Refine
Year of publication
- 2014 (43) (remove)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (43) (remove)
Document Type
- Article (13)
- Conference Proceeding (13)
- Report (6)
- Book (4)
- Part of a Book (3)
- Other (2)
- Video (1)
- Patent (1)
Keywords
RGB-D sensors such as the Microsoft Kinect or the Asus Xtion are inexpensive 3D sensors. A depth image is computed by calculating the distortion of a known infrared light (IR) pattern which is projected into the scene. While these sensors are great devices they have some limitations. The distance they can measure is limited and they suffer from reflection problems on transparent, shiny, or very matte and absorbing objects. If more than one RGB-D camera is used the IR patterns interfere with each other. This results in a massive loss of depth information. In this paper, we present a simple and powerful method to overcome these problems. We propose a stereo RGB-D camera system which uses the pros of RGB-D cameras and combine them with the pros of stereo camera systems. The idea is to utilize the IR images of each two sensors as a stereo pair to generate a depth map. The IR patterns emitted by IR projectors are exploited here to enhance the dense stereo matching even if the observed objects or surfaces are texture-less or transparent. The resulting disparity map is then fused with the depth map offered by the RGB-D sensor to fill the regions and the holes that appear because of interference, or due to transparent or reflective objects. Our results show that the density of depth information is increased especially for transparent, shiny or matte objects.
The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.
Mobile Anwendungen nehmen mit der Verbreitung von Smartphones zu. Die Akzeptanz der Nutzer bestimmt den Erfolg solcher mobiler Applikationen dabei maßgeblich. Um diese Anerkennung zu schaffen, ist eine möglichst hohe Gebrauchstauglichkeit, auch Usability genannt, notwendig. Die Informationsbroschüre „Prototyping zur Verbesserung der Benutzerfreundlichkeit mobiler Software“ richtet sich an Personen, die an der Gestaltung und entwicklung von (mobiler) Software beteiligt sind. In dieser Broschüre werden mögliche Potenziale im Bereich einer effizienten und benutzerzentrierten Software-Entwicklung aufgezeigt.