Refine
Year of publication
Document Type
- Conference Proceeding (99)
- Article (reviewed) (12)
- Part of a Book (12)
- Article (unreviewed) (9)
- Contribution to a Periodical (7)
- Bachelor Thesis (6)
- Book (3)
- Working Paper (3)
- Doctoral Thesis (2)
- Master's Thesis (2)
Conference Type
- Konferenzartikel (90)
- Konferenzband (5)
- Konferenz-Poster (2)
- Sonstiges (2)
- Konferenz-Abstract (1)
Language
- English (157) (remove)
Keywords
- Gamification (11)
- Assistive Technology (8)
- Human Computer Interaction (6)
- Optik (6)
- Deafblindness (5)
- Photonik (5)
- Wearables (5)
- Education in Optics and Photonics (4)
- Games (4)
- Roboter (4)
- Robotics (4)
- Social Robots (4)
- Virtual Reality (4)
- Affective Computing (3)
- Communication Systems (3)
- Computer Games (3)
- Computerspiele (3)
- E-Learning (3)
- Game Design (3)
- Haptics (3)
- Human Resources (3)
- Information Systems (3)
- Licht (3)
- Tactile (3)
- Virtuelle Realität (3)
- research-oriented education (3)
- Algorithmus (2)
- Astronomical events (2)
- Bloom filters (2)
- Cloud Computing (2)
- Datensicherung (2)
- Design (2)
- Emotion Recognition (2)
- Human Computrer Interaction (2)
- Informatik (2)
- Interaction metaphor (2)
- International Day of Light, IDL (2)
- International Year of Light, IYL (2)
- Live Broadcasting (2)
- Navigation (2)
- Netzwerk (2)
- Procedural Content Generation (2)
- Rehabilitation (2)
- Robots (2)
- Security (2)
- Sensortechnik (2)
- Smart Textiles (2)
- Spiel (2)
- Threat Modeling (2)
- Unity (2)
- education and research (2)
- optics and photonics (2)
- 3D interaction (1)
- 3D virtual reality (1)
- AI (1)
- AVD (1)
- Android (1)
- Arbeitstag (1)
- Arbeitswissenschaft (1)
- Art and Photonics (1)
- Artificial Intelligence (1)
- Artistic Research (1)
- Assistive Technologies (1)
- Assistive systems at the workplace (1)
- Astronomie (1)
- Audiovisual Performance (1)
- Augenfolgebewegung (1)
- Augmented Reality (1)
- Ausbildung (1)
- Automata (1)
- Automobile After-Sales Service (1)
- Banking (1)
- Bauteil (1)
- Bedrohungsanalyse (1)
- Biosignals (1)
- Brain Tissue (1)
- Bruchmechanik (1)
- COVID-19 (1)
- Cloud Security (1)
- Cloud Service Provider (1)
- Cloud User (1)
- Collision Avoidance (1)
- Collision avoidance (1)
- Computer Science (1)
- Computersicherheit (1)
- Computersimulation (1)
- Computerspiel (1)
- Context-Awareness (1)
- Context-awareness (1)
- Corona (1)
- DMD (1)
- DVRIP (1)
- Data privacy (1)
- Datenbanksystem (1)
- Deaf-Blindness (1)
- Dienstleistung (1)
- Diffusion (1)
- Digitalisierung (1)
- Economic Impact (1)
- Education (1)
- Educations (1)
- Emotions (1)
- Erweiterte Realität <Informatik> (1)
- Ethics of technology (1)
- Event Tracing for Windows (1)
- Farbe (1)
- Faseroptik (1)
- Faserstoff (1)
- Fläche (1)
- Flüssigkristall (1)
- Funktechnik (1)
- Game Development (1)
- Gehirn (1)
- Generative Art (1)
- Gestaltung (1)
- Gewebe (1)
- HR (1)
- History of Technology (1)
- Human-Robot Interaction (1)
- IDS (1)
- Impairments (1)
- Implementation (1)
- Implementierung (1)
- Improvisation (1)
- Industrie 4.0 (1)
- Informationstechnik (1)
- Interactive Documentary (1)
- Intrusion Detection (1)
- Kommunikation (1)
- Kontextbewusstsein (1)
- Kryptographie (1)
- Laboratory Exercises (1)
- Leap Motion Controller (1)
- Learning (1)
- Lehre (1)
- Lernen (1)
- Linse (1)
- Logging (1)
- Lokalisation (1)
- Loneliness (1)
- Machine learning (1)
- Maschinenbau (1)
- Mass Diffusion (1)
- Media Ecology (1)
- Mikrocontroller (1)
- Mobile Applications (1)
- Mobiles Endgerät (1)
- Network-Intrusion-Detection (1)
- Neurodivergent (1)
- Onboarding (1)
- Optics and Photonics (1)
- PCG (1)
- Phontonik (1)
- Physik (1)
- Porous Media Theory (1)
- Privatsphäre (1)
- Procedural Content (1)
- Produktion (1)
- Programmierung (1)
- Quellcode (1)
- Range Imaging (1)
- Range imaging RGB-D (1)
- Recruiting (1)
- Recrutainment (1)
- Refugee Migration (1)
- Risk Assessment (1)
- RoboCup (1)
- Robot-Assisted Training (1)
- STRIDE (1)
- Security Engineering (1)
- Segmentierung (1)
- Sexual Orientation (1)
- Sicherheit (1)
- Simulation (1)
- Simulation-based Interaction (1)
- Smart Grid (1)
- Smart wearables (1)
- Social Interaction (1)
- Social Isolation (1)
- Social inclusion (1)
- Software Architecture (1)
- Software Security (1)
- Sound Synthesis (1)
- Soziale Roboter (1)
- Spektroskopie (1)
- Spiel-Engine (1)
- Spiele (1)
- Sprachkurs (1)
- Strömungsmechanik (1)
- Task Analysis (1)
- Taxonomy (1)
- Technology Acceptance (1)
- Telemetry (1)
- Telepresence (1)
- Temperaturmessung (1)
- Textile (1)
- Timing Attacks (1)
- Tissue (1)
- Topology (1)
- Touch (1)
- Tourism (1)
- Trauma (1)
- Trust (1)
- UX (1)
- Unemployment (1)
- Unity3D (1)
- User Experience (1)
- User Studies (1)
- VR (1)
- Verteiltes System (1)
- Videogame (1)
- Videospiel (1)
- Virtualisierung (1)
- Visual Impairments (1)
- Web Development (1)
- Web-Applikation (1)
- Web-Entwicklung (1)
- Webassembly (1)
- Windows (1)
- Wirbelsäule (1)
- Wirtschaft (1)
- Wissenschaft (1)
- Zahlung (1)
- Zenware (1)
- agent (1)
- agent based systems (1)
- analysis (1)
- approximate histograms (1)
- art (1)
- binary (1)
- bio-inspired models (1)
- bloom filters (1)
- cloud computing (1)
- cloud security (1)
- color vision (1)
- dahua (1)
- data malleability (1)
- data processing (1)
- deglobalization (1)
- differential mode-delay (1)
- display technologies (1)
- distributed computing (1)
- e-learning (1)
- eingebettetes Gerät (1)
- eye-tracking-movement (1)
- homomorphic encryption (1)
- kanal (1)
- learning scenario (1)
- m-learning (1)
- media (1)
- mobile learning (1)
- multimode fibre (1)
- multimode fibre connectors (1)
- optics (1)
- outsourced computation (1)
- peer to peer network (1)
- photonics (1)
- power distribution (1)
- protocol (1)
- real-time (1)
- reliability (1)
- self-organizing networks (1)
- sensor node (1)
- set operations (1)
- set relations (1)
- softwaregenerierter Code (1)
- teaching and learning culture (1)
- time series data (1)
- virtual reality (1)
- wireless sensor network (1)
- Überwachung (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (157) (remove)
Open Access
- Closed Access (78)
- Open Access (60)
- Closed (4)
- Bronze (2)
Wow, You Are Terrible at This!: An Intercultural Study on Virtual Agents Giving Mixed Feedback
(2020)
While the effects of virtual agents in terms of likeability, uncanniness, etc. are well explored, it is unclear how their appearance and the feedback they give affects people's reactions. Is critical feedback from an agent embodied as a mouse or a robot taken less serious than from a human agent? In an intercultural study with 120 participants from Germany and the US, participants had to find hidden objects in a game and received feedback on their performance by virtual agents with different appearances. As some levels were designed to be unsolvable, critical feedback was unavoidable. We hypothesized that feedback would be taken more serious, the more human the agent looked. Also, we expected the subjects from the US to react more sensitively to criticism. Surprisingly, our results showed that the agents' appearance did not significantly change the participants' perception. Also, while we found highly significant differences in inspirational and motivational effects as well as in perceived task load between the two cultures, the reactions to criticism were contrary to expectations based on established cultural models. This work improves our understanding on how affective virtual agents are to be designed, both with respect to culture and to dialogue strategies.
Critical theory and philosophy across many fields in the humanities has become awash with what has been characterised as ‘the material turn’. This material turn, which seems to involve varying combinations of what is known as Object Orientated Ontology (Harman), Actor-Network Theory (Latour), process philosophy (Whitehead), speculative realism (Bryant), or agential realism (Barad), emphasises some move toward a posthuman understanding of what the world is, and our relation to it.
Webassembly is a new technology to create application in a new way. Webassembly is being developed since 2017 by the worldwide web consortium (w3c). The primary task of webassembly is to improve web applications.
Today, more and more applications are being created as web applications. Web applications have some advantages - they are platform independent and even mobile platforms can run them, and no installation is needed apart from a modern web browser.
Currently, web applications are being developed in JavaScript (JS), hypertext mark-up language 5 (HTML 5), and cascading style sheets (CSS).
These technologies are not made for huge web applications, but they should not be replaced by webassembly; rather, webassembly is an extension to the currently existing technology.
The purpose of webassembly is to fix or improve the problems in web application development.
This master’s thesis reviews all of the aspects and checks whether the promises of webassembly are kept and where problems still exist.
A recognizable division appears between students with a comprehensive knowledge of the Web and those that are less certain about its resources. This is where, the teaching innovation Web Mentoring: Peer-to-Peer has been developed to help the students to cope better with the demands of media education. Furthermore, this presents the opportunity for master’s degree students to begin mentoring undergraduate students. Mentoring sessions have already been carried out successfully in the previous two semesters and are being presented, evaluated and discussed.
This paper describes a comparative study of two tactile systems supporting navigation for persons with little or no visual and auditory perception. The efficacy of a tactile head-mounted device (HMD) was compared to that of a wearable device, a tactile belt. A study with twenty participants showed that the participants took significantly less time to complete a course when navigating with the HMD, as compared to the belt.
Virtual reality in the hotel industry: assessing the acceptance of immersive hotel presentation
(2019)
In the hotel industry, it is crucial to reduce the inherent information asymmetry with regard to the goods offered. This asymmetry can be minimised through the use of smartphone-based virtual reality applications (SBVRs), which allow virtual simulation of real experiences and thus enable more efficient information retrieval. The aim of the study is to determine for the first time the user acceptance of these immersive hotel presentations for assessing the performance of a travel accommodation. For this purpose, the Technology Acceptance Model (TAM) was used to explain the acceptance behaviour for this new technology. A virtual reality application was specially developed, in which the participants could explore a hotel virtually. A total of 569 participants took part in the study. The structural equation model and the hypotheses were tested using a Partial Least Squares (PLS) analysis. The results illustrate that the immersive product experience leads to more efficient information gathering. The perceived usefulness significantly affects the attitude towards using the technology as well as the intention to use it. In contrast to the traditional TAM, the perceived ease of use of SBVRs has no effect on the perceived usefulness or attitude towards using the technology.
We present the design of a system combining augmented reality (AR) and gamification to support elderly persons’ rehabilitation activities. The system is attached to the waist; it collects detailed movement data and at the same time augments the user’s path by projections. The projected AR-elements can provide location-based information or incite movement games. The collected data can be observed by therapists. Based on this data, the challenge level can be more frequently adapted, keeping up the patient’s motivation. The exercises can involve cognitive elements (for mild cognitive impairments), physiological elements (rehabilitation), or both. The overall vision is an individualized and gamified therapy. Thus, the system also offers application scenarios beyond rehabilitation in sports. In accordance with the methodology of design thinking, we present a first specification and a design vision based on inputs from business experts, gerontologists, physiologists, psychologists, game designers, cognitive scientists and computer scientists.
The University for Children is a very successful event aiming to spark children‧s interest in science, in this particular lecture in Optics and Photonics. It is from brain research that we know about the significant dependence of successful learning on the fun factor. Researchers in this field have shown that knowledge acquired with fun is stored for a longer time in the long-term memory and can be used both more efficiently and more creatively [1], [2]. Such an opportunity to inspire the young generation for science must not be wasted. The world of Photonics and Optics provides us with a nearly inexhaustible source of opportunities of this kind.
Towards a gamification of industrial production: a comparative study in sheltered work environments
(2015)
Using video game elements to improve user experience and user engagement in non-game applications is called "gamification". This method of enriching human-computer interaction has been applied successfully in education, health and general business processes. However, it has not been established in industrial production so far.
After discussing the requirements specific for the production domain we present two workplaces augmented with gamification. Both implementations are based on a common framework for context-aware assistive systems but exemplify different approaches: the visualization of work performance is complex in System 1 and simple in System 2.
Based on two studies in sheltered work environments with impaired workers, we analyze and compare the systems' effects on work and on workers. We show that gamification leads to a speed-accuracy-tradeoff if no quality-related feedback is provided. Another finding is that there is a highly significant raise in acceptance if a straightforward visualization approach for gamification is used.
In this paper we report on the commercial background as well as resulting high-level architecture and design of a cloud-based system for cryptographic software protection and licensing. This is based on the experiences and insights gained in the context of a real-world commercial R&D project at Wibu-Systems AG, a company that specialises in software encryption and licensing solutions.
In short-reach connections, large-diameter multimode fibres allow for robust and easy connections. Unfortunately, their propagation properties depend on the excitation conditions. We propose a launching technique using a fibre stub that can tolerate fabrication tolerances in terms of tilts and off-sets to a large extent. A study of the influence of displaced connectors along the transmission link shows that the power distributions approach a steady-state power distribution very similar to the initial distribution established by the proposed launching scheme.
This paper describes the new Sweaty humanoid adult size robot trying to qualify for the RoboCup 2014 adult size humanoid competition. The robot is built from scratch to eventually allow it to run. One characteristic is that to prevent the motors from overheating, water evaporation is used for cooling. The robot is literally sweating which has given it its name. Another characteristic is, that the motors are not directly connected to the frame but by means of beams. This allows a variable transmission ratio depending on the angle.
The Effect of Gamification on Emotions - The Potential of Facial Recognition in Work Environmentsns
(2015)
Gamification means using video game elements to improve user experience and user engagement in non-game services and applications. This article describes the effects when gamification is used in work contexts. Here we focus on industrial production. We describe how facial recognition can be employed to measure and quantify the effect of gamification on the users’ emotions.
The quantitative results show that gamification significantly reduces both task completion time and error rate. However, the results concerning the effect on emotions are surprising. Without gamification there are not only more unhappy expressions (as to expect) but surprisingly also more happy expressions. Both findings are statistically highly significant.
We think that in redundant production work there are generally more (negative) emotions involved. When there is no gamification happy and unhappy balance each other. In contrast gamification seems to shift the spectrum of moods towards “relaxed”. Especially for work environments such a calm attitude is a desirable effect on the users. Thus our findings support the use of gamification.
G.R.E.C is a adventure game, set in an dystopien industrial world, where you are a scavenger for hire. Explore the village of Vankhart Valley and grab everything valuable you can get your hands on.
Your trusty old jump boots will help you avoiding the nasty and deadly spores that changed the world of G.R.E.C forever.
In contrast to their traditional, non-interactive counterparts, interactive dynamic visualisations allow users to adapt their form and content to their individual cognitive skills and needs. Provided that the interactive features allow for intuitive use without increasing cognitive load, interactive videos should therefore lead to more efficient forms of learning. This notion was tested in an experimental study, where participants learned to tie four nautical knots of different complexity by watching either non-interactive or interactive videos. The results show that in the interactive condition, participants used the interactive features like stopping, replaying, reversing or changing speed to adapt the pace of the video demonstration. This led to an uneven distribution of their attention and cognitive resources across the videos, which was more pronounced for the difficult knots. Consequently users of non-interactive video presentations, needed substantially more time than users of the interactive videos to acquire the necessary skills for tying the knots.
Machine learning (ML) has become highly relevant in applications across all industries, and specialists in the field are sought urgently. As it is a highly interdisciplinary field, requiring knowledge in computer science, statistics and the relevant application domain, experts are hard to find. Large corporations can sweep the job market by offering high salaries, which makes the situation for small and medium enterprises (SME) even worse, as they usually lack the capacities both for attracting specialists and for qualifying their own personnel. In order to meet the enormous demand in ML specialists, universities now teach ML in specifically designed degree programs as well as within established programs in science and engineering. While the teaching almost always uses practical examples, these are somewhat artificial or outdated, as real data from real companies is usually not available. The approach reported in this contribution aims to tackle the above challenges in an integrated course, combining three independent aspects: first, teaching key ML concepts to graduate students from a variety of existing degree programs; second, qualifying working professionals from SME for ML; and third, applying ML to real-world problems faced by those SME. The course was carried out in two trial periods within a government-funded project at a university of applied sciences in south-west Germany. The region is dominated by SME many of which are world leaders in their industries. Participants were students from different graduate programs as well as working professionals from several SME based in the region. The first phase of the course (one semester) consists of the fundamental concepts of ML, such as exploratory data analysis, regression, classification, clustering, and deep learning. In this phase, student participants and working professionals were taught in separate tracks. Students attended regular classes and lab sessions (but were also given access to e-learning materials), whereas the professionals learned exclusively in a flipped classroom scenario: they were given access to e-learning units (video lectures and accompanying quizzes) for preparation, while face-to-face sessions were dominated by lab experiments applying the concepts. Prior to the start of the second phase, participating companies were invited to submit real-world problems that they wanted to solve with the help of ML. The second phase consisted of practical ML projects, each tackling one of the problems and worked on by a mixed team of both students and professionals for the period of one semester. The teams were self-organized in the ways they preferred to work (e.g. remote vs. face-to-face collaboration), but also coached by one of the teaching staff. In several plenary meetings, the teams reported on their status as well as challenges and solutions. In both periods, the course was monitored and extensive surveys were carried out. We report on the findings as well as the lessons learned. For instance, while the program was very well-received, professional participants wished for more detailed coverage of theoretical concepts. A challenge faced by several teams during the second phase was a dropout of student members due to upcoming exams in other subjects.
Tactile Navigation with Checkpoints as Progress Indicators?: Only when Walking Longer Straight Paths
(2020)
Persons with both vision and hearing impairments have to rely primarily on tactile feedback, which is frequently used in assistive devices. We explore the use of checkpoints as a way to give them feedback during navigation tasks. Particularly, we investigate how checkpoints can impact performance and user experience. We hypothesized that individuals receiving checkpoint feedback would take less time and perceive the navigation experience as superior to those who did not receive such feedback. Our contribution is two-fold: a detailed report on the implementation of a smart wearable with tactile feedback (1), and a user study analyzing its effects (2). The results show that in contrast to our assumptions, individuals took considerably more time to complete routes with checkpoints. Also, they perceived navigating with checkpoints as inferior to navigating without checkpoints. While the quantitative data leave little room for doubt, the qualitative data open new aspects: when walking straight and not being "overwhelmed" by various forms of feedback in succession, several participants actually appreciated the checkpoint feedback.
Deafblindness, also known as dual sensory loss, is the combination of sight and hearing impairments of such extent that it becomes difficult for one sense to compensate for the other. Communication issues are a key concern for the Deafblind community. We present the design and technical implementation of the Tactile Board: a mobile Augmentative and Alternative Communication (AAC) device for individuals with deafblindness. The Tactile Board allows text and speech to be translated into vibrotactile signs that are displayed real-time to the user via a haptic wearable. Our aim is to facilitate communication for the deafblind community, creating opportunities for these individuals to initiate and engage in social interactions with other people without the direct need of an intervener.
Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the “air gap” between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist.
Automobile premium brands operate globally, which is undoubtedly required, because, for the most part, domestic markets are either decreasing or stagnating. China has become today the most important and biggest car market. Recently selling has become challenging because urban areas are well penetrated, and in poorly penetrated rural areas, incomes are low. This is particularly alarming for German brands, because of their premium orientation. Simultaneously, the after-sales market in China has been growing continuously. As a result, this market has a huge potential, which is likewise attractive because it has been scientifically proven across industries that after-sales services are high-margin profit drivers. Despite its great significance, the Chinese automobile after-sales market remains insufficiently researched, especially in terms of critical success factors and cultural influences, which therefore was the starting point for a study. The results will presented and interpreted now in this new working-paper.
Strings
(2020)
This article presents the currently ongoing development of an audiovisual performance work with the title Strings. This work provides an improvisation setting for a violinist, two laptop performers, and two generative systems. At the core of Strings lies an approach that establishes a strong correlation among all participants by means of a shared physical principle. The physical principle is that of a vibrating string. The article discusses how this principle is used in both natural and simulated forms as main interaction layer between all performers and as natural or generative principle for creating audio and video.
Gamifying rehabilitation is an efficient way to improve motivation and exercise frequency. However, between flow theory, self-determination theory or Bartle's player types there is much room for speculation regarding the mechanics required for successful gamification, which in turn leads to increased motivation. For our study, we selected a gamified solution for motion training (an exergame) where the playful design elements are extremely simple. The contribution is three-fold: we show best practices from the state of the art, present a study analyzing the effects of simple gamification mechanics on a quantitative and on a qualitative level and discuss strategies for playful design in therapeutic movement games.
The findings presented in this article were obtained through a preliminary exploratory study conducted at the Offenburg University as part of the Fighting Loneliness project promoted by the institution’s Affective & Cognitive Institute (ACI) from October 2019 to February 2020. The initiative’s main objective was to answer the research question “How should an app be designed to reduce loneliness and social isolation among university students?” with the collaboration of the institution’s students.
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
Social robots not only work with humans in collaborative workspaces – we meet them in shopping malls and even more personal settings like health and care. Does this imply they should become more human, able to interpret and adequately respond to human emotions? Do we want them to help elderly persons? Do we want them to support us when we are old ourselves? Do we want them to just clean and keep things orderly – or would we accept them helping us to go to the toilet, or even feed us if we suffer from Parkinson’s disease?
The answers to these questions differ from person to person. They depend on cultural background, personal experiences – but probably most of all on the robot in question. This book covers the phenomenon of social robots from the historic roots to today’s best practices and future perspectives. To achieve this, we used a hands-on, interdisciplinary approach, incorporating findings from computer scientists, engineers, designers, psychologists, doctors, nurses, historians and many more. The book also covers a vast spectrum of applications, from collaborative industrial work over education to sales. Especially for developments with a high societal impact like robots in health and care settings, the authors discuss not only technology, design and usage but also ethical aspects.
Thus this book creates both a compendium and a guideline, helping to navigate the design space for future developments in social robotics.
Should social robots become part of our society?
Embedded in an exciting crime story, the science comic by Oliver Korn and Jonas Grund conveys the current state and outlook of science on social robots.
The story takes place in the near future: In an international project, scientists are researching the requirements for social robots for the health sector. Shortly before the prototype of a nursing robot is used in a field study, it disappears without a trace. In her first major case, the young inspector Kira embarks on a journey into the world of science. In the process, she learns a lot about social robots, AI and the world of international scientific cooperation. Again and again, critical voices are heard: anti-robot activists protest against automation and a dwindling of humanity and empathy. Even in the Commissioner's family, the possible care of elderly people by robots is controversially discussed.
The overarching goal is to build knowledge across all age groups so that the advantages and disadvantages of these new technologies can be discussed controversially but knowledgeably. "Social Robots - a Science Comic" is a contribution to an informed discussion in the fields of robotics, artificial intelligence, ethics and politics and is thus also suitable as a teaching and learning tool.
The comic was conceived and designed for young people and adults. In particular, however, for those who have hardly come into contact with social robots and artificial intelligence so far. Another target group are people working in the health care sector, because the care and nursing of elderly people are considered to be one of the most important areas of application for social robots in the future.
DINA4 portrait format, hardcover thread stitching, published in German and English. Self-published by the Affective & Cognitive Institute (ACI), Offenburg University.
With major intellectual properties there is a long tradition of cross-media value chains -- usually starting with books and comics, then transgressing to film and TV and finally reaching interactive media like video games. In recent years the situation has changed: (1) smaller productions start to establish cross media value chains; (2) there is a trend from sequential towards parallel content production. In this work we describe how the production of a historic documentary takes a cross media approach right from the start. We analyze how this impacts the content creation pipelines with respect to story, audience and realization. The focus of the case study is the impact on the production of a documentary game. In a second step we reflect on the experiences gained so far and derive recommendations for future small-scale cross media productions.
Ripple: Overview and Outlook
(2015)
Ripple is a payment system and a digital currency which evolved completely independently of Bitcoin. Although Ripple holds the second highest market cap after Bitcoin, there are surprisingly no studies which analyze the provisions of Ripple.
In this paper, we study the current deployment of the Ripple payment system. For that purpose, we overview the Ripple protocol and outline its security and privacy provisions in relation to the Bitcoin system. We also discuss the consensus protocol of Ripple. Contrary to the statement of the Ripple designers, we show that the current choice of parameters does not prevent the occurrence of forks in the system. To remedy this problem, we give a necessary and sufficient condition to prevent any fork in the system. Finally, we analyze the current usage patterns and trade dynamics in Ripple by extracting information from the Ripple global ledger. As far as we are aware, this is the first contribution which sheds light on the current deployment of the Ripple system.
This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloomfilter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to performsome privacy saving setrelations on a mobiletelco’s access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.
This paper explains the realization of a concept for research-oriented photonics education. Using the example of the integration of an actual PhD project, it is shown how students are familiarized with the topic of research and scientific work in the first semesters. Typical research activities are included as essential parts of the learning process. Research should be made visible and tangible for the students. The authors will present all aspects of the learning environment, their impressions and experiences with the implemented scenario, as well as first evaluation results of the students.
Our university carries out various research projects. Among others, the project Schluckspecht is an interdisciplinary work on different ultra-efficient car concepts for international contests. Besides the engineering work, one part of the project deals with real-time data visualization. In order to increase the efficiency of the vehicle, an online monitoring of the runtime parameters is necessary. The driving parameters of the vehicle are transmitted to a processing station via a wireless network connection. We plan to use an augmented reality (AR) application to visualize different data on top of the view of the real car. By utilizing a mobile Android or iOS device a user can interactively view various real-time and statistical data. The car and its components are meant to be augmented by various additional information, whereby that information should appear at the correct position of the components. An engine e.g. could show the current rpm and consumption values. A battery on the other hand could show the current charge level. The goal of this paper is to evaluate different possible approaches, their suitability and to expand our application to other projects at our university.
Remote code attestation protocols are an essential building block to offer a reasonable system security for wireless embedded devices. In the work at hand we investigate in detail the trustability of a purely software-based remote code attestation based inference mechanism over the wireless when e.g. running the prominent protocol derivate SoftWare-based ATTestation for Embedded Devices (SWATT). Besides the disclosure of pitfalls of such a protocol class we also point out good parameter choices which allow at least a meaningful plausibility check with a balanced false positive and false negative ratio.
With this generation of devices, Virtual Reality (VR) has actually made it into the living rooms of end-users. These devices feature 6-DOF tracking, allowing them to move naturally in virtual worlds and experience them even more immersively. However, for a natural locomotion in the virtual, one needs a corresponding free space in the real environment. The available space is often limited, especially in everyday environments and under normal spatial conditions. Furnishings and objects of daily life can quickly become obstacles for VR users if they are not cleared away. Since the idea behind VR is to place users into a virtual world and to hide the real world as much as possible, invisible objects represent potential obstacles. The currently available systems offer only rudimentary assistance for this problem. If a user threatens to leave the space previously defined for use, a visual boundary is displayed to allow orientation within the space. These visual metaphors are intended to prevent users from leaving the safe area. However, there is no detection of potentially dangerous objects within this part of space. Objects that have not been cleared away or that have been added in the meantime may still become obstacles. This thesis shows how possible obstacles in the environment can be detected automatically with range imaging cameras and how users can be effectively warned about them in the virtual environment without significantly disturbing their sense of presence. Four different interactive visual metaphors are used to signalize the obstacles within the VE. With the help of a user study, the four signaling variants and the obstacle detection were evaluated and tested.
The paper focuses on a numerical model which describes the radial temperature evolution in an optical fiber during the heating and cooling process according to the SP1 approximation. Based on this model, experimental methods for temperature measurement with optical fibers and for splice process optimization can be developed.
Communication protocols enable information exchange between different information systems. If protocol descriptions for these systems are not available, they can be reverse-engineered for interoperability or security reasons. This master thesis describes the analysis of such a proprietary binary protocol, named the DVRIP or Dahua private protocol from Dahua Technology. The analysis contains the identification of the DVRIP protocol header format, security mechanisms and vulnerabilities inside the protocol implementation. With the revealing insights of the protocol, an increase of the overall security is achieved. This thesis builds the foundation for further targeted security analyses.
OVVL (the Open Weakness and Vulnerability Modeller) is a tool and methodology to support threat modeling in the early stages of the secure software development lifecycle. We provide an overview of OVVL (https://ovvl.org), its data model and browser-based UI. We equally provide a discussion of initial experiments on how identified threats in the design phase can be aligned with later activities in the software lifecycle (issue management and security testing).
This work demonstrates the potentials of procedural content generation (PCG) for games, focusing on the generation of specific graphic props (reefs) in an explorer game. We briefly portray the state-of-the-art of PCG and compare various methods to create random patterns at runtime. Taking a step towards the game industry, we describe an actual game production and provide a detailed pseudocode implementation showing how Perlin or Simplex noise can be used efficiently. In a comparative study, we investigate two alternative implementations of a decisive game prop: once created traditionally by artists and once generated by procedural algorithms. 41 test subjects played both implementations. The analysis shows that PCG can create a user experience that is significantly more realistic and at the same time perceived as more aesthetically pleasing. In addition, the ever-changing nature of the procedurally generated environments is preferred with high significance, especially by players aged 45 and above.
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relations as inclusiveness and disjointness based ao Bloom filters. We propose to compose them in a slightly different way by applying a keyed hash function. Besides discussing the correctness of set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. Indeed, our solution proposes to bring another layer of privacy on the sizes. We are in particular interested how the overlapping bits of a Bloom filter impact the privacy level of our approach. We concretely apply our solution to a use case of cloud security audit on access control and present our results with real-world parameters.
The economic dispatch (ED) problem is a large-scale optimization problem in electricity power grids. Its goal is to find a power output combination of all generator nodes that meet the demand of the customers at minimum operating cost. In recent years, distributed protocols have been proposed to replace the traditional centralized ED calculation for modern smart grid infrastructures with the most realistic being the one proposed by Binetti et al. (2014). However, we show that this protocol leaks private information of the generator nodes. We then propose a privacy-preserving distributed protocol that solves the ED problem. We analyze the security of our protocol and give experimental results from a prototype implementation to show the feasibility of the solution.
In the work at hand, we state that privacy and malleability of data are two aspects highly desired but not easy to associate. On the one hand, we are trying to shape data to make them usable and editable in an intelligible way, namely without losing their initial information. On the other hand, we are looking for effective privacy on data such that no external or non-authorized party could learn about their content. In such a way, we get overlapping requirements by pursuing different goals; it is trivial to be malleable without being secure, and vice versa. We propose four “real-world” use cases identified as scenarios where these two contradictory features are required and taking place in distinct environments. These considered backgrounds consist of firstly, cloud security auditing, then privacy of mobile network users and industry 4.0 and finally, privacy of COVID-19 tracing app users. After presenting useful background material, we propose to employ multiple approaches to design solutions to solve the use cases. We combine homomorphic encryption with searchable encryption and private information retrieval protocol to build an effective construction for the could auditing use case. As a second step, we develop an algorithm to generate the appropriate parameters to use the somewhat homomorphic encryption scheme by considering correctness, performance and security of the respective application. Finally, we propose an alternative use of Bloom filter data structure by adding an HMAC function to allow an outsourced third party to perform set relations in a private manner. By analyzing the overlapping bits occurring on Bloom filters while testing the inclusiveness or disjointness of the sets, we show how these functions maintain privacy and allow operations directly computed on the data structure. Then, we show how these constructions could be applied to the four selected use cases. Our obtained solutions have been implemented and we provide promising results that validate their efficiency and thus relevancy.
The aim of the smart grid is to achieve more efficient, distributed and secure supply of energy over the traditional power grid by using a bidirectional information flow between the grid agents (e.g. generator node, customer). One of the key optimization problems in smart grid is to produce power among generator nodes with a minimum cost while meeting the customer demand, known as Economic Dispatch Problem (EDP). In recent years, many distributed approaches to solve EDP have been proposed. However, protecting the privacy-sensitive data of individual generator nodes has been largely overlooked in the existing solutions. In this work, we show an attack against an existing auction-based EDP protocol considering a non-colluding semi-honest adversary. We briefly introduce our approach to a practical privacy-preserving EDP solution as our work in progress.
In the year 2009 several data privacy scandals have hit the headlines where major corporations had a legitimate need for detecting fraud conducted by their own employees, but chose inappropriate measures for data screening. This contribution presents architectures and pseudonymization technology for privacy compliant fraud screening or fraud detection, in order to reduce the number of undiscovered fraud cases and to reduce the time to discovery.
Principles of Animation Film
(2010)
For e-commerce retailers it is crucial to present their products both informatively and attractively. Virtual reality (VR) systems represent a new marketing tool that supports customers in their decision-making process and offers an extraordinary product experience. Despite these advantages, the use of this technology for e-commerce retailers is also associated with risks, namely cybersickness. The aim of the study is to investigate the occurrence of cybersickness in the context of the customer’s perceived enjoyment and the perceived challenge of a VR product presentation. Based on a conceptual research framework, a laboratory study with 533 participants was conducted to determine the influence of these factors on the occurrence of cybersickness. The results demonstrate that the perceived challenge has a substantially stronger impact on the occurrence of cybersickness, which can only be partially reduced by perceived enjoyment. When realizing VR applications in general and VR product presentations in particular, e-commerce retailers should therefore first minimize possible challenges instead of focusing primarily on entertainment aspects of such applications.
Purpose
The purpose of this study is to investigate the effects of telepresence while using a smartphone-based virtual reality system (SBVR) to explore a hotel virtually and to determine the influence of this immersive experience on the booking intention of the potential customer.
Design/methodology/approach
Within the scope of this study, a conceptual research model was developed which covered utilitarian and hedonic aspects of the user experience of SBVRs and showed their relevance for the booking intention. A virtual reality application was programmed especially for the study, in which the test persons were able to virtually explore a hotel complex. A total of 569 people participated in the study. A questionnaire was used for the data collection. The structural equation modelling and hypothesis verification were carried out using the partial least squares method.
Findings
The immersive feeling of telepresence increases the perceived enjoyment and usefulness of the potential customer. In addition, the user's curiosity is aroused by the telepresence, which also significantly increases the perceived enjoyment as well as the perceived usefulness. The hedonic and utilitarian value of the virtual hotel experience increases the probability that the customer will book the travel accommodation.
Research limitations/implications
The virtual reality application developed for the study is based on static panoramic images and does not contain audio-visual elements (e.g. sound, video, animation). Audio-visual elements might increase the degree of immersion and could therefore be investigated in future research.
Practical implications
The results of the study show that the SBVR is a suitable marketing tool to present hotels in an informative and entertaining way, and can thereby increase sales and profits.
Originality/value
For the first time, this study investigates the potential of SBVRs for the virtual product presentation of hotels and provides empirical evidence that the availability of this innovative form of presentation leads to a higher booking intention.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.