@inproceedings{ElsenHawariJohnen2010, author = {Elsen, Ingo and Hawari, Asma and Johnen, Uwe}, title = {Produktkernel in der Systemintegration (Erfahrungsbericht aus der Praxis)}, series = {Vom Projekt zum Produkt - Fachtagung des GI-Fachausschusses Management der Anwendungsentwicklung und -wartung im Fachbereich Wirtschaftsinformatik (WI-MAW), 1. - 3. Dezember 2010 in Aachen}, booktitle = {Vom Projekt zum Produkt - Fachtagung des GI-Fachausschusses Management der Anwendungsentwicklung und -wartung im Fachbereich Wirtschaftsinformatik (WI-MAW), 1. - 3. Dezember 2010 in Aachen}, editor = {Pietsch, Wolfram and Krams, Benedikt}, publisher = {Gesellschaft f{\"u}r Informatik eV}, address = {Bonn}, isbn = {9783885792727}, issn = {1617-5468}, pages = {93 -- 102}, year = {2010}, abstract = {In der Vergangenheit basierten große Systemintegrationsprojekte in der Regel auf Individualentwicklungen f{\"u}r einzelne Kunden. Getrieben durch Kostendruck steigt aber der Bedarf nach standardisierten L{\"o}sungen, die gleichzeitig die individuellen Anforderungen des jeweiligen Umfelds ber{\"u}cksichtigen. T-Systems GEI GmbH wird beiden Anforderungen mit Produktkerneln gerecht. Neben den technischen Aspekten der Kernelentwicklung spielen besonders organisatorische Aspekte eine Rolle, um Kernel effizient und qualitativ hochwertig zu entwickeln, ohne deren Funktionalit{\"a}ten ins Uferlose wachsen zu lassen. Umgesetzt hat T-Systems dieses Konzept f{\"u}r Flughafeninformationssysteme. Damit kann dem wachsenden Bedarf der Flughafenbetreiber nach einer effizienten und kosteng{\"u}nstigen Softwarel{\"o}sung zur Unterst{\"u}tzung Ihrer Gesch{\"a}ftsprozesse entsprochen werden.}, language = {de} } @inproceedings{WalterElsenMuelleretal.1999, author = {Walter, Peter and Elsen, Ingo and M{\"u}ller, Holger and Kraiss, Karl-Friedrich}, title = {3D object recognition with a specialized mixtures of experts architecture}, series = {IJCNN'99. International Joint Conference on Neural Networks. Proceedings}, booktitle = {IJCNN'99. International Joint Conference on Neural Networks. Proceedings}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-5529-6}, issn = {1098-7576}, doi = {10.1109/IJCNN.1999.836243}, pages = {3563 -- 3568}, year = {1999}, abstract = {Aim of the AXON2 project (Adaptive Expert System for Object Recogniton using Neuml Networks) is the development of an object recognition system (ORS) capable of recognizing isolated 3d objects from arbitrary views. Commonly, classification is based on a single feature extracted from the original image. Here we present an architecture adapted from the Mixtures of Eaqerts algorithm which uses multiple neuml networks to integmte different features. During tmining each neural network specializes in a subset of objects or object views appropriate to the properties of the corresponding feature space. In recognition mode the system dynamically chooses the most relevant features and combines them with maximum eficiency. The remaining less relevant features arz not computed and do therefore not decelerate the-recognition process. Thus, the algorithm is well suited for ml-time applications.}, language = {en} } @inproceedings{EichenbaumNikolovskiMuelhensetal.2023, author = {Eichenbaum, Julian and Nikolovski, Gjorgji and M{\"u}lhens, Leon and Reke, Michael and Ferrein, Alexander and Scholl, Ingrid}, title = {Towards a lifelong mapping approach using Lanelet 2 for autonomous open-pit mine operations}, series = {2023 IEEE 19th International Conference on Automation Science and Engineering (CASE)}, booktitle = {2023 IEEE 19th International Conference on Automation Science and Engineering (CASE)}, publisher = {IEEE}, isbn = {979-8-3503-2069-5 (Online)}, doi = {10.1109/CASE56687.2023.10260526}, pages = {8 Seiten}, year = {2023}, abstract = {Autonomous agents require rich environment models for fulfilling their missions. High-definition maps are a well-established map format which allows for representing semantic information besides the usual geometric information of the environment. These are, for instance, road shapes, road markings, traffic signs or barriers. The geometric resolution of HD maps can be as precise as of centimetre level. In this paper, we report on our approach of using HD maps as a map representation for autonomous load-haul-dump vehicles in open-pit mining operations. As the mine undergoes constant change, we also need to constantly update the map. Therefore, we follow a lifelong mapping approach for updating the HD maps based on camera-based object detection and GPS data. We show our mapping algorithm based on the Lanelet 2 map format and show our integration with the navigation stack of the Robot Operating System. We present experimental results on our lifelong mapping approach from a real open-pit mine.}, language = {en} } @inproceedings{TischbeinKeanVertgewalletal.2023, author = {Tischbein, Franziska and Kean, Kilian and Vertgewall, Chris Martin and Ulbig, Andreas and Altherr, Lena}, title = {Determination of the topology of low-voltage distribution grids using cluster methods}, series = {27th International Conference on Electricity Distribution (CIRED 2023)}, booktitle = {27th International Conference on Electricity Distribution (CIRED 2023)}, publisher = {IEEE}, isbn = {978-1-83953-855-1}, doi = {10.1049/icp.2023.0478}, pages = {1 -- 5}, year = {2023}, abstract = {Due to the decarbonization of the energy sector, the electric distribution grids are undergoing a major transformation, which is expected to increase the load on the operating resources due to new electrical loads and distributed energy resources. Therefore, grid operators need to gradually move to active grid management in order to ensure safe and reliable grid operation. However, this requires knowledge of key grid variables, such as node voltages, which is why the mass integration of measurement technology (smart meters) is necessary. Another problem is the fact that a large part of the topology of the distribution grids is not sufficiently digitized and models are partly faulty, which means that active grid operation management today has to be carried out largely blindly. It is therefore part of current research to develop methods for determining unknown grid topologies based on measurement data. In this paper, different clustering algorithms are presented and their performance of topology detection of low voltage grids is compared. Furthermore, the influence of measurement uncertainties is investigated in the form of a sensitivity analysis.}, language = {en} } @inproceedings{NethSchubaBrodkorbetal.2023, author = {Neth, Jannik and Schuba, Marko and Brodkorb, Karsten and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Digital forensics triage app for android}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, isbn = {9798400707728}, doi = {10.1145/3600160.3605017}, pages = {6 Seiten}, year = {2023}, abstract = {Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator - without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format.}, language = {en} } @inproceedings{ZaehlTheisWolfetal.2023, author = {Z{\"a}hl, Philipp M. and Theis, Sabine and Wolf, Martin and K{\"o}hler, Klemens}, title = {Teamwork in software development and what personality has to do with it - an overview}, series = {Virtual, Augmented and Mixed Reality}, booktitle = {Virtual, Augmented and Mixed Reality}, editor = {Chen, Jessie Y. C. and Fragomeni, Gino}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-35633-9 (Print)}, doi = {10.1007/978-3-031-35634-6_10}, pages = {130 -- 153}, year = {2023}, abstract = {Due to the increasing complexity of software projects, software development is becoming more and more dependent on teams. The quality of this teamwork can vary depending on the team composition, as teams are always a combination of different skills and personality types. This paper aims to answer the question of how to describe a software development team and what influence the personality of the team members has on the team dynamics. For this purpose, a systematic literature review (n=48) and a literature search with the AI research assistant Elicit (n=20) were conducted. Result: A person's personality significantly shapes his or her thinking and actions, which in turn influences his or her behavior in software development teams. It has been shown that team performance and satisfaction can be strongly influenced by personality. The quality of communication and the likelihood of conflict can also be attributed to personality.}, language = {en} } @inproceedings{ViehmannLimpertHofmannetal.2023, author = {Viehmann, Tarik and Limpert, Nicolas and Hofmann, Till and Henning, Mike and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {Winning the RoboCup logistics league with visual servoing and centralized goal reasoning}, series = {RoboCup 2022}, booktitle = {RoboCup 2022}, editor = {Eguchi, Amy and Lau, Nuno and Paetzel-Pr{\"u}smann, Maike and Wanichanon, Thanapat}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-28468-7 (Print)}, doi = {https://doi.org/10.1007/978-3-031-28469-4_25}, pages = {300 -- 312}, year = {2023}, abstract = {The RoboCup Logistics League (RCLL) is a robotics competition in a production logistics scenario in the context of a Smart Factory. In the competition, a team of three robots needs to assemble products to fulfill various orders that are requested online during the game. This year, the Carologistics team was able to win the competition with a new approach to multi-agent coordination as well as significant changes to the robot's perception unit and a pragmatic network setup using the cellular network instead of WiFi. In this paper, we describe the major components of our approach with a focus on the changes compared to the last physical competition in 2019.}, language = {en} } @inproceedings{NeugebauerBrutschyMeyeretal.2014, author = {Neugebauer, Georg and Brutschy, Lucas and Meyer, Ulrike and Wetzel, Susanne}, title = {Privacy-preserving multi-party reconciliation secure in the malicious model}, series = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, booktitle = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, editor = {Garcia-Alfaro, Joaquin and Lioudakis, Georgios and Cuppens-Boulahia, Nora and Foley, Simon and Fitzgerald, William M.}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-642-54567-2 (Print)}, doi = {10.1007/978-3-642-54568-9_12}, pages = {178 -- 193}, year = {2014}, abstract = {The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.}, language = {en} } @inproceedings{SchulteTiggesMatheisRekeetal.2023, author = {Schulte-Tigges, Joschua and Matheis, Dominik and Reke, Michael and Walter, Thomas and Kaszner, Daniel}, title = {Demonstrating a V2X enabled system for transition of control and minimum risk manoeuvre when leaving the operational design domain}, series = {HCII 2023: HCI in Mobility, Transport, and Automotive Systems}, booktitle = {HCII 2023: HCI in Mobility, Transport, and Automotive Systems}, editor = {Kr{\"o}mker, Heidi}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-35677-3 (Print)}, doi = {10.1007/978-3-031-35678-0_12}, pages = {200 -- 210}, year = {2023}, abstract = {Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle's software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany.}, language = {en} } @inproceedings{GaldiHartungDugelay2017, author = {Galdi, Chiara and Hartung, Frank and Dugelay, Jean-Luc}, title = {Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones}, series = {Electronic Imaging}, booktitle = {Electronic Imaging}, publisher = {Society for Imaging Science and Technology}, address = {Springfield, Virginia}, issn = {2470-1173}, doi = {10.2352/ISSN.2470-1173.2017.7.MWSF-331}, pages = {100 -- 103}, year = {2017}, abstract = {Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos.}, language = {en} }