Refine
Year of publication
- 2015 (240) (remove)
Document Type
- Conference Proceeding (74)
- Article (unreviewed) (52)
- Article (reviewed) (50)
- Part of a Book (29)
- Book (13)
- Patent (10)
- Other (7)
- Periodical Part (3)
- Report (1)
- Working Paper (1)
Conference Type
- Konferenzartikel (63)
- Konferenz-Abstract (7)
- Sonstiges (3)
- Konferenz-Poster (1)
Language
- English (128)
- German (110)
- Other language (1)
- Spanish (1)
Is part of the Bibliography
- yes (240) (remove)
Keywords
- Kommunikation (7)
- Ausbildung (6)
- Applikation (5)
- Digitalisierung (5)
- Finite-Elemente-Methode (5)
- Abtragung (4)
- Bildung (4)
- Funktechnik (4)
- Herz (4)
- Physik (4)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (70)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (64)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (58)
- Fakultät Wirtschaft (W) (48)
- INES - Institut für nachhaltige Energiesysteme (20)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (15)
- ACI - Affective and Cognitive Institute (9)
- WLRI - Work-Life Robotics Institute (6)
- IUAS - Institute for Unmanned Aerial Systems (3)
- POIM - Peter Osypka Institute of Medical Engineering (3)
Open Access
- Closed Access (94)
- Open Access (58)
- Bronze (11)
- Closed (1)
- Diamond (1)
This article sets the focus on methods of information technology in the Humboldt Portal, which represents an ongoing research project to develop a virtual research environment on the Internet for the legacy of Alexander von Humboldt. Based on the experiences of developing and providing the Humboldt Digital Library (www.avhumboldt.net) for more than a decade, we defined a working plan to create an Internet portal for comprehensive access to Humboldt’s writings, no matter if documents are provided as PDF files, scan images or XML-TEI documents on external archives (Google Books, Internet Archive, Deutsches Textarchiv, Bibliotheque National de France). Going far beyond services of a digital library we will provide an information network with multimedia assets, which are containing objects like terms, paragraphs, data tables, scan images, or illustrations, together with correlated properties like thematic linkage to other objects, relevant keywords with optional synonyms and dynamic hyperlinks to related translations in different languages. So the Humboldt Portal can contribute to the key question, how to present interconnected data in an appropriate form using information technologies on the Web.
Autonomous humanoid robots require light weight, high torque and high speed actuators to be able to walk and run. For conventional gears with a fixed gear ratio the product of torque and velocity is constant. On the other hand desired motions require maximum torque and speed. In this paper it is shown that with a variable gear ratio it is possible to vary the relation between torque and velocity. This is achieved by introducing systems of rods and levers to move the joints of our humanoid robot ”Sweaty II”. On the basis of a variable gear ratio low speed and high torque can be achieved for those joint angles, which require this motion mode, whereas high speed and low torque can be realized for those joint angles, where it is favorable for the desired motion.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.
Rechtliche Dimension des Journalismus: Redaktionelle Verantwortung und User Generated Content
(2015)
Journalismus wandelt sich durch die Einbeziehung von User Generated Content. Dies hat nicht nur publizistische Folgen, sondern führt auch zu Problemen im Bereich der medienrechtlichen Verantwortung für die so publizierten Inhalte. Vor allem urheber- und persönlichkeitsrechtlichen Fragen sind für neue digitale Produkte zu prüfen. Insgesamt zeigt sich auch aus rechtlicher Sicht, dass eine Kombination unter Einbeziehung klassischer journalistischer Strukturen hilfreich ist, während rein von anonymen Nutzern gestaltete Produkte erhebliche Risiken bergen.
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist.
Bluetooth Low Energy extends the Bluetooth standard in version 4.0 for ultra-low energy applications through the extensive usage of low-power sleeping periods, which inherently difficult in frequency hopping technologies. This paper gives an introduction into the specifics of the Bluetooth Low Energy protocol, shows a sample implementation, where an embedded device is controlled by an Android smart phone, and shows the results of timing and current consumption measurements.
Massiv gescheitert
(2015)
EuGH "Videoüberwachung"
(2015)
We propose secure multi-party computation techniques for the distributed computation of the average using a privacy-preserving extension of gossip algorithms. While recently there has been mainly research on the side of gossip algorithms (GA) for data aggregation itself, to the best of our knowledge, the aforementioned research line does not take into consideration the privacy of the entities involved. More concretely, it is our objective to not reveal a node's private input value to any other node in the network, while still computing the average in a fully-decentralized fashion. Not revealing in our setting means that an attacker gains only minor advantage when guessing a node's private input value. We precisely quantify an attacker's advantage when guessing - as a mean for the level of data privacy leakage of a node's contribution. Our results show that by perturbing the input values of each participating node with pseudo-random noise with appropriate statistical properties (i) only a minor and configurable leakage of private information is revealed, by at the same time (ii) providing a good average approximation at each node. Our approach can be applied to a decentralized prosumer market, in which participants act as energy consumers or producers or both, referred to as prosumers.
Eine Mitte November veröffentlichte EU-Richtlinie sieht vor, dass ab 2017 Unternehmen mit durchschnittlich mehr als 500 Mitarbeitern bestimmte Nachhaltigkeitsangaben im Lagebericht veröffentlichen müssen. Auf den ersten Blick scheint hier weiterer administrativer Ballast für die wenigen betroffenen Genossenschaftsbanken zu entstehen. Doch daraus ergeben sich für die Institute auch Chancen. Es lohnt sich zu prüfen, ob ein aktives Nachhaltigkeitsmanagement sinnvoll erscheint.
Wir brauchen mehr Klarheit
(2015)