Refine
Year of publication
- 2018 (88) (remove)
Document Type
- Conference Proceeding (88) (remove)
Keywords
Institute
- Fakultät Bauingenieurwesen (1)
- Fakultät Informatik (13)
- Fakultät Maschinenbau (3)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (2)
- Institut für Angewandte Forschung - IAF (3)
- Institut für Optische Systeme - IOS (9)
- Institut für Strategische Innovation und Technologiemanagement - IST (5)
- Institut für Systemdynamik - ISD (6)
- Institut für professionelles Schreiben - IPS (2)
- Konstanz Institut für Corporate Governance - KICG (2)
Ziegelsplittbetone der Nachkriegsjahre und moderne RC-Betone - Nachhaltigkeit an Objektbeispielen
(2018)
Das Bauwesen gehört zu den größten Verbrauchern an natürlichen Ressourcen und Energie in der deutschen Wirtschaft. Das ist in vielen Fällen trotzdem ökologisch und ökonomisch vertretbar, weil die Bauteile und Bauwerke verglichen mit anderen "Produkten" eine deutlich längere technische Lebensdauer haben - im Fall des Betons zwischen ca. 25 und 100 Jahren - und wenn nach dem Rückbau hohe Recyclingquoten erzielt werden. In Bezug auf Einsparmöglichkeiten spielt der Massenbaustoff Beton eine ganz zentrale Rolle. Neben der Einsparung des sehr energieintensiven Zements und der Entwicklung von Substitutionsbindemitteln, stehen auch die Gesteinskörnungen im Fokus, die den größten Anteil am Beton ausmachen. Im Artikel werden auf der Basis eigener Ergebnisse aus einem DBU?geförderten Forschungsprojekt zu RC?Betonen die Nachhaltigkeit von Beton an Objektbeispielen vorgestellt und über den Sachstand zur aktuellen Nutzung von R-Betonen in Deutschland informiert. Der Fokus liegt dabei auf der Wertigkeit mineralischer Baustoffe aus vergleichsweise wenigen, überwiegend natürlichen Komponenten wie beim Beton, dessen Instandsetzungsmöglichkeiten und bessere Voraussetzungen für späteres Recycling gegenüber vielen modernen, kunststoffhaltigen Verbundbaustoffen.
Visualization-Assisted Development of Deep Learning Models in Offline Handwriting Recognition
(2018)
Deep learning is a field of machine learning that has been the focus of active research and successful applications in recent years. Offline handwriting recognition is one of the research fields and applications were deep neural networks have shown high accuracy. Deep learning models and their training pipeline show a large amount of hyper-parameters in their data selection, transformation, network topology and training process that are sometimes interdependent. This increases the overall difficulty and time necessary for building and training a model for a specific data set and task at hand. This work proposes a novel visualization-assisted workflow that guides the model developer through the hyper-parameter search in order to identify relevant parameters and modify them in a meaningful way. This decreases the overall time necessary for building and training a model. The contributions of this work are a workflow for hyper-parameter search in offline handwriting recognition and a heat map based visualization technique for deep neural networks in multi-line offline handwriting recognition. This work applies to offline handwriting recognition, but the general workflow can possibly be adapted to other tasks as well.
Business units are increasingly able to fuel the transformation that digitalization demands of organizations. Thereby, they implement Shadow IT (SIT) to create flexible and innovative solutions. However, the individual implementation of SIT leads to high complexities and redundancies. Integration suggests itself to meet these challenges but can also eliminate the described benefits. In this emergent research, we develop propositions for a conceptual decision framework, that balances the benefits and drawbacks of an integration of SIT using a literature review as well as a multiple-case study. We thereby integrate the perspective of the overall organization as well as the specific business unit. We then pose six propositions regarding SIT integration that will serve to evaluate our conceptual framework in future research.
The Role of Support-Activities for the successful Implementation of Internal Corporate Accelerators
(2018)
To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed to find out what kind of source code patterns were used. Source code pattern categories were found for sources, concatenations, sinks, html context and fixes. Our resulting categories are compared to categories from CWE. A source code sample which might have led developers to believe that the data was already sanitized is described in detail. For the different html context categories, the necessary Cross Site Scripting prevention mechanisms are described.
We investigated 50 randomly selected buffer overflow vulnerabilities in Firefox. The source code of these vulnerabilities and the corresponding patches were manually reviewed and patterns were identified. Our main contribution are taxonomies of errors, sinks and fixes seen from a developer's point of view. The results are compared to the CWE taxonomy with an emphasis on vulnerability details. Additionally, some ideas are presented on how the taxonomy could be used to improve the software security education.