Refine
Year of publication
- 2011 (65) (remove)
Document Type
- Part of Periodical (27)
- Diploma Thesis (18)
- Bachelor Thesis (16)
- Conference Proceedings (2)
- Master's Thesis (1)
- Study Thesis (1)
Has Fulltext
- yes (65) (remove)
Keywords
- computer clusters (4)
- parallel algorithms (3)
- Google App Engine (2)
- Google Web Toolkit (2)
- Objektverfolgung (2)
- Personalausweis (2)
- Rechnernetze (2)
- WebGL (2)
- artifcial neural networks (2)
- artificial neural networks (2)
- 3D-Kartierung (1)
- 8C model (1)
- API (1)
- Adobe Flex (1)
- Agenten (1)
- Agents (1)
- Android <Systemplattform> (1)
- Annotation (1)
- Augmented Reality (1)
- Authentifizierung (1)
- Autonomes Fahrzeug (1)
- B2B Integration (1)
- Bebauungsdichte (1)
- Bewegung (1)
- Bewegungsablauf (1)
- Bewegungssteuerung (1)
- Browser (1)
- Business Collaboration (1)
- Casual Games (1)
- Cloud Computing (1)
- Computer Networks (1)
- Computeranimation (1)
- Computergraphik (1)
- Content Analysis (1)
- Data Mining (1)
- Datensicherheit (1)
- Delta (1)
- Distance Vector Routing (1)
- Distanz Vektor Routing (1)
- Drahtloses lokales Netz (1)
- Dreidimensionale Bildverarbeitung (1)
- Dynamische Analyse (1)
- E-Business (1)
- E-government (1)
- E-services (1)
- Enterprise 2.0 (1)
- Enterprise Systems (1)
- Facebook App (1)
- Facebook Application (1)
- Fahrzeug (1)
- Finanzberatung (1)
- FlexViz (1)
- Föderiertes System (1)
- GPS (1)
- GSM-Standard (1)
- Geocaching (1)
- Grails (1)
- Grails 1.2 (1)
- HTML 5.0 (1)
- Haskell (1)
- Healthcare institution (1)
- IP 6 (1)
- IPv6 (1)
- IT Outsourcing (1)
- IT Services (1)
- Incremental Algorithms (1)
- Infobroker (1)
- Information Supply Chain (1)
- Informationsmanagement (1)
- Informationssystem (1)
- Integriertes Informationssystem (1)
- Interaktion (1)
- Internet (1)
- Internetworking (1)
- JCryp-Tool (1)
- JavaScript (1)
- Kamera (1)
- Kamerakalibrierung (1)
- Kletterer (1)
- Kooperatives Informationssystem (1)
- Laser (1)
- Lernsoftware (1)
- Lokalisation (1)
- Manöver-Visualisierung (1)
- MapReduce (1)
- Markov Zufallsfelder (1)
- Matching (1)
- Medizinische Visualisierung (1)
- Migration (1)
- Mister X (1)
- Model View Presenter (1)
- Motivation (1)
- Network Virtualization (1)
- Netzwerk Routing (1)
- Netzwerk Virtualisierung (1)
- Neuronales Netz (1)
- OWL <Informatik> (1)
- Onlinewahl (1)
- Ontologie <Wissensverarbeitung> (1)
- Path Tracing (1)
- Petri-Netze (1)
- Pfadnachverfolgung (1)
- Plugin (1)
- Privatvermögen (1)
- Public-Key-Infrastruktur (1)
- Quality assessment system (1)
- RDF (1)
- RIPng (1)
- Ray tracing (1)
- Real-Life Game (1)
- Real-Life Spiel (1)
- Rechnernetz (1)
- Reengineering (1)
- Reisedokument (1)
- Rettungsroboter (1)
- Robbie (1)
- Routing (1)
- Routing Information Protocol (1)
- Routing Information Protokoll (1)
- Search engine (1)
- Security Routing (1)
- Service identification (1)
- Service-Identifizierung (1)
- Serviceorientierte Architektur (1)
- Serviceroboter (1)
- Sicherheit Routing (1)
- Simulation (1)
- Smartphone (1)
- Social Games (1)
- Software migration (1)
- Software-Migration (1)
- Softwareentwurf (1)
- Spielkonsole (1)
- Stereosehen (1)
- Strassenkreuzung (1)
- Supply Chain Management (1)
- Szenengraph (1)
- Tarrain Klassifikation (1)
- Tracing (1)
- Transferfunktion (1)
- Validierung (1)
- Verteilte Systeme (1)
- Virtualisierung (1)
- Virtuelles Netz (1)
- Visibility Skeleton (1)
- Visualisierung (1)
- Vocabulary Trainer (1)
- Volume Raycasting (1)
- Volumen-Rendering (1)
- WLAN Fingerprinting (1)
- Web3D (1)
- Webanwendung (1)
- Website (1)
- Wechselkursänderung (1)
- WiFi Fingerprinting (1)
- Wii (1)
- Wirtschaftsprojekt (1)
- Wissensvermittlung (1)
- Wrapping (1)
- activation functions of neurons (1)
- adaptive resonance theory (1)
- artiffficial neural networks (1)
- artififfcial neural networks (1)
- benefits (1)
- blood analysis (1)
- business process management (1)
- camera calibration (1)
- classification (1)
- collaborative technologies (1)
- contexts of use (1)
- core ontologies (1)
- currency exchange rates (1)
- e-ID (1)
- eID (1)
- ePA (1)
- eXperience methodology (1)
- estimation of algorithm efficiency (1)
- gradient method of training weight coefficients (1)
- id card (1)
- image processing (1)
- information system (1)
- interaction (1)
- jOWL (1)
- knowledge work (1)
- lineare Algebra (1)
- mathematical model (1)
- mobile application (1)
- mobile facets (1)
- mobile phone (1)
- movement (1)
- nPA (1)
- ontology (1)
- parallel calculations (1)
- scene analysis (1)
- social media (1)
- social object (1)
- social simulation (1)
- stereotracking (1)
- time series (1)
- tracking (1)
- travel document (1)
Institute
- Fachbereich 4 (65) (remove)
In diesem Arbeitsbericht werden zuvor nicht identifizierte Bedrohungen bezüglich des Wahlgeheimnisses des in [BKG11] vorgeschlagenen Konzeptes zur Authentifizierung von Wählern bei elektronischen Wahlen mittels des neuen Personalausweises aufgezeigt. Überdies wird mit der Einführung einer zwischengelagerten Anonymisierungsschicht eine Lösung vorgeschlagen, wie eben diese Bedrohungen abgewehrt werden können.
Cloud Computing is a topic that has gained momentum in the last years. Current studies show that an increasing number of companies is evaluating the promised advantages and considering making use of cloud services. In this paper we investigate the phenomenon of cloud computing and its importance for the operation of ERP systems. We argue that the phenomenon of cloud computing could lead to a decisive change in the way business software is deployed in companies. Our reference framework contains three levels (IaaS, PaaS, SaaS) and clarifies the meaning of public, private and hybrid clouds. The three levels of cloud computing and their impact on ERP systems operation are discussed. From the literature we identify areas for future research and propose a research agenda.
QEMU ist eine Open-Source Virtualisierungssoftware, durch die Computersysteme simuliert werden können. Durch VDE (Virtual Distributed Ethernet) ist es möglich, mehrere durch QEMU virtualisierte Computer miteinander zu verbinden und so ein virtuelles Netzwerk zu erzeugen. Mithilfe von Virtualisierung können Netze zum Testen von Netzwerkanwendungen und -protokollen erzeugt werden, deren Aufbau oder Nutzung ohne Virtualisierung impraktikabel oder schlicht unerschwinglich wäre. Ziel dieser Arbeit ist es, ein Programm zu entwickeln, welches eine in einer Szenario-Datei hinterlegte Netzwerktopologie mit QEMU und VDE-Switches aufbauen kann. Es soll ein Vergleich angestellt werden zwischen Netzen, die mit QEMU aufgebaut wurden und solchen, die über VNUML aufgebaut wurden.
Designing Core Ontologies
(2011)
One of the key factors that hinders integration of distributed, heterogeneous information systems is the lack of a formal basis for modeling the complex, structured knowledge that is to be exchanged. To alleviate this situation, we present an approach based on core ontologies. Core ontologies are characterized by a high degree of axiomatization and formal precision. This is achieved by basing on a foundational ontology. In addition, core ontologies should follow a pattern-oriented design approach. By this, they are modular and extensible. Core ontologies allow for reusing the structured knowledge they define as well as integrating existing domainrnknowledge. The structured knowledge of the core ontologies is clearly separated from the domain-specific knowledge. Such core ontologies allow for both formally conceptualize their particular fields and to be flexibly combined to cover the needsrnof concrete, complex application domains. Over the last years, we have developed three independent core ontologies for events and objects, multimedia annotations, and personal information management. In this paper, we present the simultaneousrnuse and integration of our core ontologies at the example of a complex, distributed socio-technical system of emergency response. We describe our design approach for core ontologies and discuss the lessons learned in designing them. Finally, we elaborate on the beauty aspects of our core ontologies.
Distance vector routing protocols are interior gateway protocols in which every router sets up a routing table with the help of the information it receives from its neighboring routers. The routing table contains the next hops and associated distances on the shortest paths to every other router in the network. Security mechanisms implemented in distance vector routing protocols are insufficient. It is rather assumed that the environment is trustworthy. However, routers can be malicious for several reasons and manipulate routing by injecting false routing updates. Authenticity and integrity of transmitted routing updates have to be guaranteed and at the same time performance and benefits should be well-balanced.
In this paper several approaches that aim at meeting the above mentioned conditions are examined and their advantages and disadvantages are compared.
As Enterprise 2.0 (E2.0) initiatives are gradually moving out of the early experimentation phase it is time to focus greater attention on examining the structures, processes and operations surrounding E2.0 projects. In this paper we present the findings of an empirical study to investigate and understand the reasons for initiating E2.0 projects and the benefits being derived from them. Our study comprises seven in-depth case studies of E2.0 implementations. We develop a classification and means of visualising the scope of E2.0 initiatives and use these methods to analyse and compare projects.
Our findings indicate a wide range of motivations and combinations of technology in use and show a strong emphasis towards the content management functionality of E2.0 technologies.
Terrainklassifikation mit Markov-Zufallsfeldern auf Basis von fusionierten Kamera- und Laserdaten
(2011)
A mobile system, that has to navigate automatically in an outdoor environment,rnneeds to have knowledge about its surrounding terrain. Laser-range-finders, sometimes combined with cameras, are often used to analyse terrain. Several problems, like missing or noisy data, lead to erroneous identification of environment.
The target of this work is to add a context-sensitive classification component and data of other sensors to a procedure, based on 3d-data, obtained by a laser-range-finder. The first upgrade consists of a Markov Random Field, which is used to model the relationships between neighbouring terrainsegments and allows a segmentation of the whole terrain.
The second upgrade fuses laserdata with pictures from cameras to obtain additional terrainfeatures.
To meet the growing demands in the automotive industry, car manufacturers constantly reduce the depth of production and shift value-adding processes to the suppliers. This requires that companies work together more closely and promotes the creation of complex logistics networks. To meet the requirements for information exchange, a consortium of automobile manufacturers launched the project RFID-based Automotive Network (RAN) in 2009. The initiative aims at creating a standardized architecture for efficient material flow management along the entire supply chain. Core component of this architecture is the Informationbroker, an information unit which automatically communicates data which is captured via Auto-ID technology to supply chain participants. The thesis focuses in cooperation with the IBS AG, a software company and consortium partner in the project, on the exchange of goods data.
At first, theoretical foundations are presented by describing the characteristics of a supply chain and explaining standardization efforts and related processes. The chapter on the supply chain focuses on trends in the automotive industry to create a link to the project. The topic of standardization provides in-depth information on electronic data exchange standards in order to additionally create a transition to the Informationbroker concept. In the analytical part, reference projects will be presented with a similar problem and set in relation to RAN. According to project documents, system requirements will be defined and models will be created in order to illustrate the problem. Rich Pictures are used to describe the basis and target state.
Based on these models, the flow of goods related data is depicted between two companies and the role of the Informationbroker for the information exchange is clarified. The thesis aims at establishing an understanding of the challenges of the project and how the proposed concepts of the initiative can lead to an optimization of an automotive supply chain.
This bachelor thesis deals basically with the design and the implementation of a data structure describing maneuvers for car-like robots. This data structure affords planning feasible routes which admit a continuous modification of the steering angle.
The focus of this thesis rests on turn maneuvers, which consist of two clothoid arcs and one circular arc. One of the key aspects is the design of a concept for creating a corridor for these maneuvers. A corridor shall enclose the area which the vehicle covers during the corresponding maneuver. It finally provides a basis to guarantee collision freedom. Furthermore, a planning module is designed and implemented within this bachelor thesis. Based on specified construction lines, the planning module creates feasible routes made up of maneuvers.