@book{WolfFoltzKillich2000, author = {Wolf, Martin and Foltz, Christian and Killich, S.}, title = {K3 User Guide}, publisher = {RWTH}, address = {Aachen}, pages = {1 -- 13}, year = {2000}, language = {en} } @inproceedings{HadinejadMahramGligorevicRitscher2002, author = {Hadinejad-Mahram, Hafez and Gligorevic, Snjezana and Ritscher, Matthias}, title = {Joint iterative channel estimation and parallel interference cancellation for coded DS-CDMA}, series = {Proceeding of the International Conference on Telecommunications 2002 : [Beijing, 23 - 26 June 2002]. Vol. 2}, booktitle = {Proceeding of the International Conference on Telecommunications 2002 : [Beijing, 23 - 26 June 2002]. Vol. 2}, organization = {Institute of Electrical and Electronics Engineers}, pages = {566 -- 570}, year = {2002}, language = {en} } @inproceedings{Gligorevic2002, author = {Gligorevic, Snjezana}, title = {Joint channel estimation and equalization for fast time-variant multipath channels}, series = {Proceedings / 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications : PIMRC 2002 : Lisboa, Portugal, September 15 - 18, 2002}, booktitle = {Proceedings / 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications : PIMRC 2002 : Lisboa, Portugal, September 15 - 18, 2002}, organization = {Institute of Electrical and Electronics Engineers}, isbn = {0-7803-7589-0}, pages = {1127 -- 1130}, year = {2002}, language = {en} } @article{Gligorevic2008, author = {Gligorevic, Snjezana}, title = {Joint channel estimation and equalisation of fast time-varying frequency-selective channels}, series = {European transactions on telecommunications}, volume = {Vol. 19}, journal = {European transactions on telecommunications}, number = {Iss. 1}, issn = {1541-8251; 2161-3915; 1120-3862; 1124-318X}, pages = {1 -- 13}, year = {2008}, language = {en} } @article{Mayer2005, author = {Mayer, Claudia}, title = {Jenseits der Grenze. Asien im Werk von G{\"u}nter Grass. Claudia Mayer-Iswandy}, series = {Ich will in das Herz Kalkuttas eindringen. G{\"u}nter Grass in Indien und Bagladesch. Hrsg. von Martin K{\"a}mpchen.}, journal = {Ich will in das Herz Kalkuttas eindringen. G{\"u}nter Grass in Indien und Bagladesch. Hrsg. von Martin K{\"a}mpchen.}, publisher = {Ed. Isele}, address = {Eggingen}, isbn = {3-86142-314-6}, pages = {159 -- 180}, year = {2005}, language = {de} } @inproceedings{HartungHillgaertnerSchmitzetal.2014, author = {Hartung, Frank and Hillg{\"a}rtner, Michael and Schmitz, G{\"u}nter and Schuba, Marko and Adolphs, Fabian and Hoffend, Jens and Theis, Jochen}, title = {IT-Sicherheit im Automobil}, series = {AmE 2014 : Automotive meets Electronics, Beitr{\"a}ge der 5. GMM-Fachtagung vom 18. bis 19. Februar 2014 in Dortmund. (GMM-Fachbericht ; 78)}, booktitle = {AmE 2014 : Automotive meets Electronics, Beitr{\"a}ge der 5. GMM-Fachtagung vom 18. bis 19. Februar 2014 in Dortmund. (GMM-Fachbericht ; 78)}, publisher = {VDE-Verl.}, address = {Berlin}, organization = {VDE/VDI-Gesellschaft Mikroelektronik, Mikrosystem- und Feinwerktechnik (GMM)}, isbn = {978-3-8007-3580-8}, pages = {CD-ROM}, year = {2014}, language = {de} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @article{WolfAltgen2013, author = {Wolf, Martin and Altgen, Jannik}, title = {IT Service Management in der Region Aachen : White Paper}, pages = {1 -- 13}, year = {2013}, language = {de} } @article{Alt1979, author = {Alt, Helmut}, title = {Isolierte Freileitungen, ein Betriebsmittel f{\"u}r schwierige Trassenf{\"u}hrung}, series = {Elektrizit{\"a}tswirtschaft}, volume = {Jg. 78}, journal = {Elektrizit{\"a}tswirtschaft}, number = {H. 10}, issn = {0013-5496}, pages = {250 -- 256}, year = {1979}, language = {de} } @inproceedings{BrockmannSultanowCzarnecki2019, author = {Brockmann, Carsten and Sultanow, Eldar and Czarnecki, Christian}, title = {Is enterprise architecture still relevant in the digital age?}, series = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, booktitle = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, editor = {Draude, Claude and Lange, Martin and Sick, Bernhard}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {9783885796893}, issn = {1617-5468}, doi = {10.18420/inf2019_ws01}, pages = {21 -- 21}, year = {2019}, language = {en} } @article{AlhwarinFerreinScholl2014, author = {Alhwarin, Faraj and Ferrein, Alexander and Scholl, Ingrid}, title = {IR stereo kinect: improving depth images by combining structured light with IR stereo}, pages = {1 -- 9}, year = {2014}, language = {en} } @incollection{AlhwarinFerreinScholl2014, author = {Alhwarin, Faraj and Ferrein, Alexander and Scholl, Ingrid}, title = {IR stereo kinect: improving depth images by combining structured light with IR stereo}, series = {PRICAI 2014: Trends in artificial intelligence : 13th Pacific Rim International Conference on Artificial Intelligence : Gold Coast, QLD, Australia, December 1-5, 2014 : proceedings. (Lecture notes in computer science ; vol. 8862)}, booktitle = {PRICAI 2014: Trends in artificial intelligence : 13th Pacific Rim International Conference on Artificial Intelligence : Gold Coast, QLD, Australia, December 1-5, 2014 : proceedings. (Lecture notes in computer science ; vol. 8862)}, publisher = {Springer}, address = {M{\"u}nchen}, isbn = {978-3-319-13559-5 (Print) ; 978-3-319-13560-1 (E-Book)}, doi = {10.1007/978-3-319-13560-1_33}, pages = {409 -- 421}, year = {2014}, abstract = {RGB-D sensors such as the Microsoft Kinect or the Asus Xtion are inexpensive 3D sensors. A depth image is computed by calculating the distortion of a known infrared light (IR) pattern which is projected into the scene. While these sensors are great devices they have some limitations. The distance they can measure is limited and they suffer from reflection problems on transparent, shiny, or very matte and absorbing objects. If more than one RGB-D camera is used the IR patterns interfere with each other. This results in a massive loss of depth information. In this paper, we present a simple and powerful method to overcome these problems. We propose a stereo RGB-D camera system which uses the pros of RGB-D cameras and combine them with the pros of stereo camera systems. The idea is to utilize the IR images of each two sensors as a stereo pair to generate a depth map. The IR patterns emitted by IR projectors are exploited here to enhance the dense stereo matching even if the observed objects or surfaces are texture-less or transparent. The resulting disparity map is then fused with the depth map offered by the RGB-D sensor to fill the regions and the holes that appear because of interference, or due to transparent or reflective objects. Our results show that the density of depth information is increased especially for transparent, shiny or matte objects.}, language = {en} } @article{KrauseNeubertPietsch1990, author = {Krause, Gregor and Neubert, R. and Pietsch, R.}, title = {Investigations of Electrical Aging in Polymers under High AC-Field Strength}, series = {1990 annual report : October 28 - October 31, 1990 / sponsored by the IEEE Dielectrics and Electrical Insulation Society}, journal = {1990 annual report : October 28 - October 31, 1990 / sponsored by the IEEE Dielectrics and Electrical Insulation Society}, publisher = {IEEE Service Center}, address = {Piscataway, N.J}, pages = {716 S : Ill., graph. Darst.}, year = {1990}, language = {en} } @inproceedings{SchoppHeuermannHoltrup2014, author = {Schopp, Christoph and Heuermann, Holger and Holtrup, S.}, title = {Investigation on efficacy optimization of RF-driven automotive D-lamps}, series = {44th European Microwave Conference (EuMC),2014, Rome}, booktitle = {44th European Microwave Conference (EuMC),2014, Rome}, doi = {10.1109/EuMC.2014.6986645}, pages = {1154 -- 1157}, year = {2014}, language = {en} } @article{Benkner1994, author = {Benkner, Thorsten}, title = {Investigation of mobile antenna diagrams on cochannel interference}, series = {Proceedings / Organization: IEEE Vehicular Technology/Communications Society; Joint Chapter in the Benelux Section. Ed.: L. Vandendorpe}, journal = {Proceedings / Organization: IEEE Vehicular Technology/Communications Society; Joint Chapter in the Benelux Section. Ed.: L. Vandendorpe}, publisher = {Univ. Catholoque de Louvain}, address = {Loovain}, pages = {237 Bl.}, year = {1994}, language = {en} } @inproceedings{NoetzoldUphuesWegeneretal.2013, author = {N{\"o}tzold, K. and Uphues, A. and Wegener, R. and Fink, K. and Bragard, Michael and Griessel, R. and Soter, S.}, title = {Inverter based test setup for LVRT verification of a full-scale 2 MW wind power converter}, series = {15th European Conference on Power Electronics and Applications (EPE), 2013 : 2 - 6 Sept. 2013, Lille, France / [EPE Association; PELS, IEEE Power Electronics Society]}, booktitle = {15th European Conference on Power Electronics and Applications (EPE), 2013 : 2 - 6 Sept. 2013, Lille, France / [EPE Association; PELS, IEEE Power Electronics Society]}, publisher = {IEEE}, address = {Piscataway, NJ}, isbn = {978-1-4799-0115-9 (Online-Ausg.)}, doi = {10.1109/EPE.2013.6634752}, pages = {1037 -- 1042}, year = {2013}, language = {en} } @inproceedings{NoetzoldUphuesWegeneretal.2012, author = {N{\"o}tzold, K. and Uphues, A. and Wegener, R. and Soter, S. and Fink, K. and Bragard, Michael and Griessel, R.}, title = {Inverter based test setup for LVRT verification of a full-scale 2 MW wind power converter}, series = {EPE Joint Wind Energy and T\&D Chapters Seminar : 28th and 29th of June 2012, in the Utzon Centre, Aalborg, Denmark ; papers, posters, presentations. - Session 2: Grid connection, compliance}, booktitle = {EPE Joint Wind Energy and T\&D Chapters Seminar : 28th and 29th of June 2012, in the Utzon Centre, Aalborg, Denmark ; papers, posters, presentations. - Session 2: Grid connection, compliance}, publisher = {EPE Association}, address = {Brussels}, year = {2012}, language = {en} } @inproceedings{KrueckelNoldenFerreinetal.2015, author = {Kr{\"u}ckel, Kai and Nolden, Florian and Ferrein, Alexander and Scholl, Ingrid}, title = {Intuitive visual teleoperation for UGVs using free-look augmented reality displays}, series = {2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA}, booktitle = {2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA}, doi = {10.1109/ICRA.2015.7139809}, pages = {4412 -- 4417}, year = {2015}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @inproceedings{RingbeckSchwarteBuxbaum1999, author = {Ringbeck, Thorsten and Schwarte, Rudolf and Buxbaum, Bernd}, title = {Introduction of a new opto-electrical phase-locked loop in CMOS technology: the PMD-PLL}, series = {Optical wireless communications II / [SPIE Conference on Optical Wireless Communications II], 22 September 1999, Boston, Massachusetts. - (SPIE proceedings series ; 3850)}, booktitle = {Optical wireless communications II / [SPIE Conference on Optical Wireless Communications II], 22 September 1999, Boston, Massachusetts. - (SPIE proceedings series ; 3850)}, editor = {Korevaar, Eric John}, publisher = {SPIE}, address = {Bellingham, Wash.}, isbn = {0-8194-3443-4}, issn = {0038-7355}, pages = {108 -- 116}, year = {1999}, language = {en} }