Publications at the Faculty of Computer Science and Automation since 2015

Results: 1924
Created on: Sat, 27 Apr 2024 23:11:18 +0200 in 0.0633 sec


Amthor, Peter; Döring, Ulf; Fischer, Daniel; Genath, Jonas; Kreuzberger, Gunther
Erfahrungen bei der Integration des Autograding-Systems CodeOcean in die universitäre Programmierausbildung. - In: Proceedings of the Sixth Workshop "Automatische Bewertung von Programmieraufgaben" (ABP 2023), (2023), S. 67-74

Eine effektive und effiziente universitäre Programmierausbildung erfordert zunehmend den Einsatz automatisierter Bewertungssysteme. Im Rahmen des Projekts examING erprobt das Teilprojekt AutoPING den Einsatz des quelloffenen Autograding-Systems CodeOcean für übergreifende Lehrangebote und Prüfungen an der TU Ilmenau mit dem Ziel, selbstgesteuertes und kompetenzorientiertes Lernen zu ermöglichen und zu fördern. Der Beitrag gibt einen Überblick über erste Projekterfahrungen bei der Adaption didaktischer Szenarien in der Programmierausbildung hin zu testgetriebener Softwareentwicklung sowie der Generierung von Feedback. Es werden wesentliche Erkenntnisse aus Sicht der Studierenden und Lehrenden erörtert, Herausforderungen und Lösungsansätze zur Integration und Erweiterung von CodeOcean für neue Anwendungsfelder diskutiert sowie zukünftige Perspektiven eröffnet.



https://doi.org/10.18420/abp2023-9
Hammer, Maximilian; Maschotta, Ralph; Wichmann, Alexander; Jungebloud, Tino; Bedini, Francesco; Zimmermann, Armin
PSCS4CPP: a generative PSCS implementation for C++. - In: Model-driven engineering and software development, (2023), S. 84-108

Since the early 2000s, Model-driven engineering has aimed to accomplish executable UML models. With fUML and PSCS, the Object Management Group (OMG) published standardized specifications of precise semantics for certain parts of UML in the form of metamodels, which form an execution environment. A certain characteristic of these environments is that static information about a model is analyzed and evaluated during runtime. With composite structures being a concept for describing structural properties of a model, the majority of execution semantics specified by PSCS concern analysis and processing of such static information about the model’s fine-grained structure. Thus, the PSCS specification appears suitable for a generative realization approach. Using Model-To-Text-Transformation to generate source code, which serves as an input for the actual execution environment, the runtime level of model executions can be relieved by outsourcing analysis and processing of static information to the level of code generation. By inserting this preprocessing step, the performance of the actual model execution at runtime can be improved. This paper introduces an implementation of the PSCS specification for C++ based on code generation using Model-to-Text-Transformation. This also includes a generative approach to realize an extension mechanism of the fUML and PSCS execution environments by introducing user-defined semantic execution strategies. The proposed PSCS implementation was developed as a part of the MDE4CPP project. Moreover, this paper presents a set of test models validating the correct functionality of the implementation as well as a performance benchmark. Finally, analysis results of an application example for the presented realization are evaluated and discussed.



Baumstark, Alexander; Jibril, Muhammad Attahir; Sattler, Kai-Uwe
Accelerating large table scan using Processing-In-Memory technology. - In: Datenbank-Spektrum, ISSN 1610-1995, Bd. 23 (2023), 3, S. 199-209

Today’s systems are capable of storing large amounts of data in main memory. Particularly, in-memory DBMSs benefit from this development. However, the processing of data from the main memory necessarily has to run via the CPU. This creates a bottleneck, which affects the possible performance of the DBMS. Processing-In-Memory (PIM) is a paradigm to overcome this problem, which was not available in commercial systems for a long time. With the availability of UPMEM, a commercial product is finally available that provides PIM technology in hardware. In this work, we focus on the acceleration of the table scan, a fundamental database query operation. We show and investigate an approach that can be used to optimize this operation by using PIM. We evaluate the PIM scan in terms of parallelism and execution time in benchmarks with different table sizes and compare it to a traditional CPU-based table scan. The result is a PIM table scan that outperforms the CPU-based scan significantly.



https://doi.org/10.1007/s13222-023-00456-z
Warsito, Indhika Fauzhan; Komosar, Milana; Bernhard, Maria Anne; Fiedler, Patrique; Haueisen, Jens
Flower electrodes for comfortable dry electroencephalography. - In: Scientific reports, ISSN 2045-2322, Bd. 13 (2023), 16589, S. 1-15

Dry electroencephalography (EEG) electrodes provide rapid, gel-free, and easy EEG preparation, but with limited wearing comfort. We propose a novel dry electrode comprising multiple tilted pins in a flower-like arrangement. The novel Flower electrode increases wearing comfort and contact area while maintaining ease of use. In a study with 20 volunteers, we compare the performance of a novel 64-channel dry Flower electrode cap to a commercial dry Multipin electrode cap in sitting and supine positions. The wearing comfort of the Flower cap was rated as significantly improved both in sitting and supine positions. The channel reliability and average impedances of both electrode systems were comparable. Averaged VEP components showed no considerable differences in global field power amplitude and latency, as well as in signal-to-noise ratio and topography. No considerable differences were found in the power spectral density of the resting state EEGs between 1 and 40 Hz. Overall, our findings provide evidence for equivalent channel reliability and signal characteristics of the compared cap systems in the sitting and supine positions. The reliability, signal quality, and significantly improved wearing comfort of the Flower electrode allow new fields of applications for dry EEG in long-term monitoring, sensitive populations, and recording in supine position.



https://doi.org/10.1038/s41598-023-42732-8
Koldehofe, Boris;
Accelerating the performance of distributed stream processing systems with in-network computing. - In: DEBS 2023, (2023), S. 3

The performance of stream processing systems heavily relies on the ability to move data between stream processing operators efficiently. The softwarization of computer networks offers a huge potential for distributed systems to accelerate the performance of distributed stream processing operators by minimizing data movements and accelerating the execution of operators. Yet, using methods of in-network computing to accelerate middleware services like stream processing systems often conflict with the famous end-to-end principle. Therefore, in this talk, we will focus on abstractions that allow executing computations on heterogeneous resources of network elements and discuss how these abstractions can support stream processing systems. In particular, we highlight and introduce recent findings in distributed data stream processing, network function virtualization, and realtime packet streaming. We show how different paradigms and programming models support accelerating performance by better utilizing the capabilities of in-network computing elements. Moreover, we give an outlook on how future developments can change how distributed computing can be adaptively performed over networked infrastructures.



https://doi.org/10.1145/3583678.3603443
Lotfian Delouee, Majid; Koldehofe, Boris; Degeler, Viktoriya
Poster: Towards pattern-level privacy protection in distributed complex event processing. - In: DEBS 2023, (2023), S. 185-186

In event processing systems, detected event patterns can reveal privacy-sensitive information. In this paper, we propose and discuss how to integrate pattern-level privacy protection in event-based systems. Compared to state-of-the-art approaches, we aim to enforce privacy independent of the particularities of specific operators. We accomplish this by supporting the flexible integration of multiple obfuscation techniques and studying deployment strategies for privacy-enforcing mechanisms. In addition, we share ideas on how to model the adversary's knowledge to select appropriate obfuscation techniques for the discussed deployment strategies. Initial results indicate that flexibly choosing obfuscation techniques and deployment strategies is essential to conceal privacy-sensitive event patterns accurately.



https://doi.org/10.1145/3583678.3603278
Lotfian Delouee, Majid; Koldehofe, Boris; Degeler, Viktoriya
AQuA-CEP: adaptive quality-aware complex event processing in the Internet of Things. - In: DEBS 2023, (2023), S. 13-24

Sensory data profoundly influences the quality of detected events in a distributed complex event processing system (DCEP). Since each sensor's status is unstable at runtime, a single sensing assignment is often insufficient to fulfill the consumer's quality requirements. In this paper, we study in the context of AQuA-CEP the problem of dynamic quality monitoring and adaptation of complex event processing by active integration of suitable data sources. To support this, in AQuA-CEP, queries to detect complex events are supplemented with consumer-definable quality policies that are evaluated and used to autonomously select (or even configure) suitable data sources of the sensing infrastructure. In addition, we studied different forms of expressing quality policies and analyzed how it affects the quality monitoring process. Various modes of evaluating and applying quality-related adaptations and their impacts on correlation efficiency are addressed, too. We assessed the performance of AQuA-CEP in IoT scenarios by utilizing the notion of the quality policy alongside the query processing adaptation using knowledge derived from quality monitoring. The results show that AQuA-CEP can improve the performance of DCEP systems in terms of the quality of results while fulfilling the consumer's quality requirements. Quality-based adaptation can also increase the network's lifetime by optimizing the sensor's energy consumption due to efficient data source selection.



https://doi.org/10.1145/3583678.3596884
Räth, Timo; Bedini, Francesco; Sattler, Kai-Uwe; Zimmermann, Armin
Demo: Interactive performance exploration of stream processing applications using colored Petri nets. - In: DEBS 2023, (2023), S. 191-194

Stream processing is becoming increasingly important as the amount of data being produced, transmitted, processed, and stored continues to grow. One of the greatest difficulties in designing stream processing applications is estimating the final runtime performance in production. This is often complicated by differences between the development and final execution environments, unexpected outliers in the incoming data, or subtle long-term problems such as congestion due to bottlenecks in the pipeline. In this demonstration, we present an automated tool workflow for interactively simulating and exploring the performance characteristics of a stream processing pipeline in real-time. Changes to input data, pipeline structure, or operator configurations during the simulation are immediately reflected in the simulation results, allowing to interactively explore the robustness of the pipeline to outliers, changes in input data, or long-term effects.



https://doi.org/10.1145/3583678.3603280
Gabash, Aouss;
Energy market transition and climate change: a review of TSOs-DSOs C+++ framework from 1800 to present. - In: Energies, ISSN 1996-1073, Bd. 16 (2023), 17, 6139, S. 1-24

In response to the pressing global challenges around climate change and the imperative of transitioning the energy market towards sustainability, this paper presents a comprehensive review starting from the late 18th century. The study examines the pivotal role of Transmission System Operators (TSOs) and Distribution System Operators (DSOs) in shaping the evolving energy landscape, with a specific emphasis on the C+++ Framework. This framework emphasizes coordination, cooperation, and collaboration between TSOs and DSOs to achieve sustainable energy systems through the integration of renewable energy technologies, storage systems, and efficient energy demand management. In addition, the review provides a historical overview of global warming from 1800 to the present, highlighting key events and developments related to greenhouse gas emissions. Furthermore, the paper delves into the significance of international agreements such as the Paris Agreement and the importance of reducing greenhouse gas emissions for a sustainable future. Recognizing the vital role of the C+++ Framework, the paper concludes with a discussion of future hybrid sustainable technologies incorporating various storage and efficient lighting technologies that can optimize energy management and reduce carbon emissions. This research aims to contribute valuable insights to inform energy policy and decision-making processes for a reliable, efficient, and sustainable energy delivery system.



https://doi.org/10.3390/en16176139
Schatz, David; Roßberg, Michael; Schäfer, Günter
Evaluating statistical disclosure attacks and countermeasures for anonymous voice calls. - In: ARES 23, (2023), 22, insges. 10 S.

Assuming a threat model of a global observer, statistical disclosure attacks have been proposed to efficiently de-anonymize communication relationships in text-based mix networks over time. It is commonly assumed that such attacks are also able to disclose call relationships in anonymous communication networks (ACNs) that support voice calls. One straightforward countermeasure is to expect users to permanently send and receive packets that mimic a Voice over IP (VoIP) call. However, this is not practical in real world scenarios, like on mobile devices. In this article, we adapt one specific statistical disclosure attack (Z-SDA-MD) to voice calls and quantitatively study less resource-intensive countermeasures. As base countermeasure, we evaluate a round-based communication model, corresponding to a timed mix. A simulation study of this scenario shows that the Z-SDA-MD is not well suited for a general disclosure of call relationships because of too many false positives. Nevertheless, the attack is able to correctly identify the most frequent relationships. Still, the accuracy in that regard may significantly be decreased by increasing the duration of one round, by decoupling actions (call setup and teardown) of caller and callee by a random number of rounds, and by occasional fake calls to a fixed set of “fake friends”. Overall, our study shows that anonymous voice calls may be implemented with an acceptable trade-off between anonymity, call setup time, and bandwidth overhead.



https://doi.org/10.1145/3600160.3600186