Refine
Departments, institutes and facilities
- Fachbereich Informatik (42)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (23)
- Fachbereich Ingenieurwissenschaften und Kommunikation (21)
- Institut für Cyber Security & Privacy (ICSP) (16)
- Fachbereich Wirtschaftswissenschaften (15)
- Institute of Visual Computing (IVC) (11)
- Institut für Verbraucherinformatik (IVI) (9)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (6)
- Fachbereich Angewandte Naturwissenschaften (5)
- Fachbereich Sozialpolitik und Soziale Sicherung (4)
Document Type
- Conference Object (105) (remove)
Year of publication
- 2016 (105) (remove)
Keywords
- IEEE802.11 (2)
- Large, high-resolution displays (2)
- Long-Distance WiFi (2)
- Privacy (2)
- SpMV (2)
- User Experience (2)
- WiLD (2)
- 3D user interface (1)
- API usability (1)
- ARM Cortex M3 Processor (1)
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
Temperature Dependency of Morphological Structure of Thermoplastic Polyurethane using WAXS and SAXS
(2016)
Polyurethanes achieved an exceptional position among the most important organic polymers due to their highly specific technological application areas. Polyurethanes represent a polyaddition product of isocyanate and diols. In terms of their enormous industrial importance, the chemistry of isocyanates has been extensively studied.
UX-Professionals stehen vor der Aufgabe ihre Fertigkeiten und Kenntnisse kontinuierlich auszubauen. Eine Möglichkeit dies zu tun sind Communities of Practice, also Gemeinschaften von Personen mit ähnlichen Aufgaben und Schwerpunkten sowie einem gemeinsamen Interesse an Lösungen. Sie agieren weitgehend selbstorganisiert und dienen dem Austausch und der gegenseitigen Unterstützung. So entstehen ein gemeinsamer Wissensschatz sowie ein Netzwerk zwischen allen UX-Interessierten. Der Aufbau einer Community of Practice für UX-Professionals wurde in einem mittelständigen Unternehmen über 18 Monate begleitet und ausgewertet. Die Ergebnisse führten zu Handlungsempfehlungen, um Hindernisse beim Aufbau zu reduzieren und einen Mehrwert für alle Beteiligten herbeizuführen.
A deployment of the Vehicle-to-Vehicle communication technology according to ETSI is in preparation in Europe. Currently, a Public Key Infrastructure policy for Intelligent Transport Systems in Europe is in discussion to enable V2V communication. This policy set aside two classes of keys and certificates for ITS vehicle stations: long term authentication keys and pseudonymous keys and certificates. We show that from our point of view the periodic sent Cooperative Awareness Messages with extensive data have technical limitations and together with the pseudonym concept cause privacy problems.
In der Ergebnisdarstellung der Reha-QM-Outcome Studie der DRV Baden-Württemberg und des Qualitätsverbunds Gesundheit konnte gezeigt werden, dass Kliniken eines Verbundes, die ein gemeinsames, auf aktivem Benchmarking und Von-Einander-Lernen gegründetes Qualitätsmanagement (Basis QMS Reha®) anwenden, ein Jahr nach der Reha etwas bessere Ergebnisse in relevanten Outcome-Parametern (u. a. subjektiver Reha-Nutzen, geleistete Rentenversicherungsbeiträge) erzielen als der Durchschnitt der Kliniken (Toepler et al., 2015). Der vorliegende Beitrag stellt die verbundinterne Analyse der Studienergebnisse dar und geht der Frage nach, welche QM-Elemente einen positiven Einfluss auf die Outcome-Parameter ausüben.
Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.
Cognitive robotics aims at understanding biological processes, though it has also the potential to improve future robotics systems. Here we show how a biologically inspired model of motor control with neural fields can be augmented with additional components such that it is able to solve a basic robotics task, that of obstacle avoidance. While obstacle avoidance is a well researched area, the focus here is on the extensibility of a biologically inspired framework. This work demonstrates how easily the biological inspired system can be used to adapt to new tasks. This flexibility is thought to be a major hallmark of biological agents.
The work at hand outlines a recording setup for capturing hand and finger movements of musicians. The focus is on a series of baseline experiments on the detectability of coloured markers under different lighting conditions. With the goal of capturing and recording hand and finger movements of musicians in mind, requirements for such a system and existing approaches are analysed and compared. The results of the experiments and the analysis of related work show that the envisioned setup is suited for the expected scenario.
Within qualitative interviews we examine attitudes towards driverless cars in order to investigate new mobility services and explore the impact of such services on everyday mobility. We identified three main issues that we would like to discuss in the workshop: (I) Designing beyond a driver-centric approach; (II) Developing mobility services for cars which drive themselves; and (III) Exploring self-driving practices.
Diese Arbeit präsentiert eine Methode zur zuverlässigen Personendetektion für die Absicherung des Arbeitsbereichs von Industrierobotern. Hierzu wird ein im Nahinfrarotbereich (NIR) arbeitendes aktives Kamerasystem eingesetzt, das durch erweiterte und robuste Hauterkennungseigenschaften besonders dazu geeignet ist, zwischen verschiedensten Materialoberflächen und menschlicher Haut zu unterscheiden. So soll zum einen die Erkennungsleistung gegenüber handelsüblichen, im visuellen Bereich arbeitenden RGB-Kamerasystemen gesteigert werden und gleichzeitig eine „intelligente“ Form des Mutings realisiert werden. Die im Rahmen des Projekts „Sichere Personendetektion im Arbeitsbereich von Industrierobotern durch ein aktives NIR-Kamerasystem (SPAI)“ entwickelte und hier vorgestellte Methode erreicht in einer ersten Variante eine pixelweise Personenerkennungsrate von ca. 98,16%.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.
Supported by their large size and high resolution, display walls suit well for different collaboration types. However, in order to foster instead of impede collaboration processes, interaction techniques need to be carefully designed, taking into regard the possibilities and limitations of the display size, and their effects on human perception and performance. In this paper we investigate the impact of visual distractors (which, for instance, might be caused by other collaborators' input) in peripheral vision on short-term memory and attention. The distractors occur frequently when multiple users collaborate in large wall display systems and may draw attention away from the main task, as such potentially affecting performance and cognitive load. Yet, the effect of these distractors is hardly understood. Gaining a better understanding thus may provide valuable input for designing more effective user interfaces. In this article, we report on two interrelated studies that investigated the effect of distractors. Depending on when the distractor is inserted in the task performance sequence, as well as the location of the distractor, user performance can be disturbed: we will show that distractors may not affect short term memory, but do have an effect on attention. We will closely look into the effects, and identify future directions to design more effective interfaces.
Effects of Workspace Awareness and Territoriality in Environments with Large, Shared Displays
(2016)
Synchronous cooperative work of multiple collaborators in large, high-resolution display systems comprises such psychological phenomena like workspace awareness and human territoriality. The phenomena and interplay between them can cause a significant impact on human-human and human-environment interaction. In a non-digital environment humans rely on their own physical abilities, utilities, and social protocols to control those phenomena (e.g. close eyes, or use earplugs to reduce workspace awareness; rotate oneself towards collaborators to increase workspace awareness). Digital environments, on the other hand, provide us with a possibility to ease, automate, and unify control processes, thus taking off that burden from users. Yet, we have to understand first, what effects workspace awareness and territoriality have within a collaborative environment. The aim of this doctoral thesis is to investigate effects of workspace awareness and territoriality on users and interaction processes in mixed-focus scenarios of various collaborative settings.
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
This paper presents implementation results of several side channel countermeasures for protecting the scalar multiplication of ECC (Elliptic Curve Cryptography) implemented on an ARM Cortex M3 processor that is used in security sensitive wireless sensor nodes. Our implementation was done for the ECC curves P-256, brainpool256r1, and Ed25519. Investigated countermeasures include Double-And-Add Always, Montgomery Ladder, Scalar Randomization, Randomized Scalar Splitting, Coordinate Randomization, and Randomized Sliding Window. Practical side channel tests for SEMA (Simple Electromagnetic Analysis) and MESD (Multiple Exponent, Single Data) are included. Though more advanced side channel attacks are not evaluated, yet, our results show that an appropriate level of resistance against the most relevant attacks can be reached.
Fault-Channel Watermarks
(2016)
In this paper, we introduce the international program erp4students as general example on how to successfully prepare university students for the world of works without having to give up the basic principle in higher education, i.e., to exclusively provide sustainable education. We start with introducing the basic concept and design of the program and provide information regarding the demographic development over the past decade and implemented quality assurance mechanisms. Subsequently, the scope and design of and hitherto achieved insights from the Learning Culture Survey are outlined. On the basis of found results, we finally discuss how erp4students can deal with possible culture-specific issues that latest might emerge when the program gets available for learners in the Asian context.
MOOCs in POM Education
(2016)
Basic demand from enterprises towards academic education: provide students not only methodological/theoretical knowledge, but also prepare them for the future tasks in the world of works! This contradicts academia’s focus on sustainably teaching basic principles. With the extra-curricular international online program erp4students, we successfully managed to bridge this "conflict-of-interest”.
Job-related migration has been fostered across Europe balancing unemployment in one country with demands for employees in others. However, the numbers of early school leavers and university dropouts significantly increased in the hosting countries. We propose a higher measure of cultural sensitivity in education in order to prevent frustration. The Learning Culture Survey investigates learners’ expectations towards and perceptions of education on international level with the aim to make culture in the context of education better understandable. After a brief introduction, we subsume the steps taken during the past seven years and found results. Subsequently, we introduce a method for the determination of conflict potential, which bases on the understanding of culture as the level to which people within a society accept deviations from the usual. We close with demonstrating the usefulness of the data and insights from our Learning Culture Survey in the context of practical scenarios.
In this paper, several blocking techniques are applied to matrices that do not have a strong blocked structure. The aim is to efficiently use vectorization with current CPUs, even for matrices without an explicit block structure on nonzero elements. Different approaches are known to find fixed or variable sized blocks of nonzero elements in a matrix. We present a new matrix format for 2D rectangular blocks of variable size, allowing fill-ins per block of explicit zero values up to a user definable threshold. We give a heuristic to detect such 2D blocks in a sparse matrix. The performance of a Sparse Matrix Vector Multiplication for chosen block formats is measured and compared. Results show that the benefit of blocking formats depend – as to be expected – on the structure of the matrix and that variable sized block formats can have advantages over fixed size formats.
SDN and WMN evolved to be sophisticated technologies used in a variety of applications. However, a combined approach called wmSDN has not been widely addressed in the research community. Our idea in this field consists of WiFi-based point-to-point links managed by the OpenFlow protocol. We investigate two different issues regarding this idea. First, which WiFi operational mode is suitable in an OpenFlow managed broadcast domain? Second, does the performance decrease compared with other routing or switching principles? Therefore, we set up a real-world testbed and a suitable simulation environment. Unlike previous work, we show that it is possible to use WiFi links without conducting MAC address rewriting at each hop by utilizing the 4-address-mode.
WiFi-based Long Distance (WiLD) networks have emerged as a promising alternative technology approach for providing Internet in rural areas. An important factor in network planning of these wireless networks is estimating the path loss. In this work, we present various propagation models we found suitable for point-to-point (P2P) operation in the WiFi frequency bands. We conducted outdoor experiments with commercial offthe- shelf (COTS) hardware in our testbed made of 7 different long-distance links ranging from 450 m to 10.3 km and a mobile measurement station. We found that for short links with omni-directional antennas ground-reflection is a measurable phenomenon. For longer links, we show that either FSPL or the Longley-Rice model provides accurate results for certain links. We conclude that a good site survey is needed to exclude influences not included in the propagation models.
WiFi-based Long Distance (WiLD) networks have emerged as a promising alternative approach for Internet in rural areas. However, the MAC layer, which is based on the IEEE802.11 standard, comprises contiguous stations in a cell and is spatially restricted to a few hundred meters at most. In this work, we summarize efforts by different researchers to use IEEE802.11 over long-distances. In addition, we introduce WiLDToken, our solution to optimizing the throughput and fairness and reducing the delay on WiLD links. Compared to previous alternative MAC layers protocols for WiLD, our focus is on optimizing a single link in a multi-radio multi-channel mesh. We implement our protocol in the ns-3 network simulator and show thatWiLDToken is superior to an adapted version of the Distributed Coordination Function (DCF) for different link distances. We find that the throughput on a single link is close to the physical data-rate without a major decrease over longer distances.
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
The megatrends towards both a digital and a usership economy have changed entire markets in the past and will continue to do so over the next decades. In this work, we outline what this change means for possible futures of the mobility sector, taking the combination of trends in both economies into account. Using a sys-tematic, scenario-based trend analysis, we draft four general future scenarios and adapt the two most relevant scenarios to the automotive sector. Our findings show that combing the trends from both economies provides new insights that have often been neglected in literature because of an isolated view on digital technology only. However, service concepts such as self-driving car sharing or self-driving taxis have a great impact at various levels including microeconomic (e.g., service and product design, business models) and macroeconomic (e.g., with regard to ecological, economical, and social impacts). We give a brief outline of these issues and show which business mo dels could be successful in the most likely future scenarios, before we frame strategic implications for today’s automobile manufacturers.
Return to Work (RTW) stellt ein wesentliches Outcomekriterium für die Abbildung der Effektivität medizinischer Rehabilitationsmaßnahmen dar. Dabei hängt die Höhe der RTW-Quote u. a. von Messmethode, Messzeitpunkt und Stichprobe ab (Streibelt, Egner, 2012). RTW wird häufig mit dem bloßen Status der Erwerbstätigkeit oder Arbeitsfähigkeit gleichgesetzt, wobei kritisiert werden kann, dass dabei der Aspekt einer dauerhaften beruflichen Wiedereingliederung zu wenig Berücksichtigung findet.
Die Ergebnisqualität medizinischer Rehabilitationsleistungen wird häufig über „Patient Reported Outcomes“ (PROs) gemessen. Die Bedeutung von PROs für die Nutzenbeurteilung von therapeutischen Interventionen wird häufig unterschätzt (Brettschneider et al., 2011; Calvert et al., 2013). Es wird untersucht, inwieweit sich PROs in „harten“ Endpunkten wie z. B. Beitragszahlungen der Versicherten in die Sozialversicherung widerspiegeln.
3D-Printing is an efficient method in the field of additive manufacturing. In order to optimize the properties of manufactured parts it is essential to adapt the curing behavior of the resin systems with respect to the requirements. Thus, effects of resin composition, e.g. due to different additives such as thickener and curing agents, on the curing behavior have to be known. As the resin transfers from a liquid to a solid glass the time dependent ion viscosity was measured using DEA with flat IDEX sensors. This allows for a sensitive measurement of resin changes as the ion viscosity changes two to four decades. The investigated resin systems are based on the monomers styrene and HEMA. To account for the effects of copolymerization in the calculation of the reaction kinetics it was assumed that the reaction can be considered as a homo-polymerization having a reaction order n?1. Then the measured ion viscosity curves are fitted with the solution of the reactions kinetics - the time dependent degree of conversion (DC-function) - for times exceeding the initiation phase representing the primary curing. The measured ion viscosity curves can nicely be fitted with the DC-function and the determined fit parameters distinguish distinctly between the investigated resin compositions.
Large sections of the German society are able to buy and consume meat on a daily basis due to progress in the agri-food sector. However, the way meat is produced, traded and consumed increasingly has become an issue that is controversially discussed by the media, non-governmental organisations (NGOs), lobbyists, the industry itself and consumers – often with a negative connotation. The meat industry reacts to this. By creating information campaigns and animal welfare initiatives it aims to stress that it is going to take its corporate social responsibilities (CSR) for consumers and animal welfare seriously. But, the industry’s actions are still criticised as being not sufficient to improve animal welfare levels significantly. Much of this criticism can be observed in online news portals, where articles about the issue get published and commented by readers. This makes online portals a valuable source for information that is to be tapped in this study. It aims to better understand the multifaceted discussions concerning animal welfare initiatives in online portals. By applying qualitative content analysis and web mining techniques to a sample of documents taken from three major German news sites it can be shown that online discussions refer to various aspects of sustainability and corporate social responsibility. Findings also indicate that the discussions are framed by financial aspects.