Refine
Year of publication
- 2014 (33) (remove)
Document Type
- Book (9)
- Working Paper (7)
- Article (5)
- Journal (Complete Issue of a Journal) (5)
- Conference Proceeding (2)
- Doctoral Thesis (2)
- Bachelor Thesis (1)
- Master's Thesis (1)
- Report (1)
Keywords
- Abschätzung (1)
- Architektur (1)
- Atom interferometry (1)
- BPM (1)
- BPMN 2.0 (1)
- Bauingenieurwesen, Brasilien, Baustelle, Tunnelbau, Membrandach,Wasserkraftwerk, Promon, Hochtief do Brasil, Maracana Stadion, Niteroi-Brücke, Itaipu, Museum of Tomorrow (1)
- Bedeutung (1)
- Bose-Einstein condensate (1)
- CMS (6)
- Cold atoms (1)
Wissenschaftlich Schreiben
(2014)
Mit diesen Praxismaterialien wird jedes Schreibtraining zum Erfolg! Zielführende Übungen vermitteln Studierenden die Standards des wissenschaftlichen Schreibens. Studien- und Abschlussarbeiten werden auf dieser Grundlage stilsicher verfasst, fundiert belegt, sinnvoll gegliedert und systematisch optimiert. Bewährte Strategien, konkrete Hinweise und ausführliche Musterlösungen sichern den Lernprozess ab. Perfekt geeignet für Seminare und Workshops.
Der VGB-Standard behandelt Maschinen- und Stahlwasserbauteile für Wasserkraftanlagen.
Es wird ausschließlich die Auswirkung mechanischer und/oder thermischer Belastungen auf die Lebensdauer der Anlagenteile behandelt. Die Lebensdauerverkürzung durch Verschleiß, Korrosion, Kavitation oder Erosion wird nicht betrachtet. Bei Elektromaschinen werden nur die mechanischen Festigkeitsaspekte behandelt.
Der VGB-Standard VGB-S-034-00-2014-10-DE befasst sich mit dem Betriebsfestigkeitsnachweis. Dieser beinhaltet die Untersuchung und Bewertung von Bauteilen unter Ermüdungsbeanspruchung und weist die Bauteillebensdauer bis zum technischen Anriss oder Versagen des Bauteils (Bruch oder Funktionsverlust) aus. In diesem Sinne umfasst der Begriff „Betriebsfestigkeitsnachweis“ in diesem VGB-Standard den Ermüdungsfestigkeitsnachweis und den bruchmechanischen Nachweis. Für die Durchführung des Betriebsfestigkeitsnachweises sind umfangreiche Eingangsdaten, wie z. B. für Bauteilgeometrie, Belastungen, Anzahl der relevanten Lastwechsel und Werkstoffkennwerte erforderlich.
To master complexity, we can organize it or discard it. The Art of Insight in Science and Engineering first teaches the tools for organizing complexity, then distinguishes the two paths for discarding complexity: with and without loss of information. Questions and problems throughout the text help readers master and apply these groups of tools. Armed with this three-part toolchest, and without complicated mathematics, readers can estimate the flight range of birds and planes and the strength of chemical bonds, understand the physics of pianos and xylophones, and explain why skies are blue and sunsets are red.
Straßen, Wege und Plätze
(2014)
Die Hefte der Schriftenreihe licht.wissen geben Informationen zur Lichtanwendung. Diese Themenhefte erläutern anhand vieler Beleuchtungsbeispiele lichttechnische Grundlagen und zeigen beispielhafte Lösungen. Sie erleichtern damit auch die Zusammenarbeit mit Fachleuten der Licht- und Elektrotechnik. Alle lichttechnischen Aussagen sind grundsätzlicher Art.
Requirements Engineering in Business Analytics for Innovation and Product Lifecycle Management
(2014)
Considering Requirements Engineering (RE) in business analytics, involving market oriented management, computer science and statistics, may be valuable for managing innovation in Product Lifecycle Management (PLM). RE and business analytics can help maximize the value of corporate product information throughout the value chain starting with innovation management. Innovation and PLM must address 1) big data, 2) development of well-defined business goals and principles, 3) cost/benefit analysis, 4) continuous change management, and 5) statistical and report science. This paper is a positioning note that addresses some business case considerations for analytics project involving PLM data, patents, and innovations. We describe a number of research challenges in RE that addresses business analytics when high PLM data should be turned into a successful market oriented innovation management strategy. We provide a draft on how to address these research challenges.
Noteninflation
(2014)
Cyberspace: a world at war. Our privacy, freedom of speech, and with them the very foundations of democracy are under attack. In the virtual world frontiers are not set by nations or states, they are set by those, who control the flows of information. And control is, what everybody wants.
The Five Eyes are watching, storing, and evaluating every transmission. Internet corporations compete for our data and decide if, when, and how we gain access to that data and to their pretended free services. Search engines control what information we are allowed - or want - to consume. Network access providers and carriers are fighting for control of larger networks and for better ways to shape the traffic. Interest groups and copyright holders struggle to limit access to specific content. Network operators try to keep their networks and their data safe from outside - or inside - adversaries.
And users? Many of them just don’t care. Trust in concepts and techniques is implicit. Those who do care try to take back control of the Internet through privacy-preserving techniques.
This leads to an arms race between those who try to classify the traffic, and those who try to obfuscate it. But good or bad lies in the eye of the beholder, and one will find himself fighting on both sides.
Network Traffic Classification is an important tool for network security. It allows identification of malicious traffic and possible intruders, and can also optimize network usage. Network Traffic Obfuscation is required to protect transmissions of important data from unauthorized observers, to keep the information private. However, with security and privacy both crumbling under the grip of legal and illegal black hat crackers, we dare say that contemporary traffic classification and obfuscation techniques are fundamentally flawed. The underlying concepts cannot keep up with technological evolution. Their implementation is insufficient, inefficient and requires too much resources.
We provide (1) a unified view on the apparently opposed fields of traffic classification and obfuscation, their deficiencies and limitations, and how they can be improved. We show that (2) using multiple classification techniques, optimized for specific tasks improves overall resource requirements and subsequently increases classification speed. (3) Classification based on application domain behavior leads to more accurate information than trying to identify communication protocols. (4) Current approaches to identify signatures in packet content are slow and require much space or memory. Enhanced methods reduce these requirements and allow faster matching. (5) Simple and easy to implement obfuscation techniques allow circumvention of even sophisticated contemporary classification systems. (6) Trust and privacy can be increased by reducing communication to a required minimum and limit it to known and trustworthy communication partners.
Our techniques improve both security and privacy and can be applied efficiently on a large scale. It is but a small step in taking back the Web.