@inproceedings{NiemuellerLakemeyerFerrein2013, author = {Niem{\"u}ller, Tim and Lakemeyer, Gerhard and Ferrein, Alexander}, title = {Aspects of integrating diverse software into robotic systems extended abstract}, series = {ICRA 2013 - 8th Workshop on Software Development and Integration in Robotics (SDIR), Karlsruhe, Germany}, booktitle = {ICRA 2013 - 8th Workshop on Software Development and Integration in Robotics (SDIR), Karlsruhe, Germany}, pages = {1 -- 2}, year = {2013}, language = {en} } @inproceedings{HeuermannHarzheimMuehmel2021, author = {Heuermann, Holger and Harzheim, Thomas and M{\"u}hmel, Marc}, title = {A maritime harmonic radar search and rescue system using passive and active tags}, series = {2020 17th European Radar Conference (EuRAD)}, booktitle = {2020 17th European Radar Conference (EuRAD)}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-2-87487-061-3}, doi = {10.1109/EuRAD48048.2021.00030}, pages = {73 -- 76}, year = {2021}, abstract = {This article introduces a new maritime search and rescue system based on S-band illumination harmonic radar (HR). Passive and active tags have been developed and tested attached to life jackets and a rescue boat. This system was able to detect and range the active tags up to a range of 5800 m in tests on the Baltic Sea with an antenna input power of only 100 W. All electronic GHz components of the system, excluding the S-band power amplifier, were custom developed for this purpose. Special attention is given to the performance and conceptual differences between passive and active tags used in the system and integration with a maritime X-band navigation radar is demonstrated.}, language = {en} } @inproceedings{AlhwarinFerreinScholl2018, author = {Alhwarin, Faraj and Ferrein, Alexander and Scholl, Ingrid}, title = {CRVM: Circular Random Variable-based Matcher - A Novel Hashing Method for Fast NN Search in High-dimensional Spaces}, series = {Proceedings of the 7th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2018}, booktitle = {Proceedings of the 7th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2018}, isbn = {978-989-758-276-9}, doi = {10.5220/0006692802140221}, pages = {214 -- 221}, year = {2018}, language = {en} } @inproceedings{AlhwarinSchifferFerreinetal.2018, author = {Alhwarin, Faraj and Schiffer, Stefan and Ferrein, Alexander and Scholl, Ingrid}, title = {Optimized KinectFusion Algorithm for 3D Scanning Applications}, series = {Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 2: BIOIMAGING}, booktitle = {Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 2: BIOIMAGING}, isbn = {978-989-758-278-3}, doi = {10.5220/0006594700500057}, pages = {50 -- 57}, year = {2018}, language = {en} } @inproceedings{Ritz2001, author = {Ritz, Thomas}, title = {DISMED - an innovation portal for printing and media industry}, series = {CRIS 2000 : the fifth conference on Current Research Information Systems in Europe, in Helsinki (Finland), 25-27 May 2000}, booktitle = {CRIS 2000 : the fifth conference on Current Research Information Systems in Europe, in Helsinki (Finland), 25-27 May 2000}, publisher = {CORDIS Archive}, address = {[s.l.]}, pages = {9 S. : graph. Darst.}, year = {2001}, language = {en} } @inproceedings{KoenigWolf2016, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin R.}, title = {The pyramid assessment framework for 'competence developing games'}, series = {Communications in Computer and Information Science}, volume = {618}, booktitle = {Communications in Computer and Information Science}, editor = {Stephanidis, C.}, publisher = {Springer}, isbn = {978-331940541-4}, issn = {1865-0929}, doi = {10.1007/978-3-319-40542-1_37}, pages = {232 -- 237}, year = {2016}, language = {en} } @inproceedings{MarcoFerrein2017, author = {Marco, Heather G. and Ferrein, Alexander}, title = {AGNES: The African-German Network of Excellence in Science}, series = {Proceedings of the 2nd Developing World Robotics Forum, Workshop at IEEE AFRICON 2017}, booktitle = {Proceedings of the 2nd Developing World Robotics Forum, Workshop at IEEE AFRICON 2017}, pages = {1 -- 2}, year = {2017}, language = {en} } @inproceedings{FuchsRitz2014, author = {Fuchs, Britta and Ritz, Thomas}, title = {Usability for Blended Shopping - Solving Major Flaws by Applying Usability Engineering and Proven Integration Technologies}, series = {Proceedings of the 11th International Conference on e-Business, ICE-B 2014, Vienna, Austria}, booktitle = {Proceedings of the 11th International Conference on e-Business, ICE-B 2014, Vienna, Austria}, isbn = {978-989-758-043-7}, doi = {10.5220/0005113502160223}, pages = {216 -- 223}, year = {2014}, language = {en} } @inproceedings{HarzheimHeuermann2018, author = {Harzheim, Thomas and Heuermann, Holger}, title = {Phase Repeatable Synthesizers as a New Harmonic Phase Standard for Nonlinear Network Analysis}, series = {IEEE Transactions on Microwave Theory and Techniques}, booktitle = {IEEE Transactions on Microwave Theory and Techniques}, publisher = {IEEE}, doi = {10.1109/TMTT.2018.2817513}, pages = {1 -- 8}, year = {2018}, language = {en} } @inproceedings{KueppersSchubaNeugebaueretal.2023, author = {K{\"u}ppers, Malte and Schuba, Marko and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Security analysis of the KNX smart building protocol}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, doi = {10.1145/3600160.3605167}, pages = {1 -- 7}, year = {2023}, abstract = {KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.}, language = {en} }