TY - BOOK A1 - Hüning, Felix T1 - The fundamentals of electrical engineering for mechatronics Y1 - 2014 SN - 978-3-11-034991-7 (Druckausg.) SN - 978-3-11-030840-2 (E-Book) PB - de Gruyter CY - Berlin ER - TY - CHAP A1 - Bonney, Gregor A1 - Höfken, Hans-Wilhelm A1 - Paffen, Benedikt A1 - Schuba, Marko T1 - ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC T2 - 1st International Conference on Information Systems Security and Privacy : ICISSP 2015 Y1 - 2015 SP - 1 EP - 6 ER - TY - CHAP A1 - Lindenlauf, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Cold Boot Attacks on DDR2 and DDR3 SDRAM T2 - 10th International Conference on Availability, Reliability and Security (ARES) 2015 Y1 - 2015 U6 - https://doi.org/10.1109/ARES.2015.28 SP - 287 EP - 292 ER - TY - BOOK A1 - Gromov, Viacheslav A1 - Hüning, Felix T1 - Schnelleinstieg mit dem Renesas RL78/G14 Starter Kit Y1 - 2015 SN - 978-3-645-10157-8 PB - Franzis CY - Poing ER - TY - CHAP A1 - Goeckel, Tom A1 - Schiffer, Stefan A1 - Wagner, Hermann A1 - Lakemeyer, Gerhard T1 - The Video Conference Tool Robot ViCToR T2 - Intelligent Robotics and Applications : 8th International Conference, ICIRA 2015, Portsmouth, UK, August 24-27, 2015, Proceedings, Part II N2 - We present a robotic tool that autonomously follows a conversation to enable remote presence in video conferencing. When humans participate in a meeting with the help of video conferencing tools, it is crucial that they are able to follow the conversation both with acoustic and visual input. To this end, we design and implement a video conferencing tool robot that uses binaural sound source localization as its main source to autonomously orient towards the currently talking speaker. To increase robustness of the acoustic cue against noise we supplement the sound localization with a source detection stage. Also, we include a simple onset detector to retain fast response times. Since we only use two microphones, we are confronted with ambiguities on whether a source is in front or behind the device. We resolve these ambiguities with the help of face detection and additional moves. We tailor the system to our target scenarios in experiments with a four minute scripted conversation. In these experiments we evaluate the influence of different system settings on the responsiveness and accuracy of the device. Y1 - 2015 SN - 978-3-319-22876-1 U6 - https://doi.org/10.1007/978-3-319-22876-1_6 N1 - Lecture Notes in Computer Science ; 9245 SP - 61 EP - 73 PB - Springer ER - TY - BOOK A1 - Galley, Birgit A1 - Minoggio, Ingo A1 - Schuba, Marko A1 - Bischoff, Barbara A1 - Höfken, Hans-Wilhelm T1 - Unternehmenseigene Ermittlungen : Recht - Kriminalistik - IT Y1 - 2016 SN - 978-3-503-16531-5 PB - Erich Schmidt Verlag CY - Berlin ER - TY - CHAP A1 - Braun, Sebastian A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko A1 - Breuer, Michael T1 - Forensische Sicherung von DSLRoutern T2 - Proceedings of D-A-CH Security 2015. St. Augustin 8. und 9. September 2015 Y1 - 2015 ER - TY - BOOK A1 - Alt, Helmut T1 - Angewandte Mathematik, Finanzmathematik, Statistik, Informatik für UPN-Rechner. (Anwendung programmierbarer Taschenrechner ; 1) Y1 - 1979 SN - 3-528-04150-1 PB - Vieweg CY - Braunschweig [u.a.] ER - TY - BOOK A1 - Alt, Helmut T1 - Allgemeine Elektrotechnik, Nachrichtentechnik, Impulstechnik für UPN-Rechner. (Anwendung programmierbarer Taschenrechner ; 2) Y1 - 1980 SN - 3-528-04151-X PB - Vieweg CY - Braunschweig [u.a.] ER - TY - BOOK A1 - Alt, Helmut T1 - Elektrische Energietechnik, Steuerungstechnik, Elektrizitätswirtschaft für UPN-Rechner. (Anwendung programmierbarer Taschenrechner ; 6) Y1 - 1980 SN - 3-528-04180-3 PB - Vieweg CY - Braunschweig [u.a.] ER -