Refine
Year of publication
- 2018 (197) (remove)
Document Type
- Conference Proceeding (88)
- Article (47)
- Part of a Book (16)
- Report (11)
- Book (8)
- Doctoral Thesis (8)
- Other Publications (8)
- Working Paper (5)
- Journal (Complete Issue of a Journal) (4)
- Patent (2)
Keywords
- 3D Skelett Wickeltechnik (1)
- Actuators (1)
- Agenda 2030 (1)
- Aktuatorik (1)
- Anisotropic hyperelasticity (1)
- Anstand (3)
- Antenna arrays (1)
- Application Integration (1)
- Architektur (1)
- Auffangnorm UWG (1)
Institute
- Fakultät Architektur und Gestaltung (6)
- Fakultät Bauingenieurwesen (6)
- Fakultät Elektrotechnik und Informationstechnik (1)
- Fakultät Informatik (19)
- Fakultät Maschinenbau (9)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (8)
- Institut für Angewandte Forschung - IAF (7)
- Institut für Optische Systeme - IOS (13)
- Institut für Strategische Innovation und Technologiemanagement - IST (11)
- Institut für Systemdynamik - ISD (15)
Traggerüste
(2018)
A growing share of modern trade policy instruments is shaped by non-tariff barriers (NTBs). Based on a structural gravity equation and the recently updated Global Trade Alert database, we empirically investigate the effect of NTBs on imports. Our analysis reveals that the implementation of NTBs reduces imports of affected products by up to 12%. Their trade dampening effect is thus comparable to that of trade defence instruments such as anti-dumping duties. It is smaller for exporters that have a free trade agreement with the importing country. Different types of NTBs affect trade to a different extent. Finally, we investigate the effect of behind-the-border measures, showing that they significantly lower the importer’s market access.
Business units are increasingly able to fuel the transformation that digitalization demands of organizations. Thereby, they implement Shadow IT (SIT) to create flexible and innovative solutions. However, the individual implementation of SIT leads to high complexities and redundancies. Integration suggests itself to meet these challenges but can also eliminate the described benefits. In this emergent research, we develop propositions for a conceptual decision framework, that balances the benefits and drawbacks of an integration of SIT using a literature review as well as a multiple-case study. We thereby integrate the perspective of the overall organization as well as the specific business unit. We then pose six propositions regarding SIT integration that will serve to evaluate our conceptual framework in future research.
In 1970, B.A. Asner, Jr., proved that for a real quasi-stable polynomial, i.e., a polynomial whose zeros lie in the closed left half-plane of the complex plane, its finite Hurwitz matrix is totally nonnegative, i.e., all its minors are nonnegative, and that the converse statement is not true. In this work, we explain this phenomenon in detail, and provide necessary and sufficient conditions for a real polynomial to have a totally nonnegative finite Hurwitz matrix.
New Technology-Based Firms (NTBFs) learn their business in the early-stages of their life-cycle. As a central element of the entrepreneurial learning process, the business model describes the value-creation functions that are conceptualized in different stages of the NTBF’s life-cycle. Transaction relations connect the model with the business reality and ideally mature in strength over time to a functioning value-network. This chapter describes the development of a research design that determines, extracts, and evaluates semantics constructs of this entrepreneurial learning out of a convenient sample and three cohorts of business plans submitted to a business plan award between 2008 and 2010. The analysis shows empirical evidence for the survival and growth of those NTBFs that exhibit a balanced status of entrepreneurial learning in the maturity of the value-network that can be characterized as early startup-stage. The empirical findings of the network theory based business plan analysis will allow for a better explanation of the performance in the entrepreneurial process that is discussed for NTBFs based on theory of organizational learning.
The Role of Support-Activities for the successful Implementation of Internal Corporate Accelerators
(2018)
Stolperstein Mathematik
(2018)
Stadt entwerfen
(2018)
Zweite, komplett überarbeitete, aktualisierte und erweiterte Auflage in neuem Layout, größerem Format und mit neuen Projekten.
Städtebauliches Entwerfen basiert auf Ordnungs- und Gestaltungsprinzipien, die funktionale Ansprüche erfüllen und zugleich die Entwurfselemente zu einem unverwechselbaren Ganzen fügen müssen. Auch wenn Entwürfe fast immer vom Zeitgeist geprägt sind, so sind die kompositorischen Grundprinzipien weitgehend zeitlos. Stadt entwerfen erläutert die wichtigsten Entwurfs- und Darstellungsprinzipien im Städtebau anhand von ausgewählten historischen Beispielen und internationalen zeitgenössischen Wettbewerbsbeiträgen. Im Zentrum der Publikation steht die Frage, wie die Projekte entworfen wurden und welche Methoden und Instrumente dem Entwerfer zur Verfügung stehen: Neben dem klassischen Entwurf, der im Kopf des Entwerfers entsteht, erweitert sich gegenwärtig das Repertoire durch neue, computergestützte Methoden, wie z.B. dem parametrischen Entwerfen, bei dem veränderbare Parameter den Entwurf automatisiert beeinflussen und eine Vielfalt von Lösungsmöglichkeiten anbieten. Drei Best-Practice-Beispiele, die Hafencity Hamburg, Belval-Ouest in Luxemburg und die Südstadt in Tübingen, zeigen im Schlusskapitel, wie prämierte städtebauliche Konzepte und Entwürfe erfolgreich realisiert werden.
Mit Beiträgen von Oliver Fritz, Rolo Fütterer und Markus Neppl.
To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed to find out what kind of source code patterns were used. Source code pattern categories were found for sources, concatenations, sinks, html context and fixes. Our resulting categories are compared to categories from CWE. A source code sample which might have led developers to believe that the data was already sanitized is described in detail. For the different html context categories, the necessary Cross Site Scripting prevention mechanisms are described.
We investigated 50 randomly selected buffer overflow vulnerabilities in Firefox. The source code of these vulnerabilities and the corresponding patches were manually reviewed and patterns were identified. Our main contribution are taxonomies of errors, sinks and fixes seen from a developer's point of view. The results are compared to the CWE taxonomy with an emphasis on vulnerability details. Additionally, some ideas are presented on how the taxonomy could be used to improve the software security education.
Error correction coding based on soft-input decoding can significantly improve the reliability of non-volatile flash memories. This work proposes a soft-input decoder for generalized concatenated (GC) codes. GC codes are well suited for error correction in flash memories for high reliability data storage. We propose GC codes constructed from inner extended binary Bose-Chaudhuri-Hocquenghem (BCH) codes and outer Reed-Solomon codes. The extended BCH codes enable an efficient hard-input decoding. Furthermore, a low-complexity soft-input decoding method is proposed. This bit-flipping decoder uses a fixed number of test patterns and an algebraic decoder for soft-decoding. An acceptance criterion for the final candidate codeword is proposed. Combined with error and erasure decoding of the outer Reed-Solomon codes, this acceptance criterion can improve the decoding performance and reduce the decoding complexity. The presented simulation results show that the proposed bit-flipping decoder in combination with outer error and erasure decoding can outperform maximum likelihood decoding of the inner codes.
Generalised concatenated (GC) codes are well suited for error correction in flash memories for high-reliability data storage. The GC codes are constructed from inner extended binary Bose–Chaudhuri–Hocquenghem (BCH) codes and outer Reed–Solomon codes. The extended BCH codes enable high-rate GC codes and low-complexity soft input decoding. This work proposes a decoder architecture for high-rate GC codes. For such codes, outer error and erasure decoding are mandatory. A pipelined decoder architecture is proposed that achieves a high data throughput with hard input decoding. In addition, a low-complexity soft input decoder is proposed. This soft decoding approach combines a bit-flipping strategy with algebraic decoding. The decoder components for the hard input decoding can be utilised which reduces the overhead for the soft input decoding. Nevertheless, the soft input decoding achieves a significant coding gain compared with hard input decoding.
Smart-Future-Living-Bodensee
(2018)
This paper presents a bed system able to analyze a person’s movement, breathing and recognize the positions that the subject is lying on the bed during the night without any additional physical contact. The measurements are performed with sensors placed between the mattress and the bed-frame. An Intel Edison board was used as an endpoint that served as a communication node from the mesh network to external service. Two nodes and Intel Edison are attached to the bottom of the bed frame and they are connected to the sensors. First test results have indicated the potential of the proposed approach for the recognition of sleep positions with 83% of correct recognized positions.