Refine
Year of publication
- 2018 (195) (remove)
Document Type
- Other (195) (remove)
Is part of the Bibliography
- yes (195) (remove)
Keywords
- E-Learning (3)
- Security Metrics (3)
- Security Risk Assessment (3)
- 3D Point Clouds (2)
- Cloud-Security (2)
- Internet of Things (2)
- Kanban (2)
- Lecture Video Archive (2)
- MQTT (2)
- Scrum (2)
- Secure Configuration (2)
- capstone course (2)
- embodied cognition (2)
- thermally stimulated discharge (2)
- 3D printing (1)
- 7924 (1)
- 7934 (1)
- 7959 (1)
- Aerosol (1)
- Agile methods (1)
- Algorithms (1)
- Android (1)
- Answer set programming (1)
- Application Container Security (1)
- Artikelindex (1)
- Asian American studies (1)
- Assays (1)
- Atlantic studies (1)
- Augmented reality (1)
- Automatic domain term extraction (1)
- BIM (1)
- BPMN (1)
- Basic English (1)
- Biological Assay (1)
- Black Pacific (1)
- Blockchain (1)
- Boolean Networks (1)
- Bourdieu (1)
- Business process models (1)
- Business process simulation (1)
- C. K. ogden (1)
- CKD (1)
- CPPS (1)
- CPS (1)
- CT (1)
- CWSI (1)
- Climate Change (1)
- Clock Tree Implementation (1)
- Cloud Audit (1)
- Cloud Service Provider (1)
- Collaborative learning (1)
- Curie transition (1)
- DEM (1)
- DMN (1)
- Danish (1)
- Data compression (1)
- Data mining (1)
- Data mining Machine learning (1)
- Data partitioning (1)
- Data profiling (1)
- Decision models (1)
- Discovery System (1)
- Distance Learning (1)
- Diverse solution enumeration (1)
- Dopamine (1)
- Dutch (1)
- Dänisch (1)
- E-Learning exam preparation (1)
- E-Lecture (1)
- Economic sociology (1)
- Edge Computing (1)
- Educational Data Mining (1)
- Embedded Programming (1)
- Emotion Mining (1)
- Energy efficiency (1)
- English dialects (1)
- Entropy (1)
- Epigenetic Biomarkers (1)
- Expert knowledge (1)
- Extensibility (1)
- Fabrication (1)
- Flash (1)
- Function of the spatial metaphor (1)
- GMDH (1)
- GTEx (1)
- Generalized additive mixed-effects modeling (1)
- Generalized knowledge constructin axiom (1)
- Geospatial intelligence (1)
- HLS (1)
- HTML5 (1)
- Haptics (1)
- Hebraica (1)
- Hierarchical Design (1)
- High Mountain Asia (1)
- IT project (1)
- Icelandic (1)
- Indoor Models (1)
- Industry 4.0 (1)
- Inertial measurement units (1)
- Information flow control (1)
- Information system (1)
- Inhibitory Control (1)
- Intelligence (1)
- Intent analysis (1)
- Interacting processes (1)
- International language (1)
- Internet of things (1)
- Interoperability (1)
- Isländisch (1)
- Isotype (1)
- Judaica (1)
- Katalog (1)
- Komplementierer (1)
- LDPE nanocomposites (1)
- Landsat (1)
- Learning (1)
- Lecture Recording (1)
- M2M (1)
- MOOC (1)
- MOOC Remote Lab (1)
- Machine (1)
- Machine Learning (1)
- Marine mammals (1)
- Maternal relationships (1)
- Meta-model (1)
- Metamaterials (1)
- Microservices Security (1)
- Migration (1)
- Minimum spanning tree (1)
- Mitochondrial DNA (1)
- Model checking (1)
- Moving Target Defense (1)
- N2/P3 (1)
- NAB (1)
- NETCONF (1)
- Natural Language Processing (1)
- Near infrared (1)
- Neural Networks (1)
- Niederländisch (1)
- Norwegian (1)
- Norwegisch (1)
- OH suppression (1)
- Ontology (1)
- Operator (1)
- Otto neurath (1)
- P(VDF-TrFE-CFE) terpolymer (1)
- PTH (1)
- Pacific studies (1)
- Passive Microwave (1)
- Peer assessment (1)
- Philosophy of language (1)
- Physical Implementation (1)
- Polygenic Risk Score (1)
- Population genetics (1)
- Predictive markers (1)
- Process modeling (1)
- Process-related data (1)
- Psychological Emotions (1)
- RNAseq (1)
- Raman lidar (1)
- Reward Anticipation (1)
- Risk factors (1)
- SMI (1)
- SPB (1)
- Satztyp (1)
- Schwedisch (1)
- Security analytics (1)
- Semantic Interoperability (1)
- Semantic Web (1)
- Semiotics (1)
- Service-Oriented (1)
- Servicification (1)
- Simulation process building (1)
- Smart Home Education (1)
- Snow (1)
- Social Media Analysis (1)
- Space and metaphor (1)
- Space and spatiality in the internet terminology (1)
- Spatial data handling systems (1)
- Static analysis (1)
- Structural health monitoring (1)
- Swedish (1)
- Syntax (1)
- TCGA (1)
- TIN (1)
- Team based assignment (1)
- Teamwork (1)
- Threat Models (1)
- Time series data (1)
- Time-resolved crystallography (1)
- Topic modeling (1)
- Transpacific studies (1)
- Tree maintenance (1)
- Triarchic Model of Psychopathy (1)
- UV (1)
- Unified logging system (1)
- Use cases Morphologic box (1)
- Video annotations (1)
- Vienna circle (1)
- Virtual reality (1)
- Vulnerability analysis (1)
- X-ray refraction (1)
- YANG (1)
- abstract concepts (1)
- accelerator architectures (1)
- accessibility (1)
- action observation (1)
- activities (1)
- additive manufacturing (1)
- apple (1)
- application (1)
- archipelagic studies (1)
- astronomy (1)
- astrophotonics (1)
- athletic performance (1)
- authentication (1)
- automated driving (1)
- avoid magnetometers (1)
- back motion assessment (1)
- balloon telescopes (1)
- basal body (1)
- behavior psychotherapy (1)
- behavioral (1)
- behavioral reasoning (1)
- blind (1)
- bridges (1)
- centriole (1)
- centrosome (1)
- chemical modification (1)
- chimera state (1)
- cilium (1)
- clause type (1)
- cloud monitoring (1)
- cognitive development (1)
- community effect on height (1)
- competitive growth (1)
- complementary actions (1)
- complementiser (1)
- computer-mediated therapy (1)
- conceptualization (1)
- continuous (1)
- cooperation and competition (1)
- creep (1)
- cross-over effect (1)
- crystallinity (1)
- crystallography (1)
- damage evolution (1)
- data integration (1)
- data transfer (1)
- democracy (1)
- democratic quality (1)
- detectors (1)
- development artifacts (1)
- discourse (1)
- distributional learning (1)
- domination (1)
- doping (1)
- drainage networks (1)
- drift correction (1)
- economy (1)
- electrets (1)
- electroacoustic probing (1)
- emotion measurement (1)
- enzymology (1)
- exercise (1)
- fabrication (1)
- far infrared (1)
- ferroelectrets (1)
- ferroelectric and paraelectric phases (1)
- fibre Bragg gratings (1)
- field (1)
- fitness (1)
- flow accumulation (1)
- force-feedback (1)
- gait (1)
- gaming (1)
- gene selection (1)
- hardware (1)
- human motion analysis (1)
- human-computer interaction (1)
- humanoid (1)
- imitation (1)
- indigenous studies (1)
- injury prevention (1)
- intentionality (1)
- international academic mobility (1)
- internationalization (1)
- inversion (1)
- joint action (1)
- joint angle estimation (1)
- joint lab (1)
- kinematics (1)
- labeling (1)
- large scale mechanism (1)
- left periphery (1)
- lexical tone (1)
- lidar (1)
- linke Peripherie (1)
- locomotion (1)
- low back pain (1)
- low-density polyethylene (1)
- low-duty-cycling (1)
- management zone (1)
- measurement (1)
- medical documentation (1)
- mental number line (1)
- metal matrix composite (1)
- method development (1)
- methodology (1)
- microscopy (1)
- microstructures (1)
- microtubules (1)
- mismatch negativity (1)
- multimodal wireless sensor network (1)
- negative numbers (1)
- non-photorealistic rendering (1)
- nonlinear dynamics (1)
- nonlocal coupling (1)
- note-taking (1)
- nucleus-associated body (1)
- observatory (1)
- oceanic discourse (1)
- oneM2M (1)
- oneM2M Ontology (1)
- operator (1)
- oxidative stress (1)
- partial synchronization (1)
- particle microphysics (1)
- phase lag (1)
- phase oscillator (1)
- photometer (1)
- physical fitness (1)
- plyometric training (1)
- point clouds (1)
- point-based rendering (1)
- polypropylene (1)
- porosity (1)
- pre-attentive discrimination (1)
- precision agriculture (1)
- programmable matter (1)
- quenching (1)
- radiography (1)
- real-time rendering (1)
- real-walking (1)
- recreational sport (1)
- recrystallization (1)
- regularization (1)
- relaxor-ferroelectric polymer (1)
- reliability (1)
- restoration (1)
- safety (1)
- security (1)
- security analytics (1)
- smartphone (1)
- social cognition (1)
- social robots (1)
- software engineering (1)
- soil moisture (1)
- space-charge and polarization profiles (1)
- spectroscopy (1)
- speech acoustics (1)
- speech perception (1)
- speech production (1)
- speech variability (1)
- spindle pole body (1)
- state (1)
- steel and concrete structures (1)
- stochastic filtering (1)
- strain gauges (1)
- strain sensors (1)
- strategic growth adjustments (1)
- strength training (1)
- study abroad (1)
- study-related student travel (1)
- stunting (1)
- style transfer (1)
- surface charge stability (1)
- synchronization (1)
- synchrotron X-ray refraction radiography (1)
- syntax (1)
- teacher education (1)
- teaching students (1)
- time series (1)
- tissue-awareness (1)
- tomography (1)
- transoceanic studies (1)
- triangle method (1)
- turing test (1)
- uncertainty quantification (1)
- undernutrition (1)
- user experience (1)
- validation against optical motion capture (1)
- variable geometry truss (1)
- verbal reports (1)
- verification (1)
- visualization (1)
- visually impaired (1)
- voice onset time (1)
- vowels (1)
- wake-up radio (1)
- web-based rendering (1)
- young adults (1)
Institute
- Hasso-Plattner-Institut für Digital Engineering GmbH (52)
- Institut für Physik und Astronomie (18)
- Institut für Geowissenschaften (17)
- Institut für Biochemie und Biologie (16)
- Department Psychologie (13)
- Department Sport- und Gesundheitswissenschaften (13)
- Institut für Informatik und Computational Science (13)
- Institut für Ernährungswissenschaft (12)
- Institut für Chemie (8)
- Department Linguistik (6)
Speech scientists have long noted that the qualities of naturally-produced vowels do not remain constant over their durations regardless of being nominally "monophthongs" or "diphthongs". Recent acoustic corpora show that there are consistent patterns of first (F1) and second (F2) formant frequency change across different vowel categories. The three Australian English (AusE) close front vowels /i:, 1, i/ provide a striking example: while their midpoint or mean F1 and F2 frequencies are virtually identical, their spectral change patterns distinctly differ. The results indicate that, despite the distinct patterns of spectral change of AusE /i:, i, la/ in production, its perceptual relevance is not uniform, but rather vowel-category dependent.
Previous work has shown that surface modification with orthophosphoric acid can significantly enhance the charge stability on polypropylene (PP) surface by generating deeper traps. In the present study, thermally stimulated potential-decay measurements revealed that the chemical treatment may also significantly increase the number of available trapping sites on the surface. Thus, as a consequence, the so-called "cross-over" phenomenon, which is observed on as-received and thermally treated PP electrets, may be overcome in a certain range of initial charge densities. Furthermore, the discharge behavior of chemically modified samples indicates that charges can be injected from the treated surface into the bulk, and/or charges of opposite polarity can be pulled from the rear electrode into the bulk at elevated temperatures and at the high electric fields that are caused by the deposited charges. In the bulk, a lack of deep traps causes rapid charge decay already in the temperature range around 95 degrees C.
The nature restoration project ‘Lenzener Elbtalaue’, realised from 2002 to 2011 at the river Elbe, included the first large scale dike relocation in Germany (420 ha). Its aim was to initiate the development of endangered natural wetland habitats and processes, accompanied by greater biodiversity in the former grassland dominated area. The monitoring of spatial and temporal variations of soil moisture in this dike relocation area is therefore particularly important for estimating the restoration success. The topsoil moisture monitoring from 1990 to 2017 is based on the Soil Moisture Index (SMI)1 derived with the triangle method2 by use of optical remotely sensed data: land surface temperature and Normalized Differnce Vegetation Index are calculated from Landsat 4/5/7/8 data and atmospheric corrected by use of MODIS data. Spatial and temporal soil moisture variations in the restored area of the dike relocation are compared to the agricultural and pasture area behind the new dike. Ground truth data in the dike relocation area was obtained from field measurements in October 2017 with a FDR device. Additionally, data from a TERENO soil moisture sensor network (SoilNet) and mobile cosmic ray neutron sensing (CRNS) rover measurements are compared to the results of the triangle method for a region in the Harz Mountains (Germany). The SMI time series illustrates, that the dike relocation area has become significantly wetter between 1990 and 2017, due to restructuring measurements. Whereas the SMI of the dike hinterland reflects constant and drier conditions. An influence of climate is unlikely. However, validation of the dimensionless index with ground truth measurements is very difficult, mostly due to large differences in scale.
CSBAuditor
(2018)
Cloud Storage Brokers (CSB) provide seamless and concurrent access to multiple Cloud Storage Services (CSS) while abstracting cloud complexities from end-users. However, this multi-cloud strategy faces several security challenges including enlarged attack surfaces, malicious insider threats, security complexities due to integration of disparate components and API interoperability issues. Novel security approaches are imperative to tackle these security issues. Therefore, this paper proposes CSBAuditor, a novel cloud security system that continuously audits CSB resources, to detect malicious activities and unauthorized changes e.g. bucket policy misconfigurations, and remediates these anomalies. The cloud state is maintained via a continuous snapshotting mechanism thereby ensuring fault tolerance. We adopt the principles of chaos engineering by integrating Broker Monkey, a component that continuously injects failure into our reference CSB system, Cloud RAID. Hence, CSBAuditor is continuously tested for efficiency i.e. its ability to detect the changes injected by Broker Monkey. CSBAuditor employs security metrics for risk analysis by computing severity scores for detected vulnerabilities using the Common Configuration Scoring System, thereby overcoming the limitation of insufficient security metrics in existing cloud auditing schemes. CSBAuditor has been tested using various strategies including chaos engineering failure injection strategies. Our experimental evaluation validates the efficiency of our approach against the aforementioned security issues with a detection and recovery rate of over 96 %.