TY - JOUR A1 - Hehn, Jennifer A1 - Mendez, Daniel A1 - Uebernickel, Falk A1 - Brenner, Walter A1 - Broy, Manfred T1 - On integrating design thinking for human-centered requirements engineering JF - IEEE software N2 - We elaborate on the possibilities and needs to integrate design thinking into requirements engineering, drawing from our research and project experiences. We suggest three approaches for tailoring and integrating design thinking and requirements engineering with complementary synergies and point at open challenges for research and practice. KW - requirements engineering KW - prototypes KW - software KW - electronic mail KW - tools KW - organizations KW - design thinking Y1 - 2019 U6 - https://doi.org/10.1109/MS.2019.2957715 SN - 0740-7459 SN - 1937-4194 VL - 37 IS - 2 SP - 25 EP - 31 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - JOUR A1 - Draisbach, Uwe A1 - Christen, Peter A1 - Naumann, Felix T1 - Transforming pairwise duplicates to entity clusters for high-quality duplicate detection JF - ACM Journal of Data and Information Quality N2 - Duplicate detection algorithms produce clusters of database records, each cluster representing a single real-world entity. As most of these algorithms use pairwise comparisons, the resulting (transitive) clusters can be inconsistent: Not all records within a cluster are sufficiently similar to be classified as duplicate. Thus, one of many subsequent clustering algorithms can further improve the result.
We explain in detail, compare, and evaluate many of these algorithms and introduce three new clustering algorithms in the specific context of duplicate detection. Two of our three new algorithms use the structure of the input graph to create consistent clusters. Our third algorithm, and many other clustering algorithms, focus on the edge weights, instead. For evaluation, in contrast to related work, we experiment on true real-world datasets, and in addition examine in great detail various pair-selection strategies used in practice. While no overall winner emerges, we are able to identify best approaches for different situations. In scenarios with larger clusters, our proposed algorithm, Extended Maximum Clique Clustering (EMCC), and Markov Clustering show the best results. EMCC especially outperforms Markov Clustering regarding the precision of the results and additionally has the advantage that it can also be used in scenarios where edge weights are not available. KW - Record linkage KW - data matching KW - entity resolution KW - deduplication KW - clustering Y1 - 2019 U6 - https://doi.org/10.1145/3352591 SN - 1936-1955 SN - 1936-1963 VL - 12 IS - 1 SP - 1 EP - 30 PB - Association for Computing Machinery CY - New York ER - TY - JOUR A1 - Bilò, Davide A1 - Lenzner, Pascal T1 - On the tree conjecture for the network creation game JF - Theory of computing systems N2 - Selfish Network Creation focuses on modeling real world networks from a game-theoretic point of view. One of the classic models by Fabrikant et al. (2003) is the network creation game, where agents correspond to nodes in a network which buy incident edges for the price of alpha per edge to minimize their total distance to all other nodes. The model is well-studied but still has intriguing open problems. The most famous conjectures state that the price of anarchy is constant for all alpha and that for alpha >= n all equilibrium networks are trees. We introduce a novel technique for analyzing stable networks for high edge-price alpha and employ it to improve on the best known bound for the latter conjecture. In particular we show that for alpha > 4n - 13 all equilibrium networks must be trees, which implies a constant price of anarchy for this range of alpha. Moreover, we also improve the constant upper bound on the price of anarchy for equilibrium trees. KW - network creation games KW - price of anarchy KW - tree conjecture KW - algorithmic KW - game theory Y1 - 2019 U6 - https://doi.org/10.1007/s00224-019-09945-9 SN - 1432-4350 SN - 1433-0490 VL - 64 IS - 3 SP - 422 EP - 443 PB - Springer CY - New York ER - TY - GEN A1 - Sianipar, Johannes Harungguan A1 - Willems, Christian A1 - Meinel, Christoph T1 - Virtual machine integrity verification in Crowd-Resourcing Virtual Laboratory T2 - 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA) N2 - In cloud computing, users are able to use their own operating system (OS) image to run a virtual machine (VM) on a remote host. The virtual machine OS is started by the user using some interfaces provided by a cloud provider in public or private cloud. In peer to peer cloud, the VM is started by the host admin. After the VM is running, the user could get a remote access to the VM to install, configure, and run services. For the security reasons, the user needs to verify the integrity of the running VM, because a malicious host admin could modify the image or even replace the image with a similar image, to be able to get sensitive data from the VM. We propose an approach to verify the integrity of a running VM on a remote host, without using any specific hardware such as Trusted Platform Module (TPM). Our approach is implemented on a Linux platform where the kernel files (vmlinuz and initrd) could be replaced with new files, while the VM is running. kexec is used to reboot the VM with the new kernel files. The new kernel has secret codes that will be used to verify whether the VM was started using the new kernel files. The new kernel is used to further measuring the integrity of the running VM. KW - Virtual Machine KW - Integrity Verification KW - Crowd-Resourcing KW - Cloud Computing Y1 - 2019 SN - 978-1-5386-9133-5 U6 - https://doi.org/10.1109/SOCA.2018.00032 SN - 2163-2871 SP - 169 EP - 176 PB - IEEE CY - New York ER - TY - CHAP A1 - Grüner, Andreas A1 - Mühle, Alexander A1 - Gayvoronskaya, Tatiana A1 - Meinel, Christoph T1 - A quantifiable trustmModel for Blockchain-based identity management T2 - IEEE 2018 International Congress on Cybermatics / 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, cyber, physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology KW - Blockchain KW - distributed ledger technology KW - digital identity KW - self-sovereign identity KW - trust KW - identity management Y1 - 2019 SN - 978-1-5386-7975-3 U6 - https://doi.org/10.1109/Cybermatics_2018.2018.00250 SP - 1475 EP - 1482 PB - IEEE CY - New York ER - TY - JOUR A1 - Meinel, Christoph A1 - Gayvoronskaya, Tatiana A1 - Mühle, Alexander T1 - Die Zukunftspotenziale der Blockchain-Technologie JF - Die Zukunft der Medizin : disruptive Innovationen revolutionieren Medizin und Gesundheit Y1 - 2019 SN - 978-3-95466-398-9 SN - 978-3-95466-448-1 SP - 259 EP - 280 PB - Medizinisch Wissenschaftliche Verlagsgesellschaft CY - Berlin ER - TY - JOUR A1 - Böttinger, Erwin T1 - Wendepunkt für Gesundheit JF - Die Zukunft der Medizin : Disruptive Innovationen revolutionieren Medizin und Gesundheit Y1 - 2019 SN - 978-3-95466-398-9 SN - 978-3-95466-448-1 SP - 201 EP - 210 PB - Medizinisch Wissenschaftliche Verlagsgesellschaft CY - Berlin ER - TY - JOUR A1 - von Schorlemer, Stephan A1 - Weiß, Christian-Cornelius T1 - data4life - Eine nutzerkontrollierte Gesundheitsdaten-Infrastruktu Y1 - 2019 SN - 978-3-95466-448-1 SN - 978-3-95466-398-9 SP - 249 EP - 258 PB - Medizinisch Wissenschaftliche Verlagsgesellschaft CY - Berlin ER - TY - BOOK ED - Böttinger, Erwin ED - zu Putlitz, Jasper T1 - Die Zukunft der Medizin BT - disruptive Innovationen revolutionieren Medizin und Gesundheit N2 - Die Medizin im 21. Jahrhundert wird sich so schnell verändern wie nie zuvor – und mit ihr das Gesundheitswesen. Bahnbrechende Entwicklungen in Forschung und Digitalisierung werden die Auswertung und Nutzung riesiger Datenmengen in kurzer Zeit ermöglichen. Das wird unsere Kenntnisse über Gesundheit und gesund sein, sowie über die Entstehung, Prävention und Heilung von Krankheiten vollkommen verändern. Gleichzeitig wird sich die Art und Weise, wie Medizin praktiziert wird, fundamental verändern. Das Selbstverständnis nahezu aller Akteure wird sich rasch weiterentwickeln müssen. Das Gesundheitssystem wird in allen Bereichen umgebaut und teilweise neu erfunden werden. Digitale Transformation, Personalisierung und Prävention sind die Treiber der neuen Medizin. Deutschland darf den Anschluss nicht verpassen. Im Vergleich mit anderen Ländern ist das deutsche Gesundheitswesen in vielen Punkten bedrohlich rückständig und fragmentiert. Um die Medizin und das Gesundheitswesen in Deutschland langfristig zukunftsfest zu machen, bedarf es vieler Anstrengungen – vor allem aber Offenheit gegenüber Veränderungen, sowie einen regulatorischen Rahmen, der ermöglicht, dass die medizinischen und digitalen Innovationen beim Patienten ankommen. DIE ZUKUNFT DER MEDIZIN beschreibt Entwicklungen und Technologien, die die Medizin und das Gesundheitswesen im 21. Jahrhundert prägen werden. Das Buch informiert über die zum Teil dramatischen, disruptiven Innovationen in der Forschung, die durch Big Data, Künstliche Intelligenz und Robotik möglich werden. Die Autoren sind führende Vordenker ihres Fachs und beschreiben aus langjähriger Erfahrung im In- und Ausland zukünftige Entwicklungen, die jetzt bereits greifbar sind. Y1 - 2019 SN - 978-3-95466-398-9 SN - 978-3-95466-448-1 PB - Medizinisch Wissenschaftliche Verlagsgesellschaft CY - Berlin ER - TY - GEN A1 - Podlesny, Nikolai Jannik A1 - Kayem, Anne V. D. M. A1 - Meinel, Christoph T1 - Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymisation T2 - Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy N2 - High-dimensional data is particularly useful for data analytics research. In the healthcare domain, for instance, high-dimensional data analytics has been used successfully for drug discovery. Yet, in order to adhere to privacy legislation, data analytics service providers must guarantee anonymity for data owners. In the context of high-dimensional data, ensuring privacy is challenging because increased data dimensionality must be matched by an exponential growth in the size of the data to avoid sparse datasets. Syntactically, anonymising sparse datasets with methods that rely of statistical significance, makes obtaining sound and reliable results, a challenge. As such, strong privacy is only achievable at the cost of high information loss, rendering the data unusable for data analytics. In this paper, we make two contributions to addressing this problem from both the privacy and information loss perspectives. First, we show that by identifying dependencies between attribute subsets we can eliminate privacy violating attributes from the anonymised dataset. Second, to minimise information loss, we employ a greedy search algorithm to determine and eliminate maximal partial unique attribute combinations. Thus, one only needs to find the minimal set of identifying attributes to prevent re-identification. Experiments on a health cloud based on the SAP HANA platform using a semi-synthetic medical history dataset comprised of 109 attributes, demonstrate the effectiveness of our approach. Y1 - 2019 SN - 978-1-4503-6099-9 U6 - https://doi.org/10.1145/3292006.3300019 SP - 109 EP - 119 PB - Association for Computing Machinery CY - New York ER - TY - JOUR A1 - Baudisch, Patrick Markus A1 - Silber, Arthur A1 - Kommana, Yannis A1 - Gruner, Milan A1 - Wall, Ludwig A1 - Reuss, Kevin A1 - Heilman, Lukas A1 - Kovacs, Robert A1 - Rechlitz, Daniel A1 - Roumen, Thijs T1 - Kyub BT - A 3D Editor for Modeling Sturdy Laser-Cut Objects JF - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems N2 - We present an interactive editing system for laser cutting called kyub. Kyub allows users to create models efficiently in 3D, which it then unfolds into the 2D plates laser cutters expect. Unlike earlier systems, such as FlatFitFab, kyub affords construction based on closed box structures, which allows users to turn very thin material, such as 4mm plywood, into objects capable of withstanding large forces, such as chairs users can actually sit on. To afford such sturdy construction, every kyub project begins with a simple finger-joint "boxel"-a structure we found to be capable of withstanding over 500kg of load. Users then extend their model by attaching additional boxels. Boxels merge automatically, resulting in larger, yet equally strong structures. While the concept of stacking boxels allows kyub to offer the strong affordance and ease of use of a voxel-based editor, boxels are not confined to a grid and readily combine with kuyb's various geometry deformation tools. In our technical evaluation, objects built with kyub withstood hundreds of kilograms of loads. In our user study, non-engineers rated the learnability of kyub 6.1/7. KW - Personal fabrication KW - laser cutting KW - interactive editing Y1 - 2019 SN - 978-1-4503-5970-2 U6 - https://doi.org/10.1145/3290605.3300796 SP - 1 EP - 12 PB - Association for Computing Machinery CY - New York ER - TY - JOUR A1 - Ion, Alexandra A1 - Lindlbauer, David A1 - Herholz, Philipp A1 - Alexa, Marc A1 - Baudisch, Patrick Markus T1 - Understanding Metamaterial Mechanisms JF - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems N2 - In this paper, we establish the underlying foundations of mechanisms that are composed of cell structures-known as metamaterial mechanisms. Such metamaterial mechanisms were previously shown to implement complete mechanisms in the cell structure of a 3D printed material, without the need for assembly. However, their design is highly challenging. A mechanism consists of many cells that are interconnected and impose constraints on each other. This leads to unobvious and non-linear behavior of the mechanism, which impedes user design. In this work, we investigate the underlying topological constraints of such cell structures and their influence on the resulting mechanism. Based on these findings, we contribute a computational design tool that automatically creates a metamaterial mechanism from user-defined motion paths. This tool is only feasible because our novel abstract representation of the global constraints highly reduces the search space of possible cell arrangements. KW - Metamaterials KW - fabrication KW - computational design Y1 - 2019 SN - 978-1-4503-5970-2 U6 - https://doi.org/10.1145/3290605.3300877 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Giese, Holger Burkhard T1 - Software Engineering for Smart Cyber-Physical Systems BT - Challenges and Opportunities T2 - Proceedings of the 12th Innovations on Software Engineering Conference N2 - Currently, a transformation of our technical world into a networked technical world where besides the embedded systems with their interaction with the physical world the interconnection of these nodes in the cyber world becomes a reality can be observed. In parallel nowadays there is a strong trend to employ artificial intelligence techniques and in particular machine learning to make software behave smart. Often cyber-physical systems must be self-adaptive at the level of the individual systems to operate as elements in open, dynamic, and deviating overall structures and to adapt to open and dynamic contexts while being developed, operated, evolved, and governed independently. In this presentation, we will first discuss the envisioned future scenarios for cyber-physical systems with an emphasis on the synergies networking can offer and then characterize which challenges for the design, production, and operation of these systems result. We will then discuss to what extent our current capabilities, in particular concerning software engineering match these challenges and where substantial improvements for the software engineering are crucial. In today's software engineering for embedded systems models are used to plan systems upfront to maximize envisioned properties on the one hand and minimize cost on the other hand. When applying the same ideas to software for smart cyber-physical systems, it soon turned out that for these systems often somehow more subtle links between the involved models and the requirements, users, and environment exist. Self-adaptation and runtime models have been advocated as concepts to covers the demands that result from these subtler links. Lately, both trends have been brought together more thoroughly by the notion of self-aware computing systems. We will review the underlying causes, discuss some our work in this direction, and outline related open challenges and potential for future approaches to software engineering for smart cyber-physical systems. KW - Software Engineering KW - Cyber-Physical Systems KW - Self-aware computing systems Y1 - 2019 SN - 978-1-4503-6215-3 U6 - https://doi.org/10.1145/3299771.3301650 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Sukmana, Muhammad Ihsan Haikal A1 - Torkura, Kennedy A. A1 - Graupner, Hendrik A1 - Cheng, Feng A1 - Meinel, Christoph T1 - Unified Cloud Access Control Model for Cloud Storage Broker T2 - 33rd International Conference on Information Networking (ICOIN 2019) N2 - Cloud Storage Broker (CSB) provides value-added cloud storage service for enterprise usage by leveraging multi-cloud storage architecture. However, it raises several challenges for managing resources and its access control in multiple Cloud Service Providers (CSPs) for authorized CSB stakeholders. In this paper we propose unified cloud access control model that provides the abstraction of CSP's services for centralized and automated cloud resource and access control management in multiple CSPs. Our proposal offers role-based access control for CSB stakeholders to access cloud resources by assigning necessary privileges and access control list for cloud resources and CSB stakeholders, respectively, following privilege separation concept and least privilege principle. We implement our unified model in a CSB system called CloudRAID for Business (CfB) with the evaluation result shows it provides system-and-cloud level security service for cfB and centralized resource and access control management in multiple CSPs. KW - Cloud Storage Broker KW - Cloud access control and resource management KW - Unified cloud model KW - Privilege separation concept KW - Least privilege principle KW - Role-based access control Y1 - 2019 SN - 978-1-5386-8350-7 U6 - https://doi.org/10.1109/ICOIN.2019.8717982 SN - 1976-7684 SP - 60 EP - 65 PB - IEEE CY - Los Alamitos ER - TY - GEN A1 - Hernandez, Netzahualcoyotl A1 - Demiray, Burcu A1 - Arnrich, Bert A1 - Favela, Jesus T1 - An Exploratory Study to Detect Temporal Orientation Using Bluetooth's sensor T2 - PervasiveHealth'19: Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare N2 - Mobile sensing technology allows us to investigate human behaviour on a daily basis. In the study, we examined temporal orientation, which refers to the capacity of thinking or talking about personal events in the past and future. We utilise the mksense platform that allows us to use the experience-sampling method. Individual's thoughts and their relationship with smartphone's Bluetooth data is analysed to understand in which contexts people are influenced by social environments, such as the people they spend the most time with. As an exploratory study, we analyse social condition influence through a collection of Bluetooth data and survey information from participant's smartphones. Preliminary results show that people are likely to focus on past events when interacting with close-related people, and focus on future planning when interacting with strangers. Similarly, people experience present temporal orientation when accompanied by known people. We believe that these findings are linked to emotions since, in its most basic state, emotion is a state of physiological arousal combined with an appropriated cognition. In this contribution, we envision a smartphone application for automatically inferring human emotions based on user's temporal orientation by using Bluetooth sensors, we briefly elaborate on the influential factor of temporal orientation episodes and conclude with a discussion and lessons learned. KW - Mobile sensing KW - Temporal orientation KW - Social environment KW - Human behaviour KW - Bluetooth Y1 - 2019 SN - 978-1-4503-6126-2 U6 - https://doi.org/10.1145/3329189.3329223 SN - 2153-1633 SP - 292 EP - 297 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Perscheid, Cindy A1 - Uflacker, Matthias T1 - Integrating Biological Context into the Analysis of Gene Expression Data T2 - Distributed Computing and Artificial Intelligence, Special Sessions, 15th International Conference N2 - High-throughput RNA sequencing produces large gene expression datasets whose analysis leads to a better understanding of diseases like cancer. The nature of RNA-Seq data poses challenges to its analysis in terms of its high dimensionality, noise, and complexity of the underlying biological processes. Researchers apply traditional machine learning approaches, e. g. hierarchical clustering, to analyze this data. Until it comes to validation of the results, the analysis is based on the provided data only and completely misses the biological context. However, gene expression data follows particular patterns - the underlying biological processes. In our research, we aim to integrate the available biological knowledge earlier in the analysis process. We want to adapt state-of-the-art data mining algorithms to consider the biological context in their computations and deliver meaningful results for researchers. KW - Gene expression KW - Machine learning KW - Feature selection KW - Association rule mining KW - Biclustering KW - Knowledge bases Y1 - 2019 SN - 978-3-319-99608-0 SN - 978-3-319-99607-3 U6 - https://doi.org/10.1007/978-3-319-99608-0_41 SN - 2194-5357 SN - 2194-5365 VL - 801 SP - 339 EP - 343 PB - Springer CY - Cham ER - TY - GEN A1 - Hesse, Günter A1 - Matthies, Christoph A1 - Sinzig, Werner A1 - Uflacker, Matthias T1 - Adding Value by Combining Business and Sensor Data BT - an Industry 4.0 Use Case T2 - Database Systems for Advanced Applications N2 - Industry 4.0 and the Internet of Things are recent developments that have lead to the creation of new kinds of manufacturing data. Linking this new kind of sensor data to traditional business information is crucial for enterprises to take advantage of the data’s full potential. In this paper, we present a demo which allows experiencing this data integration, both vertically between technical and business contexts and horizontally along the value chain. The tool simulates a manufacturing company, continuously producing both business and sensor data, and supports issuing ad-hoc queries that answer specific questions related to the business. In order to adapt to different environments, users can configure sensor characteristics to their needs. KW - Industry 4.0 KW - Internet of Things KW - Data integration Y1 - 2019 SN - 978-3-030-18590-9 SN - 978-3-030-18589-3 U6 - https://doi.org/10.1007/978-3-030-18590-9_80 SN - 0302-9743 SN - 1611-3349 VL - 11448 SP - 528 EP - 532 PB - Springer CY - Cham ER - TY - GEN A1 - Bartz, Christian A1 - Yang, Haojin A1 - Bethge, Joseph A1 - Meinel, Christoph T1 - LoANs BT - Weakly Supervised Object Detection with Localizer Assessor Networks T2 - Computer Vision – ACCV 2018 Workshops N2 - Recently, deep neural networks have achieved remarkable performance on the task of object detection and recognition. The reason for this success is mainly grounded in the availability of large scale, fully annotated datasets, but the creation of such a dataset is a complicated and costly task. In this paper, we propose a novel method for weakly supervised object detection that simplifies the process of gathering data for training an object detector. We train an ensemble of two models that work together in a student-teacher fashion. Our student (localizer) is a model that learns to localize an object, the teacher (assessor) assesses the quality of the localization and provides feedback to the student. The student uses this feedback to learn how to localize objects and is thus entirely supervised by the teacher, as we are using no labels for training the localizer. In our experiments, we show that our model is very robust to noise and reaches competitive performance compared to a state-of-the-art fully supervised approach. We also show the simplicity of creating a new dataset, based on a few videos (e.g. downloaded from YouTube) and artificially generated data. Y1 - 2019 SN - 978-3-030-21074-8 SN - 978-3-030-21073-1 U6 - https://doi.org/10.1007/978-3-030-21074-8_29 SN - 0302-9743 SN - 1611-3349 VL - 11367 SP - 341 EP - 356 PB - Springer CY - Cham ER - TY - GEN A1 - Seidel, Felix A1 - Krentz, Konrad-Felix A1 - Meinel, Christoph T1 - Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers T2 - 2019 IEEE 5th World Forum on Internet of Things (WF-IoT) N2 - Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at depriving victim devices of entering low-power sleep modes. For example, a denial-of-sleep attack against an IoT device that runs a CoAP server is to send plenty of CoAP messages to it, thereby forcing the IoT device to expend energy for receiving and processing these CoAP messages. All current security solutions for CoAP, namely Datagram Transport Layer Security (DTLS), IPsec, and OSCORE, fail to prevent such attacks. To fill this gap, Seitz et al. proposed a method for filtering out inauthentic and replayed CoAP messages "en-route" on 6LoWPAN border routers. In this paper, we expand on Seitz et al.'s proposal in two ways. First, we revise Seitz et al.'s software architecture so that 6LoWPAN border routers can not only check the authenticity and freshness of CoAP messages, but can also perform a wide range of further checks. Second, we propose a couple of such further checks, which, as compared to Seitz et al.'s original checks, more reliably protect IoT devices that run CoAP servers from remote denial-of-sleep attacks, as well as from remote exploits. We prototyped our solution and successfully tested its compatibility with Contiki-NG's CoAP implementation. Y1 - 2019 SN - 978-1-5386-4980-0 SN - 978-1-5386-4981-7 U6 - https://doi.org/10.1109/WF-IoT.2019.8767262 SP - 201 EP - 206 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - CHAP A1 - Bauer, Matthias A1 - Malchow, Martin A1 - Meinel, Christoph T1 - Full Lecture Recording Watching Behavior, or Why Students Watch 90-Min Lectures in 5 Min T2 - IMCL 2018: Mobile Technologies and Applications for the Internet of Things N2 - Many universities record the lectures being held in their facilities to preserve knowledge and to make it available to their students and, at least for some universities and classes, to the broad public. The way with the least effort is to record the whole lecture, which in our case usually is 90 min long. This saves the labor and time of cutting and rearranging lectures scenes to provide short learning videos as known from Massive Open Online Courses (MOOCs), etc. Many lecturers fear that recording their lectures and providing them via an online platform might lead to less participation in the actual lecture. Also, many teachers fear that the lecture recordings are not used with the same focus and dedication as lectures in a lecture hall. In this work, we show that in our experience, full lectures have an average watching duration of just a few minutes and explain the reasons for that and why, in most cases, teachers do not have to worry about that. KW - e-Learning KW - Lecture video recording KW - e-lecture KW - Attention span KW - Learning behavior Y1 - 2019 SN - 978-3-030-11434-3 SN - 978-3-030-11433-6 U6 - https://doi.org/10.1007/978-3-030-11434-3_38 SN - 2194-5357 SN - 2194-5365 VL - 909 SP - 347 EP - 358 PB - Springer CY - Cham ER - TY - GEN A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Real-time Screen-space Geometry Draping for 3D Digital Terrain Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - A fundamental task in 3D geovisualization and GIS applications is the visualization of vector data that can represent features such as transportation networks or land use coverage. Mapping or draping vector data represented by geometric primitives (e.g., polylines or polygons) to 3D digital elevation or 3D digital terrain models is a challenging task. We present an interactive GPU-based approach that performs geometry-based draping of vector data on per-frame basis using an image-based representation of a 3D digital elevation or terrain model only. KW - Geometry Draping KW - Geovisualization KW - GPU-based Real-time Rendering Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00054 SN - 2375-0138 SN - 1550-6037 SP - 281 EP - 286 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Florio, Alessandro A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Semantic-driven Visualization Techniques for Interactive Exploration of 3D Indoor Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - The availability of detailed virtual 3D building models including representations of indoor elements, allows for a wide number of applications requiring effective exploration and navigation functionality. Depending on the application context, users should be enabled to focus on specific Objects-of-Interests (OOIs) or important building elements. This requires approaches to filtering building parts as well as techniques to visualize important building objects and their relations. For it, this paper explores the application and combination of interactive rendering techniques as well as their semanticallydriven configuration in the context of 3D indoor models. KW - Building Information Models KW - BIM KW - Industry Foundation Classes KW - IFC KW - Interactive Visualization KW - Real-time Rendering Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00014 SN - 2375-0138 SN - 1550-6037 SP - 25 EP - 30 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich ED - Banissi, E Ursyn T1 - Interactive Close-Up Rendering for Detail plus Overview Visualization of 3D Digital Terrain Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - This paper presents an interactive rendering technique for detail+overview visualization of 3D digital terrain models using interactive close-ups. A close-up is an alternative presentation of input data varying with respect to geometrical scale, mapping, appearance, as well as Level-of-Detail (LOD) and Level-of-Abstraction (LOA) used. The presented 3D close-up approach enables in-situ comparison of multiple Regionof-Interests (ROIs) simultaneously. We describe a GPU-based rendering technique for the image-synthesis of multiple close-ups in real-time. KW - Terrain Visualization KW - Detail plus Overview KW - Close-Up KW - Coordinated and Multiple Views Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00053 SN - 2375-0138 SN - 1550-6037 SP - 275 EP - 280 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Herzog, Benedict A1 - Hönig, Timo A1 - Schröder-Preikschat, Wolfgang A1 - Plauth, Max A1 - Köhler, Sven A1 - Polze, Andreas T1 - Bridging the Gap BT - Energy-efficient Execution of Software Workloads on Heterogeneous Hardware Components T2 - e-Energy '19: Proceedings of the Tenth ACM International Conference on Future Energy Systems N2 - The recent restructuring of the electricity grid (i.e., smart grid) introduces a number of challenges for today's large-scale computing systems. To operate reliable and efficient, computing systems must adhere not only to technical limits (i.e., thermal constraints) but they must also reduce operating costs, for example, by increasing their energy efficiency. Efforts to improve the energy efficiency, however, are often hampered by inflexible software components that hardly adapt to underlying hardware characteristics. In this paper, we propose an approach to bridge the gap between inflexible software and heterogeneous hardware architectures. Our proposal introduces adaptive software components that dynamically adapt to heterogeneous processing units (i.e., accelerators) during runtime to improve the energy efficiency of computing systems. Y1 - 2019 SN - 978-1-4503-6671-7 U6 - https://doi.org/10.1145/3307772.3330176 SP - 428 EP - 430 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Marwecki, Sebastian A1 - Wilson, Andrew D. A1 - Ofek, Eyal A1 - Franco, Mar Gonzalez A1 - Holz, Christian T1 - Mise-Unseen BT - Using Eye-Tracking to Hide Virtual Reality Scene Changes in Plain Sight T2 - UIST '19: Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology N2 - Creating or arranging objects at runtime is needed in many virtual reality applications, but such changes are noticed when they occur inside the user's field of view. We present Mise-Unseen, a software system that applies such scene changes covertly inside the user's field of view. Mise-Unseen leverages gaze tracking to create models of user attention, intention, and spatial memory to determine if and when to inject a change. We present seven applications of Mise-Unseen to unnoticeably modify the scene within view (i) to hide that task difficulty is adapted to the user, (ii) to adapt the experience to the user's preferences, (iii) to time the use of low fidelity effects, (iv) to detect user choice for passive haptics even when lacking physical props, (v) to sustain physical locomotion despite a lack of physical space, (vi) to reduce motion sickness during virtual locomotion, and (vii) to verify user understanding during story progression. We evaluated Mise-Unseen and our applications in a user study with 15 participants and find that while gaze data indeed supports obfuscating changes inside the field of view, a change is rendered unnoticeably by using gaze in combination with common masking techniques. KW - Eye-tracking KW - virtual reality KW - change blindness KW - inattentional blindness KW - staging Y1 - 2019 SN - 978-1-4503-6816-2 U6 - https://doi.org/10.1145/3332165.3347919 SP - 777 EP - 789 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Roumen, Thijs A1 - Shigeyama, Jotaro A1 - Rudolph, Julius Cosmo Romeo A1 - Grzelka, Felix A1 - Baudisch, Patrick T1 - SpringFit BT - Joints and mounts that fabricate on any laser cutter T2 - User Interface Software and Technology N2 - Joints are crucial to laser cutting as they allow making three-dimensional objects; mounts are crucial because they allow embedding technical components, such as motors. Unfortunately, mounts and joints tend to fail when trying to fabricate a model on a different laser cutter or from a different material. The reason for this lies in the way mounts and joints hold objects in place, which is by forcing them into slightly smaller openings. Such "press fit" mechanisms unfortunately are susceptible to the small changes in diameter that occur when switching to a machine that removes more or less material ("kerf"), as well as to changes in stiffness, as they occur when switching to a different material. We present a software tool called springFit that resolves this problem by replacing the problematic press fit-based mounts and joints with what we call cantilever-based mounts and joints. A cantilever spring is simply a long thin piece of material that pushes against the object to be held. Unlike press fits, cantilever springs are robust against variations in kerf and material; they can even handle very high variations, simply by using longer springs. SpringFit converts models in the form of 2D cutting plans by replacing all contained mounts, notch joints, finger joints, and t-joints. In our technical evaluation, we used springFit to convert 14 models downloaded from the web. KW - Laser cutting KW - fabrication KW - portability KW - reuse Y1 - 2019 SN - 978-1-4503-6816-2 U6 - https://doi.org/10.1145/3332165.3347930 SP - 727 EP - 738 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Ghahremani, Sona A1 - Giese, Holger T1 - Performance evaluation for self-healing systems BT - Current Practice & Open Issues T2 - 2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W) N2 - Evaluating the performance of self-adaptive systems (SAS) is challenging due to their complexity and interaction with the often highly dynamic environment. In the context of self-healing systems (SHS), employing simulators has been shown to be the most dominant means for performance evaluation. Simulating a SHS also requires realistic fault injection scenarios. We study the state of the practice for evaluating the performance of SHS by means of a systematic literature review. We present the current practice and point out that a more thorough and careful treatment in evaluating the performance of SHS is required. KW - self-healing KW - failure profile KW - evaluation KW - simulator KW - performance Y1 - 2019 SN - 978-1-7281-2406-3 U6 - https://doi.org/10.1109/FAS-W.2019.00039 SP - 116 EP - 119 PB - IEEE CY - New York ER - TY - JOUR A1 - Drimalla, Hanna A1 - Landwehr, Niels A1 - Hess, Ursula A1 - Dziobek, Isabel T1 - From face to face BT - the contribution of facial mimicry to cognitive and emotional empathy JF - Cognition and Emotion N2 - Despite advances in the conceptualisation of facial mimicry, its role in the processing of social information is a matter of debate. In the present study, we investigated the relationship between mimicry and cognitive and emotional empathy. To assess mimicry, facial electromyography was recorded for 70 participants while they completed the Multifaceted Empathy Test, which presents complex context-embedded emotional expressions. As predicted, inter-individual differences in emotional and cognitive empathy were associated with the level of facial mimicry. For positive emotions, the intensity of the mimicry response scaled with the level of state emotional empathy. Mimicry was stronger for the emotional empathy task compared to the cognitive empathy task. The specific empathy condition could be successfully detected from facial muscle activity at the level of single individuals using machine learning techniques. These results support the view that mimicry occurs depending on the social context as a tool to affiliate and it is involved in cognitive as well as emotional empathy. KW - Facial mimicry KW - empathy KW - emotional KW - cognitive KW - complex emotions Y1 - 2019 U6 - https://doi.org/10.1080/02699931.2019.1596068 SN - 0269-9931 SN - 1464-0600 VL - 33 IS - 8 SP - 1672 EP - 1686 PB - Routledge, Taylor & Francis Group CY - Abingdon ER - TY - JOUR A1 - Leopold, Henrik A1 - van der Aa, Han A1 - Offenberg, Jelmer A1 - Reijers, Hajo A. T1 - Using Hidden Markov Models for the accurate linguistic analysis of process model activity labels JF - Information systems N2 - Many process model analysis techniques rely on the accurate analysis of the natural language contents captured in the models’ activity labels. Since these labels are typically short and diverse in terms of their grammatical style, standard natural language processing tools are not suitable to analyze them. While a dedicated technique for the analysis of process model activity labels was proposed in the past, it suffers from considerable limitations. First of all, its performance varies greatly among data sets with different characteristics and it cannot handle uncommon grammatical styles. What is more, adapting the technique requires in-depth domain knowledge. We use this paper to propose a machine learning-based technique for activity label analysis that overcomes the issues associated with this rule-based state of the art. Our technique conceptualizes activity label analysis as a tagging task based on a Hidden Markov Model. By doing so, the analysis of activity labels no longer requires the manual specification of rules. An evaluation using a collection of 15,000 activity labels demonstrates that our machine learning-based technique outperforms the state of the art in all aspects. KW - Label analysis KW - Process model KW - Natural language KW - Hidden Markov models Y1 - 2019 U6 - https://doi.org/10.1016/j.is.2019.02.005 SN - 0306-4379 SN - 1873-6076 VL - 83 SP - 30 EP - 39 PB - Elsevier CY - Oxford ER - TY - JOUR A1 - Discher, Sören A1 - Richter, Rico A1 - Döllner, Jürgen Roland Friedrich T1 - Concepts and techniques for web-based visualization and processing of massive 3D point clouds with semantics JF - Graphical Models N2 - 3D point cloud technology facilitates the automated and highly detailed acquisition of real-world environments such as assets, sites, and countries. We present a web-based system for the interactive exploration and inspection of arbitrary large 3D point clouds. Our approach is able to render 3D point clouds with billions of points using spatial data structures and level-of-detail representations. Point-based rendering techniques and post-processing effects are provided to enable task-specific and data-specific filtering, e.g., based on semantics. A set of interaction techniques allows users to collaboratively work with the data (e.g., measuring distances and annotating). Additional value is provided by the system’s ability to display additional, context-providing geodata alongside 3D point clouds and to integrate processing and analysis operations. We have evaluated the presented techniques and in case studies and with different data sets from aerial, mobile, and terrestrial acquisition with up to 120 billion points to show their practicality and feasibility. KW - 3D Point clouds KW - Web-based rendering KW - Point-based rendering KW - Processing strategies Y1 - 2019 U6 - https://doi.org/10.1016/j.gmod.2019.101036 SN - 1524-0703 SN - 1524-0711 VL - 104 PB - Elsevier CY - San Diego ER - TY - JOUR A1 - Yousfi, Alaaeddine A1 - Weske, Mathias T1 - Discovering commute patterns via process mining JF - Knowledge and Information Systems N2 - Ubiquitous computing has proven its relevance and efficiency in improving the user experience across a myriad of situations. It is now the ineluctable solution to keep pace with the ever-changing environments in which current systems operate. Despite the achievements of ubiquitous computing, this discipline is still overlooked in business process management. This is surprising, since many of today’s challenges, in this domain, can be addressed by methods and techniques from ubiquitous computing, for instance user context and dynamic aspects of resource locations. This paper takes a first step to integrate methods and techniques from ubiquitous computing in business process management. To do so, we propose discovering commute patterns via process mining. Through our proposition, we can deduce the users’ significant locations, routes, travel times and travel modes. This information can be a stepping-stone toward helping the business process management community embrace the latest achievements in ubiquitous computing, mainly in location-based service. To corroborate our claims, a user study was conducted. The significant places, routes, travel modes and commuting times of our test subjects were inferred with high accuracies. All in all, ubiquitous computing can enrich the processes with new capabilities that go beyond what has been established in business process management so far. KW - Commute pattern KW - Commute process KW - Process mining KW - Ubiquitous computing KW - Location-based services Y1 - 2019 U6 - https://doi.org/10.1007/s10115-018-1255-1 SN - 0219-1377 SN - 0219-3116 VL - 60 IS - 2 SP - 691 EP - 713 PB - Springer CY - London ER - TY - GEN A1 - Björk, Jennie A1 - Hölze, Katharina T1 - Editorial T2 - Creativity and innovation management Y1 - 2019 U6 - https://doi.org/10.1111/caim.12336 SN - 0963-1690 SN - 1467-8691 VL - 28 IS - 3 SP - 289 EP - 290 PB - Wiley CY - Hoboken ER -