Refine
Year of publication
Document Type
- Conference Proceeding (492)
- Article (216)
- Part of a Book (48)
- Doctoral Thesis (31)
- Other Publications (28)
- Master's Thesis (14)
- Report (13)
- Working Paper (12)
- Book (9)
- Bachelor Thesis (8)
Language
- English (881) (remove)
Keywords
- (Strict) sign-regularity (1)
- 1D-CNN (1)
- 2 D environment Laser data (1)
- 360-degree coverage (1)
- 3D Extended Object Tracking (1)
- 3D Extended Object Tracking (EOT) (2)
- 3D shape tracking (1)
- 3D ship detection (1)
- 3D urban planning (1)
- AAL (3)
- ADAM (1)
- AHI (1)
- ASEAN (1)
- Aboriginal people (1)
- Abrasive grain material (1)
- Abschätzung (1)
- Abstract interpretation (1)
- Academic german (1)
- Accelerometer (3)
- Accelerometer calibration (1)
- Accelerometer sensor (2)
- Accelerometers (2)
- Accessibility (1)
- Accessible Tourism (1)
- Actions (1)
- Active Learning (1)
- Activity monitoring (1)
- Actuators (3)
- Adapted business models design for sustainability (aDBMfS) (1)
- Adaption (1)
- Adaptive (1)
- Adaptive birth density (1)
- Additive manufacturing (1)
- Adivasi (1)
- Adolescent idiopathic scoliosis (1)
- Aerobic fermentation (1)
- Aerospace Engineering (1)
- Agenda 2030 (1)
- Agile administration (1)
- Agrarprodukt (1)
- Algorithm (1)
- Allegation (1)
- Alpine area (1)
- Alternative Energy Production (1)
- Ambidexterity (1)
- Ambient assisted living (2)
- Analog-Digital-Umsetzer (1)
- Analog-to-digital-Converter ; Spice Simulation ; Analog integrated circuit design ; (1)
- Anisotropic hyperelasticity (1)
- Antenna arrays (1)
- Anticipation (1)
- Antidumping (1)
- Apnea detection (1)
- Application Integration (1)
- Aquaculture (1)
- Arbeitsablauf (1)
- Architektur (1)
- Arrival and departure (1)
- Artificial Intelligence (3)
- Artificial Neural Network (1)
- Artificial Neural Networks (1)
- Artificial intelligence (2)
- Artificial intelligence models (1)
- Artisanal mining (1)
- Assisted living (1)
- Assistive systems (1)
- Atom interferometer (1)
- Atom interferometry (1)
- Auftragsabwicklung (1)
- Austenitic stainless steels (1)
- Autoethnography (1)
- Automated Artefact Separation (1)
- Automated Docking of Vessels (1)
- Automatic sleep assessment (1)
- Automobiles (1)
- Automotive (1)
- Automotive Industry (1)
- Autonomous Mobile Indoor Robot (1)
- Autonomous vessels (1)
- Autonomy (1)
- Autorität (1)
- B-spline activation function (1)
- BCG (1)
- BCG signal (1)
- BCH codes (1)
- BISOL (1)
- BRIC (1)
- Backstepping control (2)
- Bahnplanung (1)
- Balancing energy (1)
- Ballistocardiography (4)
- Ballistocardiography (BCG) (1)
- Bangkok Metro (M.R.T.) (1)
- Bangkok Transit System (BTS) (1)
- Barriers (1)
- Barriers to Business Model Innovation (1)
- Basic prices (1)
- Bayesian convolutional neural networks (1)
- Bayesian parameter estimation (1)
- Benchmark (1)
- Bernoulli filter (1)
- Bernstein Basis (1)
- Bernstein coefficient (4)
- Bernstein coefficients (1)
- Bernstein function (1)
- Bernstein polynomial (7)
- Bernstein polynomials (1)
- Bi-LSTM Model (1)
- Binary codes (1)
- Bio-vital data (1)
- Bioenergy villages (1)
- Biomechanics Laboratory (1)
- Biomedical Engineering (1)
- Biomedical Signal Capturing (1)
- Biomedical signal processing (1)
- Biomedical signals (1)
- Biomedical time series (1)
- Biosignal analysis (1)
- Biosignal processing (1)
- Biovital signal (2)
- Birth Density (1)
- Black Forest (1)
- Blended values (1)
- Block codes (2)
- Blockchain (1)
- Body Position (1)
- Body sensor networks (1)
- Body-movement (1)
- Boids Flocking Algorithm (1)
- Bone Elongation (1)
- Bone elongation (1)
- Border tourism (1)
- Bose-Einstein condensate (2)
- Botswana (2)
- Bounded uncertainty (2)
- Bounding boxes (1)
- Breathing (2)
- Breathing rate (2)
- British Columbia (1)
- Buddhism (1)
- Building with earth (2)
- Bullock carts (1)
- Burkina Faso (1)
- Bus Rapid Transit (1)
- Business Coaching (1)
- Business Idea Quality (1)
- Business Model Innovation (1)
- Business Plan (1)
- Business english (1)
- Business life-cycle (1)
- Business model (2)
- Business models design (1)
- Business models for sustainability (1)
- Business plan (4)
- Butterworth filter (1)
- Bytecode (1)
- CEFR (1)
- CNN (1)
- COBIT Components (1)
- COMSOL Multiphysics (1)
- CONCATENATED codes (1)
- CONVOLUTION codes (1)
- COVID-19 financial crisis (1)
- Cables (1)
- Calibration procedure (1)
- Camera characteristic (1)
- Canada (1)
- Cantilever Construction (1)
- Capability analysis (1)
- Capacity (1)
- Capital project performance (1)
- Car-free mobility (1)
- Carbon footprint (1)
- Carbon offset project (1)
- Cardiac activity (1)
- Cardiorespiratory Parameters (1)
- Cardiorespiratory parameters (2)
- Carroll, Archie B. (1)
- Case Study (1)
- Case studies (1)
- Catalytic depolymerization (1)
- Cauchon algorithm (6)
- Cauchon diagram (1)
- Cauchon matrix (1)
- Central bank (1)
- Challenges (2)
- Chance (1)
- Chance Management (1)
- Chancenmanagement (1)
- Channel Coding (1)
- Channel capacity (1)
- Channel coding (1)
- Channel estimation (3)
- Channel fading (1)
- Chassis dynamometer (1)
- Checkerboard ordering (3)
- Checkerboard partial order (1)
- Checkerboard partial ordering (1)
- Chemical quality criteria (1)
- China (2)
- Circular economy (2)
- City resilience (1)
- Civil and Structural Engineering (1)
- Classification (2)
- Client Management System ; Haaland Internet Productions ; Client Relationship Management ; workflow (1)
- Climate action (1)
- Climate change (5)
- Climate communication (2)
- Climate crisis (1)
- Climate policies and strategies (1)
- Climate resilience (1)
- Cloud (1)
- Cloud computing (1)
- Co-Patenting (1)
- Co-Specialization (1)
- Co-specialization (1)
- Code Generation (1)
- Code-based cryptography (2)
- Code-based cryptosystem (1)
- Coded modulation (1)
- Codes over Gaussian integers (1)
- Codierung (1)
- Cognitive radio (1)
- Cold atoms (1)
- Collaboration (3)
- Collision avoidance (2)
- Colonial history (1)
- Combinations (1)
- Common Criteria (1)
- Common goods (1)
- Company Building (1)
- Complex Adaptive System (1)
- Complex interval (3)
- Complex polynomial (3)
- Complex problems (1)
- Compliance (1)
- Component (1)
- Compound matrices (1)
- Comprehensive quality management (1)
- Comprehensive view (1)
- Compressed earth (2)
- Computational complexity (2)
- Computational linguistics (1)
- Computer Science Applications (2)
- Computer Vision (1)
- Computer hardware (1)
- Computer security (1)
- Computer vision (1)
- Concatenated codes (3)
- Conceptual framework (1)
- Condition monitoring (1)
- Conditionally negative semidefinite matrix (1)
- Conditionally positive semidefinite matrix (1)
- Cones of rank k (1)
- Configuration (1)
- Conflict (1)
- Conflict resolution (1)
- Construction industry (1)
- Contactless Measurement (1)
- Contactless measurement (4)
- Contactless technologies (1)
- Content analysis (2)
- Content analysis (keywords) (1)
- Continuous-discrete time observer (1)
- Control (1)
- Control Theory (1)
- Control and Real-Time Applications (1)
- Control and Systems Engineering (1)
- Control energy (1)
- Convex optimization (1)
- Convolution (1)
- Convolutional networks (1)
- Convolutional neural network (1)
- Cooperation (1)
- Cooperation Network (1)
- Cooperative dynamical system (1)
- Cooperatives (1)
- Coordination (1)
- Coronal alignment (1)
- Coronal balance (1)
- Corporate Development (1)
- Corporate Entrepreneurship (3)
- Corporate Responsibility (1)
- Corporate Social Responsibility (1)
- Corporate Strategy (1)
- Corporate Venturing (2)
- Corporate accelerator (1)
- Corporate entrepreneurship (8)
- Corporate entrepreneurship programs (1)
- Corporate incubator (1)
- Corporate misconduct (1)
- Corporate modelling (1)
- Corporate venture (1)
- Corporate venture management (1)
- Corporate venturing (6)
- Corporate-startup collaboration (1)
- Correlation (1)
- Correlation analysis (1)
- Corrosion Resistance (1)
- Corrosion resistance (1)
- Cost-benefit analysis (1)
- Countermovement Jump (1)
- Creative industries (1)
- Creative tourism (2)
- Credit constraints (1)
- Cross Site Scripting (1)
- Crossover frequency (1)
- Crowd Sourcing (1)
- Crowdsourcing (1)
- Cultural and creative industries, (1)
- Cultural mapping (1)
- Cultural sustainability (1)
- Cultural tourism (2)
- Custom (1)
- Customary law (1)
- Customer Acquisition (1)
- Customer Journey (1)
- Customer integration (1)
- Cutting patterning (1)
- Cyclic sign variation (1)
- DO control (1)
- DSR (2)
- Damage Detection (1)
- Damages (1)
- Dance (1)
- Dark current (1)
- Data (1)
- Data Fusion (1)
- Data Model (1)
- Data acquisition (1)
- Data analytics (2)
- Data compression (2)
- Data compression algorithms (1)
- Data cooperatives (1)
- Data encryption (Computer science) (1)
- Data fusion (1)
- Data governance (1)
- Data privacy (1)
- Data retention time (1)
- Data sharing and exchange (1)
- Data sovereignty (2)
- Data stewardship (1)
- Decarbonisation (1)
- Decarbonization (1)
- Decision Framework (1)
- Decision Support System (1)
- Decoding (3)
- Decoding attack (1)
- Deep Convolutional Neural Network (1)
- Deep Learning (3)
- Deep Transformation Model (1)
- Deep learning (10)
- Defect detection (1)
- Deflation (1)
- Degradation (1)
- Demolition wastes (2)
- Descending rank conditions (1)
- Design (1)
- Design research (1)
- Design-Science Research (1)
- Destination (1)
- Development (1)
- Developmental state (1)
- Devising (1)
- Differential flatness (1)
- Digatalization (1)
- Digital Architecture (1)
- Digital Health (1)
- Digital Services (1)
- Digital age (1)
- Digital and Analog Signal Processing, Automation (1)
- Digital arithmetic (1)
- Digital commons (1)
- Digital modulation (1)
- Digital platforms (1)
- Digital regional planning (1)
- Digital transformation (4)
- Digital twin (1)
- Digitalization (3)
- Digitally re-programmable space (1)
- Digitization (1)
- Digizalization (1)
- Discontinuous innovation (2)
- Discourse analysis (1)
- Disputing (1)
- Distributed Parameter Systems (1)
- Distributed System Operators (DSO) (1)
- Distributed ledger (1)
- Distributed parameter systems (1)
- Distribution Grid Management (1)
- Distributional regression (2)
- District heating (1)
- Disturbance rejection (1)
- Diversification (1)
- Diversity (2)
- Docking Experiments (1)
- Document image processing (1)
- Domain-Specific Language (DSL) (3)
- Domain-Specific-Language (DSL) (1)
- Doppler radar (1)
- Downsampling (1)
- Drama in education (2)
- Driver Assistance Systems (1)
- Driver Drowsiness Detection (1)
- Driving (1)
- Driving Simulator (1)
- Driving cycle WLTC (1)
- Driving safety (1)
- Driving simulator (1)
- Driving stress (1)
- Drowsiness (1)
- Drug identification (1)
- Drying (1)
- Dual structures (1)
- Duplex stainless steel (1)
- Dynamic Capabilities (1)
- Dynamic capabilities (1)
- Dynamic cluster analysis (1)
- Dynamic testing plant (1)
- Dynamic tests (1)
- Dynamic time warping (1)
- Dünne Schicht (1)
- E-Health (1)
- E-mobility (2)
- ECG (7)
- ECG holter (1)
- EKG (1)
- EMF (1)
- EMG (1)
- EMV (1)
- EPQR (1)
- EPQR-S (1)
- ERP systems (1)
- ERROR-correcting codes (1)
- EU Regulations (1)
- EW/TTS (1)
- Early mobilization (1)
- Early-stage technology venture (1)
- Early-stage ventures (1)
- Earthquake resonse spectra (1)
- Eclipse Modeling Framework (EMF) (1)
- Ecological and Social Sustainability (1)
- Economic Sustainability (1)
- Economics and Econometrics (1)
- Ecotourism (1)
- Eddy currents (2)
- Edward Soja (1)
- Effective management (1)
- Effects of sanctions on trade (1)
- Efficiency (1)
- Elastic domes (1)
- Electrical and Electronic Engineering (1)
- Electrocardiogram (1)
- Electrocardiographic signals (1)
- Electrocardiography (3)
- Electroencephalography (1)
- Electromagnetic actuators (3)
- Electromagnetic devices (1)
- Electromyography (1)
- Electronic early warning (1)
- Ellipsoidal enclosures (1)
- Ellipsoidal state estimation (1)
- Elliptic Cone (1)
- Elliptic Cylinder (1)
- Elliptic curve cryptography (2)
- Elliptic curve point multiplication (2)
- Emerging Markets (2)
- Emotion status (1)
- Empirical mode decomposition (EMD) (1)
- Enclosure of the range (2)
- Encoding (1)
- End-user computing (1)
- Energy tourism (1)
- Energy transition (3)
- Engineering research (1)
- English-medium instruction (1)
- Enterprise architecture (1)
- Enterprise systems (1)
- Entrainment (1)
- Entrepreneurial skills (1)
- Entrepreneurial Ecosystems (2)
- Entrepreneurial activities (1)
- Entrepreneurial culture (1)
- Entrepreneurial employees (1)
- Entrepreneurial motivation (1)
- Entrepreneurial thinking (1)
- Entrepreneurship (3)
- Entrepreneurship Education (1)
- Entrepreneurship Support (1)
- Entrepreneurship education (1)
- Entry-wise perturbation (2)
- Entwerfen (1)
- Environmental perception (1)
- Equivalence principle (1)
- Equivalence principle test (1)
- Erkennung (1)
- Error correction (1)
- Error correction codes (3)
- Error correction coding (1)
- Errors (1)
- Espanded austenite, Magnetic force microscopy, Low temperature carburisation, Ferrofluid (1)
- Essay (1)
- Ethiopia (1)
- Ethnologie (1)
- Euro method (2)
- Eurocode (1)
- Evaluation (1)
- Exercise (1)
- Exergaming (1)
- Expanded austenite (1)
- Expanded austenite layer (1)
- Expert Interviews (1)
- Expert interviews (1)
- Expert systems (1)
- Exponent of primitivity (1)
- Extended Perron complement (1)
- Extended linearisation (1)
- Extended object tracking (5)
- Extension estimation (3)
- Extent estimation (1)
- Exterior products (1)
- External tariffs (1)
- FACS (1)
- FSR Sensors (1)
- FSR sensor (1)
- FSR sensors (3)
- Facial Action Coding System (1)
- Factory automation (1)
- Fake news (1)
- Familie (1)
- Fault diagnosis (2)
- Federated digital platform (1)
- Feed-forward control (1)
- Feedback (1)
- Feldforschung (1)
- Female Entrepreneurship (3)
- Female entrepreneurship (1)
- Fieldwork (1)
- Finance (1)
- Financial frictions (1)
- Financial sustainability (1)
- Finite-element (1)
- Fish farming (1)
- Flash Memories (1)
- Flash memories (3)
- Flatness-based field-oriented control (FOC) (1)
- Floor Vibrations (1)
- Fluidics and Thermodynamics (1)
- Footbridges (1)
- Force Plate (1)
- Force resistor sensor (1)
- Forcesensitive resistor sensors (1)
- Forest establishment (1)
- Form factor (1)
- Form finding (1)
- Formatting (1)
- Fourier-Chebyshev double series (1)
- Framework for indigenous tourism (1)
- Free trade agreements (1)
- Freistellungssemesterbericht (8)
- Friction (1)
- Fruit drying (1)
- Fuel consumption (1)
- Fuel subsidy (1)
- Fully-actuated autonomous surface vessels (2)
- Functional materials (1)
- Furniture production (1)
- Future research (1)
- Future tools and methods (1)
- GATT (1)
- GDPR (1)
- GIS (2)
- GPU (1)
- GRAS method (2)
- GRC (1)
- Gain scheduling (1)
- Gait Analysis Laboratory (1)
- Gamification (2)
- Gaussian integers (3)
- Gaussian inverse Wishart PHD Filter (1)
- Gaussian mixture (2)
- Gaussian processes (2)
- Gender (1)
- General Medicine (1)
- General programming languages (1)
- Generalized Concatenated Code (1)
- Generalized concatenated codes (2)
- Generalized multi-stream spatial modulation (1)
- Generalized multistream spatial modulation (1)
- Generation Z (1)
- Generative Adversarial Networks (1)
- Generative modeling (1)
- Geography, Planning and Development (1)
- Geological protection (1)
- Geotechnical Earthquake Engineering (1)
- German Industry (1)
- Germany (1)
- Goal setting (1)
- Goals (1)
- Gold mining (1)
- Governance (1)
- Graphical Online Editor (1)
- Gravity equation (2)
- Gravity-based in-field calibration (1)
- Green University (1)
- Green bridge (1)
- Greenhouse gas emissions (1)
- Greening campus (1)
- Grey box modeling (1)
- Grid Integration (1)
- Grid Management (1)
- Ground detection (1)
- Growth factors (1)
- HCK (1)
- Hadamard inverse (1)
- Hadamard power (1)
- Handwriting recognition (1)
- Hankel matrix (1)
- Hardware Certification Kit (1)
- Hardware and Architecture (1)
- Hardware prototyping (1)
- Harmonic Functions (1)
- Harmony (1)
- Health care (1)
- Health information exchange (1)
- Health monitoring (5)
- Health monitoring systems (1)
- Health parameters (1)
- Health systems (1)
- Health, Toxicology and Mutagenesis (1)
- Healthcare (3)
- Heart Rate (1)
- Heart rate (10)
- Heart rate estimation (1)
- Heart rate variability (1)
- Heart rate variability (HRV) (1)
- Heartbeat (1)
- Heat conduction (1)
- Heat islands (1)
- Herrschaft (1)
- Heterogeneous policy effects (1)
- Hidden Markov models (1)
- High strength (2)
- Higher education (2)
- Home health (1)
- Home health systems (2)
- Hotel (1)
- Huffman codes (1)
- Human activity recognition (1)
- Human-Computer Interaction (1)
- Hurwitz integers (1)
- Hurwitz matrix (3)
- Hybrid organizations (1)
- Hydraulic actuators (1)
- Hysteresis modeling (1)
- Höhenstrahlung (1)
- I3M (1)
- ICA (1)
- IT Architecture (1)
- IT Cost Management (1)
- IT Governance (1)
- IT Integration (1)
- IT Integration Drawbacks (1)
- IT governance (1)
- IT risk (1)
- IT service governance (1)
- IT task responsibility (1)
- IT-Compliance (2)
- IT-GRC (2)
- Illuminance (1)
- Image Classification (1)
- Image Labeling (1)
- Image Recognition (1)
- Image novelty detection (2)
- Imaginary geographies (1)
- Imaging (1)
- Immutability (1)
- Impedance measurement (1)
- Implementation (1)
- Incremental Classification and Clustering (1)
- Incubation (1)
- Independent component analysis (1)
- Index modulation (IM) (1)
- India (1)
- Indigenous tourism (2)
- Indonesia (1)
- Indonesian language (1)
- Industrial heating process (1)
- Industrial training (1)
- Industry 4.0 (1)
- Industry 4.0 implementation (1)
- Inertial measurement unit (IMU) (1)
- Infinitely divisible matrix (2)
- Inflation (1)
- Information Exchange (1)
- Information Security Management (1)
- Information theory (1)
- Information-set decoding (1)
- Infrastructure (3)
- Innovation (5)
- Innovation Management (1)
- Innovation labs (1)
- Innovation management (1)
- Innovation strategy (1)
- Innovative Capability (1)
- Input–Output (1)
- Insert tech ventures (1)
- Integrated circuit modeling (1)
- Integrated circuit reliability (1)
- Integrated tasks (1)
- Integration (1)
- Integrative approach (1)
- Interaction (1)
- Interconnection (5)
- Intercultural communication (1)
- Intercultural competence (1)
- Intercultural interaction competence (1)
- Interior permanent magnet synchronous machine (IPMSM) (1)
- Internal corporate accelerator (1)
- International Trade (2)
- International Trade and Development (1)
- Internet (1)
- Internet of Things (3)
- Internet of things (1)
- Interoperability (2)
- Interpretability (2)
- Interval matrix (2)
- Interval polynomial (1)
- Interval property (3)
- Interwar period (1)
- Intramedullary Nail (1)
- Inverse M-matrix (1)
- Inverse perspective (1)
- Investor reaction (1)
- IoT (2)
- Ischemic stroke (1)
- J-Peak (1)
- Japan (1)
- Joining Technology (1)
- Joining technology (1)
- Joint building venture (1)
- K-subdirect sum (1)
- Kerala (1)
- Kerala tourism model (1)
- Kernel based learning (1)
- Key Performance Indicators (1)
- Knowledge Management (1)
- Knowledge Transfer (1)
- Knowledge exploration (1)
- Knowledge management (2)
- Kollisionsschutz (1)
- Konvektionstrocknung (1)
- Kulturanthropologie (1)
- Kundenmanagement (1)
- LCA (1)
- LSP assessment (1)
- Lake Constance (2)
- Lake Constance region (1)
- Lake constance (1)
- Land value capture (1)
- Landscape stereotypes (1)
- Lane Association (1)
- Language assessment (1)
- Languages for Specific Purposes (1)
- Languages for specific purposes (1)
- Laser scanning (2)
- Laser sensor (2)
- Laser-Sensor (1)
- Laserimpuls (1)
- Lasermesstechnik (1)
- Lattices (2)
- Lazgi (1)
- Learning (artificial intelligence) (1)
- Learning to cluster (1)
- Lebensmittelqualität (1)
- Legal anthropology (1)
- LiDAR (3)
- Lidar (4)
- Lidar-camera registration (1)
- Lie group (1)
- Life Cycle Assessment (1)
- Life cycle assessment (1)
- Lignin (1)
- Likelihood based partitioning (1)
- Limb Lengthening (1)
- Limb lengthening (1)
- Linear independence (1)
- Literature Review (3)
- Literature review (4)
- Load forecasting (1)
- Local livelihoods (1)
- Lock-in-mechanism (1)
- Long-term care (4)
- Low-Code Development Platform (2)
- Low-Voltage (1)
- Low-carbon construction (2)
- Low-complexity detection (2)
- Low-cost IMU calibration (1)
- Low-pass filters (1)
- Low-temperature carburization (1)
- Low-temperature surface-hardening (1)
- MCDA (1)
- MEMS microphones (1)
- MIMO (1)
- MNE (1)
- MSP Botswana (1)
- MTP (1)
- MVDR beamforming (1)
- Machine Learning (5)
- Machine Learning Algorithms (1)
- Machine learning (7)
- Machine-Learning (1)
- Macht (1)
- Magnetic fields (1)
- Magnetic resonance imaging (1)
- Magnetizability (1)
- Management Routines (1)
- Maori tourism (1)
- Maori values (1)
- Maritime systems (2)
- Market Entry (1)
- Market-based view (1)
- Marketing (1)
- Markov chain Monte Carlo (MCMC) (1)
- Markov chain monte carlo (1)
- Markov processes (1)
- Martensitic Stainless Steels (1)
- Mask R-CNN (1)
- Mass Rapid Transit (MRT) (1)
- Material and Substance Management (1)
- Matlab (1)
- Matrix interval (5)
- Maturity model (1)
- Maun Science Park (5)
- Maximum likelihood decoding (1)
- Maximum likelihood estimation (1)
- Maximum-likelihood detection (1)
- McEliece cryptosystem (4)
- Mean-shift (2)
- Measurement methods (2)
- Measurements (1)
- Mechanical Engineering (1)
- Mechatronic systems (1)
- Media discourse analysis (1)
- Medical systems (1)
- Medication adherence (1)
- Metal laser sintering (1)
- Metallization (5)
- Metamodel (1)
- Metamodel Definition (1)
- Metamodel Model-Driven Architecture (MDA) (1)
- Metastable austenitic stainless steel (1)
- Methodology (1)
- Metrics for privacy (1)
- Micro-electro-mechanical systems (MEMSs) (1)
- Microgravity (1)
- Microprocessors (1)
- Microstructural modelling (1)
- Military land redevelopment (1)
- Mimik (1)
- Mirror (1)
- Mitigation (1)
- Mobile App (1)
- Mobile Communication (1)
- Mobile application (1)
- Mobile computing (1)
- Mobile healthcare (1)
- Mobile robot (1)
- Mobility (1)
- Mobility Solutions (1)
- Mobility turn (1)
- Model Predictive Control (1)
- Model predictive control (1)
- Model-Driven Architecture (MDA) (2)
- Model-Driven Software Development (MDSD) (3)
- Model-Driven-Development (MDD) (1)
- Modelling (1)
- Monitoring (1)
- Monitoring sensor system (1)
- Mont-gomery modular reduction (1)
- Monte Carlo Simulations (1)
- Monte Carlo methods (1)
- Montgomery modular multiplication (1)
- Montgomery modular reduction (1)
- Motion estimation (1)
- Motion planning (1)
- Movement detection (3)
- Movement patterns (1)
- Movement signals (1)
- Multi Bernoulli Filter (1)
- Multi extended object tracking (1)
- Multi-camera (1)
- Multi-extended object tracking (1)
- Multi-object tracking (1)
- Multi-spectral imaging systems (1)
- Multibeam echosounder (1)
- Multicast communication (1)
- Multichannel Wiener filter (1)
- Multinomial logistic regression (2)
- Multiple Extended Object Tracking (1)
- Multiple units (1)
- Multiple-input/multiple-output (MIMO) (1)
- Multiposition calibration (1)
- Multistage detection (2)
- Multivariable MPC algorithm (1)
- Multivariable control systems (1)
- Multivariate complex polynomial (1)
- Multivariate complex rational function (1)
- Multivariate polynomial (2)
- Multivariate rational function (2)
- Mund-Kiefer-Gesichtsbereich (1)
- Mutual information (1)
- Myanmar (1)
- NEDC (1)
- NFC (2)
- NLP (1)
- NTBF Survival (1)
- Nachhaltigkeit (1)
- National Accounts (1)
- Natural frequency (1)
- Navigation (1)
- Navigieren (1)
- Net system (1)
- Network (1)
- Network theory (1)
- Neural network (2)
- Neural networks (2)
- New Technology-Based Firms (2)
- New Work (1)
- New product development (1)
- New technology-based firms (1)
- New venture survival (1)
- Ni-Ti wires (1)
- NiTi (1)
- Nickel (1)
- Niederreiter cryptosystem (1)
- Nitinol (2)
- Noise measurement (1)
- Non REM stage (1)
- Non-invasive (1)
- Non-invasive sleep study (2)
- Non-survey techniques (2)
- Non-tariff barriers (3)
- Non-volatile NAND flash (1)
- Non-volatile memory (1)
- Nonlinear Control Design (1)
- Nonlinear control systems (1)
- Nonlinear least squares problem (1)
- Nonlinear machine dynamics (1)
- Nonlinear model predictive control (2)
- Nonlinear observers (1)
- Nonlinear output feedback (1)
- Nonlinear system identification (2)
- Nonlinear systems (2)
- Nonvolatile NAND flash (1)
- Normalizing Flow (1)
- Normalizing Flows (1)
- Numerical Optimization (1)
- ODH framework (1)
- OPTICS clustering (1)
- OSA (1)
- Object detection (1)
- Object tracking (1)
- Objective Sleep Measurement (1)
- Objective and subjective sleep measurement (1)
- Objekterkennung (1)
- Observability (1)
- Observer design (1)
- Observers (2)
- Obstructive Sleep Apnea (1)
- Obstructive sleep apnea (1)
- Occlusion (1)
- One Health (1)
- One Mannheim error correcting codes (OMEC) (1)
- Onvective heating (1)
- Open data (1)
- Open digital federation platform (1)
- Opportunity (1)
- Opportunity Management (1)
- Optical fibre fabrication (1)
- Optimisation (1)
- Optimization (2)
- Optimization of experiments (1)
- Ordinal regression (1)
- Organisational Transformation (1)
- Organizational ambidexterity (2)
- Organizational design (1)
- Oscillatory matrix (1)
- Outcome classification (1)
- Overtourism (2)
- P2P (1)
- PDE Systems (1)
- PHD filter (2)
- PHP (2)
- PI control (1)
- PID control (1)
- PLM (2)
- PPG (1)
- PSQ (1)
- PSQI (1)
- Packaging (1)
- Palladium (1)
- Palliative Care (1)
- Parameter estimation (3)
- Parameter identification (2)
- Participatory mapping (1)
- Partitioning algorithms (1)
- Partnership (1)
- Patent Analysis (1)
- Path Dependency (1)
- Path planning (1)
- Path-dependency (1)
- Pattern recognition (1)
- Pedestrian (1)
- Pedestrian safety system (1)
- Perceptual grouping (1)
- Performance assessment (1)
- Perron complement (1)
- Personality trait (1)
- Personalized medicine (1)
- Personnel training (1)
- Philippines (1)
- Photoplethysmography (1)
- Photovoltaics (5)
- Physical activity (2)
- Physics labs (2)
- Physics methods (2)
- Physik (1)
- Physiognomik (1)
- Physiological signals (1)
- Pitting susceptibility (1)
- Planetarium dome (1)
- Platform (1)
- Point multiplication (1)
- Polar codes (1)
- Pollution (1)
- Polynomial evaluation (1)
- Polysomnography (PSG) (1)
- Polysomnography system (PSG) (1)
- Population ageing (1)
- Portable monitor (1)
- Post-growth economy (1)
- Post-quantum public-key cryptography (1)
- Post-truth (1)
- Posture tracking (1)
- Power and energy (1)
- Power distribution control (1)
- Power system state estimation (1)
- Practical study review (1)
- Precision Medicine (1)
- Precision medicine (1)
- Predator net (1)
- Prediction (1)
- Predictive control (3)
- Pressure sensor (1)
- Pressure sensors (2)
- Preventive maintenance (1)
- Price level changes (1)
- Primitive matrix (1)
- Principal component analysis PCA (1)
- Principles of Blockchain Technology (1)
- Privacy (1)
- Privacy by Design (1)
- Probabilistic Data Association (1)
- Probabilistic Load Forecasting (1)
- Probabilistic Obstacles (1)
- Probabilistic Regression (1)
- Probabilistic forecasting (1)
- Probabilistic modeling (1)
- Probability (1)
- Probability of Exploitation (1)
- Probablistic forecasting (1)
- Problemlösen (1)
- Processor (1)
- Product Development (1)
- Product Lifecycle Management (1)
- Product lifecycle management (1)
- Production management (1)
- Productivity (1)
- Program/erase cycles (1)
- Projektcontrolling (1)
- Protocols (1)
- Prozessoptimierung (1)
- Public engagement (2)
- Public key cryptography (2)
- Public transport (1)
- Public-key cryptography (4)
- Pulse oximeter (1)
- Quality management (1)
- Quality of life (1)
- Quality of service (1)
- Quality prediction (1)
- Quality retention (1)
- Quantum gravity (1)
- Quasi-stable polynomial (2)
- Quick changing actuator (1)
- R-function (2)
- REED-Solomon codes (1)
- REGULECT (1)
- REM stage (1)
- RESTful API (1)
- Radar (1)
- Radar tracking (1)
- Radio spectrum management (1)
- Radiometric calibration (1)
- Rammed earth (2)
- Random Matrices (1)
- Random matrices (4)
- Randomized Controlled Trial (1)
- Range bounding (1)
- Range enclosure (5)
- Rank (2)
- Rational function (1)
- Rauch-Tung-Striebel Recursion (1)
- Read reference adjustment (1)
- Real-time (2)
- Reconstruction (1)
- Recurrent neural network (1)
- Recycled materials (2)
- Redesign (1)
- Redundancy (2)
- Reed-Muller (RM) codes (1)
- Refactoring (1)
- Reference model (2)
- Regional marketing (1)
- Regression (1)
- Regression analysis (1)
- Rehabilitation (1)
- Relation (1)
- Religious actors (1)
- Remediation Strategies (1)
- Remote Monitoring (1)
- Remote sensing (2)
- Renewable Energies (1)
- Renewable energy (1)
- Requirements Engineering (3)
- Research (1)
- Residual Neural Network (1)
- Resilience (1)
- Resource-constrained systems (1)
- Resources based view (1)
- Respiration Rate (1)
- Respiration rate (3)
- Respiratory signal (1)
- Respiratory sounds (1)
- Restricted error values (1)
- Retail economies (1)
- Revised eysenck personality questionnaire (1)
- Risikomanagement (1)
- Risk Management (1)
- Road Infrastructure Projects (1)
- Road transport (1)
- Roboter (1)
- Role models (1)
- Rolling-contact fatigue (1)
- Rotordynamics (1)
- Rough set theory RST (1)
- Rules of origin (1)
- Runtime Reduction (1)
- Rural development (1)
- SDGs (1)
- SIRM (1)
- SME (6)
- SPICE <Programm> (1)
- SQL Injection (1)
- SQLi (1)
- SUT-EURO (1)
- SUT-RAS (1)
- Sailing Boat (1)
- Sample-based nonlinear model predictive control (1)
- Sampling based partitioning (1)
- Sampling methods (1)
- Sanction databases (1)
- Sanctions (3)
- Scala (1)
- Scenario analysis (1)
- Schur complement (1)
- Scoring Systems (1)
- Screening (1)
- Security by Design (1)
- Security of data (1)
- Security requirements (1)
- Segmentation (1)
- Seismocardiography (1)
- Selective laser melting (1)
- Self sensing actuators (1)
- Self-sensing (1)
- Sensitivity matrix (1)
- Sensor Bed (1)
- Sensor data (1)
- Sensor fusion (1)
- Sensor grid (1)
- Sensor technology (1)
- Sensors (3)
- Sensors fusion (1)
- Service Design (1)
- Service Innovation (1)
- Service business model (1)
- Sets of trajectories (2)
- Seychelles (1)
- Shadow IT (6)
- Shadow IT systems (1)
- Shadow systems (1)
- ShadowIT (1)
- Shape Estimation and Tracking (1)
- Shape Tracking (1)
- Shape classification (1)
- Shape memory (1)
- Shape memory alloy (1)
- Shape memory alloys (2)
- Ship control (1)
- Ship dataset (1)
- Ship navigation (1)
- Ships and offshore vessels (1)
- Shopping tourism (1)
- Short time Fourier transformation (STFT) (1)
- Sign regular matrix (3)
- Sign variation (1)
- Sign-regular matrices (1)
- Sign-regular matrix (2)
- Signal Processing (1)
- Signal acquisition (1)
- Signal constellations (2)
- Signal detection (1)
- Signal processing (6)
- Silicon (5)
- Simplicial Bernstein form (1)
- Simplicial Bernstein representation (1)
- Simplicial subdivision (1)
- Simulation (1)
- Singular perturbation analysis (1)
- Singular perturbations (1)
- Site effect (1)
- Skin (1)
- Sleep (5)
- Sleep Apnea (1)
- Sleep Diary (1)
- Sleep Efficiency (1)
- Sleep Monitoring (1)
- Sleep Stages (1)
- Sleep Study (1)
- Sleep apnea (2)
- Sleep apnoea (1)
- Sleep assessment (1)
- Sleep diary (3)
- Sleep efficiency (4)
- Sleep latency (1)
- Sleep measurements (1)
- Sleep medicine (7)
- Sleep monitoring (4)
- Sleep monitoring systems (1)
- Sleep pattern (1)
- Sleep phase (1)
- Sleep positions (2)
- Sleep quality (5)
- Sleep scoring (1)
- Sleep stage (1)
- Sleep stage classification (2)
- Sleep stages (5)
- Sleep study (19)
- Sleep tracking (1)
- Sleep/Wake states (1)
- Small and medium-sized enterprises (2)
- Smart Building (1)
- Smart City (1)
- Smart Farming (1)
- Smart Grid (1)
- Smart Grids (1)
- Smart Home (1)
- Smart bed (2)
- Smart cushion (2)
- Smart home (1)
- Smart materials (1)
- Smart services (1)
- Smart-care (2)
- Smart-home (1)
- Smartwatch (1)
- Smoke detector (1)
- Social Network Analysis (1)
- Social development (1)
- Social impact (1)
- Social innovations (1)
- Social life cycle assessment integration into PLM System (1)
- Social life cycle sustainability assessment (SLSA) (1)
- Social lifecycle sustainability assessment (1)
- Social networks (1)
- Socio-technical system model (2)
- Soft Soil Layer (1)
- Software and its engineering (1)
- Software notations and tools (1)
- Software organization and properties (1)
- Software radio (1)
- Software system structures (1)
- Solar Cells (5)
- Solar drying (1)
- Solenoids (1)
- Solinas primes (1)
- South India (1)
- Southeast Asia (1)
- SpO2 (1)
- Space physics (1)
- Space technology (1)
- Spatial modulation (3)
- Spatial modulation (SM) (1)
- Spatial permutation modulation (SPM) (1)
- Speaker clustering (1)
- Speaker recognition (1)
- Spectral analysers (1)
- Spectral changes (1)
- Speech & image clustering (1)
- Speech signal processing (1)
- Spillover (1)
- Spinal deformity (1)
- Spiritual tourism (1)
- Spline extension model (2)
- Sprachakustik (1)
- Sprachverarbeitung (1)
- Sstainability (1)
- Stability analysis (4)
- Stable polynomial (2)
- Stacking fault energy (1)
- Stadtplanung (1)
- Stainless steel (3)
- Stakeholder (1)
- Stakeholder interests (1)
- Standardisierung (1)
- Start-Ups (1)
- Startup Collaboration (1)
- Startup Investing (1)
- Startups (1)
- State (1)
- State and disturbance estimation (1)
- State and parameter estimation (1)
- State export credit guarantees (1)
- Static Code Analysis (1)
- Static code analysis (1)
- Stationary Retail (1)
- Statistical data analysis (2)
- Statistics (1)
- Stereo-matching (1)
- Stethoscope (1)
- Still Image Class (1)
- Stochastic system dynamics (1)
- Stochastic uncertainty (1)
- Storage (1)
- Story-mapping (1)
- Strategic Management (1)
- Strategic Renewal (1)
- Strategic approaches (1)
- Strategic entrepreneurship (1)
- Strategic renewal (2)
- Strategisches Management (1)
- Street sweeper (1)
- Stress (8)
- Stress Perceived Questionnaire (PSQ) (1)
- Stress detection (3)
- Stress measurement (1)
- Strictly sign-regular matrix (1)
- Structured Digital Approach (1)
- Student lifestyle (1)
- Style (1)
- Styling (1)
- Städtebau (1)
- Subdivision (2)
- Subjective sleep assessment (3)
- Sufficiency (1)
- Supply and Use tables (1)
- Support Units (1)
- Surface treatment (1)
- Surgical planning (1)
- Survey systems (1)
- Survival Capability (2)
- Sustainability (11)
- Sustainable Development (1)
- Sustainable Mobility (1)
- Sustainable construction (3)
- Sustainable consumption (1)
- Sustainable development (4)
- Sustainable infrastructure (2)
- Sustainable technologies (1)
- Sustainable tourism (3)
- Switzerland (1)
- Synergies (2)
- Synthetic Data (1)
- System design (1)
- System dynamics modeling (1)
- System dynamics modelling (1)
- System identification (1)
- Systematic Literature Review (1)
- Systemisches Management (1)
- TURBO codes (1)
- Tall building structures (1)
- Target Discrimination (1)
- Target Tracking (1)
- Tariffs (1)
- Task allocation (1)
- Task-based language assessment (1)
- Teaching (1)
- Teaching material (1)
- Tech ventures (1)
- Technology acceptance (1)
- Technology transfer (1)
- Tele monitoring (1)
- Telecommunication traffic (2)
- Telemedicine (2)
- Temporal feature stacking (1)
- Tension components (1)
- Tensorial Bernstein form (2)
- Test Suite (1)
- Text Analytics (1)
- Text Mining (2)
- Text mining (1)
- Thermal model (1)
- Thermal shape memory alloys (1)
- Thermal simulation (1)
- Third body (1)
- Thirdspace (1)
- Threshold calibration (1)
- Timber bridges (1)
- Tomato powder (1)
- Top-of-rail conditioners (1)
- Torque ripple compensation (1)
- Total quality management (1)
- Totally nonnegative matrix (10)
- Totally nonpositive matrix (1)
- Totally positive differential system (1)
- Totally positive matrix (4)
- Tourism (5)
- Tourism Development (1)
- Tourism management (1)
- Tourism marketing (1)
- Tourism mobility (1)
- Tourism sciences (1)
- Toxicology (1)
- Track and triage system (1)
- Trade Policy (1)
- Trade deflection (1)
- Trade policy (1)
- Trade protection (2)
- Trajectory tracking (4)
- Transaction Relations (2)
- Transaction cost economics (2)
- Transaction relations (3)
- Transformation models (2)
- Transistortechnologie (1)
- Transportation (1)
- Tree seedlings (1)
- Triangulation (1)
- Trocknung (1)
- Tuning rule (1)
- USB (1)
- Ulrich Finsterwalder (2)
- Un-certainty (1)
- Unbemanntes Fahrzeug (1)
- Uncertainty (3)
- Uncertainty Management (1)
- Uncertainty modeling (1)
- Uncertainty quantification and robustness (1)
- Undertourism (1)
- Unmanned aerial vehicles (1)
- Unmanned surface vehicles (1)
- Unobtrusive Measurement (1)
- Unobtrusive measurement (1)
- Unscented Kalman Filter (2)
- Unsicherheit (1)
- Updating supply and use tables (2)
- Updating, projection, supply and use tables (1)
- Urban adaptation to global climate change (1)
- Urban development pattern (1)
- Urban planning (1)
- Urbanity (1)
- Urbanization (1)
- Uzbekistan (2)
- Valuation matrices (1)
- Value Network (3)
- Value chain (1)
- Value network (1)
- Value networks (1)
- Value-network strength (1)
- Value-networks (1)
- Valves (1)
- Venture creation (1)
- Venture creation business model (1)
- Venture emergence (2)
- Verantwortung (1)
- Vertex matrix (1)
- Vertical Farming (1)
- Virtual measurement model (2)
- Virtual reality (1)
- Visitor flow management (1)
- Vital signals (2)
- Vitamin C (1)
- Voluntary carbon offset (1)
- Vulnerability Pattern (1)
- Vulnerability Prioritization (1)
- WLTC (1)
- WLTP (1)
- WTO (2)
- Walter Bauersfeld (1)
- Wasserfahrzeug (1)
- Water management (1)
- Wave filtering (1)
- Wavelet signal processing (1)
- Wear (1)
- Wearable (4)
- Wearable device (1)
- Wearables (2)
- Web Services (1)
- Web security (1)
- Weight reduction (1)
- Welfare (1)
- Wheel-rail interface (1)
- Wind noise reduction (1)
- Winter tourism (1)
- Wire (1)
- Wissensmanagement (1)
- Women in Management (1)
- Workarounds (1)
- Worries (1)
- Woven fabric membranes (1)
- X-ray (1)
- XSS (1)
- Xtext (2)
- Zeiss-Dywidag Shell Construction System (1)
- Zeolite (1)
- Zombie firms (1)
- aktiver Leistungsfilter (1)
- algebraic codes (1)
- binary codes (1)
- block codes (1)
- chat system (1)
- collision avoidance (2)
- concatenated codes (2)
- convergence (1)
- data privacy (2)
- degree elevation (1)
- distance measurement (1)
- eHealth (2)
- facial expression recognition ; action unit recognition (1)
- filtering theory (2)
- inclusions (1)
- innovation management (1)
- istant messaging system (1)
- laser ranging (1)
- linearisation techniques (1)
- low-level feature extraction (1)
- marine engineering (1)
- marine navigation (1)
- marine radar (1)
- marine safety (1)
- maximum distance separable codes (1)
- modulation coding (1)
- network traffic (1)
- observers (1)
- organisational aspects (1)
- parabolic equations (1)
- partial differential equations (1)
- range bounds (1)
- rational function (1)
- security of data (2)
- selektive Signalanalyse (1)
- sequential decoding (1)
- simplex (1)
- software metrics (1)
- solenoids (1)
- string matching (1)
- support vector machines (1)
- surveillance (1)
- target tracking (2)
- technology management (1)
- traffic classification (1)
- traffic control (1)
- traffic obfuscation (1)
- valves (2)
- Äthiopien (1)
- Überwachungsradar (1)
Institute
- Fakultät Architektur und Gestaltung (6)
- Fakultät Bauingenieurwesen (26)
- Fakultät Elektrotechnik und Informationstechnik (16)
- Fakultät Informatik (63)
- Fakultät Maschinenbau (12)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (43)
- Institut für Angewandte Forschung - IAF (77)
- Institut für Optische Systeme - IOS (35)
- Institut für Strategische Innovation und Technologiemanagement - IST (38)
- Institut für Systemdynamik - ISD (98)
We propose and apply a requirements engineering approach that focuses on security and privacy properties and takes into account various stakeholder interests. The proposed methodology facilitates the integration of security and privacy by design into the requirements engineering process. Thus, specific, detailed security and privacy requirements can be implemented from the very beginning of a software project. The method is applied to an exemplary application scenario in the logistics industry. The approach includes the application of threat and risk rating methodologies, a technique to derive technical requirements from legal texts, as well as a matching process to avoid duplication and accumulate all essential requirements.
Cyberspace: a world at war. Our privacy, freedom of speech, and with them the very foundations of democracy are under attack. In the virtual world frontiers are not set by nations or states, they are set by those, who control the flows of information. And control is, what everybody wants.
The Five Eyes are watching, storing, and evaluating every transmission. Internet corporations compete for our data and decide if, when, and how we gain access to that data and to their pretended free services. Search engines control what information we are allowed - or want - to consume. Network access providers and carriers are fighting for control of larger networks and for better ways to shape the traffic. Interest groups and copyright holders struggle to limit access to specific content. Network operators try to keep their networks and their data safe from outside - or inside - adversaries.
And users? Many of them just don’t care. Trust in concepts and techniques is implicit. Those who do care try to take back control of the Internet through privacy-preserving techniques.
This leads to an arms race between those who try to classify the traffic, and those who try to obfuscate it. But good or bad lies in the eye of the beholder, and one will find himself fighting on both sides.
Network Traffic Classification is an important tool for network security. It allows identification of malicious traffic and possible intruders, and can also optimize network usage. Network Traffic Obfuscation is required to protect transmissions of important data from unauthorized observers, to keep the information private. However, with security and privacy both crumbling under the grip of legal and illegal black hat crackers, we dare say that contemporary traffic classification and obfuscation techniques are fundamentally flawed. The underlying concepts cannot keep up with technological evolution. Their implementation is insufficient, inefficient and requires too much resources.
We provide (1) a unified view on the apparently opposed fields of traffic classification and obfuscation, their deficiencies and limitations, and how they can be improved. We show that (2) using multiple classification techniques, optimized for specific tasks improves overall resource requirements and subsequently increases classification speed. (3) Classification based on application domain behavior leads to more accurate information than trying to identify communication protocols. (4) Current approaches to identify signatures in packet content are slow and require much space or memory. Enhanced methods reduce these requirements and allow faster matching. (5) Simple and easy to implement obfuscation techniques allow circumvention of even sophisticated contemporary classification systems. (6) Trust and privacy can be increased by reducing communication to a required minimum and limit it to known and trustworthy communication partners.
Our techniques improve both security and privacy and can be applied efficiently on a large scale. It is but a small step in taking back the Web.
The IT unit is not the only provider of information technology (IT) used in business processes. Aiming for increased performance, many business workgroups autonomously implement IT resources not covered by their organizational IT service management. This is called shadow IT. Risks and inefficiencies associated with this phenomenon challenge organizations. Organizations need to decide how to deal with identified shadow IT and if the business or the IT unit should be responsible for corresponding tasks and components. This study proposes design principles for a method to control identified shadow IT following action design research in four organizational settings. The procedure results in an allocation of IT task responsibilities between the business workgroups and the IT unit following risk considerations and transaction cost economics, leading to an IT service governance. This contributes to governance research regarding adaptive and efficient arrangements with reduced risks for business-located IT activities.
In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62% of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize the role of workarounds in business workgroups.
InBetween
(2017)
Traditional Western philosophy, cognitive science and traditional HCI frameworks approach the term digital and its implications with an implicit dualism (nature/cul-ture, theory /practice, body/mind, human/machine). What lies between is a feature of our postmodern times, in which different states, conditions or positions merge and co-exist in a new, hybrid reality, a “continuous beta” (Mühlenbeck & Skibicki, 2007) version of becoming .Post-digitality involves the physical dimensions of spatio-temporal engagements. This new ontological paradigm reconceptualizes digital technology through the ex-perience of the human body and its senses, thus emphasizing form-taking, situation-al engagement and practice rather than symbolic, disembodied rationality. This rais-es two questions in particular: how to encourage curiosity, playfulness, serendipity, emergence, discourse and collectivity? How to construct working methods without foregrounding and dividing the subject into an individual that already takes posi-tion? This paper briefly outlines the rhizomatic framework that I developed within my PhD research. This attempts to overcome two prevailing tendencies: first, the one-sided view of scientific approaches to knowledge acquisition and the pure-ly application-oriented handling of materials, technologies and machines; second, the distanced perception of the world. In contrast, my work involves project-driven alchemic curiosity and doing research through artistic design practice. This means thinking through materials, technologies and machinic interactions. Now, at the end of this PhD journey, 10 interdisciplinary projects have emerged from this ontological queer-paradigm that is post-digital–crafting 4.0. Below I illustrate this approach and its outcomes.
This PhD investigation lies at the intersection of Architecture, Textile Design and Interaction Design and speculates about sustainable forms of future living, focussing on bionic principles to create alternative lightweight building structures with textiles and digital fabrication techniques. In an interdisciplinary, practice- based design approach, informed by radical case studies from the 1960s to 80s on soft architectures like Archigram, Buckminster Fuller, Cedric Price, or Yona Friedman and critical theory on new materialism, (D. Haraway 1997, K. Barad 1998, J. Bennett 2007) sociological, philosophical (B. Latour 2005, G.Deleuze F., Guattari F 1987) and phenomenological thinkers (L. Malafouris 2005, J.Rancière 2004, B. Massumi 2002, N. Bourriaud 2002 , M. Merleau-Ponty 1963) this research investigates the cultural and social rootedness (Verortung) of novel materials and technologies, exploring in between prosthetic relations between the body and the environment.
The actual task of electrocardiographic examinations is to increase the reliability of diagnosing the condition of the heart. Within the framework of this task, an important direction is the solution of the inverse problem of electrocardiography, based on the processing of electrocardiographic signals of multichannel cardio leads at known electrode coordinates in these leads (Titomir et al. Noninvasiv electrocardiotopography, 2003), (Macfarlane et al. Comprehensive Electrocardiology, 2nd ed. (Chapter 9), 2011).