Refine
Has Fulltext
- yes (341)
Year of publication
Document Type
- Journal article (142)
- Doctoral Thesis (139)
- Working Paper (40)
- Conference Proceeding (9)
- Report (5)
- Bachelor Thesis (2)
- Master Thesis (2)
- Book (1)
- Study Thesis (term paper) (1)
Language
- English (341) (remove)
Keywords
- Leistungsbewertung (29)
- virtual reality (19)
- Datennetz (14)
- Quality of Experience (12)
- Netzwerk (10)
- Robotik (10)
- machine learning (9)
- Cloud Computing (7)
- Optimierung (7)
- Performance Evaluation (7)
- Autonomer Roboter (6)
- Kleinsatellit (6)
- Komplexitätstheorie (6)
- Maschinelles Lernen (6)
- Mobiler Roboter (6)
- Modellierung (6)
- SDN (6)
- Virtuelle Realität (6)
- artificial intelligence (6)
- deep learning (6)
- Graphenzeichnen (5)
- P4 (5)
- Rechnernetz (5)
- Routing (5)
- Software Defined Networking (5)
- Theoretische Informatik (5)
- Verteiltes System (5)
- graph drawing (5)
- Algorithmus (4)
- Approximationsalgorithmus (4)
- Crowdsourcing (4)
- Deep learning (4)
- Dienstgüte (4)
- Drahtloses Sensorsystem (4)
- Graph (4)
- IoT (4)
- Komplexität (4)
- Mensch-Maschine-Schnittstelle (4)
- Optimization (4)
- Overlay-Netz (4)
- QoE (4)
- Quadrocopter (4)
- Satellit (4)
- Simulation (4)
- Software Engineering (4)
- Telekommunikationsnetz (4)
- Virtualisierung (4)
- augmented reality (4)
- avatars (4)
- immersion (4)
- mapping (4)
- navigation (4)
- simulation (4)
- Algorithmische Geometrie (3)
- Autonomous UAV (3)
- Benchmarking (3)
- Computer Vision (3)
- CubeSat (3)
- Data Mining (3)
- Drahtloses lokales Netz (3)
- Echtzeitsystem (3)
- Energieeffizienz (3)
- Energy Efficiency (3)
- Information Extraction (3)
- Internet of Things (3)
- Latenz (3)
- LoRaWAN (3)
- Localization (3)
- Machine Learning (3)
- Mehrkriterielle Optimierung (3)
- Mensch-Maschine-Kommunikation (3)
- Mixed Reality (3)
- Netzwerkmanagement (3)
- Neuronales Netz (3)
- Peer-to-Peer-Netz (3)
- Punktwolke (3)
- Quadrotor (3)
- Ressourcenmanagement (3)
- Robotics (3)
- Software (3)
- Software-defined networking (3)
- UAV (3)
- Video Streaming (3)
- Videoübertragung (3)
- approximation algorithm (3)
- automation (3)
- complexity (3)
- crossing minimization (3)
- endoscopy (3)
- fully convolutional neural networks (3)
- gastroenterology (3)
- historical document analysis (3)
- human-computer interaction (3)
- information extraction (3)
- quality of experience (3)
- virtual environments (3)
- 3D model generation (2)
- 5G (2)
- Ausfallsicheres System (2)
- Ausfallsicherheit (2)
- Auto-Scaling (2)
- Benutzerschnittstelle (2)
- Berechnungskomplexität (2)
- Betriebssystem (2)
- Bildverarbeitung (2)
- CADe (2)
- Cloud Gaming (2)
- DNA storage (2)
- Deep Learning (2)
- Distributed computing (2)
- Dot-Depth Problem (2)
- Echtzeit (2)
- Effizienter Algorithmus (2)
- Entscheidbarkeit (2)
- Ethernet (2)
- Fernwartung (2)
- Forecasting (2)
- Framework <Informatik> (2)
- Future Internet (2)
- Hardware (2)
- Human-Robot-Interaction (2)
- IEEE 802.11 (2)
- Industrie 4.0 (2)
- Internet (2)
- Kommunikationsprotokoll (2)
- Komplexitätsklasse (2)
- Kreuzung (2)
- Künstliche Intelligenz (2)
- Lokalisation (2)
- MP-DCCP (2)
- Maschinelles Sehen (2)
- Mathematisches Modell (2)
- Mensch-Maschine-System (2)
- Mensch-Roboter-Interaktion (2)
- Metrics (2)
- Monitoring (2)
- NP-hardness (2)
- Ontologie <Wissensverarbeitung> (2)
- Optical Character Recognition (2)
- Optical Music Recognition (2)
- PROLOG <Programmiersprache> (2)
- Prognose (2)
- Raumfahrttechnik (2)
- Resilience (2)
- Resource Management (2)
- Self-Aware Computing (2)
- Sensor (2)
- Situation Awareness (2)
- Software Performance Engineering (2)
- Streaming <Kommunikationstechnik> (2)
- TSN (2)
- Teleoperation (2)
- Theoretical Computer Science (2)
- Travelling-salesman-Problem (2)
- Unmanned Aerial Vehicle (UAV) (2)
- User Interface (2)
- Venus (2)
- Verbotsmuster (2)
- Videospiel (2)
- Virtual Reality (2)
- Visualisierung (2)
- Wissensrepräsentation (2)
- XR (2)
- Zuverlässigkeit (2)
- agency (2)
- algorithms (2)
- autonomous (2)
- avatar embodiment (2)
- background knowledge (2)
- body weight modification (2)
- body weight perception (2)
- colonoscopy (2)
- communication networks (2)
- connected mobility applications (2)
- crowdsourcing (2)
- data warehouse (2)
- decidability (2)
- distance measurement (2)
- distributed control (2)
- dot-depth problem (2)
- education (2)
- educational tool (2)
- electronic health records (2)
- embodiment (2)
- emotions (2)
- endliche Automaten (2)
- endurance (2)
- exposure (2)
- finite automata (2)
- fog computing (2)
- forbidden patterns (2)
- formation control (2)
- games (2)
- graphs (2)
- immersive technologies (2)
- intrusion detection (2)
- jitter (2)
- knowledge acquisition (2)
- knowledge engineering (2)
- knowledge representation (2)
- knowledge-based systems (2)
- latency (2)
- locomotion (2)
- measurements (2)
- medieval manuscripts (2)
- mobile laser scanning (2)
- mobile networks (2)
- multipath (2)
- multipath scheduling (2)
- natural language processing (2)
- network calculus (2)
- neume notation (2)
- neural networks (2)
- object detection (2)
- ontology (2)
- optimization (2)
- performance (2)
- performance evaluation (2)
- performance modeling (2)
- performance monitoring (2)
- pose estimation (2)
- prediction (2)
- real-time (2)
- regular languages (2)
- reguläre Sprachen (2)
- rehabilitation (2)
- satellite communication (2)
- self-adaptive systems (2)
- self-aware computing (2)
- sensor fusion (2)
- stroke (2)
- unmanned aerial vehicles (2)
- user experience (2)
- user study (2)
- virtual body ownership (2)
- wearable (2)
- 1655-1705> (1)
- 3D Laser Scanning (1)
- 3D Pointcloud (1)
- 3D Punktwolke (1)
- 3D Reconstruction (1)
- 3D Sensor (1)
- 3D Vision (1)
- 3D mapping (1)
- 3D object recognition (1)
- 3D point cloud (1)
- 3D thermal mapping (1)
- 3D-Rekonstruktion (1)
- 3D-reconstruction methods (1)
- 3DTK toolkit (1)
- 3d point clouds (1)
- 4D-GIS (1)
- 4G Networks (1)
- 5G core network (1)
- 5G-ATSSS (1)
- 5GC (1)
- 6DOF Pose Estimation (1)
- 6G (1)
- ATSSSS (1)
- AVA (1)
- Abhängigskeitsgraph (1)
- Adaptive Video Streaming (1)
- Adaptives System (1)
- Adaptives Videostreaming (1)
- Add-on-Miss (1)
- Admission Control (1)
- Algorithmik (1)
- Alps (1)
- Alter Druck (1)
- Angewandte Mathematik (1)
- Anomalieerkennung (1)
- Anwendungsfall (1)
- Apple Watch 7 (1)
- Application-Aware Resource Management (1)
- Approximation (1)
- Arterie (1)
- Artery (1)
- Attitude Determination and Control (1)
- Attitude Dynamics (1)
- Attitude Heading Reference System (AHRS) (1)
- Automat <Automatentheorie> (1)
- Automata Theory (1)
- Automatentheorie (1)
- Automatic Text Reconition (1)
- Automation (1)
- Automatische Texterkennung (ATR) (1)
- Autonomic Computing (1)
- Autonomous Robot (1)
- Autonomous multi-vehicle systems (1)
- Autoreduzierbarkeit (1)
- Autorotation (1)
- Außerschulische Bildung (1)
- Avatar <Informatik> (1)
- Avionik (1)
- Backbone-Netz (1)
- Background Knowledge (1)
- Balloon (1)
- Base composition (1)
- Baseline Constrained LAMBDA (1)
- Bayes analysis (1)
- Bayes-Verfahren (1)
- Bayesian model comparison (1)
- Benutzerinteraktion (1)
- Berechenbarkeit (1)
- Bernoulli (1)
- Bernoulli Raum (1)
- Bernoulli Space (1)
- Beschriftung (1)
- Beschriftung von Straßen (1)
- Bestärkendes Lernen (1)
- Bestärkendes Lernen <Künstliche Intelligenz> (1)
- Bewegungskompensation (1)
- Bewegungskoordination (1)
- Beweissystem (1)
- Biased gene conversion (1)
- Bioinformatik (1)
- BitTorrent (1)
- Bodenstation (1)
- Boolean Grammar (1)
- Boolean equivalence (1)
- Boolean functions (1)
- Boolean hierarchy (1)
- Boolean isomorphism (1)
- Boolesche Funktionen (1)
- Boolesche Grammatik (1)
- Boolesche Hierarchie (1)
- Broadcast Growth Codes (BCGC) (1)
- CASE (1)
- CDN-Netzwerk (1)
- CEF (1)
- CLIP (1)
- Call Graph (1)
- Cellular Networks (1)
- Character Networks (1)
- Character Reference Detection (1)
- Chord (1)
- Clinical Data Warehouse (1)
- Clones (1)
- Cloud (1)
- Cloud computing (1)
- Cloud-native (1)
- Communication (1)
- Communication Networks (1)
- Compass framework (1)
- Compiler (1)
- Complexity Theory (1)
- Complicacy (1)
- Compression (1)
- Computational Geometry (1)
- Computational complexity (1)
- Computer Science education (1)
- Computerkartografie (1)
- Computersicherheit (1)
- Computersimulation (1)
- Computerspiel (1)
- Computerunterstütztes Lernen (1)
- Conjunction analysis (1)
- Containerization (1)
- Content Delivery Network (1)
- Content Distribution (1)
- Control room (1)
- Convoy Protection (1)
- Cooperative UAV (1)
- Coreference (1)
- Cost-benefit analysis (1)
- Couch tracking (1)
- Crowd sourcing (1)
- Crowdsensing (1)
- CubeSat GNSS (1)
- Cyber-physisches System (1)
- DASH (1)
- DHT (1)
- Daedalus-Projekt (1)
- Danish hernia database (1)
- Data Fusion (1)
- Data Science (1)
- Data Warehouse (1)
- Data-Warehouse-Konzept (1)
- Datenkommunikationsnetz (1)
- Datenübertragung (1)
- Debugging (1)
- DecaWave (1)
- Decentralized formation control (1)
- Decision Support (1)
- Declarative Performance Engineering (1)
- Deep Georeferencing (1)
- Deep Reinforcement Learning (1)
- Deflection routing (1)
- Delay Tolerant Network (1)
- Dependency Graph (1)
- Design (1)
- Design and Development (1)
- Design patterns (1)
- Desynchronisation (1)
- Desynchronization (1)
- Dezentrale Regelung (1)
- Dichotomy (1)
- Didaktik der Informatik (1)
- Differential GPS (DGPS) (1)
- Digital Humanities (1)
- Digitale Karte (1)
- Dijkstra’s algorithm (1)
- Directed Flight (1)
- Disjoint pair (1)
- Diskrete Simulation (1)
- Distributed Control (1)
- Distributed Space Systems (1)
- Distributed System (1)
- Document Analysis (1)
- Domain Knowledge (1)
- Domänenspezifische Sprache (1)
- Dot-Depth-Hierarchie (1)
- Drahtloses Sensornetz (1)
- Drahtloses vermaschtes Netz (1)
- Dreidimensionale Bildverarbeitung (1)
- Dreidimensionale Rekonstruktion (1)
- Drohne <Flugkörper> (1)
- Dynamic Memory Management (1)
- Dynamische Speicherverwaltung (1)
- E-Learning (1)
- EHS classification (1)
- EPM (1)
- EUROASPIRE survey (1)
- Earth Observation (1)
- Echtzeit-Netzwerke (1)
- Echzeit (1)
- Edge-MEC-Cloud (1)
- Edge-based Intelligence (1)
- Educational robotics (1)
- Educational robotics competitions (1)
- Eindringerkennung (1)
- Eingebettetes System (1)
- Elasticity (1)
- Elasticity tensor (1)
- Elastizitätstensor (1)
- Elektrizitätsverbrauch (1)
- Embedded Systems (1)
- End-to-End Automation (1)
- Ende-zu-Ende Automatisierung (1)
- Endpoint Mobility (1)
- Energy efficiency (1)
- Enterprise application (1)
- Enterprise-Resource-Planning (1)
- Enthaltenseinproblem (1)
- Environmental (1)
- Erderkundungssatellit (1)
- Erfüllbarkeitsproblem (1)
- Error-State Extendend Kalman Filter (1)
- Erweiterte Realität (1)
- Erweiterte Realität <Informatik> (1)
- Euclidean plane (1)
- Euklidische Ebene (1)
- Euler equations (1)
- Euler-Lagrange-Gleichung (1)
- Evaluation (1)
- Evolution (1)
- Expected MOS (1)
- Expected QoE (1)
- Expert System (1)
- Expertensystem (1)
- Expresses genes (1)
- FIFO caching strategies (1)
- FPGA (1)
- FRAMEWORK <Programm> (1)
- Fachdidaktik (1)
- Failure Prediction (1)
- Fairness (1)
- Feature Based Registration (1)
- Feature Engineering & Extraction (1)
- Fehlertoleranz (1)
- Fehlervorhersage (1)
- Fernsteuerung (1)
- Field programmable gate array (1)
- Fitbit Sense (1)
- Flugkörper (1)
- Flugnavigation (1)
- Flugregelung (1)
- Forces (1)
- Formal analysis (1)
- Formal verification (1)
- Formale Sprache (1)
- Formation (1)
- Formation Flight (1)
- Formationsbewegung (1)
- Forschungssatellit (1)
- Fraud detection (1)
- Funkressourcenverwaltung (1)
- Funktechnik (1)
- GC-Content (1)
- GNSS/INS integrated navigation (1)
- GPS (1)
- GPS Reciever (1)
- Game mechanic (1)
- Gamification (1)
- Garmin Fenix 6 Pro (1)
- Gastroenterologische Endoskopie (1)
- Geleitzug (1)
- Generalisierung <Kartografie> (1)
- Generation Problem (1)
- Generierungsproblem (1)
- Genetic Optimization (1)
- Genetische Optimierung (1)
- Geo-spatial behavior (1)
- Geoinformationssystem (1)
- Georeferenzierung (1)
- Geospatial (1)
- Geschäftsanwendung (1)
- Gimbaled tracking (1)
- Global Navigation Satellite System (GNSS) (1)
- Global Positioning System (GPS) (1)
- Good-or-Better (GoB) (1)
- Graphen (1)
- Gravitationsmodellunsicherheit (1)
- Gravity model uncertainty (1)
- Ground Station Networks (1)
- H-infinity (1)
- H.264 SVC (1)
- H.264/SVC (1)
- HMD (Head-Mounted Display) (1)
- HSPA (1)
- HTTP adaptive video streaming (1)
- Halbordnungen (1)
- Herzkatheter (1)
- Herzkathetereingriff (1)
- Higher rates (1)
- Hintergrundwissen (1)
- Historical Maps (1)
- Historical Printings (1)
- Historische Karte (1)
- Historische Landkarten (1)
- Human behavior (1)
- Human genome (1)
- Human-Computer Interaction (1)
- Humangenetik (1)
- Hyperbolische Differentialgleichung (1)
- Hypothesis comparison (1)
- ICD-coding of CKD (1)
- IEEE 802.11e (1)
- IEEE 802.15.4 (1)
- IEEE Std 802.15.4 (1)
- INS/LIDAR integrated navigation (1)
- IP (1)
- ISS <Raumfahrt> (1)
- IT security (1)
- Ignorance (1)
- Ignoranz (1)
- Image Aesthetic Assessment (1)
- Image Processing (1)
- Implementierung <Informatik> (1)
- In-Orbit demonstration (1)
- Industrial internet (1)
- Informatik (1)
- Information Retrieval (1)
- Instrument Control Toolbox (1)
- Integer Expression (1)
- Integer circuit (1)
- Intelligent Real-time Interactive System (1)
- Intelligent Realtime Interactive System (1)
- Intelligent Transportation Systems (1)
- Intelligent Virtual Agents (1)
- Intelligent Virtual Environment (1)
- Intelligent mobile system (1)
- InteractionSuitcase (1)
- Interaktion (1)
- Interaktive Karten (1)
- Interkulturelles Lernen (1)
- International Comparative Research (1)
- Internet Protokoll (1)
- Internet der Dinge (1)
- Intra-Spacecraft Communication (1)
- Isomorphie (1)
- Itinerare (1)
- Itineraries (1)
- JCAS (1)
- Jakob <Mathematiker (1)
- Java <Programmiersprache> (1)
- Java Message Service (1)
- K band ranging (KBR) (1)
- Kademlia (1)
- Kalman-Filter (1)
- Kanalzugriff (1)
- Karte (1)
- Kathará (1)
- Kerneldensity estimation (1)
- Kinetische Gleichung (1)
- Klassendiagramm (1)
- Klima (1)
- Klinisches Experiment (1)
- Knowledge Discovery (1)
- Knowledge Representation Layer (1)
- Knowledge encoding (1)
- Knowledge engineering (1)
- Knowledge-based Systems Engineering (1)
- Kombinatorik (1)
- Kommunikation (1)
- Kommunikationsnetze (1)
- Komplexitätsklasse NP (1)
- Konjunktionsanalyse (1)
- Konvexe Zeichnungen (1)
- Konvoi (1)
- Kooperierende mobile Roboter (1)
- Kosten-Nutzen-Analyse (1)
- Kreuzungsminimierung (1)
- Kurve (1)
- LFU (1)
- LRU (1)
- LUMEN (1)
- Lageregelung (1)
- Landkartenbeschriftung (1)
- Landnutzungskartierung (1)
- Laser scanning (1)
- Latency Bound (1)
- Lava (1)
- Lehrerbildung (1)
- Leistungsbedarf (1)
- Lernen (1)
- Lidar (1)
- Lightning (1)
- Link rate adaptation (1)
- Linked Data (1)
- Linkratenanpassung (1)
- Linux (1)
- LoRa (1)
- LoRaWan (1)
- Logging (1)
- Logic Programming (1)
- Logische Programmierung (1)
- Logistik (1)
- Loose Coupling (1)
- Low Earth Orbit (1)
- Lunar Caves (1)
- Lunar Exploration (1)
- MAC (1)
- MAC Protocol (1)
- MASim (1)
- MEMS IMU (1)
- MHD equations (1)
- MLC tracking (1)
- MSC: 49M37 (1)
- MSC: 65K05 (1)
- MSC: 90C30 (1)
- MSC: 90C40 (1)
- MTC (1)
- Magnetohydrodynamische Gleichung (1)
- Mammalian genomes (1)
- Mapping (1)
- Markov model (1)
- Markovian and Non-Markovian systems (1)
- Mars (1)
- Mathematische Modellierung (1)
- Matlab (1)
- Measurement-based Analysis (1)
- Media Access Control (1)
- Medical Image Analysis (1)
- Medienkompetenz (1)
- Medium <Physik> (1)
- Medizin (1)
- Mehragentensystem (1)
- Mehrfahrzeugsysteme (1)
- Mehrpfadübertragung (1)
- Mehrschichtnetze (1)
- Mehrschichtsystem (1)
- Mensch (1)
- Mesh Augmentation (1)
- Mesh Networks (1)
- Mesh Netze (1)
- Meta-modeling (1)
- Microservice (1)
- Middleware (1)
- Mikroservice (1)
- Mini Unmanned Aerial Vehicle (1)
- Miniaturisierung (1)
- Minimally invasive vascular intervention (1)
- Mitotizität (1)
- Mobile Sensor Network (1)
- Mobile Telekommunikation (1)
- Mobiles Internet (1)
- Mobilfunk (1)
- Mobility (1)
- Mobilität (1)
- Model based communication (1)
- Model based mission realization (1)
- Model comparison (1)
- Model extraction (1)
- Model transformation (1)
- Model-Agnostic (1)
- Model-based Performance Prediction (1)
- Modeling (1)
- Modell (1)
- Modellgetriebene Entwicklung (1)
- Modellierungstechniken (1)
- Modelling (1)
- Modul <Software> (1)
- Modularität (1)
- Moment <Stochastik> (1)
- Mond (1)
- Mondfahrzeug (1)
- Multi-Hop Topologie (1)
- Multi-Hop Topology (1)
- Multi-Layer (1)
- Multi-Network Service (1)
- Multi-Netzwerk Dienste (1)
- Multi-Paradigm Programming (1)
- Multi-Paradigm Programming Framework (1)
- Multi-Stakeholder (1)
- Multimodal Processing (1)
- Multimodal System (1)
- Multimodales System (1)
- Multipath Transmission (1)
- Mustererkennung (1)
- NP (1)
- NP-Vollständigkeit (1)
- NP-complete sets (1)
- NP-hard (1)
- NP-hartes Problem (1)
- NP-schweres Problem (1)
- NP-vollständiges Problem (1)
- Nano-Satellite (1)
- NanoFEEP (1)
- Nanosatellit (1)
- Navigation analysis (1)
- Network Emulator (1)
- Network Experiments (1)
- Network Function Virtualization (1)
- Network Functions Virtualisation (1)
- Network Management (1)
- Network Measurements (1)
- Network Virtualization (1)
- Network routing (1)
- Network-on-Chip (1)
- Netzplantechnik (1)
- Netzplanung (1)
- Netzvirtualisierung (1)
- Netzwerkanalyse <Soziologie> (1)
- Netzwerkplanung (1)
- Netzwerktopologie (1)
- Netzwerkverwaltung (1)
- Netzwerkvirtualisierung (1)
- Neume Notation (1)
- Neumennotation (1)
- Neumenschrift (1)
- Next Generation Networks (1)
- Nichtholonome Fahrzeuge (1)
- Nichtlineare Regelung (1)
- Nutzerstudie (1)
- Nutzerstudien (1)
- OMICS (1)
- Object Detection (1)
- Object-Oriented Programming (1)
- Objektorientierte Programmierung (1)
- Onboard (1)
- Onboard Software (1)
- Open Innovation (1)
- OpenFlow (1)
- Operator (1)
- Optical Flow (1)
- Optimal control (1)
- Optimale Kontrolle (1)
- Optimale Regelung (1)
- Optimalwertregelung (1)
- Optimiertung (1)
- Optimierungsproblem (1)
- Optische Musikerkennung (OMR) (1)
- Optische Zeichenerkennung (1)
- Optische Zeichenerkennung (OCR) (1)
- Orakel <Informatik> (1)
- Orbit determination (1)
- Orbitbestimung (1)
- Organ motion (1)
- Overlay (1)
- Overlay Netzwerke (1)
- Overlay networks (1)
- Overlays (1)
- P-optimal (1)
- P4-INT (1)
- PMD (1)
- Panorama Images (1)
- Partition <Mengenlehre> (1)
- Partitionen (1)
- Path Computation Element (1)
- Pattern Mining (1)
- Pattern Recognition (1)
- Peer-to-Peer (1)
- Performance (1)
- Performance Analysis (1)
- Performance Enhancing Proxies (1)
- Performance Management (1)
- Performance Modeling (1)
- Performance analysis (1)
- Pfadberechnungselement (1)
- Phasenmehrdeutigkeit (1)
- Picosatellite (1)
- Planare Graphen (1)
- Planung (1)
- Plasmaantrieb (1)
- Platooning (1)
- Platzierungsalgorithmen (1)
- Poisson surface reconstruction (1)
- Polyeder (1)
- Polygonzüge (1)
- Polypektomie (1)
- Positioning (1)
- Post's Classes (1)
- Postsche Klassen (1)
- Power Consumption (1)
- Prediction (1)
- Prediction Procedure (1)
- Problemlösefähigkeiten (1)
- Propositional proof system (1)
- Prospect Theory (1)
- Psychische Gesundheit (1)
- Publish-Subscribe-System (1)
- Punktbeschriftungen (1)
- Q-Learning (1)
- QUIC (1)
- QoE Monitoring (1)
- QoE estimation (1)
- QoE fundamentals (1)
- QoE-Abschätzung (1)
- QoS (1)
- QoS-QoE mapping functions (1)
- Qualitative representation and reasoning (1)
- Quality of Experience (QoE) (1)
- Quality of Experience QoE (1)
- Quality of Service (1)
- Quality of Service (QoS) (1)
- Quality-of-Experience (1)
- Quality-of-Service (1)
- Quality-of-Service (QoS) (1)
- Quantor (1)
- Queueing theory (1)
- Quotation Attribution (1)
- RAS Evaluation (1)
- RGB-D (1)
- RINEX Format (1)
- RLNC (1)
- RNA-SEQ (1)
- RRM (1)
- Randomness (1)
- Raumdaten (1)
- Raumfahrt (1)
- Raumfahrzeug (1)
- Raumverhalten (1)
- Real-Time Operating Systems (1)
- Real-Time-Networks (1)
- Real-time (1)
- Real-time Kinematics (RTK) (1)
- Rechenzentrum (1)
- Refactoring (1)
- Refaktorisierung (1)
- Regelbasiertes Modell (1)
- Regelung (1)
- Registration (1)
- Registrierung (1)
- Regression (1)
- Reguläre Sprache (1)
- Reinforcement Learning (1)
- Relation Detection (1)
- Rendezvous (1)
- Reproducibility (1)
- Research Station (1)
- Resource and Performance Management (1)
- Ressourcen Management (1)
- Ressourcenallokation (1)
- Rettungsroboter (1)
- Roboterwettbewerbe (1)
- Robotic tracking (1)
- Rodents (1)
- Rodos (1)
- Route Choice (1)
- Route Entscheidung (1)
- Räumliches Verhalten (1)
- SBA (1)
- SDN Controllers (1)
- SDN Switches (1)
- SDN/NVF (1)
- SLAM (1)
- ST-elevation myocardial infarction (1)
- SVC (1)
- SWOT (1)
- Satellite Ground Station (1)
- Satellite Network (1)
- Satellite formation (1)
- Satellitenfunk (1)
- Scheduling (1)
- Search-and-Rescue (1)
- Selbstkalibrierung (1)
- Selbstorganisation (1)
- Self-calibration (1)
- Semantic Entity Model (1)
- Semantic Search (1)
- Semantic Technologies (1)
- Semantic Web (1)
- Semantics (1)
- Semantik (1)
- Semantische Analyse (1)
- Sensing-aaS (1)
- Sensorfusion (1)
- Serious game (1)
- Server (1)
- Service Mobility (1)
- Service-level Quality Index (SQI) (1)
- Sichtbarkeit (1)
- Similarity Measure (1)
- Simulator (1)
- Situationsbewusstsein (1)
- Skalierbarkeit (1)
- Skype (1)
- Small Satellites (1)
- Smart User Interaction (1)
- Snow Line Elevation (1)
- Social Media (1)
- Social Web (1)
- Software Architecture (1)
- Software Performance Modeling (1)
- Software Quality (1)
- Software-based Networks (1)
- Software-defined Networking (1)
- Softwareentwicklung (1)
- Softwaremetrie (1)
- Softwaresystem (1)
- Softwaretest (1)
- Softwarewartung (1)
- Softwarewiederverwendung (1)
- Softwarisierte Netze (1)
- Source Code Generation (1)
- Source Code Visualization (1)
- Soziale Software (1)
- Soziales Netzwerk (1)
- Space Debris (1)
- SpaceWire (1)
- Spacecrafts (1)
- Spam Detection (1)
- Spatial behavior (1)
- Spherical Robot (1)
- Spielmechanik (1)
- Standardisierung (1)
- Standortproblem (1)
- Statische Analyse (1)
- Statistische Hypothese (1)
- Sternfreie Sprache (1)
- Steuerung (1)
- Stiffness (1)
- Stochastik (1)
- Strahlentherapie (1)
- Straubing-Th´erien-Hierarchie (1)
- Strecken (1)
- Structure-from-Motion (1)
- Strukturelle Komplexität (1)
- Studie (1)
- Subgroup Discovery (1)
- Subgroup Mining (1)
- Subgruppenentdeckung (1)
- System-on-Chip (1)
- TETCs (1)
- TTL (1)
- TTL validation of data consistency (1)
- Tagging (1)
- Technical Documentation (1)
- Technische Unterlage (1)
- Telematik (1)
- Telemedizin (1)
- Telemetrie (1)
- Terramechanics (1)
- Testbed (1)
- Textanalyse (1)
- Theoretical computer science (1)
- Thermografie (1)
- Thermospheric density uncertainty (1)
- Thermosphärische Dichteunsicherheit (1)
- Thrust Vector Control (1)
- Time-Sensitive Networking (1)
- Time-Sensitive-Networking (1)
- Torque (1)
- Traffic (1)
- Traffic Management (1)
- Trainingssystem (1)
- Trajectory tracking (1)
- Transportsystem (1)
- Triangulation (1)
- Tumor motion (1)
- Tumorbewegung (1)
- U-Bahnlinienplan (1)
- UAP (1)
- UFO (1)
- UI and Interaction Design (1)
- UML Klassendiagramm (1)
- UML class diagram (1)
- UMTS (1)
- URL (1)
- URLLC (1)
- UWB (1)
- UWE-4 (1)
- Ultra-Wideband (UWB) radio ranging (1)
- Ultraweitband (1)
- Umfrage (1)
- Umwelt (1)
- Uncertainty (1)
- Uncertainty realism (1)
- Underwater Mapping (1)
- Underwater Scanning (1)
- Unified Monitoring (1)
- Unmanned Aerial Vehicle (1)
- Unsicherheit (1)
- Unsicherheitsrealismus (1)
- Unstetige Regelung (1)
- Usability (1)
- Use case (1)
- User Behavior (1)
- User Participation (1)
- User interfaces (1)
- User studies (1)
- VHDL (1)
- VNF (1)
- VPN (1)
- Validation (1)
- Vehicle Routing Problem (1)
- Veranstaltung (1)
- Verbotenes Muster (1)
- Verbände (1)
- Verifikation (1)
- Verkehrsleitsystem (1)
- Verkehrslenkung (1)
- Verkehrsmanagement (1)
- Verkehrsregelung (1)
- Verteiltes Datenbanksystem (1)
- Verteilung von Inhalten (1)
- Video Game QoS (1)
- Video Quality Monitoring (1)
- Virtuelles Netz (1)
- Virtuelles Netzwerk (1)
- Visibility (1)
- Vision Based (1)
- Visual Tracking (1)
- Visualization (1)
- Visualized Kathará (1)
- Voice-over-IP (VoIP) (1)
- Vorhersage (1)
- Vorhersagetheorie (1)
- Vorhersageverfahren (1)
- WLAN (1)
- Wahrscheinlichkeitsverteilung (1)
- Warteschlangentheorie (1)
- Wartung (1)
- Web navigation (1)
- Web2.0 (1)
- WhatsApp (1)
- Wheel (1)
- Winkel (1)
- Wire relaxation (1)
- Wireless LAN (1)
- Wireless Mesh Networks (1)
- Wireless Network (1)
- Wireless Sensor/Actuator Systems (1)
- Wissensakquisition (1)
- Wissensbasiertes System (1)
- Wissensencodierung (1)
- Wissensendeckung (1)
- Wissensentwicklung (1)
- Wissensextraktion (1)
- Wissenstechnik (1)
- Withings ScanWatch (1)
- Worterweiterungen (1)
- XAI (1)
- XAI and explainable artificial intelligence (1)
- XR-artificial intelligence combination (1)
- XR-artificial intelligence continuum (1)
- YouTube (1)
- Zeichnen von Graphen (1)
- Zeitdiskretes System (1)
- Zeitreihe (1)
- Zeitreihenanalyse (1)
- Zeitreihenvorhersage (1)
- Zufall (1)
- Zugangskontrolle (1)
- Zugangsnetz (1)
- Zählprobleme (1)
- abdominal wall hernia (1)
- abdominal wall surgery (1)
- abgeschlossene Klassen (1)
- acrophobia (1)
- adaptation models (1)
- adaptive network coding (1)
- adaptive tutoring (1)
- administrative boundary (1)
- admission control (1)
- adult learning (1)
- aerodynamic drag reduction (1)
- aerodynamics (1)
- aerospace (1)
- aerospace engineering (1)
- affective appraisal (1)
- affective computing (1)
- agent-based models (1)
- agents (1)
- agile Prozesse (1)
- agile processes (1)
- ancillary services (1)
- angular schematization (1)
- annotation (1)
- anomaly detection (1)
- anomaly prediction (1)
- ant-colony optimization (1)
- antenna phase center calibration (1)
- anthropomorphism (1)
- antibiotic prophylaxis (1)
- anxiety (1)
- application design (1)
- approximation algorithms (1)
- arithmetic calculations (1)
- artifical inteligence (1)
- asymptotic preserving (1)
- attack-aware (1)
- attitude determination (1)
- auction based task assignment (1)
- authoring environment (1)
- authoring platform (1)
- automated map labeling (1)
- automatic Layout (1)
- automatische Beschriftungsplatzierung (1)
- automatisches Layout (1)
- autonomic orchestration (1)
- autonomous UAV (1)
- autorotation (1)
- availability (1)
- backpack mobile mapping (1)
- baseline detection (1)
- behaviometric (1)
- behavior perception (1)
- beyond planarity (1)
- binary tanglegram (1)
- bioelectronics (1)
- biomechanic (1)
- biomechanical engineering (1)
- biomimetics (1)
- biosignals (1)
- blood coagulation factor XIII (1)
- body awareness (1)
- body image distortion (1)
- body image disturbance (1)
- boundary labeling (1)
- building (1)
- calibration (1)
- camera orientation (1)
- car-like robots (1)
- carbon (1)
- cardiac magnetic resonance imaging (1)
- cardiac surgery (1)
- cardiac training group (1)
- cardiorespiratory fitness (1)
- cartographic requirements (1)
- certifying algorithm (1)
- chain cover (1)
- change detection (1)
- channel management (1)
- characterization (1)
- chronic kidney disease (1)
- circular layouts (1)
- circular-arc drawings (1)
- climate (1)
- clinical data warehouse (1)
- clinical measurement in health technology (1)
- clinical study (1)
- co-authorships (1)
- co-inventorships (1)
- coherence (1)
- collaboration (1)
- collaborative interaction (1)
- collision (1)
- collision avoidance (1)
- collision detection (1)
- communication models (1)
- communication network (1)
- competitive location (1)
- computational complexity (1)
- computer performance evaluation (1)
- computergestützte Softwaretechnik (1)
- concurrent design facility (1)
- congruence (1)
- consensus (1)
- constrained forest (1)
- contact representation (1)
- container virtualization (1)
- content-based image retrieval (1)
- continuous-time SLAM (1)
- controller failure recovery (1)
- convex bipartite graph (1)
- coronary heart disease (1)
- cost-sensitive learning (1)
- counting problems (1)
- crowdsensing (1)
- crowdsourced QoE measurements (1)
- crowdsourced measurements (1)
- crowdsourced network measurements (1)
- cultural and media studies (1)
- culturally aware (1)
- curves (1)
- cybersickness (1)
- cycling (1)
- d3web.Train (1)
- data fusion (1)
- data plane programming (1)
- data structure (1)
- dataplane programming (1)
- dataset (1)
- decision support (1)
- decision support system (1)
- decision-making (1)
- decoding error rate (1)
- deep metric learning (1)
- definite clause grammars (1)
- deformation-based method (1)
- delay QoS exponent (1)
- delay bound violation probability (1)
- delay constrained (1)
- denial of service (1)
- dependable software (1)
- descent (1)
- descriptors (1)
- design (1)
- design cycle (1)
- detection time simulation (1)
- dial a ride (1)
- digital twin (1)
- dimensions of proximity (1)
- discrete-time analysis (1)
- discrete-time models and analysis (1)
- disjoint multi-paths (1)
- distance compression (1)
- distraction (1)
- docker (1)
- document analysis (1)
- documents (1)
- drag area (1)
- dynamic adaptive streaming over http (1)
- dynamic flow migration (1)
- dynamic programming (1)
- dynamic protein-protein interactions (1)
- eHealth (1)
- eating and body weight disorders (1)
- edge labeled graphs (1)
- educational games (1)
- effective Bandwidth (1)
- efficient algorithm (1)
- electric propulsion (1)
- electric vehicles (1)
- electronic data capture (1)
- elevated plus-maze (1)
- elite sport (1)
- embedding techniques (1)
- emulation (1)
- encryption (1)
- energy efficiency (1)
- environmental modeling (1)
- epigastric hernia (1)
- ethics (1)
- evaluation (1)
- event detection (1)
- exercise intensity (1)
- exercise science (1)
- experience (1)
- experimental evaluation (1)
- expert systems (1)
- explainable AI (1)
- explanation complexity (1)
- extended Kalman filter (1)
- extended reality (XR) (1)
- failure prediction (1)
- fast reroute (1)
- fault detection (1)
- feature matching (1)
- federated learning (1)
- femoral hernia (1)
- few-shot learning (1)
- finite recurrent systems (1)
- fitness trackers (1)
- fixed-parameter tractability (1)
- food quality (1)
- force feedback (1)
- forecast (1)
- foreign language learning and teaching (1)
- formation driving (1)
- formation flight (1)
- fractionated spacecraft (1)
- fruit temperature (1)
- future Internet architecture (1)
- future energy grid exploration (1)
- gait disorder (1)
- gambling (1)
- game mechanics (1)
- gamification (1)
- genetic algorithm (1)
- glaucoma progression (1)
- global IPX network (1)
- granular (1)
- graph (1)
- graph algorithm (1)
- graph decomposition (1)
- group-based communication (1)
- hackathons (1)
- handwriting (1)
- haptic data (1)
- hardness (1)
- hardware-in-the-loop simulation (1)
- hardware-in-the-loop streaming system (1)
- harness free satellite (1)
- hazard avoidance (1)
- head-mounted display (1)
- healing and remodelling processes (1)
- health monitoring (1)
- health sciences (1)
- health tracker (1)
- healthcare (1)
- healthcare professionals (1)
- heart failure (1)
- heart failure training group (1)
- heat transfer (1)
- helicopters (1)
- hernia defect (1)
- hernia repair material (1)
- heterogeneous background (1)
- hierarchy (1)
- high-accuracy 3D measurements (1)
- higher education (1)
- historical images (1)
- historical printings (1)
- hit ratio analysis and simulation (1)
- hospital data (1)
- human behaviour (1)
- human body weight (1)
- human computer interaction (HCI) (1)
- human-artificial intelligence interaction (1)
- human-artificial intelligence interface (1)
- human-centered AI (1)
- human-centered design (1)
- human-centered, human-robot (1)
- human-robot interaction (1)
- human–computer interaction (1)
- hybrid access (1)
- hybrid avatar-agent systems (1)
- hyperbolic partial differential equations (1)
- illusion of self-motion (1)
- image classification (1)
- image processing (1)
- imbalanced regression (1)
- immersive classroom (1)
- immersive classroom management (1)
- immersive interfaces (1)
- immersive learning technologies (1)
- implicit association test (1)
- in-orbit experiments (1)
- incisional abdominal wall hernia (1)
- incisional hernia (1)
- independent crossing (1)
- individual differences (1)
- induced matching (1)
- informal education (1)
- information retrieval (1)
- information systems and information technology (1)
- infrared (1)
- infrared detectors (1)
- inguinal hernia (1)
- insect tracking (1)
- instrument (1)
- integer linear programming (1)
- intelligent transportation systems (1)
- intelligent vehicles (1)
- intelligent virtual agents (1)
- intelligent voice assistant (1)
- intelligente Applikationen (1)
- interactive authoring system (1)
- interactive maps (1)
- intercultural learning and teaching (1)
- interdisciplinary education (1)
- internet of things (1)
- internet protocol (1)
- internet traffic (1)
- intervention (1)
- invasive vascular interventions (1)
- iowa gambling task (1)
- isentropic Euler equations (1)
- k-d tree (1)
- key-insight extraction (1)
- kinect (1)
- kinetic equations (1)
- labeling (1)
- land-cover area (1)
- landing (1)
- language-image pre-training (1)
- laser ranging (1)
- laser scanner (1)
- laserscanner (1)
- latency cybersickness (1)
- laterality (1)
- lattices (1)
- layout recognition (1)
- learning environments (1)
- least cost (1)
- lidar (1)
- light-gated proteins (1)
- load balancing (1)
- local energy system (1)
- logic programming (1)
- logistics (1)
- long-term analysis (1)
- lunar rover (1)
- m exercise training (1)
- magnetometer (1)
- maintenance (1)
- man-portable mapping (1)
- map labeling (1)
- map projections (1)
- marine navigation (1)
- mathematical model (1)
- mechanical engineering (1)
- mechanics (1)
- media analysis (1)
- medical records (1)
- medication extraction (1)
- meditation (1)
- membership problem (1)
- mesh augmentation (1)
- mesh repair (1)
- metro map (1)
- micrometre level microwave ranging (1)
- mindfulness (1)
- minimal triangulations (1)
- minimale Triangulationen (1)
- misconceptions (1)
- mixed reality (1)
- mixed-cultural (1)
- mixed-cultural settings (1)
- mobile instant messaging (1)
- mobile messaging application (1)
- mobile robots (1)
- mobile streaming (1)
- model following (1)
- model output statistics (1)
- model predictive control (1)
- model-based diagnosis (1)
- modeling techniques (1)
- monotone drawing (1)
- morphing (1)
- motion compensation (1)
- motivation (1)
- mountains (1)
- movement ecology (1)
- multi-source multi-sink problem (1)
- multi-vehicle formations (1)
- multi-vehicle rendezvous (1)
- multidisciplinary (1)
- multimodal fusion (1)
- multimodal interface (1)
- multimodal learning (1)
- multipath communication (1)
- multipath packet scheduling (1)
- multiple myeloma (1)
- multiple sclerosis (1)
- multirotors (1)
- multiscale encoder (1)
- nano-satellite (1)
- nanocellulose (1)
- natural environment (1)
- natural interfaces (1)
- natural language processing · · · (1)
- natural user interfaces (1)
- negation detection (1)
- network (1)
- network design (1)
- network function virtualization (1)
- network planning (1)
- network simulation (1)
- network softwarization (1)
- network upgrade (1)
- network virtualization (1)
- networked predictive control (1)
- networked robotics (1)
- networking (1)
- networks (1)
- neural architecture (1)
- neural network (1)
- non-native accent (1)
- non-rigid registration (1)
- non-terrestrial networks (1)
- nonholonomic vehicles (1)
- normal distribution transform (1)
- nosocomial infection (1)
- nycthemeral intraocular pressure (1)
- object reconstruction (1)
- obstacle detection (1)
- octree (1)
- oncolytic virus (1)
- online survey (1)
- ontologies (1)
- optical character recognition (1)
- optical music recognition (1)
- optical underwater 3D sensor (1)
- optogenetics (1)
- orchestration (1)
- overprovisioning (1)
- packet reception method (1)
- parastomal hernia (1)
- partitions (1)
- passage of time (1)
- passive haptic feedback (1)
- path computation (1)
- patients’ awareness (1)
- perception (1)
- performance analysis (1)
- performance parameters (1)
- performance prediction (1)
- personal laser scanning (1)
- personalized medicine (1)
- personalized training (1)
- phase unwrapping (1)
- photoplethysmography (1)
- physicians’ awareness (1)
- physiological dataset (1)
- physiology (1)
- place-illusion (1)
- plain orchestrating service (1)
- plausibility (1)
- plausibility-illusion (1)
- point cloud (1)
- point cloud compression (1)
- point cloud registration (1)
- point labeling (1)
- point-feature label placement (1)
- point-to-plane measure (1)
- point-to-point measure (1)
- pollution (1)
- polylines (1)
- polyp (1)
- pos (1)
- pose tracking (1)
- posets (1)
- positioning (1)
- power consumption (1)
- precision horticulture (1)
- precision training (1)
- presence (1)
- primary ventral hernia (1)
- private chat groups (1)
- problem solving skills (1)
- procedural content generation (1)
- procedural fusion methods (1)
- progressive download (1)
- prompt engineering (1)
- protein analysis (1)
- protein chip (1)
- psychomotor training (1)
- psychophyisology (1)
- public speaking (1)
- qoe (1)
- quadcopter (1)
- quadcopters (1)
- quadrocopter (1)
- quadrotor (1)
- quality assurance (1)
- quality evaluation (1)
- quality of experience prediction (1)
- quality of life (1)
- queueing theory (1)
- radio resource management (1)
- radiology (1)
- ransomware (1)
- real world evidence (1)
- real-world application (1)
- realism (1)
- receding horizon control (1)
- recommender agent (1)
- recommender system (1)
- reconfiguration (1)
- recurrent abdominal wall hernia (1)
- refactoring (1)
- regenerative cooling (1)
- registries (1)
- reinforcement learning (1)
- rekurrente Systeme (1)
- reload cost (1)
- remote control (1)
- rendezvous and docking (1)
- requirements management (1)
- research methods (1)
- resilience (1)
- rich vehicle routing problem (1)
- right angle crossing (1)
- right-left comparison (1)
- risks (1)
- robot-supported training (1)
- robotic (1)
- robotic tutor (1)
- robotics (1)
- robust control (1)
- robustness (1)
- rocket engine (1)
- rotorcraft (1)
- rotors (1)
- routing (1)
- rulebased analysis (1)
- sample weighting (1)
- sandfish (1)
- satellite formation flying (1)
- satellite technology (1)
- satisfiability problems (1)
- scalability (1)
- scalability evaluation (1)
- scalable quadcopter (1)
- scheduling (1)
- science, technology and society (1)
- secondary data usage (1)
- secure group communication (1)
- segmentation (1)
- self-adaptive (1)
- self-assembly (1)
- self-aware (1)
- self-aware computing systems (1)
- self-managing systems (1)
- self-organization (1)
- self-supervised learning (1)
- semantic fusion (1)
- semantic technologies (1)
- semantic understanding (1)
- semantic web (1)
- semantical aesthetic (1)
- semantische Ästhetik (1)
- sensor (1)
- sensor devices (1)
- sentinel (1)
- serious games (1)
- service-curve estimation (1)
- sesnsors (1)
- short block-length (1)
- shortest path routing (1)
- signaling traffic (1)
- signalling pathways (1)
- simulation system (1)
- simulator sickness (1)
- simultaneous embedding (1)
- single-electron transistors (1)
- site mapping (1)
- sketching (1)
- slip (1)
- smart charging (1)
- smart grid (1)
- smart meter data utilization (1)
- smart speaker (1)
- smartwatch (1)
- smooth orthogonal drawing (1)
- snow shoveling (1)
- social VR (1)
- social artificial intelligence (1)
- social interaction (1)
- social relationship (1)
- social robot (1)
- social robotics (1)
- social role (1)
- socially interactive agents (1)
- software defined network (1)
- software engineering (1)
- software performance (1)
- software-definded networking (1)
- space missions phases (1)
- spacecrarft control (1)
- space–terrestrial networks (1)
- spanning tree (1)
- spatial presence (1)
- specular reflective (1)
- sports technology (1)
- standardization (1)
- state management (1)
- stationary preserving (1)
- statistical methods (1)
- statistical validity (1)
- statistics and numerical data (1)
- stereotypes (1)
- stochastic processes (1)
- straight-line segments (1)
- street labeling (1)
- structural battery (1)
- structural complexity (1)
- structured illumination (1)
- structured light illumination (1)
- student simulation (1)
- study design (1)
- stylus (1)
- sunburn (1)
- supervised learning (1)
- surface model (1)
- surrogate model (1)
- survey (1)
- sustainability (1)
- switching navigation (1)
- system simulation (1)
- systematic literature review (1)
- systematic review (1)
- table extraction (1)
- table understanding (1)
- taxonomy (1)
- teacher education (1)
- technology acceptance (1)
- technology-supported education (1)
- technology-supported learning (1)
- telematics (1)
- telemedicine (1)
- text line detection (1)
- text supervision (1)
- theory (1)
- therapeutic application (1)
- therapy (1)
- thermal camera (1)
- thermal point cloud (1)
- thrust direction (1)
- thrust vector control (1)
- time calibration (1)
- time perception (1)
- time series (1)
- timestamping method (1)
- tools (1)
- topology (1)
- traffic damping (1)
- training systems (1)
- trait anxiety (1)
- trajectory planning (1)
- transformer (1)
- translational neuroscience (1)
- transparent (1)
- transport microenvironments (1)
- transport protocols (1)
- transportation (1)
- tree (1)
- ultrasonic autonomous aerial vehicles (1)
- umbilical hernia (1)
- uncooperative space rendezvous (1)
- underwater 3D scanning (1)
- unmanned aerial vehicle (1)
- usability evaluation (1)
- use cases (1)
- user identification (1)
- user interaction (1)
- user-generated content (1)
- v (1)
- validation (1)
- vection (1)
- vehicle dynamics (1)
- vehicular navigation (1)
- ventral hernia (1)
- ventral hernia model (1)
- verbal behaviour (1)
- vernetzte Roboter (1)
- video QoE (1)
- video game QoE (1)
- video game context factors (1)
- video object detection (1)
- video streaming (1)
- virtual agent (1)
- virtual agent interaction (1)
- virtual embodiment (1)
- virtual human (1)
- virtual humans (1)
- virtual queue (1)
- virtual reality training (1)
- virtual social interaction (1)
- virtual stimuli (1)
- virtual tunnel (1)
- virtual-reality-continuum (1)
- virtualized environments (1)
- virtuel reality (1)
- visualization (1)
- vom Nutzer erfahrene Dienstgüte QoE (1)
- voting location (1)
- waypoint parameter (1)
- wearable technologies (1)
- well-balanced scheme (1)
- wheel (1)
- wireless communication (1)
- wireless sensor network (1)
- wireless-bus (1)
- word clouds (1)
- word extensions (1)
- zooming (1)
- zukünftige Kommunikationsnetze (1)
- zukünftiges Internet (1)
- Ähnlichkeitsmaß (1)
- Änderungserkennung (1)
- Überwachungstechnik (1)
Institute
- Institut für Informatik (341) (remove)
Schriftenreihe
Sonstige beteiligte Institutionen
- Cologne Game Lab (3)
- Deutsches Zentrum für Luft- und Raumfahrt (DLR), Institut für Raumfahrtsysteme (2)
- Open University of the Netherlands (2)
- Siemens AG (2)
- Zentrum für Telematik e.V. (2)
- Airbus Defence and Space GmbH (1)
- Birmingham City University (1)
- California Institute of Technology (1)
- DLR (1)
- Deutsches Zentrum für Luft- und Raumfahrt e.V. (1)
The Fifth Generation (5G) communication technology, its infrastructure and architecture, though already deployed in campus and small scale networks, is still undergoing continuous changes and research. Especially, in the light of future large scale deployments and industrial use cases, a detailed analysis of the performance and utilization with regard to latency and service times constraints is crucial. To this end, a fine granular investigation of the Network Function (NF) based core system and the duration for all the tasks performed by these services is necessary. This work presents the first steps towards analyzing the signaling traffic in 5G core networks, and introduces a tool to automatically extract sequence diagrams and service times for NF tasks from traffic traces.
This work proposes a novel approach to disperse dense transmission intervals and reduce bursty traffic patterns without the need for centralized control. Furthermore, by keeping the mechanism as close to the Long Range Wide Area Network (LoRaWAN) standard as possible the suggested mechanism can be deployed within existing networks and can even be co-deployed with other devices.
Introduction: This paper addresses the need for reliable user identification in Extended Reality (XR), focusing on the scarcity of public datasets in this area.
Methods: We present a new dataset collected from 71 users who played the game “Half-Life: Alyx” on an HTC Vive Pro for 45 min across two separate sessions. The dataset includes motion and eye-tracking data, along with physiological data from a subset of 31 users. Benchmark performance is established using two state-of-the-art deep learning architectures, Convolutional Neural Networks (CNN) and Gated Recurrent Units (GRU).
Results: The best model achieved a mean accuracy of 95% for user identification within 2 min when trained on the first session and tested on the second.
Discussion: The dataset is freely available and serves as a resource for future research in XR user identification, thereby addressing a significant gap in the field. Its release aims to facilitate advancements in user identification methods and promote reproducibility in XR research.
The presence of a partner can attenuate physiological fear responses, a phenomenon known as social buffering. However, not all individuals are equally sociable. Here we investigated whether social buffering of fear is shaped by sensitivity to social anxiety (social concern) and whether these effects are different in females and males. We collected skin conductance responses (SCRs) and affect ratings of female and male participants when they experienced aversive and neutral sounds alone (alone treatment) or in the presence of an unknown person of the same gender (social treatment). Individual differences in social concern were assessed based on a well-established questionnaire. Our results showed that social concern had a stronger effect on social buffering in females than in males. The lower females scored on social concern, the stronger the SCRs reduction in the social compared to the alone treatment. The effect of social concern on social buffering of fear in females disappeared if participants were paired with a virtual agent instead of a real person. Together, these results showed that social buffering of human fear is shaped by gender and social concern. In females, the presence of virtual agents can buffer fear, irrespective of individual differences in social concern. These findings specify factors that shape the social modulation of human fear, and thus might be relevant for the treatment of anxiety disorders.
Educational robotics is an innovative approach to teaching and learning a variety of different concepts and skills as well as motivating students in the field of Science, Technology, Engineering, and Mathematics (STEM) education. This especially applies to educational robotics competitions such as, for example, the FIRST LEGO League, the RoboCup Junior, or the World Robot Olympiad as out-of-school and goal-oriented approach to educational robotics. These competitions have gained greatly in popularity in recent years and thousands of students participate in these competitions worldwide each year. Moreover, the corresponding technology became more accessible for teachers and students to use it in their classrooms and has arguably a high potential to impact the nature of science education at all levels. One skill, which is said to be benefitting from educational robotics, is problem solving. This thesis understands problem solving skills as engineering design skills (in contrast to scientific inquiry). Problem solving skills count as important skills as demanded by industry leaders and policy makers in the context of 21st century skills, which are relevant for students to be well-prepared for their future working life in today’s world, shaped by an ongoing process of automation, globalization, and digitalization. The overall aim of this thesis is to try to answer the question if educational robotics competitions such as the World Robot Olympiad (WRO) have a positive impact on students’ learning in terms of their problem solving skills (as part of 21st century skills). In detail, this thesis focuses on a) if students can improve their problem solving skills through participation in educational robotics competitions, b) how this skill development is accomplished, and c) the teachers’ support of their students during their learning process in the competition. The corresponding empirical studies were conducted throughout the seasons of 2018 and 2019 of the WRO in Germany. The results show overall positive effects of the participation in the WRO on students’ learning of problem solving skills. They display an increase of students’ problem solving skills, which is not moderated by other variables such as the competition’s category or age group, the students’ gender or experience, or the success of the teams at the competition. Moreover, the results indicate that students develop their problem solving skills by using a systematic engineering design process and sophisticated problem solving strategies. Lastly, the teacher’s role in the educational robotics competitions as manager and guide (in terms of the constructionist learning theory) of the students’ learning process (especially regarding the affective level) is underlined by the results of this thesis. All in all, this thesis contributes to the research gap concerning the lack of systematic evaluation of educational robotics to promote students’ learning by providing more (methodologically) sophisticated research on this topic. Thereby, this thesis follows the call for more rigorous (quantitative) research by the educational robotics community, which is necessary to validate the impact of educational robotics.
Future broadband wireless networks should be able to support not only best effort traffic but also real-time traffic with strict Quality of Service (QoS) constraints. In addition, their available resources are scare and limit the number of users. To facilitate QoS guarantees and increase the maximum number of concurrent users, wireless networks require careful planning and optimization. In this monograph, we studied three aspects of performance optimization in wireless networks: resource optimization in WLAN infrastructure networks, quality of experience control in wireless mesh networks, and planning and optimization of wireless mesh networks. An adaptive resource management system is required to effectively utilize the limited resources on the air interface and to guarantee QoS for real-time applications. Thereby, both WLAN infrastructure and WLAN mesh networks have to be considered. An a-priori setting of the access parameters is not meaningful due to the contention-based medium access and the high dynamics of the system. Thus, a management system is required which dynamically adjusts the channel access parameters based on the network load. While this is sufficient for wireless infrastructure networks, interferences on neighboring paths and self-interferences have to be considered for wireless mesh networks. In addition, a careful channel allocation and route assignment is needed. Due to the large parameter space, standard optimization techniques fail for optimizing large wireless mesh networks. In this monograph, we reveal that biology-inspired optimization techniques, namely genetic algorithms, are well-suitable for the planning and optimization of wireless mesh networks. Although genetic algorithms generally do not always find the optimal solution, we show that with a good parameter set for the genetic algorithm, the overall throughput of the wireless mesh network can be significantly improved while still sharing the resources fairly among the users.
A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existing encryption schemes. To fill this gap, we envision a cryptography encyclopedia providing such an overview of existing encryption schemes. In this survey paper, we take a first step towards such an encyclopedia by creating a sub-encyclopedia for secure group communication (SGC) schemes, which belong to the n-to-n category. We extensively surveyed the state-of-the-art and classified 47 different schemes. More precisely, we provide (i) a comprehensive overview of the relevant security features, (ii) a set of relevant performance metrics, (iii) a classification for secure group communication schemes, and (iv) workflow descriptions of the 47 schemes. Moreover, we perform a detailed performance and security evaluation of the 47 secure group communication schemes. Based on this evaluation, we create a guideline for the selection of secure group communication schemes.
This paper describes the estimation of the body weight of a person in front of an RGB-D camera. A survey of different methods for body weight estimation based on depth sensors is given. First, an estimation of people standing in front of a camera is presented. Second, an approach based on a stream of depth images is used to obtain the body weight of a person walking towards a sensor. The algorithm first extracts features from a point cloud and forwards them to an artificial neural network (ANN) to obtain an estimation of body weight. Besides the algorithm for the estimation, this paper further presents an open-access dataset based on measurements from a trauma room in a hospital as well as data from visitors of a public event. In total, the dataset contains 439 measurements. The article illustrates the efficiency of the approach with experiments with persons lying down in a hospital, standing persons, and walking persons. Applicable scenarios for the presented algorithm are body weight-related dosing of emergency patients.
Maps are the main tool to represent geographical information. Users often zoom in and out to access maps at different scales. Continuous map generalization tries to make the changes between different scales smooth, which is essential to provide users with comfortable zooming experience.
In order to achieve continuous map generalization with high quality, we optimize some important aspects of maps. In this book, we have used optimization in the generalization of land-cover areas, administrative boundaries, buildings, and coastlines. According to our experiments, continuous map generalization indeed benefits from optimization.
Modern software is often realized as a modular combination of subsystems for, e. g.,
knowledge management, visualization, verification, or the interaction with users. As
a result, software libraries from possibly different programming languages have to
work together. Even more complex the case is if different programming paradigms
have to be combined. This type of diversification of programming languages and
paradigms in just one software application can only be mastered by mechanisms
for a seamless integration of the involved programming languages. However, the
integration of the common logic programming language Prolog and the popular
object-oriented programming language Java is complicated by various interoperability
problems which stem on the one hand from the paradigmatic gap between the
programming languages, and on the other hand, from the diversity of the available
Prolog systems.
The subject of the thesis is the investigation of novel mechanisms for the integration
of logic programming in Prolog and object–oriented programming in Java. We are
particularly interested in an object–oriented, uniform approach which is not specific
to just one Prolog system. Therefore, we have first identified several important
criteria for the seamless integration of Prolog and Java from the object–oriented
perspective. The main contribution of the thesis is a novel integration framework
called the Connector Architecture for Prolog and Java (CAPJa). The framework is
completely implemented in Java and imposes no modifications to the Java Virtual
Machine or Prolog. CAPJa provides a semi–automated mechanism for the integration
of Prolog predicates into Java. For compact, readable, and object–oriented
queries to Prolog, CAPJa exploits lambda expressions with conditional and relational
operators in Java. The communication between Java and Prolog is based
on a fully automated mapping of Java objects to Prolog terms, and vice versa. In
Java, an extensible system of gateways provides connectivity with various Prolog
system and, moreover, makes any connected Prolog system easily interchangeable,
without major adaption in Java.
In today's Internet, building overlay structures to provide a service is becoming more and more common. This approach allows for the utilization of client resources, thus being more scalable than a client-server model in this respect. However, in these architectures the quality of the provided service depends on the clients and is therefore more complex to manage. Resource utilization, both at the clients themselves and in the underlying network, determine the efficiency of the overlay application. Here, a trade-off exists between the resource providers and the end users that can be tuned via overlay mechanisms. Thus, resource management and traffic management is always quality-of-service management as well. In this monograph, the three currently significant and most widely used overlay types in the Internet are considered. These overlays are implemented in popular applications which only recently have gained importance. Thus, these overlay networks still face real-world technical challenges which are of high practical relevance. We identify the specific issues for each of the considered overlays, and show how their optimization affects the trade-offs between resource efficiency and service quality. Thus, we supply new insights and system knowledge that is not provided by previous work.
Shannon channel capacity estimation, based on large packet length is used in traditional Radio Resource Management (RRM) optimization. This is good for the normal transmission of data in a wired or wireless system. For industrial automation and control, rather short packages are used due to the short-latency requirements. Using Shannon’s formula leads in this case to inaccurate RRM solutions, thus another formula should be used to optimize radio resources in short block-length packet transmission, which is the basic of Ultra-Reliable Low-Latency Communications (URLLCs). The stringent requirement of delay Quality of Service (QoS) for URLLCs requires a link-level channel model rather than a physical level channel model. After finding the basic and accurate formula of the achievable rate of short block-length packet transmission, the RRM optimization problem can be accurately formulated and solved under the new constraints of URLLCs. In this short paper, the current mathematical models, which are used in formulating the effective transmission rate of URLLCs, will be briefly explained. Then, using this rate in RRM for URLLC will be discussed.
Having a mixed-cultural membership becomes increasingly common in our modern society. It is thus beneficial in several ways to create Intelligent Virtual Agents (IVAs) that reflect a mixed-cultural background as well, e.g., for educational settings. For research with such IVAs, it is essential that they are classified as non-native by members of a target culture. In this paper, we focus on variations of IVAs’ speech to create the impression of non-native speakers that are identified as such by speakers of two different mother tongues. In particular, we investigate grammatical mistakes and identify thresholds beyond which the agents is clearly categorised as a non-native speaker. Therefore, we conducted two experiments: one for native speakers of German, and one for native speakers of English. Results of the German study indicate that beyond 10% of word order mistakes and 25% of infinitive mistakes German-speaking IVAs are perceived as non-native speakers. Results of the English study indicate that beyond 50% of omission mistakes and 50% of infinitive mistakes English-speaking IVAs are perceived as non-native speakers. We believe these thresholds constitute helpful guidelines for computational approaches of non-native speaker generation, simplifying research with IVAs in mixed-cultural settings.
Despite the fact that mixed-cultural backgrounds become of increasing importance in our daily life, the representation of multiple cultural backgrounds in one entity is still rare in socially interactive agents (SIAs). This paper’s contribution is twofold. First, it provides a survey of research on mixed-cultured SIAs. Second, it presents a study investigating how mixed-cultural speech (in this case, non-native accent) influences how a virtual robot is perceived in terms of personality, warmth, competence and credibility. Participants with English or German respectively as their first language watched a video of a virtual robot speaking in either standard English or German-accented English. It was expected that the German-accented speech would be rated more positively by native German participants as well as elicit the German stereotypes credibility and conscientiousness for both German and English participants. Contrary to the expectations, German participants rated the virtual robot lower in terms of competence and credibility when it spoke with a German accent, whereas English participants perceived the virtual robot with a German accent as more credible compared to the version without an accent. Both the native English and native German listeners classified the virtual robot with a German accent as significantly more neurotic than the virtual robot speaking standard English. This work shows that by solely implementing a non-native accent in a virtual robot, stereotypes are partly transferred. It also shows that the implementation of a non-native accent leads to differences in the perception of the virtual robot.
Slot machines are one of the most played games by players suffering from gambling disorder. New technologies like immersive Virtual Reality (VR) offer more possibilities to exploit erroneous beliefs in the context of gambling. Recent research indicates a higher risk potential when playing a slot machine in VR than on desktop. To continue this investigation, we evaluate the effects of providing different degrees of embodiment, i.e., minimal and full embodiment. The avatars used for the full embodiment further differ in their appearance, i.e., they elicit a high or a low socio-economic status. The virtual environment (VE) design can cause a potential influence on the overall gambling behavior. Thus, we also embed the slot machine in two different VEs that differ in their emotional design: a colorful underwater playground environment and a virtual counterpart of our lab. These design considerations resulted in four different versions of the same VR slot machine: 1) full embodiment with high socio-economic status, 2) full embodiment with low socio-economic status, 3) minimal embodiment playground VE, and 4) minimal embodiment laboratory VE. Both full embodiment versions also used the playground VE. We determine the risk potential by logging gambling frequency as well as stake size, and measuring harm-inducing factors, i.e., dissociation, urge to gamble, dark flow, and illusion of control, using questionnaires. Following a between groups experimental design, 82 participants played for 20 game rounds one of the four versions. We recruited our sample from the students enrolled at the University of Würzburg. Our safety protocol ensured that only participants without any recent gambling activity took part in the experiment. In this comparative user study, we found no effect of the embodiment nor VE design on neither the gambling frequency, stake sizes, nor risk potential. However, our results provide further support for the hypothesis of the higher visual angle on gambling stimuli and hence the increased emotional response being the true cause for the higher risk potential.
Knowledge encoding in game mechanics: transfer-oriented knowledge learning in desktop-3D and VR
(2019)
Affine Transformations (ATs) are a complex and abstract learning content. Encoding the AT knowledge in Game Mechanics (GMs) achieves a repetitive knowledge application and audiovisual demonstration. Playing a serious game providing these GMs leads to motivating and effective knowledge learning. Using immersive Virtual Reality (VR) has the potential to even further increase the serious game’s learning outcome and learning quality. This paper compares the effectiveness and efficiency of desktop-3D and VR in respect to the achieved learning outcome. Also, the present study analyzes the effectiveness of an enhanced audiovisual knowledge encoding and the provision of a debriefing system. The results validate the effectiveness of the knowledge encoding in GMs to achieve knowledge learning. The study also indicates that VR is beneficial for the overall learning quality and that an enhanced audiovisual encoding has only a limited effect on the learning outcome.
Impaired decision-making leads to the inability to distinguish between advantageous and disadvantageous choices. The impairment of a person’s decision-making is a common goal of gambling games. Given the recent trend of gambling using immersive Virtual Reality it is crucial to investigate the effects of both immersion and the virtual environment (VE) on decision-making. In a novel user study, we measured decision-making using three virtual versions of the Iowa Gambling Task (IGT). The versions differed with regard to the degree of immersion and design of the virtual environment. While emotions affect decision-making, we further measured the positive and negative affect of participants. A higher visual angle on a stimulus leads to an increased emotional response. Thus, we kept the visual angle on the Iowa Gambling Task the same between our conditions. Our results revealed no significant impact of immersion or the VE on the IGT. We further found no significant difference between the conditions with regard to positive and negative affect. This suggests that neither the medium used nor the design of the VE causes an impairment of decision-making. However, in combination with a recent study, we provide first evidence that a higher visual angle on the IGT leads to an effect of impairment.
The successful development and classroom integration of Virtual (VR) and Augmented Reality (AR) learning environments requires competencies and content knowledge with respect to media didactics and the respective technologies. The paper discusses a pedagogical concept specifically aiming at the interdisciplinary education of pre-service teachers in collaboration with human-computer interaction students. The students’ overarching goal is the interdisciplinary realization and integration of VR/AR learning environments in teaching and learning concepts. To assist this approach, we developed a specific tutorial guiding the developmental process. We evaluate and validate the effectiveness of the overall pedagogical concept by analyzing the change in attitudes regarding 1) the use of VR/AR for educational purposes and in competencies and content knowledge regarding 2) media didactics and 3) technology. Our results indicate a significant improvement in the knowledge of media didactics and technology. We further report on four STEM learning environments that have been developed during the seminar.
Computer games are highly immersive, engaging, and motivating learning environments. By providing a tutorial at the start of a new game, players learn the basics of the game's underlying principles as well as practice how to successfully play the game. During the actual gameplay, players repetitively apply this knowledge, thus improving it due to repetition. Computer games also challenge players with a constant stream of new challenges which increase in difficulty over time. As a result, computer games even require players to transfer their knowledge to master these new challenges. A computer game consists of several game mechanics. Game mechanics are the rules of a computer game and encode the game's underlying principles. They create the virtual environments, generate a game's challenges and allow players to interact with the game. Game mechanics also can encode real world knowledge. This knowledge may be acquired by players via gameplay. However, the actual process of knowledge encoding and knowledge learning using game mechanics has not been thoroughly defined, yet. This thesis therefore proposes a theoretical model to define the knowledge learning using game mechanics: the Gamified Knowledge Encoding. The model is applied to design a serious game for affine transformations, i.e., GEtiT, and to predict the learning outcome of playing a computer game that encodes orbital mechanics in its game mechanics, i.e., Kerbal Space Program. To assess the effects of different visualization technologies on the overall learning outcome, GEtiT visualizes the gameplay in desktop-3D and immersive virtual reality. The model's applicability for effective game design as well as GEtiT's overall design are evaluated in a usability study. The learning outcome of playing GEtiT and Kerbal Space Program is assessed in four additional user studies. The studies' results validate the use of the Gamified Knowledge Encoding for the purpose of developing effective serious games and to predict the learning outcome of existing serious games. GEtiT and Kerbal Space Program yield a similar training effect but a higher motivation to tackle the assignments in comparison to a traditional learning method. In conclusion, this thesis expands the understanding of using game mechanics for an effective learning of knowledge. The presented results are of high importance for researches, educators, and developers as they also provide guidelines for the development of effective serious games.
The landscape of today’s programming languages is manifold. With the diversity of applications, the difficulty of adequately addressing and specifying the used programs increases. This often leads to newly designed and implemented domain-specific languages. They enable domain experts to express knowledge in their preferred format, resulting in more readable and concise programs. Due to its flexible and declarative syntax without reserved keywords, the logic programming language Prolog is particularly suitable for defining and embedding domain-specific languages.
This thesis addresses the questions and challenges that arise when integrating domain-specific languages into Prolog. We compare the two approaches to define them either externally or internally, and provide assisting tools for each. The grammar of a formal language is usually defined in the extended Backus–Naur form. In this work, we handle this formalism as a domain-specific language in Prolog, and define term expansions that allow to translate it into equivalent definite clause grammars. We present the package library(dcg4pt) for SWI-Prolog, which enriches them by an additional argument to automatically process the term’s corresponding parse tree. To simplify the work with definite clause grammars, we visualise their application by a web-based tracer.
The external integration of domain-specific languages requires the programmer to keep the grammar, parser, and interpreter in sync. In many cases, domain-specific languages can instead be directly embedded into Prolog by providing appropriate operator definitions. In addition, we propose syntactic extensions for Prolog to expand its expressiveness, for instance to state logic formulas with their connectives verbatim. This allows to use all tools that were originally written for Prolog, for instance code linters and editors with syntax highlighting. We present the package library(plammar), a standard-compliant parser for Prolog source code, written in Prolog. It is able to automatically infer from example sentences the required operator definitions with their classes and precedences as well as the required Prolog language extensions. As a result, we can automatically answer the question: Is it possible to model these example sentences as valid Prolog clauses, and how?
We discuss and apply the two approaches to internal and external integrations for several domain-specific languages, namely the extended Backus–Naur form, GraphQL, XPath, and a controlled natural language to represent expert rules in if-then form. The created toolchain with library(dcg4pt) and library(plammar) yields new application opportunities for static Prolog source code analysis, which we also present.
Making machines understand natural language is a dream of mankind that existed
since a very long time. Early attempts at programming machines to converse with
humans in a supposedly intelligent way with humans relied on phrase lists and simple
keyword matching. However, such approaches cannot provide semantically adequate
answers, as they do not consider the specific meaning of the conversation. Thus, if we
want to enable machines to actually understand language, we need to be able to access
semantically relevant background knowledge. For this, it is possible to query so-called
ontologies, which are large networks containing knowledge about real-world entities
and their semantic relations. However, creating such ontologies is a tedious task, as often
extensive expert knowledge is required. Thus, we need to find ways to automatically
construct and update ontologies that fit human intuition of semantics and semantic
relations. More specifically, we need to determine semantic entities and find relations
between them. While this is usually done on large corpora of unstructured text, previous
work has shown that we can at least facilitate the first issue of extracting entities by
considering special data such as tagging data or human navigational paths. Here, we do
not need to detect the actual semantic entities, as they are already provided because of
the way those data are collected. Thus we can mainly focus on the problem of assessing
the degree of semantic relatedness between tags or web pages. However, there exist
several issues which need to be overcome, if we want to approximate human intuition of
semantic relatedness. For this, it is necessary to represent words and concepts in a way
that allows easy and highly precise semantic characterization. This also largely depends
on the quality of data from which these representations are constructed.
In this thesis, we extract semantic information from both tagging data created by users
of social tagging systems and human navigation data in different semantic-driven social
web systems. Our main goal is to construct high quality and robust vector representations
of words which can the be used to measure the relatedness of semantic concepts.
First, we show that navigation in the social media systems Wikipedia and BibSonomy is
driven by a semantic component. After this, we discuss and extend methods to model
the semantic information in tagging data as low-dimensional vectors. Furthermore, we
show that tagging pragmatics influences different facets of tagging semantics. We then
investigate the usefulness of human navigational paths in several different settings on
Wikipedia and BibSonomy for measuring semantic relatedness. Finally, we propose
a metric-learning based algorithm in adapt pre-trained word embeddings to datasets
containing human judgment of semantic relatedness.
This work contributes to the field of studying semantic relatedness between words
by proposing methods to extract semantic relatedness from web navigation, learn highquality
and low-dimensional word representations from tagging data, and to learn
semantic relatedness from any kind of vector representation by exploiting human
feedback. Applications first and foremest lie in ontology learning for the Semantic Web,
but also semantic search or query expansion.
This dissertation focuses on the performance evaluation of all components of Software Defined Networking (SDN) networks and covers whole their architecture. First, the isolation between virtual networks sharing the same physical resources is investigated with SDN switches of several vendors. Then, influence factors on the isolation are identified and evaluated. Second, the impact of control mechanisms on the performance of the data plane is examined through the flow rule installation time of SDN switches with different controllers. It is shown that both hardware-specific and controller instance have a specific influence on the installation time. Finally, several traffic flow monitoring methods of an SDN controller are investigated and a new monitoring approach is developed and evaluated. It is confirmed that the proposed method allows monitoring of particular flows as well as consumes fewer resources than the standard approach. Based on findings in this thesis, on the one hand, controller developers can refer to the work related to the control plane, such as flow monitoring or flow rule installation, to improve the performance of their applications. On the other hand, network administrators can apply the presented methods to select a suitable combination of controller and switches in their SDN networks, based on their performance requirements
The emerging serverless computing may meet Edge Cloud in a beneficial manner as the two offer flexibility and dynamicity in optimizing finite hardware resources. However, the lack of proper study of a joint platform leaves a gap in literature about consumption and performance of such integration. To this end, this paper identifies the key questions and proposes a methodology to answer them.
Social interactions as introduced by Web 2.0 applications during the last decade have changed the way the Internet is used. Today, it is part of our daily lives to maintain contacts through social networks, to comment on the latest developments in microblogging services or to save and share information snippets such as photos or bookmarks online.
Social bookmarking systems are part of this development. Users can share links to interesting web pages by publishing bookmarks and providing descriptive keywords for them. The structure which evolves from the collection of annotated bookmarks is called a folksonomy. The sharing of interesting and relevant posts enables new ways of retrieving information from the Web. Users
can search or browse the folksonomy looking at resources related to specific tags or users. Ranking methods known from search engines have been adjusted to facilitate retrieval in social bookmarking systems. Hence, social bookmarking systems have become an alternative or addendum to search engines.
In order to better understand the commonalities and differences of social bookmarking systems and search engines, this thesis compares several aspects of the two systems' structure, usage behaviour and content. This includes the use of tags and query terms, the composition of the document collections and the rankings of bookmarks and search engine URLs. Searchers (recorded via session ids), their search terms and the clicked on URLs can be extracted from a search
engine query logfile. They form similar links as can be found in folksonomies where a user annotates a resource with tags. We use this analogy to build a tripartite hypergraph from query logfiles (a logsonomy), and compare structural and semantic properties of log- and folksonomies. Overall, we have found similar behavioural, structural and semantic characteristics in both systems. Driven by this insight, we investigate, if folksonomy data can be of use in web
information retrieval in a similar way to query log data: we construct training data from query logs and a folksonomy to build models for a learning-to-rank algorithm. First experiments show a positive correlation of ranking results generated from the ranking models of both systems. The research is based on various data collections from the social bookmarking systems BibSonomy and Delicious, Microsoft's search engine MSN (now Bing) and Google data.
To maintain social bookmarking systems as a good source for information retrieval, providers need to fight spam. This thesis introduces and analyses different features derived from the specific characteristics of social bookmarking systems to be used in spam detection classification algorithms. Best results can be derived from a combination of profile, activity, semantic and location-based features. Based on the experiments, a spam detection framework which identifies and eliminates spam activities for the social bookmarking system BibSonomy has been developed.
The storing and publication of user-related bookmarks and profile information raises questions about user data privacy. What kinds of personal information is collected and how do systems handle user-related items? In order to answer these questions, the thesis looks into the handling of data privacy in the social bookmarking system BibSonomy. Legal guidelines about how to deal with the private data collected and processed in social bookmarking systems are also presented. Experiments will show that the consideration of user data privacy in the process
of feature design can be a first step towards strengthening data privacy.
This paper discusses the problem of finding multiple shortest disjoint paths in modern communication networks, which is essential for ultra-reliable and time-sensitive applications. Dijkstra’s algorithm has been a popular solution for the shortest path problem, but repetitive use of it to find multiple paths is not scalable. The Multiple Disjoint Path Algorithm (MDPAlg), published in 2021, proposes the use of a single full graph to construct multiple disjoint paths. This paper proposes modifications to the algorithm to include a delay constraint, which is important in time-sensitive applications. Different delay constraint least-cost routing algorithms are compared in a comprehensive manner to evaluate the benefits of the adapted MDPAlg algorithm. Fault tolerance, and thereby reliability, is ensured by generating multiple link-disjoint paths from source to destination.
In recent history, normalized digital surface models (nDSMs) have been constantly gaining importance as a means to solve large-scale geographic problems. High-resolution surface models are precious, as they can provide detailed information for a specific area. However, measurements with a high resolution are time consuming and costly. Only a few approaches exist to create high-resolution nDSMs for extensive areas. This article explores approaches to extract high-resolution nDSMs from low-resolution Sentinel-2 data, allowing us to derive large-scale models. We thereby utilize the advantages of Sentinel 2 being open access, having global coverage, and providing steady updates through a high repetition rate. Several deep learning models are trained to overcome the gap in producing high-resolution surface maps from low-resolution input data. With U-Net as a base architecture, we extend the capabilities of our model by integrating tailored multiscale encoders with differently sized kernels in the convolution as well as conformed self-attention inside the skip connection gates. Using pixelwise regression, our U-Net base models can achieve a mean height error of approximately 2 m. Moreover, through our enhancements to the model architecture, we reduce the model error by more than 7%.
Biologically inspired self-organization methods can help to manage the access control to the shared communication medium of Wireless Sensor Networks. One lightweight approach is the primitive of desynchronization, which relies on the periodic transmission of short control messages – similar to the periodical pulses of oscillators. This primitive of desynchronization has already been successfully implemented as MAC protocol for single-hop topologies. Moreover, there are also some concepts of such a protocol formulti-hop topologies available. However, the existing implementations may handle just a certain class of multi-hop topologies or are not robust against topology dynamics. In addition to the sophisticated access control of the sensor nodes of a Wireless Sensor Network in arbitrary multi-hop topologies, the communication protocol has to be lightweight, applicable, and scalable. These characteristics are of particular interest for distributed and randomly deployed networks (e.g., by dropping nodes off an airplane).
In this work we present the development of a self-organizing MAC protocol for dynamic multi-hop topologies. This implies the evaluation of related work, the conception of our new communication protocol based on the primitive of desynchronization as well as its implementation for sensor nodes. As a matter of course, we also analyze our realization with
regard to our specific requirements. This analysis is based on several (simulative as well as real-world) scenarios. Since we are mainly interested in the convergence behavior of our
protocol, we do not focus on the "classical" network issues, like routing behavior or data rate, within this work. Nevertheless, for this purpose we make use of several real-world testbeds, but also of our self-developed simulation framework.
According to the results of our evaluation phase, our self-organizing MAC protocol for WSNs, which is based on the primitive of desynchronization, meets all our demands. In fact, our communication protocol operates in arbitrary multi-hop topologies and copes well with topology dynamics. In this regard, our protocol is the first and only MAC protocol to the best of our knowledge. Moreover, due to its periodic transmission scheme, it may be an appropriate starting base for additional network services, like time synchronization or routing.
Mobile telecommunication systems of the 3.5th generation (3.5G) constitute a first step towards the requirements of an all-IP world. As the denotation suggests, 3.5G systems are not completely new designed from scratch. Instead, they are evolved from existing 3G systems like UMTS or cdma2000. 3.5G systems are primarily designed and optimized for packet-switched best-effort traffic, but they are also intended to increase system capacity by exploiting available radio resources more efficiently. Systems based on cdma2000 are enhanced with 1xEV-DO (EV-DO: evolution, data-optimized). In the UMTS domain, the 3G partnership project (3GPP) specified the High Speed Packet Access (HSPA) family, consisting of High Speed Downlink Packet Access (HSDPA) and its counterpart High Speed Uplink Packet Access (HSUPA) or Enhanced Uplink. The focus of this monograph is on HSPA systems, although the operation principles of other 3.5G systems are similar. One of the main contributions of our work are performance models which allow a holistic view on the system. The models consider user traffic on flow-level, such that only on significant changes of the system state a recalculation of parameters like bandwidth is necessary. The impact of lower layers is captured by stochastic models. This approach combines accurate modeling and the ability to cope with computational complexity. Adopting this approach to HSDPA, we develop a new physical layer abstraction model that takes radio resources, scheduling discipline, radio propagation and mobile device capabilities into account. Together with models for the calculation of network-wide interference and transmit powers, a discrete-event simulation and an analytical model based on a queuing-theoretical approach are proposed. For the Enhanced Uplink, we develop analytical models considering independent and correlated other-cell interference.
Background
Although the repair of ventral abdominal wall hernias is one of the most commonly performed operations, many aspects of their treatment are still under debate or poorly studied. In addition, there is a lack of good definitions and classifications that make the evaluation of studies and meta-analyses in this field of surgery difficult.
Materials and methods
Under the auspices of the board of the European Hernia Society and following the previously published classifications on inguinal and on ventral hernias, a working group was formed to create an online platform for registration and outcome measurement of operations for ventral abdominal wall hernias. Development of such a registry involved reaching agreement about clear definitions and classifications on patient variables, surgical procedures and mesh materials used, as well as outcome parameters. The EuraHS working group (European registry for abdominal wall hernias) comprised of a multinational European expert panel with specific interest in abdominal wall hernias. Over five working group meetings, consensus was reached on definitions for the data to be recorded in the registry.
Results
A set of well-described definitions was made. The previously reported EHS classifications of hernias will be used. Risk factors for recurrences and co-morbidities of patients were listed. A new severity of comorbidity score was defined. Post-operative complications were classified according to existing classifications as described for other fields of surgery. A new 3-dimensional numerical quality-of-life score, EuraHS-QoL score, was defined. An online platform is created based on the definitions and classifications, which can be used by individual surgeons, surgical teams or for multicentre studies. A EuraHS website is constructed with easy access to all the definitions, classifications and results from the database.
Conclusion
An online platform for registration and outcome measurement of abdominal wall hernia repairs with clear definitions and classifications is offered to the surgical community. It is hoped that this registry could lead to better evidence-based guidelines for treatment of abdominal wall hernias based on hernia variables, patient variables, available hernia repair materials and techniques.
BACKGROUND:
Although the repair of ventral abdominal wall hernias is one of the most commonly performed operations, many aspects of their treatment are still under debate or poorly studied. In addition, there is a lack of good definitions and classifications that make the evaluation of studies and meta-analyses in this field of surgery difficult.
MATERIALS AND METHODS:
Under the auspices of the board of the European Hernia Society and following the previously published classifications on inguinal and on ventral hernias, a working group was formed to create an online platform for registration and outcome measurement of operations for ventral abdominal wall hernias. Development of such a registry involved reaching agreement about clear definitions and classifications on patient variables, surgical procedures and mesh materials used, as well as outcome parameters. The EuraHS working group (European registry for abdominal wall hernias) comprised of a multinational European expert panel with specific interest in abdominal wall hernias. Over five working group meetings, consensus was reached on definitions for the data to be recorded in the registry.
RESULTS:
A set of well-described definitions was made. The previously reported EHS classifications of hernias will be used. Risk factors for recurrences and co-morbidities of patients were listed. A new severity of comorbidity score was defined. Post-operative complications were classified according to existing classifications as described for other fields of surgery. A new 3-dimensional numerical quality-of-life score, EuraHS-QoL score, was defined. An online platform is created based on the definitions and classifications, which can be used by individual surgeons, surgical teams or for multicentre studies. A EuraHS website is constructed with easy access to all the definitions, classifications and results from the database.
CONCLUSION:
An online platform for registration and outcome measurement of abdominal wall hernia repairs with clear definitions and classifications is offered to the surgical community. It is hoped that this registry could lead to better evidence-based guidelines for treatment of abdominal wall hernias based on hernia variables, patient variables, available hernia repair materials and techniques.
The design and implementation of a satellite mission
is divided into several different phases. Parallel to these phases an evolution of requirements will take place. Because so many people in different locations and from different background have to work in different subsystems concurrently the ideas and concepts of different subsystems and different locations will diverge. We have to bring them together again. To do this we introduce synchronization points. We bring representatives from all subsystems and all location in a Concurrent Engineering Facility (CEF) room together. Between CEF sessions the different subsystems will diverge again, but each time the
diversion will be smaller. Our subjective experience from test projects says this CEF sessions are most effective in the first phases of the development, from Requirements engineering until first coarse design. After Design and the concepts are fix, the developers are going to implementation and the concept divergences will be much smaller, therefore the CEF sessions are not a very big help any more.
Mini Unmanned Aerial Vehicles (MUAVs) are becoming popular research platform and drawing considerable attention, particularly during the last decade due to their multi-dimensional applications in almost every walk of life. MUAVs range from simple toys found at electronic supermarkets for entertainment purpose to highly sophisticated commercial platforms performing novel assignments like offshore wind power station inspection and 3D modelling of buildings. This paper presents an overview of the main aspects in the domain of distributed control of cooperating MUAVs to facilitate the potential users in this fascinating field. Furthermore it gives an overview on state of the art in MUAV technologies e.g. Photonic Mixer Devices (PMD) camera, distributed control methods and on-going work and challenges, which is the motivation for many researchers all over the world to work in this field.
In the past two decades, there has been a trend to move from traditional television to Internet-based video services. With video streaming becoming one of the most popular applications in the Internet and the current state of the art in media consumption, quality expectations of consumers are increasing. Low quality videos are no longer considered acceptable in contrast to some years ago due to the increased sizes and resolution of devices. If the high expectations of the users are not met and a video is delivered in poor quality, they often abandon the service. Therefore, Internet Service Providers (ISPs) and video service providers are facing the challenge of providing seamless multimedia delivery in high quality. Currently, during peak hours, video streaming causes almost 58\% of the downstream traffic on the Internet. With higher mobile bandwidth, mobile video streaming has also become commonplace. According to the 2019 Cisco Visual Networking Index, in 2022 79% of mobile traffic will be video traffic and, according to Ericsson, by 2025 video is forecasted to make up 76% of total Internet traffic. Ericsson further predicts that in 2024 over 1.4 billion devices will be subscribed to 5G, which will offer a downlink data rate of 100 Mbit/s in dense urban environments.
One of the most important goals of ISPs and video service providers is for their users to have a high Quality of Experience (QoE). The QoE describes the degree of delight or annoyance a user experiences when using a service or application. In video streaming the QoE depends on how seamless a video is played and whether there are stalling events or quality degradations. These characteristics of a transmitted video are described as the application layer Quality of Service (QoS). In general, the QoS is defined as "the totality of characteristics of a telecommunications service that bear on its ability to satisfy stated and implied needs of the user of the service" by the ITU. The network layer QoS describes the performance of the network and is decisive for the application layer QoS.
In Internet video, typically a buffer is used to store downloaded video segments to compensate for network fluctuations. If the buffer runs empty, stalling occurs. If the available bandwidth decreases temporarily, the video can still be played out from the buffer without interruption. There are different policies and parameters that determine how large the buffer is, at what buffer level to start the video, and at what buffer level to resume playout after stalling. These have to be finely tuned to achieve the highest QoE for the user. If the bandwidth decreases for a longer time period, a limited buffer will deplete and stalling can not be avoided. An important research question is how to configure the buffer optimally for different users and situations. In this work, we tackle this question using analytic models and measurement studies. With HTTP Adaptive Streaming (HAS), the video players have the capability to adapt the video bit rate at the client side according to the available network capacity. This way the depletion of the video buffer and thus stalling can be avoided. In HAS, the quality in which the video is played and the number of quality switches also has an impact on the QoE. Thus, an important problem is the adaptation of video streaming so that these parameters are optimized. In a shared WiFi multiple video users share a single bottleneck link and compete for bandwidth. In such a scenario, it is important that resources are allocated to users in a way that all can have a similar QoE. In this work, we therefore investigate the possible fairness gain when moving from network fairness towards application-layer QoS fairness. In mobile scenarios, the energy and data consumption of the user device are limited resources and they must be managed besides the QoE. Therefore, it is also necessary, to investigate solutions, that conserve these resources in mobile devices. But how can resources be conserved without sacrificing application layer QoS? As an example for such a solution, this work presents a new probabilistic adaptation algorithm that uses abandonment statistics for ts decision making, aiming at minimizing the resource consumption while maintaining high QoS.
With current protocol developments such as 5G, bandwidths are increasing, latencies are decreasing and networks are becoming more stable, leading to higher QoS. This allows for new real time data intensive applications such as cloud gaming, virtual reality and augmented reality applications to become feasible on mobile devices which pose completely new research questions. The high energy consumption of such applications still remains an issue as the energy capacity of devices is currently not increasing as quickly as the available data rates. In this work we compare the optimal performance of different strategies for adaptive 360-degree video streaming.
Virtualization allows the creation of virtual instances of physical devices, such as network and processing units. In a virtualized system, governed by a hypervisor, resources are shared among virtual machines (VMs). Virtualization has been receiving increasing interest as away to reduce costs through server consolidation and to enhance the flexibility of physical infrastructures. Although virtualization provides many benefits, it introduces new security challenges; that is, the introduction of a hypervisor introduces threats since hypervisors expose new attack surfaces.
Intrusion detection is a common cyber security mechanism whose task is to detect malicious activities in host and/or network environments. This enables timely reaction in order to stop an on-going attack, or to mitigate the impact of a security breach. The wide adoption of virtualization has resulted in the increasingly common practice of deploying conventional intrusion detection systems (IDSs), for example, hardware IDS appliances or common software-based IDSs, in designated VMs as virtual network functions (VNFs). In addition, the research and industrial communities have developed IDSs specifically designed to operate in virtualized environments (i.e., hypervisorbased IDSs), with components both inside the hypervisor and in a designated VM. The latter are becoming increasingly common with the growing proliferation of virtualized data centers and the adoption of the cloud computing paradigm, for which virtualization is as a key enabling technology.
To minimize the risk of security breaches, methods and techniques for evaluating IDSs in an accurate manner are essential. For instance, one may compare different IDSs in terms of their attack detection accuracy in order to identify and deploy the IDS that operates optimally in a given environment, thereby reducing the risks of a security breach. However, methods and techniques for realistic and accurate evaluation of the attack detection accuracy of IDSs in virtualized environments (i.e., IDSs deployed as VNFs or hypervisor-based IDSs) are lacking. That is, workloads that exercise the sensors of an evaluated IDS and contain attacks targeting hypervisors are needed. Attacks targeting hypervisors are of high severity since they may result in, for example, altering the hypervisors’s memory and thus enabling the execution of malicious code with hypervisor privileges. In addition, there are no metrics and measurement methodologies
for accurately quantifying the attack detection accuracy of IDSs in virtualized environments with elastic resource provisioning (i.e., on-demand allocation or deallocation of virtualized hardware resources to VMs). Modern hypervisors allow for hotplugging virtual CPUs and memory on the designated VM where the intrusion detection engine of hypervisor-based IDSs, as well as of IDSs deployed as VNFs, typically operates. Resource hotplugging may have a significant impact on the attack detection accuracy of an evaluated IDS, which is not taken into account by existing metrics for quantifying IDS attack detection accuracy. This may lead to inaccurate measurements, which, in turn, may result in the deployment of misconfigured or ill-performing IDSs, increasing
the risk of security breaches.
This thesis presents contributions that span the standard components of any system
evaluation scenario: workloads, metrics, and measurement methodologies. The scientific contributions of this thesis are:
A comprehensive systematization of the common practices and the state-of-theart on IDS evaluation. This includes: (i) a definition of an IDS evaluation design space allowing to put existing practical and theoretical work into a common context in a systematic manner; (ii) an overview of common practices in IDS evaluation reviewing evaluation approaches and methods related to each part of the design space; (iii) and a set of case studies demonstrating how different IDS evaluation approaches are applied in practice. Given the significant amount of existing practical and theoretical work related to IDS evaluation, the presented systematization is beneficial for improving the general understanding of the topic by providing an overview of the current state of the field. In addition, it is beneficial for identifying and contrasting advantages and disadvantages of different IDS evaluation methods and practices, while also helping to identify specific requirements and best practices for evaluating current and future IDSs.
An in-depth analysis of common vulnerabilities of modern hypervisors as well as a set of attack models capturing the activities of attackers triggering these vulnerabilities. The analysis includes 35 representative vulnerabilities of hypercall handlers (i.e., hypercall vulnerabilities). Hypercalls are software traps from a kernel of a VM to the hypervisor. The hypercall interface of hypervisors, among device drivers and VM exit events, is one of the attack surfaces that hypervisors expose. Triggering a hypercall vulnerability may lead to a crash of the hypervisor or to altering the hypervisor’s memory. We analyze the origins
of the considered hypercall vulnerabilities, demonstrate and analyze possible attacks that trigger them (i.e., hypercall attacks), develop hypercall attack models(i.e., systematized activities of attackers targeting the hypercall interface), and discuss future research directions focusing on approaches for securing hypercall interfaces.
A novel approach for evaluating IDSs enabling the generation of workloads that contain attacks targeting hypervisors, that is, hypercall attacks. We propose an approach for evaluating IDSs using attack injection (i.e., controlled execution of attacks during regular operation of the environment where an IDS under test is deployed). The injection of attacks is performed based on attack models that capture realistic attack scenarios. We use the hypercall attack models developed as part of this thesis for injecting hypercall attacks.
A novel metric and measurement methodology for quantifying the attack detection accuracy of IDSs in virtualized environments that feature elastic resource provisioning. We demonstrate how the elasticity of resource allocations in such environments may impact the IDS attack detection accuracy and show that using existing metrics in such environments may lead to practically challenging and inaccurate measurements. We also demonstrate the practical use of the metric we propose through a set of case studies, where we evaluate common conventional IDSs deployed as VNFs.
In summary, this thesis presents the first systematization of the state-of-the-art on IDS evaluation, considering workloads, metrics and measurement methodologies as integral parts of every IDS evaluation approach. In addition, we are the first to examine the hypercall attack surface of hypervisors in detail and to propose an approach using attack injection for evaluating IDSs in virtualized environments. Finally, this thesis presents the first metric and measurement methodology for quantifying the attack detection accuracy of IDSs in virtualized environments that feature elastic resource provisioning.
From a technical perspective, as part of the proposed approach for evaluating IDSsthis thesis presents hInjector, a tool for injecting hypercall attacks. We designed hInjector to enable the rigorous, representative, and practically feasible evaluation of IDSs using attack injection. We demonstrate the application and practical usefulness of hInjector, as well as of the proposed approach, by evaluating a representative hypervisor-based IDS designed to detect hypercall attacks. While we focus on evaluating the capabilities of IDSs to detect hypercall attacks, the proposed IDS evaluation approach can be generalized and applied in a broader context. For example, it may be directly used to also evaluate security mechanisms of hypervisors, such as hypercall access control (AC) mechanisms. It may also be applied to evaluate the capabilities
of IDSs to detect attacks involving operations that are functionally similar to hypercalls,
for example, the input/output control (ioctl) calls that the Kernel-based Virtual Machine (KVM) hypervisor supports. For IDSs in virtualized environments featuring elastic resource provisioning, our approach for injecting hypercall attacks can be applied in combination with the attack detection accuracy metric and measurement methodology we propose. Our approach for injecting hypercall attacks, and our metric and measurement methodology, can also be applied independently beyond the scenarios considered in this thesis. The wide spectrum of security mechanisms in virtualized environments whose evaluation can directly benefit from the contributions of this thesis (e.g., hypervisor-based IDSs, IDSs deployed as VNFs, and AC mechanisms) reflects the practical implication of the thesis.
Performance Evaluation of Efficient Resource Management Concepts for Next Generation IP Networks
(2007)
Next generation networks (NGNs) must integrate the services of current circuit-switched telephone networks and packet-switched data networks. This convergence towards a unified communication infrastructure necessitates from the high capital expenditures (CAPEX) and operational expenditures (OPEX) due to the coexistence of separate networks for voice and data. In the end, NGNs must offer the same services as these legacy networks and, therefore, they must provide a low-cost packet-switched solution with real-time transport capabilities for telephony and multimedia applications. In addition, NGNs must be fault-tolerant to guarantee user satisfaction and to support business-critical processes also in case of network failures. A key technology for the operation of NGNs is the Internet Protocol (IP) which evolved to a common and well accepted standard for networking in the Internet during the last 25 years. There are two basically different approaches to achieve QoS in IP networks. With capacity overprovisioning (CO), an IP network is equipped with sufficient bandwidth such that network congestion becomes very unlikely and QoS is maintained most of the time. The second option to achieve QoS in IP networks is admission control (AC). AC represents a network-inherent intelligence that admits real-time traffic flows to a single link or an entire network only if enough resources are available such that the requirements on packet loss and delay can be met. Otherwise, the request of a new flow is blocked. This work focuses on resource management and control mechanisms for NGNs, in particular on AC and associated bandwidth allocation methods. The first contribution consists of a new link-oriented AC method called experience-based admission control (EBAC) which is a hybrid approach dealing with the problems inherent to conventional AC mechanisms like parameter-based or measurement-based AC (PBAC/MBAC). PBAC provides good QoS but suffers from poor resource utilization and, vice versa, MBAC uses resources efficiently but is susceptible to QoS violations. Hence, EBAC aims at increasing the resource efficiency while maintaining the QoS which increases the revenues of ISPs and postpones their CAPEX for infrastructure upgrades. To show the advantages of EBAC, we first review today’s AC approaches and then develop the concept of EBAC. EBAC is a simple mechanism that safely overbooks the capacity of a single link to increase its resource utilization. We evaluate the performance of EBAC by its simulation under various traffic conditions. The second contribution concerns dynamic resource allocation in transport networks which implement a specific network admission control (NAC) architecture. In general, the performance of different NAC systems may be evaluated by conventional methods such as call blocking analysis which has often been applied in the context of multi-service asynchronous transfer mode (ATM) networks. However, to yield more practical results than abstract blocking probabilities, we propose a new method to compare different AC approaches by their respective bandwidth requirements. To present our new method for comparing different AC systems, we first give an overview of network resource management (NRM) in general. Then we present the concept of adaptive bandwidth allocation (ABA) in capacity tunnels and illustrate the analytical performance evaluation framework to compare different AC systems by their capacity requirements. Different network characteristics influence the performance of ABA. Therefore, the impact of various traffic demand models and tunnel implementations, and the influence of resilience requirements is investigated. In conclusion, the resources in NGNs must be exclusively dedicated to admitted traffic to guarantee QoS. For that purpose, robust and efficient concepts for NRM are required to control the requested bandwidth with regard to the available transmission capacity. Sophisticated AC will be a key function for NRM in NGNs and, therefore, efficient resource management concepts like experience-based admission control and adaptive bandwidth allocation for admission-controlled capacity tunnels, as presented in this work are appealing for NGN solutions.
The recently published ITU-T Recommendation G1.032 proposes a list of factors that may influence cloud and online gaming Quality of Experience (QoE). This paper provides two practical evaluations of proposed system and context influence factors: First, it investigates through an online survey (n=488) the popularity of platforms, preferred ways of distribution, and motivational aspects including subjective valuations of characteristics offered by today's prevalent gaming platforms. Second, the paper evaluates a large dataset of objective metrics for various gaming platforms: game lists, playthrough lengths, prices, etc., and contrasts these metrics against the gamers' opinions. The combined data-driven approach presented in this paper complements in-person and lab studies usually employed.
In recent years, cloud gaming has become a popular research topic and has claimed many benefits in the commercial domain over conventional gaming. While, cloud gaming platforms have frequently failed in the past, they have received a new impetus over the last years that brought it to the edge of commercial breakthrough. The fragility of the cloud gaming market may be caused by the high investment costs, offered pricing models or competition from existing "à la carte" platforms. This paper aims at investigating the costs and benefits of both platform types through a twofold approach. We first take on the perspective of the customers, and investigate several cloud gaming platforms and their pricing models in comparison to the costs of other gaming platforms. Then, we explore engagement metrics in order to assess the enjoyment of playing the offered games. Lastly, coming from the perspective of the service providers, we aim to identify challenges in cost-effectively operating a large-scale cloud gaming service while maintaining high QoE values. Our analysis provides initial, yet still comprehensive reasons and models for the prospects of cloud gaming in a highly competitive market.
In recent years several community testbeds as well as participatory sensing platforms have successfully established themselves to provide open data to everyone interested. Each of them with a specific goal in mind, ranging from collecting radio coverage data up to environmental and radiation data. Such data can be used by the community in their decision making, whether to subscribe to a specific mobile phone service that provides good coverage in an area or in finding a sunny and warm region for the summer holidays.
However, the existing platforms are usually limiting themselves to directly measurable network QoS. If such a crowdsourced data set provides more in-depth derived measures, this would enable an even better decision making. A community-driven crowdsensing platform that derives spatial application-layer user experience from resource-friendly bandwidth estimates would be such a case, video streaming services come to mind as a prime example. In this paper we present a concept for such a system based on an initial prototype that eases the collection of data necessary to determine mobile-specific QoE at large scale. In addition we reason why the simple quality metric proposed here can hold its own.
With the introduction of Software-defined Networking (SDN) in the late 2000s, not only a new research field has been created, but a paradigm shift was initiated in the broad field of networking. The programmable network control by SDN is a big step, but also a stumbling block for many of the established network operators and vendors. As with any new technology the question about the maturity and the productionreadiness of it arises. Therefore, this thesis picks specific features of SDN and analyzes its performance, reliability, and availability in scenarios that can be expected in production deployments.
The first SDN topic is the performance impact of application traffic in the data plane on the control plane. Second, reliability and availability concerns of SDN deployments are exemplary analyzed by evaluating the detection performance of a common SDN controller. Thirdly, the performance of P4, a technology that enhances SDN, or better its impact of certain control operations on the processing performance is evaluated.
This work is subdivided into two main areas: resilient admission control and resilient routing. The work gives an overview of the state of the art of quality of service mechanisms in communication networks and proposes a categorization of admission control (AC) methods. These approaches are investigated regarding performance, more precisely, regarding the potential resource utilization by dimensioning the capacity for a network with a given topology, traffic matrix, and a required flow blocking probability. In case of a failure, the affected traffic is rerouted over backup paths which increases the traffic rate on the respective links. To guarantee the effectiveness of admission control also in failure scenarios, the increased traffic rate must be taken into account for capacity dimensioning and leads to resilient AC. Capacity dimensioning is not feasible for existing networks with already given link capacities. For the application of resilient NAC in this case, the size of distributed AC budgets must be adapted according to the traffic matrix in such a way that the maximum blocking probability for all flows is minimized and that the capacity of all links is not exceeded by the admissible traffic rate in any failure scenario. Several algorithms for the solution of that problem are presented and compared regarding their efficiency and fairness. A prototype for resilient AC was implemented in the laboratories of Siemens AG in Munich within the scope of the project KING. Resilience requires additional capacity on the backup paths for failure scenarios. The amount of this backup capacity depends on the routing and can be minimized by routing optimization. New protection switching mechanisms are presented that deviate the traffic quickly around outage locations. They are simple and can be implemented, e.g, by MPLS technology. The Self-Protecting Multi-Path (SPM) is a multi-path consisting of disjoint partial paths. The traffic is distributed over all faultless partial paths according to an optimized load balancing function both in the working case and in failure scenarios. Performance studies show that the network topology and the traffic matrix also influence the amount of required backup capacity significantly. The example of the COST-239 network illustrates that conventional shortest path routing may need 50% more capacity than the optimized SPM if all single link and node failures are protected.
The complexity of membership problems for finite recurrent systems and minimal triangulations
(2006)
The dissertation thesis studies the complexity of membership problems. Generally, membership problems consider the question whether a given object belongs to a set. Object and set are part of the input. The thesis studies the complexity of membership problems for two special kinds of sets. The first problem class asks whether a given natural number belongs to a set of natural numbers. The set of natural numbers is defined via finite recurrent systems: sets are built by iterative application of operations, like union, intersection, complementation and arithmetical operations, to already defined sets. This general problem implies further problems by restricting the set of used operations. The thesis contains completeness results for well-known complexity classes as well as undecidability results for these problems. The second problem class asks whether a given graph is a minimal triangulation of another graph. A graph is a triangulation of another graph, if it is a chordal spanning supergraph of the second graph. If no proper supergraph of the first graph is a triangulation of the second graph, the first graph is a minimal triangulation of the second graph. The complexity of the membership problem for minimal triangulations of several graph classes is investigated. Restricted variants are solved by linear-time algorithms. These algorithms rely on appropriate characterisations of minimal triangulations.
This paper presents a prototypical implementation of the In-band Network Telemetry (INT) specification in P4 and demonstrates a use case, where a Tofino Switch is used to measure device and network performance in a lab setting. This work is based on research activities in the area of P4 data plane programming conducted at the network lab of HTW Berlin.
In recent years, satellite communication has been expanding its field of application in the world of computer networks. This paper aims to provide an overview of how a typical scenario involving 5G Non-Terrestrial Networks (NTNs) for vehicle to everything (V2X) applications is characterized. In particular, a first implementation of a system that integrates them together will be described. Such a framework will later be used to evaluate the performance of applications such as Vehicle Monitoring (VM), Remote Driving (RD), Voice Over IP (VoIP), and others. Different configuration scenarios such as Low Earth Orbit and Geostationary Orbit will be considered.
The Internet sees an ongoing transformation process from a single best-effort service network into a multi-service network. In addition to traditional applications like e-mail,WWW-traffic, or file transfer, future generation networks (FGNs) will carry services with real-time constraints and stringent availability and reliability requirements like Voice over IP (VoIP), video conferencing, virtual private networks (VPNs) for finance, other real-time business applications, tele-medicine, or tele-robotics. Hence, quality of service (QoS) guarantees and resilience to failures are crucial characteristics of an FGN architecture. At the same time, network operations must be efficient. This necessitates sophisticated mechanisms for the provisioning and the control of future communication infrastructures. In this work we investigate such echanisms for resilient FGNs. There are many aspects of the provisioning and control of resilient FGNs such as traffic matrix estimation, traffic characterization, traffic forecasting, mechanisms for QoS enforcement also during failure cases, resilient routing, or calability concerns for future routing and addressing mechanisms. In this work we focus on three important aspects for which performance analysis can deliver substantial insights: load balancing for multipath Internet routing, fast resilience concepts, and advanced dimensioning techniques for resilient networks. Routing in modern communication networks is often based on multipath structures, e.g., equal-cost multipath routing (ECMP) in IP networks, to facilitate traffic engineering and resiliency. When multipath routing is applied, load balancing algorithms distribute the traffic over available paths towards the destination according to pre-configured distribution values. State-of-the-art load balancing algorithms operate either on the packet or the flow level. Packet level mechanisms achieve highly accurate traffic distributions, but are known to have negative effects on the performance of transport protocols and should not be applied. Flow level mechanisms avoid performance degradations, but at the expense of reduced accuracy. These inaccuracies may have unpredictable effects on link capacity requirements and complicate resource management. Thus, it is important to exactly understand the accuracy and dynamics of load balancing algorithms in order to be able to exercise better network control. Knowing about their weaknesses, it is also important to look for alternatives and to assess their applicability in different networking scenarios. This is the first aspect of this work. Component failures are inevitable during the operation of communication networks and lead to routing disruptions if no special precautions are taken. In case of a failure, the robust shortest-path routing of the Internet reconverges after some time to a state where all nodes are again reachable – provided physical connectivity still exists. But stringent availability and reliability criteria of new services make a fast reaction to failures obligatory for resilient FGNs. This led to the development of fast reroute (FRR) concepts for MPLS and IP routing. The operations of MPLS-FRR have already been standardized. Still, the standards leave some degrees of freedom for the resilient path layout and it is important to understand the tradeoffs between different options for the path layout to efficiently provision resilient FGNs. In contrast, the standardization for IP-FRR is an ongoing process. The applicability and possible combinations of different concepts still are open issues. IP-FRR also facilitates a comprehensive resilience framework for IP routing covering all steps of the failure recovery cycle. These points constitute another aspect of this work. Finally, communication networks are usually over-provisioned, i.e., they have much more capacity installed than actually required during normal operation. This is a precaution for various challenges such as network element failures. An alternative to this capacity overprovisioning (CO) approach is admission control (AC). AC blocks new flows in case of imminent overload due to unanticipated events to protect the QoS for already admitted flows. On the one hand, CO is generally viewed as a simple mechanism, AC as a more complex mechanism that complicates the network control plane and raises interoperability issues. On the other hand, AC appears more cost-efficient than CO. To obtain advanced provisioning methods for resilient FGNs, it is important to find suitable models for irregular events, such as failures and different sources of overload, and to incorporate them into capacity dimensioning methods. This allows for a fair comparison between CO and AC in various situations and yields a better understanding of the strengths and weaknesses of both concepts. Such an advanced capacity dimensioning method for resilient FGNs represents the third aspect of this work.
The ongoing digitization of historical photographs in archives allows investigating the quality, quantity, and distribution of these images. However, the exact interior and exterior camera orientations of these photographs are usually lost during the digitization process. The proposed method uses content-based image retrieval (CBIR) to filter exterior images of single buildings in combination with metadata information. The retrieved photographs are automatically processed in an adapted structure-from-motion (SfM) pipeline to determine the camera parameters. In an interactive georeferencing process, the calculated camera positions are transferred into a global coordinate system. As all image and camera data are efficiently stored in the proposed 4D database, they can be conveniently accessed afterward to georeference newly digitized images by using photogrammetric triangulation and spatial resection. The results show that the CBIR and the subsequent SfM are robust methods for various kinds of buildings and different quantity of data. The absolute accuracy of the camera positions after georeferencing lies in the range of a few meters likely introduced by the inaccurate LOD2 models used for transformation. The proposed photogrammetric method, the database structure, and the 4D visualization interface enable adding historical urban photographs and 3D models from other locations.
Effects of Acrophobic Fear and Trait Anxiety on Human Behavior in a Virtual Elevated Plus-Maze
(2021)
The Elevated Plus-Maze (EPM) is a well-established apparatus to measure anxiety in rodents, i.e., animals exhibiting an increased relative time spent in the closed vs. the open arms are considered anxious. To examine whether such anxiety-modulated behaviors are conserved in humans, we re-translated this paradigm to a human setting using virtual reality in a Cave Automatic Virtual Environment (CAVE) system. In two studies, we examined whether the EPM exploration behavior of humans is modulated by their trait anxiety and also assessed the individuals’ levels of acrophobia (fear of height), claustrophobia (fear of confined spaces), sensation seeking, and the reported anxiety when on the maze. First, we constructed an exact virtual copy of the animal EPM adjusted to human proportions. In analogy to animal EPM studies, participants (N = 30) freely explored the EPM for 5 min. In the second study (N = 61), we redesigned the EPM to make it more human-adapted and to differentiate influences of trait anxiety and acrophobia by introducing various floor textures and lower walls of closed arms to the height of standard handrails. In the first experiment, hierarchical regression analyses of exploration behavior revealed the expected association between open arm avoidance and Trait Anxiety, an even stronger association with acrophobic fear. In the second study, results revealed that acrophobia was associated with avoidance of open arms with mesh-floor texture, whereas for trait anxiety, claustrophobia, and sensation seeking, no effect was detected. Also, subjects’ fear rating was moderated by all psychometrics but trait anxiety. In sum, both studies consistently indicate that humans show no general open arm avoidance analogous to rodents and that human EPM behavior is modulated strongest by acrophobic fear, whereas trait anxiety plays a subordinate role. Thus, we conclude that the criteria for cross-species validity are met insufficiently in this case. Despite the exploratory nature, our studies provide in-depth insights into human exploration behavior on the virtual EPM.
Constraining graph layouts - that is, restricting the placement of vertices and the routing of edges to obey certain constraints - is common practice in graph drawing.
In this book, we discuss algorithmic results on two different restriction types:
placing vertices on the outer face and on the integer grid.
For the first type, we look into the outer k-planar and outer k-quasi-planar graphs, as well as giving a linear-time algorithm to recognize full and closed outer k-planar graphs Monadic Second-order Logic.
For the second type, we consider the problem of transferring a given planar drawing onto the integer grid while perserving the original drawings topology;
we also generalize a variant of Cauchy's rigidity theorem for orthogonal polyhedra of genus 0 to those of arbitrary genus.
Pilot study of a new freely available computer-aided polyp detection system in clinical practice
(2022)
Purpose
Computer-aided polyp detection (CADe) systems for colonoscopy are already presented to increase adenoma detection rate (ADR) in randomized clinical trials. Those commercially available closed systems often do not allow for data collection and algorithm optimization, for example regarding the usage of different endoscopy processors. Here, we present the first clinical experiences of a, for research purposes publicly available, CADe system.
Methods
We developed an end-to-end data acquisition and polyp detection system named EndoMind. Examiners of four centers utilizing four different endoscopy processors used EndoMind during their clinical routine. Detected polyps, ADR, time to first detection of a polyp (TFD), and system usability were evaluated (NCT05006092).
Results
During 41 colonoscopies, EndoMind detected 29 of 29 adenomas in 66 of 66 polyps resulting in an ADR of 41.5%. Median TFD was 130 ms (95%-CI, 80–200 ms) while maintaining a median false positive rate of 2.2% (95%-CI, 1.7–2.8%). The four participating centers rated the system using the System Usability Scale with a median of 96.3 (95%-CI, 70–100).
Conclusion
EndoMind’s ability to acquire data, detect polyps in real-time, and high usability score indicate substantial practical value for research and clinical practice. Still, clinical benefit, measured by ADR, has to be determined in a prospective randomized controlled trial.
This article presents an immersive virtual reality (VR) system for training classroom management skills, with a specific focus on learning to manage disruptive student behavior in face-to-face, one-to-many teaching scenarios. The core of the system is a real-time 3D virtual simulation of a classroom populated by twenty-four semi-autonomous virtual students. The system has been designed as a companion tool for classroom management seminars in a syllabus for primary and secondary school teachers. This will allow lecturers to link theory with practice using the medium of VR. The system is therefore designed for two users: a trainee teacher and an instructor supervising the training session. The teacher is immersed in a real-time 3D simulation of a classroom by means of a head-mounted display and headphone. The instructor operates a graphical desktop console, which renders a view of the class and the teacher whose avatar movements are captured by a marker less tracking system. This console includes a 2D graphics menu with convenient behavior and feedback control mechanisms to provide human-guided training sessions. The system is built using low-cost consumer hardware and software. Its architecture and technical design are described in detail. A first evaluation confirms its conformance to critical usability requirements (i.e., safety and comfort, believability, simplicity, acceptability, extensibility, affordability, and mobility). Our initial results are promising and constitute the necessary first step toward a possible investigation of the efficiency and effectiveness of such a system in terms of learning outcomes and experience.
Dessert organisms like sandfish lizards (SLs) bend and generate thrust in granular mediums to scape heat and hunt for prey [1]. Further, SLs seems to have striking capabilities to swim in undulatory form keeping the same wavelength even in terrains with different volumetric densities, hence behaving as rigid bodies. This paper tries to recommend new research directions for planetary robotics, adapting principles of sand swimmers for improving robustness of surface exploration robots. First, we summarize previous efforts on bio-inspired hardware developed for granular terrains and accessing complex geological features. Later, a rigid wheel design has been proposed to imitate SLs locomotion capabilities. In order to derive the force models to predict performance of such bio-inspired mobility system, different approaches as RFT (Resistive Force Theory) and analytical terramechanics are introduced. Even in typical wheeled robots the slip and sinkage increase with time, the new design intends to imitate traversability capabilities of SLs, that seem to keep the same slip while displacing at subsurface levels.