Responsive image





Chancen und Risiken des Einsatzes künstlicher Intelligenz in der Leistungsplanung - Science-Fiction oder schon Realität? Wie wirkt sich die rasante Entwicklung der „KI“ auf den Alltag in Einrichtungen aus?

Wolff, Dietmar (2022)


more

Chancen und Risiken des Einsatzes künstlicher Intelligenz in der Leistungsplanung - Science-Fiction oder schon Realität? Wie wirkt sich die rasante Entwicklung der „KI“ auf den Alltag in Einrichtungen aus?

Wolff, Dietmar (2022)

Workshop auf See 2022, Redline Data, Kiel-Oslo 31.08.2022.


more

Compiler-Aided Development of Trusted Enclaves with Rust

Dreissig, Felix; Röckl, Jonas; Müller, Tilo (2022)

Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES 2022), 1-10.
DOI: 10.1145/3538969.3538972


Peer Reviewed
 

To optimally utilize Intel SGX, programs must be partitioned into trusted and untrusted parts. Writing the trusted part of a program with Intel’s SDK, however, requires manual effort that often becomes an obstacle for programmers. In this work, we investigate how compiler-level tooling can assist with the semi-automatic separation of code into a trusted and an untrusted partition. We present Cadote, a solution that generates SGX enclaves from programs written in Rust. Application developers are expected to mark functions as trusted, for which enclaves are then generated automatically. All other functions remain untrusted and are executed outside Intel SGX in the normal world. We implemented this concept using compiler optimization passes of the LLVM framework. Targeting Rust as input language allows us to benefit from high-level concepts, such as memory safety, which enable us to safely copy function parameters between the normal and trusted world in practice.

more

Evaluation of different deep learning approaches for EEG classification

Scharnagl, Bastian; Groth, Christian (2022)

5th International Conference on Artificial Intelligence for Industries (AI4I). 2022.


Peer Reviewed
 

EEG classification is a promising approach to facilitate the life of handicapped people and to generate future human-computer-interfaces. In this paper we want to compare the effectiveness of current state of the art deep learning techniques for EEG classification. Therefore, we applied different approaches on various datasets and did a crosscomparison of the results in order to get more knowledge on the generalization capabilities. Additionally, we created a new EEG dataset and made it available for further research.


Migraine in Adolescents: Comparison of Attack Frequency During School and Vacation Periods

Drescher, Johannes; Gaul, Charly; Kropp, Peter; Siebenhaar, Yannic; Reinel, Dirk...

OBM Neurobiology 2022 6 (3).
DOI: 10.21926/obm.neurobiol.2203131


Open Access Peer Reviewed
 

This citizen science project CLUE compared the attack frequency between school and vacation periods among adolescents. The data collection process adopted in citizen science projects opens up the possibility of conducting analyses by including a large number of participants over a long period and across different regions. The data on 684 migraine attacks reported by 68 adolescents aged 16 to 19 years were collected using an online platform and smartphone apps. A Fisher’s exact test was used to compare the distributions of the migraine attack frequency during vacation and school periods in two different scenarios. In both scenarios, the attack frequency during school periods was significantly higher than that during vacation periods. The use of web-based data collection has some methodological limitations; however, it enabled the measurement of relative migraine attack frequency in students during vacation and school periods. The higher prevalence of migraine during school periods indicates the requirement of increasing headache awareness among children.

more

Proceedings of the 5th Workshop on Human Factors in Hypertext (HUMAN '22)

Atzenbeck, Claus; Rubart, Jessica (2022)

33rd ACM Conference on Hypertext and Social Media (HT'22).
DOI: 10.1145/3538882


Peer Reviewed
 

Human Factors in Hypertext 2022 (HUMAN'22) is the 5th workshop in this series. It is sponsored by ACM SIGWEB and is associated to the ACM Conference on Hypertext and Social Media 2022 (HT'22), which takes place between June 28th and July 1st in Barcelona, Spain as a hybrid event. HUMAN'22 takes place on June 28th—the conference's workshop day.

After two years of pandemic-caused virtual workshops, HUMAN'22 is organized as a hybrid event, which is in line with the organization of the main conference. We see this as a chance to allow in-presence meetings while providing remote participants the opportunity to get in touch by low registration costs and a reduced carbon footprint. Today's digital media enables us to communicate over distance or even attend larger meetings online and the Corona pandemic has taught us to use these tools in our daily life. This puts a special focus on the role of hypertext in our communication and information exchange demands, in particular from a human's perspective.

more

Bildung neu denken: Skills- & Grade-Mix Center

Drossel, Matthias (2022)

PFLEGEZeitschrift.



Digitalisierung – Roadshow für die Sozialwirtschaft

Wolff, Dietmar; Neeb, Désirée (2022)

SOZIALwirtschaft aktuell 2022 (14), 1-3.


more

Digitalisierung in der Pflege: neue Versorgungsformen – von DiPA über Pflegeberatung, Telemedizin und Telematikinfrastruktur bis hin zur künstlichen Intelligenz

Wolff, Dietmar (2022)

Fachtag DiCariO, Caritas und Diakonie.


more

Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?

Schiller, Katharina; Adamsky, Florian (2022)

11th International Workshop on Socio-Technical Aspects in Security affiliated with the 26th European Symposium on Research in Computer Security (ESORICS 2021), 182-193.
DOI: 10.1007/978-3-031-10183-0_9


Peer Reviewed
 

E-mail is nearly 50 years old and is still one of the most used communication protocols nowadays. However, it has no support for End-to-end encryption (E2EE) by default, which makes it inappropriate for sending sensitive information. This is why two e-mail encryption standards have been developed—namely, Secure/Multipurpose Internet Mail Extensions (S/MIME) and OpenPGP. Previous studies found that bad usability of encryption software can lead to software that is incorrectly used or not at all. Both consequences have a fatal impact on users’ security and privacy. In recent years, the number of e-mails that are read and written on mobile devices has increased drastically. In this paper, we conduct to the best of our knowledge, the first usability study of e-mail encryption apps on smartphones. We tested two mobile apps, one uses OpenPGP on Android and one uses S/MIME on iOS. In our usability study, we tested both apps with eleven participants and evaluated the usability with the System Usability Scale (SUS) and the Short Version of User Experience Questionnaire (UEQ-S). Our study shows that both apps have several usability issues which partly led to unencrypted e-mails and participants sending their passphrase instead of their public key.

more

The headache registry of the German Migraine and Headache Society (DMKG): baseline data of the first 1,351 patients

Ruscheweyh, Ruth; Klonowski, Theresa; Goßrau, Gudrun; Kraya, Torsten; Gaul, Charly...

The Journal of Headache and Pain 2022 23 (74).
DOI: 10.1186/s10194-022-01447-3


Open Access Peer Reviewed
 

Although good treatment options exist for many headache disorders, not all patients benefit and disability continues to be large. To design strategies for improving headache care, real-world data observing standard care is necessary. Therefore, the German Migraine and Headache Society (DMKG) has established the DMKG Headache Registry. Here we present methods and baseline data.

more

VANDALIR -- Vulnerability Analyses based on Datalog and LLVM-IR

Schilling, Joschua; Müller, Tilo (2022)

19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2022) 13358, 96–115.
DOI: 10.1007/978-3-031-09484-2_6


Peer Reviewed
 

Abstract. While modern-day static analysis tools are capable of finding standard vulnerabilities as well as complex patterns, implementing those tools is expensive regarding both development time and runtime performance. During the last years, domain specific languages like Datalog have gained popularity as they simplify the development process of analyses and rule sets dramatically. Similarly, intermediate representations like LLVM-IR are used to facilitate static source code analysis. In this paper, we present VANDALIR, a vulnerability analyzer and detector based on Datalog and LLVM-IR. VANDALIR is a static source code analyzer that allows to define and customize detection rules in a high-level, declarative way. We implement VANDALIR as a comprehensive static analysis tool, aiming to simplify vulnerability detection by a new combination of modern technologies. Besides the novel design of VANDALIR, we present a predefined detection rule set covering stack-based memory corruption, double free and format string vulnerabilities. As we show, our rule set achieves a detection rate of over 90% on test cases from the Juliet Test Suite, outperforming well-established vulnerability scanners such as the Clang Static Analyzer. Furthermore, we evaluated VANDALIR on open source projects and could reproduce existing vulnerabilities as well as identify previously unknown vulnerabilities.

more

Churn Management und Kundenrückgewinnung mit KI

Wagener, Andreas (2022)

Nerdwärts.de, 29.06.2022, https://nerdwaerts.de/2022/06/churn-management-und-kundenrueckgewinnung-mit-ki/.


Open Access
 

In vielen Branchen gilt immer noch das Paradigma, dass es deutlich kostengünstiger sei, bestehende Kunden zu binden, als neue zu gewinnen. In diesem Kontext kommt einem zielgerichteten, analytischen Churn Management eine besondere Bedeutung zu. KI und Methoden des maschinellen Lernens scheinen dafür wie geschaffen.

more

Ist die Digitalisierung abgeschlossen?

Schlingensiepen, Jörg; Boos, Franz-Xaver (2022)

Die neue Hochschule, 2022 (3), S. 18-21.



KI - Perspektiven: Erfahrungen, good news, Besorgniserregendes und Chancen der Zukunft

Wolff, Dietmar (2022)


more

Creating Value for Customers and Companies in a Changing World

Johnson, Catherine M.; Wengler, Stefan; Hildmann, Gabriele; Vossebein, Ulrich (2022)

Proceedings of the 15th Annual Conference of the Global Sales Science Institute, Jun8-11 2022, Frankfurt am Main, Germany.


Open Access Peer Reviewed
more

Telematikinfrastruktur in der ambulanten Pflege

Wolff, Dietmar (2022)


more

Innovative singel and bifurcated coronary stents: From braiding to flexebility

Kocaman, Recep; Miksch, Roxana; Anzer, Corinna; Großer, Karline; Ficker, Frank (2022)

AUTEX World Textile Conference.



Governance of Things: AI & DAOs in Politics - Utopia or Dystopia?

Wagener, Andreas (2022)

Conference Paper: The Royal Anthropological Institute, London: RAI2022: Anthropology, AI and the Future of Human Society. Panel: P28b: Blockchain Imaginaries: Techno-utopianism, dystopias, and the future-imagining of Web 3.0, 06.06.2022 (englisch), Conference Proceedings: https://therai.org.uk/conferences/anthropology-ai-and-the-future-of-human-society/programme#12019 , paper download: https://nomadit.co.uk/conference/rai2022/paper/64834/paper-download.pdf .
DOI: 10.57944/1051-129


Open Access Peer Reviewed
more

Governance of Things: AI & DAOs in Politics - Utopia or Dystopia?

Wagener, Andreas (2022)

Governance of Things: AI & DAOs in Politics - Utopia or Dystopia? Tagung „Anthropology, AI and the Future of Human Society”, 2022 des Royal Anthropological Institute, London, Panel des King’s College London „P28: Blockchain Imaginaries: Techno-utopianism, dystopias, and the future-imagining of Web 3.0”, 06.06.2022 .



Forschung und Entwicklung

Hochschule für Angewandte Wissenschaften Hof

Alfons-Goppel-Platz 1
95028 Hof

T +49 9281 409 - 4690
valentin.plenk[at]hof-university.de

Support of publications

Daniela Stock

T 09281 409 – 3042
daniela.stock.2[at]hof-university.de