Refine
Has Fulltext
- no (1889) (remove)
Year of publication
- 2017 (1889) (remove)
Document Type
- Article (1398)
- Doctoral Thesis (168)
- Other (118)
- Part of a Book (93)
- Review (52)
- Monograph/Edited Volume (46)
- Conference Proceeding (6)
- Habilitation Thesis (4)
- Journal/Publication series (2)
- Contribution to a Periodical (1)
Is part of the Bibliography
- yes (1889)
Keywords
- stars: massive (11)
- Germany (10)
- Holocene (9)
- German (8)
- climate change (8)
- stars: early-type (8)
- adolescence (7)
- stars: winds, outflows (7)
- Arabidopsis (6)
- Arabidopsis thaliana (6)
Institute
- Institut für Biochemie und Biologie (330)
- Institut für Geowissenschaften (254)
- Institut für Physik und Astronomie (251)
- Institut für Chemie (132)
- Department Psychologie (117)
- Department Sport- und Gesundheitswissenschaften (86)
- Institut für Ernährungswissenschaft (69)
- Department Linguistik (53)
- Institut für Mathematik (52)
- Institut für Romanistik (49)
Cost models play an important role for the efficient implementation of software systems. These models can be embedded in operating systems and execution environments to optimize execution at run time. Even though non-uniform memory access (NUMA) architectures are dominating today's server landscape, there is still a lack of parallel cost models that represent NUMA system sufficiently. Therefore, the existing NUMA models are analyzed, and a two-step performance assessment strategy is proposed that incorporates low-level hardware counters as performance indicators. To support the two-step strategy, multiple tools are developed, all accumulating and enriching specific hardware event counter information, to explore, measure, and visualize these low-overhead performance indicators. The tools are showcased and discussed alongside specific experiments in the realm of performance assessment.
This paper discusses a new approach for designing and deploying Security-as-a-Service (SecaaS) applications using cloud native design patterns. Current SecaaS approaches do not efficiently handle the increasing threats to computer systems and applications. For example, requests for security assessments drastically increase after a high-risk security vulnerability is disclosed. In such scenarios, SecaaS applications are unable to dynamically scale to serve requests. A root cause of this challenge is employment of architectures not specifically fitted to cloud environments. Cloud native design patterns resolve this challenge by enabling certain properties e.g. massive scalability and resiliency via the combination of microservice patterns and cloud-focused design patterns. However adopting these patterns is a complex process, during which several security issues are introduced. In this work, we investigate these security issues, we redesign and deploy a monolithic SecaaS application using cloud native design patterns while considering appropriate, layered security counter-measures i.e. at the application and cloud networking layer. Our prototype implementation out-performs traditional, monolithic applications with an average Scanner Time of 6 minutes, without compromising security. Our approach can be employed for designing secure, scalable and performant SecaaS applications that effectively handle unexpected increase in security assessment requests.
Welterleben/Weiterleben
(2017)
Welterleben and Weiterleben are what determine the second globalization (of four previously explored) whose constantly accelerating dynamic, vectorization, this essay explores. On the basis of selected writings of Georg Forster, Alexander von Humboldt, and Adelbert von Chamisso, the author highlights the increasing speed with which knowledge, especially in the experiential sciences, is produced and disseminated following the routes of ever-widening trade speeded along by globalization. The notion of ‘vectopia’ stands for the connection of utopia and uchronia in space and time in such a way that the experience of the world, expanded worldwide, contains within it a Weiter-Leben, a ‘living-further’ that is to be understood first in a spatial, and not yet temporal, sense, of what Forster called Erfahrungswissen, or ‘experiential knowledge.’ Vectopia, as elaborated here, has a material dimension that relates to the physical person, the body, the experience of the world that cannot occur without the constant changing of place, without a journeying that is again and again recommenced. Vectopia develops the projection of a life not from space or from time alone, but by their combination. Vectopia is more than a concept, it is a thought-figure: it is vitally connected to life, and thus a life-figure. It opens itself to a type of knowledge that stands almost at the threshold of a further life, indeed, of a Weiterleben that, opening itself to a ‘living-onward,’ resides beyond space, time, and movement.
Mixed-projection treemaps
(2017)
This paper presents a novel technique for combining 2D and 2.5D treemaps using multi-perspective views to leverage the advantages of both treemap types. It enables a new form of overview+detail visualization for tree-structured data and contributes new concepts for real-time rendering of and interaction with treemaps. The technique operates by tilting the graphical elements representing inner nodes using affine transformations and animated state transitions. We explain how to mix orthogonal and perspective projections within a single treemap. Finally, we show application examples that benefit from the reduced interaction overhead.
The maximum entropy method is used to predict flows on water distribution networks. This analysis extends the water distribution network formulation of Waldrip et al. (2016) Journal of Hydraulic Engineering (ASCE), by the use of a continuous relative entropy defined on a reduced parameter set. This reduction in the parameters that the entropy is defined over ensures consistency between different representations of the same network. The performance of the proposed reduced parameter method is demonstrated with a one-loop network case study.
The maximum entropy method is used to derive an alternative gravity model for a transport network. The proposed method builds on previous methods which assign the discrete value of a maximum entropy distribution to equal the traffic flow rate. The proposed method however, uses a distribution to represent each flow rate. The proposed method is shown to be able to handle uncertainty in a more elegant way and give similar results to traditional methods. It is able to incorporate more of the observed data through the entropy function, prior distribution and integration limits potentially allowing better inferences to be made.
Linked Data on the Web represents an immense source of knowledge suitable to be automatically processed and queried. In this respect, there are different approaches for Linked Data querying that differ on the degree of centralization adopted. On one hand, the SPARQL query language, originally defined for querying single datasets, has been enhanced with features to query federations of datasets; however, this attempt is not sufficient to cope with the distributed nature of data sources available as Linked Data. On the other hand, extensions or variations of SPARQL aim to find trade-offs between centralized and fully distributed querying. The idea is to partially move the computational load from the servers to the clients. Despite the variety and the relative merits of these approaches, as of today, there is no standard language for querying Linked Data on theWeb. A specific requirement for such a language to capture the distributed, graph-like nature of Linked Data sources on the Web is a support of graph navigation. Recently, SPARQL has been extended with a navigational feature called property paths (PPs). However, the semantics of SPARQL restricts the scope of navigation via PPs to single RDF graphs. This restriction limits the applicability of PPs for querying distributed Linked Data sources on the Web. To fill this gap, in this paper we provide formal foundations for evaluating PPs on the Web, thus contributing to the definition of a query language for Linked Data. We first introduce a family of reachability-based query semantics for PPs that distinguish between navigation on the Web and navigation at the data level. Thereafter, we consider another, alternative query semantics that couples Web graph navigation and data level navigation; we call it context-based semantics. Given these semantics, we find that for some PP-based SPARQL queries a complete evaluation on the Web is not possible. To study this phenomenon we introduce a notion of Web-safeness of queries, and prove a decidable syntactic property that enables systems to identify queries that areWeb-safe. In addition to establishing these formal foundations, we conducted an experimental comparison of the context-based semantics and a reachability- based semantics. Our experiments show that when evaluating a PP-based query under the context-based semantics one experiences a significantly smaller number of dereferencing operations, but the computed query result may contain less solutions.
Tone and intonation in Akan
(2017)
This chapter provides an account of the intonation patterns in Akan (Kwa, Niger-Congo). Tonal processes such as downstep, tonal spreading and tonal replacement influence the surface tone pattern of a sentence. In general, any Akan utterance independent of sentence type shows a characteristic down-trend in pitch. This chapter proposes that Akan employs a simple post-lexical tonal grammar that accounts for the shapes of an intonation contour. The unmarked post-lexical structure is found in simple declaratives. The downward trend of an intonation contour is shaped by local tonal interactions (downstep), and sentence-final tonal neutralization. In polar questions, an iota-phrase-final low boundary tone (L%) accounts for the intensity increase and lengthening of the final vowel compared to a declarative. Complex declaratives and left-dislocations show a partial pitch reset at the left edge of an embedded iota-phrase. Underlying lexical tones are not affected by intonation with the exception of sentence-final H-tones.
Lately, first implementation approaches of Internet of Things (IoT) technologies penetrate industrial value-adding processes. Within this, the competence requirements for employees are changing. Employees’ organization, process, and interaction competences are of crucial importance in this new IoT environment, however, in students and vocational training not sufficiently considered yet. On the other hand, conventional learning factories evolve and transform to digital learning factories. Nevertheless, the integration of IoT technology and its usage for training in digital learning factories has been largely neglected thus far. Existing learning factories do not explicitly and properly consider IoT technology, which leads to deficiencies regarding an appropriate development of employees’ Industrial IoT competences. The goal of this contribution is to point out a didactic concept that enables development and training of these new demanded competences by using an IoT laboratory. For this purpose, a design science approach is applied. The result of this contribution is a didactic concept for the development of Industrial IoT competences in an IoT laboratory.