Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailPost-operative deep brain stimulation assessment: Automatic data integration and report generation
Husch, Andreas UL; Petersen, Mikkel V.; Gemmar, Peter et al

in Brain Stimulation (2018)

Background The gold standard for post-operative deep brain stimulation (DBS) parameter tuning is a monopolar review of all stimulation contacts, a strategy being challenged by recent developments of more ... [more ▼]

Background The gold standard for post-operative deep brain stimulation (DBS) parameter tuning is a monopolar review of all stimulation contacts, a strategy being challenged by recent developments of more complex electrode leads. Objective Providing a method to guide clinicians on DBS assessment and parameter tuning by automatically integrating patient individual data. Methods We present a fully automatic method for visualization of individual deep brain structures in relation to a DBS lead by combining precise electrode recovery from post-operative imaging with individual estimates of deep brain morphology utilizing a 7T-MRI deep brain atlas. Results The method was evaluated on 20 STN DBS cases. It demonstrated robust automatic creation of 3D-enabled PDF reports visualizing electrode to brain structure relations and proved valuable in detecting miss placed electrodes. Discussion Automatic DBS assessment is feasible and can conveniently provide clinicians with relevant information on DBS contact positions in relation to important anatomical structures. [less ▲]

Detailed reference viewed: 140 (8 UL)
Full Text
See detailPOST-PROCESS AND IN-PROCESS ANALYSIS METHODS FOR LASER WELDING OF ALUMINUM-COPPER
Schmalen, Pascal Guy UL

Doctoral thesis (2019)

Copper is well-known for excellent conductivity and corrosion resistance, whereas aluminium is known for low density and great formability. The laser joining of Al and Cu combines those properties, e.g ... [more ▼]

Copper is well-known for excellent conductivity and corrosion resistance, whereas aluminium is known for low density and great formability. The laser joining of Al and Cu combines those properties, e.g. in manufacturing of solar absorbers and wiring harnesses. Furthermore, the joining of Al and Cu is an enabler of new products, e.g. the manufacturing of battery modules, where a reliable joining process for numerous Al-Cu connections, the tabs of the Li-ion batteries, is needed. The joining of Al and Cu is considered as complex due to the formation of intermetallic compounds inside the joint, which are causing a brittle joint with increased resistance. The focus of this work is the improvement and extension of the laser welding process of Al and Cu. It was found that the determination of suitable process parameters is one of the major restrictions in the application of the process. Hence, this work deals with the analysis of methods to determine process parameters, which was performed in three main parts: o The comprehensive process understanding is one essential part to improve the joint quality. The formation of the intermetallics inside the joint is a process, which takes place in a short time frame of a few μs and a scale of few hundreds of μm. Metallographic studies were performed to gain insights into the local formation of specific intermetallic compounds. Furthermore, intensive research on etchants was combined with the information gained from a micro-XRD analysis in order to identify and localize the most critical phases. o The post–process quality measurements are the essential part to quantify and evaluate the properties of the joint and thus to adapt process parameters. Yet, the quality measurements are varying in recent literature. In this work, the mechanical, electrical and optical methods were combined with hardness measurements and metallographic studies. The methods were enhanced and it was found that especially electrical methods have a great potential to assist the determination of process parameters. o In-process analysis methods were studied to identify the potential of process monitoring of Al-Cu weld seams. It was found that the optical analysis of the vapour plume, which is formed during the keyhole welding, can be used to estimate the joint quality. Chromatic filters were used to analyse specific process radiation of Al and Cu, which contains information about the current intermixture of the joint. The investigations were carried out with a spectroscope. Concluding, it will be shown that the present work assists the choice of suitable process parameters, and thus supports the future implementation of laser technology to join Al and Cu. [less ▲]

Detailed reference viewed: 112 (22 UL)
Full Text
Peer Reviewed
See detailPost-Quantum Anonymous Veto Networks
Ding, Jintai; Emery, Doug; Mueller, Johannes UL et al

in E-Vote-ID 2020 (2020)

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailPost-Wachstums-Ökonomien – (k)ein Thema für die Wirtschaftsgeographie?
Schulz, Christian UL

in Zeitschrift für Wirtschaftsgeographie (2012), 56(4), 264-273

Detailed reference viewed: 434 (6 UL)
Full Text
Peer Reviewed
See detailPost-war voters as fiscal liberals: local elections, spending, and war trauma in contemporary Croatia
Glaurdic, Josip UL; Vukovic, Vuk

in East European Politics (2018), 34(2), 173-193

This study exposes post-war voters’ fiscal liberalism using individual level and aggregate-level data covering a decade and a half of local electoral competition in post-war Croatia. Aggregate-level ... [more ▼]

This study exposes post-war voters’ fiscal liberalism using individual level and aggregate-level data covering a decade and a half of local electoral competition in post-war Croatia. Aggregate-level analysis shows Croatian voters’ fiscal liberalism to be conditional on their communities’ exposure to war violence: greater exposure to violence leads to greater support for fiscally expansionist incumbents. Individual-level analysis, on the other hand, shows post-war voters’ fiscal liberalism as rooted in their different levels of war-related trauma: more feelings of war-related trauma lead to greater economic expectations from the government. Our analysis also shows that voters’ war-conditioned preferences for fiscally expansionist incumbents show little sign of abating over time – a testament to the challenge presented by post-war recovery, and to the impact war exerts on political life long after the bloodshed has ended. [less ▲]

Detailed reference viewed: 154 (27 UL)
See detailDer postapokalyptische Robinson. Imagination, Medien und Kalter Krieg in David Bourlas The Noah.
Pause, Johannes UL

in Höltgen, Stefan; Gradinari, Irina (Eds.) Heiße Drähte. Medien im Kalten Krieg. (2014)

Detailed reference viewed: 140 (0 UL)
Full Text
Peer Reviewed
See detailPostcolonial ideologies of language in education: Teachers and parents on English and local language(s) in The Gambia
Van Camp, Kirsten; Juffermans, Kasper UL

in Cuvelier, Pol; Vandekerckhove, Reinhild; Aerts, Ann (Eds.) Multilingualism from Below: Proceedings MIDP Colloquium (2009, September)

Detailed reference viewed: 48 (0 UL)
Peer Reviewed
See detailPostcolonial ideologies of language in education: Voices from below on English and local language(s) in The Gambia
Van Camp, Kirsten; Juffermans, Kasper UL

in Cuvelier, Pol; du Plessis, Theodorus; Meeuwis, Michael (Eds.) et al Multilingualism from Below (2010)

Detailed reference viewed: 67 (0 UL)
See detailPostdramatisches Theater als transkulturelles Theater. Eine transdisziplinäre Annäherung
Nonoa, Koku Gnatuloma UL; Kovacs, Teresa

Book published by Forum Modernes Theater - 1st ed. (2018)

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailPoster Abstract: An Optimizing Framework for Real-Time Scheduling
Sundharam, Sakthivel Manikandan UL; Altmeyer, Sebastian UL; Navet, Nicolas UL

in Proceedings of 22nd IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2016) (2016, April 12)

Scheduling is crucial in real-time applications. For any real-time system, the desired scheduling policy can be selected based on the scheduling problem itself and the underlying system constraints. This ... [more ▼]

Scheduling is crucial in real-time applications. For any real-time system, the desired scheduling policy can be selected based on the scheduling problem itself and the underlying system constraints. This paper discusses a novel optimization framework which automates the selection and configuration of the scheduling policy. The objective is to let designer state the permissible timing behavior of the system in a declarative manner. The system synthesis step involving both analysis and optimization then generates a scheduling solution which at runtime is enforced by the execution environment. [less ▲]

Detailed reference viewed: 225 (59 UL)
Full Text
Peer Reviewed
See detailPoster: Characterizing Driving Behaviors Through a Car Simulation Platform
Faye, Sébastien UL; Jafarnejad, Sasan UL; Costamagna, Juan UL et al

Poster (2017, November 27)

Human mobility has opened up to many themes in recent years. Human behavior and how a driver might react to certain situations, whether dangerous (e.g. an accident) or simply part of the evolution of new ... [more ▼]

Human mobility has opened up to many themes in recent years. Human behavior and how a driver might react to certain situations, whether dangerous (e.g. an accident) or simply part of the evolution of new technologies (e.g. autonomous driving), leaves many avenues to be explored. Although experiments have been deployed in real situations, it remains difficult to encounter the conditions that certain studies may require. For this reason, we have set up a driving simulator (comprising several modules) that is able to reproduce a realistic driving environment. Although, as the literature has already demonstrated, the conditions are often far from reality, simulation platforms are nonetheless capable of reproducing an incredibly large number of scenarios on the fly. In this poster, we explain how we conceived the simulator, as well as the system we developed for collecting metrics on both the driver and the simulation environment. In addition, we take advantage of this conference to publicly share a dataset consisting of 25 drivers performing the same road circuit on the "Project Cars" game. [less ▲]

Detailed reference viewed: 184 (18 UL)
Full Text
Peer Reviewed
See detailPOSTER: Context-adaptive user-centric privacy scheme for VANET
Emara, Karim Ahmed Awad El-Sayed UL; Woerndl, Wolfgang; Schlichter, Johann

in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (2015)

Vehicular adhoc network allows vehicles to exchange their information for safety and traffic efficiency. However, exchanging information may threaten the driver privacy because it includes spatiotemporal ... [more ▼]

Vehicular adhoc network allows vehicles to exchange their information for safety and traffic efficiency. However, exchanging information may threaten the driver privacy because it includes spatiotemporal information and is broadcast publicly on a periodical basis. In this paper, we propose a context-adaptive privacy scheme which lets a vehicle decide autonomously when to change its pseudonym and how long it should remain silent to ensure unlinkability. This scheme adapts dynamically based on the density of the surrounding traffic and the user privacy preferences. According to the experimental results, the proposed scheme demonstrates a significant reduction in traceability with a better quality of forward collision warning application compared with the random silent period scheme. \textcopyright Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015. [less ▲]

Detailed reference viewed: 108 (4 UL)
Peer Reviewed
See detailPOSTER: Critique of the CISSP Common Body of Knowledge of Cryptography
Neuhaus, Stephan; Gheorghe, Gabriela UL

Poster (2013)

Detailed reference viewed: 147 (6 UL)
Full Text
Peer Reviewed
See detailPOSTER: Destabilizing BitTorrent’s Clusters to Attack High Bandwidth Leechers
Adamsky, Florian UL; Khan, Hassan; Rajarajan, Muttukrishnan et al

in In 18th ACM Conference on Computer and Communications Security (ACM CCS) (2011)

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailPOSTER: Detection of Information Leaks via Reflection in Android Apps
Gajrani, Jyoti; Li, Li UL; Laxmi, Vijay et al

in The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017) (2017)

Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage ... [more ▼]

Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage reflection to subvert the malware detection by static analyzers. Reflection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syntax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more precise and automated detection of malware employing reflection. We evaluate EspyDroid on 28 benchmark apps employing major reflection categories. Our technique show improved results over FlowDroid via detection of additional undetected flows. These flows have potential to leak sensitive and private information of the users, through various sinks. [less ▲]

Detailed reference viewed: 120 (5 UL)
Full Text
Peer Reviewed
See detailPOSTER: Fingerprinting Tor Hidden Services
Mitseva, Asya UL; Panchenko, Andriy UL; Lanze, Fabian et al

Poster (2016, October)

Detailed reference viewed: 263 (30 UL)
Full Text
Peer Reviewed
See detailPoster: Impact of ground truth errors on Wi-Fi localization accuracy
Popleteev, Andrei UL

Poster (2017, June)

This study investigates the impact of small ground truth (GT) errors on indoor positioning systems based on Wi-Fi fingerprinting. The results demonstrate that even centimeter-scale GT deviations cause ... [more ▼]

This study investigates the impact of small ground truth (GT) errors on indoor positioning systems based on Wi-Fi fingerprinting. The results demonstrate that even centimeter-scale GT deviations cause severe degradation of measured localization accuracy. [less ▲]

Detailed reference viewed: 69 (1 UL)
Peer Reviewed
See detailPoster: LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity
Derrmann, Thierry UL; Faye, Sébastien UL; Frank, Raphaël UL et al

Poster (2016, December 08)

Recent technological advances in communication technology have provided new ways to understand human mobility. Connected vehicles with their rising market penetration are particularly representative of ... [more ▼]

Recent technological advances in communication technology have provided new ways to understand human mobility. Connected vehicles with their rising market penetration are particularly representative of this trend. They become increasingly interesting, not only as sensors, but also as participants in Intelligent Transportation System (ITS) applications. More specifically, their pervasive connectivity to cellular networks enables them as passive and active sensing units. In this paper, we introduce LuST-LTE, a package of open-source simulation tools that allows the simulation of vehicular traffic along with pervasive LTE connectivity. [less ▲]

Detailed reference viewed: 232 (22 UL)