Although tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability.
Umfang: XXVII, 429 S.
Preis: 50.00 €
Buchdetails
The understanding and interpretation of complex 3D environments is a key challenge of autonomous driving. Lidar sensors and their recorded point clouds are particularly interesting for this challenge since they provide accurate 3D information about the environment. This work presents a multimodal approach based on deep learning for panoptic segmentation of 3D point clouds. It builds upon and combines the three key aspects multi view architecture, temporal feature fusion, and deep sensor fusion.
Umfang: XV, 213 S.
Preis: 43.00 €
Buchdetails
Die Unterstützung des Menschen bei Überwachungsaufgaben ist aufgrund der überwältigenden Menge an Sensordaten von entscheidender Bedeutung. Diese Arbeit konzentriert sich auf die Entwicklung von Datenfusionsmethoden am Beispiel des maritimen Raums. Es werden verschiedene Anomalien untersucht, anhand realer Schiffsverkehrsdaten bewertet und mit Experten erprobt. Dazu werden Situationen von Interesse und Anomalien basierend auf verschiedenen maschinellen Lernverfahren modelliert und evaluiert.
Human support in surveillance tasks is crucial due to the overwhelming amount of sensor data. This work focuses on the development of data fusion methods using the maritime domain as an example. Various anomalies are investigated, evaluated using real vessel traffic data and tested with experts. For this purpose, situations of interest and anomalies are modelled and evaluated based on different machine learning methods.
Umfang: XIII, 230 S.
Preis: 41.00 €
Buchdetails
Die Ellipsometrie ist ein Messverfahren zur Oberflächencharakterisierung und Dünnschichtmessung von ebenen Oberflächen unter Verwendung von polarisiertem Licht. Ein neues Messprinzip basierend auf Lichtwegumkehrung und Retroreflexion ermöglicht jedoch die Erfassung von beliebigen Freiformflächen. Dieses neue Messprinzip und damit verbundene Fragestellungen zur Messabbildung, Auswertealgorithmik und Mehrdeutigkeiten sowie Freiheitsgrade der Lösungsmenge werden in dieser Arbeit untersucht.
Ellipsometry is a measuring method for surface characterization and thin-film measurement of flat surfaces using polarized light. However, a new measuring principle based on return-path ellipsometry and retroreflection enables the detection of free-form surfaces. This new measurement principle and related questions regarding the measurement function, evaluation algorithms and ambiguities as well as degrees of freedom of the solution set are examined in this work.
Umfang: XXII, 289 S.
Preis: 49.00 €
Buchdetails
Configuring an anomaly-based Network Intrusion Detection System for cybersecurity of an industrial system in the absence of information on networking infrastructure and programmed deterministic industrial process is challenging. Within the research work, different self-learning frameworks to analyze passively captured network traces from PROFINET-based industrial system for protocol-based and process behavior-based anomaly detection are developed, and evaluated on a real-world industrial system.
Umfang: XIV, 193 S.
Preis: 44.00 €
Buchdetails
I report on applications of slicing and program dependence graphs (PDGs) to software security. Moreover, I propose a framework that generalizes both data-flow analysis on control-flow graphs and slicing on PDGs. This framework can be used to systematically derive data-flow-like analyses on PDGs that go beyond slicing. I demonstrate that data-flow analysis can be systematically applied to PDGs and show the practicability of my approach.
Umfang: XIV, 441 S.
Preis: 53.00 €
Buchdetails
This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.
Umfang: XI, 126 S.
Preis: 37.00 €
Buchdetails
Ihrer Arbeit in der Originalsprache: Die Digitalisierung hat bereits viele Bereiche der Wirtschaft und des gesellschaftlichen Lebens verändert. Auch unterliegen die Aspekte des Gesundheitswesens und der klinischen Praxis einem digitalen Wandel. Im Hinblick auf diese Entwicklungen beleuchtet die vorliegende Dissertation die Akquisition, Repräsentation und Nutzung von Prozesswissen im Kontext hybrider KI-Methoden. Zentraler Beitrag ist die strukturerhaltende Hin- und Rücktransformation von Prozessbäumen zu Prozessplänen.
Digitalization has already transformed many areas of the economy and social life. Aspects of healthcare and clinical practice are also undergoing digital transformation. In light of these developments, this dissertation sheds light on the acquisition, representation, and use of process knowledge in the context of hybrid AI methods. The central contribution is the structure-preserving back-and-forth transformation of process trees to process plans.
Umfang: VII, 248 S.
Preis: 44.00 €
Buchdetails
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
Umfang: XXII, 329 S.
Preis: 47.00 €
Buchdetails
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Umfang: XIII, 382 S.
Preis: 49.00 €
Buchdetails