display (1)
- Host-Based Code Injection Attacks (1)
- ICT (1)
- Illumination algorithms (1)
- Index (1)
- Industrial robots (1)
- Information Communication Technologies (1)
- Innovativeness (1)
- Intelligent virtual agents (1)
- Inventory (1)
- Kunststoffhohlkörper (1)
- LGCSR (1)
- Laser drilling (1)
- Laser induced breakdown spectroscopy (1)
- Latin America (1)
- Laws of programming (1)
- Living Lab (1)
- LoRaWAN (1)
- Low power (1)
- MAP-Elites (1)
- MASLOC (1)
- MSMEs (1)
- Machine Learning (1)
- Machine learning (1)
- Malware (1)
- Materialbeschreibung (1)
- Memory forensics (1)
- Metals (1)
- Metrics (1)
- Microservices (1)
- Milieu-specific differences (1)
- Mobility (1)
- Modalities (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Motivation (1)
- Multi-Tenant Application (1)
- Multimodal (1)
- Multiuser (1)
- NBSSI (1)
- NETCONF (1)
- NGOs (1)
- OpenDaylight (1)
- OpenFlow (1)
- Optimisation 3D (1)
- Participatory Design (1)
- Peer teaching (1)
- Private sector development (1)
- Produktsimulation (1)
- Project Management (1)
- Pseudonym Concept (1)
- Public Transport (1)
- Qualitative Study (1)
- Qualitative research (1)
- Quality Diversity (1)
- RGB-D data (1)
- Ray Tracing (1)
- Redes de Sensores inalámbricos (1)
- Refinement (1)
- Requirements analysis (1)
- Resource Planning (1)
- Robot competitions (1)
- Rosenbrock-Wanner Methods (1)
- SDN (1)
- Schwartz's portrait value questionnaire (PVQ) (1)
- Second Cockpit (1)
- Second Screen (1)
- Semantic models (1)
- Sensors (1)
- Serious Games (1)
- Service-Oriented Architecture (1)
- Smart Home (1)
- Social Learning (1)
- Social Media (1)
- Social Virtual Reality (1)
- Software and Architecture (1)
- SpMV (1)
- Sparse matrix format (1)
- Student-Centered Learning (1)
- Study Island (1)
- Surrogate Modelling (1)
- Sustainability (1)
- Synthetic perception (1)
- Textureless objects (1)
- Theory of Rooted Trees (1)
- Tiled-display walls (1)
- Touchscreen interaction (1)
- Trace algebra (1)
- Transparency (1)
- Transportation (1)
- UAV teleoperation (1)
- Unattended Train Operation (1)
- Unifying theories (1)
- University IT Teaching (1)
- Usability (1)
- User Acceptance (1)
- User Experience (1)
- User Interface Design (1)
- VR system design (1)
- Variability Management (1)
- Vehicle-to-Vehicle Communication (1)
- Verarbeitungsprozess (1)
- Verbesserungspotenzial (1)
- Virtual Environments (1)
- Virtual attention (1)
- W-Methods (1)
- WSN (1)
- Web (1)
- WiFi-based Long Distance (WiLD) (1)
- Xeon Phi knights landing (1)
- YANG (1)
- Youth Employability (1)
- ZigBee (1)
- activation function (1)
- bagging (1)
- biological object (1)
- bloat (1)
- brute force algorithm (1)
- business management principles (1)
- calculations modeling (1)
- calculations modelling (1)
- cancer cells detection (1)
- classroom interaction (1)
- condition monitoring (1)
- consumer research (1)
- development (1)
- diagnostic bond graphs (1)
- differential-algebraic equations (1)
- digital design (1)
- directional antennas (1)
- dynamic experiment (1)
- dynamic programming (1)
- e-learning (1)
- economic culture (1)
- economic sector (1)
- energy harvesting (1)
- energy monitoring (1)
- entrepreneurial interest (1)
- entrepreneurship development (1)
- evolutionary illumination (1)
- exploration (1)
- export (1)
- eye-tracking (1)
- factor load (1)
- food losses (1)
- foveated rendering (1)
- fruits, vegetables and potatoes (1)
- generation of ARRs (1)
- generative design (1)
- graphics processing units (1)
- haptics (1)
- heterogeneous networks (1)
- ideal switches (1)
- industry forces (1)
- information parameter (1)
- integration governance (1)
- intercultural management (1)
- interdisciplinary projects (1)
- interference (1)
- large classrooms (1)
- linkage strategy (1)
- mode switching LTI models (1)
- motion cueing (1)
- motivating first year students (1)
- natural user interface (1)
- neuroevolution (1)
- new business start-ups (1)
- parallel computing (1)
- parallel difference visualization (1)
- personal orientation (1)
- plant-based and animal-derived organic products (1)
- practical skills (1)
- problem based learning (1)
- professors as tutors (1)
- promotion of organic agriculture (1)
- prospects and challenges (1)
- regional economies (1)
- regression (1)
- remote-controlled robots (1)
- supply chain management (1)
- support agencies (1)
- sustainable food systems (1)
- systematic review (1)
- textbooks (1)
- university performance (1)
- values (1)
- videos (1)
- virtual locomotion (1)
- virtual reality (1)
- visuohaptic feedback (1)
- wireless networks’ topology (1)
- wireless sensors (1)
Usable security puts the users into the center of cyber security developments. Software developers are a very specific user group in this respect, since their points of contact with security are application programming interfaces (APIs). In contrast to APIs providing functionalities of other domains than security, security APIs are not approachable by habitual means. Learning by doing exploration exercises is not well supported. Reasons for this range from missing documentation, tutorials and examples to lacking tools and impenetrable APIs, that makes this complex matter accessible. In this paper we study what abstraction level of security APIs is more suitable to meet common developers’ needs and expectations. For this purpose, we firstly define the term security API. Following this definition, we introduce a classification of security APIs according to their abstraction level. We then adopted this classification in two studies. In one we gathered the current coverage of the distinct classes by the standard set of security functionality provided by popular software development kits. The other study has been an online questionnaire in which we asked 55 software developers about their experiences and opinion in respect of integrating security mechanisms into their coding projects. Our findings emphasize that the right abstraction level of a security API is one important aspect to consider in usable security API design that has not been addressed much so far.
Solar energy is one option to serve the rising global energy demand with low environmental impact. Building an energy system with a considerable share of solar power requires long-term investment and a careful investigation of potential sites. Therefore, understanding the impacts from varying regionally and locally determined meteorological conditions on solar energy production will influence energy yield projections.
Reliable and regional differentiated power forecasts are required to guarantee an efficient and economic energy transition towards renewable energies. Amongst other renewable energy technologies, e.g. wind mills, photovoltaic (PV) systems are an essential component of this transition being cost-efficient and simply to install. Reliable power forecasts are however required for a grid integration of photovoltaic systems, which among other data requires high-resolution spatio-temporal global irradiance data.
This paper presents the b-it-bots RoboCup@Work team and its current hardware and functional architecture for the KUKA youBot robot. We describe the underlying software framework and the developed capabilities required for operating in industrial environments including features such as reliable and precise navigation, flexible manipulation and robust object recognition.