TY - GEN A1 - Alibabaie, Najmeh A1 - Ghasemzadeh, Mohammad A1 - Meinel, Christoph T1 - A variant of genetic algorithm for non-homogeneous population T2 - International Conference Applied Mathematics, Computational Science and Systems Engineering 2016 N2 - Selection of initial points, the number of clusters and finding proper clusters centers are still the main challenge in clustering processes. In this paper, we suggest genetic algorithm based method which searches several solution spaces simultaneously. The solution spaces are population groups consisting of elements with similar structure. Elements in a group have the same size, while elements in different groups are of different sizes. The proposed algorithm processes the population in groups of chromosomes with one gene, two genes to k genes. These genes hold corresponding information about the cluster centers. In the proposed method, the crossover and mutation operators can accept parents with different sizes; this can lead to versatility in population and information transfer among sub-populations. We implemented the proposed method and evaluated its performance against some random datasets and the Ruspini dataset as well. The experimental results show that the proposed method could effectively determine the appropriate number of clusters and recognize their centers. Overall this research implies that using heterogeneous population in the genetic algorithm can lead to better results. Y1 - 2017 U6 - https://doi.org/10.1051/itmconf/20170902001 SN - 2271-2097 VL - 9 PB - EDP Sciences CY - Les Ulis ER - TY - GEN A1 - Bartz, Christian A1 - Yang, Haojin A1 - Bethge, Joseph A1 - Meinel, Christoph T1 - LoANs BT - Weakly Supervised Object Detection with Localizer Assessor Networks T2 - Computer Vision – ACCV 2018 Workshops N2 - Recently, deep neural networks have achieved remarkable performance on the task of object detection and recognition. The reason for this success is mainly grounded in the availability of large scale, fully annotated datasets, but the creation of such a dataset is a complicated and costly task. In this paper, we propose a novel method for weakly supervised object detection that simplifies the process of gathering data for training an object detector. We train an ensemble of two models that work together in a student-teacher fashion. Our student (localizer) is a model that learns to localize an object, the teacher (assessor) assesses the quality of the localization and provides feedback to the student. The student uses this feedback to learn how to localize objects and is thus entirely supervised by the teacher, as we are using no labels for training the localizer. In our experiments, we show that our model is very robust to noise and reaches competitive performance compared to a state-of-the-art fully supervised approach. We also show the simplicity of creating a new dataset, based on a few videos (e.g. downloaded from YouTube) and artificially generated data. Y1 - 2019 SN - 978-3-030-21074-8 SN - 978-3-030-21073-1 U6 - https://doi.org/10.1007/978-3-030-21074-8_29 SN - 0302-9743 SN - 1611-3349 VL - 11367 SP - 341 EP - 356 PB - Springer CY - Cham ER - TY - GEN A1 - Björk, Jennie A1 - Hölze, Katharina T1 - Editorial T2 - Creativity and innovation management Y1 - 2019 U6 - https://doi.org/10.1111/caim.12336 SN - 0963-1690 SN - 1467-8691 VL - 28 IS - 3 SP - 289 EP - 290 PB - Wiley CY - Hoboken ER - TY - GEN A1 - Florio, Alessandro A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Semantic-driven Visualization Techniques for Interactive Exploration of 3D Indoor Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - The availability of detailed virtual 3D building models including representations of indoor elements, allows for a wide number of applications requiring effective exploration and navigation functionality. Depending on the application context, users should be enabled to focus on specific Objects-of-Interests (OOIs) or important building elements. This requires approaches to filtering building parts as well as techniques to visualize important building objects and their relations. For it, this paper explores the application and combination of interactive rendering techniques as well as their semanticallydriven configuration in the context of 3D indoor models. KW - Building Information Models KW - BIM KW - Industry Foundation Classes KW - IFC KW - Interactive Visualization KW - Real-time Rendering Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00014 SN - 2375-0138 SN - 1550-6037 SP - 25 EP - 30 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Gawron, Marian A1 - Cheng, Feng A1 - Meinel, Christoph T1 - PVD: Passive Vulnerability Detection T2 - 8th International Conference on Information and Communication Systems (ICICS) N2 - The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses the existing information and eliminates the necessity of a comprehensive scan of the target system. Since our approach is able to identify vulnerabilities without the additional effort of a scan, we are able to increase the overall performance of the detection. Because of the reuse and the removal of the active testing procedures, our approach could be classified as a passive vulnerability detection. We will explain the approach and illustrate the additional possibility to increase the security awareness of users. Therefore, we applied the approach on an experimental setup and extracted security relevant information from web logs. Y1 - 2017 SN - 978-1-5090-4243-2 U6 - https://doi.org/10.1109/IACS.2017.7921992 SN - 2471-125X SP - 322 EP - 327 PB - IEEE CY - New York ER - TY - GEN A1 - Ghahremani, Sona A1 - Giese, Holger T1 - Performance evaluation for self-healing systems BT - Current Practice & Open Issues T2 - 2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W) N2 - Evaluating the performance of self-adaptive systems (SAS) is challenging due to their complexity and interaction with the often highly dynamic environment. In the context of self-healing systems (SHS), employing simulators has been shown to be the most dominant means for performance evaluation. Simulating a SHS also requires realistic fault injection scenarios. We study the state of the practice for evaluating the performance of SHS by means of a systematic literature review. We present the current practice and point out that a more thorough and careful treatment in evaluating the performance of SHS is required. KW - self-healing KW - failure profile KW - evaluation KW - simulator KW - performance Y1 - 2019 SN - 978-1-7281-2406-3 U6 - https://doi.org/10.1109/FAS-W.2019.00039 SP - 116 EP - 119 PB - IEEE CY - New York ER - TY - GEN A1 - Giese, Holger ED - Kouchnarenko, Olga ED - Khosravi, Ramtin T1 - Formal models and analysis for self-adaptive cyber-physical systems BT - (extended abstract) T2 - Lecture notes in computer science N2 - In this extended abstract, we will analyze the current challenges for the envisioned Self-Adaptive CPS. In addition, we will outline our results to approach these challenges with SMARTSOS [10] a generic approach based on extensions of graph transformation systems employing open and adaptive collaborations and models at runtime for trustworthy self-adaptation, self-organization, and evolution of the individual systems and the system-of-systems level taking the independent development, operation, management, and evolution of these systems into account. Y1 - 2017 SN - 978-3-319-57666-4 SN - 978-3-319-57665-7 U6 - https://doi.org/10.1007/978-3-319-57666-4_1 SN - 0302-9743 SN - 1611-3349 VL - 10231 SP - 3 EP - 9 PB - Springer CY - Cham ER - TY - GEN A1 - Giese, Holger Burkhard T1 - Software Engineering for Smart Cyber-Physical Systems BT - Challenges and Opportunities T2 - Proceedings of the 12th Innovations on Software Engineering Conference N2 - Currently, a transformation of our technical world into a networked technical world where besides the embedded systems with their interaction with the physical world the interconnection of these nodes in the cyber world becomes a reality can be observed. In parallel nowadays there is a strong trend to employ artificial intelligence techniques and in particular machine learning to make software behave smart. Often cyber-physical systems must be self-adaptive at the level of the individual systems to operate as elements in open, dynamic, and deviating overall structures and to adapt to open and dynamic contexts while being developed, operated, evolved, and governed independently. In this presentation, we will first discuss the envisioned future scenarios for cyber-physical systems with an emphasis on the synergies networking can offer and then characterize which challenges for the design, production, and operation of these systems result. We will then discuss to what extent our current capabilities, in particular concerning software engineering match these challenges and where substantial improvements for the software engineering are crucial. In today's software engineering for embedded systems models are used to plan systems upfront to maximize envisioned properties on the one hand and minimize cost on the other hand. When applying the same ideas to software for smart cyber-physical systems, it soon turned out that for these systems often somehow more subtle links between the involved models and the requirements, users, and environment exist. Self-adaptation and runtime models have been advocated as concepts to covers the demands that result from these subtler links. Lately, both trends have been brought together more thoroughly by the notion of self-aware computing systems. We will review the underlying causes, discuss some our work in this direction, and outline related open challenges and potential for future approaches to software engineering for smart cyber-physical systems. KW - Software Engineering KW - Cyber-Physical Systems KW - Self-aware computing systems Y1 - 2019 SN - 978-1-4503-6215-3 U6 - https://doi.org/10.1145/3299771.3301650 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Hernandez, Netzahualcoyotl A1 - Demiray, Burcu A1 - Arnrich, Bert A1 - Favela, Jesus T1 - An Exploratory Study to Detect Temporal Orientation Using Bluetooth's sensor T2 - PervasiveHealth'19: Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare N2 - Mobile sensing technology allows us to investigate human behaviour on a daily basis. In the study, we examined temporal orientation, which refers to the capacity of thinking or talking about personal events in the past and future. We utilise the mksense platform that allows us to use the experience-sampling method. Individual's thoughts and their relationship with smartphone's Bluetooth data is analysed to understand in which contexts people are influenced by social environments, such as the people they spend the most time with. As an exploratory study, we analyse social condition influence through a collection of Bluetooth data and survey information from participant's smartphones. Preliminary results show that people are likely to focus on past events when interacting with close-related people, and focus on future planning when interacting with strangers. Similarly, people experience present temporal orientation when accompanied by known people. We believe that these findings are linked to emotions since, in its most basic state, emotion is a state of physiological arousal combined with an appropriated cognition. In this contribution, we envision a smartphone application for automatically inferring human emotions based on user's temporal orientation by using Bluetooth sensors, we briefly elaborate on the influential factor of temporal orientation episodes and conclude with a discussion and lessons learned. KW - Mobile sensing KW - Temporal orientation KW - Social environment KW - Human behaviour KW - Bluetooth Y1 - 2019 SN - 978-1-4503-6126-2 U6 - https://doi.org/10.1145/3329189.3329223 SN - 2153-1633 SP - 292 EP - 297 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Herzog, Benedict A1 - Hönig, Timo A1 - Schröder-Preikschat, Wolfgang A1 - Plauth, Max A1 - Köhler, Sven A1 - Polze, Andreas T1 - Bridging the Gap BT - Energy-efficient Execution of Software Workloads on Heterogeneous Hardware Components T2 - e-Energy '19: Proceedings of the Tenth ACM International Conference on Future Energy Systems N2 - The recent restructuring of the electricity grid (i.e., smart grid) introduces a number of challenges for today's large-scale computing systems. To operate reliable and efficient, computing systems must adhere not only to technical limits (i.e., thermal constraints) but they must also reduce operating costs, for example, by increasing their energy efficiency. Efforts to improve the energy efficiency, however, are often hampered by inflexible software components that hardly adapt to underlying hardware characteristics. In this paper, we propose an approach to bridge the gap between inflexible software and heterogeneous hardware architectures. Our proposal introduces adaptive software components that dynamically adapt to heterogeneous processing units (i.e., accelerators) during runtime to improve the energy efficiency of computing systems. Y1 - 2019 SN - 978-1-4503-6671-7 U6 - https://doi.org/10.1145/3307772.3330176 SP - 428 EP - 430 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Hesse, Günter A1 - Matthies, Christoph A1 - Sinzig, Werner A1 - Uflacker, Matthias T1 - Adding Value by Combining Business and Sensor Data BT - an Industry 4.0 Use Case T2 - Database Systems for Advanced Applications N2 - Industry 4.0 and the Internet of Things are recent developments that have lead to the creation of new kinds of manufacturing data. Linking this new kind of sensor data to traditional business information is crucial for enterprises to take advantage of the data’s full potential. In this paper, we present a demo which allows experiencing this data integration, both vertically between technical and business contexts and horizontally along the value chain. The tool simulates a manufacturing company, continuously producing both business and sensor data, and supports issuing ad-hoc queries that answer specific questions related to the business. In order to adapt to different environments, users can configure sensor characteristics to their needs. KW - Industry 4.0 KW - Internet of Things KW - Data integration Y1 - 2019 SN - 978-3-030-18590-9 SN - 978-3-030-18589-3 U6 - https://doi.org/10.1007/978-3-030-18590-9_80 SN - 0302-9743 SN - 1611-3349 VL - 11448 SP - 528 EP - 532 PB - Springer CY - Cham ER - TY - GEN A1 - Limberger, Daniel A1 - Scheibel, Willy A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Mixed-projection treemaps BT - a novel approach mixing 2D and 2.5D treemaps T2 - 21st International Conference Information Visualisation (IV) N2 - This paper presents a novel technique for combining 2D and 2.5D treemaps using multi-perspective views to leverage the advantages of both treemap types. It enables a new form of overview+detail visualization for tree-structured data and contributes new concepts for real-time rendering of and interaction with treemaps. The technique operates by tilting the graphical elements representing inner nodes using affine transformations and animated state transitions. We explain how to mix orthogonal and perspective projections within a single treemap. Finally, we show application examples that benefit from the reduced interaction overhead. KW - Information Visualization KW - Overview plus Detail KW - Treemaps KW - 2.5D Treemaps KW - Multi-perspective Views Y1 - 2017 SN - 978-1-5386-0831-9 U6 - https://doi.org/10.1109/iV.2017.67 SN - 2375-0138 SP - 164 EP - 169 PB - Institute of Electrical and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Lorenz, Claas A1 - Kiekheben, Sebastian A1 - Schnor, Bettina T1 - FaVe: Modeling IPv6 firewalls for fast formal verification T2 - International Conference on Networked Systems (NetSys) 2017 N2 - As virtualization drives the automation of networking, the validation of security properties becomes more and more challenging eventually ruling out manual inspections. While formal verification in Software Defined Networks is provided by comprehensive tools with high speed reverification capabilities like NetPlumber for instance, the presence of middlebox functionality like firewalls is not considered. Also, they lack the ability to handle dynamic protocol elements like IPv6 extension header chains. In this work, we provide suitable modeling abstractions to enable both - the inclusion of firewalls and dynamic protocol elements. We exemplarily model the Linux ip6tables/netfilter packet filter and also provide abstractions for an application layer gateway. Finally, we present a prototype of our formal verification system FaVe. Y1 - 2017 U6 - https://doi.org/10.1109/NetSys.2017.7903956 PB - IEEE CY - New York ER - TY - GEN A1 - Malchow, Martin A1 - Renz, Jan A1 - Bauer, Matthias A1 - Meinel, Christoph T1 - Embedded smart home BT - remote lab grading in a MOOC with over 6000 participants T2 - 11th Annual IEEE International Systems Conference (SysCon) N2 - The popularity of MOOCs has increased considerably in the last years. A typical MOOC course consists of video content, self tests after a video and homework, which is normally in multiple choice format. After solving this homeworks for every week of a MOOC, the final exam certificate can be issued when the student has reached a sufficient score. There are also some attempts to include practical tasks, such as programming, in MOOCs for grading. Nevertheless, until now there is no known possibility to teach embedded system programming in a MOOC course where the programming can be done in a remote lab and where grading of the tasks is additionally possible. This embedded programming includes communication over GPIO pins to control LEDs and measure sensor values. We started a MOOC course called "Embedded Smart Home" as a pilot to prove the concept to teach real hardware programming in a MOOC environment under real life MOOC conditions with over 6000 students. Furthermore, also students with real hardware have the possibility to program on their own real hardware and grade their results in the MOOC course. Finally, we evaluate our approach and analyze the student acceptance of this approach to offer a course on embedded programming. We also analyze the hardware usage and working time of students solving tasks to find out if real hardware programming is an advantage and motivating achievement to support students learning success. Y1 - 2017 SN - 978-1-5090-4623-2 U6 - https://doi.org/10.1109/SYSCON.2017.7934728 SN - 1944-7620 SP - 195 EP - 200 PB - IEEE CY - New York ER - TY - GEN A1 - Marwecki, Sebastian A1 - Wilson, Andrew D. A1 - Ofek, Eyal A1 - Franco, Mar Gonzalez A1 - Holz, Christian T1 - Mise-Unseen BT - Using Eye-Tracking to Hide Virtual Reality Scene Changes in Plain Sight T2 - UIST '19: Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology N2 - Creating or arranging objects at runtime is needed in many virtual reality applications, but such changes are noticed when they occur inside the user's field of view. We present Mise-Unseen, a software system that applies such scene changes covertly inside the user's field of view. Mise-Unseen leverages gaze tracking to create models of user attention, intention, and spatial memory to determine if and when to inject a change. We present seven applications of Mise-Unseen to unnoticeably modify the scene within view (i) to hide that task difficulty is adapted to the user, (ii) to adapt the experience to the user's preferences, (iii) to time the use of low fidelity effects, (iv) to detect user choice for passive haptics even when lacking physical props, (v) to sustain physical locomotion despite a lack of physical space, (vi) to reduce motion sickness during virtual locomotion, and (vii) to verify user understanding during story progression. We evaluated Mise-Unseen and our applications in a user study with 15 participants and find that while gaze data indeed supports obfuscating changes inside the field of view, a change is rendered unnoticeably by using gaze in combination with common masking techniques. KW - Eye-tracking KW - virtual reality KW - change blindness KW - inattentional blindness KW - staging Y1 - 2019 SN - 978-1-4503-6816-2 U6 - https://doi.org/10.1145/3332165.3347919 SP - 777 EP - 789 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Perscheid, Cindy A1 - Uflacker, Matthias T1 - Integrating Biological Context into the Analysis of Gene Expression Data T2 - Distributed Computing and Artificial Intelligence, Special Sessions, 15th International Conference N2 - High-throughput RNA sequencing produces large gene expression datasets whose analysis leads to a better understanding of diseases like cancer. The nature of RNA-Seq data poses challenges to its analysis in terms of its high dimensionality, noise, and complexity of the underlying biological processes. Researchers apply traditional machine learning approaches, e. g. hierarchical clustering, to analyze this data. Until it comes to validation of the results, the analysis is based on the provided data only and completely misses the biological context. However, gene expression data follows particular patterns - the underlying biological processes. In our research, we aim to integrate the available biological knowledge earlier in the analysis process. We want to adapt state-of-the-art data mining algorithms to consider the biological context in their computations and deliver meaningful results for researchers. KW - Gene expression KW - Machine learning KW - Feature selection KW - Association rule mining KW - Biclustering KW - Knowledge bases Y1 - 2019 SN - 978-3-319-99608-0 SN - 978-3-319-99607-3 U6 - https://doi.org/10.1007/978-3-319-99608-0_41 SN - 2194-5357 SN - 2194-5365 VL - 801 SP - 339 EP - 343 PB - Springer CY - Cham ER - TY - GEN A1 - Plauth, Max A1 - Sterz, Christoph A1 - Eberhardt, Felix A1 - Feinbube, Frank A1 - Polze, Andreas T1 - Assessing NUMA performance based on hardware event counters T2 - IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) N2 - Cost models play an important role for the efficient implementation of software systems. These models can be embedded in operating systems and execution environments to optimize execution at run time. Even though non-uniform memory access (NUMA) architectures are dominating today's server landscape, there is still a lack of parallel cost models that represent NUMA system sufficiently. Therefore, the existing NUMA models are analyzed, and a two-step performance assessment strategy is proposed that incorporates low-level hardware counters as performance indicators. To support the two-step strategy, multiple tools are developed, all accumulating and enriching specific hardware event counter information, to explore, measure, and visualize these low-overhead performance indicators. The tools are showcased and discussed alongside specific experiments in the realm of performance assessment. KW - Parallel programming KW - Performance analysis KW - Memory management Y1 - 2017 SN - 978-0-7695-6149-3 U6 - https://doi.org/10.1109/IPDPSW.2017.51 SN - 2164-7062 SP - 904 EP - 913 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - GEN A1 - Podlesny, Nikolai Jannik A1 - Kayem, Anne V. D. M. A1 - Meinel, Christoph T1 - Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymisation T2 - Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy N2 - High-dimensional data is particularly useful for data analytics research. In the healthcare domain, for instance, high-dimensional data analytics has been used successfully for drug discovery. Yet, in order to adhere to privacy legislation, data analytics service providers must guarantee anonymity for data owners. In the context of high-dimensional data, ensuring privacy is challenging because increased data dimensionality must be matched by an exponential growth in the size of the data to avoid sparse datasets. Syntactically, anonymising sparse datasets with methods that rely of statistical significance, makes obtaining sound and reliable results, a challenge. As such, strong privacy is only achievable at the cost of high information loss, rendering the data unusable for data analytics. In this paper, we make two contributions to addressing this problem from both the privacy and information loss perspectives. First, we show that by identifying dependencies between attribute subsets we can eliminate privacy violating attributes from the anonymised dataset. Second, to minimise information loss, we employ a greedy search algorithm to determine and eliminate maximal partial unique attribute combinations. Thus, one only needs to find the minimal set of identifying attributes to prevent re-identification. Experiments on a health cloud based on the SAP HANA platform using a semi-synthetic medical history dataset comprised of 109 attributes, demonstrate the effectiveness of our approach. Y1 - 2019 SN - 978-1-4503-6099-9 U6 - https://doi.org/10.1145/3292006.3300019 SP - 109 EP - 119 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Roumen, Thijs A1 - Shigeyama, Jotaro A1 - Rudolph, Julius Cosmo Romeo A1 - Grzelka, Felix A1 - Baudisch, Patrick T1 - SpringFit BT - Joints and mounts that fabricate on any laser cutter T2 - User Interface Software and Technology N2 - Joints are crucial to laser cutting as they allow making three-dimensional objects; mounts are crucial because they allow embedding technical components, such as motors. Unfortunately, mounts and joints tend to fail when trying to fabricate a model on a different laser cutter or from a different material. The reason for this lies in the way mounts and joints hold objects in place, which is by forcing them into slightly smaller openings. Such "press fit" mechanisms unfortunately are susceptible to the small changes in diameter that occur when switching to a machine that removes more or less material ("kerf"), as well as to changes in stiffness, as they occur when switching to a different material. We present a software tool called springFit that resolves this problem by replacing the problematic press fit-based mounts and joints with what we call cantilever-based mounts and joints. A cantilever spring is simply a long thin piece of material that pushes against the object to be held. Unlike press fits, cantilever springs are robust against variations in kerf and material; they can even handle very high variations, simply by using longer springs. SpringFit converts models in the form of 2D cutting plans by replacing all contained mounts, notch joints, finger joints, and t-joints. In our technical evaluation, we used springFit to convert 14 models downloaded from the web. KW - Laser cutting KW - fabrication KW - portability KW - reuse Y1 - 2019 SN - 978-1-4503-6816-2 U6 - https://doi.org/10.1145/3332165.3347930 SP - 727 EP - 738 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Schneider, Oliver A1 - Shigeyama, Jotaro A1 - Kovacs, Robert A1 - Roumen, Thijs Jan A1 - Marwecki, Sebastian A1 - Böckhoff, Nico A1 - Glöckner, Daniel Amadeus Johannes A1 - Bounama, Jonas A1 - Baudisch, Patrick T1 - DualPanto BT - a haptic device that enables blind users to continuously interact with virtual worlds T2 - UIST '18: Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology N2 - We present a new haptic device that enables blind users to continuously track the absolute position of moving objects in spatial virtual environments, as is the case in sports or shooter games. Users interact with DualPanto by operating the me handle with one hand and by holding on to the it handle with the other hand. Each handle is connected to a pantograph haptic input/output device. The key feature is that the two handles are spatially registered with respect to each other. When guiding their avatar through a virtual world using the me handle, spatial registration enables users to track moving objects by having the device guide the output hand. This allows blind players of a 1-on-1 soccer game to race for the ball or evade an opponent; it allows blind players of a shooter game to aim at an opponent and dodge shots. In our user study, blind participants reported very high enjoyment when using the device to play (6.5/7). KW - Haptics KW - force-feedback KW - accessibility KW - blind KW - visually impaired KW - gaming Y1 - 2018 SN - 978-1-4503-5948-1 U6 - https://doi.org/10.1145/3242587.3242604 SP - 877 EP - 887 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Seidel, Felix A1 - Krentz, Konrad-Felix A1 - Meinel, Christoph T1 - Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers T2 - 2019 IEEE 5th World Forum on Internet of Things (WF-IoT) N2 - Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at depriving victim devices of entering low-power sleep modes. For example, a denial-of-sleep attack against an IoT device that runs a CoAP server is to send plenty of CoAP messages to it, thereby forcing the IoT device to expend energy for receiving and processing these CoAP messages. All current security solutions for CoAP, namely Datagram Transport Layer Security (DTLS), IPsec, and OSCORE, fail to prevent such attacks. To fill this gap, Seitz et al. proposed a method for filtering out inauthentic and replayed CoAP messages "en-route" on 6LoWPAN border routers. In this paper, we expand on Seitz et al.'s proposal in two ways. First, we revise Seitz et al.'s software architecture so that 6LoWPAN border routers can not only check the authenticity and freshness of CoAP messages, but can also perform a wide range of further checks. Second, we propose a couple of such further checks, which, as compared to Seitz et al.'s original checks, more reliably protect IoT devices that run CoAP servers from remote denial-of-sleep attacks, as well as from remote exploits. We prototyped our solution and successfully tested its compatibility with Contiki-NG's CoAP implementation. Y1 - 2019 SN - 978-1-5386-4980-0 SN - 978-1-5386-4981-7 U6 - https://doi.org/10.1109/WF-IoT.2019.8767262 SP - 201 EP - 206 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - GEN A1 - Serth, Sebastian A1 - Podlesny, Nikolai A1 - Bornstein, Marvin A1 - Lindemann, Jan A1 - Latt, Johanna A1 - Selke, Jan A1 - Schlosser, Rainer A1 - Boissier, Martin A1 - Uflacker, Matthias T1 - An interactive platform to simulate dynamic pricing competition on online marketplaces T2 - 2017 IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC) N2 - E-commerce marketplaces are highly dynamic with constant competition. While this competition is challenging for many merchants, it also provides plenty of opportunities, e.g., by allowing them to automatically adjust prices in order to react to changing market situations. For practitioners however, testing automated pricing strategies is time-consuming and potentially hazardously when done in production. Researchers, on the other side, struggle to study how pricing strategies interact under heavy competition. As a consequence, we built an open continuous time framework to simulate dynamic pricing competition called Price Wars. The microservice-based architecture provides a scalable platform for large competitions with dozens of merchants and a large random stream of consumers. Our platform stores each event in a distributed log. This allows to provide different performance measures enabling users to compare profit and revenue of various repricing strategies in real-time. For researchers, price trajectories are shown which ease evaluating mutual price reactions of competing strategies. Furthermore, merchants can access historical marketplace data and apply machine learning. By providing a set of customizable, artificial merchants, users can easily simulate both simple rule-based strategies as well as sophisticated data-driven strategies using demand learning to optimize their pricing strategies. Y1 - 2017 SN - 978-1-5090-3045-3 U6 - https://doi.org/10.1109/EDOC.2017.17 SN - 2325-6354 SP - 61 EP - 66 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - GEN A1 - Sianipar, Johannes Harungguan A1 - Willems, Christian A1 - Meinel, Christoph T1 - Virtual machine integrity verification in Crowd-Resourcing Virtual Laboratory T2 - 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA) N2 - In cloud computing, users are able to use their own operating system (OS) image to run a virtual machine (VM) on a remote host. The virtual machine OS is started by the user using some interfaces provided by a cloud provider in public or private cloud. In peer to peer cloud, the VM is started by the host admin. After the VM is running, the user could get a remote access to the VM to install, configure, and run services. For the security reasons, the user needs to verify the integrity of the running VM, because a malicious host admin could modify the image or even replace the image with a similar image, to be able to get sensitive data from the VM. We propose an approach to verify the integrity of a running VM on a remote host, without using any specific hardware such as Trusted Platform Module (TPM). Our approach is implemented on a Linux platform where the kernel files (vmlinuz and initrd) could be replaced with new files, while the VM is running. kexec is used to reboot the VM with the new kernel files. The new kernel has secret codes that will be used to verify whether the VM was started using the new kernel files. The new kernel is used to further measuring the integrity of the running VM. KW - Virtual Machine KW - Integrity Verification KW - Crowd-Resourcing KW - Cloud Computing Y1 - 2019 SN - 978-1-5386-9133-5 U6 - https://doi.org/10.1109/SOCA.2018.00032 SN - 2163-2871 SP - 169 EP - 176 PB - IEEE CY - New York ER - TY - GEN A1 - Staubitz, Thomas A1 - Wilkins, Christian A1 - Hagedorn, Christiane A1 - Meinel, Christoph T1 - The Gamification of a MOOC Platform T2 - Proceedings of 2017 IEEE Global Engineering Education Conference (EDUCON) N2 - Massive Open Online Courses (MOOCs) have left their mark on the face of education during the recent years. At the Hasso Plattner Institute (HPI) in Potsdam, Germany, we are actively developing a MOOC platform, which provides our research with a plethora of e-learning topics, such as learning analytics, automated assessment, peer assessment, team-work, online proctoring, and gamification. We run several instances of this platform. On openHPI, we provide our own courses from within the HPI context. Further instances are openSAP, openWHO, and mooc.HOUSE, which is the smallest of these platforms, targeting customers with a less extensive course portfolio. In 2013, we started to work on the gamification of our platform. By now, we have implemented about two thirds of the features that we initially have evaluated as useful for our purposes. About a year ago we activated the implemented gamification features on mooc.HOUSE. Before activating the features on openHPI as well, we examined, and re-evaluated our initial considerations based on the data we collected so far and the changes in other contexts of our platforms. KW - MOOC KW - Gamification KW - e-learning KW - Massive Open Online Courses Y1 - 2017 SN - 978-1-5090-5467-1 U6 - https://doi.org/10.1109/EDUCON.2017.7942952 SN - 2165-9567 SP - 883 EP - 892 PB - IEEE CY - New York ER - TY - GEN A1 - Stojanovic, Vladeta A1 - Trapp, Matthias A1 - Richter, Rico A1 - Döllner, Jürgen Roland Friedrich T1 - A service-oriented approach for classifying 3D points clouds by example of office furniture classification T2 - Web3D 2018: Proceedings of the 23rd International ACM Conference on 3D Web Technology N2 - The rapid digitalization of the Facility Management (FM) sector has increased the demand for mobile, interactive analytics approaches concerning the operational state of a building. These approaches provide the key to increasing stakeholder engagement associated with Operation and Maintenance (O&M) procedures of living and working areas, buildings, and other built environment spaces. We present a generic and fast approach to process and analyze given 3D point clouds of typical indoor office spaces to create corresponding up-to-date approximations of classified segments and object-based 3D models that can be used to analyze, record and highlight changes of spatial configurations. The approach is based on machine-learning methods used to classify the scanned 3D point cloud data using 2D images. This approach can be used to primarily track changes of objects over time for comparison, allowing for routine classification, and presentation of results used for decision making. We specifically focus on classification, segmentation, and reconstruction of multiple different object types in a 3D point-cloud scene. We present our current research and describe the implementation of these technologies as a web-based application using a services-oriented methodology. KW - Indoor Models KW - 3D Point Clouds KW - Machine KW - Learning KW - BIM KW - Service-Oriented Y1 - 2018 SN - 978-1-4503-5800-2 U6 - https://doi.org/10.1145/3208806.3208810 SP - 1 EP - 9 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Sukmana, Muhammad Ihsan Haikal A1 - Torkura, Kennedy A. A1 - Graupner, Hendrik A1 - Cheng, Feng A1 - Meinel, Christoph T1 - Unified Cloud Access Control Model for Cloud Storage Broker T2 - 33rd International Conference on Information Networking (ICOIN 2019) N2 - Cloud Storage Broker (CSB) provides value-added cloud storage service for enterprise usage by leveraging multi-cloud storage architecture. However, it raises several challenges for managing resources and its access control in multiple Cloud Service Providers (CSPs) for authorized CSB stakeholders. In this paper we propose unified cloud access control model that provides the abstraction of CSP's services for centralized and automated cloud resource and access control management in multiple CSPs. Our proposal offers role-based access control for CSB stakeholders to access cloud resources by assigning necessary privileges and access control list for cloud resources and CSB stakeholders, respectively, following privilege separation concept and least privilege principle. We implement our unified model in a CSB system called CloudRAID for Business (CfB) with the evaluation result shows it provides system-and-cloud level security service for cfB and centralized resource and access control management in multiple CSPs. KW - Cloud Storage Broker KW - Cloud access control and resource management KW - Unified cloud model KW - Privilege separation concept KW - Least privilege principle KW - Role-based access control Y1 - 2019 SN - 978-1-5386-8350-7 U6 - https://doi.org/10.1109/ICOIN.2019.8717982 SN - 1976-7684 SP - 60 EP - 65 PB - IEEE CY - Los Alamitos ER - TY - GEN A1 - Tang, Mitchell A1 - Nakamoto, Carter H. A1 - Stern, Ariel Dora A1 - Mehrotra, Ateev T1 - Trends in remote patient monitoring use in traditional medicare T2 - JAMA internal medicine Y1 - 2022 U6 - https://doi.org/10.1001/jamainternmed.2022.3043 SN - 2168-6106 SN - 2168-6114 VL - 182 IS - 9 SP - 1005 EP - 1006 PB - American Medical Association CY - Chicago, Ill. ER - TY - GEN A1 - Torkura, Kennedy A. A1 - Sukmana, Muhammad Ihsan Haikal A1 - Cheng, Feng A1 - Meinel, Christoph T1 - Leveraging cloud native design patterns for security-as-a-service applications T2 - IEEE International Conference on Smart Cloud (SmartCloud) N2 - This paper discusses a new approach for designing and deploying Security-as-a-Service (SecaaS) applications using cloud native design patterns. Current SecaaS approaches do not efficiently handle the increasing threats to computer systems and applications. For example, requests for security assessments drastically increase after a high-risk security vulnerability is disclosed. In such scenarios, SecaaS applications are unable to dynamically scale to serve requests. A root cause of this challenge is employment of architectures not specifically fitted to cloud environments. Cloud native design patterns resolve this challenge by enabling certain properties e.g. massive scalability and resiliency via the combination of microservice patterns and cloud-focused design patterns. However adopting these patterns is a complex process, during which several security issues are introduced. In this work, we investigate these security issues, we redesign and deploy a monolithic SecaaS application using cloud native design patterns while considering appropriate, layered security counter-measures i.e. at the application and cloud networking layer. Our prototype implementation out-performs traditional, monolithic applications with an average Scanner Time of 6 minutes, without compromising security. Our approach can be employed for designing secure, scalable and performant SecaaS applications that effectively handle unexpected increase in security assessment requests. KW - Cloud-Security KW - Security-as-a-Service KW - Vulnerability Assessment KW - Cloud Native Applications Y1 - 2017 SN - 978-1-5386-3684-8 U6 - https://doi.org/10.1109/SmartCloud.2017.21 SP - 90 EP - 97 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - GEN A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich ED - Banissi, E Ursyn T1 - Interactive Close-Up Rendering for Detail plus Overview Visualization of 3D Digital Terrain Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - This paper presents an interactive rendering technique for detail+overview visualization of 3D digital terrain models using interactive close-ups. A close-up is an alternative presentation of input data varying with respect to geometrical scale, mapping, appearance, as well as Level-of-Detail (LOD) and Level-of-Abstraction (LOA) used. The presented 3D close-up approach enables in-situ comparison of multiple Regionof-Interests (ROIs) simultaneously. We describe a GPU-based rendering technique for the image-synthesis of multiple close-ups in real-time. KW - Terrain Visualization KW - Detail plus Overview KW - Close-Up KW - Coordinated and Multiple Views Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00053 SN - 2375-0138 SN - 1550-6037 SP - 275 EP - 280 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Real-time Screen-space Geometry Draping for 3D Digital Terrain Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - A fundamental task in 3D geovisualization and GIS applications is the visualization of vector data that can represent features such as transportation networks or land use coverage. Mapping or draping vector data represented by geometric primitives (e.g., polylines or polygons) to 3D digital elevation or 3D digital terrain models is a challenging task. We present an interactive GPU-based approach that performs geometry-based draping of vector data on per-frame basis using an image-based representation of a 3D digital elevation or terrain model only. KW - Geometry Draping KW - Geovisualization KW - GPU-based Real-time Rendering Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00054 SN - 2375-0138 SN - 1550-6037 SP - 281 EP - 286 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER -