004 Informatik
Refine
Year of publication
Document Type
- Conference Proceeding (130)
- Article (33)
- Part of a Book (19)
- Report (15)
- Contribution to a Periodical (7)
- Other (3)
- Book (2)
- Doctoral Thesis (2)
- Master's Thesis (2)
- Part of Periodical (1)
Language
- English (146)
- German (67)
- Multiple languages (1)
Is part of the Bibliography
- no (214)
Keywords
- Intergenerational Collaboration (3)
- Intergenerational Innovation (3)
- Usability (3)
- Automotive HMI (2)
- Entrepreneurship (2)
- Positive Computing (2)
- Sentiment Analysis (2)
- intergenerational innovation (2)
- positive computing (2)
- Adolescents (1)
Institute
Practical application of object detection systems, in research or industry, favors highly optimized black box solutions. We show how such a highly optimized system can be further augmented in terms of its reliability with only a minimal increase of computation times, i.e. preserving realtime boundaries. Our solution leaves the initial (HOG-based) detector unchanged and introduces novel concepts of non-linear metrics and fusion of ROIs. In this context we also introduce a novel way of combining feature vectors for mean-shift grouping. We evaluate our approach on a standarized image database with a HOG detector, which is representative for practical applications. Our results show that the amount of false-positive detections can be reduced by a factor of 4 with a negligable complexity increase. Although introduced and applied to a HOG-based system, our approach can easily be adapted for different detectors.
The Bitcoin whitepaper states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of the system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing. We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.
Der Einsatz von virtuellen Servern im LDS NRW erfolgte bisher unter dem Blickwinkel der Konsolidierung von einfachen und sehr einfachen Systemen, die keine dedizierte Serversystemtechnik benötigten.
Mittlerweile bietet VMware Funktionalitäten, die neben dem Konsolidierungsgedanken hoch interessante Möglichkeiten für vielfältigste, individuelle Kundenanforderungen bieten. Dies reicht von flexiblen, preiswerten und einfachen
Systemen bis hin zu Serverplattformen mit hohen Ansprüchen an Performance und Verfügbarkeit.
This contribution demonstrates the efficient embedding of a single depth-camera into the automotive environment making mid-air gesture interaction for mobile applications viable in such a scenario. In this setting a new human-machine interface is implemented to give an idea of future improvements in automation processes in industrial applications. Our system is based on a data-driven approach by learning hand poses as well as gestures from a large database in order to apply them on mobile devices. We register any movement in a nearby driver area and crop data efficiently with the means of PCA transforming it into so-called feature vectors which present the input for our multi-layer perceptrons (MLPs). After MLP classification, the interpretation of user input is sent via WiFi to a tablet PC mounted into the car interior visualizing an infotainment system which the user is able to interact with. We demonstrate that by this setup hand gestures as well as hand poses are easily and efficiently interpretable insofar as that they become an intuitive and supplementary means of interaction for automotive HMI in mobile scenarios realizable in real-time.
In recent years, the number of reasonable powerful mobile devices increased. In 2011, the number of smartphones(e.g.)increased to more than 300 million units. A lot of research has already been conducted with respect of mobile devices acting as Cloud Service consumers, but
still not much effort is put on mobile devices in the role of Cloud Service providers. Therefore, this paper presents an approach that allows to utilize mobile devices like smart phones or tablets as Cloud Service providers. In order to make this a reasonable approach, some of the occurring problems are discussed and it is shown how the presented architecture is able to overcome these problems. Last
but not least, this paper
describes some performance
tests of the chosen implementa
tion for mobile Web Services.