Inst. Telekommunikationssysteme

303 Items

Recent Submissions
Computing in the Blink of an Eye: Current Possibilities for Edge Computing and Hardware-Agnostic Programming

Ghasemi, Mohammad Hossein ; Lucía, Oscar ; Lucia, Sergio (2020-02-28)

With the rapid advancements of the internet of things, systems including sensing, communication, and computation become ubiquitous. The systems that are built with these technologies are increasingly complex and therefore require more automation and intelligent decision-making, while often including contact with humans. It is thus critical that such interactions run smoothly in real time, and t...

Design and Implementation of centralized signal processing low latency massive MIMO SDR systems

Benzin, Andreas Florian (2020)

The following thesis presents a full digital massive MIMO (multiple-input and multiple-output) sub-6GHz cellular base station design and implementation which is capable of performing low latency zero forcing precoding on a single central field programmable gate array (FPGA) unit. The central signal processing single FPGA architecture reduces system size, complexity, power consumption, algorithm...

Sensafety: Crowdsourcing the Urban Sense of Safety

Rodriguez Garzon, Sandro ; Deva, Bersant (2019-11-06)

Today, community initiatives to improve the urban quality of life can be conducted in a more focused way because local authorities and urban planners are able to reveal urban hotspots through the investigation of location-annotated crime and accident data. However, urban areas, which according to well-recorded incident data are characterized by a high level of public safety, but which are gener...

Anomaly detection in cloud computing environments

Schmidt, Florian Johannes (2020)

Cloud computing is widely applied by modern software development companies. Providing digital services in a cloud environment offers both the possibility of cost-efficient usage of computation resources and the ability to dynamically scale applications on demand. Based on this flexibility, more and more complex software applications are being developed leading to increasing maintenance efforts ...

Autonomic self-healing in cloud computing platforms

Gulenko, Anton (2020)

The demand for increasingly rich services with high-level abstractions drives the field of cloud computing. In both research and industry, additional layers and components continuously increase the complexity of these modern platforms. In truth, the size of cloud systems has long surpassed what human administrators are able to manage. Nonetheless, users and customers expect high availability an...

Player identification in football videos using visual features and positional constellation models

Gerke, Sebastian (2020)

As football is one of the worlds most popular sports, the ever-increasing amount of football video content and the tight competition between teams lead to an increasing demand in tools for automatic analysis of football videos. The work presented here proposes an approach for automatic player identification in broadcast football videos. It is – to the best of the author’s knowledge – one of t...

Subject Access Request response data - 105 iOS and 120 Android apps

Kröger, Jacob Leon (2020-06-28)

This data shows how 225 app vendors responded to subject access requests in a longitudinal privacy study between the years 2015 and 2019. Details can be found in the corresponding publication: Jacob Leon Kröger, Jens Lindemann, and Dominik Herrmann. 2020. How do App Vendors Respond to Subject Access Requests? A Longitudinal PrivacyStudy on iOS and Android Apps. In The 15th International Confer...

Sensor Artificial Intelligence and its Application to Space Systems - A White Paper

Börner, Anko ; Heinz-Wilhelm, Hübers ; Kao, Odej ; Schmidt, Florian ; Becker, Sören ; Denzler, Joachim ; Matolin, Daniel ; Haber, David ; Lucia, Sergio ; Samek, Wojciech ; Triebel, Rudolph ; Eichstädt, Sascha ; Biessmann, Felix ; Kruspe, Anna ; Jung, Peter ; Kok, Manon ; Gallego, Guillermo ; Berger, Ralf (2020-06)

Information and communication technologies have accompanied our everyday life for years. A steadily increasing number of computers, cameras, mobile devices, etc. generate more and more data, but at the same time we realize that the data can only partially be analyzed with classical approaches. The research and development of methods based on artificial intelligence (AI) made enormous progress i...

Trace Link Recovery using Semantic Relation Graphs and Spreading Activation

Schlutter, Aaron ; Vogelsang, Andreas (2020-06)

Trace Link Recovery tries to identify and link related existing requirements with each other to support further engineering tasks. Existing approaches are mainly based on algebraic Information Retrieval or machine-learning. Machine-learning approaches usually demand reasonably large and labeled datasets to train. Algebraic Information Retrieval approaches like distance between tf-idf scores als...

Edge Replication Strategies for Wide-Area Distributed Processing

Semmler, Niklas ; Rost, Matthias ; Smaragdakis, Georgios ; Feldmann, Anja (2020-04-27)

The rapid digitalization across industries comes with many challenges. One key problem is how the ever-growing and volatile data generated at distributed locations can be efficiently processed to inform decision making and improve products. Unfortunately, wide-area network capacity cannot cope with the growth of the data at the network edges. Thus, it is imperative to decide which data should b...

Access control for M2M infrastructures in 5G networks

Corici, Andreea Ancuta (2020)

In telecommunication sector, the term Access Control (AC) was defined in the standard from 1997 and included multiple meanings, one of which is used in this context: Access Control is the function performed by the resource controller that allocates system resources in order to satisfy (user) requests. In this context, the resources are: (i) Internet Protocol (IP) (RFC0791) connectivity from a ...

Geocoding user queries

Clemens, Konstantin (2020)

While human users refer to locations using toponyms and addresses, computers rely on latitude and longitude coordinates, or similar, numerical encoding of location information. Geocoding is the process of resolving such toponyms and addresses into machine-friendly numerical encoding. Thus, wherever human users need to specify a location to a computer, geocoding is involved. The process, thereby...

What Am I Testing and Where? Comparing Testing Procedures based on Lightweight Requirements Annotations

Pudlitz, Florian ; Brokhausen, Florian ; Vogelsang, Andreas (2020-05-06)

[Context] The testing of software-intensive systems is performed in different test stages each having a large number of test cases. These test cases are commonly derived from requirements. Each test stages exhibits specific demands and constraints with respect to their degree of detail and what can be tested. Therefore, specific test suites are defined for each test stage. In this paper, the fo...

Radio resource management for automotive device-to-device communication in future cellular networks

Botsov, Mladen (2020)

Device-to-device (D2D) communication as an underlay to future cellular networks has been recently considered as an efficient cell offloading and capacity increasing solution. As such, it is envisioned to help serve the ever increasing cellular traffic. The gains offered by the D2D paradigm may enable the implementation of additional novel services in such a hybrid system. In particular, the loc...

Concepts and models for creating distributed multimedia applications and content in a multiscreen environment

Bassbouss, Louay (2020)

The continuing trend towards consuming media content on multiple screens such as smart TVs and smartphones is growing steadily. The key enabler for the adoption of multiscreen is the consumption of multimedia content on almost any device with a screen. It is becoming even more significant with the introduction of new media formats such as 360° videos featuring new device categories like head-mo...

Knowledge Extraction from Natural Language Requirements into a Semantic Relation Graph

Schlutter, Aaron ; Vogelsang, Andreas (2020-05)

Knowledge extraction and representation aims to identify information and to transform it into a machine-readable format. Knowledge representations support Information Retrieval tasks such as searching for single statements, documents, or metadata. Requirements specifications of complex systems such as automotive software systems are usually divided into different subsystem specifications. Nev...

Combined automotive safety and security pattern engineering approach

Martin, Helmut ; Ma, Z. ; Schmittner, Christoph ; Winkler, Bernhard ; Krammer, Martin ; Schneider, Daniel ; Amorim, Tiago ; Macher, Georg ; Kreiner, Christian (2020-01-11)

Automotive systems will exhibit increased levels of automation as well as ever tighter integration with other vehicles, traffic infrastructure, and cloud services. From safety perspective, this can be perceived as boon or bane - it greatly increases complexity and uncertainty, but at the same time opens up new opportunities for realizing innovative safety functions. Moreover, cybersecurity beco...

The State of Network Neutrality Regulation

Stocker, Volker ; Smaragdakis, Georgios ; Lehr, William (2020-03)

The Network Neutrality (NN) debate refers to the battle over the design of a regulatory framework for preserving the Internet as a public network and open innovation platform. Fueled by concerns that broadband access service providers might abuse network management to discriminate against third party providers (e.g., content or application providers), policymakers have struggled with designing ...

EAGLE—A Scalable Query Processing Engine for Linked Sensor Data

Nguyen Mau Quoc, Hoan ; Serrano, Martin ; Mau Nguyen, Han ; G. Breslin, John ; Le-Phuoc, Danh (2019-10-09)

Recently, many approaches have been proposed to manage sensor data using semantic web technologies for effective heterogeneous data integration. However, our empirical observations revealed that these solutions primarily focused on semantic relationships and unfortunately paid less attention to spatio–temporal correlations. Most semantic approaches do not have spatio–temporal support. Some of t...

Virtual Network Embedding Approximations: Leveraging Randomized Rounding

Rost, Matthias ; Schmid, Stefan (2019-09-23)

The Virtual Network Embedding Problem (VNEP) captures the essence of many resource allocation problems. In the VNEP, customers request resources in the form of Virtual Networks. An embedding of a virtual network on a shared physical infrastructure is the joint mapping of (virtual) nodes to physical servers together with the mapping of (virtual) edges onto paths in the physical network connectin...