Auflistung P246 - INFORMATIK 2015 nach Erscheinungsdatum
1 - 10 von 175
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragWerkzeuge zur Messung der datenschutzkonformen Einhaltung des Verarbeitungsstandorts in der Cloud(INFORMATIK 2015, 2015) Jäger, Bernd; Kraft, Reiner; Selzer, Annika; Waldmann, Ulrich
- KonferenzbeitragRoute planning for electric vehicles: taking energy efficiency, distance, and reloading opportunities into account(INFORMATIK 2015, 2015) Storandt, Sabine
- KonferenzbeitragPatterns im Umfeld prozessgetriebener Anwendungen zur Dokumentenverarbeitung mit(INFORMATIK 2015, 2015) Muhlsteff, Tim; Schäfer, AndreasAn prozessgetriebene Anwendungen werden hohe Anforderungen bezüglich der Wartbarkeit und Bedienbarkeit gestellt. Standardpatterns, angepasst an die Bedürfnisse einer prozessgetriebenen Anwendung, erleichtern es Entwicklern diese Anforderungen zu erfüllen. Konkret wird in diesem Paper gezeigt, dass sich das MVP-Pattern mithilfe eines EventBus-Systems unkompliziert mit Vaadin einsetzen lässt. Über eine Factory in Verbindung mit einer sicher gestalteten Verwendung von Reflections können zusätzliche User Tasks flexibel in der UI verwendet werden, ohne großen Bearbeitungsaufwand im Quellcode zu verursachen. Es wird ein dreiteiliges Design-Pattern vorgestellt, das dem Benutzer alle Informationen übersichtlich darstellt. Genehmigungsprozesse, die in der Modellierung ein Statuskonzept integrieren, ermöglichen eine gute Nutzung von Prozessen über Abteilungsgrenzen hinweg. Weiter ermöglicht BPMN die Prozess-Einzelverarbeitung eines Dokumentes mithilfe eines weiteren Prozesses, um eine Mengenverarbeitung mehrerer Dokumente zu ergänzen.
- KonferenzbeitragReducing Power Consumption in Fault Tolerant ASICs(INFORMATIK 2015, 2015) Krstic, MilosFault tolerance techniques have been traditionally used for specific applications such as space, avionic, or nuclear where the reliability is of utmost importance. Moreover, nowadays the reliability of nanoscale CMOS processes is reduced, and the power optimization goes beyond the standard worst-case boundaries. As a consequence, fault tolerance became the important factor also for the main stream industry. Handling faults is connected with some sort of redundancy either in hardware, timing, information, or by combination of previously defined methods. The immediate consequence of the redundancy is increased power consumption. As an example, the traditional N-modular redundancy techniques, such as TMR (triple modular redundancy) end up in the power overhead of about 300-400\% of original non-protected system. In order to limit the overhead the additional methods and techniques need to be applied. In this presentation the relevant state-of-the-art methods for reducing power consumption in fault tolerant chips will be presented. This will include the global overview of the traditional methods (such as improvements of TMR/DMR schemes) and novel methods for low-power ASICs (such as RAZOR). Moreover, the methods at different abstraction layers proposed at IHP for handling the power optimization in fault-tolerant ASICs will be presented. At the RTL level, selective fault tolerance can be applied limiting overhead by 50\% with still protecting 20\% of the inputs. Additionally, for the memories the overhead can be reduced by utilizing specific error correction codes. Finally, the fault tolerance can be introduced on application demand, dramatically reducing the power consumption when it is not needed. This can be performed on the pipeline level or even at the level of multi-processors. Such an example will be shown and IHP's FMP adaptive multi-core platform will be presented.
- KonferenzbeitragA fully distributed continuous planning approach for decentralized energy units(INFORMATIK 2015, 2015) Niee, Astrid; Sonnenschein, Michael
- KonferenzbeitragDeterrence theory in the cyber-century(INFORMATIK 2015, 2015) Bendiek, Annegret; Metzger, TobiasCyberattacks from a variety of perpetrators are constantly rising. To achieve restraint from attacks, deterrence theory has long been considered a valuable concept. How do criticisms of classical deterrence apply in this relatively new domain, and how does cyberdeterrence differ? Can offensive cyber capabilities be effective in deterring adversaries or must kinetic retaliation be “on the table”? Freedman differentiates deterrence-by-retaliation and deterrence-by-denial; immediate versus general; narrow versus broad; and central versus extended deterrence. The authors argue for denial and retaliation as complimentary parts of an overall strategy consisting of resistance, resilience and responses. Unlike nuclear deterrence, cyberdeterrence is not a game of great powers or that of nation-states alone and grey zones serve only rogue actors in the medium-term. Only the establishment of clear rules, similar to the Budapest Cybercrime Convention, enables effective responses to prevailing threats. Agreement on international rules on civilian critical infrastructures would move the superficial discussion on whether or not cyberattacks are legitimate to the more relevant debate on which targets are acceptable, providing clarity for the development of effective military strategy.
- KonferenzbeitragMathematical structures for modeling semantics, uncertainty, and cognitive processes(INFORMATIK 2015, 2015) Wirsching, Gunther
- KonferenzbeitragSmart Grids - Informatik für die Stromnetze der Zukunft(INFORMATIK 2015, 2015) Sonnenschein, Michael
- KonferenzbeitragDocumentational aspects of integrated management systems on the example of a plastics manufacturing company(INFORMATIK 2015, 2015) Rößler, Richard; Lachmann, Helen; Esswein, WernerDue to increasing competitive pressures and growing and increasing sustainabilityoriented stakeholder requirements, companies are forced to shape business processes efficiently by integrating their management systems (MS). Previous research provided more general, theoretically based insights with a lack of practical relevance and links to the theoretical knowledge base. In contrast, this paper provides a comprehensive compilation of current research results that have been obtained on the basis of a literature review, and compares them with the integration processes and problems of a practical case study. The following five specific problem areas were identified: (1) Different objectives, (2) concentration of responsibilities on a few people, (3) limited information value of key figures, (4) low synchronization of documents, and (5) absence of a coherent information database. The documentation and IT support being influenced the most. Findings regarding documentational aspects of integrated management systems (IMS) are discussed in the context of the current state of research. The urgent need for further research efforts in this area is underlined.
- KonferenzbeitragEin Überblick ber Einsatzbereiche von betrieblichen Umweltinformationssystemen (BUIS) in der Praxis(INFORMATIK 2015, 2015) Wohlgemuth, VolkerDer nachfolgende Beitrag gibt einen Überblick über die Einsatzbereiche von betrieblichen Umweltinformationssystemen (BUIS) in der Praxis und leitet hieraus sich ergebene Entwicklungspfade ab. Es wird hier vornehmlich der Status Quo der gegenwärtigen Softwarelandschaft im Bereich der Produktion und Planung betrieblicher Maßnahmen im Kontext des betrieblichen Umweltschutzes dargestellt. Zur besseren Strukturierung wurden ausgehend von den drei Hauptaufgabenbereichen der BUIS Untergruppen gebildet, mittels derer sich die vielen verschiedenen ausgewählten Vertreter der BUIS besser zuordnen ließen. Hieraus werden Fragen in Bezug auf die zukünftige Entwicklung von BUIS abgeleitet.