Refine
Year of publication
Document Type
- Article (51)
- Other (36)
- Monograph/Edited Volume (29)
- Conference Proceeding (4)
- Postprint (2)
- Part of a Book (1)
- Report (1)
Keywords
- MOOC (10)
- digital education (8)
- e-learning (8)
- Cloud Computing (7)
- E-Learning (7)
- openHPI (7)
- Onlinekurs (6)
- MOOCs (5)
- Identitätsmanagement (4)
- Security (4)
- cloud (4)
- cloud computing (4)
- digitale Bildung (4)
- identity management (4)
- online course creation (4)
- online course design (4)
- Cloud-Security (3)
- Digitale Bildung (3)
- Forschungsprojekte (3)
- Future SOC Lab (3)
- In-Memory Technologie (3)
- Kursdesign (3)
- Micro Degree (3)
- Multicore Architekturen (3)
- Online-Lehre (3)
- Online-Lernen (3)
- Onlinekurs-Produktion (3)
- Privacy (3)
- Security Metrics (3)
- Security Risk Assessment (3)
- Social Media Analysis (3)
- Teamwork (3)
- Tele-Lab (3)
- Tele-Teaching (3)
- course design (3)
- maschinelles Lernen (3)
- micro degree (3)
- micro-credential (3)
- online teaching (3)
- tele-TASK (3)
- ACINQ (2)
- ASIC (2)
- Australian securities exchange (2)
- BCCC (2)
- BTC (2)
- BitShares (2)
- Bitcoin Core (2)
- Blockchain Auth (2)
- Blockchain-Konsortium R3 (2)
- Blockkette (2)
- Blockstack (2)
- Blockstack ID (2)
- Blumix-Plattform (2)
- Blöcke (2)
- Byzantine Agreement (2)
- Cloud (2)
- Colored Coins (2)
- DAO (2)
- DPoS (2)
- Delegated Proof-of-Stake (2)
- Digitalisierung (2)
- Distributed Proof-of-Research (2)
- E-Wallet (2)
- ECDSA (2)
- Energy (2)
- Eris (2)
- Ether (2)
- Ethereum (2)
- European Union (2)
- Europäische Union (2)
- Federated Byzantine Agreement (2)
- FollowMyVote (2)
- Fork (2)
- Forschungskolleg (2)
- Gridcoin (2)
- HPI Schul-Cloud (2)
- Hard Fork (2)
- Hashed Timelock Contracts (2)
- Hasso Plattner Institute (2)
- Hasso-Plattner-Institut (2)
- IT-Infrastruktur (2)
- IT-infrastructure (2)
- Internet der Dinge (2)
- Internet of Things (2)
- IoT (2)
- Japanese Blockchain Consortium (2)
- Japanisches Blockchain-Konsortium (2)
- Java (2)
- Kette (2)
- Klausurtagung (2)
- Konsensalgorithmus (2)
- Konsensprotokoll (2)
- Lecture Video Archive (2)
- Lightning Network (2)
- Lock-Time-Parameter (2)
- MAC security (2)
- MERLOT (2)
- Machine Learning (2)
- Massive Open Online Course (MOOC) (2)
- Micropayment-Kanäle (2)
- Microsoft Azur (2)
- NASDAQ (2)
- NameID (2)
- Namecoin (2)
- Off-Chain-Transaktionen (2)
- Onename (2)
- Online Course (2)
- Online-Learning (2)
- OpenBazaar (2)
- Oracles (2)
- Orphan Block (2)
- P2P (2)
- Peer-to-Peer Netz (2)
- Peercoin (2)
- PoB (2)
- PoS (2)
- PoW (2)
- Proof-of-Burn (2)
- Proof-of-Stake (2)
- Proof-of-Work (2)
- Ripple (2)
- SCP (2)
- SHA (2)
- SPV (2)
- Schule (2)
- Schwierigkeitsgrad (2)
- Secure Configuration (2)
- Service-oriented Systems Engineering (2)
- Simplified Payment Verification (2)
- Skalierbarkeit der Blockchain (2)
- Slock.it (2)
- Soft Fork (2)
- Steemit (2)
- Stellar Consensus Protocol (2)
- Storj (2)
- Studie (2)
- The Bitfury Group (2)
- The DAO (2)
- Transaktion (2)
- Two-Way-Peg (2)
- Unspent Transaction Output (2)
- Verträge (2)
- Virtual Machine (2)
- Watson IoT (2)
- Zielvorgabe (2)
- Zookos Dreieck (2)
- Zookos triangle (2)
- altchain (2)
- alternative chain (2)
- artifical intelligence (2)
- assignments (2)
- atomic swap (2)
- authentication (2)
- bidirectional payment channels (2)
- bitcoins (2)
- blockchain (2)
- blockchain consortium (2)
- blockchain-übergreifend (2)
- blocks (2)
- blumix platform (2)
- chain (2)
- confirmation period (2)
- consensus algorithm (2)
- consensus protocol (2)
- contest period (2)
- contracts (2)
- cross-chain (2)
- decentralized autonomous organization (2)
- design thinking (2)
- dezentrale autonome Organisation (2)
- difficulty (2)
- difficulty target (2)
- digital enlightenment (2)
- digital identity (2)
- digital learning platform (2)
- digital sovereignty (2)
- digitale Aufklärung (2)
- digitale Lernplattform (2)
- digitale Souveränität (2)
- digitalization (2)
- doppelter Hashwert (2)
- double hashing (2)
- federated voting (2)
- flexibility (2)
- framework (2)
- hashrate (2)
- innovation (2)
- intelligente Verträge (2)
- inter-chain (2)
- knowledge management (2)
- künstliche Intelligenz (2)
- learning path (2)
- lebenslanges Lernen (2)
- ledger assets (2)
- lifelong learning (2)
- machine learning (2)
- merged mining (2)
- merkle root (2)
- micropayment (2)
- micropayment channels (2)
- miner (2)
- mining (2)
- mining hardware (2)
- minting (2)
- modularization (2)
- multicore architectures (2)
- nonce (2)
- off-chain transaction (2)
- peer-to-peer network (2)
- pegged sidechains (2)
- quorum slices (2)
- research projects (2)
- rootstock (2)
- scalability of blockchain (2)
- scarce tokens (2)
- self-paced learning (2)
- self-sovereign identity (2)
- sidechain (2)
- smart contracts (2)
- smartphone (2)
- tele-teaching (2)
- transaction (2)
- AI Lab (1)
- Abschlussbericht (1)
- Algorithms (1)
- Angriffe (1)
- Anomaly detection (1)
- Anwendungsvirtualisierung (1)
- Application Container Security (1)
- Approximation algorithms (1)
- Architectures (1)
- Attention span (1)
- Attribute aggregation (1)
- Authentication (1)
- Authentifizierung (1)
- Automated parsing (1)
- Bandwidth (1)
- Basic Storage Anbieter (1)
- Big Five Model (1)
- Big Five model (1)
- Biometrie (1)
- Blockchain (1)
- Blockchains (1)
- Bot Detection (1)
- Brand Personality (1)
- Change Management (1)
- Cloud Audit (1)
- Cloud Native Applications (1)
- Cloud Service Provider (1)
- Cloud Storage Broker (1)
- Cloud access control and resource management (1)
- Collaborative learning (1)
- Computer-assisted instruction (1)
- Confusion matrix (1)
- Correlation (1)
- Cross-modal retrieval (1)
- Crowd-Resourcing (1)
- Data breach (1)
- Data mining (1)
- Data mining Machine learning (1)
- Data models (1)
- Data partitioning (1)
- Data profiling (1)
- Datenschutz (1)
- Datenschutz-sicherer Einsatz in der Schule (1)
- Deep learning (1)
- Deep neural networks (1)
- Denial of sleep (1)
- Design Thinking (1)
- Disadvantaged communities (1)
- Distance Learning (1)
- Distributed snapshot algorithm (1)
- E-Learning exam preparation (1)
- E-Lecture (1)
- E-health (1)
- Educational Technology (1)
- Electrical products (1)
- Electronic prescription (1)
- Embedded Programming (1)
- Emotion Mining (1)
- Energy-aware (1)
- Event normalization (1)
- Event processing (1)
- FIDO (1)
- Feedback control loop (1)
- Flash (1)
- Forecasting (1)
- Fuzzy logic (1)
- Gamification (1)
- German schools (1)
- Graph Convolutional Neural Networks (1)
- Graph Embedding (1)
- Grid stability (1)
- HITS (1)
- HLS (1)
- HMM (1)
- HPI Forschung (1)
- HPI research (1)
- HTML5 (1)
- Home appliances (1)
- ICT (1)
- IDS (1)
- IDS management (1)
- IEEE 802.15.4 (1)
- Identity Management (1)
- Identity leak (1)
- Identity management systems (1)
- Identität (1)
- Imbalanced medical image semantic segmentation (1)
- In-Memory technology (1)
- In-memory (1)
- Incubator (1)
- Innovation (1)
- Innovationsmanagement (1)
- Innovationsmethode (1)
- Integrity Verification (1)
- Internet (1)
- Internet of things (1)
- Interviews (1)
- Intrusion detection (1)
- Inventory systems (1)
- K-12 (1)
- KI-Labor (1)
- Künstliche Intelligenz (1)
- LSTM (1)
- Leadership (1)
- Learning behavior (1)
- Least privilege principle (1)
- Lecture Recording (1)
- Lecture video recording (1)
- Licenses (1)
- Link layer security (1)
- Load modeling (1)
- Lossy networks (1)
- Low-processing capable devices (1)
- MOOC Remote Lab (1)
- Machine learning (1)
- Management (1)
- Marktübersicht (1)
- Massive Open Online Courses (1)
- Mehr-Faktor-Authentifizierung (1)
- Meltdown (1)
- Memory Dumping (1)
- Micro-grid networks (1)
- Microservices Security (1)
- Mobile Learning (1)
- Mobiles (1)
- Model-driven SOA Security (1)
- Modell-getriebene SOA-Sicherheit (1)
- Monitoring (1)
- Moving Target Defense (1)
- Multimodal representation (1)
- Natural Language Processing (1)
- Network graph (1)
- Network monitoring (1)
- Network topology (1)
- Neural Networks (1)
- OAuth (1)
- Offline-Enabled (1)
- OpenID Connect (1)
- Orchestration (1)
- Organisationsveränderung (1)
- Outlier detection (1)
- Parallel processing (1)
- Peer Assessment (1)
- Peer assessment (1)
- Personality Prediction (1)
- Ph.D. Retreat (1)
- Ph.D. retreat (1)
- Power consumption characterization (1)
- Power demand (1)
- Prediction (1)
- Preterm (1)
- Privilege separation concept (1)
- Programming (1)
- Programming course (1)
- Project-based learning (1)
- Protocols (1)
- Psychological Emotions (1)
- Python (1)
- Recurrent generative (1)
- Remote patient monitoring (1)
- Research School (1)
- Resource constrained smart micro-grids (1)
- Resource description framework (1)
- Resource management (1)
- Robust optimization (1)
- Role-based access control (1)
- SAP HANA (1)
- SOA Security (1)
- SOA Sicherheit (1)
- School (1)
- Secondary Education (1)
- Secure Digital Identities (1)
- Secure Enterprise SOA (1)
- Security analytics (1)
- Security-as-a-Service (1)
- Semantic feature (1)
- Sensor networks (1)
- Service detection (1)
- Sichere Digitale Identitäten (1)
- Single-Sign-On (1)
- Smart Home Education (1)
- Smart micro-grids (1)
- Software (1)
- Spectre (1)
- Team Assessment (1)
- Team based assignment (1)
- Team-based Learning (1)
- Technology enhanced learning (1)
- Threat Models (1)
- Trust Management (1)
- Ubiquitous (1)
- Unified cloud model (1)
- Unified logging system (1)
- Unterricht mit digitalen Medien (1)
- Video annotations (1)
- Virtual Desktop Infrastructure (1)
- Virtualisierung (1)
- Virtualization (1)
- Vulnerability Assessment (1)
- Vulnerability analysis (1)
- Wireless sensor networks (1)
- abdominal imaging (1)
- accuracy (1)
- activities (1)
- adoption (1)
- adversarial network (1)
- application virtualization (1)
- argumentation research (1)
- attack graph (1)
- attribute assurance (1)
- bachelor project (1)
- basic cloud storage services (1)
- behavior psychotherapy (1)
- behavioral (1)
- biometrics (1)
- brand personality (1)
- change management (1)
- cloud monitoring (1)
- cloud security (1)
- cognition (1)
- cognitive patterns (1)
- collaboration (1)
- collaborative learning (1)
- collaborative tagging (1)
- collaborative work (1)
- collective intelligence (1)
- computer science (1)
- computer science education (1)
- computer-mediated therapy (1)
- content gamification (1)
- continuous (1)
- creativity (1)
- cyber humanistic (1)
- data integration (1)
- developing countries (1)
- diffusion (1)
- digital unterstützter Unterricht (1)
- digitale Infrastruktur für den Schulunterricht (1)
- distributed ledger technology (1)
- e-Learning (1)
- e-lecture (1)
- eLectures (1)
- education (1)
- emotion measurement (1)
- experience (1)
- expertise (1)
- final report (1)
- folksonomy (1)
- gait (1)
- gameful learning (1)
- generative multi-discriminative networks (1)
- healthcare (1)
- higher education (1)
- human-computer interaction (1)
- identity (1)
- identity broker (1)
- image captioning (1)
- imbalanced learning (1)
- in-memory technology (1)
- innovation capabilities (1)
- innovation management (1)
- key establishment (1)
- key management (1)
- key revocation (1)
- knowledge building (1)
- leadership (1)
- learner engagement (1)
- learning (1)
- learning styles (1)
- link layer security (1)
- machine (1)
- management (1)
- market study (1)
- measurement (1)
- medical documentation (1)
- medical identity theft (1)
- memory-based clustering (1)
- memory-based correlation (1)
- memory-based databases (1)
- metacognition (1)
- microcredential (1)
- multi factor authentication (1)
- multi-core (1)
- multimodal representations (1)
- mutli-task learning (1)
- narrative (1)
- note-taking (1)
- one-time password (1)
- online course (1)
- online-learning (1)
- organizational change (1)
- personality prediction (1)
- phishing (1)
- programming (1)
- project based learning (1)
- public cloud storage services (1)
- ranking (1)
- rekeying (1)
- research school (1)
- resilient architectures (1)
- school (1)
- security analytics (1)
- security chaos engineering (1)
- security risk assessment (1)
- segmentation (1)
- self-government (1)
- semantic (1)
- service-oriented systems engineering (1)
- social media analysis (1)
- spamming (1)
- steganography (1)
- storytelling (1)
- study (1)
- teamwork (1)
- tele-lab (1)
- telework (1)
- thinking styles (1)
- trust (1)
- trust model (1)
- user experience (1)
- verification (1)
- video annotation (1)
- virtual desktop infrastructure (1)
- virtual groups (1)
- virtualization (1)
- wearables (1)
- öffentliche Cloud Speicherdienste (1)
TransPipe
(2021)
Online learning environments, such as Massive Open Online Courses (MOOCs), often rely on videos as a major component to convey knowledge. However, these videos exclude potential participants who do not understand the lecturer’s language, regardless of whether that is due to language unfamiliarity or aural handicaps. Subtitles and/or interactive transcripts solve this issue, ease navigation based on the content, and enable indexing and retrieval by search engines. Although there are several automated speech-to-text converters and translation tools, their quality varies and the process of integrating them can be quite tedious. Thus, in practice, many videos on MOOC platforms only receive subtitles after the course is already finished (if at all) due to a lack of resources. This work describes an approach to tackle this issue by providing a dedicated tool, which is closing this gap between MOOC platforms and transcription and translation tools and offering a simple workflow that can easily be handled by users with a less technical background. The proposed method is designed and evaluated by qualitative interviews with three major MOOC providers.
User-generated content on social media platforms is a rich source of latent information about individual variables. Crawling and analyzing this content provides a new approach for enterprises to personalize services and put forward product recommendations. In the past few years, brands made a gradual appearance on social media platforms for advertisement, customers support and public relation purposes and by now it became a necessity throughout all branches. This online identity can be represented as a brand personality that reflects how a brand is perceived by its customers. We exploited recent research in text analysis and personality detection to build an automatic brand personality prediction model on top of the (Five-Factor Model) and (Linguistic Inquiry and Word Count) features extracted from publicly available benchmarks. The proposed model reported significant accuracy in predicting specific personality traits form brands. For evaluating our prediction results on actual brands, we crawled the Facebook API for 100k posts from the most valuable brands' pages in the USA and we visualize exemplars of comparison results and present suggestions for future directions.
ASEDS
(2018)
The Massive adoption of social media has provided new ways for individuals to express their opinion and emotion online. In 2016, Facebook introduced a new reactions feature that allows users to express their psychological emotions regarding published contents using so-called Facebook reactions. In this paper, a framework for predicting the distribution of Facebook post reactions is presented. For this purpose, we collected an enormous amount of Facebook posts associated with their reactions labels using the proposed scalable Facebook crawler. The training process utilizes 3 million labeled posts for more than 64,000 unique Facebook pages from diverse categories. The evaluation on standard benchmarks using the proposed features shows promising results compared to previous research. The final model is able to predict the reaction distribution on Facebook posts with a recall score of 0.90 for "Joy" emotion.
Social networking sites (SNS) are a rich source of latent information about individual characteristics. Crawling and analyzing this content provides a new approach for enterprises to personalize services and put forward product recommendations. In the past few years, commercial brands made a gradual appearance on social media platforms for advertisement, customers support and public relation purposes and by now it became a necessity throughout all branches. This online identity can be represented as a brand personality that reflects how a brand is perceived by its customers. We exploited recent research in text analysis and personality detection to build an automatic brand personality prediction model on top of the (Five-Factor Model) and (Linguistic Inquiry and Word Count) features extracted from publicly available benchmarks. Predictive evaluation on brands' accounts reveals that Facebook platform provides a slight advantage over Twitter platform in offering more self-disclosure for users' to express their emotions especially their demographic and psychological traits. Results also confirm the wider perspective that the same social media account carry a quite similar and comparable personality scores over different social media platforms. For evaluating our prediction results on actual brands' accounts, we crawled the Facebook API and Twitter API respectively for 100k posts from the most valuable brands' pages in the USA and we visualize exemplars of comparison results and present suggestions for future directions.
While the IEEE 802.15.4 radio standard has many features that meet the requirements of Internet of things applications, IEEE 802.15.4 leaves the whole issue of key management unstandardized. To address this gap, Krentz et al. proposed the Adaptive Key Establishment Scheme (AKES), which establishes session keys for use in IEEE 802.15.4 security. Yet, AKES does not cover all aspects of key management. In particular, AKES comprises no means for key revocation and rekeying. Moreover, existing protocols for key revocation and rekeying seem limited in various ways. In this paper, we hence propose a key revocation and rekeying protocol, which is designed to overcome various limitations of current protocols for key revocation and rekeying. For example, our protocol seems unique in that it routes around IEEE 802.15.4 nodes whose keys are being revoked. We successfully implemented and evaluated our protocol using the Contiki-NG operating system and aiocoap.
Organizations continue building virtual working teams (Teleworkers) to become more dynamic as part of their strategic innovation, with great benefits to individuals, business and society. However, during such transformations it is important to note that effective knowledge communication is particularly difficult in distributed environments as well as in non-interactive settings, because the interlocutors cannot use gestures or mimicry and have to adapt their expressions without receiving any feedback, which may affect the creation of tacit knowledge. Collective Intelligence appears to be an encouraging alternative for creating knowledge. However, in this scenario it faces an important goal to be achieved, as the degree of ability of two or more individuals increases with the need to overcome barriers through the aggregation of separately processed information, whereby all actors follow similar conditions to participate in the collective. Geographically distributed organizations have the great challenge of managing people’s knowledge, not only to keep operations running, but also to promote innovation within the organization in the creation of new knowledge. The management of knowledge from Collective Intelligence represents a big difference from traditional methods of information allocation, since managing Collective Intelligence poses new requirements. For instance, semantic analysis has to merge information, coming both from the content itself and the social/individual context, and in addition, the social dynamics that emerge online have to be taken into account. This study analyses how knowledge-based organizations working with decentralized staff may need to consider the cognitive styles and social behaviors of individuals participating in their programs to effectively manage knowledge in virtual settings. It also proposes assessment taxonomies to analyze online comportments at the levels of the individual and community, in order to successfully identify characteristics to help evaluate higher effectiveness of communication. We aim at modeling measurement patterns to identify effective ways of interaction of individuals, taking into consideration their cognitive and social behaviors.
Creation, collection and retention of knowledge in digital communities is an activity that currently requires being explicitly targeted as a secure method of keeping intellectual capital growing in the digital era. In particular, we consider it relevant to analyze and evaluate the empathetic cognitive personalities and behaviors that individuals now have with the change from face-to-face communication (F2F) to computer-mediated communication (CMC) online. This document proposes a cyber-humanistic approach to enhance the traditional SECI knowledge management model. A cognitive perception is added to its cyclical process following design thinking interaction, exemplary for improvement of the method in which knowledge is continuously created, converted and shared. In building a cognitive-centered model, we specifically focus on the effective identification and response to cognitive stimulation of individuals, as they are the intellectual generators and multiplicators of knowledge in the online environment. Our target is to identify how geographically distributed-digital-organizations should align the individual's cognitive abilities to promote iteration and improve interaction as a reliable stimulant of collective intelligence. The new model focuses on analyzing the four different stages of knowledge processing, where individuals with sympathetic cognitive personalities can significantly boost knowledge creation in a virtual social system. For organizations, this means that multidisciplinary individuals can maximize their extensive potential, by externalizing their knowledge in the correct stage of the knowledge creation process, and by collaborating with their appropriate sympathetically cognitive remote peers.
Live migration is an important feature in modern software-defined datacenters and cloud computing environments. Dynamic resource management, load balance, power saving and fault tolerance are all dependent on the live migration feature. Despite the importance of live migration, the cost of live migration cannot be ignored and may result in service availability degradation. Live migration cost includes the migration time, downtime, CPU overhead, network and power consumption. There are many research articles that discuss the problem of live migration cost with different scopes like analyzing the cost and relate it to the parameters that control it, proposing new migration algorithms that minimize the cost and also predicting the migration cost. For the best of our knowledge, most of the papers that discuss the migration cost problem focus on open source hypervisors. For the research articles focus on VMware environments, none of the published articles proposed migration time, network overhead and power consumption modeling for single and multiple VMs live migration. In this paper, we propose empirical models for the live migration time, network overhead and power consumption for single and multiple VMs migration. The proposed models are obtained using a VMware based testbed.