004 Datenverarbeitung; Informatik
Refine
Year of publication
Document Type
- Diploma Thesis (185)
- Bachelor Thesis (163)
- Study Thesis (137)
- Part of Periodical (126)
- Master's Thesis (84)
- Doctoral Thesis (48)
- Conference Proceedings (6)
- Book (1)
- Habilitation (1)
- Report (1)
Language
- German (546)
- English (203)
- Multiple languages (3)
Keywords
- Bildverarbeitung (13)
- Augmented Reality (10)
- Computersimulation (10)
- Robotik (10)
- Computergraphik (9)
- OpenGL (8)
- Routing (8)
- Semantic Web (8)
- Computerspiel (7)
- Informatik (7)
- Java (7)
- Software Engineering (7)
- Visualisierung (7)
- Simulation (6)
- Android (5)
- Datenschutz (5)
- Evaluation (5)
- GPGPU (5)
- Interaktion (5)
- Mustererkennung (5)
- Netzwerk (5)
- Objektverfolgung (5)
- Petri-Netze (5)
- Programmierung (5)
- Shader (5)
- Volumen-Rendering (5)
- Volumendaten (5)
- ontology (5)
- Bluetooth (4)
- Business Intelligence (4)
- Computergrafik (4)
- E-KRHyper (4)
- E-Learning (4)
- E-Partizipation (4)
- Enterprise 2.0 (4)
- GPU (4)
- Graphik (4)
- Information Retrieval (4)
- Knowledge Compilation (4)
- Logistik (4)
- OWL (4)
- OWL <Informatik> (4)
- Ontologie <Wissensverarbeitung> (4)
- Ontology (4)
- RIP-MTI (4)
- Rechnernetz (4)
- Router (4)
- SPARQL (4)
- Smartphone (4)
- Software (4)
- Supply Chain Management (4)
- Tracking (4)
- UML (4)
- VNUML (4)
- VOXEL (4)
- Wiki (4)
- XML (4)
- computer clusters (4)
- API (3)
- Analyse durch Synthese (3)
- Android <Systemplattform> (3)
- Augenbewegung (3)
- BPMN (3)
- C++ (3)
- Compute Shader (3)
- Computeranimation (3)
- Computervisualistik (3)
- Datenanalyse (3)
- Datenaustausch (3)
- Echtzeitsystem (3)
- Echtzeitsysteme (3)
- Fahrzeug (3)
- GPS (3)
- Globale Beleuchtung (3)
- Grafikkarte (3)
- Instant Messaging (3)
- Internet (3)
- Kamera (3)
- Markerloses Tracking (3)
- Mikrocontroller (3)
- Mikrocontroller AVR (3)
- Modellbasiertes Tracking (3)
- Netzwerksimulation (3)
- Ontologie (3)
- OpenGL Shading Language (3)
- Prozessmanagement (3)
- Ray tracing (3)
- Raytracing (3)
- Rechnernetze (3)
- Rettungsroboter (3)
- Segmentierung (3)
- Spiel (3)
- Stereosehen (3)
- TGraph (3)
- Transferfunktion (3)
- University (3)
- Wikipedia (3)
- World of Warcraft (3)
- XTPeer (3)
- classification (3)
- interaktiv (3)
- model-based (3)
- parallel algorithms (3)
- 3D (2)
- Abduktion <Logik> (2)
- Akkreditierung (2)
- Akzeptanz (2)
- Annotation (2)
- App (2)
- Applikation (2)
- Automatische Klassifikation (2)
- Automatisches Beweisverfahren (2)
- Autonome Fahrzeuge (2)
- Autonomes Robotersystem (2)
- Beschaffung (2)
- Bild (2)
- Bildregistrierung (2)
- Browser (2)
- CSCW (2)
- Campus Information System (2)
- Cloud Computing (2)
- Computer (2)
- Computer Graphics (2)
- Computer Supported Cooperative Work (2)
- Computertomografie (2)
- Content Management (2)
- Crowdsourcing (2)
- Customer Relationship Management (2)
- DOCHOUSE (2)
- DTI (2)
- Data Mining (2)
- Datensicherheit (2)
- Delta (2)
- Digital Rights Management (2)
- Distance Vector Routing (2)
- Distanz Vektor Routing (2)
- Dokumentation (2)
- E-IMS (2)
- E-Mail (2)
- E-participation (2)
- Eclipse <Programmierumgebung> (2)
- Electronic Government (2)
- Enhanced Reality (2)
- Entwicklung (2)
- Equality (2)
- Erweiterte Realität (2)
- Eyetracking (2)
- Fahrerassistenzsystem (2)
- Fallstudie (2)
- Formale Ontologie (2)
- Framework (2)
- Frau (2)
- GLSL (2)
- Gaze Tracker (2)
- Geschäftsprozess (2)
- Google App Engine (2)
- Google Web Toolkit (2)
- Grafikprozessor (2)
- Graphikprozessor (2)
- High dynamic Range (2)
- IBM Lotus Quickr (2)
- IPv6 (2)
- Information Flow Ontology (2)
- Informationsmanagement (2)
- Informationssystem (2)
- Informationsvisualisierung (2)
- Innovationsmanagement (2)
- Internetzugang (2)
- Interoperabilität (2)
- JGraLab (2)
- Kalibrierung (2)
- Klassifikation (2)
- Kollaboration (2)
- Konvergenz (2)
- Kryptographie (2)
- Künstliche Intelligenz (2)
- Laser (2)
- Laserscanner (2)
- Line Space (2)
- Linked Open Data (2)
- Maschinelles Lernen (2)
- Medizinische Visualisierung (2)
- Metriken (2)
- Modell (2)
- Modellfahrzeug (2)
- Modellgetriebene Entwicklung (2)
- Modellierung (2)
- Modelltransformation (2)
- Navigation (2)
- Network (2)
- Netzwerkmanagement (2)
- Neuronales Netz (2)
- Online-Befragung (2)
- Open Source (2)
- Partikelsystem (2)
- Personalausweis (2)
- Petri Nets (2)
- Petri-Netz (2)
- Program Slicing (2)
- Propagation (2)
- Prädikatenlogik (2)
- Qualität (2)
- RDF (2)
- RDF <Informatik> (2)
- RFID (2)
- RIP (2)
- RMTI (2)
- Reengineering (2)
- Registrierung <Bildverarbeitung> (2)
- Rendering (2)
- Roboter (2)
- Rollenspiel (2)
- Routing Information Protocol (2)
- Schatten (2)
- Schlussfolgern (2)
- Security (2)
- Selbstlokalisation (2)
- Semantic Desktop (2)
- Semantik (2)
- Serviceorientierte Architektur (2)
- Sicherheit (2)
- Softwareentwicklung (2)
- Softwaretest (2)
- Spielkonsole (2)
- SpoGA (2)
- Starrkörper (2)
- Steuerung (2)
- Tablet PC (2)
- Textur-Mapping (2)
- Theorem Proving (2)
- Transform Feedback (2)
- Transformation (2)
- Umfrage (2)
- Universität Koblenz-Landau (2)
- Usability (2)
- Usage Rights Management (2)
- Virtualisierung (2)
- Virtuelle Realität (2)
- Virtuelle Welt (2)
- Volumen (2)
- Volumenrendering (2)
- WLAN (2)
- Wasseroberfläche (2)
- Web 2.0 (2)
- Web Analytics (2)
- Web Services (2)
- WebGL (2)
- Webcam (2)
- Werbung (2)
- Wii (2)
- Wiimote (2)
- Wissensmanagement (2)
- World Wide Web 2.0 (2)
- Zielverfolgung (2)
- artifcial neural networks (2)
- artificial neural networks (2)
- computer science (2)
- constraint logic programming (2)
- eGovernment (2)
- game (2)
- governance (2)
- hybrid automata (2)
- image processing (2)
- information system (2)
- mobile phone (2)
- multi-agent systems (2)
- multimedia metadata (2)
- probability propagation nets (2)
- security (2)
- semantics (2)
- simulation (2)
- social media (2)
- social simulation (2)
- visualization (2)
- 101companies (1)
- 2-D (1)
- 2019 European Parliament Election (1)
- 2D/3D-Segmentierung (1)
- 3-D-Laserscannen (1)
- 3-D-Modell (1)
- 3-D-Modelle (1)
- 3-D-Scanning (1)
- 360 Grad (1)
- 360 degree (1)
- 3D Modell Referenz Bildsynthese (1)
- 3D Painting (1)
- 3D-Abbildungen (1)
- 3D-Color-Structure-Code (1)
- 3D-Darstellung (1)
- 3D-Kartierung (1)
- 3D-Modell (1)
- 3D-Modelle (1)
- 3D-RETISEG (1)
- 3D-Videospiel (1)
- 3D-Visualisierung (1)
- 8C model (1)
- ABox (1)
- AMIRE (1)
- API Analysis (1)
- API Migratiom (1)
- API analysis (1)
- API-Analyse (1)
- ARIS (1)
- ARToolkit (1)
- ARToolkitPlus (1)
- ATMega 16 (1)
- ATmega644 (1)
- ATtiny2313 (1)
- AUTOSAR (1)
- Abfragesprache (1)
- Acceleration Structures (1)
- Action Recognition (1)
- Action Segmentation (1)
- Ad-Hoc Routing (1)
- Adaptation (1)
- Adaptive Abtastung (1)
- Adaptive Services Grid (ASG) (1)
- Administration (1)
- Adobe Flash (1)
- Adobe Flex (1)
- Advanced Encryption Standard (1)
- Advertising (1)
- Agent (1)
- Agenten (1)
- Agentenorientiertes Software Engineering (1)
- Agents (1)
- Aggregation (1)
- Aktualisierung (1)
- Alex Bernstein (1)
- Algolib (1)
- Algorithm Engineering (1)
- Algorithmus (1)
- Amazon Mechanical Turks (1)
- Ambient Occlusion (1)
- Analyse (1)
- Analyse-durch-Synthese (1)
- Analysis of social platform (1)
- Android 2 (1)
- Android 3 (1)
- Android 4 (1)
- Android development (1)
- Androidentwicklung (1)
- Anforderung (1)
- Anforderungskatalog (1)
- Angiographiebilder (1)
- Anhänger (1)
- Anhängerfahrzeug (1)
- Animationsverfahren (1)
- Annotationsmodell (1)
- Anpassung (1)
- Anwendungsintegration (1)
- Anwendungssoftware (1)
- Anzeige (1)
- App <Programm> (1)
- ArcGIS (1)
- Architektur <Informatik> (1)
- Architekturbewertung (1)
- Archivierung (1)
- Articles for Deletion (1)
- Aspect-orientation (1)
- Aspekt-Orientierung (1)
- Association Rules (1)
- Audiodatei (1)
- Auditing (1)
- Augenblick-SDK (1)
- Augmented Reality Szenario (1)
- Auslese (1)
- Ausrichtungswerkzeug (1)
- Aussagenlogik (1)
- Ausstellung (1)
- Austausch (1)
- Auswahl (1)
- Auszeichnungssprache (1)
- Authentifizierung (1)
- Authentisierung (1)
- Automated Theorem Proving (1)
- Automated Theorem Proving Systems (1)
- Automotive Systems (1)
- Autonome Exploration (1)
- Autonome Robotik (1)
- Autonomes Fahrzeug (1)
- Autonomous Exploration (1)
- Autorensystem (1)
- Avatar (1)
- Avatare (1)
- Awareness (1)
- Axis Aligned Bounding Box (AABB) (1)
- B2B Integration (1)
- BGV A1 (1)
- BI (1)
- BPM (1)
- BPMS (1)
- Bachelor (1)
- Bachelorstudiengang (1)
- Backtrack (1)
- Balanced Scorecard (1)
- Balancetheorie (1)
- Bayes Procedures (1)
- Bayes-Netz (1)
- Bayesian Networks (1)
- Bebauungsdichte (1)
- Bedarfsanalyse (1)
- Bedarfsforschung (1)
- Befahrbarkeit (1)
- Beleuchtung (1)
- Beleuchtungsverfahren (1)
- Benutzerorientierung (1)
- Benutzerprofil (1)
- Benutzerschnittstelle (1)
- Benutzerverhalten (1)
- Beschleunigungsensor (1)
- Beschreibungslogik (1)
- Besuchersoftware (1)
- Betriebssystem (1)
- Bewegung (1)
- Bewegungsablauf (1)
- Bewegungsmodell (1)
- Bewegungssteuerung (1)
- BildKlang (1)
- Bildanalyse (1)
- Bildanalyse-Verfahren (1)
- Bildaufloesung (1)
- Bildauflösung (1)
- Bilderkennung (1)
- Bildsegmentierung (1)
- Bildsensor (1)
- Bildverstehen (1)
- Billard (1)
- Binäre XML-Formate (1)
- Biometric Authentication (1)
- Biometrie (1)
- Bipartiter Graph (1)
- Blickbewegung (1)
- Blickpunktabhängig (1)
- Blinder Fleck (1)
- Blog marketing (1)
- Border Gateway Protocol (1)
- Border Gateway Protocol 4 (1)
- Bordinstrument (1)
- Breaking (1)
- Brechung (1)
- Bruchsimulation (1)
- Burg (1)
- Business Collaboration (1)
- Business Continuity Management (1)
- Business Process Modeling (1)
- Business Software (1)
- Business intelligence (1)
- Bürgerbeiteiligung (1)
- C-Programmierung (1)
- C-Socketbibliothek (1)
- CAD (1)
- CAD-System (1)
- CB2 (1)
- CIDR (1)
- CMS (1)
- CSCA (1)
- CSG (1)
- CSMs (1)
- CSV (1)
- CT-Datensätze (1)
- CTI (1)
- CTI -Problem (1)
- Calculus (1)
- CamInSens (1)
- Campus Koblenz (1)
- Cascada (1)
- Casual Game (1)
- Casual Games (1)
- Cg (1)
- Charakter-Objekt-Interaktion (1)
- Charakteranimation (1)
- Cheops (1)
- Chiffrierung (1)
- Cicero (1)
- Circumscription (1)
- Cisco Catalyst 3500XL (1)
- Classification (1)
- Closed Source (1)
- Clusteranalyse (1)
- Clustering (1)
- CodeBlue (1)
- Cold Chain (1)
- CollaborativeWriting (1)
- Colonoscopy (1)
- Color Structure Code (1)
- ColorSym (1)
- Coloskopie (1)
- Common Annotation Framework (1)
- Communication Networks (1)
- Communication System (1)
- Computational biology (1)
- Computational logic (1)
- Compute-Shader (1)
- Computer Networks (1)
- Computer Security (1)
- Computer Vision (1)
- Computer assisted communication (1)
- Computer-aided diagnosis (1)
- Computermodell (1)
- Computersicherheit (1)
- Computerspiele (1)
- Computertomographie (1)
- Conference (1)
- Congestion Control (1)
- Constitutive Model (1)
- Container Entity Modell (1)
- Content Analysis (1)
- Context-aware processes (1)
- Controlling (1)
- Core Ontology on Multimedia (1)
- Core Ontology on Multimedia (COMM) (1)
- Corruption (1)
- CosiMail (1)
- Counting-to-Infinity (1)
- Creativity (1)
- Criteria Matrix (1)
- DCMTK (1)
- DEMO_net (1)
- DHCPv6 (1)
- DICOM (1)
- DIN EN ISO 9241 (1)
- DNNF (1)
- DPLL (1)
- DPLL procedure (1)
- Darmpolyp (1)
- Darmspiegelung (1)
- Data Analysis (1)
- Data Warhousing (1)
- Data analysis (1)
- Data compression (1)
- Data flow analysis (1)
- Data manipulation (1)
- Data protection (1)
- Data-Mining (1)
- Data-Warehouse-Konzept (1)
- Datenaustauschstandard (1)
- Datenbanksystem (1)
- Datenbrille (1)
- Datenfluss (1)
- Datenflussanalyse (1)
- Datenflussmodell (1)
- Datenkompression (1)
- Datenschutzpolicy (1)
- Datenstruktur (1)
- Deduktion (1)
- Deep Metric Learning (1)
- Defi-Now! (1)
- Defibrillator (1)
- Delphi-Studie (1)
- Demoskopie (1)
- Description Logic (1)
- Description Logics (1)
- Design Pattern (1)
- Design Thinking (1)
- Designwerkzeug (1)
- Desktop (1)
- Destiny (1)
- Developer profiling (1)
- Diabetes (1)
- Diabetische Retinopathie (1)
- Diagnose (1)
- Diagnoseunterstützung (1)
- Diagnosis (1)
- Diagnosis assistance (1)
- Diagramm (1)
- Diffie-Hellman-Algorithmus (1)
- Diffusion (1)
- Diffusionsbildgebung (1)
- Digital Storytelling (1)
- Digitale Bibliothek (1)
- Digitale Bilder (1)
- Digitale Steuerung (1)
- Dijkstras Algorithmus (1)
- Dimension 3 (1)
- Dimensionality Reduction (1)
- Dimensionsreduzierung (1)
- Disaster Recovery (1)
- Discussion Forums (1)
- Diskrete Simulation (1)
- Diskursmeter (1)
- Diskursverständnis (1)
- Displacement Mapping (1)
- Display (1)
- Distanz-Vektor (1)
- Distributed Environments (1)
- Distributed process execution (1)
- Distribution <Linguistik> (1)
- Drahtloses Sensorsystem (1)
- Drahtloses lokales Netz (1)
- Drahtmodell (1)
- Dreidimensionale Bildverarbeitung (1)
- Dreidimensionale Visualisierung (1)
- Dreidimensionales Modell (1)
- Driver Assistance Systems (1)
- Dynamische Analyse (1)
- Dynamische Programmierung (1)
- E-Business (1)
- E-Commerce (1)
- E-Demokratie (1)
- E-Government (1)
- E-Hyper Tableau (1)
- E-KRHyper theorem prover (1)
- E-Procurement (1)
- E-government (1)
- E-services (1)
- ECMS 2012 (1)
- EEG (1)
- EEPROM (1)
- EMIL-S (1)
- EPC (1)
- EPK (1)
- EPROM (1)
- ERP-System (1)
- ERP-Systeme (1)
- ESSA (1)
- EU (1)
- EU-Dienstleistungsrichtlinie (1)
- Echtzeit Anwendung (1)
- Echtzeit-Raytracer "Augenblick" (1)
- Echtzeitanimationssystem (1)
- Echtzeitfähigkeit (1)
- Echtzeitphysik (1)
- Eclipse (1)
- Ecore (1)
- Einchip-Computer (1)
- Einkauf (1)
- Einstellung (1)
- Electronic Commerce (1)
- Elektrischer Servomotor (1)
- Elektroencephalographie (1)
- Elektronische Bibliothek (1)
- Elektronische Signaturen (1)
- Elektronisches Wasserzeichen (1)
- EmIL (1)
- Emergence in the Loop (EMIL) (1)
- Emil (1)
- Empfehlung (1)
- Empfehlungssystem (1)
- Empirical Studies (1)
- Empirische Sozialforschung (1)
- Emulation (1)
- Enhanced Representation (1)
- Enterprise Architect (1)
- Enterprise Architecture (1)
- Enterprise Architecture Frameworks (1)
- Enterprise Information Management (1)
- Enterprise Resource Planning (1)
- Enterprise Systems (1)
- Enterprise-Resource-Planning (1)
- Entropia Universe (1)
- Entscheidungsprozess (1)
- Entwickler Profil (1)
- Entwurfsmuster (1)
- Entwurfssprache (1)
- Epipolargeometrie (1)
- Ergonomic Principles (1)
- Erste Hilfe (1)
- Erstgebärende (1)
- Erweiterte Realität <Informatik> (1)
- Eulerian grid (1)
- European Conference on Modelling and Simulation (1)
- Europäischer Binnenmarkt (1)
- Europäischer Schadensbericht (1)
- Evaluierung (1)
- Event (1)
- Experiment (1)
- Explorationstransformation (1)
- Exporation Transform (1)
- Extension (1)
- Eye Tracking (1)
- Eye-Tracking (1)
- FPIC (1)
- Fabric Simulation (1)
- Facebook App (1)
- Facebook Application (1)
- Fachinformationssysteme (1)
- Fahrerassistenzsysteme (1)
- Fahrerlose Transportsysteme (1)
- Fahrsimulator (1)
- Fahrverhalten (1)
- Fahrzeugverhalten (1)
- Faktorenanalyse (1)
- Farbbildverarbeitung (1)
- Farbenlehre (1)
- Farbkalibrierung (1)
- Farbsymmetrie (1)
- Farbtheorie (1)
- Fast Convolution (1)
- FastSLAM Algorithmus (1)
- Fault Trees (1)
- Feature Extraction (1)
- Feature Modeling (1)
- Fedora (1)
- Fehlerbaum (1)
- Fehlerverhütung (1)
- Fernsehtechnik (1)
- Fertilitaet (1)
- Feuer (1)
- Fiber Tracking (1)
- Field programmable gate array (1)
- Finanzberatung (1)
- Fingerprint Recognition (1)
- Fire (1)
- Firewall (1)
- First aid (1)
- FlexViz (1)
- Fließgewässer (1)
- Flow-Erlebnis (1)
- Flowing Inland Waters (1)
- Flugkörper (1)
- Fluid Simulation (1)
- Fluid dynamics (1)
- Fluiddynamik (1)
- Flächenmodell (1)
- Foils <Programm> (1)
- Food Transportation System (1)
- Foodstuff (1)
- Forensik (1)
- Formal Methods (1)
- Formale Methoden (1)
- Forschungslandkarte (1)
- Fotoauswahl (1)
- Fourier (1)
- Fracturing (1)
- Fragebeantwortung (1)
- Fragmentshader (1)
- Framework <Informatik> (1)
- Frameworks (1)
- Frei Programmierbares Kombinationsinstrument (1)
- Freiheitsgrad (1)
- Fresnel (1)
- Function Words (1)
- Funkerkennung (1)
- Funknetzwerk (1)
- Funktionelle NMR-Tomographie (1)
- Föderiertes System (1)
- GDPR (1)
- GDS (1)
- GIRT (1)
- GMI-Controlling (1)
- GPGPU-Programmierung (1)
- GPU - Raycasting (1)
- GPU Programmierung (1)
- GPU basiert (1)
- GPU-Programmierung (1)
- GReQL 2 (1)
- GReQL2 (1)
- GReTL (1)
- GSM-Standard (1)
- GUPRO (1)
- Game Design (1)
- Gaps (1)
- Gaze-Tracking (1)
- GazeTheWeb (1)
- Geburt (1)
- Geburtshaus (1)
- Gebäudemodelle (1)
- Gefäßanalyse (1)
- Gefühl (1)
- Gehirn (1)
- Gelände (1)
- Geländemodell (1)
- Generative Model (1)
- Generative Modellierung (1)
- Geocaching (1)
- Geodaten (1)
- Geoinformation (1)
- Geometrie-Shader (1)
- Geometry (1)
- Geometry-Shader (1)
- Geometryshader (1)
- Gerichteter Graph (1)
- Germany (1)
- Gerstner (1)
- Geschäftsmodell (1)
- Geschäftsmodellinnovation (1)
- Geschäftsprozessmodell (1)
- Geschäftsprozessmodellierung (1)
- Gespann (1)
- Geste (1)
- Gesteninterpretation (1)
- Gesundheitswesen (1)
- Gewinnspiel (1)
- Gewinnspielsendung (1)
- Gittererzeugung (1)
- Glaukom (1)
- Glint Center Estimation Algorithmus (1)
- Gradientenanalyse (1)
- Grafik (1)
- Grafikprogrammierung (1)
- Grails (1)
- Grails 1.2 (1)
- Graph (1)
- Graph Technology (1)
- GraphUML (1)
- Graphicsprogramming (1)
- Graphik-Hardware (1)
- Graphikhardware (1)
- Graphpipes (1)
- Grounded Theory (1)
- Grundschule (1)
- Gruppenarbeit (1)
- Gupro (1)
- HDR-Bild (1)
- HDR-Bilder (1)
- HDR-Kamera (1)
- HNF-Algorithmus (1)
- HTML 5.0 (1)
- Halbschatten (1)
- Hand-based Gestures (1)
- Handelsvertretung (1)
- Handlungsempfehlungen (1)
- Haptik (1)
- Haskell (1)
- Hausgeburt (1)
- Headerdaten Netzwerkpaket SOCK_RAW SOCK_PACKET (1)
- Headtracking (1)
- Healthcare institution (1)
- Hebamme (1)
- Heidelberg Retina Tomograph (1)
- Hermite-Normalform (1)
- Herzerkrankungen (1)
- Heuristiken (1)
- High-Traffic (1)
- Hindernis (1)
- Historisierung (1)
- Hochgeschwindigkeitstracking (1)
- Horn Clauses (1)
- Human motion (1)
- Human-Computer Interaction (1)
- Hyper Tableau Calculus (1)
- Hyperspace-Modell (1)
- Hypertableaux (1)
- I-messages (1)
- IASON (1)
- ICP-Algorithmus (1)
- IEC 61131 (1)
- IK-Algorithmus (1)
- IM-Systeme (1)
- IP 6 (1)
- IP-Adressen (1)
- IT Guru (1)
- IT Outsourcing (1)
- IT Security (1)
- IT Services (1)
- IT-Risk-Management (1)
- IT-Sicherheitsmodelle (1)
- Image (1)
- Image Processing (1)
- Image Understanding (1)
- Imitation Learning (1)
- InFO (1)
- Incremental Algorithms (1)
- Industrial-CT (1)
- Inflation (1)
- Infobroker (1)
- Information (1)
- Information Asset Register (1)
- Information Audit (1)
- Information Capturing Methods (1)
- Information Supply Chain (1)
- Information Visualization (1)
- Information system (1)
- Information-Retrieval (1)
- Informationsmanagementsystem (1)
- Informationsverlinkung (1)
- Informetrie (1)
- Innovation (1)
- Inpainting-Verfahren (1)
- Integration (1)
- Integriertes Informationssystem (1)
- Intelligent Information Network (1)
- Interactive Video Retrieval (1)
- Interactive Visualizations (1)
- Interaktionselemente (1)
- Interaktive Visualisierungen (1)
- Interaktives Fernsehen (1)
- Interaktives Quiz (1)
- Interior Gateway Protokoll (1)
- Internet Voting (1)
- Internet of Things (1)
- Internetregulierung (1)
- Internetworking (1)
- Interoperability (1)
- Interpersonale Kommunikation (1)
- Interpretierer (1)
- Intranet-Zugang (1)
- Inverse Kinematik (1)
- Inverses Modell (1)
- Iterative Closest Points (1)
- Iterative Dual Correspondences (1)
- J2EE (1)
- J2ME (1)
- JCryp-Tool (1)
- JGraph (1)
- JML (1)
- Jabber (1)
- Jabber <Programm> (1)
- Java <Programmiersprache> (1)
- Java Modeling Language (1)
- Java-Quelltext (1)
- Java. Programmiersprache (1)
- JavaScript (1)
- Join (1)
- Jump'n Run-Spiel (1)
- KD-Bäume und Binary-Space-Partitioning-Bäume (1)
- KRHyper (1)
- Kabel (1)
- Kalibrieren <Messtechnik> (1)
- Kamera Pose Tracking (1)
- Kamerakalibrierung (1)
- Kantenbewerteter Graph (1)
- Kantenverfolgung (1)
- Kartesisches Euler-Gitter (1)
- Kartesisches Gitter (1)
- Kartographie (1)
- Katadioptrisches Stereosystem (1)
- Katastrophenschutz (1)
- Kinect (1)
- Kinematik (1)
- Kirk-Coleman-Modell (1)
- Klassifikationsframework (1)
- Klausellogik (1)
- Kletterer (1)
- Knowledge (1)
- Knowledge Graph (1)
- Knowledge Graphs (1)
- Knowledge Sharing (1)
- Kohärenzanalyse (1)
- Kollisionserkennung (1)
- Koloskopie (1)
- Kommunikationsprotokoll (1)
- Kondertal (1)
- Kontextbezogener Dienst (1)
- Kontinuität (1)
- Kontinuitätsmanagement (1)
- Konturfindung (1)
- Konzept (1)
- Kookkurrenz (1)
- Kooperatives Informationssystem (1)
- Korruption (1)
- Korrutionsprävention (1)
- Kraftfahrzeug (1)
- Krankenhausinformationssystem (1)
- Krisenmanagement (1)
- Kriterienkatalog (1)
- Kundenmanagement (1)
- Landschaftsgestaltung (1)
- Landschaftsmodell (1)
- Lastenheft (1)
- Latent Negative (1)
- Layout (1)
- Layout <Mikroelektronik> (1)
- Leap-Motion (1)
- Lebensmittelallergie (1)
- Lehrer (1)
- Leichte Sprache (1)
- Leistungsmessung (1)
- Leitstandmodul (1)
- Lenkassistenzsystem (1)
- Lenkung (1)
- Lernen (1)
- Lernsoftware (1)
- Lernspiel (1)
- Lernumgebung (1)
- LexLearn (1)
- Lexikon (1)
- Lichttransport (1)
- Linespace (1)
- Linienkorrelationen (1)
- Link Prediction (1)
- Linked Data Modeling (1)
- Linking of Information (1)
- Linux (1)
- Literaturrecherche (1)
- Logging (1)
- Logik (1)
- Logischer Schluss (1)
- Lokale Bildmerkmale (1)
- Lokalisation (1)
- Lokalisierung (1)
- Lookup-Algorithmen (1)
- MIA (1)
- MMORPG (1)
- MP3 Player (1)
- MPEG-7 (1)
- MTASC (1)
- Machine-Learning (1)
- Machinelles lernen (1)
- Mail-Filter (1)
- Malen (1)
- Mammographie (1)
- Mann-Whitney (1)
- Manöver-Visualisierung (1)
- MapReduce (1)
- Markov Zufallsfelder (1)
- Marktanalyse (1)
- Maschinelles Sehen (1)
- Massenkommunikation (1)
- Master (1)
- Masterstudiengang (1)
- Matching (1)
- Matching-Verfahren (1)
- Matchingverfahren (1)
- Material Point Method (1)
- Materialmodell (1)
- Materie-Punkt-Methode (1)
- Maya (1)
- MeVisLab (1)
- Media Asset Management (1)
- Mediator framework (1)
- Medical Image Analysis (1)
- Medizinische Bildanalyse (1)
- Medizinische Bildverarbeitung (1)
- Medizintechnik (1)
- Mehragentensystem (1)
- Mehrbenutzer-Annotationssystem (1)
- Mehrprozessorsystem (1)
- Mensch-Maschine-Interaktion (1)
- Mensch-Maschine-Schnittstelle (1)
- Menschenmengen-Evakuierung (1)
- Merkmalsbewertung (1)
- Merkmalsdetektion (1)
- Merkmalsextrahierung (1)
- Merkmalsmanagement (1)
- Merkmalssynthese (1)
- Metamodel (1)
- Metric based Icp (1)
- Micro Finance (1)
- Migration (1)
- Mikroanalytisches Modell (1)
- Mikroanalytisches Simulationsmodell (1)
- Mikrosensus (1)
- Mikrosimulationsmodell (1)
- Mikroskopie (1)
- Mikrozensus (1)
- Mind Maps (1)
- Mindestlohn (1)
- Minimum wage (1)
- Mining (1)
- Mister X (1)
- Mitral Valve (1)
- Mitralklappe (1)
- Mobile BI (1)
- Mobile Business Intelligence (1)
- Mobile Commerce (1)
- Mobile Health (1)
- Mobile Information Systems (1)
- Mobile Kommunikation (1)
- Mobile Parking (1)
- Mobile Payment (1)
- Mobile Roboter (1)
- Mobile Robots (1)
- Mobile Ticketing (1)
- MobileFacets System (1)
- Mobiler Roboter (1)
- Mobiles Informatinssystem (1)
- Mobiles Multiplayerspiel (1)
- Mobiles Umfeld (1)
- Mobilkommunikation (1)
- Mobiltelefon (1)
- Model View Presenter (1)
- Model-Driven Engineering (1)
- Modellieren (1)
- Modellierungstool (1)
- Modellierungswerkzeug (1)
- Moderierte Diskussionen (1)
- Modul (1)
- Modulare Softwarearchitektur (1)
- Modulares Softwaresystem (1)
- Modulhandbuch (1)
- Modulnetze (1)
- Monitoring (1)
- Montageablauf (1)
- Morphologische Operatoren (1)
- Motion Capturing (1)
- Motivation (1)
- Mouse Gestures (1)
- Multi-Agenten-Systeme (1)
- Multi-robot System (1)
- Multiagent System (1)
- Multiagentensystem (1)
- Multiagentensysteme (1)
- Multidimensional (1)
- Multimedia Metadata Ontology (1)
- Multimediale Assets (1)
- Multimodal Action Recognition (1)
- Multiple Object Tracking (1)
- Multivariate Datenanalyse (1)
- Musteranalyse (1)
- Myokard (1)
- N-Body Simulation (1)
- N-Körper Simulation (1)
- NPO (1)
- NURBS (1)
- Nagios (1)
- Native language identification (1)
- Natural Feature Tracking (1)
- Natural Language Processing (1)
- Navier"Stokes equations (1)
- Navier-Stokes-Gleichungen (1)
- Netlogo (1)
- Network Monitoring (1)
- Network Simulation (1)
- Network Virtualization (1)
- Networked Graphs (1)
- Netzhaut (1)
- Netzwerk Protokollen (1)
- Netzwerk Routing (1)
- Netzwerk Virtualisierung (1)
- Netzwerkanalyse (1)
- Netzwerkchip (1)
- Netzwerkmanagment (1)
- Netzwerkmonitoring (1)
- Netzwerkschicht (1)
- Netzwerktechnik (1)
- Netzwerküberwachung (1)
- Nicht-photorealistisches Rendering (1)
- Nintendo DS (1)
- Nintendo Wii Fernbedienung (1)
- Nonprofit-Organisation (1)
- Norm (1)
- Normentstehung (1)
- Notfall (1)
- Notfallmanagement (1)
- Notfallvorsorge (1)
- Nutzungsanalyse (1)
- Nutzungsrechte (1)
- Nvidia CUDA (1)
- OCL <Programmiersprache> (1)
- OCR (1)
- ODRL (1)
- ODRLv2 (1)
- OGRE (1)
- ONDEX (1)
- OPNET (1)
- OSS (1)
- OVTK (1)
- OWL-DL (1)
- Oberflächenentwurf (1)
- Oberflächengestaltung (1)
- Oberflächenorientierung (1)
- Oberflächenstruktur (1)
- Object Recognition (1)
- Objective-C (1)
- Objektentfernung (1)
- Objekterkennung (1)
- Octree Textur (1)
- Offener Innovationsprozess (1)
- Office-Prozess (1)
- Oktalbaum (1)
- Oktonärbäume (1)
- One-Shot Action Recognition (1)
- Online Community (1)
- Online-Überwachung (1)
- Onlinespiele (1)
- Onlinesucht (1)
- Onlinewahl (1)
- Ontologie. Wissensverarbeitung (1)
- Ontology API model (1)
- Ontology alignment (1)
- Open Digital Rights Language (1)
- Open Source 3D Graphics Engine (1)
- Open Source Software (1)
- OpenCL (1)
- OpenVDB (1)
- OpenWrt (1)
- Opinion mining (1)
- Optimierung (1)
- Optische Zeichenerkennung (1)
- Optisches Mikroskop (1)
- Oracle Generation (1)
- Oraklegenerierung (1)
- Ornamentik (1)
- Ornamentklassifikation (1)
- Outsourcing (1)
- P2P (1)
- P3P (1)
- P3P-Policy-Generator (1)
- PACS- Picture Archiving (1)
- PBRT (1)
- PDA (1)
- PEPPOL (1)
- PHP (1)
- POIs (1)
- Packet Header SOCK_RAW SOCK_PACKET (1)
- Pan European Public Procurement OnLine (1)
- Par (1)
- Parallelmanipulator (1)
- Partikel (1)
- Partikelsimulation (1)
- Partizipation (1)
- Path Tracing (1)
- Path transformation (1)
- Pattern Recognition (1)
- Perinatalbogen (1)
- Personal Key Infrastruktur (1)
- Personalised Information Systems (1)
- Personenidentifizierung (1)
- Personentracking (1)
- Personenverfolgungssystem (1)
- Petri net (1)
- Petri-Netz-Theorie (1)
- Petrinetz (1)
- Pfadnachverfolgung (1)
- Pfadplanung (1)
- Pfadtransformation (1)
- Pfadverfolgung (1)
- Pflichtenheft (1)
- Phantom Omni (1)
- Photographie (1)
- Physik (1)
- Physikengine (1)
- Physiksimulation (1)
- Planspiegel-System (1)
- Planspiel 2.0 (1)
- Plug in (1)
- Plugin (1)
- Point Rendering (1)
- Pointing Devices (1)
- Policy Language (1)
- Political Communication (1)
- Politik (1)
- Politische Kampagne (1)
- Politische Meinungsbildung (1)
- Pollenanalyse (1)
- Polypendetektion (1)
- Pose (1)
- Posebestimmung (1)
- Poseschätzung (1)
- Positionsbestimmung (1)
- PostgreSQL (1)
- Potenzialfeld (1)
- Power Law (1)
- Pre-Integration (1)
- Preisbildung (1)
- Prevention (1)
- Primus (1)
- Privacy (1)
- Privatvermögen (1)
- Probabilistic finite automata (1)
- Probability (1)
- Probability propagation nets (1)
- Proceedings (1)
- Process tracing (1)
- Programm (1)
- Programmanalyse (1)
- Programmiergerät (1)
- Programmiersprache (1)
- Programmiersprachen (1)
- Programmierumgebung (1)
- Projekt iCity (1)
- Propositional Logic (1)
- Protocol (1)
- Prototyp (1)
- Prototype (1)
- Provenance (1)
- Prozedurale Synthese (1)
- Prozessanalyse (1)
- Prozessanalyse <Prozessmanagement> (1)
- Prozesskette (1)
- Präsentation (1)
- Prävention (1)
- Psychohygiene (1)
- Public-Key-Infrastruktur (1)
- Pulsweitenmodulation (1)
- Punktkorrelationen (1)
- Pupil Center Estimation Algorithmus (1)
- Qt/C++ (1)
- Quality assessment system (1)
- Qualitätsmodell (1)
- Qualitätssicherung (1)
- Query Expansion (1)
- RCP (1)
- RDF Graphs (1)
- RDF modeling (1)
- RFCO (1)
- RIP-MTI Algorithmus (1)
- RIP-XT (1)
- RIPng (1)
- RMIS (1)
- Radiales System (1)
- Radiosity (1)
- Random Finite Sets (1)
- Rangtest (1)
- Ray Tracer (1)
- Ray casting (1)
- Ray-Casting (1)
- ReDSeeDS-Project (1)
- ReMiP (1)
- Real-Life Game (1)
- Real-Life Spiel (1)
- Real-Time (1)
- Real-time computing (1)
- Realistisches Kameramodell (1)
- Rechtemanagement (1)
- Recommender System (1)
- Reddit (1)
- Referenzmetamodell (1)
- Reflections (1)
- Reflektionen (1)
- Reflexion (1)
- Regionenlabeling (1)
- Register (1)
- Registratur (1)
- Regler (1)
- Regression (1)
- Regulierung (1)
- Reisedokument (1)
- Relationale Datenbank (1)
- Relationales Datenbanksystem (1)
- Relativitätstheorie (1)
- Relevance Feedback (1)
- Repast (1)
- Requirement-Engineering (1)
- Requirements-Engineering (1)
- Rescue League (1)
- Rescue Robots (1)
- Rescueanalyser (1)
- Research Map (1)
- Resource Description Framework (RDF) (1)
- Restrukturierung (1)
- Retina Befundbilder (1)
- Retina Fundus Bilder (1)
- Retina Fundus Images (1)
- Retinex-Algorithmus (1)
- Reverberation (1)
- Reverse Engineering (1)
- Rich Internet Application (1)
- Risikomanagement-Informationssysteme (1)
- Risk (1)
- Riss (1)
- Rissmusteranalyse (1)
- Robbie (1)
- Robert P. Abelson (1)
- RoboCup (1)
- RoboCup Rescue (1)
- Robocup 2008 (1)
- Robotersystem (1)
- Route Aggregation (1)
- Route Planning (1)
- Routen-Aggregation (1)
- Routenplanung (1)
- Router-based Flow Control Ontology (1)
- Routing Information Protocol (RIP) (1)
- Routing Information Protokoll (1)
- Routing Loops (1)
- Routing information protocol (1)
- Routing with Metric based Topology Investigation (RMTI) (1)
- Routing- und Forwarding Tabellen (1)
- Routing-Loop (1)
- RuneScape (1)
- Rückfahrkamera (1)
- Rückverfolgbarkeit (1)
- Rückwärtsfahrt (1)
- SAC (1)
- SIFT-Algorithmus (1)
- SIFT-Merkmale (1)
- SIFT-Verfahren (1)
- SIMD (1)
- SNMP (1)
- SOA (1)
- SOA-Webservice (1)
- SOAMIG (1)
- SOMA (1)
- STOF Model (1)
- STOR (1)
- STP (1)
- SURF-Algorithmus (1)
- SVG (1)
- Sales Ageny (1)
- Sand (1)
- Sattelkraftfahrzeug (1)
- Sattelzug (1)
- Scanmatching (1)
- Schema Information (1)
- Schlauch (1)
- Schleifenerkennung (1)
- Schnelle Faltung (1)
- Schutzprofil (1)
- Schwachstellen (1)
- Schwangerschaft (1)
- Search engine (1)
- Second Life (1)
- Security Routing (1)
- Segmentation (1)
- Semantic Data (1)
- Semantics (1)
- Semantisches Wiki (1)
- Sensor (1)
- Sensorensteuerung (1)
- Separating-Axis-Theorem (1)
- Serdar Ayalp (1)
- Serielle Schnittstelle (1)
- Service identification (1)
- Service-Identifizierung (1)
- Service-Oriented Architectures (SOA) (1)
- Service-oriented Architectures (SOA) (1)
- Service-orientierte Architektur (1)
- Serviceroboter (1)
- Sesame (1)
- Shaderframework (1)
- Shaderhochsprache (1)
- Shaderprogramm (1)
- Shared Annotation Model (1)
- Shared Annotations (1)
- Shattering (1)
- Sich langsam verändernde Dimensionen (1)
- Sicherheit Routing (1)
- Sicherheitsanforderungen (1)
- Simulations-Wiki (1)
- Simulationswerkzeug (1)
- Skript (1)
- Skript <Programm> (1)
- Skriptsprache (1)
- Slowly Changing Dimensions (1)
- Smartphone Applikation (1)
- SocSimNet (1)
- Social Games (1)
- Social Networking Platforms (1)
- Social Software (1)
- Socket (1)
- Socket-Schnittstelle (1)
- Software Development (1)
- Software Language (1)
- Software Technology (1)
- Software migration (1)
- Software techniques for object recognition (STOR) (1)
- Software- Ergonomie (1)
- Software-Migration (1)
- Softwarearchitektur (1)
- Softwareentwurf (1)
- Softwareergonomie (1)
- Softwaremodellierung (1)
- Softwarespezifikation (1)
- Softwaretesting (1)
- Softwarewartung (1)
- Soziale Netzwerke (1)
- Soziales Netzwerk (1)
- Sozialwissenschaftliche Methodenlehre (1)
- Sozialwissenschaftliche Simulation (1)
- Soziooekonomisches Panel (1)
- Spam-Mail (1)
- Spannender Baum (1)
- Spanning Tree (1)
- Speaker Recognition (1)
- Specification (1)
- Specular (1)
- Spektrale Bildgewinnung (1)
- Spezifikation (1)
- Spieleentwicklung (1)
- SpoGa (1)
- Sport (1)
- Sports (1)
- Sprachverarbeitung (1)
- Sprechtherapie (1)
- Staat (1)
- Stadtmodelle (1)
- Standortbestimmung (1)
- Statische Analyse (1)
- Statistics , Social Science Methods (1)
- Statistik (1)
- Statistische Analyse (1)
- Staukontrollmechanismen (1)
- Stereobildfolgen (1)
- Stereografie (1)
- Stereoskopie (1)
- Stewart-Plattform (1)
- Stilisierung (1)
- Stochastic Logic (1)
- Stoffsimulation (1)
- Stomp (1)
- Strassenkreuzung (1)
- Straßenzustand (1)
- Suat Algin (1)
- Subsurface Scattering (1)
- Suchmaschine (1)
- Supernetting (1)
- Support System (1)
- Survey Research (1)
- Syntax (1)
- System Dynamics (1)
- Systemanalyse (1)
- Systembiologie (1)
- Szeneneditor (1)
- Szenengraph (1)
- TAP (1)
- TBox (1)
- TCP/IP (1)
- TGraphen (1)
- TQM (1)
- TRECVID (1)
- TRIZ (1)
- Tableau <Logik> (1)
- Tableau Calculus (1)
- Tageslichtprojektor (1)
- Taktstraße (1)
- Tanzspiel (1)
- Tarrain Klassifikation (1)
- Tastatur (1)
- Tastatureingabeverhalten (1)
- Taxonomie (1)
- Taxonomy (1)
- Technologiemanagement (1)
- Technologischer Raum (1)
- Telemedizin (1)
- Temperaturmessung (1)
- Temporale Datenhaltung (1)
- Tenneco Automotive (1)
- Tesseract (1)
- Test Generation (1)
- Testen (1)
- Testgenerierung (1)
- Text (1)
- Text Analysis (1)
- Text Mining (1)
- Text classification (1)
- Texterkennung (1)
- Textur (1)
- Texturierung (1)
- Theorem prover (1)
- Theorembeweiser (1)
- Thunderbird <Programm> (1)
- Tiefenbild (1)
- Tiefenkarte (1)
- Tokens (1)
- Ton (1)
- Tone Mapping (1)
- Tone-Mapping (1)
- Tone-Mapping-Verfahren (1)
- Tonemapping (1)
- Tonemapping-Verfahren (1)
- Tool Evaluation (1)
- Total Quality Management (1)
- Touchscreen (1)
- Tourismus (1)
- Traceability (1)
- Tracing (1)
- Tracking-System (1)
- Trackingsystem (1)
- Trajektorien (1)
- Transaction concept (1)
- Transaktion (1)
- Transaktionskonzept (1)
- Transfer function (1)
- Transferfunction (1)
- Translation (1)
- Transport (1)
- Transportschicht (1)
- Triangulierung (1)
- Triangulierungsverfahren (1)
- Type System (1)
- Type system (1)
- UML Activity Diagrams (1)
- UML Aktivitätsdiagramm (1)
- URM (1)
- USARSim (1)
- USB (1)
- Ultraschall (1)
- Ultrasound (1)
- Umfrage in Koblenz (1)
- Umgebungslicht (1)
- Ungarische Methode (1)
- Unified Modeling Language (UML ) (1)
- Uniforme Raumunterteilung (1)
- United Internet AG (1)
- Universitäre Lehrveranstaltung (1)
- Unlink Prediction (1)
- Unsicheres Schließen (1)
- Unternehmen (1)
- Unternehmensarchitektur (1)
- Unternehmensnetzwerke (1)
- Unterricht (1)
- Unterwasser-Pipeline (1)
- Unterwasserfahrzeug (1)
- Unterwasserkabel (1)
- User Interface (1)
- VCD (1)
- VDE (1)
- VDE-Switch (1)
- VHDL (1)
- VIACOBI (1)
- VLAN (1)
- VST (1)
- VTP (1)
- Validierung (1)
- Vascular analysis (1)
- Vegetation distribution (1)
- Veranstaltung (1)
- Verbindungsschicht (1)
- Verbraucherforschung (1)
- Verifikation (1)
- Verortung (1)
- Verteilte Systeme (1)
- Vertex Buffer Object (1)
- Vertex Buffer Objekt (1)
- Verwaltungsautomation (1)
- Video (1)
- Video-Installation (1)
- Videospiel (1)
- Videospiele (1)
- Videospielentwicklung (1)
- Videoübertragung (1)
- Virtual Company Dossier (1)
- Virtual Networks (1)
- Virtual Square (1)
- Virtual characters (1)
- Virtual network user mode Linux (1)
- Virtualisation (1)
- Virtuelle Menschen (1)
- Virtuelle Welten (1)
- Virtuelle Ökonomien (1)
- Virtueller Raum (1)
- Virtuelles Netz (1)
- Visibility Skeleton (1)
- Visual Stimuli Discovery (1)
- Visualisierungstechniken (1)
- Visuelle Installation (1)
- Visuelle Odometrie (1)
- Vocabulary Mapping (1)
- Vocabulary Reuse (1)
- Vocabulary Trainer (1)
- Volume Hatching (1)
- Volume Raycasting (1)
- Volume Rendering (1)
- Volumenmodell (1)
- Volumenvisualisierung (1)
- Vorbeugung (1)
- Vorliebe (1)
- Vorwärtsmodell (1)
- Voxel (1)
- Voxelisierung (1)
- W-LAN (1)
- WEB (1)
- WLAN Fingerprinting (1)
- WSDL (1)
- WSN (1)
- Wahrscheinlichkeit (1)
- Wahrscheinlichkeitsrechnung (1)
- Water Surface Temperature (1)
- Wavelet (1)
- Web (1)
- Web Analytics Framework (1)
- Web Mining (1)
- Web Ontology Language (OWL) (1)
- Web Science (1)
- Web log (1)
- Web-application framework (1)
- Web-programming technologies (1)
- Web3D (1)
- Webanwendung (1)
- Weblog (1)
- Webseiten (1)
- Webserver (1)
- Webservice Sail (1)
- Website (1)
- Wechselkursänderung (1)
- Weibliches Publikum (1)
- Weiterentwicklung (1)
- Wellen (1)
- Werbeform (1)
- Wertschöpfungskette (1)
- Whiteboard (1)
- WiFi Fingerprinting (1)
- Wiederhall (1)
- Wii-Balance Board (1)
- Wii-Kamera (1)
- Wilcoxon-Rangsummentest (1)
- Wireless Sensor Networks (1)
- Wireshark (1)
- Wirtschaftsprojekt (1)
- Wissensbasis (1)
- Wissenskompilation (1)
- Wissensvermittlung (1)
- Wolkensimulation (1)
- Word-of-Mouth (1)
- Workflow (1)
- World Wide Web (1)
- Wrapping (1)
- X-Cosim (1)
- XML-Dokument (1)
- XMPP (1)
- XSD (1)
- XTpeer (1)
- Xcode (1)
- YAWL (1)
- You-messages (1)
- Zerbrechen (1)
- Zertifikat (1)
- Zirkumskription (1)
- Zufriedenheit (1)
- Zukunftsszenario (1)
- accelerometer (1)
- acceptance (1)
- activation functions of neurons (1)
- adaptive resonance theory (1)
- advertisements (1)
- agent (1)
- agent-based model (1)
- agentenbasierte Modellierung (1)
- amtliche Haushaltsbefragungen (1)
- andLinux (1)
- andLinux. (1)
- android (1)
- application programming interfaces (1)
- archiving (1)
- area light (1)
- artiffficial neural networks (1)
- artififfcial neural networks (1)
- assessment model (1)
- attitude (1)
- augmented reality (1)
- automated theorem prover (1)
- automatisierte Videoüberwachung (1)
- bachelor (1)
- backpropagation (1)
- benefits (1)
- bias (1)
- blood analysis (1)
- business process (1)
- business process management (1)
- by-stander effect (1)
- camera calibration (1)
- categorisation (1)
- co-occurrence (1)
- collaboration (1)
- collaborative technologies (1)
- color image processing (1)
- colour calibration (1)
- concept (1)
- concurrency (1)
- conflict detection (1)
- contexts of use (1)
- convergence analysis (1)
- core ontologies (1)
- crowd evacuation (1)
- cultural dimensions (1)
- currency exchange rates (1)
- data mining (1)
- data protection (1)
- data warehouse (1)
- data-mining (1)
- deductive (1)
- depth map (1)
- description logic (1)
- deutsche Hochschulen (1)
- deutschsprachiger Markt (1)
- development (1)
- diabetic retinopathy (1)
- diagram (1)
- diffusion (1)
- digital library (1)
- directed acyclic graphs (1)
- disparity map (1)
- distinct object identifiers (1)
- distributed information systems (1)
- dreidimensionale Computergraphik (1)
- dynamic programming (1)
- e-Commerce (1)
- e-ID (1)
- e-learning (1)
- e-service (1)
- e-service quality (1)
- eGroupware (1)
- eID (1)
- ePA (1)
- eSourcing (1)
- eXperience methodology (1)
- edge linking (1)
- ediv (1)
- elektronische Anwendung (1)
- elektronische Anwendungen (1)
- engine (1)
- estimation of algorithm efficiency (1)
- ethnic conflicts (1)
- ethnische Konflikte (1)
- evaluation (1)
- event (1)
- event model (1)
- event-based systems (1)
- events (1)
- evolution (1)
- experiment (1)
- eye tracking (1)
- faceted search (1)
- factor analysis (1)
- fairness (1)
- finite state automata (1)
- first-order logic (1)
- folksonomies (1)
- functional web testing tools (1)
- gaze information (1)
- general purpose (1)
- geometry shader (1)
- grUML (1)
- gradient method of training weight coefficients (1)
- graphics card (1)
- grassland (1)
- groupwork (1)
- high-traffic (1)
- hybrid systems (1)
- hybride Automaten (1)
- hypertableaux (1)
- iCity project (1)
- iOS (1)
- iOS 5 (1)
- iOS-SDK (1)
- iSearch (1)
- id card (1)
- image semantics (1)
- indirect lighting (1)
- indirektes Licht (1)
- information flow regulation (1)
- information retrieval (1)
- interaction (1)
- interactive (1)
- interactive application (1)
- interaktive Applikation (1)
- interaktiven (1)
- jOWL (1)
- java (1)
- jump'n run game (1)
- keystroke biometric recognition (1)
- knowledge base (1)
- knowledge management system (1)
- knowledge work (1)
- kollaboratives Lernen (1)
- landmarks (1)
- legacy software (1)
- line space (1)
- lineare Algebra (1)
- living book (1)
- logistic (1)
- long-living systems (1)
- mPayments (1)
- mann-whitney (1)
- markerless tracking (1)
- master (1)
- mathematical model (1)
- medical care (1)
- medical image processing (1)
- medizinische Bilddaten (1)
- menschliches Auge (1)
- metadata formats (1)
- metadata standards (1)
- metasearch engine (1)
- methodology (1)
- metrics (1)
- micro-agent (1)
- midwife (1)
- migration (1)
- minimum self-contained graphs (1)
- mobile application (1)
- mobile devices (1)
- mobile facets (1)
- mobile health care (1)
- mobile interaction (1)
- model (1)
- model generation (1)
- model-driven engineering (1)
- modellgetriebene Softwareentwicklung (1)
- modulares System (1)
- module handbook (1)
- morphological operators (1)
- movement (1)
- multiagent systems (1)
- multidimensional (1)
- multidimensional transfer function (1)
- multidimensionale Transferfunktion (1)
- multiprocessing (1)
- myAnnotations (1)
- nPA (1)
- natural language generation (1)
- natural language processing (1)
- natürliche Sprache (1)
- networks (1)
- neural (1)
- nichtamtliche Haushaltsbefragungen (1)
- octree texture (1)
- official household surveys (1)
- online survey (1)
- out-of-hospital birth (1)
- parallel calculations (1)
- parallel computing (1)
- path planning (1)
- perinatal (1)
- person (1)
- personal information management (1)
- persönliches Informationsmanagement (1)
- photo selection (1)
- physical interaction (1)
- physics (1)
- physische Interaktion (1)
- plain language (1)
- points of interest (1)
- policy modelling (1)
- polyp detection (1)
- pregnancy (1)
- privacy (1)
- privacy by design (1)
- privacy impact assessment (1)
- privacy protection (1)
- procedural content generation (1)
- projektives Malen (1)
- psychisches Verhalten (1)
- psychological behavior (1)
- public key infrastructure (1)
- quality (1)
- quality assurance (1)
- question answering (1)
- ray casting (1)
- raycasting (1)
- raytracing (1)
- real-time computing (1)
- realtime physics (1)
- recurrent (1)
- reference meta model (1)
- reflection (1)
- refraction (1)
- region labeling (1)
- regression analysis (1)
- regular dag languages (1)
- relativity (1)
- requirements analysis (1)
- retina fundus images (1)
- revenue management (1)
- rich multimedia presentations (1)
- rigid body (1)
- rip (1)
- risk (1)
- rmti (1)
- robotics (1)
- scaffolded writing (1)
- scene analysis (1)
- search engine (1)
- security requirements (1)
- semantic annotation (1)
- semantic desktop (1)
- semantischer Desktop (1)
- sensor control (1)
- sequent calculi (1)
- shader (1)
- shiq (1)
- smartphone app (1)
- social media data (1)
- social object (1)
- soft shadow (1)
- software engineering (1)
- stereo vision (1)
- stereotracking (1)
- summative evaluation (1)
- survey (1)
- survey in Koblenz (1)
- syntaktische Analyse (1)
- tag recommendation (1)
- tagging (1)
- taxonomy (1)
- texturing (1)
- time series (1)
- tool-integration (1)
- traceability (1)
- tracking (1)
- transform feedback (1)
- transformation (1)
- travel document (1)
- unique name assumption (1)
- unofficial household surveys (1)
- usability study (1)
- usage-mining (1)
- vegetation modeling (1)
- verification (1)
- video game (1)
- video games (1)
- videogames (1)
- virtual goods (1)
- virtual human (1)
- virtual network user mode linux (1)
- virtuelle Netze (1)
- vnuml (1)
- volume rendering (1)
- volume visualization (1)
- volumenrendering (1)
- voxelization (1)
- water surface (1)
- waves (1)
- web 2.0 (1)
- web-portal medical e-services (1)
- wireless sensor networks (1)
- xtpeer (1)
- Öffentliche Verwaltung (1)
- Übersetzung (1)
- Überwachung (1)
- Überwachungstechnik (1)
Institute
- Fachbereich 4 (273)
- Institut für Computervisualistik (222)
- Institut für Informatik (114)
- Institut für Wirtschafts- und Verwaltungsinformatik (104)
- Institut für Management (49)
- Institut für Softwaretechnik (47)
- Institute for Web Science and Technologies (34)
- Institut für Integrierte Naturwissenschaften (4)
- An-Institute (1)
Graph-based data formats are flexible in representing data. In particular semantic data models, where the schema is part of the data, gained traction and commercial success in recent years. Semantic data models are also the basis for the Semantic Web - a Web of data governed by open standards in which computer programs can freely access the provided data. This thesis is concerned with the correctness of programs that access semantic data. While the flexibility of semantic data models is one of their biggest strengths, it can easily lead to programmers accidentally not accounting for unintuitive edge cases. Often, such exceptions surface during program execution as run-time errors or unintended side-effects. Depending on the exact condition, a program may run for a long time before the error occurs and the program crashes.
This thesis defines type systems that can detect and avoid such run-time errors based on schema languages available for the Semantic Web. In particular, this thesis uses the Web Ontology Language (OWL) and its theoretic underpinnings, i.e., description logics, as well as the Shapes Constraint Language (SHACL) to define type systems that provide type-safe data access to semantic data graphs. Providing a safe type system is an established methodology for proving the absence of run-time errors in programs without requiring execution. Both schema languages are based on possible world semantics but differ in the treatment of incomplete knowledge. While OWL allows for modelling incomplete knowledge through an open-world semantics, SHACL relies on a fixed domain and closed-world semantics. We provide the formal underpinnings for type systems based on each of the two schema languages. In particular, we base our notion of types on sets of values which allows us to specify a subtype relation based on subset semantics. In case of description logics, subsumption is a routine problem. For
the type system based on SHACL, we are able to translate it into a description
logic subsumption problem.
In the context of augmented reality we define tracking as a collection of methods to obtain the position and orientation (pose) of a user. By means of various displaying techniques, this ensures a correct visual overlay of graphical information onto the reality perceived. Precise results for calculation of the camera pose are gained by methods of image processing, usually analyzing the pixels of an image and extracing features, which can be recognized over the image sequence. However, these methods do not regard the process of image synthesis or at least in a very simplyfied way. In contrast, the class of model-based methods assumes a given 3D model of the observed scene. Based on the model data features can be identified to establish correspondences in the camera image. From these feature correspondences the camera pose is calculated. An interesting approach is the strategy of analysis-by-synthesis, regarding the computer graphics rendering process for extending the knowledge about the model by information from image synthesis and other environment variables.
In this thesis the components of a tracking system are identified and further it is analyzed, to what extend information about the model, the rendering process and the environment can contribute to the components for improvement of the tracking process using analysis-by-synthesis. In particular, by using knowledge as topological information, lighting or perspective, the feature synthesis and correspondence finding should lead to visually unambiguous features that can be predicted and evaluated to be suitable for stable tracking of the camera pose.
Social media platforms such as Twitter or Reddit allow users almost unrestricted access to publish their opinions on recent events or discuss trending topics. While the majority of users approach these platforms innocently, some groups have set their mind on spreading misinformation and influencing or manipulating public opinion. These groups disguise as native users from various countries to spread frequently manufactured articles, strong polarizing opinions in the political spectrum and possibly become providers of hate-speech or extremely political positions. This thesis aims to implement an AutoML pipeline for identifying second language speakers from English social media texts. We investigate style differences of text in different topics and across the platforms Reddit and Twitter, and analyse linguistic features. We employ feature-based models with datasets from Reddit, which include mostly English conversation from European users, and Twitter, which was newly created by collecting English tweets from selected trending topics in different countries. The pipeline classifies language family, native language and origin (Native or non-Native English speakers) of a given textual input. We evaluate the resulting classifications by comparing prediction accuracy, precision and F1 scores of our classification pipeline to traditional machine learning processes. Lastly, we compare the results from each dataset and find differences in language use for topics and platforms. We obtained high prediction accuracy for all categories on the Twitter dataset and observed high variance in features such as average text length especially for Balto-Slavic countries.
Data-minimization and fairness are fundamental data protection requirements to avoid privacy threats and discrimination. Violations of data protection requirements often result from: First, conflicts between security, data-minimization and fairness requirements. Second, data protection requirements for the organizational and technical aspects of a system that are currently dealt with separately, giving rise to misconceptions and errors. Third, hidden data correlations that might lead to influence biases against protected characteristics of individuals such as ethnicity in decision-making software. For the effective assurance of data protection needs,
it is important to avoid sources of violations right from the design modeling phase. However, a model-based approach that addresses the issues above is missing.
To handle the issues above, this thesis introduces a model-based methodology called MoPrivFair (Model-based Privacy & Fairness). MoPrivFair comprises three sub-frameworks: First, a framework that extends the SecBPMN2 approach to allow detecting conflicts between security, data-minimization and fairness requirements. Second, a framework for enforcing an integrated data-protection management throughout the development process based on a business processes model (i.e., SecBPMN2 model) and a software architecture model (i.e., UMLsec model) annotated with data protection requirements while establishing traceability. Third, the UML extension UMLfair to support individual fairness analysis and reporting discriminatory behaviors. Each of the proposed frameworks is supported by automated tool support.
We validated the applicability and usability of our conflict detection technique based on a health care management case study, and an experimental user study, respectively. Based on an air traffic management case study, we reported on the applicability of our technique for enforcing an integrated data-protection management. We validated the applicability of our individual fairness analysis technique using three case studies featuring a school management system, a delivery management system and a loan management system. The results show a promising outlook on the applicability of our proposed frameworks in real-world settings.
Nowadays, almost any IT system involves personal data processing. In
such systems, many privacy risks arise when privacy concerns are not
properly addressed from the early phases of the system design. The
General Data Protection Regulation (GDPR) prescribes the Privacy by
Design (PbD) principle. As its core, PbD obliges protecting personal
data from the onset of the system development, by effectively
integrating appropriate privacy controls into the design. To
operationalize the concept of PbD, a set of challenges emerges: First, we need a basis to define privacy concerns. Without such a basis, we are not able to verify whether personal data processing is authorized. Second, we need to identify where precisely in a system, the controls have to be applied. This calls for system analysis concerning privacy concerns. Third, with a view to selecting and integrating appropriate controls, based on the results of system analysis, a mechanism to identify the privacy risks is required. Mitigating privacy risks is at the core of the PbD principle. Fourth, choosing and integrating appropriate controls into a system are complex tasks that besides risks, have to consider potential interrelations among privacy controls and the costs of the controls.
This thesis introduces a model-based privacy by design methodology to handle the above challenges. Our methodology relies on a precise definition of privacy concerns and comprises three sub-methodologies: model-based privacy analysis, modelbased privacy impact assessment and privacy-enhanced system design modeling. First, we introduce a definition of privacy preferences, which provides a basis to specify privacy concerns and to verify whether personal data processing is authorized. Second, we present a model-based methodology to analyze a system model. The results of this analysis denote a set of privacy design violations. Third, taking into account the results of privacy analysis, we introduce a model-based privacy impact assessment methodology to identify concrete privacy risks in a system model. Fourth, concerning the risks, and taking into account the interrelations and the costs of the controls, we propose a methodology to select appropriate controls and integrate them into a system design. Using various practical case studies, we evaluate our concepts, showing a promising outlook on the applicability of our methodology in real-world settings.
Current political issues are often reflected in social media discussions, gathering politicians and voters on common platforms. As these can affect the public perception of politics, the inner dynamics and backgrounds of such debates are of great scientific interest. This thesis takes user generated messages from an up-to-date dataset of considerable relevance as Time Series, and applies a topic-based analysis of inspiration and agenda setting to it. The Institute for Web Science and Technologies of the University Koblenz-Landau has collected Twitter data generated beforehand by candidates of the European Parliament Election 2019. This work processes and analyzes the dataset for various properties, while focusing on the influence of politicians and media on online debates. An algorithm to cluster tweets into topical threads is introduced. Subsequently, Sequential Association Rules are mined, yielding wide array of potential influence relations between both actors and topics. The elaborated methodology can be configured with different parameters and is extensible in functionality and scope of application.
Software systems have an increasing impact on our daily lives. Many systems process sensitive data or control critical infrastructure. Providing secure software is therefore inevitable. Such systems are rarely being renewed regularly due to the high costs and effort. Oftentimes, systems that were planned and implemented to be secure, become insecure because their context evolves. These systems are connected to the Internet and therefore also constantly subject to new types of attacks. The security requirements of these systems remain unchanged, while, for example, discovery of a vulnerability of an encryption algorithm previously assumed to be secure requires a change of the system design. Some security requirements cannot be checked by the system’s design but only at run time. Furthermore, the sudden discovery of a security violation requires an immediate reaction to prevent a system shutdown. Knowledge regarding security best practices, attacks, and mitigations is generally available, yet rarely integrated part of software development or covering evolution.
This thesis examines how the security of long-living software systems can be preserved taking into account the influence of context evolutions. The goal of the proposed approach, S²EC²O, is to recover the security of model-based software systems using co-evolution.
An ontology-based knowledge base is introduced, capable of managing common, as well as system-specific knowledge relevant to security. A transformation achieves the connection of the knowledge base to the UML system model. By using semantic differences, knowledge inference, and the detection of inconsistencies in the knowledge base, context knowledge evolutions are detected.
A catalog containing rules to manage and recover security requirements uses detected context evolutions to propose potential co-evolutions to the system model which reestablish the compliance with security requirements.
S²EC²O uses security annotations to link models and executable code and provides support for run-time monitoring. The adaptation of running systems is being considered as is round-trip engineering, which integrates insights from the run time into the system model.
S²EC²O is amended by prototypical tool support. This tool is used to show S²EC²O’s applicability based on a case study targeting the medical information system iTrust.
This thesis at hand contributes to the development and maintenance of long-living software systems, regarding their security. The proposed approach will aid security experts: It detects security-relevant changes to the system context, determines the impact on the system’s security and facilitates co-evolutions to recover the compliance with the security requirements.
Abstract
This bachelor thesis delivers a comprehensive overview of the topic Internet of Things (IoT). With the help of a first literature review, important characteristics, architectures, and properties have been identified. The main aim of this bachelor thesis is to determine whether the use of IoT in the transport of food, considering the compliance with the cold chain, can provide advantages for companies to reduce food waste. For this purpose, a second literature review has been carried out with food transport systems without the use, as well as with the use of IoT. Based on the literature review, it is possible at the end to determine a theoretical ‘ideal’ system for food transport in refrigerated trucks. The respective used technologies are also mentioned. The findings of several authors have shown that often significant improvements can be achieved in surveillance, transport in general, or traceability of food, and ultimately food waste can be reduced. However, benefits can also be gained using new non-IoT-based technologies. Thus, the main knowledge of this bachelor thesis is that a theoretical ‘ideal’ transport system contains a sensible combination of technologies with and without IoT. This system includes the use of a Wireless Sensor Network (WSN) for real-time food monitoring, as well as an alarm function when the temperature exceeds a maximum. Real-time monitoring with GPS coupled with a monitoring center to prevent traffic jams is another task. Smart and energy-efficient packaging, and finally the use of the new supercooling-technology, make the system significantly more efficient in reducing food waste. These highlights, that when choosing a transport system, which is as efficient and profitable as possible for food with refrigerated transport, companies need not just rely on the use of IoT. On this basis, it is advisable to combine the systems and technologies used so far with IoT in order to avoid as much food waste as possible.
Data flow models in the literature are often very fine-grained, which transfers to the data flow analysis performed on them and thus leads to a decrease in the analysis' understandability. Since a data flow model, which abstracts from the majority of implementation details of the program modeled, allows for potentially easier to understand data flow analyses, this master thesis deals with the specification and construction of a highly abstracted data flow model and the application of data flow analyses on this model. The model and the analyses performed on it have been developed in a test-driven manner, so that a wide range of possible data flow scenarios could be covered. As a concrete data flow analysis, a static security check in the form of a detection of insufficient user input sanitization has been performed. To date, there's no data flow model on a similarly high level of abstraction. The proposed solution is therefore unique and facilitates developers without expertise in data flow analysis to perform such analyses.
Diese Arbeit soll das von Dietz und Oppermann entwickelte Planspiel „Datenschutz 2.0“ an den heutigen Alltag der Schüler anpassen, die Benutzung in der Sekundarstufe II ermöglichen und die technischen und gesetzlichen Problematiken des Planspiels beheben. Das mit dem Planspiel aufgegriffene Thema Datenschutz ist im rheinland-pfälzischen Informatik-Lehrplan für die Sekundarstufe II verankert. Hier wird der Begriff Datenschutz in der Reihe „Datenerhebung unter dem Aspekt Datenschutz beurteilen“ genannt. Jedoch werden in dem Planspiel keine Daten erhoben, sondern die selbst hinterlassenen Datenspuren untersucht. Diese Form des Datenschutzes ist im Grundkurs in der vorgeschlagenen Reihe „Datensicherheit unter der Berücksichtigung kryptologischer Verfahren erklären und beachten“ unter dem Thema Kommunikation in Rechnernetzen zu finden. Im Leistungskurs steht die Datensicherheit in gleichbenannter Reihe und Thema und in der Reihe „Datenerhebung unter dem Aspekt Datenschutz beurteilen“ im Thema Wechselwirkung zwischen Informatiksysteme, Individuum und Gesellschaft.