005 Computerprogrammierung, Programme, Daten
Refine
Departments, institutes and facilities
- Institut für Cyber Security & Privacy (ICSP) (160)
- Institut für Verbraucherinformatik (IVI) (107)
- Fachbereich Informatik (62)
- Fachbereich Wirtschaftswissenschaften (57)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (7)
- Fachbereich Ingenieurwissenschaften und Kommunikation (3)
- Graduierteninstitut (1)
- Institut für funktionale Gen-Analytik (IFGA) (1)
- Institute of Visual Computing (IVC) (1)
- Zentrum für Ethik und Verantwortung (ZEV) (1)
Document Type
- Conference Object (187)
- Article (75)
- Part of a Book (20)
- Book (monograph, edited volume) (12)
- Contribution to a Periodical (8)
- Working Paper (4)
- Conference Proceedings (3)
- Master's Thesis (3)
- Research Data (2)
- Doctoral Thesis (2)
Year of publication
Keywords
- Usable Security (10)
- GDPR (7)
- Cloud (5)
- HTTP (5)
- Privacy (5)
- Usable Privacy (5)
- security (5)
- usable privacy (5)
- Big Data Analysis (4)
- Global Software Engineering (4)
- REST (4)
- Risk-based Authentication (4)
- Web (4)
- Authentication (3)
- Java <Programmiersprache> (3)
- Offshoring (3)
- Python <Programmiersprache> (3)
- Qualitative research (3)
- SOA (3)
- Security (3)
- web caching (3)
- web services (3)
- Artificial Intelligence (2)
- Authentication features (2)
- Business Ethnography (2)
- Claim personal data (2)
- Cloud Security (2)
- Data literacy (2)
- Data takeout (2)
- Datenmanagement (2)
- Digital Sovereignty (2)
- Digitalisierung (2)
- Food (2)
- Global Software Development (2)
- HCI (2)
- Human Factors In Software Design (2)
- IoT (2)
- Machine Learning (2)
- Malware analysis (2)
- Methodology (2)
- Password (2)
- Practice Theory (2)
- Public Transport (2)
- Qualitative Study (2)
- Risk-based Authentication (RBA) (2)
- SOAP (2)
- Smart Home (2)
- Software (2)
- Sustainability (2)
- TLS (2)
- User Experience (2)
- Verkehrsmittelwahl (2)
- Voice Assistants (2)
- WS-Security (2)
- XML Signature (2)
- XML Signature Wrapping (2)
- end user development (2)
- software engineering (2)
- structural equation modeling (2)
- usability (2)
- 3D Printer (1)
- ACPYPE (1)
- API Documentation (1)
- API usability (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Ad Hoc Kommunikation (1)
- Adaptive Media Streaming (1)
- Adaptive Streaming (1)
- Adoption (1)
- Adoption Factors (1)
- Advance Encryption Standard (1)
- Advances in Design Science Research (1)
- Affective computing (1)
- Agent-Based Modeling (1)
- Agilität (1)
- Alternde Gesellschaft (1)
- Analysis (1)
- Appropriation (1)
- Appropriation Infras-tructure (1)
- Articulation Work (1)
- Attention mechanism (1)
- Authentifikation (1)
- Autonomes Fahren (1)
- Autonomous Driving (1)
- Bewegungsmotivation (1)
- Big Data (1)
- Biometric data (1)
- Black-box models (1)
- Botnet tracking (1)
- Botnets (1)
- Browser cache (1)
- CAE metadata structures (1)
- CC (1)
- Cache Poisoning (1)
- Carbohydrate (1)
- Certificates (1)
- Chen (1)
- Chloroquine (1)
- Cipher Block Chain (1)
- Climate Risks (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- Clusteranalyse (1)
- Co-performance (1)
- CoAP (1)
- Collaborative design (1)
- Common Criteria (1)
- Community (1)
- Computer Aided Software Engineering (1)
- Computer Security (1)
- Computer Support (1)
- Computersicherheit (1)
- Computing Milieux (1)
- Conceptual model (1)
- Conficker (1)
- Conformance Testing (1)
- Connected Car (1)
- Constructionism (1)
- Consumer Informatics (1)
- Consumer protection (1)
- Content Security Policies (1)
- Context (1)
- Cooperative Intelligent Transport Systems (ITS) (1)
- Cooperative Work (1)
- Countermeasures (1)
- Creative Commons (1)
- Crisis management (1)
- Curse of dimensionality (1)
- Cyber Attacks (1)
- Cyber Security (1)
- Cybercrime (1)
- Cybercrime Legislation (1)
- DASH (1)
- DNSSEC (1)
- DSGVO (1)
- Data (1)
- Data Compression (1)
- Data Integration (1)
- Data Literacy (1)
- Data Protection Officer (1)
- Data Reduction (1)
- Data Science (1)
- Data Storytelling (1)
- Data Storytelling Process (1)
- Data Tiles (1)
- Data collection (1)
- Data protection by design (1)
- Data visualization (1)
- Data-Storytelling-Prozess (1)
- Datenbanken (1)
- Datenbanksysteme (1)
- Datenkompetenz (1)
- Datenmodellierung (1)
- Datenschutz (1)
- Datenschutzerklärungen (1)
- Datenwissenschaft (1)
- Deep Learning (1)
- Denial of Service (1)
- Deployment (1)
- Design (1)
- Design Case Study (1)
- Design Probe (1)
- Design patterns (1)
- Deskriptive Datenanalyse (1)
- Developer Centered Security (1)
- Difference-coding (1)
- Digital Ecosystem (1)
- Digital Energy Management (1)
- Digital Plumbing (1)
- Digital Receipt (1)
- Digital signatures (1)
- Digitale Lehre (1)
- Digitaler Konsum (1)
- Digitalisierungsstrategie (1)
- Dimensionsreduktion (1)
- Disclosive ethics (1)
- Distribute Software Development (1)
- Domestic Robots (1)
- Domestic Technology (1)
- E-Health (1)
- ELSI (1)
- ERM (1)
- Ecosystems (1)
- Effective purpose specification (1)
- Elderly (1)
- Electric micromobility (1)
- Electronic Data Capture (EDC) (1)
- Embodied knowledge (1)
- Employee data protection (1)
- Employment (1)
- End-User Development (1)
- Engaging Experience (1)
- Entity-Relationship-Datenmodell (1)
- Entity-Relationship-Modell (1)
- Entitätsmengen-Beziehungs-Modell (1)
- Environment Perception (1)
- Eriodictyol (1)
- Ethnographic Research (1)
- Evaluation (1)
- Expert Interviews (1)
- Fake review cues (1)
- Fake review detection (1)
- File carving (1)
- Folk theories (1)
- Food Practices (1)
- Food literacy (1)
- Force field (1)
- Fragmented files (1)
- Frontend architecture (1)
- Full-text Search (1)
- Geo-tagging (1)
- Geschäftsmodell (1)
- Gesundheit (1)
- Glycam06 (1)
- Grassroots (1)
- Gromacs (1)
- HFI (1)
- HTML5 (1)
- HTTPS (1)
- Hauswirtschaft (1)
- Header whitelisting (1)
- Highly Automated Driving (1)
- Hochschullehre (1)
- Host-Based Code Injection Attacks (1)
- Human autonomy (1)
- Human computer interaction (1)
- Human computer interaction (HCI) (1)
- Human factors (1)
- Human review fraud detection (1)
- Human-Centered Robotics (1)
- Human-Robot-Interaction (HRI) (1)
- Human-centered computing (1)
- Human-food interaction (1)
- Human–Food Interaction (1)
- Hydroxychloroquine (1)
- ICT (1)
- IIoT (1)
- ISO 27000 (1)
- IT-Management (1)
- IT-Sicherheitsanforderungen (1)
- IT-Strategie (1)
- Implementation Challenges (1)
- Implementation Model (1)
- Individual Empowerment (1)
- Informational self-determination (1)
- Informationssicherheit (1)
- Infrastructuring (1)
- Infrastruktur (1)
- Integrated Household Information System (1)
- Integration Platform as a Service (1)
- Intelligence Amplification (1)
- Intelligence Augmentation (1)
- Intelligent Process Automation (1)
- Interactive Artifacts (1)
- Interbank Market (1)
- Intermediaries (1)
- Internet Technology (1)
- Internet of Things (1)
- Interpretability (1)
- Interviews (1)
- Invisible AI (1)
- IoT services security (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- KMU (1)
- Labordaten (1)
- Large-Scale Online Services (1)
- Last mile problem (1)
- Lead userness (1)
- Learning (1)
- Learning Environments (1)
- Learning and Adaptive Systems (1)
- Legal Design (1)
- Legal metrology (1)
- Liquidity Crises (1)
- Live Streaming (1)
- Living Lab (1)
- Login (1)
- MLOps Tools (1)
- MLR (1)
- Malware (1)
- Malware Detection (1)
- Management (1)
- Marketplaces (1)
- Memory forensics (1)
- Mental Models (1)
- Mental models (1)
- Message Authentication (1)
- Microservices (1)
- Microsoft (1)
- Misconception (1)
- Mixed / augmented reality (1)
- Mobile devices (1)
- Mobility (1)
- Mobiltelefone (1)
- Model surrogation (1)
- Modellierung (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Multimodal Mobility (1)
- Nachhaltigkeit (1)
- Nearshoring (1)
- Nonbonded scaling factor (1)
- Nutzerakzeptanz (1)
- OER (1)
- Online Services (1)
- Open Access (1)
- Open Educational Ressources (1)
- OpenStack (1)
- Opinion scam (1)
- Organizations (1)
- PHR (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Participatory Design (1)
- Participatory Design Approach (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Passwort (1)
- Peer-to-Peer (1)
- Perceived AI (1)
- Performance (1)
- Personal Health Record (1)
- Persuasive Systeme (1)
- Phishing (1)
- Platform economy (1)
- Policy (1)
- Privacy Awareness (1)
- Privacy engineering (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Privatsphäre (1)
- Programmer Workbench (1)
- Prudential Regulation (1)
- Public Cloud Services (1)
- Public Key Infrastructure (1)
- Push-based Streaming (1)
- RACS (1)
- RBAR (1)
- REDCap (1)
- REST security (1)
- Reference Architectural Model Automotive (RAMA) (1)
- Relationenmodell (1)
- Relative Energies (1)
- Relativer Mehrwert (1)
- Repositories (1)
- Requirements Engineering (1)
- Research Trajectories (1)
- Research methods (1)
- Resilienz (1)
- Restful Web Services (1)
- Review scam (1)
- Risk Perception (1)
- Risk-Based Account Recovery (1)
- Robotic Process Automation (1)
- SAML (1)
- SARS-CoV-2 (1)
- SELMA (1)
- SID (1)
- SME (1)
- SOS calls (1)
- SaaS (1)
- Safety (1)
- Scholarly workbench (1)
- Schutzobjekte (1)
- Scientific workbench (1)
- Secure Cloud Storage (1)
- Secure Coding Practices (1)
- Secure data transfer (1)
- Security APIs (1)
- Security Protocol (1)
- Selbstfahrende Autos (1)
- Selbstfahrtechnik (1)
- Self-Driving Cars (1)
- Self-driving (1)
- Semantic gap (1)
- Sensorbasierte Systeme (1)
- Service Design (1)
- Service-Oriented Architecture (1)
- Shared Autonomous Vehicles (1)
- Sichere Kommunikation Kritische Infrastrukturen (1)
- Silmitasertib (1)
- Small to medium-sized enterprises (1)
- Smart metering (1)
- Smartphones (1)
- Sociable Technologies (1)
- Social Capital (1)
- Social Media (1)
- Social learning (1)
- Socio Informatics (1)
- Software Development (1)
- Software Security (1)
- Software as a Service (1)
- Stuxnet (1)
- Sustainable HCI (1)
- Taste (1)
- Testing (1)
- Testing Tool (1)
- Thin Client (1)
- Transportation (1)
- Trust (1)
- Two-factor Authentication (1)
- UI-Dressing (1)
- URI (1)
- UXD (1)
- Umfrage (1)
- Usable Security and Privacy (1)
- Usage Experience (1)
- User Requirements (1)
- User-Centered Design (1)
- User-perspective (1)
- Valproic acid (1)
- Vehicle-2-Infrastructure Kommunikation (1)
- Vehicle-2-Vehicle Kommunikation (1)
- Verbraucherforschung (1)
- Verbraucherinformatik (1)
- Verification systems (1)
- Video (1)
- Virtual Reality (1)
- Voight-Kampff test (1)
- Vorgehensmodell (1)
- Warnings (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Portal (1)
- Web Security (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- Web-Tracking (1)
- WebSocket (1)
- WebSockets (1)
- Well-being (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Work (1)
- Workflow (1)
- XML (1)
- XML Security (1)
- XSpRES (1)
- Zeitreihenanalyse (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- accelerometer (1)
- appropriation (1)
- attacks (1)
- breakdowns (1)
- caching (1)
- carsharing (1)
- co-design (1)
- conformations (1)
- connected car (1)
- consumer informatics (1)
- cooperation (1)
- critical consumerism (1)
- cryptographic apis (1)
- culture (1)
- culture of participation (1)
- data literacy (1)
- data management (1)
- data science (1)
- data science canvas (1)
- data visualization (1)
- database systems (1)
- decision support system (1)
- deep learning (1)
- democratization (1)
- design probe (1)
- developer console (1)
- digital fabrication (1)
- digital platform ecosystem (1)
- distributed systems (1)
- drugs (1)
- eco-feedback (1)
- emergency response (1)
- emotion recognition (1)
- employee privacy (1)
- end-to-end security (1)
- ethics (1)
- ethnographically informed studies (1)
- ethnography (1)
- factor analysis (1)
- focus groups (1)
- food waste (1)
- higher education (1)
- human-centred design (1)
- humanoidrobot (1)
- informational self-determination (1)
- innovative work behavior (1)
- intervention mechanisms (1)
- knowledge graphs (1)
- knowledge management (1)
- knowledge sharing practices (1)
- latent class analysis (1)
- maker communities (1)
- mental models (1)
- mobile computing (1)
- mobility intelligence (1)
- multi-sensory (1)
- natural language processing (1)
- ontology (1)
- open educational resources (OERs) (1)
- optimized geometries (1)
- organizational management and coordination (1)
- participatory design (1)
- pervasive computing (1)
- posture analysis (1)
- privacy at work (1)
- privacy by design (1)
- privacy preferences (1)
- privacy settings (1)
- process infrastructure (1)
- project management (1)
- prosumption (1)
- qualitative research methods (1)
- question answering (1)
- reCAPTCHA (1)
- recommender systems (1)
- right to access (1)
- security and privacy literacy (1)
- security warning design (1)
- semantic technologies (1)
- services (1)
- shared mobility (1)
- sharing (1)
- signature (1)
- simulation process (1)
- small enterprises (1)
- small molecule (1)
- smart meters (1)
- social robots (1)
- software development (1)
- spinal posture (1)
- sustainability (1)
- sustainable mobility (1)
- technological platform (1)
- text mining (1)
- transfer learning (1)
- transparency-enhancing technologies (1)
- usable privacy controls (1)
- usable secure email (1)
- user interface design (1)
- user journey (1)
- validity (1)
- visibility (1)
- visualization (1)
- voice interaction (1)
- wearable sensor (1)
- web services security (1)
- wine (1)
An essential measure of autonomy in assistive service robots is adaptivity to the various contexts of human-oriented tasks, which are subject to subtle variations in task parameters that determine optimal behaviour. In this work, we propose an apprenticeship learning approach to achieving context-aware action generalization on the task of robot-to-human object hand-over. The procedure combines learning from demonstration and reinforcement learning: a robot first imitates a demonstrator’s execution of the task and then learns contextualized variants of the demonstrated action through experience. We use dynamic movement primitives as compact motion representations, and a model-based C-REPS algorithm for learning policies that can specify hand-over position, conditioned on context variables. Policies are learned using simulated task executions, before transferring them to the robot and evaluating emergent behaviours. We additionally conduct a user study involving participants assuming different postures and receiving an object from a robot, which executes hand-overs by either imitating a demonstrated motion, or adapting its motion to hand-over positions suggested by the learned policy. The results confirm the hypothesized improvements in the robot’s perceived behaviour when it is context-aware and adaptive, and provide useful insights that can inform future developments.
Cancer is one of the leading causes of death worldwide [183], with lung tumors being the most frequent cause of cancer deaths in men as well as one of the most common cancers diagnosed in woman [40]. As symptoms often arise in advanced stages, an early diagnosis is especially important to ensure the best and earliest possible treatment. In order to achieve this, Computed Tomography (CT) scans are frequently used for tumor detection and diagnosis. We will present examples of publicly available CT image data of lung cancer patients and discuss possible methods to realize an automatic system for automated cancer diagnosis. We will also look at the recent SPIE-AAPM Lung CT Challenge [10] data set in detail and describe possible methods and challenges for image segmentation and classification based on this data set.
Airborne and spaceborne platforms are the primary data sources for large-scale forest mapping, but visual interpretation for individual species determination is labor-intensive. Hence, various studies focusing on forests have investigated the benefits of multiple sensors for automated tree species classification. However, transferable deep learning approaches for large-scale applications are still lacking. This gap motivated us to create a novel dataset for tree species classification in central Europe based on multi-sensor data from aerial, Sentinel-1 and Sentinel-2 imagery. In this paper, we introduce the TreeSatAI Benchmark Archive, which contains labels of 20 European tree species (i.e., 15 tree genera) derived from forest administration data of the federal state of Lower Saxony, Germany. We propose models and guidelines for the application of the latest machine learning techniques for the task of tree species classification with multi-label data. Finally, we provide various benchmark experiments showcasing the information which can be derived from the different sensors including artificial neural networks and tree-based machine learning methods. We found that residual neural networks (ResNet) perform sufficiently well with weighted precision scores up to 79 % only by using the RGB bands of aerial imagery. This result indicates that the spatial content present within the 0.2 m resolution data is very informative for tree species classification. With the incorporation of Sentinel-1 and Sentinel-2 imagery, performance improved marginally. However, the sole use of Sentinel-2 still allows for weighted precision scores of up to 74 % using either multi-layer perceptron (MLP) or Light Gradient Boosting Machine (LightGBM) models. Since the dataset is derived from real-world reference data, it contains high class imbalances. We found that this dataset attribute negatively affects the models' performances for many of the underrepresented classes (i.e., scarce tree species). However, the class-wise precision of the best-performing late fusion model still reached values ranging from 54 % (Acer) to 88 % (Pinus). Based on our results, we conclude that deep learning techniques using aerial imagery could considerably support forestry administration in the provision of large-scale tree species maps at a very high resolution to plan for challenges driven by global environmental change. The original dataset used in this paper is shared via Zenodo (https://doi.org/10.5281/zenodo.6598390, Schulz et al., 2022). For citation of the dataset, we refer to this article.
Sind kleinere und mittlere Unternehmen (KMU) bereits auf die Digitale Transformation vorbereitet?
(2018)
Eine von den Autoren durchgeführte Untersuchung konnte deutliche Indizien dafür ausmachen, dass viele kleinere und mittlere Unternehmen (KMU) aktuell noch keine ausreichende Reife zur Digitalen Transformation haben. Zur Lösung des Problems wird vorgeschlagen, ein agiles IT-Management-Konzept zu entwickeln, um den IT-Bereich dynamisch und ohne formalen Ballast des klassischen IT-Managements zu steuern.
A company's financial documents use tables along with text to organize the data containing key performance indicators (KPIs) (such as profit and loss) and a financial quantity linked to them. The KPI’s linked quantity in a table might not be equal to the similarly described KPI's quantity in a text. Auditors take substantial time to manually audit these financial mistakes and this process is called consistency checking. As compared to existing work, this paper attempts to automate this task with the help of transformer-based models. Furthermore, for consistency checking it is essential for the table's KPIs embeddings to encode the semantic knowledge of the KPIs and the structural knowledge of the table. Therefore, this paper proposes a pipeline that uses a tabular model to get the table's KPIs embeddings. The pipeline takes input table and text KPIs, generates their embeddings, and then checks whether these KPIs are identical. The pipeline is evaluated on the financial documents in the German language and a comparative analysis of the cell embeddings' quality from the three tabular models is also presented. From the evaluation results, the experiment that used the English-translated text and table KPIs and Tabbie model to generate table KPIs’ embeddings achieved an accuracy of 72.81% on the consistency checking task, outperforming the benchmark, and other tabular models.
In 1991 the researchers at the center for the Learning Sciences of Carnegie Mellon University were confronted with the confusing question of “where is AI” from the users, who were interacting with AI but did not realize it. Three decades of research and we are still facing the same issue with the AItechnology users. In the lack of users’ awareness and mutual understanding of AI-enabled systems between designers and users, informal theories of the users about how a system works (“Folk theories”) become inevitable but can lead to misconceptions and ineffective interactions. To shape appropriate mental models of AI-based systems, explainable AI has been suggested by AI practitioners. However, a profound understanding of the current users’ perception of AI is still missing. In this study, we introduce the term “Perceived AI” as “AI defined from the perspective of its users”. We then present our preliminary results from deep-interviews with 50 AItechnology users, which provide a framework for our future research approach towards a better understanding of PAI and users’ folk theories.
For most people, using their body to authenticate their identity is an integral part of daily life. From our fingerprints to our facial features, our physical characteristics store the information that identifies us as "us." This biometric information is becoming increasingly vital to the way we access and use technology. As more and more platform operators struggle with traffic from malicious bots on their servers, the burden of proof is on users, only this time they have to prove their very humanity and there is no court or jury to judge, but an invisible algorithmic system. In this paper, we critique the invisibilization of artificial intelligence policing. We argue that this practice obfuscates the underlying process of biometric verification. As a result, the new "invisible" tests leave no room for the user to question whether the process of questioning is even fair or ethical. We challenge this thesis by offering a juxtaposition with the science fiction imagining of the Turing test in Blade Runner to reevaluate the ethical grounds for reverse Turing tests, and we urge the research community to pursue alternative routes of bot identification that are more transparent and responsive.
AI (artificial intelligence) systems are increasingly being used in all aspects of our lives, from mundane routines to sensitive decision-making and even creative tasks. Therefore, an appropriate level of trust is required so that users know when to rely on the system and when to override it. While research has looked extensively at fostering trust in human-AI interactions, the lack of standardized procedures for human-AI trust makes it difficult to interpret results and compare across studies. As a result, the fundamental understanding of trust between humans and AI remains fragmented. This workshop invites researchers to revisit existing approaches and work toward a standardized framework for studying AI trust to answer the open questions: (1) What does trust mean between humans and AI in different contexts? (2) How can we create and convey the calibrated level of trust in interactions with AI? And (3) How can we develop a standardized framework to address new challenges?
Das Kernanliegen des Datenschutzes ist es, natürliche Personen vor nachteiligen Effekten der Speicherung und Verarbeitung der sie betreffenden Daten zu schützen. Aber viele Personen scheinen gar nicht geschützt werden zu wollen. Im Gegenteil, viele Endanwender willigen “freiwillig“ – bewusst oder unbewusst – in eine umfassende Verarbeitung ihrer personenbezogenen Daten ein. Warum tun Menschen dies? Es werden verschiedene Ursachen diskutiert (beispielsweise in [79]), hierzu gehören Uninformiertheit, mangelnde Sensibilität, das Gefühl der Hilflosigkeit, mangelnde Zahlungsbereitschaft und mangelnde Alternativen. Auch wenn dies in Einzelfällen zutrifft, so gibt es oft sehr wohl datenschutzfreundliche Alternativen. Beispielsweise existiert zu WhatsApp (als Instant Messaging App) die Alternative Threema. Threema gilt als EU-DS-GVO-konform und funktional durchaus mit WhatsApp vergleichbar [62]. Allerdings ist inzwischen die aktuelle Netzwerkgröße ein entscheidendes Auswahlkriterium: Im Januar 2018 hatte Threema 4,5 Millionen Nutzer [172], WhatsApp dagegen 1,5 Milliarden [171]. Dies ist ein Indiz dafür, dass WhatsApp sich quasi zum De-facto-Standard entwickelt hat und es für die einzelne Person nur schwer möglich ist, viele andere “zum Wechsel auf ein anderes Produkt zu bewegen. [. . . ] Bei Diensten mit Nutzerzahlen im Milliardenbereich kann von ’Freiwilligkeit’ nur noch bedingt gesprochen werden.“ [9]
Projekte des maschinellen Lernens (ML), insbesondere im Bereich der Zeitreihenanalyse, gewinnen heute zunehmend an Bedeutung. Die Bereitstellung solcher Projekte in einer Produktionsumgebung mit dem gleichen Automatisierungsgrad wie bei klassischen Softwareprojekten ist ein komplexes Unterfangen. Die Umsetzung in Produktionsumgebungen erfordert neben klassischen DevOps auch Machine Learning Operation (MLOps) Technologien und Werkzeuge. Ziel dieser Studie ist es, einen umfassenden Überblick über verfügbare MLOps Tools zu bieten und einen spezifischen Techstack für Zeitreihen ML Projekte zu entwickeln. Es werden aktuelle Trends und Werkzeuge im Bereich MLOps durch eine multivokale Literaturrecherche (MLR) untersucht und analysiert. Die Studie identifiziert passende MLOps Werkzeuge und Methoden für die Zeitreihenanalyse und präsentiert eine spezifische Implementierung einer MLOps Pipeline für die Aktienkursprognose des S&P 500. MLOps und DevOps Tools nehmen eine essenzielle Rolle bei der effektiven Konstruktion und Verwaltung von ML Pipelines ein. Bei der Auswahl geeigneter Werkzeuge ist stets eine spezifische Anpassung an die jeweiligen Projektanforderungen erforderlich. Die Bereitstellung einer detaillierten Darstellung der aktuellen MLOps Tool Landschaft erweist sich hierbei als wertvolle Ressource, die es Entwicklern ermöglicht, die Effizienz und Effektivität ihrer ML Projekte zu optimieren.
Objektrelationale Datenbanken und Rough Sets für die Analyse von Contextualized Attention Metadata
(2009)
There has been a growing interest in taste research in the HCI and CSCW communities. However, the focus is more on stimulating the senses, while the socio-cultural aspects have received less attention. However, individual taste perception is mediated through social interaction and collective negotiation and is not only dependent on physical stimulation. Therefore, we study the digital mediation of taste by drawing on ethnographic research of four online wine tastings and one self-organized event. Hence, we investigated the materials, associated meanings, competences, procedures, and engagements that shaped the performative character of tasting practices. We illustrate how the tastings are built around the taste-making process and how online contexts differ in providing a more diverse and distributed environment. We then explore the implications of our findings for the further mediation of taste as a social and democratized phenomenon through online interaction.
Herein we report an update to ACPYPE, a Python3 tool that now properly converts AMBER to GROMACS topologies for force fields that utilize nondefault and nonuniform 1–4 electrostatic and nonbonded scaling factors or negative dihedral force constants. Prior to this work, ACPYPE only converted AMBER topologies that used uniform, default 1–4 scaling factors and positive dihedral force constants. We demonstrate that the updated ACPYPE accurately transfers the GLYCAM06 force field from AMBER to GROMACS topology files, which employs non-uniform 1–4 scaling factors as well as negative dihedral force constants. Validation was performed using β-d-GlcNAc through gas-phase analysis of dihedral energy curves and probability density functions. The updated ACPYPE retains all of its original functionality, but now allows the simulation of complex glycomolecular systems in GROMACS using AMBER-originated force fields. ACPYPE is available for download at https://github.com/alanwilter/acpype.