Refine
Year of publication
Document Type
- Conference Proceeding (99)
- Article (reviewed) (12)
- Part of a Book (12)
- Article (unreviewed) (9)
- Contribution to a Periodical (7)
- Bachelor Thesis (6)
- Book (3)
- Working Paper (3)
- Doctoral Thesis (2)
- Master's Thesis (2)
Conference Type
- Konferenzartikel (90)
- Konferenzband (5)
- Konferenz-Poster (2)
- Sonstiges (2)
- Konferenz-Abstract (1)
Language
- English (157) (remove)
Keywords
- Gamification (11)
- Assistive Technology (8)
- Human Computer Interaction (6)
- Optik (6)
- Deafblindness (5)
- Photonik (5)
- Wearables (5)
- Education in Optics and Photonics (4)
- Games (4)
- Roboter (4)
- Robotics (4)
- Social Robots (4)
- Virtual Reality (4)
- Affective Computing (3)
- Communication Systems (3)
- Computer Games (3)
- Computerspiele (3)
- E-Learning (3)
- Game Design (3)
- Haptics (3)
- Human Resources (3)
- Information Systems (3)
- Licht (3)
- Tactile (3)
- Virtuelle Realität (3)
- research-oriented education (3)
- Algorithmus (2)
- Astronomical events (2)
- Bloom filters (2)
- Cloud Computing (2)
- Datensicherung (2)
- Design (2)
- Emotion Recognition (2)
- Human Computrer Interaction (2)
- Informatik (2)
- Interaction metaphor (2)
- International Day of Light, IDL (2)
- International Year of Light, IYL (2)
- Live Broadcasting (2)
- Navigation (2)
- Netzwerk (2)
- Procedural Content Generation (2)
- Rehabilitation (2)
- Robots (2)
- Security (2)
- Sensortechnik (2)
- Smart Textiles (2)
- Spiel (2)
- Threat Modeling (2)
- Unity (2)
- education and research (2)
- optics and photonics (2)
- 3D interaction (1)
- 3D virtual reality (1)
- AI (1)
- AVD (1)
- Android (1)
- Arbeitstag (1)
- Arbeitswissenschaft (1)
- Art and Photonics (1)
- Artificial Intelligence (1)
- Artistic Research (1)
- Assistive Technologies (1)
- Assistive systems at the workplace (1)
- Astronomie (1)
- Audiovisual Performance (1)
- Augenfolgebewegung (1)
- Augmented Reality (1)
- Ausbildung (1)
- Automata (1)
- Automobile After-Sales Service (1)
- Banking (1)
- Bauteil (1)
- Bedrohungsanalyse (1)
- Biosignals (1)
- Brain Tissue (1)
- Bruchmechanik (1)
- COVID-19 (1)
- Cloud Security (1)
- Cloud Service Provider (1)
- Cloud User (1)
- Collision Avoidance (1)
- Collision avoidance (1)
- Computer Science (1)
- Computersicherheit (1)
- Computersimulation (1)
- Computerspiel (1)
- Context-Awareness (1)
- Context-awareness (1)
- Corona (1)
- DMD (1)
- DVRIP (1)
- Data privacy (1)
- Datenbanksystem (1)
- Deaf-Blindness (1)
- Dienstleistung (1)
- Diffusion (1)
- Digitalisierung (1)
- Economic Impact (1)
- Education (1)
- Educations (1)
- Emotions (1)
- Erweiterte Realität <Informatik> (1)
- Ethics of technology (1)
- Event Tracing for Windows (1)
- Farbe (1)
- Faseroptik (1)
- Faserstoff (1)
- Fläche (1)
- Flüssigkristall (1)
- Funktechnik (1)
- Game Development (1)
- Gehirn (1)
- Generative Art (1)
- Gestaltung (1)
- Gewebe (1)
- HR (1)
- History of Technology (1)
- Human-Robot Interaction (1)
- IDS (1)
- Impairments (1)
- Implementation (1)
- Implementierung (1)
- Improvisation (1)
- Industrie 4.0 (1)
- Informationstechnik (1)
- Interactive Documentary (1)
- Intrusion Detection (1)
- Kommunikation (1)
- Kontextbewusstsein (1)
- Kryptographie (1)
- Laboratory Exercises (1)
- Leap Motion Controller (1)
- Learning (1)
- Lehre (1)
- Lernen (1)
- Linse (1)
- Logging (1)
- Lokalisation (1)
- Loneliness (1)
- Machine learning (1)
- Maschinenbau (1)
- Mass Diffusion (1)
- Media Ecology (1)
- Mikrocontroller (1)
- Mobile Applications (1)
- Mobiles Endgerät (1)
- Network-Intrusion-Detection (1)
- Neurodivergent (1)
- Onboarding (1)
- Optics and Photonics (1)
- PCG (1)
- Phontonik (1)
- Physik (1)
- Porous Media Theory (1)
- Privatsphäre (1)
- Procedural Content (1)
- Produktion (1)
- Programmierung (1)
- Quellcode (1)
- Range Imaging (1)
- Range imaging RGB-D (1)
- Recruiting (1)
- Recrutainment (1)
- Refugee Migration (1)
- Risk Assessment (1)
- RoboCup (1)
- Robot-Assisted Training (1)
- STRIDE (1)
- Security Engineering (1)
- Segmentierung (1)
- Sexual Orientation (1)
- Sicherheit (1)
- Simulation (1)
- Simulation-based Interaction (1)
- Smart Grid (1)
- Smart wearables (1)
- Social Interaction (1)
- Social Isolation (1)
- Social inclusion (1)
- Software Architecture (1)
- Software Security (1)
- Sound Synthesis (1)
- Soziale Roboter (1)
- Spektroskopie (1)
- Spiel-Engine (1)
- Spiele (1)
- Sprachkurs (1)
- Strömungsmechanik (1)
- Task Analysis (1)
- Taxonomy (1)
- Technology Acceptance (1)
- Telemetry (1)
- Telepresence (1)
- Temperaturmessung (1)
- Textile (1)
- Timing Attacks (1)
- Tissue (1)
- Topology (1)
- Touch (1)
- Tourism (1)
- Trauma (1)
- Trust (1)
- UX (1)
- Unemployment (1)
- Unity3D (1)
- User Experience (1)
- User Studies (1)
- VR (1)
- Verteiltes System (1)
- Videogame (1)
- Videospiel (1)
- Virtualisierung (1)
- Visual Impairments (1)
- Web Development (1)
- Web-Applikation (1)
- Web-Entwicklung (1)
- Webassembly (1)
- Windows (1)
- Wirbelsäule (1)
- Wirtschaft (1)
- Wissenschaft (1)
- Zahlung (1)
- Zenware (1)
- agent (1)
- agent based systems (1)
- analysis (1)
- approximate histograms (1)
- art (1)
- binary (1)
- bio-inspired models (1)
- bloom filters (1)
- cloud computing (1)
- cloud security (1)
- color vision (1)
- dahua (1)
- data malleability (1)
- data processing (1)
- deglobalization (1)
- differential mode-delay (1)
- display technologies (1)
- distributed computing (1)
- e-learning (1)
- eingebettetes Gerät (1)
- eye-tracking-movement (1)
- homomorphic encryption (1)
- kanal (1)
- learning scenario (1)
- m-learning (1)
- media (1)
- mobile learning (1)
- multimode fibre (1)
- multimode fibre connectors (1)
- optics (1)
- outsourced computation (1)
- peer to peer network (1)
- photonics (1)
- power distribution (1)
- protocol (1)
- real-time (1)
- reliability (1)
- self-organizing networks (1)
- sensor node (1)
- set operations (1)
- set relations (1)
- softwaregenerierter Code (1)
- teaching and learning culture (1)
- time series data (1)
- virtual reality (1)
- wireless sensor network (1)
- Überwachung (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (157) (remove)
Open Access
- Closed Access (78)
- Open Access (60)
- Closed (4)
- Bronze (2)
The aim of the smart grid is to achieve more efficient, distributed and secure supply of energy over the traditional power grid by using a bidirectional information flow between the grid agents (e.g. generator node, customer). One of the key optimization problems in smart grid is to produce power among generator nodes with a minimum cost while meeting the customer demand, known as Economic Dispatch Problem (EDP). In recent years, many distributed approaches to solve EDP have been proposed. However, protecting the privacy-sensitive data of individual generator nodes has been largely overlooked in the existing solutions. In this work, we show an attack against an existing auction-based EDP protocol considering a non-colluding semi-honest adversary. We briefly introduce our approach to a practical privacy-preserving EDP solution as our work in progress.
Remote code attestation protocols are an essential building block to offer a reasonable system security for wireless embedded devices. In the work at hand we investigate in detail the trustability of a purely software-based remote code attestation based inference mechanism over the wireless when e.g. running the prominent protocol derivate SoftWare-based ATTestation for Embedded Devices (SWATT). Besides the disclosure of pitfalls of such a protocol class we also point out good parameter choices which allow at least a meaningful plausibility check with a balanced false positive and false negative ratio.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
Practical exercises are a crucial part of many curricula. Even simple exercises can improve the understanding of the underlying subject. Most experimental setups require special hardware. To carry out e. g. a lens experiments the students need access to an optical bench, various lenses, light sources, apertures and a screen. In our previous publication we demonstrated the use of augmented reality visualization techniques in order to let the students prepare with a simulated experimental setup. Within the context of our intended blended learning concept we want to utilize augmented or virtual reality techniques for stationary laboratory exercises. Unlike applications running on mobile devices, stationary setups can be extended more easily with additional interfaces and thus allow for more complex interactions and simulations in virtual reality (VR) and augmented reality (AR). The most significant difference is the possibility to allow interactions beyond touching a screen. The LEAP Motion controller is a small inexpensive device that allows for the tracking of the user’s hands and fingers in three dimensions. It is conceivable to allow the user to interact with the simulation’s virtual elements by the user’s very hand position, movement and gesture. In this paper we evaluate possible applications of the LEAP Motion controller for simulated experiments in augmented and virtual reality. We pay particular attention to the devices strengths and weaknesses and want to point out useful and less useful application scenarios. © (2016) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
In many scientific studies lens experiments are part of the curriculum. The conducted experiments are meant to give the students a basic understanding for the laws of optics and its applications. Most of the experiments need special hardware like e.g. an optical bench, light sources, apertures and different lens types. Therefore it is not possible for the students to conduct any of the experiments outside of the university’s laboratory. Simple optical software simulators enabling the students to virtually perform lens experiments already exist, but are mostly desktop or web browser based.
Augmented Reality (AR) is a special case of mediated and mixed reality concepts, where computers are used to add, subtract or modify one’s perception of reality. As a result of the success and widespread availability of handheld mobile devices, like e.g. tablet computers and smartphones, mobile augmented reality applications are easy to use. Augmented reality can be easily used to visualize a simulated optical bench. The students can interactively modify properties like e.g. lens type, lens curvature, lens diameter, lens refractive index and the positions of the instruments in space. Light rays can be visualized and promote an additional understanding of the laws of optics. An AR application like this is ideally suited to prepare the actual laboratory sessions and/or recap the teaching content.
The authors will present their experience with handheld augmented reality applications and their possibilities for light and optic experiments without the needs for specialized optical hardware.
Walking interfaces offer advantages in navigation of VE systems over other types of locomotion. However, VR helmets have the disadvantage that users cannot see their immediate surroundings. Our publication describes the prototypical implementation of a virtual environment (VE) system, capable of detecting possible obstacles using an RGB-D sensor. In order to warn users of potential collisions with real objects while they are moving throughout the VE tracking area, we designed 4 different visual warning metaphors: Placeholder, Rubber Band, Color Indicator and Arrow. A small pilot study was carried out in which the participants had to solve a simple task and avoid any arbitrarily placed physical obstacles when crossing the virtual scene. Our results show that the Placeholder metaphor (in this case: trees), compared to the other variants, seems to be best suited for the correct estimation of the position of obstacles and in terms of the ability to evade them.
With this generation of devices, Virtual Reality (VR) has actually made it into the living rooms of end-users. These devices feature 6-DOF tracking, allowing them to move naturally in virtual worlds and experience them even more immersively. However, for a natural locomotion in the virtual, one needs a corresponding free space in the real environment. The available space is often limited, especially in everyday environments and under normal spatial conditions. Furnishings and objects of daily life can quickly become obstacles for VR users if they are not cleared away. Since the idea behind VR is to place users into a virtual world and to hide the real world as much as possible, invisible objects represent potential obstacles. The currently available systems offer only rudimentary assistance for this problem. If a user threatens to leave the space previously defined for use, a visual boundary is displayed to allow orientation within the space. These visual metaphors are intended to prevent users from leaving the safe area. However, there is no detection of potentially dangerous objects within this part of space. Objects that have not been cleared away or that have been added in the meantime may still become obstacles. This thesis shows how possible obstacles in the environment can be detected automatically with range imaging cameras and how users can be effectively warned about them in the virtual environment without significantly disturbing their sense of presence. Four different interactive visual metaphors are used to signalize the obstacles within the VE. With the help of a user study, the four signaling variants and the obstacle detection were evaluated and tested.
The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping crowd sourcing is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
While prospect of tracking mobile devices' users is widely discussed all over European countries to counteract COVID-19 propagation, we propose a Bloom filter based construction providing users' location privacy and preventing mass surveillance.
We apply a solution based on Bloom filters data structure that allows a third party, a government agency, to perform some privacy-preserving set relations on a mobile telco's access logfile.
By computing set relations, the government agency, given the knowledge of two identified persons, has an instrument that provides a (possible) infection chain from the initial to the final infected user no matter at which location on a worldwide scale they are.
The benefit of our approach is that intermediate possible infected users can be identified and subsequently contacted by the agency. With such approach, we state that solely identities of possible infected users will be revealed and location privacy of others will be preserved. To this extent, it meets General Data Protection Regulation (GDPR)requirements in this area.
Strings
(2020)
This article presents the currently ongoing development of an audiovisual performance work with the title Strings. This work provides an improvisation setting for a violinist, two laptop performers, and two generative systems. At the core of Strings lies an approach that establishes a strong correlation among all participants by means of a shared physical principle. The physical principle is that of a vibrating string. The article discusses how this principle is used in both natural and simulated forms as main interaction layer between all performers and as natural or generative principle for creating audio and video.
Signal detection and bandwidth estimation, also known as channel segmentation or information channel estimation, is a perpetual topic in communication systems. In the field of radio monitoring this issue is extremely challenging, since unforeseeable effects like fading occur accidentally. In addition, most radio monitoring devices normally scan a wide frequency range of several hundred MHz and have to detect a multitude of different signals, varying in signal power, bandwidth and spectral shape. Since narrowband sensing techniques cannot be directly applied, most radio monitoring devices use Nyquist wideband sensing to discover the huge frequency range. In practice, sensing is normally conducted by an FFT sweep spectrum analyzer that delivers the power spectral density (PSD) values to the radio monitoring system. The channel segmentation is the initial step of a comprehensive signal analysis in a radio monitoring system based on the PSD values. In this paper, a novel approach for channel segmentation is presented that is based on a quantization and a histogram evaluation of the measured PSD. It will be shown that only the combination of both evaluations will lead to an successful automatic channel segmentation. The performance of the proposed algorithm is shown in a real radio monitoring szenario.
Wow, You Are Terrible at This!: An Intercultural Study on Virtual Agents Giving Mixed Feedback
(2020)
While the effects of virtual agents in terms of likeability, uncanniness, etc. are well explored, it is unclear how their appearance and the feedback they give affects people's reactions. Is critical feedback from an agent embodied as a mouse or a robot taken less serious than from a human agent? In an intercultural study with 120 participants from Germany and the US, participants had to find hidden objects in a game and received feedback on their performance by virtual agents with different appearances. As some levels were designed to be unsolvable, critical feedback was unavoidable. We hypothesized that feedback would be taken more serious, the more human the agent looked. Also, we expected the subjects from the US to react more sensitively to criticism. Surprisingly, our results showed that the agents' appearance did not significantly change the participants' perception. Also, while we found highly significant differences in inspirational and motivational effects as well as in perceived task load between the two cultures, the reactions to criticism were contrary to expectations based on established cultural models. This work improves our understanding on how affective virtual agents are to be designed, both with respect to culture and to dialogue strategies.
Communication protocols enable information exchange between different information systems. If protocol descriptions for these systems are not available, they can be reverse-engineered for interoperability or security reasons. This master thesis describes the analysis of such a proprietary binary protocol, named the DVRIP or Dahua private protocol from Dahua Technology. The analysis contains the identification of the DVRIP protocol header format, security mechanisms and vulnerabilities inside the protocol implementation. With the revealing insights of the protocol, an increase of the overall security is achieved. This thesis builds the foundation for further targeted security analyses.
The Paper presents the design and development of a blended learning concept for an engineering course in the field of color representation and display technologies. A suitable learning environment is crucial for the success of the teaching scenario. A mixture of theoretical lectures and hands-on activities with practical applications and experiments, combined with the advantages of modern digital media is the main topic of the paper. Blended learning describes the didactical change of attendance periods and online periods. The e-learning environment for the online period is designed toward an easy access and interaction. Present digital media extends the established teaching scenarios and enables the presentation of videos, animations and augmented reality (AR). Visualizations are effective tools to impart learning contents with lasting effect. The preparation and evaluation of the theoretical lectures and the hands-on activities are stimulated and affects positively the attendance periods. The tasks and experiments require the students to work independently and to develop individual solution strategies. This engages and motivates the students, deepens the knowledge. The authors will present their experience with the implemented blended learning scenario in this field of optics and photonics. All aspects of the learning environment will be introduced.