Publications at the Faculty of Computer Science and Automation since 2015

Results: 1919
Created on: Wed, 24 Apr 2024 23:11:54 +0200 in 0.0806 sec


Kläbe, Steffen; Hagedorn, Stefan; Sattler, Kai-Uwe
Exploration of approaches for in-database ML. - Konstanz : University of Konstanz. - 1 Online-Ressource (Seite 311-322)Online-Ausgabe: Advances in Database Technology - Volume 26 : proceedings of the 26th International Conference on Extending Database Technology (EDBT), 28th March-31st March, 2023, ISBN 978-3-89318-093-6

http://dx.doi.org/10.48786/edbt.2023.25
Schatz, David; Altheide, Friedrich; Koerfgen, Hedwig; Roßberg, Michael; Schäfer, Günter
Virtual private networks in the quantum era: a security in depth approach. - In: SECRYPT 2023, (2023), S. 486-494

Conventional asymmetric cryptography is threatened by the ongoing development of quantum computers. A mandatory countermeasure in the context of virtual private networks (VPNs) is to use post-quantum cryptography (PQC) as a drop-in replacement for the authenticated key exchange in the Internet Key Exchange (IKE) protocol. However, the results of the ongoing cryptanalysis of PQC cannot be predicted. Consequently, this article discusses orthogonal methods for quantum-resistant key exchanges, like quantum key distribution (QKD) and multipath key reinforcement (MKR). As each method has limitations when used on its own, we conclude that it is best to maximize security by combining all available sources of symmetric key material to protect traffic inside a VPN. As one possible realization, we propose a lightweight proxy concept that uses available symmetric keys, like QKD and MKR keys, to implement a transparent cryptographic tunnel for all IKE packets, and consequently for PQC key exchang es. In contrast to combining PQC and symmetric key material within the IKE protocol, our approach provides security in depth: If secure symmetric keys are available, attacks on IKE and hence on PQC algorithms are infeasible. But even otherwise, the security properties of IKE and thus PQC are not weakened, so the overall security of the VPN is guaranteed to increase.



https://doi.org/10.5220/0012121800003555
Altheide, Friedrich; Buttgereit, Simon; Roßberg, Michael; Schäfer, Günter
Increasing resilience of SD-WAN by distributing the control plane. - In: Proceedings of the 14th International Conference on Network of the Future: NoF 2023, (2023), S. 10-18

Modern WAN interconnects utilize SD-WAN to automatically respond to network changes and improve link utilization, latency, and availability. Therefore, they incorporate some kind of centralized controller that collects network state from all managed gateways, calculates suitable forwarding actions, and distributes them accordingly. However, this limits the robustness and availability of the network control plane, especially in the event of node or partial network outages. In this paper, we propose a distributed and highly robust SD-WAN control plane without any central or regional controller. Our solution can handle arbitrary device failures as well as network partitioning. The distributed forwarding decisions are based on user-defined, dynamically evaluated path cost functions, and consider not only path quality but also quality fluctuations. The evaluation shows that our approach can handle several thousand SD-WAN gateways and multiple hundred network policies in terms of computation. Yet, it also highlights that distributing all decisions requires additional communication bandwidth, which may limit the number of supported connections in certain scenarios.



https://doi.org/10.1109/NoF58724.2023.10302816
Saleh, Saad; Koldehofe, Boris
The future is analog: energy-efficient cognitive network functions over memristor-based analog computations. - In: HotNets '23, (2023), S. 254-262

Current network functions build heavily on fixed programmed rules and lack capacity to support more expressive learning models, e.g. brain-inspired Cognitive computational models using neuromorphic computations. The major reason for this shortcoming is the huge energy consumption and limitation in expressiveness by the underlying TCAM-based digital packet processors. In this research, we show that recent emerging technologies from the analog domain have a high potential in supporting network functions with energy efficiency and more expressiveness, so called cognitive functions. We propose an analog packet processing architecture building on a novel technology named Memristors. We develop a novel analog match-action memory called Probabilistic Content-Addressable Memory (pCAM) for supporting deterministic and probabilistic match functions. We develop the programming abstractions and show the support of pCAM for an active queue management-based analog network function. The analysis over an experimental dataset of a memristor chip showed only 0.01 fJ/bit/cell of energy consumption for corresponding analog computations which is 50 times less than digital computations.



https://doi.org/10.1145/3626111.3628192
Meyer, Friedrich; Benisch, Michael F.; Baueregger, Florian; Zimmermann, Armin
A cross-company architecture for cyber-physical production systems and its industrial use. - In: 2023 IEEE 64th International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS), (2023), insges. 6 S.

Cyber-physical systems are expected to be an enabler for better control of production systems. They require a combination of heterogeneous sensors and systems processing data from various sources. We present an architecture for cyber-physical production systems for cross-company sensor integration, ensuring the necessary data safety. Its design targets generalizability and performance. A real-life industrial application in the area of optical components polishing demonstrates the benefits.



https://doi.org/10.1109/ITMS59786.2023.10317762
Cheng, Nuo; Li, Xiaohan; Luo, Chuanyu; Liu, Xiaotong; Li, Han; Lei, Shengguang; Li, Pu
PSCO: a point cloud scene classification model based on contrast learning. - In: 2023 IEEE International Conference on Image Processing, (2023), S. 925-929

Point cloud LiDAR data are increasingly used for detecting road situations for autonomous driving. As data acquisition is much cheaper than data annotation, the classification of the collected data and selecting a part of it for annotation is an important pre-processing step. In this study, we propose a self-supervised method and a corresponding package (PSCO) to classify driving scenes in large-scale point cloud data. We propose a contrastive learning approach which encodes each single frame of the collected raw data into a feature vector that can be effectively classified. Using this approach, the number of necessary frames for annotation to train scene-based models can be significantly reduced. In addition, our method can also select specific scenario data for different individual training stages.



https://doi.org/10.1109/ICIP49359.2023.10222104
Zaryab, Muhammad Ateeque; Ng, Chuen Rue
Optical character recognition for medical records digitization with deep learning. - In: 2023 IEEE International Conference on Image Processing, (2023), S. 3260-3263

The importance of document digitization has increased due to recent technological advancements, including in the medical field. Digitization of medical records plays a vital role in the healthcare sector as it helps expedite emergency treatment. Due to the scarcity of published studies and public German textual resources, a medical records database with German handwriting was collected and digitized. In this study, document digitization was accomplished by implementing deep learning, region of interest (ROI) detection, and optical character recognition (OCR) on a dataset containing medical forms filled with German and English characters. To find the best model for ROI detection, YOLOv5, and SSDResNet50 models were utilized and compared with YOLOv5 producing a better mean average precision (mAP) of 0.91. OCR was then carried out on the output from YOLOv5 with two different methods again for comparison. The Gated-CNN-BLSTM algorithm yielded a character error rate (CER) of 9%, while transformer-based OCR (TrOCR) achieved a CER of 6%. The proposed system could be implemented and further tested in local hospitals, with the OCR dictionary being expandable to include other Roman character-based languages.



https://doi.org/10.1109/ICIP49359.2023.10222038
Kuske, Dietrich;
A class of rational trace relations closed under composition. - In: 43rd IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, (2023), S. 20:1-20:20

Rational relations on words form a well-studied and often applied notion. While the definition in trace monoids is immediate, they have not been studied in this more general context. A possible reason is that they do not share the main useful properties of rational relations on words. To overcome this unfortunate limitation, this paper proposes a restricted class of rational relations, investigates its properties, and applies the findings to systems equipped with a pushdown that does not hold a word but a trace.



https://doi.org/10.4230/LIPIcs.FSTTCS.2023.20
Müller, Steffen; Stephan, Benedict; Müller, Tristan; Groß, Horst-Michael
Robust perception skills for autonomous elevator operation by mobile robots. - In: Proceedings of the 11th European Conference on Mobile Robots, (2023), insges. 7 S.

Autonomous mobile service robots with transportation tasks are often restricted to work on a single floor, since remote access to elevators is expensive to integrate for reasons of safety certification. Therefore, already ten years ago first robots have been enabled to use the human interface for riding an elevator. This requires a variety of perception and manipulation capabilities as well as social skills when it comes to interaction with other people who want to use the elevator too. We summarize the progress in solving the specific tasks of detecting and localizing the required buttons to press robustly. A deep-learning approach for detecting buttons in images is combined with a verification based on predefined knowledge on button arrangements in the elevator's control panels. Also perception of the elevator's state and our realization of the robot's elevator riding capabilities are discussed.



https://doi.org/10.1109/ECMR59166.2023.10256353
Fischer, Gerald; Kofler, Markus; Baumgarten, Daniel
Implementation of N-Interval fourier transform analysis - application to compound action potentials. - In: MethodsX, ISSN 2215-0161, Bd. 11 (2023), 102441, S. 1-10

N-Interval Fourier Transform Analysis (N-FTA) allows for spectral separation of a periodic target signal from uncorrelated background interference. A N-FTA pseudo-code is presented. The spectral resolution is defined by the repetition rate of the near periodic signal. Acceptance criteria for spectral targets were defined such that the probability of accepting false positives is less than 1/1500. Simulated and recorded neural compound action potentials (CAPs) were investigated. Simulated data allowed for comparison with reference solutions demonstrating the stability of N-FTA at conditions being comparable to real world data. Background activity was assessed with small errors. Evoked target components were assessed down to power spectral density being approximately N times below the background level. Validation was completed investigating a measured CAP. In neurophysiological recordings, this approach allows for accurate separation of near periodic evoked activity from uncorrelated background activities for frequencies below 1kHz. • N-FTA allows for spectral separation of a periodic target signal from uncorrelated interference by analyzing a segment containing N target signal repetitions. • A MATLAB implementation of the algorithm is provided along with simulated and recorded data. • N-FTA was successfully validated using simulated and measured data for CAPs.



https://doi.org/10.1016/j.mex.2023.102441