• Deutsch
Login

Open Access

  • Home
  • Search
  • Browse
  • Publish
  • FAQ

Refine

Author

  • Adm, Mohammad (1)
  • Beckers, Rolf (1)
  • Blaich, Michael (1)
  • Brand, Michael (1)
  • Ehrenberger, Marcus (1)
  • Gard, Jérôme (1)
  • Gentner, Steffi (1)
  • Grimm, Simon (1)
  • Hamadneh, Tareq (1)
  • Heck, Andreas E. H. (1)
+ more

Year of publication

  • 2018 (7)
  • 2017 (5)
  • 2016 (7)
  • 2015 (3)
  • 2014 (2)
  • 2012 (1)
  • 1996 (1)
  • 1995 (2)

Document Type

  • Doctoral Thesis (28) (remove)

Language

  • German (16)
  • English (12)

Has Fulltext

  • no (24)
  • yes (4)

Keywords

  • Apfel (1)
  • Architektur (3)
  • Autonomy (1)
  • Bahnplanung (1)
  • Bernstein Basis (1)
  • Cauchon algorithm (1)
  • Compliance (1)
  • Control Theory (1)
  • Corporate Responsibility (1)
  • Corporate Social Responsibility (2)
+ more

Institute

  • Fakultät Elektrotechnik und Informationstechnik (1)
  • Fakultät Maschinenbau (1)
  • Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (3)
  • Institut für Optische Systeme - IOS (1)
  • Institut für Systemdynamik - ISD (2)
  • Konstanz Institut für Corporate Governance - KICG (1)

28 search hits

  • 1 to 28
  • BibTeX
  • CSV
  • RIS
  • 10
  • 20
  • 50
  • 100

Sort by

  • Year
  • Year
  • Title
  • Title
  • Author
  • Author
Perturbation and intervals of totally nonnegative matrices and related properties of sign regular matrices (2016)
Adm, Mohammad
Der Architekt Paul Schneider-Esleben (1995)
Beckers, Rolf
Path planning and collision avoidance for safe autonomous vessel navigation in dynamic environments (2017)
Blaich, Michael
Salem baut Neu-Birnau (2012)
Brand, Michael
Corporate Social Entrepreneurship (2017)
Ehrenberger, Marcus
Die Vorstellung über die "Nature of the Firm" hat sich innerhalb der vergangenen Jahrzehnte stetig verändert und weiterentwickelt. Insgesamt lässt sich festhalten, dass an Wirtschaftsunternehmen zunehmende Anforderungen hinsichtlich der Übernahme gesellschaftlicher Verantwortung gestellt werden. Deutlich zeigt sich dies in der "Agenda 2030 für nachhaltige Entwicklung", in der die Vereinten Nationen Organisationen der Wirtschaft als zentrale Akteure zur Erreichung der Nachhaltigkeitsziele (Sustainable Development Goals) benennen. Darin spiegelt sich die Überzeugung, dass bestimmte gesellschaftliche Problemstellungen erfolgreich über neuartige marktorientierte und moralökonomische Lösungsmodelle adressiert werden können. Das vorliegende Buch nimmt das damit verbundene Phänomen "Corporate Social Entrepreneurship" in den Blick. Es geht hierbei nicht um philanthropische Aktivitäten oder die Reduzierung negativer externer Effekte von bestehenden Wertschöpfungsketten. Vielmehr geht es um die Generierung positiver (externer) Effekte beziehungsweise gesellschaftlicher und privater Wertschöpfung durch die Entwicklung und Durchsetzung innovativer Güter, Dienstleistungen und Geschäftsmodelle zur Lösung der benannten gesellschaftlichen Probleme. Für viele Firmen stellt Corporate Social Entrepreneurship eine Veränderung der Praxis ökonomischen Handelns und eine große organisatorische Herausforderung dar, die bedeutende strategische Vorteile verspricht. Diese liegen nicht primär im Beitrag zur finanziellen "Bottom Line", sondern in Produkt- und Geschäftsmodellinnovationen sowie in Kreation und Erschließung neuer Märkte. Die vorliegende Arbeit folgt der Annahme, dass mit dem Aufkommen von neuartigen Prozessen ökonomischer Organisation Fragen zur Form ökonomischer Organisation - also zum Wesen, zum Zweck und zum gesellschaftlichen Verhältnis der Firma - neu gestellt werden müssen. Vor diesem Hintergrund fokussiert das Werk die Analyse und die Beschreibung von Corporate Social Entrepreneurship als Prozess ökonomischer Organisation und zieht hieraus Schlüsse für die Firma als Form ökonomischer Organisation. Dabei ist die Arbeit interdisziplinär ausgerichtet und zielt darauf ab, einen Beitrag zur Erweiterung und Konkretisierung der Governanceökonomik und Governanceethik zu leisten.
Corporate venture management in SMEs (2015)
Gard, Jérôme
Nowadays, there is a continuous need for many corporations to renew their business portfolio strategically in anticipation of changes in the business environment (e.g., technological change). The ongoing booming of founding international start-ups suggests that small entrepreneurial teams are an effective means to develop new businesses. Corporations should be able to benefit from this form of self-organized innovation when entering novel business domains for strategic renewal. However, corporations that establish small entrepreneurial teams (corporate ventures) are facing two obstacles. First, corporate ventures often fail for reasons that are not well explored. Second, it remains unclear how the partial successes may be improved to large successes. Although the key success factors remain ambiguous, there is little hope that corporate ventures will be successful without effective management. Since an empirical model for corporate venture management does not exists so far, the thesis formulates and answers the following problem statement: How can corporate management effectively manage corporate ventures? Building on qualitative and quantitative research methodologies, a model for effective corporate venture management is developed and tested statistically in the German IT consulting industry. The research results reveal some of the essential management principles through which corporate management can increase corporate venture success systematically.
From risk-based due diligence to risk-based transcultural management (2016)
Gentner, Steffi
Directivity Based Multichannel Audio Signal Processing For Microphones in Noisy Acoustic Environments (2018)
Grimm, Simon
Simon Grimm examines new multi-microphone signal processing strategies that aim to achieve noise reduction and dereverberation. Therefore, narrow-band signal enhancement approaches are combined with broad-band processing in terms of directivity based beamforming. Previously introduced formulations of the multichannel Wiener filter rely on the second order statistics of the speech and noise signals. The author analyses how additional knowledge about the location of a speaker as well as the microphone arrangement can be used to achieve further noise reduction and dereverberation.
Bounding Polynomials and Rational Functions in the Tensorial and Simplicial Bernstein Forms (2018)
Hamadneh, Tareq
This thesis considers bounding functions for multivariate polynomials and rational functions over boxes and simplices. It also considers the synthesis of polynomial Lyapunov functions for obtaining the stability of control systems. Bounding the range of functions is an important issue in many areas of mathematics and its applications like global optimization, computer aided geometric design, robust control etc.
Gesellschaftliche Wertschöpfung und ökonomische Verantwortung (2016)
Heck, Andreas E. H.
Development of control concepts for improved driving dynamics of harvesting machines with large headers (2018)
Jung, Benedikt
Efficient privacy-preserving configurationless service discovery supporting multi-link networks (2017)
Kaiser, Daniel
Data is the pollution problem of the information age, and protecting privacy is the environmental challenge — this quotation from Bruce Schneier laconically illustrates the importance of protecting privacy. Protecting privacy — as well as protecting our planet — is fundamental for humankind. Privacy is a basic human right, stated in the 12th article of the United Nations’ Universal Declaration of Human Rights. The necessity to protect human rights is unquestionable. Nothing ever threatened privacy on a scale comparable to today’s interconnected computers. Ranging from small sensors over smart phones and notebooks to large compute clusters, they collect, generate and evaluate vast amounts of data. Often, this data is distributed via the network, not only rendering it accessible to addressees, but also — if not properly secured — to malevolent parties. Like a toxic gas, this data billows through networks and suffocates privacy. This thesis takes on the challenge of protecting privacy in the area of configurationless service discovery. Configurationless service discovery is a basis for user-friendly applications. It brings great benefits, allowing the configurationless network setup for various kinds of applications; e.g. for communicating, sharing documents and collaborating, or using infrastructure devices like printers. However, while today’s various protocols provide some means of privacy protection, typical configurationless service discovery solutions do not even consider privacy. As configurationless service discovery solutions are ubiquitous and run on almost every smart device, their privacy problems affect almost everyone. The quotation aligns very well with configurationless service discovery. Typically, configurationless service discovery solutions realize configurationlessness by using cleartext multicast messages literally polluting the local network and suffocating privacy. Messages containing private cleartext data are sent to everyone, even if they are only relevant for a few users. The typical means for mitigating the network pollution problem caused by multicast per se, regardless of the privacy aspects, is confining multicast messages to a single network link or to the access network of a WiFi access point; institutions often even completely deactivate multicast. While this mitigates the privacy problem, it also strongly scales configurationless service discovery down, either confining it or rendering it completely unusable. In this thesis, we provide an efficient configurationless service discovery framework that protects the users’ privacy. It further reduces the network pollution by reducing the number of necessary multicast messages and offers a mode of operation that is completely independent of multicast. Introducing a multicast independent mode of operation, we also address the problem of the limited range in which services are discoverable. Our framework comprises components for device pairing, privacy-preserving service discovery, and multi-link scaling. These components are independent and — while usable in a completely separated way — are meant to be used as an integrated framework as they work seamlessly together. Based on our device pairing and privacy-preserving service discovery components, we published IETF Internet drafts specifying a privacy extension for DNS service discovery over multicast DNS, a wildly used protocol stack for configurationless service discovery. As our drafts have already been adopted by the dnssd working group, they are likely to become standards.
Bruno Reichlins gebaute Architekturkritik (1995)
Lack, Peter
Werteorientiertes Management in der kommunalen Energieversorgung (2016)
Lange, Jessica
Zugleich: Dissertation Carl von Ossietzky Universität Oldenburg, 2015 unter dem Titel: Werteorientiertes Management von Chancen und Risiken in der kommunalen Energieversorgung. Eine Untersuchung der Herausforderungen und Handlungsmöglichkeiten von Stadtwerken in der Energiewende aus ökonomischer, moralischer und kultureller Sicht. Unter dem Ansatz der werteorientierten Unternehmensfuhrung erforscht die Autorin die Herausforderungen und Handlungsmöglichkeiten von (kommunalen) Energieversorgern im Zuge der Energiewende und des Energiewandels seit 2011. Sie zeigt, dass kommunale Energieversorger durch ihre Verzahnung zwischen Privatwirtschaft und öffentlicher Hand eine Sonderrolle einnehmen, die in Bezug auf die neuen Herausforderungen der Energiewende zu besonderen Chancen führt. Mit Hilfe des werteorientierten Managements können Dezentralität, Vertrauensvorsprung etc. erkannt und gehoben werden.
Optimization of rectifiers for aviation regarding power density and reliability (2015)
Liebig, Sebastian
The intentions of the so-called "More Electrical Aircraft" (MEA) are higher efficiency and lower weight. A main topic here is the application of electrical instead of hydraulical, pneumatical and mechanical systems. The necessary power electronic devices have intermediate DC-links, which are typically supplied by a three-phase system with active B6 and passive B12 rectifiers. A possible alternative is the B6 diode bridge in combination with an active power filter (APF). Due to the parallel arrangement, the APF offers a higher power density and is able to compensate for harmonics from several devices. The use of the diode bridge rectifier alone is not permitted due to the highly distorted phase current. The following investigations are dealing with the development of an active power filter for a three-phase supply with variable frequency from 360 to 800 Hz. All relevant components such as inductors, EMC-filters, power modules and DC-link capacitor are designed. A particular focus is put on the customized power module with SiC-MOSFETs and SiC-diodes, which is characterized electrically and thermally. The maximum supply frequency slope has a value of 50 Hz/ms, which requires a high dynamic and robustness on the control algorithm. Furthermore, the content of 5th and 7th harmonics must be reduced to less than 2 %, which demands a high accuracy. To cope with both requirements, a two-stage filter algorithm is developed and implemented in two independent signal processors. Simulations and laboratory experiments confirm the performance and robustness of the control algorithm. This work comprehensively presents the design of aerospace rectifiers. The results were published in conferences and patents.
Simulation von Trocknungsprozessen empfindlicher biologischer Güter unter Berücksichtigung instationärer Randbedingungen (2015)
Nuñez Vega, Anna-Maria
Bei der Auslegung von Trocknungsprozessen empfindlicher biologischer Güter spielt die Produktqualität eine zunehmend wichtige Rolle. Obwohl der Einfluss der Trocknungsparameter auf die Trocknungskinetik von Äpfeln bereits Gegenstand vieler Studien war, sind die Auswirkungen auf die Produktqualität bisher kaum bekannt. Die Untersuchung dieses Sachverhalts und die Entwicklung geeigneter Prozessstrategien zur Verbesserung der Qualität des resultierenden Produkts, waren das Ziel der vorliegenden Arbeit. In einem ersten Schritt wurden zunächst umfangreiche stationäre Grundlagenversuche durchgeführt, die zeigten, dass eine Lufttemperatur im höheren Bereich, eine möglichst hohe Luftgeschwindigkeit und eine niedrige Taupunkttemperatur zur geringsten Trocknungszeit bei gleichzeitig guter optischer Qualität führt. Die Beurteilung dieser Qualitätsveränderungen erfolgte mit Hilfe einer neu eingeführten Bezugsgröße, der kumulierten thermischen Belastung, die durch das zeitliche Integral über der Oberflächentemperatur repräsentiert wird und die Vergleichbarkeit der Versuchsergebnisse entscheidend verbessert. Im zweiten Schritt wurden die Ergebnisse der Einzelschichtversuche zur Aufstellung eines numerischen Simulationsmodells verwendet, welches sowohl die entsprechenden Transportvorgänge, als auch die Formveränderung des Trocknungsgutes berücksichtigt. Das Simulationsmodell sowie die experimentellen Daten waren die Grundlage zur anschließenden Entwicklung von Prozessstrategien für die konvektive Trocknung von Äpfeln, die die resultierende Produktqualität, repräsentiert durch die Produktfarbe und –form, verbessern und gleichzeitig möglichst energieeffizient sein sollten. In einem weiteren Schritt wurde die Übertragbarkeit auf den industriellen Maßstab untersucht, wobei die entsprechenden Prozessstrategien an einer neu entwickelten, kostengünstigen Trocknungsanlage erfolgreich implementiert werden konnten. Das Ziel einer verbesserten Produktqualität konnte mit Hilfe unterschiedlicher instationärer Trocknungsschemata sowohl am Einzelschichttrockner, als auch im größeren Maßstab erreicht werden. Das vorgestellte numerische Simulationsmodell zeigte auch bei der Vorhersage des instationären Trocknungsprozesses eine hohe Genauigkeit und war außerdem in der Lage, den Trocknungsverlauf im industriellen Maßstab zuverlässig voraus zu berechnen.
GRC-Management als interdisziplinäre Corporate Governance (2016)
Otremba, Stefan
Der Essener Architekt Edmund Körner (1874 - 1940) (1996)
Pankoke, Barbara
Koordination des Wissenstransfers in Service-Netzwerken transnationaler Investitionsgüterhersteller (2017)
Schmutz, Fabian
Multiple object tracking for extended targets using JIPDA filters (2018)
Schuster, Michael
Autonomous moving systems require very detailed information about their environment and potential colliding objects. Thus, the systems are equipped with high resolution sensors. These sensors have the property to generate more than one detection per object per time step. This results in an additional complexity for the target tracking algorithm, since standard tracking filters assume that an object generates at most one detection per object. This requires new methods for data association and system state filtering. As new data association methods, in this thesis two different extensions of the Joint Integrated Probabilistic Data Association (JIPDA) filter to assign more than one detection to tracks are proposed. The first method that is introduced, is a generalization of the JIPDA to assign a variable number of measurements to each track based on some predefined statistical models, which will be called Multi Detection - Joint Integrated Probabilistic Data Association (MD-JIPDA). Since this scheme suffers from exponential increase of association hypotheses, also a new approximation scheme is presented. The second method is an extension for the special case, when the number and locations of measurements are a priori known. In preparation of this method, a new notation and computation scheme for the standard Joint Integrated Data Association is outlined, which also enables the derivation of a new fast approximation scheme called balanced permanent-JIPDA. For state filtering, also two different concepts are applied: the Random Matrix Framework and the Measurement Generating Points. For the Random Matrix framework, first an alternative prediction method is proposed to account for kinematic state changes in the extension state prediction as well. Secondly, various update methods are investigated to account for the polar to Cartesian noise transformation problem. The filtering concepts are connected with the new MD-JIPDA and their characteristics analyzed with various Monte Carlo simulations. In case an object can be modeled by a finite number of fixed Measurement Generating Points (MGP), also a proposition to track these object via a JIPDA filter is made. In this context, a fast Track-to-Track fusion algorithm is proposed as well and compared against the MGP-JIPDA. The proposed algorithms are evaluated in two applications where scanning is done using radar sensors only. The first application is a typical automotive scenario, where a passenger car is equipped with six radar sensors to cover its complete environment. In this application, the location of the measurements on an object can be considered stationary and that is has a rectangular shape. Thus, the MGP based algorithms are applied here. The filters are evaluated by tracking especially vehicles on nearside lanes. The second application covers the tracking of vessels on inland waters. Here, two different kind of Radar systems are applied, but for both sensors a uniform distribution of the measurements over the target's extent can be assumed. Further, the assumption that the targets have elliptical shape holds, and so the Random Matrix Framework in combination with the MD-JIPDA is evaluated. Exemplary test scenarios also illustrate the performance of this tracking algorithm.
Integrität in Unternehmen (2018)
Schöttl, Lisa
Unternehmen stehen in der Verantwortung, eine Vielzahl an Werten in ihrem Geschäft zu beachten, allen voran den der Integrität. Das Buch beantwortet die Frage, was Integrität für Unternehmen bedeutet und wie integres Unternehmenshandeln erreicht werden kann. Die Autorin entwickelt einen theoretisch fundierten und praktisch anwendbaren Ansatz der Unternehmensintegrität und gibt Orientierung, wie dieser durch vielfältige Maßnahmen im Rahmen von Integrity Management umgesetzt werden kann. Dabei werden klassische Compliance-Ansätze um eine werteorientierte Perspektive ergänzt, damit Unternehmen ihre je eigene Verantwortung wahrnehmen können.
A New Framework for Designing and Developing Cost-Effective Logistic Chains for Long Items (2014)
Straub, Markus
In this thesis, a new framework has been proposed, designed and developed for creating efficient and cost effective logistics chains for long items within the building industry. The building industry handles many long items such as pipes, profiles and so on. The handling of these long items is quite complicated and difficult because they are bulky, unstable and heavy. So it is not cost effective and efficient to handle them manually. Existing planning frameworks ignore these special requirements of such goods and are not planned for handling these goods. That leads to that many additional manual handling steps are currently required to handle long items. Therefore, it is very important to develop a new framework for creating the efficient and cost-effective logistics chain for long items. To propose such a new framework, the expert interviews were conducted to gain the fully understanding about the customer requirements. The experts from all stages of the building industry supply chain were interviewed. The data collected from the expert interviews has been analysed and the meaningful findings about the customer requirements have been applied as the valuable inputs for the proposition of the new framework. To have fully knowledge about current practices, all existing planning frameworks have been analysed and evaluated using SWOT analysis. The strengths, weaknesses, opportunities and threats of the current planning frameworks have been comparatively analysed and evaluated. The findings from SWOT analysis have been used for proposing, designing and developing the new framework. The great efforts have been made during the implementation stage. The six different key parameters for a successful implementation have been identified. They are: • Improvement Process with Employees • Control of the Improvements • Gifts/Money for the Improvements and Additional Work • KAIZEN Workshops • Motivation of the Employees for Improvements • Presentation of the Results Among these six parameters, it has been found that KAIZEN workshops is a very effective way for creating an efficient and cost-effective logistics chain for long items. It is believed that the new framework can be theoretically used for the planning of logistics that handle long items and commercial goods. This framework can also be used to plan all kinds of in-house logistics processes from the incoming goods, storage, picking, delivery combination areas and through to the outgoing goods area. The achievements of this project are as follows (1) the new framework for creating efficient and cost-effective logistics chains for long items, (2) the data collection and the data evaluation at the preliminary planning, (3) the decision for one planning variant already at the end of the structure planning, (4) the analysis and evaluation of customer requirements, (5) the consideration and implementation of the customer requirements in the new framework, (6) the creation of figures and tables as planning guideline, (7) the research and further development of Minomi with regards to long items, (8) the research on the information flow, (9) the classification of the improvements and the improvement handling at the implementation, (10) the identification of key parameters for a successful implementation of the planning framework. This framework has been evaluated both theoretically and through a case study of a logistics system planning for handling long items and commercial goods. It has been found that the new framework is theoretically sound and practically valuable. It can be applied to creating the logistics system for long items, especially for building industry.
Optimization of drying process for better quality retention of dried potato (2018)
Taye, Addisalem Hailu
According to the World Food Organization, nearly half of all root and tuber crops worldwide are not consumed, but are lost due to inappropriate storage and post-harvest losses. In developing countries such as Ethiopia, potatoes have not been dried, but are traditionally stored in potato clamps. So far, dried potatoes have not been converted into usable foods. The aim of the present work is to convert potatoes - perishable rootlets and tubers - into stable products by hot air drying. Hot air dryers are economical to operate in industrialized countries. In Africa, this is reserved for larger industrial companies only. In regions with a tropical climate, however, the use of solar tunnel dryers is worthwhile. These are a good choice for farming and small industries and wherever electrical energy is difficult or impossible to obtain. In a first part of the work, the drying process of potatoes was investigated, in particular with regard to the change of thermal, mechanical and chemical quality parameters. In an evaluation of the literature it was found that potatoes are not subject to quality changes if the water activityis below a value of 0.2. In order to determine the water content associated with this value at storage temperature, the known equations for the sorption equilibrium were evaluated and verified with own experimental investigations. This determined the end point of the drying process. The following experimental investigations showed a process-dependent change of the quality criteria such as color, shrinkage, and mechanical properties as well as the content of valuedetermining substances such as vitamin C and starch. The differences in the course and magnitude of the quality changes were attributed to the glass transition that takes place during the drying process. For the determination of the glass transition temperature a new, simple method based on the measurement of mechanical properties could be developed. The knowledge of the glass transition temperature allowed optimizing the drying process. The drying process could be carried out in the rubbery or glassy region, depending on the expected quality changes. Thus, all information was available to produce high quality dried potatoes in an industrial process. Since the production of potato products in less industrialized regions without sufficient supply of electrical energy should be included, potatoes were dried with a solar tunnel dryer. Examination of the quality properties mentioned above confirmed the process-dependent quality changes. Finally, the dried product was ground and with the flour thus produced, wheat flour was replaced for baking bread. An evaluation of the finished bread by a panel showed that the acceptance of the bread according to the new recipe was high, also with regard to baking volume, taste, texture and color. This work shows that by drying potatoes can be transformed a well accepted, storable and easily transportable product. The risk of losses or degradation is minimized. It can be produced on an industrial as well as on farm level. If the influence of the glass transition is taken into account, it is possible to optimize the quality of the product.
Martensitbildung und –evolution bei metastabilem austenitischen Stahl in einem Wälzkontakt (2018)
Werschler, Marco
Agiles Geschäftsprozessmanagement auf Basis gebrauchssprachlicher Modellierung (2017)
Wiedmann, Peter Christian Karl
Die stetig steigende Digitalisierung von Kommunikation und Interaktion ermöglicht eine immer flexiblere und schnellere Erfassung und Ausführung von Aktivitäten in Geschäftsprozessen. Dabei ermöglichen technologische und organisatorische Treiber, wie beispielsweise Cloud Computing und Industrie 4.0, immer komplexere organisationsübergreifende Geschäftsprozesse. Die effektive und effiziente Einbindung aller beteiligten Menschen (z.B. IT-Experten, Endanwender) ist hierbei ein entscheidender Erfolgsfaktor. Nur wenn alle Prozessbeteiligten Kenntnis über die aktuellen Geschäftsprozesse besitzen, kann eine adäquate Ausführung dieser sichergestellt werden. Die notwendige Balance zwischen Flexibilität und Stabilität wird durch die traditionellen Methoden des Geschäftsprozessmanagements (GPM) nur unzureichend gewährleistet. Sowohl aktuelle Forschungen als auch anwendungsbezogene Studien stellen die unzureichende Integration aller Beteiligten, deren fehlendes Verständnis und die geringe Akzeptanz gegenüber GPM dar. Die Dissertation, welche im Rahmen des anwenderorientierten Forschungsprojekts „BPM@Cloud“ erstellt wird, befasst sich mit der Erarbeitung einer neuen Methode zum agilen Geschäftsprozessmanagement auf Basis gebrauchssprachlicher (alltagssprachlicher, fachsprachlicher) Modellierung von Geschäftsprozessen. Die Methode umfasst drei Bestandteile (Vorgehensweise, Modellierungssprache, Softwarewerkzeug), wodurch eine ganzheitliche Unterstützung bei der Umsetzung von GPM Projekten sichergestellt wird. Durch die Adaption und Erweiterung von agilen Konzepten der Softwareentwicklung wird die Vorgehensweise zum iterativen, inkrementellen und empirischen Management von Geschäftsprozessen beschrieben. Des Weiteren wird eine Modellierungssprache für Geschäftsprozesse entwickelt, welche zur intuitiven, gebrauchssprachlichen Erfassung von Geschäftsprozessen angewendet werden kann. Die Implementierung eines Software-Prototyps ermöglicht des Weiteren die direkte Aufnahme von Feedback während der Ausführung von Geschäftsprozessen. Die drei sich ergänzenden Bestandteile – Vorgehensweise, Sprache und Software-Prototyp – bilden eine neuartige Grundlage für eine verbesserte Erfassung, Anreicherung, Ausführung und Optimierung von Geschäftsprozessen.
Der Umgang mit Schatten-IT in Unternehmen (2016)
Zimmermann, Stephan
Network Traffic Exposed and Concealed (2014)
Zink, Thomas
Cyberspace: a world at war. Our privacy, freedom of speech, and with them the very foundations of democracy are under attack. In the virtual world frontiers are not set by nations or states, they are set by those, who control the flows of information. And control is, what everybody wants. The Five Eyes are watching, storing, and evaluating every transmission. Internet corporations compete for our data and decide if, when, and how we gain access to that data and to their pretended free services. Search engines control what information we are allowed - or want - to consume. Network access providers and carriers are fighting for control of larger networks and for better ways to shape the traffic. Interest groups and copyright holders struggle to limit access to specific content. Network operators try to keep their networks and their data safe from outside - or inside - adversaries. And users? Many of them just don’t care. Trust in concepts and techniques is implicit. Those who do care try to take back control of the Internet through privacy-preserving techniques. This leads to an arms race between those who try to classify the traffic, and those who try to obfuscate it. But good or bad lies in the eye of the beholder, and one will find himself fighting on both sides. Network Traffic Classification is an important tool for network security. It allows identification of malicious traffic and possible intruders, and can also optimize network usage. Network Traffic Obfuscation is required to protect transmissions of important data from unauthorized observers, to keep the information private. However, with security and privacy both crumbling under the grip of legal and illegal black hat crackers, we dare say that contemporary traffic classification and obfuscation techniques are fundamentally flawed. The underlying concepts cannot keep up with technological evolution. Their implementation is insufficient, inefficient and requires too much resources. We provide (1) a unified view on the apparently opposed fields of traffic classification and obfuscation, their deficiencies and limitations, and how they can be improved. We show that (2) using multiple classification techniques, optimized for specific tasks improves overall resource requirements and subsequently increases classification speed. (3) Classification based on application domain behavior leads to more accurate information than trying to identify communication protocols. (4) Current approaches to identify signatures in packet content are slow and require much space or memory. Enhanced methods reduce these requirements and allow faster matching. (5) Simple and easy to implement obfuscation techniques allow circumvention of even sophisticated contemporary classification systems. (6) Trust and privacy can be increased by reducing communication to a required minimum and limit it to known and trustworthy communication partners. Our techniques improve both security and privacy and can be applied efficiently on a large scale. It is but a small step in taking back the Web.
Beitrag zum Einsatz von Permanent-Trennschichten für die Herstellung von Glasfaser verstärkten Phenolharz-Bauteilen (2016)
Zinz-Jung, Sieglinde
  • 1 to 28

OPUS4 Logo

  • Contact
  • Imprint
  • Datenschutz
  • Sitelinks