Refine
Year of publication
Document Type
- Conference Proceeding (109)
Conference Type
- Konferenzartikel (109) (remove)
Is part of the Bibliography
- yes (109)
Keywords
- Gamification (9)
- Assistive Technology (8)
- Deafblindness (5)
- Wearables (5)
- Education in Optics and Photonics (4)
- Human Computer Interaction (4)
- Licht (4)
- Optik (4)
- Affective Computing (3)
- Haptics (3)
- Tactile (3)
- Virtuelle Realität (3)
- research-oriented education (3)
- Astronomical events (2)
- Design (2)
- Emotion Recognition (2)
- Human Resources (2)
- International Day of Light, IDL (2)
- International Year of Light, IYL (2)
- Live Broadcasting (2)
- Navigation (2)
- Netzwerk (2)
- Photonik (2)
- Rehabilitation (2)
- Smart Textiles (2)
- education and research (2)
- optics and photonics (2)
- 3D interaction (1)
- 3D virtual reality (1)
- Algorithmus (1)
- Arbeitstag (1)
- Arbeitswissenschaft (1)
- Art and Photonics (1)
- Assistive Technologies (1)
- Audiovisual Performance (1)
- Augmented Reality (1)
- Ausbildung (1)
- Bildungscontrolling (1)
- Biosignals (1)
- Blockchain (1)
- Bloom filters (1)
- Bruchmechanik (1)
- Cloud Computing (1)
- Cloud Security (1)
- Cloud Service Provider (1)
- Cloud User (1)
- Collision avoidance (1)
- Computer Games (1)
- Computersicherheit (1)
- Computersimulation (1)
- Context-Awareness (1)
- Context-awareness (1)
- DMD (1)
- Data Integrity (1)
- Datenbanksystem (1)
- Datensicherung (1)
- Deaf-Blindness (1)
- Dienstleistung (1)
- Digitalisierung (1)
- E-Learning (1)
- Educations (1)
- Emotions (1)
- Erweiterte Realität <Informatik> (1)
- Faserstoff (1)
- Flüssigkristall (1)
- Game Design (1)
- Games (1)
- Ganztagsschule (1)
- Gehirn (1)
- Gender in Science and Technology Studies (STS), digitalization, interactive documentary, participation (1)
- Generative Art (1)
- Gestaltung (1)
- Gewebe (1)
- HR (1)
- Human Computrer Interaction (1)
- Hyperledger (1)
- Impairments (1)
- Improvisation (1)
- Industrie 4.0 (1)
- Informationstechnik (1)
- Interaction metaphor (1)
- Kommunikation (1)
- Kontextbewusstsein (1)
- Kryptographie (1)
- Leap Motion Controller (1)
- Learning (1)
- Learning Analytics (1)
- Lehre (1)
- Lernen (1)
- MINT (1)
- Maschinenbau (1)
- Mikrocontroller (1)
- Neurodivergent (1)
- Onboarding (1)
- Optics and Photonics (1)
- Phontonik (1)
- Physik (1)
- Produktion (1)
- Programmierung (1)
- Prüfung (1)
- Psychometrie (1)
- Quellcode (1)
- Range imaging RGB-D (1)
- Risk Assessment (1)
- Roboter (1)
- Robotics (1)
- Robots (1)
- Security Engineering (1)
- Segmentierung (1)
- Sensortechnik (1)
- Sicherheit (1)
- Simulation (1)
- Simulation-based Interaction (1)
- Smart wearables (1)
- Social Interaction (1)
- Social Robots (1)
- Software Protection (1)
- Software Security (1)
- Sound Synthesis (1)
- Soziale Roboter (1)
- Task Analysis (1)
- Temperaturmessung (1)
- Textile (1)
- Threat Modeling (1)
- Touch (1)
- Umwelt (1)
- VR (1)
- Virtual Reality (1)
- Visual Impairments (1)
- Web-Applikation (1)
- Wissenschaft (1)
- Zahlung (1)
- Zenware (1)
- agent (1)
- agent based systems (1)
- approximate histograms (1)
- bio-inspired models (1)
- cloud computing (1)
- cloud security (1)
- color vision (1)
- datengestützte Schulentwicklung (1)
- differential mode-delay (1)
- display technologies (1)
- distributed computing (1)
- e-learning (1)
- eingebettetes Gerät (1)
- kanal (1)
- learning scenario (1)
- m-learning (1)
- multimode fibre (1)
- multimode fibre connectors (1)
- peer to peer network (1)
- power distribution (1)
- reliability (1)
- self-organizing networks (1)
- sensor node (1)
- softwaregenerierter Code (1)
- teaching and learning culture (1)
- time series data (1)
- virtual reality (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (109) (remove)
Open Access
- Closed Access (64)
- Open Access (39)
- Closed (3)
- Bronze (2)
Remote code attestation protocols are an essential building block to offer a reasonable system security for wireless embedded devices. In the work at hand we investigate in detail the trustability of a purely software-based remote code attestation based inference mechanism over the wireless when e.g. running the prominent protocol derivate SoftWare-based ATTestation for Embedded Devices (SWATT). Besides the disclosure of pitfalls of such a protocol class we also point out good parameter choices which allow at least a meaningful plausibility check with a balanced false positive and false negative ratio.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
Practical exercises are a crucial part of many curricula. Even simple exercises can improve the understanding of the underlying subject. Most experimental setups require special hardware. To carry out e. g. a lens experiments the students need access to an optical bench, various lenses, light sources, apertures and a screen. In our previous publication we demonstrated the use of augmented reality visualization techniques in order to let the students prepare with a simulated experimental setup. Within the context of our intended blended learning concept we want to utilize augmented or virtual reality techniques for stationary laboratory exercises. Unlike applications running on mobile devices, stationary setups can be extended more easily with additional interfaces and thus allow for more complex interactions and simulations in virtual reality (VR) and augmented reality (AR). The most significant difference is the possibility to allow interactions beyond touching a screen. The LEAP Motion controller is a small inexpensive device that allows for the tracking of the user’s hands and fingers in three dimensions. It is conceivable to allow the user to interact with the simulation’s virtual elements by the user’s very hand position, movement and gesture. In this paper we evaluate possible applications of the LEAP Motion controller for simulated experiments in augmented and virtual reality. We pay particular attention to the devices strengths and weaknesses and want to point out useful and less useful application scenarios. © (2016) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
In many scientific studies lens experiments are part of the curriculum. The conducted experiments are meant to give the students a basic understanding for the laws of optics and its applications. Most of the experiments need special hardware like e.g. an optical bench, light sources, apertures and different lens types. Therefore it is not possible for the students to conduct any of the experiments outside of the university’s laboratory. Simple optical software simulators enabling the students to virtually perform lens experiments already exist, but are mostly desktop or web browser based.
Augmented Reality (AR) is a special case of mediated and mixed reality concepts, where computers are used to add, subtract or modify one’s perception of reality. As a result of the success and widespread availability of handheld mobile devices, like e.g. tablet computers and smartphones, mobile augmented reality applications are easy to use. Augmented reality can be easily used to visualize a simulated optical bench. The students can interactively modify properties like e.g. lens type, lens curvature, lens diameter, lens refractive index and the positions of the instruments in space. Light rays can be visualized and promote an additional understanding of the laws of optics. An AR application like this is ideally suited to prepare the actual laboratory sessions and/or recap the teaching content.
The authors will present their experience with handheld augmented reality applications and their possibilities for light and optic experiments without the needs for specialized optical hardware.
Walking interfaces offer advantages in navigation of VE systems over other types of locomotion. However, VR helmets have the disadvantage that users cannot see their immediate surroundings. Our publication describes the prototypical implementation of a virtual environment (VE) system, capable of detecting possible obstacles using an RGB-D sensor. In order to warn users of potential collisions with real objects while they are moving throughout the VE tracking area, we designed 4 different visual warning metaphors: Placeholder, Rubber Band, Color Indicator and Arrow. A small pilot study was carried out in which the participants had to solve a simple task and avoid any arbitrarily placed physical obstacles when crossing the virtual scene. Our results show that the Placeholder metaphor (in this case: trees), compared to the other variants, seems to be best suited for the correct estimation of the position of obstacles and in terms of the ability to evade them.
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
Qualitative Wissenschaft, künstlerisches Forschen und forschendes Lernen verbinden Erkenntnis aus Praxis und Erfahrung. In der Autoethnographie der eigenen Werkstatt des Hörens wie der Kultur in Studios anderer, wird die noch neue Interdisziplin Sound (Studies) erprobt und vertieft, mit Impulsen für die Praxis und Theorie, von der noch wenig bekannten A/r/t ographie heute, hin zu einer künftig A/R/Tophonie, dem künstlerischen Forschen in der Musik, ebenso wie durch Klang Komposition, Radio Kunst und visuelle Musik.
Strings
(2020)
This article presents the currently ongoing development of an audiovisual performance work with the title Strings. This work provides an improvisation setting for a violinist, two laptop performers, and two generative systems. At the core of Strings lies an approach that establishes a strong correlation among all participants by means of a shared physical principle. The physical principle is that of a vibrating string. The article discusses how this principle is used in both natural and simulated forms as main interaction layer between all performers and as natural or generative principle for creating audio and video.
Signal detection and bandwidth estimation, also known as channel segmentation or information channel estimation, is a perpetual topic in communication systems. In the field of radio monitoring this issue is extremely challenging, since unforeseeable effects like fading occur accidentally. In addition, most radio monitoring devices normally scan a wide frequency range of several hundred MHz and have to detect a multitude of different signals, varying in signal power, bandwidth and spectral shape. Since narrowband sensing techniques cannot be directly applied, most radio monitoring devices use Nyquist wideband sensing to discover the huge frequency range. In practice, sensing is normally conducted by an FFT sweep spectrum analyzer that delivers the power spectral density (PSD) values to the radio monitoring system. The channel segmentation is the initial step of a comprehensive signal analysis in a radio monitoring system based on the PSD values. In this paper, a novel approach for channel segmentation is presented that is based on a quantization and a histogram evaluation of the measured PSD. It will be shown that only the combination of both evaluations will lead to an successful automatic channel segmentation. The performance of the proposed algorithm is shown in a real radio monitoring szenario.