Refine
Year of publication
- 2015 (234) (remove)
Document Type
- Conference Proceeding (72)
- Article (unreviewed) (52)
- Article (reviewed) (50)
- Part of a Book (29)
- Book (13)
- Patent (10)
- Other (7)
- Report (1)
Conference Type
- Konferenzartikel (61)
- Konferenz-Abstract (7)
- Sonstiges (3)
- Konferenz-Poster (1)
Language
- English (126)
- German (106)
- Other language (1)
- Spanish (1)
Has Fulltext
- no (234) (remove)
Is part of the Bibliography
- yes (234)
Keywords
- Kommunikation (7)
- Ausbildung (6)
- Applikation (5)
- Digitalisierung (5)
- Finite-Elemente-Methode (5)
- Abtragung (4)
- Bildung (4)
- Funktechnik (4)
- Herz (4)
- Physik (4)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (68)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (63)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (58)
- Fakultät Wirtschaft (W) (48)
- INES - Institut für nachhaltige Energiesysteme (20)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (14)
- ACI - Affective and Cognitive Institute (9)
- WLRI - Work-Life Robotics Institute (6)
- IUAS - Institute for Unmanned Aerial Systems (3)
- POIM - Peter Osypka Institute of Medical Engineering (3)
Open Access
- Closed Access (94)
- Open Access (52)
- Bronze (9)
- Closed (1)
- Diamond (1)
With major intellectual properties there is a long tradition of cross-media value chains -- usually starting with books and comics, then transgressing to film and TV and finally reaching interactive media like video games. In recent years the situation has changed: (1) smaller productions start to establish cross media value chains; (2) there is a trend from sequential towards parallel content production. In this work we describe how the production of a historic documentary takes a cross media approach right from the start. We analyze how this impacts the content creation pipelines with respect to story, audience and realization. The focus of the case study is the impact on the production of a documentary game. In a second step we reflect on the experiences gained so far and derive recommendations for future small-scale cross media productions.
Smartphones Welcome! Preparatory Course in Mathematics using the Mobile App MassMatics. Case Study
(2015)
Stromzustandsregelung
(2015)
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.
The Effect of Gamification on Emotions - The Potential of Facial Recognition in Work Environmentsns
(2015)
Gamification means using video game elements to improve user experience and user engagement in non-game services and applications. This article describes the effects when gamification is used in work contexts. Here we focus on industrial production. We describe how facial recognition can be employed to measure and quantify the effect of gamification on the users’ emotions.
The quantitative results show that gamification significantly reduces both task completion time and error rate. However, the results concerning the effect on emotions are surprising. Without gamification there are not only more unhappy expressions (as to expect) but surprisingly also more happy expressions. Both findings are statistically highly significant.
We think that in redundant production work there are generally more (negative) emotions involved. When there is no gamification happy and unhappy balance each other. In contrast gamification seems to shift the spectrum of moods towards “relaxed”. Especially for work environments such a calm attitude is a desirable effect on the users. Thus our findings support the use of gamification.
Creating growth through trade is an important part of the policy approach of many economies. For decades, many member countries of the Organisation for Economic Co-operation and Development (OECD) have cooperated in a fair competition for the benefit of their national exporters. The countries’ official export credit agencies (ECAs) have established and jointly improved rules and regulations for export credit and political risk insurance. However, new players such as China, Russia or other fast developing countries have now joined the list of top exporting nations. As these countries have established their own ECAs, there is a need to introduce rules and regulations on global standards for financial terms as well as truly international norms ensuring ‘ethical’ trading behaviour.
But how will government support for foreign trade look like in the future? Will global standards for export credit and political risk insurance become reality by 2020? And how will strict rules and regulations for officially supported export credits and FDI regarding ethics, human rights and the environment impact growth through trade in general, or exporters in particular? These are questions addressed by the thirty eight contributions to Global Policy’s third eBook entitled ‘The Future of Foreign Trade Support – Setting Global Standards for Export Credit and Political Risk Insurance’, guest edited by Andreas Klasen and Fiona Bannert.
Chronic insomnia is defined by difficulties in falling asleep, maintaining sleep, and early morning awakening, and is coupled with daytime consequences such as fatigue, attention deficits, and mood instability. These symptoms persist over a period of at least 3 months (Diagnostic and Statistical Manual 5 criteria). Chronic insomnia can be a symptom of many medical, neurological, and mental disorders. As a disorder, it incurs substantial health-care and occupational costs, and poses substantial risks for the development of cardiovascular and mental disorders, including cognitive deficits. Family and twin studies confirm that chronic insomnia can have a genetic component (heritability coefficients between 42% and 57%), whereas the investigation of autonomous and central nervous system parameters has identified hyperarousal as a final common pathway of the pathophysiology, implicating an imbalance of sleep–wake regulation consisting of either overactivity of the arousal systems, hypoactivity of the sleep-inducing systems, or both. Insomnia treatments include benzodiazepines, benzodiazepine-receptor agonists, and cognitive behavioural therapy. Treatments currently under investigation include transcranial magnetic or electrical brain stimulation, and novel methods to deliver psychological interventions.
The overview of public key infrastructure based security approaches for vehicular communications
(2015)
Modern transport infrastructure becomes a full member of globally connected network. Leading vehicle manufacturers have already triggered development process, output of which will open a new horizon of possibilities for consumers and developers by providing a new communication entity - a car, thus enabling Car2X communications. Nevertheless some of available systems already provide certain possibilities for vehicles to communicate, most of them are considered not sufficiently secured. During last 15 years a number of big research projects funded by European Union and USA governments were started and concluded after which a set of standards were published prescribing a common architecture for Car2X and vehicles onboard communications. This work concentrates on combining inner and outer vehicular communications together with a use of Public Key Infrastructure (PKI).