TY - GEN A1 - Vasishth, Shravan A1 - Mertzen, Daniela A1 - Jäger, Lena Ann A1 - Gelman, Andrew T1 - Corrigendum to: Shravan Vasishth, Daniela Mertzen, Lena A. Jäger, Andrew Gelman; The statistical significance filter leads to overoptimistic expectations of replicability. - Journal of Memory and Language. - 103 (2018), pg. 151 - 175 T2 - Journal of memory and language Y1 - 2018 U6 - https://doi.org/10.1016/j.jml.2018.09.004 SN - 0749-596X SN - 1096-0821 VL - 104 SP - 128 EP - 128 PB - Elsevier CY - San Diego ER - TY - GEN A1 - Ullrich, Andre A1 - Enke, Judith A1 - Teichmann, Malte A1 - Kress, Antonio A1 - Gronau, Norbert T1 - Audit - and then what? BT - a roadmap for digitization of learning factories T2 - Procedia Manufacturing N2 - Current trends such as digital transformation, Internet of Things, or Industry 4.0 are challenging the majority of learning factories. Regardless of whether a conventional learning factory, a model factory, or a digital learning factory, traditional approaches such as the monotonous execution of specific instructions don‘t suffice the learner’s needs, market requirements as well as especially current technological developments. Contemporary teaching environments need a clear strategy, a road to follow for being able to successfully cope with the changes and develop towards digitized learning factories. This demand driven necessity of transformation leads to another obstacle: Assessing the status quo and developing and implementing adequate action plans. Within this paper, details of a maturity-based audit of the hybrid learning factory in the Research and Application Centre Industry 4.0 and a thereof derived roadmap for the digitization of a learning factory are presented. KW - Audit KW - Digitization KW - Learning Factory KW - Roadmap Y1 - 2019 U6 - https://doi.org/10.1016/j.promfg.2019.03.025 SN - 2351-9789 VL - 31 SP - 162 EP - 168 PB - Elsevier CY - Amsterdam ER - TY - GEN A1 - Uhlig, Katja A1 - Gehre, Christian P. A1 - Kammerer, Sarah A1 - Küpper, Jan-Heiner A1 - Coleman, Charles Dominic A1 - Püschel, Gerhard Paul A1 - Duschl, Claus T1 - Real-time monitoring of oxygen consumption of hepatocytes in a microbioreactor T2 - Toxicology letters Y1 - 2018 U6 - https://doi.org/10.1016/j.toxlet.2018.06.652 SN - 0378-4274 SN - 1879-3169 VL - 295 SP - S115 EP - S115 PB - Elsevier CY - Clare ER - TY - GEN A1 - Turner, Bryan S. A1 - Contreras-Vejar, Yuri T1 - Introduction BT - Reflections on regimes of happiness T2 - Regimes of happiness : comparative and historical studies N2 - This book started as a conversation about successful societies and human development. It was originally based on a simple idea— it would be unusual if, in a society that might be reasonably deemed as successful, its citizens were deeply unhappy. This combination— successful societies and happy citizens— raised immediate and obvious problems. How might one define “success” when dealing, for example, with a society as large and as complex as the United States? We ran into equally major problems when trying to understand “happiness.” Yet one constantly hears political analysts talking about the success or failure of various democratic institutions. In ordinary conversations one constantly hears people talking about being happy or unhappy. In the everyday world, conversations about living in a successful society or about being happy do not appear to cause bewilderment or confusion. “Ordinary people” do not appear to find questions like— is your school successful or are you happily married?— meaningless or absurd. Yet, in the social sciences, both “successful societies” and “happy lives” are seen to be troublesome. As our research into happiness and success unfolded, the conundrums we discussed were threefold: societal conditions, measurements and concepts. What are the key social factors that are indispensable for the social and political stability of any given society? Is it possible to develop precise measures of social success that would give us reliable data? There are a range of economic indicators that might be associated with success, such as labor productivity, economic growth rates, low inflation and a robust GDP. Are there equally reliable political and social measures of a successful society and human happiness? For example, rule of law and the absence of large- scale corruption might be relevant to the assessment of societal happiness. These questions about success led us inexorably to what seems to be a futile notion: happiness. Economic variables such as income or psychological measures of well- being in terms of mental health could be easily analyzed; however, happiness is a dimension that has been elusive to the social sciences. In our unfolding conversation, there was also another stream of thought, namely that the social sciences appeared to be more open to the study of human unhappiness rather than happiness. Y1 - 2019 SN - 978-1-78308-886-7 SN - 978-1-78308-885-0 SP - 1 EP - 8 PB - Anthem Press CY - London ER - TY - GEN A1 - Troll, K. A1 - Kulkarni, Amit A1 - Wang, W. A1 - Darko, C. A1 - Koumba, A. M. Bivigou A1 - Laschewsky, André A1 - Müller-Buschbaum, Peter A1 - Papadakis, Christine M. T1 - The collapse transition of poly(styrene-b-(N-isopropyl acrylamide)) diblock copolymers in aqueous solution and in thin films T2 - Colloid and polymer science : official journal of the Kolloid-Gesellschaft Y1 - 2011 U6 - https://doi.org/10.1007/s00396-010-2344-1 SN - 0303-402X VL - 289 IS - 2 SP - 227 EP - 227 PB - Springer CY - New York ER - TY - GEN A1 - Tristram, Hildegard L. C. T1 - Annotated Bibliography of English Studies (ABES), vol. 109: The Celtic Englishes N2 - This file contains 200 bibliographical entries on the most important publications in the field of the 'Celtic Englishes' with full summary of contents and classification of the varieties concerned (Irish English, Scottish English, Manx English, Welsh English, and Cornu-English). Y1 - 1997 UR - http://abes.tandf.co.uk/abes/ ER - TY - GEN A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich ED - Banissi, E Ursyn T1 - Interactive Close-Up Rendering for Detail plus Overview Visualization of 3D Digital Terrain Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - This paper presents an interactive rendering technique for detail+overview visualization of 3D digital terrain models using interactive close-ups. A close-up is an alternative presentation of input data varying with respect to geometrical scale, mapping, appearance, as well as Level-of-Detail (LOD) and Level-of-Abstraction (LOA) used. The presented 3D close-up approach enables in-situ comparison of multiple Regionof-Interests (ROIs) simultaneously. We describe a GPU-based rendering technique for the image-synthesis of multiple close-ups in real-time. KW - Terrain Visualization KW - Detail plus Overview KW - Close-Up KW - Coordinated and Multiple Views Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00053 SN - 2375-0138 SN - 1550-6037 SP - 275 EP - 280 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Real-time Screen-space Geometry Draping for 3D Digital Terrain Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - A fundamental task in 3D geovisualization and GIS applications is the visualization of vector data that can represent features such as transportation networks or land use coverage. Mapping or draping vector data represented by geometric primitives (e.g., polylines or polygons) to 3D digital elevation or 3D digital terrain models is a challenging task. We present an interactive GPU-based approach that performs geometry-based draping of vector data on per-frame basis using an image-based representation of a 3D digital elevation or terrain model only. KW - Geometry Draping KW - Geovisualization KW - GPU-based Real-time Rendering Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00054 SN - 2375-0138 SN - 1550-6037 SP - 281 EP - 286 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Torkura, Kennedy A. A1 - Sukmana, Muhammad Ihsan Haikal A1 - Strauss, Tim A1 - Graupner, Hendrik A1 - Cheng, Feng A1 - Meinel, Christoph T1 - CSBAuditor BT - proactive security risk analysis for cloud storage broker systems T2 - 17th International Symposium on Network Computing and Applications (NCA) N2 - Cloud Storage Brokers (CSB) provide seamless and concurrent access to multiple Cloud Storage Services (CSS) while abstracting cloud complexities from end-users. However, this multi-cloud strategy faces several security challenges including enlarged attack surfaces, malicious insider threats, security complexities due to integration of disparate components and API interoperability issues. Novel security approaches are imperative to tackle these security issues. Therefore, this paper proposes CSBAuditor, a novel cloud security system that continuously audits CSB resources, to detect malicious activities and unauthorized changes e.g. bucket policy misconfigurations, and remediates these anomalies. The cloud state is maintained via a continuous snapshotting mechanism thereby ensuring fault tolerance. We adopt the principles of chaos engineering by integrating Broker Monkey, a component that continuously injects failure into our reference CSB system, Cloud RAID. Hence, CSBAuditor is continuously tested for efficiency i.e. its ability to detect the changes injected by Broker Monkey. CSBAuditor employs security metrics for risk analysis by computing severity scores for detected vulnerabilities using the Common Configuration Scoring System, thereby overcoming the limitation of insufficient security metrics in existing cloud auditing schemes. CSBAuditor has been tested using various strategies including chaos engineering failure injection strategies. Our experimental evaluation validates the efficiency of our approach against the aforementioned security issues with a detection and recovery rate of over 96 %. KW - Cloud-Security KW - Cloud Audit KW - Security Metrics KW - Security Risk Assessment KW - Secure Configuration Y1 - 2018 SN - 978-1-5386-7659-2 U6 - https://doi.org/10.1109/NCA.2018.8548329 PB - IEEE CY - New York ER - TY - GEN A1 - Torkura, Kennedy A. A1 - Sukmana, Muhammad Ihsan Haikal A1 - Meinig, Michael A1 - Kayem, Anne V. D. M. A1 - Cheng, Feng A1 - Meinel, Christoph A1 - Graupner, Hendrik T1 - Securing cloud storage brokerage systems through threat models T2 - Proceedings IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) N2 - Cloud storage brokerage is an abstraction aimed at providing value-added services. However, Cloud Service Brokers are challenged by several security issues including enlarged attack surfaces due to integration of disparate components and API interoperability issues. Therefore, appropriate security risk assessment methods are required to identify and evaluate these security issues, and examine the efficiency of countermeasures. A possible approach for satisfying these requirements is employment of threat modeling concepts, which have been successfully applied in traditional paradigms. In this work, we employ threat models including attack trees, attack graphs and Data Flow Diagrams against a Cloud Service Broker (CloudRAID) and analyze these security threats and risks. Furthermore, we propose an innovative technique for combining Common Vulnerability Scoring System (CVSS) and Common Configuration Scoring System (CCSS) base scores in probabilistic attack graphs to cater for configuration-based vulnerabilities which are typically leveraged for attacking cloud storage systems. This approach is necessary since existing schemes do not provide sufficient security metrics, which are imperatives for comprehensive risk assessments. We demonstrate the efficiency of our proposal by devising CCSS base scores for two common attacks against cloud storage: Cloud Storage Enumeration Attack and Cloud Storage Exploitation Attack. These metrics are then used in Attack Graph Metric-based risk assessment. Our experimental evaluation shows that our approach caters for the aforementioned gaps and provides efficient security hardening options. Therefore, our proposals can be employed to improve cloud security. KW - Cloud-Security KW - Threat Models KW - Security Metrics KW - Security Risk Assessment KW - Secure Configuration Y1 - 2018 SN - 978-1-5386-2195-0 U6 - https://doi.org/10.1109/AINA.2018.00114 SN - 1550-445X SP - 759 EP - 768 PB - IEEE CY - New York ER - TY - GEN A1 - Torkura, Kennedy A. A1 - Sukmana, Muhammad Ihsan Haikal A1 - Kayem, Anne V. D. M. A1 - Cheng, Feng A1 - Meinel, Christoph T1 - A cyber risk based moving target defense mechanism for microservice architectures T2 - IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom) N2 - Microservice Architectures (MSA) structure applications as a collection of loosely coupled services that implement business capabilities. The key advantages of MSA include inherent support for continuous deployment of large complex applications, agility and enhanced productivity. However, studies indicate that most MSA are homogeneous, and introduce shared vulnerabilites, thus vulnerable to multi-step attacks, which are economics-of-scale incentives to attackers. In this paper, we address the issue of shared vulnerabilities in microservices with a novel solution based on the concept of Moving Target Defenses (MTD). Our mechanism works by performing risk analysis against microservices to detect and prioritize vulnerabilities. Thereafter, security risk-oriented software diversification is employed, guided by a defined diversification index. The diversification is performed at runtime, leveraging both model and template based automatic code generation techniques to automatically transform programming languages and container images of the microservices. Consequently, the microservices attack surfaces are altered thereby introducing uncertainty for attackers while reducing the attackability of the microservices. Our experiments demonstrate the efficiency of our solution, with an average success rate of over 70% attack surface randomization. KW - Security Risk Assessment KW - Security Metrics KW - Moving Target Defense KW - Microservices Security KW - Application Container Security Y1 - 2018 SN - 978-1-7281-1141-4 U6 - https://doi.org/10.1109/BDCloud.2018.00137 SN - 2158-9178 SP - 932 EP - 939 PB - Institute of Electrical and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Torkura, Kennedy A. A1 - Sukmana, Muhammad Ihsan Haikal A1 - Cheng, Feng A1 - Meinel, Christoph T1 - Leveraging cloud native design patterns for security-as-a-service applications T2 - IEEE International Conference on Smart Cloud (SmartCloud) N2 - This paper discusses a new approach for designing and deploying Security-as-a-Service (SecaaS) applications using cloud native design patterns. Current SecaaS approaches do not efficiently handle the increasing threats to computer systems and applications. For example, requests for security assessments drastically increase after a high-risk security vulnerability is disclosed. In such scenarios, SecaaS applications are unable to dynamically scale to serve requests. A root cause of this challenge is employment of architectures not specifically fitted to cloud environments. Cloud native design patterns resolve this challenge by enabling certain properties e.g. massive scalability and resiliency via the combination of microservice patterns and cloud-focused design patterns. However adopting these patterns is a complex process, during which several security issues are introduced. In this work, we investigate these security issues, we redesign and deploy a monolithic SecaaS application using cloud native design patterns while considering appropriate, layered security counter-measures i.e. at the application and cloud networking layer. Our prototype implementation out-performs traditional, monolithic applications with an average Scanner Time of 6 minutes, without compromising security. Our approach can be employed for designing secure, scalable and performant SecaaS applications that effectively handle unexpected increase in security assessment requests. KW - Cloud-Security KW - Security-as-a-Service KW - Vulnerability Assessment KW - Cloud Native Applications Y1 - 2017 SN - 978-1-5386-3684-8 U6 - https://doi.org/10.1109/SmartCloud.2017.21 SP - 90 EP - 97 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - GEN A1 - Timme, Sinika T1 - The face of affect and exertion BT - automated facial action analysis to decode the flow of experience during exercise T2 - Journal of sport & exercise psychology Y1 - 2020 SN - 0895-2779 SN - 1543-2904 VL - 42 SP - S3 EP - S3 PB - Human Kinetics Publishers CY - Champaign ER - TY - GEN A1 - Tiedemann, Ralph A1 - Pfautsch, Simone T1 - MHC evolution in ducks and allies T2 - Journal of ornithology Y1 - 2006 SN - 0021-8375 VL - 147 IS - Supplement 1 SP - 48 EP - 48 PB - Blackwell CY - New York ER - TY - GEN A1 - Thomas, Christine A1 - Sabbah, Patricia A1 - Rapp, Michael A. A1 - Eschweiler, Gerhard T1 - The Perioperative Care of Older Patients T2 - Deutsches Ärzteblatt international : a weekly online journal of clinical medicine and public health T2 - Bedarf für eine perioperative Altersmedizin Y1 - 2019 U6 - https://doi.org/10.3238/arztebl.2019.0373a SN - 1866-0452 VL - 116 IS - 21 SP - 373 EP - 373 PB - Dt. Ärzte-Verl. CY - Cologne ER - TY - GEN A1 - Thoelert, Steffen A1 - Hörmann, Ulrich A1 - Antreich, Felix A1 - Meurer, Michael T1 - Ionospheric effects on high gain antenna GNSS measurements BT - TEC estimation and correction T2 - Proceedings of the 30th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2017) N2 - The ionospheric delay of global navigation satellite systems (GNSS) signals typically is compensated by adding a single correction value to the pseudorange measurement of a GNSS receiver. Yet, this neglects the dispersive nature of the ionosphere. In this context we analyze the ionospheric signal distortion beyond a constant delay. These effects become increasingly significant with the signal bandwidth and hence more important for new broadband navigation signals. Using measurements of the Galileo E5 signal, captured with a high gain antenna, we verify that the expected influence can indeed be observed and compensated. A new method to estimate the total electron content (TEC) from a single frequency high gain antenna measurement of a broadband GNSS signal is proposed and described in detail. The received signal is de facto unaffected by multi-path and interference because of the narrow aperture angle of the used antenna which should reduce the error source of the result in general. We would like to point out that such measurements are independent of code correlation, like in standard receiver applications. It is therefore also usable without knowledge of the signal coding. Results of the TEC estimation process are shown and discussed comparing to common TEC products like TEC maps and dual frequency receiver estimates. Y1 - 2017 U6 - https://doi.org/10.33012/2017.15343 SN - 2331-5911 SN - 2331-5954 SP - 3368 EP - 3374 PB - Instituite of Navigation CY - Washington ER - TY - GEN A1 - Thiede, Rasmus Christoph A1 - Ehlers, Todd T1 - Large spatial and temporal variations in Himalayan denudation (vol 371, pg 278, 2013) T2 - Earth & planetary science letters Y1 - 2013 U6 - https://doi.org/10.1016/j.epsl.2013.07.004 SN - 0012-821X VL - 374 IS - 13 SP - 256 EP - 257 PB - Elsevier CY - Amsterdam ER - TY - GEN A1 - Teusner, Ralf A1 - Matthies, Christoph A1 - Staubitz, Thomas T1 - What Stays in Mind? BT - Retention Rates in Programming MOOCs T2 - IEEE Frontiers in Education Conference (FIE) Y1 - 2018 SN - 978-1-5386-1174-6 U6 - https://doi.org/10.1109/FIE.2018.8658890 SN - 0190-5848 PB - IEEE CY - New York ER - TY - GEN A1 - Ten Freyhaus, Henrik A1 - Huntgeburth, Michael A1 - Wingler, Kirstin A1 - Baeumer, A. T. A1 - Wartenberg, Maria A1 - Sauer, H. A1 - Bekhite, Mohamed M. A1 - Rosenkranz, S. T1 - Inhibition of ROS liberation by the novel nox inhibitor VAS2870 attenuates PDGF-dependent src activation and chemotaxis, but not proliferation in vascular smooth muscle cells T2 - European heart journal Y1 - 2006 SN - 0195-668X SN - 1522-9645 VL - 27 SP - 965 EP - 965 PB - Oxford University Press CY - Oxford ER - TY - GEN A1 - ten Freyhaus, Henrik A1 - Huntgeburth, Michael A1 - Winger, Kirstin A1 - Bäumer, Anselm T. A1 - Vantler, Marius A1 - Bekhite, Mohamed M. A1 - Wartenberg, Maria A1 - Sauer, Heinrich A1 - Sparwel, Jan A1 - Rosenkranz, Stephan T1 - Inhibition of ROS liberation attenuates PDGF-Dependent chemotaxis, but not proliferation in vascular smooth muscle cells - Critical role of Src kinase T2 - Circulation : an American Heart Association journal Y1 - 2006 SN - 0009-7322 VL - 114 SP - 296 EP - 297 PB - Lippincott Williams & Wilkins CY - Philadelphia ER -