E-Dissertationen: Suche
Anzeige der Dokumente 1-10 von 196
Don't Blame Developers! Examining a Password-Storage Study Conducted with Students, Freelancers, and Company Developers
(2020-12-11)
Authentication systems are a major concern for the usable security and privacy community. Twenty years ago, the seminal work “Users Are Not The Enemy” [1] by Adams and Sasse initiated a user-centred approach to research. ...
The Semantic Shadow: Combining User Interaction with Context Information for Semantic Web-Site Annotation
(2011-07-07)
This thesis develops the concept of the Semantic Shadow (SemS), a model for managing contentual and structural annotations on web page elements and their values. The model supports a contextual weighting of the annotated ...
Synthesizing Human Motions
(2012-04-05)
In this work different data-driven methods for the synthesis of natural human full body motions are presented. My research in this area was based on the following fundamental questions: Suppose we have all the motion capture ...
Domain Adaptation for Image Recognition and Viewpoint Estimation
(2020-09-08)
Image-based recognition tasks require in their training phase large amounts of data to capture as much visual traits as possible. In many situations, however, the collection of image data implies a tedious effort or, even ...
In Silico Facets of Biochemical Research: Accounts from Protein Folding and Protein-Ligand Interaction Studies
(2020-09-04)
Exponential advancements in computer technology over the last five decades have ubiquitously benefited science and humanity as a whole. Consequent beneficiaries of this surge of computational power include all subfields ......
Design and Analysis of Opaque Signatures
(2011-07-04)
Digital signatures were introduced to guarantee the authenticity and integrity of the underlying messages. A digital signature scheme comprises the key generation, the signature, and the verification algorithms. The key ......
The Efficient Discovery of Interesting Closed Pattern Collections
(2011-11-18)
Enumerating closed sets that are frequent in a given database is a fundamental data mining technique that is used, e.g., in the context of market basket analysis, fraud detection, or Web personalization. There are two ...
Surface Deformation Potentials on Meshes for Computer Graphics and Visualization
(2011-10-11)
Shape deformation models have been used in computer graphics primarily to describe the dynamics of physical deformations like cloth draping, collisions of elastic bodies, fracture, or animation of hair. Less frequent is ...
Modeling Visit Potential of Geographic Locations Based on Mobility Data
(2012-05-07)
Every day people interact with the environment by passing or visiting geographic locations. Information about such entity-location interactions can be used in a number of applications and its value has been recognized by ...
Reconstruction of Human Motions Based on Low-Dimensional Control Signals
(2012-08-09)
This thesis addresses the question to what extent it is possible to reconstruct human full-body motions from very sparse control signals.
To this end, we first investigate the use of multi-linear representations of ...
To this end, we first investigate the use of multi-linear representations of ...