Filtern
Volltext vorhanden
- nein (239) (entfernen)
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (144)
- Sonstiges (84)
- Dissertation (8)
- Teil eines Buches (Kapitel) (1)
- Konferenzveröffentlichung (1)
- Habilitation (1)
Gehört zur Bibliographie
- ja (239) (entfernen)
Schlagworte
- E-Learning (4)
- MOOC (4)
- Scrum (4)
- evaluation (4)
- machine learning (4)
- BPMN (3)
- Business process models (3)
- DMN (3)
- Dynamic pricing (3)
- Natural language processing (3)
- Security Metrics (3)
- Security Risk Assessment (3)
- Teamwork (3)
- creativity (3)
- natural language processing (3)
- 3D printing (2)
- Android (2)
- Answer set programming (2)
- Blockchain (2)
- Cloud-Security (2)
- Data profiling (2)
- Decision models (2)
- Dynamic programming (2)
- Energy (2)
- Information flow control (2)
- Kanban (2)
- Lecture Video Archive (2)
- MAC security (2)
- MOOCs (2)
- Machine Learning (2)
- Oligopoly competition (2)
- Secure Configuration (2)
- Security (2)
- Smart micro-grids (2)
- Social Media Analysis (2)
- Taxonomy (2)
- capstone course (2)
- course design (2)
- deep learning (2)
- design thinking (2)
- digital health (2)
- fabrication (2)
- framework (2)
- game dynamics (2)
- inertial measurement unit (2)
- innovation (2)
- parameterized complexity (2)
- price of anarchy (2)
- proteomics (2)
- real-time rendering (2)
- retrospective (2)
- software development (2)
- software engineering (2)
- software process improvement (2)
- stable matching (2)
- style transfer (2)
- text mining (2)
- transparency (2)
- user experience (2)
- user-generated content (2)
- variable geometry truss (2)
- 3D Point Clouds (1)
- 3D geovirtual environment (1)
- 3D geovisualization system (1)
- 3D point clouds (1)
- 3D visualization (1)
- 3D-Geovisualisierungssystem (1)
- 3D-geovirtuelle Umgebung (1)
- AI Act (1)
- AMIGOS dataset (1)
- Activity-oriented Optimization (1)
- Adoption effects (1)
- Advertising (1)
- Agent-based model (1)
- Agile (1)
- Agile methods (1)
- Alcohol Use Disorders Identification Test (1)
- Alcohol use assessment (1)
- Algebraic methods (1)
- Algorithms (1)
- Alzheimer's Disease (1)
- Anomaly detection (1)
- Application Container Security (1)
- Approximation algorithms (1)
- Architecture synthesis (1)
- Architectures (1)
- Artistic Image Stylization (1)
- Audit (1)
- Autoimmune (1)
- Automated parsing (1)
- Automatic domain term extraction (1)
- BRCA1 (1)
- Back Pain (1)
- Bandwidth (1)
- Batch activity (1)
- Batch processing (1)
- Bayesian Networks; (1)
- Behavioral economics (1)
- Behavioral equivalence and refinement (1)
- Big Five Model (1)
- Big Five model (1)
- Bisimulation and simulation (1)
- Blockchain Governance (1)
- Blockchain-enabled Governance (1)
- Boolean Networks (1)
- Brand Personality (1)
- Business Process Management (1)
- Business process choreographies (1)
- Business process improvement (1)
- Business process modeling (1)
- Business process simulation (1)
- C++ tool (1)
- CMOS technology (1)
- Car safety management (1)
- Case Management (1)
- Causal inference (1)
- Causal structure learning (1)
- Causality; (1)
- Cheating attacks (1)
- Chronic Nonspecific Low (1)
- Circular economy (1)
- Clinical decision support (1)
- Clinical predictive modeling (1)
- Clinical risk prediction (1)
- Cloud Audit (1)
- Cloud Computing (1)
- Cloud Service Provider (1)
- Cloud computing (1)
- Clusteranalyse (1)
- Co-production (1)
- Collaborative learning (1)
- Colored Petri Net (1)
- Commonsense reasoning (1)
- Community analysis (1)
- Complexity (1)
- Computer architecture (1)
- Conceptual Fit (1)
- Conceptual modeling (1)
- Contamination (1)
- ContextErlang (1)
- Critical pair analysis (CPA) (1)
- Cross-platform (1)
- Cultural factors (1)
- Custom Writable Class (1)
- DAG (1)
- DALY (1)
- DSA (1)
- Data breach (1)
- Data compression (1)
- Data mining (1)
- Data mining Machine learning (1)
- Data modeling (1)
- Data partitioning (1)
- Data processing (1)
- Data profiling application (1)
- Data warehouse (1)
- Data-driven price anticipation (1)
- Data-driven strategies (1)
- Database (1)
- Debugging (1)
- Decision support (1)
- Declarative modelling (1)
- Deep learning (1)
- Delays (1)
- Denial of sleep (1)
- Denkstile (1)
- Digitization (1)
- Disadvantaged communities (1)
- Distance Learning (1)
- Distance learning (1)
- Distributed snapshot algorithm (1)
- Diverse solution enumeration (1)
- Document classification (1)
- Domain Objects (1)
- Drift (1)
- Dynamic pricing competition (1)
- E-Learning exam preparation (1)
- E-Lecture (1)
- E-commerce (1)
- E-health (1)
- EMG (1)
- Economic evaluation (1)
- Educational Data Mining (1)
- Educational Technology (1)
- Educational data mining (1)
- Effect measurement (1)
- Electrical products (1)
- Electronic health record (1)
- Embedded Programming (1)
- Emotion Mining (1)
- Energy efficiency (1)
- Entitätsverknüpfung (1)
- Entropy (1)
- Enumeration algorithm (1)
- Equity (1)
- Estimation-of-distribution algorithm (1)
- European reference networks (1)
- Expert knowledge (1)
- Expressive rendering (1)
- Extensibility (1)
- Eye-tracking (1)
- Fabrication (1)
- Feature selection (1)
- Feedback control loop (1)
- Field study (1)
- First-hitting time (1)
- Flash (1)
- Forecasting (1)
- Foreign key (1)
- Formal modelling (1)
- Formal verification of behavior preservation (1)
- G-estimation (1)
- GMDH (1)
- GTEx (1)
- Gene Expression Data Analysis (1)
- Gene expression (1)
- General Earth and Planetary Sciences (1)
- General demand function (1)
- Genomics education (1)
- Geography, Planning and Development (1)
- Geospatial intelligence (1)
- Graph Algorithms (1)
- Graph Theory (1)
- Graph algorithm (1)
- Graph logic (1)
- Graph logics (1)
- Graph transformation (1)
- Graph transformation (double pushout approach) (1)
- Graph transformations (1)
- Grid stability (1)
- HENSHIN (1)
- HLS (1)
- HPI Schul-Cloud (1)
- HTML5 (1)
- Heuristic triangle estimation (1)
- Holant problems (1)
- Home appliances (1)
- Hyperbolic Geometry (1)
- ICT (1)
- IEEE 802.15.4 (1)
- IT project (1)
- Identity leak (1)
- Image Abstraction (1)
- Image Processing (1)
- Imbalanced medical image semantic segmentation (1)
- Indoor environments (1)
- Industry 4.0 (1)
- Information system (1)
- Institutions (1)
- Integrative Gene Selection (1)
- Intent analysis (1)
- Interacting processes (1)
- Interactive Media (1)
- Interactive control (1)
- Internet (1)
- Internet of Things (1)
- Internet of things (1)
- Interoperability (1)
- Interpretability (1)
- Invariant checking (1)
- Java (1)
- JavaScript (1)
- K-12 (1)
- Kalman filtering (1)
- Kernelization (1)
- Klassifikation (1)
- Knowledge Bases (1)
- Kognitionswissenschaft (1)
- LC-MS (1)
- Large networks (1)
- Large scale analytics (1)
- Law (1)
- Learning Factory (1)
- Learning analytics (1)
- Lecture Recording (1)
- Level-of-detail visualization (1)
- Linear model (1)
- Link layer security (1)
- Literature review (1)
- Load modeling (1)
- Log data (1)
- Lossy networks (1)
- Low-processing capable devices (1)
- MOOC Remote Lab (1)
- MQTT (1)
- MS (1)
- Manufacturing (1)
- Markov model (1)
- Massive Open Online Course (MOOC) (1)
- Massive open online courses (1)
- Medical research (1)
- Meltdown (1)
- Memory Dumping (1)
- Metamaterials (1)
- Micro-grid networks (1)
- Microbiome (1)
- Microservice (1)
- Microservices Security (1)
- Minimal hitting set (1)
- Minimum spanning tree (1)
- Mobile Learning (1)
- Mobile applications (1)
- Mobile devices (1)
- Mobiles (1)
- Model checking (1)
- Model extraction (1)
- Monitoring (1)
- Monte Carlo simulation (1)
- Moving Target Defense (1)
- Multi-objective optimization (1)
- Multiview classification (1)
- N-of-1 trials (1)
- NEDA (1)
- NETCONF (1)
- NGS (1)
- NP-hardness (1)
- Nash equilibrium (1)
- Natural Language Processing (1)
- Natural language analysis (1)
- Navigational logics (1)
- Nephrology (1)
- Network Science (1)
- Network analysis (1)
- Network creation games (1)
- Neural Networks (1)
- Neural networks (1)
- New Public Governance (1)
- Non-photorealistic rendering (1)
- Offline-Enabled (1)
- Online survey (1)
- Ontology (1)
- Open source (1)
- Opinion mining (1)
- Optimal control (1)
- OptoGait (1)
- Ordinances (1)
- Overlapping community detection (1)
- PIRA (1)
- PRISM model checker (1)
- PTCTL (1)
- PTM (1)
- Parallel independence (1)
- Parallel processing (1)
- Parallelized algorithm (1)
- Parking search (1)
- Patents (1)
- Patient (1)
- Pattern (1)
- Pattern Recognition (1)
- Peer Assessment (1)
- Peer assessment (1)
- Peer-to-Peer ridesharing (1)
- Performance evaluation (1)
- Personal genotyping (1)
- Personality Prediction (1)
- Personalized medicine (1)
- Polystore (1)
- Popular matching (1)
- Power auctioning (1)
- Power consumption characterization (1)
- Power demand (1)
- Predictive models (1)
- Pricing (1)
- Primary biliary cholangitis (1)
- Primary key (1)
- Primary sclerosing cholangitis (1)
- Prior Knowledge (1)
- Prior knowledge (1)
- Privacy (1)
- Probabilistic timed automata (1)
- Process Enactment (1)
- Process Execution (1)
- Process architecture (1)
- Process discovery (1)
- Process landscape (1)
- Process map (1)
- Process mining (1)
- Process model (1)
- Process-related data (1)
- Programming course (1)
- Project-based learning (1)
- Psychiatric disorders (1)
- Psychological Emotions (1)
- Python (1)
- QUALY (1)
- Query optimization (1)
- RAW (1)
- RESTful choreographies (1)
- RGB-D cameras (1)
- RNAseq (1)
- Random process (1)
- Randomized clinical trials (1)
- Real-time rendering (1)
- Reconfigurable architecture (1)
- Recurrent generative (1)
- Recycling investments (1)
- Refactoring (1)
- Relational model transformation (1)
- Reproducible benchmarking (1)
- Resource Allocation (1)
- Resource Management (1)
- Resource constrained smart micro-grids (1)
- Response strategies (1)
- Roadmap (1)
- Runtime improvement (1)
- Russia (1)
- SAFE (1)
- SET effects (1)
- Schelling segregation (1)
- Schelling's segregation model (1)
- School (1)
- Secondary Education (1)
- Security analytics (1)
- Semantic Web (1)
- Semantic enrichment (1)
- Sensor networks (1)
- Servers (1)
- Service-oriented (1)
- Serviceorientierte Architektur (SOA) (1)
- Servicification (1)
- Simulation study (1)
- Smart Home Education (1)
- Smart cities (1)
- Social (1)
- Software engineering (1)
- Source Code Readability (1)
- Spatial data handling systems (1)
- Spatio-Temporal Data (1)
- Spatio-temporal data analysis (1)
- Spatio-temporal visualization (1)
- Specification (1)
- Spectre (1)
- Spin system (1)
- Squeak (1)
- Stable marriage (1)
- Stable matching (1)
- StackOverflow (1)
- Standard (1)
- Static analysis (1)
- Statistical process mining (1)
- Stochastic differential games (1)
- Strategic cognition (1)
- Style transfer (1)
- Subject-oriented learning (1)
- Supervised deep neural (1)
- Survey (1)
- System design (1)
- TCGA (1)
- Team Assessment (1)
- Team based assignment (1)
- Team-based Learning (1)
- Technology mapping (1)
- Text mining (1)
- Theory (1)
- Threat Models (1)
- Time series analysis (1)
- Time series data (1)
- Topic modeling (1)
- Training (1)
- Trajectory Data Management (1)
- Trajectory visualization (1)
- Transportability (1)
- Transversal hypergraph (1)
- Tree maintenance (1)
- Treemaps (1)
- Triple graph grammars (1)
- Ubiquitous (1)
- Ubiquitous business process (1)
- Unbiasedness (1)
- Unified logging system (1)
- Unique column combination (1)
- Validation (1)
- Verarbeitung natürlicher Sprache (1)
- Video annotations (1)
- Virtual Machine (1)
- Visual analytics (1)
- Visualization (1)
- Vulnerability analysis (1)
- WALA (1)
- W[3]-Completeness (1)
- Water Science and Technology (1)
- Weighted clustering coefficient (1)
- Wireless sensor networks (1)
- Wissensmanagement (1)
- Word embedding (1)
- X-ray (1)
- XIC extraction (1)
- YANG (1)
- Zebris (1)
- accelerator architectures (1)
- acceptability (1)
- accuracy (1)
- action problems (1)
- active layers (1)
- active touch (1)
- acute kidney injury (1)
- acyclic preferences (1)
- adversarial network (1)
- agile (1)
- algorithms (1)
- allocation problem (1)
- approximate counting (1)
- architectures (1)
- artificial intelligence (1)
- artificial intelligence for health (1)
- aspect-oriented programming (1)
- assignments (1)
- availability (1)
- bachelor project (1)
- behavior psychotherapy (1)
- benchmark (1)
- bildbasierte Repräsentation (1)
- bioinformatics (1)
- bioinformatics tool (1)
- biomarker (1)
- blockchain (1)
- brand personality (1)
- breast-cancer (1)
- business process management (1)
- business processes (1)
- circular economy (1)
- classification (1)
- clinical exome (1)
- cliquy tree (1)
- cloud computing (1)
- cloud monitoring (1)
- clustering (1)
- cognitive load (1)
- cognitive science (1)
- combinational logic (1)
- communication (1)
- comparison (1)
- comparison of devices (1)
- competence (1)
- complex disease (1)
- complex networks (1)
- complexity (1)
- compliance (1)
- computational hardness (1)
- computational mass spectrometry (1)
- computational models (1)
- computer science education (1)
- computer-mediated therapy (1)
- conformance checking (1)
- connectivity (1)
- constrained optimization (1)
- content gamification (1)
- context (1)
- context groups (1)
- contextual-variability modeling (1)
- coping ability (1)
- corticospinal tract (1)
- cost (1)
- cost-effectiveness (1)
- cost-utility analysis (1)
- cumulative culture (1)
- data (1)
- data integration (1)
- data pipeline (1)
- data transfer (1)
- database replication (1)
- decoupling cells (1)
- deferred choice (1)
- demand learning (1)
- design behaviour (1)
- design cognition (1)
- developing countries (1)
- development artifacts (1)
- diagnostics (1)
- dialect (1)
- diffusion MRI; (1)
- digital health app (1)
- digital therapy (1)
- digital transformation (1)
- disability-adjusted life years (1)
- disease activity measurements (1)
- disorder recognition (1)
- dominant matching (1)
- drift theory (1)
- dry fasting (1)
- dynamic AOP (1)
- dynamic causal modeling (1)
- dynamic service adaptation (1)
- e-Commerce (1)
- e-commerce (1)
- e-learning (1)
- early MS (1)
- eating behaviour (1)
- eco-efficiency (1)
- economic (1)
- economic obsolescence (1)
- edge-weighted networks (1)
- education (1)
- electrodermal activity (1)
- emotion classification (1)
- emotion measurement (1)
- end-stage kidney disease (1)
- entity linking (1)
- entity-component-system (1)
- epilepsy (1)
- everyday life (1)
- evolutionary computation (1)
- exact algorithms (1)
- expectation maximisation algorithm (1)
- extension problems (1)
- facial mimicry (1)
- federated learning (1)
- field study (1)
- flexibility (1)
- forest number (1)
- formal semantics (1)
- formal testing (1)
- gait analysis (1)
- gait analysis algorithm (1)
- gameful learning (1)
- gene (1)
- gene selection (1)
- genome-wide association (1)
- genome-wide association study (1)
- genomics (1)
- geographical distribution (1)
- graph (1)
- graph analysis (1)
- graph conditions (1)
- graphical query language (1)
- group-based behavior adaptation (1)
- hardware (1)
- hate speech detection (1)
- health app (1)
- health behaviour (1)
- healthcare (1)
- hepatitis (1)
- human activity recognition (1)
- human motion (1)
- human-computer interaction (1)
- human-robot interaction (1)
- image processing (1)
- image stylization (1)
- image-based representation (1)
- implied methods (1)
- independency tree (1)
- industry (1)
- industry 4.0 (1)
- infectious diseases (1)
- information quality (1)
- innovation laboratories (1)
- insula (1)
- intermittent food restriction (1)
- internet topology (1)
- intransitivity (1)
- invention (1)
- invention mechanism (1)
- inventory management (1)
- key establishment (1)
- key management (1)
- key revocation (1)
- knowledge management (1)
- künstliche Intelligenz (1)
- label-free quantification (1)
- labeling (1)
- large scale mechanism (1)
- large-scale mechanism (1)
- learner engagement (1)
- learning (1)
- learning factories (1)
- learning path (1)
- learning platform (1)
- liability (1)
- linear programming (1)
- link layer security (1)
- literature review (1)
- live sequencing (1)
- lively groups (1)
- location prediction algorithm (1)
- low back pain (1)
- low-duty-cycling (1)
- mHealth (1)
- machine (1)
- male infertility (1)
- management (1)
- measurement (1)
- media (1)
- medical documentation (1)
- memory (1)
- mental models (1)
- metaanalysis (1)
- metabolomics (1)
- metacognition (1)
- metagenomics (1)
- methods (1)
- metric temporal graph logic (1)
- microstructures (1)
- mindfulness (1)
- mixed methods (1)
- mobile app (1)
- mobile applications (1)
- mobile health (1)
- modification stoichiometry (1)
- modularization (1)
- motion capture (1)
- multimodal wireless sensor network (1)
- multiple modalities (1)
- mutations (1)
- narrative (1)
- networks (1)
- neurofilament light chain (1)
- neurological disorders (1)
- non-cooperative games (1)
- non-photorealistic rendering (1)
- non-photorealistic rendering (NPR) (1)
- note-taking (1)
- null results (1)
- nutzergenerierte Inhalte (1)
- object-oriented languages (1)
- obsolescence (1)
- oligopoly competition (1)
- omics (1)
- oneM2M (1)
- online learning (1)
- open innovation (1)
- opportunity cost (1)
- oracles (1)
- orthopedic (1)
- oxytocin (1)
- pain (1)
- parietal operculum (1)
- partial order resolution (1)
- partition functions (1)
- patent (1)
- patent analysis (1)
- peer assessment (1)
- peer evaluation (1)
- peer review (1)
- personality prediction (1)
- pervasive healthcare (1)
- phosphoproteomics (1)
- photoplethysmography (1)
- physiological signals (1)
- point-based rendering (1)
- polygenic score (1)
- polynomials (1)
- popular matching (1)
- portrait (1)
- poset (1)
- post-translational modification (1)
- predicated generic functions (1)
- predicted spectra (1)
- primary healthcare (1)
- privacy (1)
- privacy and security (1)
- privacy attack (1)
- probabilistic routing (1)
- probabilistic sensitivity analysis (1)
- process mining (1)
- production networks (1)
- programmable matter (1)
- programming (1)
- project based learning (1)
- proteomics graph networks (1)
- psychopy experiments (1)
- public dataset (1)
- quality assessment (1)
- quality-adjusted life years (1)
- quantification (1)
- radiation hardening (1)
- rainbow connection (1)
- rapid eGFRcrea decline (1)
- reactive object queries (1)
- real-time (1)
- recommendations (1)
- rekeying (1)
- relapsing-remitting multiple sclerosis (1)
- reliability (1)
- religiously motivated (1)
- reported out-come measures (1)
- residential segregation (1)
- reward (1)
- risk (1)
- risk prediction (1)
- risk-aware dispatching (1)
- robot voice (1)
- screening tools (1)
- secure multi-execution (1)
- security analytics (1)
- self-efficacy (1)
- self-paced learning (1)
- sensor data (1)
- sensors (1)
- service-oriented architecture (SOA) (1)
- shared leadership (1)
- simulation (1)
- smart contracts (1)
- soccer analytics (1)
- social interaction (1)
- social media analysis (1)
- social modulation (1)
- social robot (1)
- somatosensation (1)
- spatial aggregation (1)
- spectrum clustering (1)
- speech (1)
- standard (1)
- state space modelling (1)
- statistics (1)
- stochastic process (1)
- storytelling (1)
- strongly stable matching (1)
- study (1)
- super stable matching (1)
- support vector machine (1)
- susceptibility (1)
- task realization strategies (1)
- technology (1)
- thinking styles (1)
- time horizon (1)
- timed graph (1)
- tissue-awareness (1)
- toxic comment classification (1)
- tractography (1)
- trajectory data (1)
- transcriptomics (1)
- transformation (1)
- transport network companies (1)
- trust (1)
- trustworthiness (1)
- typed attributed symbolic graphs (1)
- uBPMN (1)
- ubiquitous business process model and notation (uBPMN) (1)
- ubiquitous business process modeling (1)
- ubiquitous computing (ubicomp) (1)
- ubiquitous decision-aware business process (1)
- ubiquitous decisions (1)
- uncertainty (1)
- upper bound (1)
- usability (1)
- user research framework (1)
- user-centered design (1)
- variants, (1)
- veteran (1)
- viruses (1)
- visualization (1)
- vocational training (1)
- voice (1)
- wake-up radio (1)
- weakly (1)
- wearable EEG (muse and neurosity crown) (1)
- web-based rendering (1)
- well-being (1)
- workflow patterns (1)
- social network analysis (1)
- team creativity (1)
- intrapreneurship (1)
Institut
- Hasso-Plattner-Institut für Digital Engineering GmbH (239) (entfernen)
We analyze the problem of response suggestion in a closed domain along a real-world scenario of a digital library. We present a text-processing pipeline to generate question-answer pairs from chat transcripts. On this limited amount of training data, we compare retrieval-based, conditioned-generation, and dedicated representation learning approaches for response suggestion. Our results show that retrieval-based methods that strive to find similar, known contexts are preferable over parametric approaches from the conditioned-generation family, when the training data is limited. We, however, identify a specific representation learning approach that is competitive to the retrieval-based approaches despite the training data limitation.
A catalog of genetic loci associated with kidney function from analyses of a million individuals
(2019)
Chronic kidney disease (CKD) is responsible for a public health burden with multi-systemic complications. Through transancestry meta-analysis of genome-wide association studies of estimated glomerular filtration rate (eGFR) and independent replication (n = 1,046,070), we identified 264 associated loci (166 new). Of these,147 were likely to be relevant for kidney function on the basis of associations with the alternative kidney function marker blood urea nitrogen (n = 416,178). Pathway and enrichment analyses, including mouse models with renal phenotypes, support the kidney as the main target organ. A genetic risk score for lower eGFR was associated with clinically diagnosed CKD in 452,264 independent individuals. Colocalization analyses of associations with eGFR among 783,978 European-ancestry individuals and gene expression across 46 human tissues, including tubulo-interstitial and glomerular kidney compartments, identified 17 genes differentially expressed in kidney. Fine-mapping highlighted missense driver variants in 11 genes and kidney-specific regulatory variants. These results provide a comprehensive priority list of molecular targets for translational research.
Increasing demand for analytical processing capabilities can be managed by replication approaches. However, to evenly balance the replicas' workload shares while at the same time minimizing the data replication factor is a highly challenging allocation problem. As optimal solutions are only applicable for small problem instances, effective heuristics are indispensable. In this paper, we test and compare state-of-the-art allocation algorithms for partial replication. By visualizing and exploring their (heuristic) solutions for different benchmark workloads, we are able to derive structural insights and to detect an algorithm's strengths as well as its potential for improvement. Further, our application enables end-to-end evaluations of different allocations to verify their theoretical performance.
Microservice Architectures (MSA) structure applications as a collection of loosely coupled services that implement business capabilities. The key advantages of MSA include inherent support for continuous deployment of large complex applications, agility and enhanced productivity. However, studies indicate that most MSA are homogeneous, and introduce shared vulnerabilites, thus vulnerable to multi-step attacks, which are economics-of-scale incentives to attackers. In this paper, we address the issue of shared vulnerabilities in microservices with a novel solution based on the concept of Moving Target Defenses (MTD). Our mechanism works by performing risk analysis against microservices to detect and prioritize vulnerabilities. Thereafter, security risk-oriented software diversification is employed, guided by a defined diversification index. The diversification is performed at runtime, leveraging both model and template based automatic code generation techniques to automatically transform programming languages and container images of the microservices. Consequently, the microservices attack surfaces are altered thereby introducing uncertainty for attackers while reducing the attackability of the microservices. Our experiments demonstrate the efficiency of our solution, with an average success rate of over 70% attack surface randomization.
As resources are valuable assets, organizations have to decide which resources to allocate to business process tasks in a way that the process is executed not only effectively but also efficiently. Traditional role-based resource allocation leads to effective process executions, since each task is performed by a resource that has the required skills and competencies to do so. However, the resulting allocations are typically not as efficient as they could be, since optimization techniques have yet to find their way in traditional business process management scenarios. On the other hand, operations research provides a rich set of analytical methods for supporting problem-specific decisions on resource allocation. This paper provides a novel framework for creating transparency on existing tasks and resources, supporting individualized allocations for each activity in a process, and the possibility to integrate problem-specific analytical methods of the operations research domain. To validate the framework, the paper reports on the design and prototypical implementation of a software architecture, which extends a traditional process engine with a dedicated resource management component. This component allows us to define specific resource allocation problems at design time, and it also facilitates optimized resource allocation at run time. The framework is evaluated using a real-world parcel delivery process. The evaluation shows that the quality of the allocation results increase significantly with a technique from operations research in contrast to the traditional applied rule-based approach.
A Landscape for Case Models
(2019)
Case Management is a paradigm to support knowledge-intensive processes. The different approaches developed for modeling these types of processes tend to result in scattered models due to the low abstraction level at which the inherently complex processes are therein represented. Thus, readability and understandability is more challenging than that of traditional process models. By reviewing existing proposals in the field of process overviews and case models, this paper extends a case modeling language - the fragment-based Case Management (fCM) language - with the goal of modeling knowledge-intensive processes from a higher abstraction level - to generate a so-called fCM landscape. This proposal is empirically evaluated via an online experiment. Results indicate that interpreting an fCM landscape might be more effective and efficient than interpreting an informationally equivalent case model.
Industry 4.0 is transforming how businesses innovate and, as a result, companies are spearheading the movement towards 'Digital Transformation'. While some scholars advocate the use of design thinking to identify new innovative behaviours, cognition experts emphasise the importance of top managers in supporting employees to develop these behaviours. However, there is a dearth of research in this domain and companies are struggling to implement the required behaviours. To address this gap, this study aims to identify and prioritise behavioural strategies conducive to design thinking to inform the creation of a managerial mental model. We identify 20 behavioural strategies from 45 interviewees with practitioners and educators and combine them with the concepts of 'paradigm-mindset-mental model' from cognition theory. The paper contributes to the body of knowledge by identifying and prioritising specific behavioural strategies to form a novel set of survival conditions aligned to the new industrial paradigm of Industry 4.0.
Graphs play an important role in many areas of Computer Science. In particular, our work is motivated by model-driven software development and by graph databases. For this reason, it is very important to have the means to express and to reason about the properties that a given graph may satisfy. With this aim, in this paper we present a visual logic that allows us to describe graph properties, including navigational properties, i.e., properties about the paths in a graph. The logic is equipped with a deductive tableau method that we have proved to be sound and complete.
Resource constrained smart micro-grid architectures describe a class of smart micro-grid architectures that handle communications operations over a lossy network and depend on a distributed collection of power generation and storage units. Disadvantaged communities with no or intermittent access to national power networks can benefit from such a micro-grid model by using low cost communication devices to coordinate the power generation, consumption, and storage. Furthermore, this solution is both cost-effective and environmentally-friendly. One model for such micro-grids, is for users to agree to coordinate a power sharing scheme in which individual generator owners sell excess unused power to users wanting access to power. Since the micro-grid relies on distributed renewable energy generation sources which are variable and only partly predictable, coordinating micro-grid operations with distributed algorithms is necessity for grid stability. Grid stability is crucial in retaining user trust in the dependability of the micro-grid, and user participation in the power sharing scheme, because user withdrawals can cause the grid to breakdown which is undesirable. In this chapter, we present a distributed architecture for fair power distribution and billing on microgrids. The architecture is designed to operate efficiently over a lossy communication network, which is an advantage for disadvantaged communities. We build on the architecture to discuss grid coordination notably how tasks such as metering, power resource allocation, forecasting, and scheduling can be handled. All four tasks are managed by a feedback control loop that monitors the performance and behaviour of the micro-grid, and based on historical data makes decisions to ensure the smooth operation of the grid. Finally, since lossy networks are undependable, differentiating system failures from adversarial manipulations is an important consideration for grid stability. We therefore provide a characterisation of potential adversarial models and discuss possible mitigation measures.
3D point cloud technology facilitates the automated and highly detailed digital acquisition of real-world environments such as assets, sites, cities, and countries; the acquired 3D point clouds represent an essential category of geodata used in a variety of geoinformation applications and systems. In this paper, we present a web-based system for the interactive and collaborative exploration and inspection of arbitrary large 3D point clouds. Our approach is based on standard WebGL on the client side and is able to render 3D point clouds with billions of points. It uses spatial data structures and level-of-detail representations to manage the 3D point cloud data and to deploy out-of-core and web-based rendering concepts. By providing functionality for both, thin-client and thick-client applications, the system scales for client devices that are vastly different in computing capabilities. Different 3D point-based rendering techniques and post-processing effects are provided to enable task-specific and data-specific filtering and highlighting, e.g., based on per-point surface categories or temporal information. A set of interaction techniques allows users to collaboratively work with the data, e.g., by measuring distances and areas, by annotating, or by selecting and extracting data subsets. Additional value is provided by the system's ability to display additional, context-providing geodata alongside 3D point clouds and to integrate task-specific processing and analysis operations. We have evaluated the presented techniques and the prototype system with different data sets from aerial, mobile, and terrestrial acquisition campaigns with up to 120 billion points to show their practicality and feasibility.