Tableau-based and resolution-based calculi including their variants:
- regular tableau,
- strong and weak connection tableaus,
- lock resolution,
- SOS resolution,
- DPLL, theories (SMT prover) etc. and
- correctness and completeness proof of the different calculi
Implementation near techniques like efficient indexing of terms are also discussed.
- Dozent*in: Richard Bubel
- Dozent*in: Antonio Enrique Flores Montoya
- Dozent*in: Reiner Hähnle
Die Kommunikationsfähigkeit der Bevölkerung untereinander ist für die Bewältigung von Krisen von höchster Bedeutung. In dieser Veranstaltung wird der Aufbau von drahtlosen Kommunikationsnetzen von Null behandelt, d.h. unter der Annahme, dass keinerlei Kommunikationsinfrastruktur mehr vorhanden ist. Die Veranstaltung vermittelt theoretische Grundlagen aus den Bereichen der Nachrichtentechnik und des Amateurfunks und vertieft diese um die nötigen Kenntnisse, um Netze für den Krisenfall zu entwerfen und praktisch zu realisieren. Die vorgestellten Verfahren umfassen dabei Reichweiten von lokaler Kommunikation bis hin zur Kommunikation um den ganzen Globus, ohne auf bestehende Infrastruktur angewiesen zu sein.
Theoretische Übungen sowie das Durchführen von Messungen, der Aufbau von Schaltungen und die Vorführung von Funkverfahren in unserer Laborumgebung vertiefen die Veranstaltung.
- Dozent*in: Jiska Classen
- Dozent*in: Matthias Hollick
- Dozent*in: Matthias Thomas Schulz
The lecture offers an introduction into the perspectives, problems, methods and techniques of text technology. All examples and tutorials are based on the programming language Python.
- Dozent: Christian M. Meyer
- Dozent: Daniil Sorokin
- Dozent: Christian Stab
- Dozent*in: Kathrin Ballweg
- Dozent*in: Tatiana Landesberger von Antburg
- Dozent*in: Isabelle Maschik
- Dozent*in: Thorsten May
- Dozent*in: Marcel Wunderlich
The objective of the lecture is to establish both fundamental theoretical knowledge on Enterprise Architecture Management and a practical understanding of challenges arising in the context of complex Enterprise Architectures. To achieve the latter objective, some small real world Enterprise Architecture Management tasks in practice are illustrated.
- Dozent*in: Hüseyin Yüksel
Die Vorlesung gliedert sich in zwei Teile. In der ersten Hälfte der Vorlesung wird die Funktionsweise von Geräten, welche medizinische Bilder liefern (CT, MRI, PET, SPECT, Ultraschall), erklärt.
In der zweiten Hälfte werden verschiedene Bildverarbeitungsmethoden erklärt, welche typischerweise für die Bearbeitung medizinischer Bilder eingesetzt werden.
Qualifikationsziele / Lernergebnisse
Nach erfolgreichem Besuch der Veranstaltung haben die Studierenden einen Überblick über die Funktionsweise und die Möglichkeiten der modernen medizinischen Bildverarbeitung. Studierende sind dazu in der Lage, einfache bis mittlere medizinische Bildverarbeitungsaufgaben selbständig zu lösen.
Mathematische Grundlagen sind dringend empfehlenswert. Ferner wird empfohlen, die Vorlesung „Bildverarbeitung“ vorher besucht zu haben.
- Dozent*in: David Kügler
Mobile communications and wireless networking technology has seen a thriving development in recent years. Driven by technological advancements as well as application demands, various classes of communication networks emerged. This includes sensor networks, ad hoc networks, and cellular networks, each of which class represents a solution to important chapters in the mobile and wireless communications challenge.
Currently, we observe that the fixed, mainly infrastructure based networks are complemented and enhanced with infrastructure-less (ad-hoc) networking structures to form novel communication networks. At the same time users get more and more mobile and nomadic, they demand the ability to use applications anytime and anywhere, posing additional resource demands onto the network while on the move and changing the nature of applications. Obviously this gives rise to several challenging questions, which have to be solved first. Not only feasible applications and end-systems have to be developed but also smart network technology has to be devised.
The lecture addresses the above outlined problem scope. The characteristics/principles underlying the problem are discussed in detail and practical solutions are presented. Hereby our focus is on the network layer, which is often regarded as the glue of communication systems. In addition to describing the state of the art in technology we discuss actual research problems and learn about methodologies to approach such problems systematically.
- Dozent*in: Matthias Hollick
- Dozent*in: Robin Klose
- Dozent*in: Allyson Sim
- Dozent*in: Dingwen Yuan
The Web contains more than 10 billion indexable web pages, which can be retrieved via search queries. The lecture will present Natural Language Processing (NLP) methods to (1) automatically process large amounts of unstructured text from the web and (2) analyse the use of Web data as a resource for other NLP tasks.
- Dozent*in: José Roberto Garrido de Freitas
- Dozent*in: Hatem Mousselly Sergieh
- Dozent*in: Christian Stab
The integrated lecture Protection in Networked Systems — Trust, Resilience, and Privacy covers the topics of computational trust, resilient and anonymous networks, and collaborative defense mechanisms. By attending this course, the students will be able to understand the problems and solutions in the context of networked systems. The course content will consider the concept of End-to-End systems emphasizing on users, devices, networks, and applications or services.
Protection in Networked Systems: background, motivation, challenges
Trust (Computational Trust): models and mechanisms
Trust (Computational Trust): application in PKI, Cloud Computing, Reputation Systems, and Web Services
Trust: regret management and device comfort
Privacy: privacy definitions, models, data anonymity, communication anonymity
Privacy & Trust: privacy-preserving trust models, mechanisms, and application to IDM
Security & Economics
Resilience: models, network intrusion detection systems, collaborative intrusion detection systems, honeypots
- Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence, Elizabeth Chang, Tharam Dillon, and Farookh K. Hussain, 374 pages, 2006. ISBN: 978-0-470-01547-6
- Detailing Reviews and Ratings for Trust-Enhanced Composition, Florian Volk, 272 pages, 2015, ISBN: 9783736991668 (print), 9783736981669 (e-book)
- On anonymity in an electronic society: A survey of anonymous communication systems, Matthew Edman and Bülent Yener, ACM Computing Surveys, Vol. 42, Issue 1, 2009.
- Taxonomy and Survey of Collaborative Intrusion Detection, Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer, ACM Computing Surveys, Vol. 47 Issue 4, 2015.
- Selected book chapters and scientific publications
Knowledge of IT Security and Mathematics according to 1-4 semester of B.Sc. Computer Science
- Dozent*in: Jörg Daubert
- Dozent*in: Sheikh Mahbub Habib
The course deals with cutting edge development topics in the area of
network security with particular focus on mobile networked systems.
Beside a general overview it provides a deep insight into a special
development topic. The topics are selected according to the specific
working areas of the participating researchers and convey technical and
basic scientific competences.
- Dozent*in: Daniel Steinmetzer
In this seminar, recent developments on the formal foundations of
computer security will be presented and discussed. The seminar will be
based on recent research articles covering selected foundational aspects
of computer security. Each article will be presented by one
participant of the seminar and will then be discussed intensely by the
entire group of participants.
Formal foundations of computer security are necessary to clarify desirable security guarantees and possible security threats. For instance, formal security models can be used to capture security requirements precisely and can then serve as a reliable basis for verifying whether these requirements are met. Formal foundations of security can also serve as a basis for establishing security by design, including a precise definition of security requirements, a component-based development of secure systems, and the stepwise refinement of high-level system specifications to more-detailed specifications, ultimately to secure program code.
- composition, abstraction and refinement in computer security,
- information-flow security and information-flow control,
- language-based security,
- security models and properties,
- secure usage and usage control,
- quantitative security, and
- verifiable security.
- Dozent*in: Ximeng Li
- Dozent*in: Markus Tasch
The Seminar as well as the Advanced Seminar on Networking, Security,
Mobility, and Wireless Communications cover current research in the
given topic areas. Under supervision of the tutors, the seminar includes
studying, critically analyzing and discussing, summarizing, and
presenting selected research articles. Deliverables are a short
presentation, a final presentation, and a seminar paper. The Advanced
Seminar additionally emphasizes on the entire research process.
- Dozent*in: Daniel Steinmetzer
Please use firstname.lastname@example.org to contact the lecturers.
- Dozent*in: Florian Müller
- Dozent*in: Stefan Radomski
Can hundreds or thousands of untrained people do the job of an expert? This seminar will explore the benefits of this idea and investigate the techniques needed to make it work.
Natural language processing (NLP) requires vast amounts of annotated text data for training and evaluating algorithms, as well as for analysing language to further the underlying theory. Expert annotators have very limited time, but if we can break the annotation task into many simple sub-tasks, they can be distributed to a large number of non-experts workers. This is the idea behind crowdsourcing, which provides a way to annotate text data cheaply at larger scale, with commercial platforms such as Amazon Mechanical Turk providing access to many thousands of workers. However, it is far from trivial to obtain good annotations using crowdsourcing, so it has become an active research topic in fields such as machine learning and human-computer interaction. Intelligent crowdsourcing techniques aim to increase efficiency and improve the quality of results by solving problems such as annotation errors and untrusted workers in an automated manner.
This seminar will introduce the fundamentals of text annotation tasks and crowdsourcing, and review in depth the latest research into crowdsourcing methods, including the increasing use of statistical machine learning to optimise the crowdsourcing process. We will investigate how general approaches can be adapted to linguistic annotation tasks, and analyse their strengths, limitations and potential improvements.
- Dozent*in: Edwin Simpson
- Dozent*in: Christian Stab