TY - JOUR A1 - Hartung, Frank A1 - Kesici, Sinan A1 - Catrein, Daniel T1 - DRM protected Dynamic Adaptive HTTP Streaming JF - Proceedings of the 2011 ACM Multimedia Systems Conference [Elektronische Ressource] : February 23 - 25, 2011, San Jose, CA, USA / sponsored by: ACM SIGMM Y1 - 2011 SN - 9781450305181 N1 - ACM Multimedia Systems Conference ; (2 : ; 2011.02.23-25 : ; San Jose, Calif.) SP - 277 EP - 282 PB - ACM CY - New York, NY ER - TY - JOUR A1 - Grotendorst, Johannes T1 - On calculating the rate of linear convergence of non-linear transformed sequences JF - Proceeding SNC '11 Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation Y1 - 2011 SN - 978-1-4503-0515-0 SP - 24 EP - 33 PB - ACM CY - New York, NY ER - TY - JOUR A1 - Emhardt, Selina A1 - Jarodzka, Halszka A1 - Brand-Gruwel, Saskia A1 - Drumm, Christian A1 - Gog, Tamara van T1 - Introducing eye movement modeling examples for programming education and the role of teacher's didactic guidance JF - ETRA '20 Short Papers: ACM Symposium on Eye Tracking Research and Applications N2 - In this article, we introduce how eye-tracking technology might become a promising tool to teach programming skills, such as debugging with ‘Eye Movement Modeling Examples’ (EMME). EMME are tutorial videos that visualize an expert's (e.g., a programming teacher's) eye movements during task performance to guide students’ attention, e.g., as a moving dot or circle. We first introduce the general idea behind the EMME method and present studies that showed first promising results regarding the benefits of EMME to support programming education. However, we argue that the instructional design of EMME varies notably across them, as evidence-based guidelines on how to create effective EMME are often lacking. As an example, we present our ongoing research on the effects of different ways to instruct the EMME model prior to video creation. Finally, we highlight open questions for future investigations that could help improving the design of EMME for (programming) education. Y1 - 2020 U6 - https://doi.org/10.1145/3379156.3391978 IS - Art. 52 SP - 1 EP - 4 PB - ACM CY - New York ER - TY - CHAP A1 - Neth, Jannik A1 - Schuba, Marko A1 - Brodkorb, Karsten A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Digital forensics triage app for android T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator – without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format. KW - Android KW - Digital triage KW - Triage-app Y1 - 2023 SN - 9798400707728 U6 - https://doi.org/10.1145/3600160.3605017 N1 - ARES 2023: The 18th International Conference on Availability, Reliability and Security. August 29 - September 1, 2023. Benevento, Italy. PB - ACM ER - TY - CHAP A1 - Arndt, Tobias A1 - Conzen, Max A1 - Elsen, Ingo A1 - Ferrein, Alexander A1 - Galla, Oskar A1 - Köse, Hakan A1 - Schiffer, Stefan A1 - Tschesche, Matteo T1 - Anomaly detection in the metal-textile industry for the reduction of the cognitive load of quality control workers T2 - PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments N2 - This paper presents an approach for reducing the cognitive load for humans working in quality control (QC) for production processes that adhere to the 6σ -methodology. While 100% QC requires every part to be inspected, this task can be reduced when a human-in-the-loop QC process gets supported by an anomaly detection system that only presents those parts for manual inspection that have a significant likelihood of being defective. This approach shows good results when applied to image-based QC for metal textile products. KW - Datasets KW - Neural networks KW - Anomaly detection KW - Quality control KW - Process optimization Y1 - 2023 SN - 9798400700699 U6 - https://doi.org/10.1145/3594806.3596558 N1 - PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, Corfu, Greece, July 5 - 7, 2023 SP - 535 EP - 542 PB - ACM ER - TY - CHAP A1 - Küppers, Malte A1 - Schuba, Marko A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Security analysis of the KNX smart building protocol T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys. Y1 - 2023 U6 - https://doi.org/10.1145/3600160.3605167 N1 - ARES 2023: The 18th International Conference on Availability, Reliability and Security. August 29 - September 1, 2023. Benevento, Italy. Article No.: 87 SP - 1 EP - 7 PB - ACM ER -