TY - GEN A1 - Tang, Mitchell A1 - Nakamoto, Carter H. A1 - Stern, Ariel Dora A1 - Mehrotra, Ateev T1 - Trends in remote patient monitoring use in traditional medicare T2 - JAMA internal medicine Y1 - 2022 U6 - https://doi.org/10.1001/jamainternmed.2022.3043 SN - 2168-6106 SN - 2168-6114 VL - 182 IS - 9 SP - 1005 EP - 1006 PB - American Medical Association CY - Chicago, Ill. ER - TY - GEN A1 - Alibabaie, Najmeh A1 - Ghasemzadeh, Mohammad A1 - Meinel, Christoph T1 - A variant of genetic algorithm for non-homogeneous population T2 - International Conference Applied Mathematics, Computational Science and Systems Engineering 2016 N2 - Selection of initial points, the number of clusters and finding proper clusters centers are still the main challenge in clustering processes. In this paper, we suggest genetic algorithm based method which searches several solution spaces simultaneously. The solution spaces are population groups consisting of elements with similar structure. Elements in a group have the same size, while elements in different groups are of different sizes. The proposed algorithm processes the population in groups of chromosomes with one gene, two genes to k genes. These genes hold corresponding information about the cluster centers. In the proposed method, the crossover and mutation operators can accept parents with different sizes; this can lead to versatility in population and information transfer among sub-populations. We implemented the proposed method and evaluated its performance against some random datasets and the Ruspini dataset as well. The experimental results show that the proposed method could effectively determine the appropriate number of clusters and recognize their centers. Overall this research implies that using heterogeneous population in the genetic algorithm can lead to better results. Y1 - 2017 U6 - https://doi.org/10.1051/itmconf/20170902001 SN - 2271-2097 VL - 9 PB - EDP Sciences CY - Les Ulis ER - TY - GEN A1 - Lorenz, Claas A1 - Kiekheben, Sebastian A1 - Schnor, Bettina T1 - FaVe: Modeling IPv6 firewalls for fast formal verification T2 - International Conference on Networked Systems (NetSys) 2017 N2 - As virtualization drives the automation of networking, the validation of security properties becomes more and more challenging eventually ruling out manual inspections. While formal verification in Software Defined Networks is provided by comprehensive tools with high speed reverification capabilities like NetPlumber for instance, the presence of middlebox functionality like firewalls is not considered. Also, they lack the ability to handle dynamic protocol elements like IPv6 extension header chains. In this work, we provide suitable modeling abstractions to enable both - the inclusion of firewalls and dynamic protocol elements. We exemplarily model the Linux ip6tables/netfilter packet filter and also provide abstractions for an application layer gateway. Finally, we present a prototype of our formal verification system FaVe. Y1 - 2017 U6 - https://doi.org/10.1109/NetSys.2017.7903956 PB - IEEE CY - New York ER - TY - GEN A1 - Gawron, Marian A1 - Cheng, Feng A1 - Meinel, Christoph T1 - PVD: Passive Vulnerability Detection T2 - 8th International Conference on Information and Communication Systems (ICICS) N2 - The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses the existing information and eliminates the necessity of a comprehensive scan of the target system. Since our approach is able to identify vulnerabilities without the additional effort of a scan, we are able to increase the overall performance of the detection. Because of the reuse and the removal of the active testing procedures, our approach could be classified as a passive vulnerability detection. We will explain the approach and illustrate the additional possibility to increase the security awareness of users. Therefore, we applied the approach on an experimental setup and extracted security relevant information from web logs. Y1 - 2017 SN - 978-1-5090-4243-2 U6 - https://doi.org/10.1109/IACS.2017.7921992 SN - 2471-125X SP - 322 EP - 327 PB - IEEE CY - New York ER - TY - GEN A1 - Malchow, Martin A1 - Renz, Jan A1 - Bauer, Matthias A1 - Meinel, Christoph T1 - Embedded smart home BT - remote lab grading in a MOOC with over 6000 participants T2 - 11th Annual IEEE International Systems Conference (SysCon) N2 - The popularity of MOOCs has increased considerably in the last years. A typical MOOC course consists of video content, self tests after a video and homework, which is normally in multiple choice format. After solving this homeworks for every week of a MOOC, the final exam certificate can be issued when the student has reached a sufficient score. There are also some attempts to include practical tasks, such as programming, in MOOCs for grading. Nevertheless, until now there is no known possibility to teach embedded system programming in a MOOC course where the programming can be done in a remote lab and where grading of the tasks is additionally possible. This embedded programming includes communication over GPIO pins to control LEDs and measure sensor values. We started a MOOC course called "Embedded Smart Home" as a pilot to prove the concept to teach real hardware programming in a MOOC environment under real life MOOC conditions with over 6000 students. Furthermore, also students with real hardware have the possibility to program on their own real hardware and grade their results in the MOOC course. Finally, we evaluate our approach and analyze the student acceptance of this approach to offer a course on embedded programming. We also analyze the hardware usage and working time of students solving tasks to find out if real hardware programming is an advantage and motivating achievement to support students learning success. Y1 - 2017 SN - 978-1-5090-4623-2 U6 - https://doi.org/10.1109/SYSCON.2017.7934728 SN - 1944-7620 SP - 195 EP - 200 PB - IEEE CY - New York ER - TY - GEN A1 - Staubitz, Thomas A1 - Wilkins, Christian A1 - Hagedorn, Christiane A1 - Meinel, Christoph T1 - The Gamification of a MOOC Platform T2 - Proceedings of 2017 IEEE Global Engineering Education Conference (EDUCON) N2 - Massive Open Online Courses (MOOCs) have left their mark on the face of education during the recent years. At the Hasso Plattner Institute (HPI) in Potsdam, Germany, we are actively developing a MOOC platform, which provides our research with a plethora of e-learning topics, such as learning analytics, automated assessment, peer assessment, team-work, online proctoring, and gamification. We run several instances of this platform. On openHPI, we provide our own courses from within the HPI context. Further instances are openSAP, openWHO, and mooc.HOUSE, which is the smallest of these platforms, targeting customers with a less extensive course portfolio. In 2013, we started to work on the gamification of our platform. By now, we have implemented about two thirds of the features that we initially have evaluated as useful for our purposes. About a year ago we activated the implemented gamification features on mooc.HOUSE. Before activating the features on openHPI as well, we examined, and re-evaluated our initial considerations based on the data we collected so far and the changes in other contexts of our platforms. KW - MOOC KW - Gamification KW - e-learning KW - Massive Open Online Courses Y1 - 2017 SN - 978-1-5090-5467-1 U6 - https://doi.org/10.1109/EDUCON.2017.7942952 SN - 2165-9567 SP - 883 EP - 892 PB - IEEE CY - New York ER - TY - GEN A1 - Plauth, Max A1 - Sterz, Christoph A1 - Eberhardt, Felix A1 - Feinbube, Frank A1 - Polze, Andreas T1 - Assessing NUMA performance based on hardware event counters T2 - IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) N2 - Cost models play an important role for the efficient implementation of software systems. These models can be embedded in operating systems and execution environments to optimize execution at run time. Even though non-uniform memory access (NUMA) architectures are dominating today's server landscape, there is still a lack of parallel cost models that represent NUMA system sufficiently. Therefore, the existing NUMA models are analyzed, and a two-step performance assessment strategy is proposed that incorporates low-level hardware counters as performance indicators. To support the two-step strategy, multiple tools are developed, all accumulating and enriching specific hardware event counter information, to explore, measure, and visualize these low-overhead performance indicators. The tools are showcased and discussed alongside specific experiments in the realm of performance assessment. KW - Parallel programming KW - Performance analysis KW - Memory management Y1 - 2017 SN - 978-0-7695-6149-3 U6 - https://doi.org/10.1109/IPDPSW.2017.51 SN - 2164-7062 SP - 904 EP - 913 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - GEN A1 - Torkura, Kennedy A. A1 - Sukmana, Muhammad Ihsan Haikal A1 - Cheng, Feng A1 - Meinel, Christoph T1 - Leveraging cloud native design patterns for security-as-a-service applications T2 - IEEE International Conference on Smart Cloud (SmartCloud) N2 - This paper discusses a new approach for designing and deploying Security-as-a-Service (SecaaS) applications using cloud native design patterns. Current SecaaS approaches do not efficiently handle the increasing threats to computer systems and applications. For example, requests for security assessments drastically increase after a high-risk security vulnerability is disclosed. In such scenarios, SecaaS applications are unable to dynamically scale to serve requests. A root cause of this challenge is employment of architectures not specifically fitted to cloud environments. Cloud native design patterns resolve this challenge by enabling certain properties e.g. massive scalability and resiliency via the combination of microservice patterns and cloud-focused design patterns. However adopting these patterns is a complex process, during which several security issues are introduced. In this work, we investigate these security issues, we redesign and deploy a monolithic SecaaS application using cloud native design patterns while considering appropriate, layered security counter-measures i.e. at the application and cloud networking layer. Our prototype implementation out-performs traditional, monolithic applications with an average Scanner Time of 6 minutes, without compromising security. Our approach can be employed for designing secure, scalable and performant SecaaS applications that effectively handle unexpected increase in security assessment requests. KW - Cloud-Security KW - Security-as-a-Service KW - Vulnerability Assessment KW - Cloud Native Applications Y1 - 2017 SN - 978-1-5386-3684-8 U6 - https://doi.org/10.1109/SmartCloud.2017.21 SP - 90 EP - 97 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - GEN A1 - Limberger, Daniel A1 - Scheibel, Willy A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Mixed-projection treemaps BT - a novel approach mixing 2D and 2.5D treemaps T2 - 21st International Conference Information Visualisation (IV) N2 - This paper presents a novel technique for combining 2D and 2.5D treemaps using multi-perspective views to leverage the advantages of both treemap types. It enables a new form of overview+detail visualization for tree-structured data and contributes new concepts for real-time rendering of and interaction with treemaps. The technique operates by tilting the graphical elements representing inner nodes using affine transformations and animated state transitions. We explain how to mix orthogonal and perspective projections within a single treemap. Finally, we show application examples that benefit from the reduced interaction overhead. KW - Information Visualization KW - Overview plus Detail KW - Treemaps KW - 2.5D Treemaps KW - Multi-perspective Views Y1 - 2017 SN - 978-1-5386-0831-9 U6 - https://doi.org/10.1109/iV.2017.67 SN - 2375-0138 SP - 164 EP - 169 PB - Institute of Electrical and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Giese, Holger ED - Kouchnarenko, Olga ED - Khosravi, Ramtin T1 - Formal models and analysis for self-adaptive cyber-physical systems BT - (extended abstract) T2 - Lecture notes in computer science N2 - In this extended abstract, we will analyze the current challenges for the envisioned Self-Adaptive CPS. In addition, we will outline our results to approach these challenges with SMARTSOS [10] a generic approach based on extensions of graph transformation systems employing open and adaptive collaborations and models at runtime for trustworthy self-adaptation, self-organization, and evolution of the individual systems and the system-of-systems level taking the independent development, operation, management, and evolution of these systems into account. Y1 - 2017 SN - 978-3-319-57666-4 SN - 978-3-319-57665-7 U6 - https://doi.org/10.1007/978-3-319-57666-4_1 SN - 0302-9743 SN - 1611-3349 VL - 10231 SP - 3 EP - 9 PB - Springer CY - Cham ER -