Fakultät 4 Elektrotechnik und Informatik
Community home page

912 Submissions in this community.

Recent Submissions
Interdigitated back-contacts for poly-crystalline thin-film silicon solar cells on glass

Sonntag, Paul (2017)

This thesis is about the liquid phase crystallization (LPC) technology to produce solar cell absorbers of 10 − 40 µm thickness directly on glass, the development of interdigitated back-contact (IBC...

An empirical evaluation of misconfiguration in Internet services

Fiebig, Tobias (2017)

Within the past thirty years we have seen computers rise from room sized niche equipment to handy pocket sized devices found in every household. At the same time there has been a significant increa...

Improving and interpreting machine learning algorithms with applications

Vidovic, Marina Marie-Claire (2017)

Advancing understanding and interpretation of machine learning algorithms has recently been receiving much attention. Although classification systems achieve high prediction accuracies and are used...

Verfahren zur optimierten Steuerung und Bewertung von thermischen und elektromobilen Verbrauchern im Intelligenten Netz

Klein, Felix (2017)

Demand Response kann einen wichtigen Beitrag leisten, erneuerbare Energie in das Energieversorgungssystem zu integrieren und die mit der Bereitstellung der elektrischen Energie verbundenen CO2-Emis...

Video processing for panoramic streaming using HEVC and its scalable extensions

Sánchez de la Fuente, Yago; Skupin, Robert; Schierl, Thomas (2016)

Panoramic streaming is a particular way of video streaming where an arbitrary Region-of-Interest (RoI) is transmitted from a high-spatial resolution video, i.e. a video covering a very “wide-angle”...

Autonomous algorithms for centralized and distributed interference coordination: a virtual layer-based approach

Kasparick, Martin; Wunder, Gerhard (2014)

Interference mitigation techniques are essential for improving the performance of interference limited wireless networks. In this paper, we introduce novel interference mitigation schemes for wirel...

Evaluating embodied conversational agents in multimodal interfaces

Weiss, Benjamin; Wechsung, Ina; Kühnel, Christine; Möller, Sebastian (2015)

Based on cross-disciplinary approaches to Embodied Conversational Agents, evaluation methods for such human-computer interfaces are structured and presented. An introductory systematisation of eval...

Prediction of difficulty levels in video games from ongoing EEG

Neumann, Laura; Schultze-Kraft, Matthias; Dähne, Sven; Blankertz, Benjamin (2017)

Real-time assessment of mental workload from EEG plays an important role in enhancing symbiotic interaction of human operators in immersive environments. In this study we thus aimed at predicting t...

Maritime cognitive workload assessment

Miklody, Daniel; Uitterhoeve, Wendie M.; van Heel, Dimitri; Klinkenberg, Kerstin; Blankertz, Benjamin (2017)

The human factor plays the key role for safety in many industrial and civil every-day operations in our technologized world. Human failure is more likely to cause accidents than technical failure, ...

Accelerated secure GUI for virtualized mobile handsets

Danisevskis, Janis (2017)

Mobile handsets, especially so-called smartphones, have become an indispensable commodity in day-to-day life. However, their growing versatility came at the cost of ever-increasing complexity, and ...

Empirical analysis of the effects and the mitigation of IPv4 address exhaustion

Richter, Philipp (2017)

IP addresses are essential resources for communication over the Internet. In IP version 4, an address is represented by 32 bits in the IPv4 header; hence there is a finite pool of roughly 4B addres...

Identifier Gold Standard for NTCIR 11 Math Wikipedia Dataset

Schubotz, Moritz (2016-07-18)

Mathematical formulae are essential in science, but face challenges of ambiguity, due to the use of a small number of identifiers to represent an immense number of concepts. Corresponding to word s...

Soft robotic hands for compliant grasping

Deimel, Raphael (2017)

The thesis considers the problem of grasping for autonomous robots, with a focus on the design and construction of robotic hands and grippers. The approach we take is to fundamentally reconsider th...

On decomposability in robot reinforcement learning

Höfer, Sebastian (2017)

Reinforcement learning is a computational framework that enables machines to learn from trial-and-error interaction with the environment. In recent years, reinforcement learning has been successful...

Decoding implicit information from the electroencephalogram with methods from brain-computer interfacing

Wenzel, Markus (2017)

Research on brain-computer interfacing (BCI) has demonstrated that specific brain activity patterns can be detected in the electroencephalogram (EEG) with multivariate methods from machine learning...

A secure system architecture for measuring instruments under legal control

Peters, Daniel (2017)

In many fields, application software must be stable and withstand attacks. Due to the trend of the "Internet of Things" these attacks increase in all areas where devices are connected via the open ...

Waveguide integrated MQW p-i-n photodiodes

Zhou, Gan (2017)

In this work, waveguide integrated multiple quantum well p-i-n photodiodes are developed and characterized. Compared to bulk photodiodes, multiple quantum well photodiodes have special properties i...

Augmenting mathematical formulae for more effective querying & efficient presentation

Schubotz, Moritz (2017)

Mathematical Information Retrieval (MIR) is a research area that focuses on the Information Need (IN) of the Science, Technology, Engineering and Mathematics (STEM) domain. Unlike traditional Infor...

Web content delivery, monetization, and search

Pujol Gil, Enric (2017)

The World Wide Web has become the most used information system worldwide. It has fueled an unprecedented commercialization of the Internet by turning this network system designed for academic data ...

Multi-factor authentication based on movement and gesture

Roshandel, Mehran (2017)

Security and usability are in constant touch with each other. It is in the nature of security methods that, the more secure they are, the more they complicate interactions. Yet users dislike using ...