05 Fakultät Informatik, Elektrotechnik und Informationstechnik

Permanent URI for this collectionhttps://elib.uni-stuttgart.de/handle/11682/6

Browse

Search Results

Now showing 1 - 9 of 9
  • Thumbnail Image
    ItemOpen Access
    A method for describing, analyzing, and exploring visual art collections
    (2024) Pflüger, Hermann
    Visual art collections are more than just sets of images. Behind a collection or an exhibition are the curator’s concept and the specific characteristics of the collection. A controlled vocabulary that takes into account the concept and the specific characteristics of a collection requires individual terms/concepts, and specific relationships between the concepts of the vocabulary. Furthermore, the granularity of a controlled vocabulary should be adapted to a particular concept of the collection, i.e., for some areas, the number of terms/concepts should be very high and specific; for other areas, concepts should be summarized to keep the complexity of the collection low and thus facilitate the handling and presentation of the collection. A LadeCA vocabulary is an extended controlled vocabulary that is particularly suitable for collections of works of art. LadeCA enables a user to describe, analyze, and explore art collections. LadeCA is also suitable for comparing the contents of different collections or different parts of a collection. The general concepts of a controlled vocabulary/thesaurus, their terms, and defined semantic relations between them can be automatically adopted in a LadeCA vocabulary so that the vocabulary only needs to be adapted for the current collection. The process of creating a LadeCA vocabulary for art collections is supported by three interactive interfaces that ensure that the intention behind a collection is taken into account, and that the creation effort is kept low. This article explains the process of creating LadeCA vocabularies for art collections and describes the initial experiences and results.
  • Thumbnail Image
    ItemOpen Access
    Formal security analysis of the OpenID FAPI 2.0 Security Profile with FAPI 2.0 Message Signing, FAPI-CIBA, Dynamic Client Registration and Management : technical report
    (2023) Hosseyni, Pedram; Küsters, Ralf; Würtele, Tim
    Building on our recent formal security analysis of the FAPI 2.0 Security Profile, we here extend the analysis effort to FAPI 2.0 Message Signing, combined with Dynamic Client Registration, Dynamic Client Management, and FAPI-CIBA. Overall, we model an ecosystem which uses all these profiles and extensions in parallel. Like the previous work on the FAPI 2.0 Security Profile, this analysis is based on the Web Infrastructure Model, a Dolev-Yao style model of the web infrastructure - in fact, it is the most comprehensive and detailed model of the web infrastructure to date. We identify several attacks, propose fixes and prove the fixed protocols secure with respect to authorization, authentication, session integrity for both authorization and authentication, and non-repudiation for the messages covered by FAPI 2.0 Message Signing. The attacks and proposed fixes have been reported to the responsible FAPI Working Group at the OpenID Foundation, and fixes have since been incorporated into the specifications.
  • ItemOpen Access
    CUTE - CRETA Un-/Shared Task zu Entitätenreferenzen
    (2017) Reiter, Nils; Blessing, André; Echelmeyer, Nora; Kremer, Gerhard; Koch, Steffen; Murr, Sandra; Overbeck, Maximilian; Pichler, Axel
    Dies ist die Veröffentlichung eines shared/unshared Task Workshops (entwickelt in CRETA: Center for Reflected Text Analytics), der im Rahmen der DHd 2017 in Bern (CH) stattfand. Im Gegensatz zu shared tasks, bei denen die Performanz verschiedener Systeme/Ansätze/Methoden direkt anhand einer klar definierten und quantitativ evaluierten Aufgabe verglichen wird, sind unshared tasks offen für verschiedenartige Beiträge, die auf einer gemeinsamen Datensammlung basieren. Shared und Unshared Tasks in den Digital Humanities sind ein vielversprechender Weg, Kollaboration und Interaktion zwischen Geistes-, Sozial- und ComputerwissenschaftlerInnen zu fördern und zu pflegen. Konkret riefen wir dazu auf, gemeinsam an einem heterogenen Korpus zu arbeiten, in dem Entitätenreferenzen annotiert wurden. Das Korpus besteht aus Parlamentsdebatten des Deutschen Bundestags, Briefen aus Goethes Die Leiden des jungen Werther, einem Abschnitt aus Adornos Ästhetischer Theorie und den Büchern von Wolframs von Eschenbach Parzival (mittelhochdeutsch). Auch wenn jede Textsorte ihre eigenen Besonderheiten hat, wurden alle nach einheitlichen Annotationsrichtlinien annotiert, die wir auch zur Diskussion stellten. Wir veröffentlichen hier den Aufruf zu Workshop-Beiträgen, die Annotationsrichtlinien, die Korpusdaten samt Beschreibung und die einführenden Vortragsfolien des Workshops.
  • Thumbnail Image
    ItemOpen Access
    Anwendungsfälle und Methoden der künstlichen Intelligenz in der anwendungsorientierten Forschung im Kontext von Industrie 4.0
    (2020) Maschler, Benjamin; White, Dustin; Weyrich, Michael
    Es wird erwartet, dass datengetriebene Methoden künstlicher Intelligenz im Kontext Industrie 4.0 die Zukunft industrieller Fertigung prägen werden. Obwohl das Thema in der Forschung sehr präsent ist, bleibt der Umfang der tatsächlichen Nutzung dieser Methoden unklar. Dieser Beitrag analysiert daher von 2013 bis 2018 veröffentlichte wissenschaftliche Artikel, um statistische Daten über den Einsatz von Methoden künstlicher Intelligenz in der Industrie zu gewinnen. Besonderes Augenmerk wird dabei auf die Trainings- und Evaluations-Datentypen, die Verbreitung in verschiedenen Industriezweigen, die betrachteten Anwendungsfälle sowie die geographische Herkunft dieser Artikel gelegt. Die resultierenden Erkenntnisse werden in praxisnahe Hinweise für Entscheider destilliert.
  • Thumbnail Image
    ItemOpen Access
    A map-based dead reckoning protocol for updating location information
    (2001) Leonhardi, Alexander; Nicu, Christian; Rothermel, Kurt
    An important aspect of location-aware services is the management of location information. To this end, location information needs to be transferred from a mobile device, which determines this information by means of a local positioning sensor (such as GPS), to a location service, where the location information can be queried by applications. Because bandwidth in wide area mobile communications is still scarce and expensive, it is important to use an update protocol that requires as few messages as possible while still guaranteeing a desired accuracy of the location information. To decrease the number of necessary update messages, so-called dead-reckoning strategies have been proposed. In this paper we give an overview of different variants of dead-reckoning protocols for updating location information and propose a new map-based protocol. While a simple dead-reckoning protocol already reduces the number of update messages by up to 83, the map-based protocol further reduces their number by again up to 60.
  • Thumbnail Image
    ItemOpen Access
    The influence of personality on computer programming: a summary of a systematic literature review
    (2014) Karimi, Zahra; Wagner, Stefan
    The objective of this report is to summarize the results of the systematic literature review we recently did on the influence of personality on computer programming (Karimi et al. 2014). In the SLR, we systematically searched online search resources and found 50 empirical and 4 theoretical studies with findings on the relations between personality characteristics and performance in computer programming. 28 empirical studies found an influence of personality on programming. We discussed that the other studies failed to find an influence of personality because of ceiling or bottom effects, small samples or incomprehensive personality test. We further analyzed the studies that found a relation and mapped the investigated personality characteristics of 22 empirical studies (out of 28) and 3 theoretical studies (out of 4) to the five personality factors: Openness, Conscientiousness, Extroversion, Agreeableness and Neuroticism. Due to inaccessible or invalid personality tests, we excluded several studies from this mapping. We found that either in theoretical or empirical studies all personality factors have an effect in at least one study. Except Conscientiousness which always has positive effects, other personality factors may have positive or negative effects. Moreover, all personality factors might have no effect in some cases. We concluded that there is an indication that personality affects programming but this relation is not clear and more studies are needed to clarify the influence of personality on programming.
  • Thumbnail Image
    ItemOpen Access
    ContinuITy - automatisiertes Performance-Testen in der kontinuierlichen Softwareentwicklung : Abschlussbericht
    (2020) Angerstein, Tobias; Heger, Christoph; Hoorn, André van; Okanović, Dušan; Schulz, Henning; Siegl, Stefan; Wert, Alexander
    Ziel des Forschungsprojekts ContinuITy war die Entwicklung eines Ansatzes und entsprechender Werkzeugunterstützung zum automatisierten Performance-Testen - eingebettet in Prozesse und Infrastruktur der kontinuierlichen Softwareentwicklung. Ziel ist durch Ausnutzung von kontinuierlich aufgezeichneten Messdaten aus dem Produktivbetrieb, automatisiert effizientes und nachhaltiges Lasttesten zu gewährleisten und in die kontinuierliche Softwareentwicklung zu integrieren. Lasttests werden automatisiert aus Messdaten extrahiert und evolviert. Lasttests werden durch eine modulare Beschreibungssprache definiert und können durch zusätzliche Semantik - z. B. über Testart und -ziele - angereichert werden. Im Rahmen der Automatisierung des Softwareerstellungsprozesses (Continuous Delivery) erfolgt eine Auswahl relevanter Lasttests, die Erkennung von Regressionen und deren Diagnose. Basierend auf der Beschreibung der Aufgabenstellung und der Voraussetzungen fasst dieser Bericht die durchgeführten Aktivitäten und wesentlichen Ergebnisse zusammen.
  • Thumbnail Image
    ItemOpen Access
    A comparison of protocols for updating location information
    (2000) Leonhardi, Alexander; Rothermel, Kurt
    The detailed location information of mobile objects, for example that of a user with a mobile computer or phone, is an important input for many location-aware applications. However, constantly updating the location information for thousands of mobile objects is not feasible. Update protocols for location information therefore use the special properties of this information to transmit it as efficiently as possible, that is requiring only few update messages, while still being effective in returning the location information with the desired accuracy. Different classes of such update protocols are described in this paper and a new combined protocol is proposed. To be able to compare their effectiveness and efficiency, we present an analysis for the minimum and average resulting accuracy of the location information on the receiver and the number of messages transmitted between them. We also present some simulation results, which we have performed to back up our analysis.