@article{HartungKesiciCatrein2011, author = {Hartung, Frank and Kesici, Sinan and Catrein, Daniel}, title = {DRM protected Dynamic Adaptive HTTP Streaming}, series = {Proceedings of the 2011 ACM Multimedia Systems Conference [Elektronische Ressource] : February 23 - 25, 2011, San Jose, CA, USA / sponsored by: ACM SIGMM}, journal = {Proceedings of the 2011 ACM Multimedia Systems Conference [Elektronische Ressource] : February 23 - 25, 2011, San Jose, CA, USA / sponsored by: ACM SIGMM}, publisher = {ACM}, address = {New York, NY}, isbn = {9781450305181}, pages = {277 -- 282}, year = {2011}, language = {en} } @article{Grotendorst2011, author = {Grotendorst, Johannes}, title = {On calculating the rate of linear convergence of non-linear transformed sequences}, series = {Proceeding SNC '11 Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation}, journal = {Proceeding SNC '11 Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation}, publisher = {ACM}, address = {New York, NY}, isbn = {978-1-4503-0515-0}, pages = {24 -- 33}, year = {2011}, language = {en} } @article{EmhardtJarodzkaBrandGruweletal.2020, author = {Emhardt, Selina and Jarodzka, Halszka and Brand-Gruwel, Saskia and Drumm, Christian and Gog, Tamara van}, title = {Introducing eye movement modeling examples for programming education and the role of teacher's didactic guidance}, series = {ETRA '20 Short Papers: ACM Symposium on Eye Tracking Research and Applications}, journal = {ETRA '20 Short Papers: ACM Symposium on Eye Tracking Research and Applications}, number = {Art. 52}, publisher = {ACM}, address = {New York}, doi = {10.1145/3379156.3391978}, pages = {1 -- 4}, year = {2020}, abstract = {In this article, we introduce how eye-tracking technology might become a promising tool to teach programming skills, such as debugging with 'Eye Movement Modeling Examples' (EMME). EMME are tutorial videos that visualize an expert's (e.g., a programming teacher's) eye movements during task performance to guide students' attention, e.g., as a moving dot or circle. We first introduce the general idea behind the EMME method and present studies that showed first promising results regarding the benefits of EMME to support programming education. However, we argue that the instructional design of EMME varies notably across them, as evidence-based guidelines on how to create effective EMME are often lacking. As an example, we present our ongoing research on the effects of different ways to instruct the EMME model prior to video creation. Finally, we highlight open questions for future investigations that could help improving the design of EMME for (programming) education.}, language = {en} } @inproceedings{NethSchubaBrodkorbetal.2023, author = {Neth, Jannik and Schuba, Marko and Brodkorb, Karsten and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Digital forensics triage app for android}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, isbn = {9798400707728}, doi = {10.1145/3600160.3605017}, pages = {6 Seiten}, year = {2023}, abstract = {Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator - without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format.}, language = {en} } @inproceedings{ArndtConzenElsenetal.2023, author = {Arndt, Tobias and Conzen, Max and Elsen, Ingo and Ferrein, Alexander and Galla, Oskar and K{\"o}se, Hakan and Schiffer, Stefan and Tschesche, Matteo}, title = {Anomaly detection in the metal-textile industry for the reduction of the cognitive load of quality control workers}, series = {PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments}, booktitle = {PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments}, publisher = {ACM}, isbn = {9798400700699}, doi = {10.1145/3594806.3596558}, pages = {535 -- 542}, year = {2023}, abstract = {This paper presents an approach for reducing the cognitive load for humans working in quality control (QC) for production processes that adhere to the 6σ -methodology. While 100\% QC requires every part to be inspected, this task can be reduced when a human-in-the-loop QC process gets supported by an anomaly detection system that only presents those parts for manual inspection that have a significant likelihood of being defective. This approach shows good results when applied to image-based QC for metal textile products.}, language = {en} } @inproceedings{KueppersSchubaNeugebaueretal.2023, author = {K{\"u}ppers, Malte and Schuba, Marko and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Security analysis of the KNX smart building protocol}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, doi = {10.1145/3600160.3605167}, pages = {1 -- 7}, year = {2023}, abstract = {KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.}, language = {en} }