TY - CHAP A1 - Ellerweg, Roland A1 - Ritz, Thomas ED - Roth, Jörg T1 - Tool supported requirements analysis for the user centered development of mobile enterprise software T2 - Proceeding of Wireless Applications and Computing 2008 and Telecommunications, Networks and Systems 2008 : MCCSIS '08 ; IADIS Multi Conference on Computer Science and Information Systems ; 22 - 24 July 2008, Amsterdam, The Netherlands N2 - A user centered development method has proved satisfactory for the development of mobile enterprise software. To make use of this method, detailed information about the user and the place where the user interacts with his mobile device is required. This article describes how both can be modeled by a stereotypical and conceptual extended UML extension. Finally, a software tool is presented that supports the developed UML extension. Y1 - 2008 SN - 978-972-8924-62-1 SP - 160 EP - 162 PB - IADIS Press CY - [Lisboa] ER - TY - CHAP A1 - Ferrein, Alexander A1 - Potgieter, Anet A1 - Steinbauer, Gerald T1 - Self-aware robots - What do we need from learning, deliberation, and reactive control? T2 - HYCAS 2009 : International Workshop on Hybrid Control of Autonomous Systems : Integrating Learning, Deliberation and Reactive Control : Pasadena, Calif., 13 July 2009 Y1 - 2009 SP - 1 EP - 5 PB - AAAI Pr. ER - TY - CHAP A1 - Steuer-Dankert, Linda T1 - A crazy little thing called sustainability T2 - 51st Annual Conference of the European Society for Engineering Education (SEFI) N2 - Achieving the 17 Sustainable Development Goals (SDGs) set by the United Nations (UN) in 2015 requires global collaboration between different stakeholders. Industry, and in particular engineers who shape industrial developments, have a special role to play as they are confronted with the responsibility to holistically reflect sustainability in industrial processes. This means that, in addition to the technical specifications, engineers must also question the effects of their own actions on an ecological, economic and social level in order to ensure sustainable action and contribute to the achievement of the SDGs. However, this requires competencies that enable engineers to apply all three pillars of sustainability to their own field of activity and to understand the global impact of industrial processes. In this context, it is relevant to understand how industry already reflects sustainability and to identify competences needed for sustainable development. KW - Transformative Competencies KW - Future Skills KW - Transdisciplinarity KW - Interdisciplinarity KW - Sustainability Y1 - 2023 U6 - https://doi.org/10.21427/9CQR-VC94 N1 - 51st Annual Conference of the European Society for Engineering Education, Technological University Dublin, 10th-14th September, 2023 ER - TY - CHAP A1 - Heuermann, Holger A1 - Finger, Torsten T1 - 2.45 GHz Plasma Powered Spark Plug by Thermal and EM-Optimization Y1 - 2014 N1 - Ansys High Frequency Simulation Conference - AHFSC 2014, Munich; 02/2014 ER - TY - CHAP A1 - Schopp, Christoph A1 - Heuermann, Holger A1 - Holtrup, S. T1 - Investigation on efficacy optimization of RF-driven automotive D-lamps T2 - 44th European Microwave Conference (EuMC),2014, Rome Y1 - 2014 U6 - https://doi.org/10.1109/EuMC.2014.6986645 SP - 1154 EP - 1157 ER - TY - CHAP A1 - Neumann, Tobias A1 - Ferrein, Alexander A1 - Kallweit, Stephan A1 - Scholl, Ingrid T1 - Towards a mobile mapping robot for underground mines T2 - 7th Conference of Robotics and Mechatronics : RobMech 2014 : 27th and 28th Nov. 2014, Cape Town Y1 - 2014 SP - 1 EP - 6 ER - TY - CHAP A1 - Neth, Jannik A1 - Schuba, Marko A1 - Brodkorb, Karsten A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Digital forensics triage app for android T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator – without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format. KW - Android KW - Digital triage KW - Triage-app Y1 - 2023 SN - 9798400707728 U6 - https://doi.org/10.1145/3600160.3605017 N1 - ARES 2023: The 18th International Conference on Availability, Reliability and Security. August 29 - September 1, 2023. Benevento, Italy. PB - ACM ER - TY - CHAP A1 - Neugebauer, Georg A1 - Brutschy, Lucas A1 - Meyer, Ulrike A1 - Wetzel, Susanne ED - Garcia-Alfaro, Joaquin ED - Lioudakis, Georgios ED - Cuppens-Boulahia, Nora ED - Foley, Simon ED - Fitzgerald, William M. T1 - Privacy-preserving multi-party reconciliation secure in the malicious model T2 - DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security N2 - The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case. KW - Privacy-enhancing technologies KW - Secure multi-party computation KW - Cryptographic protocols KW - Zero-knowledge proofs KW - Malicious model Y1 - 2014 SN - 978-3-642-54567-2 (Print) SN - 978-3-642-54568-9 (Online) U6 - https://doi.org/10.1007/978-3-642-54568-9_12 N1 - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013. Part of the Lecture Notes in Computer Science book series (LNSC,volume 8247) SP - 178 EP - 193 PB - Springer CY - Berlin ER -