The course discusses the techniques behind automated theorem provers. Among others the topics are:

Tableau-based and resolution-based calculi including their variants: 

  • regular tableau, 
  • strong and weak connection tableaus, 
  • lock resolution, 
  • SOS resolution, 
  • DPLL, theories (SMT prover) etc. and
  • correctness and completeness proof of the different calculi 

Implementation near techniques like efficient indexing of terms are also discussed.


Die Kommunikationsfähigkeit der Bevölkerung untereinander ist für die Bewältigung von Krisen von höchster Bedeutung. In dieser Veranstaltung wird der Aufbau von drahtlosen Kommunikationsnetzen von Null behandelt, d.h. unter der Annahme, dass keinerlei Kommunikationsinfrastruktur mehr vorhanden ist. Die Veranstaltung vermittelt theoretische Grundlagen aus den Bereichen der Nachrichtentechnik und des Amateurfunks und vertieft diese um die nötigen Kenntnisse, um Netze für den Krisenfall zu entwerfen und praktisch zu realisieren. Die vorgestellten Verfahren umfassen dabei Reichweiten von lokaler Kommunikation bis hin zur Kommunikation um den ganzen Globus, ohne auf bestehende Infrastruktur angewiesen zu sein. 
Theoretische Übungen sowie das Durchführen von Messungen, der Aufbau von Schaltungen und die Vorführung von Funkverfahren in unserer Laborumgebung vertiefen die Veranstaltung. 

The lecture offers an introduction into the perspectives, problems, methods and techniques of text technology. All examples and tutorials are based on the programming language Python.

This lecture provides an overview about the concepts and methods of Enterprise Architecture Management, including a prominent framework called TOGAF. An introduction into theoretical foundations like architectural models and metamodels (ISO/IEC/IEEE 42010) is given, and the need of Enterprise Architectures in complex organisations is illustrated based on practical experiences. In addition, the Enterprise Architecture Mangement function in a complex organisation is explained and its interaction with other enterprise-level management functions, such as demand management and project portfolio management, is presented. The theoretical foundation is completed by a discussion of the role of standards management based on proven best-practice reference architectures.
The objective of the lecture is to establish both fundamental theoretical knowledge on Enterprise Architecture Management and a practical understanding of challenges arising in the context of complex Enterprise Architectures. To achieve the latter objective, some small real world Enterprise Architecture Management tasks in practice are illustrated.

Lehrinhalt

Die Vorlesung gliedert sich in zwei Teile. In der ersten Hälfte der Vorlesung wird die Funktionsweise von Geräten, welche medizinische Bilder liefern (CT, MRI, PET, SPECT, Ultraschall), erklärt.

In der zweiten Hälfte werden verschiedene Bildverarbeitungsmethoden erklärt, welche typischerweise für die Bearbeitung medizinischer Bilder eingesetzt werden.

Qualifikationsziele / Lernergebnisse

Nach erfolgreichem Besuch der Veranstaltung haben die Studierenden einen Überblick über die Funktionsweise und die Möglichkeiten der modernen medizinischen Bildverarbeitung. Studierende sind dazu in der Lage, einfache bis mittlere medizinische Bildverarbeitungsaufgaben selbständig zu lösen.

Voraussetzungen

Mathematische Grundlagen sind dringend empfehlenswert. Ferner wird empfohlen, die Vorlesung „Bildverarbeitung“  vorher besucht zu haben.


Mobile communications and wireless networking technology has seen a thriving development in recent years. Driven by technological advancements as well as application demands, various classes of communication networks emerged. This includes sensor networks, ad hoc networks, and cellular networks, each of which class represents a solution to important chapters in the mobile and wireless communications challenge.

Currently, we observe that the fixed, mainly infrastructure based networks are complemented and enhanced with infrastructure-less (ad-hoc) networking structures to form novel communication networks. At the same time users get more and more mobile and nomadic, they demand the ability to use applications anytime and anywhere, posing additional resource demands onto the network while on the move and changing the nature of applications. Obviously this gives rise to several challenging questions, which have to be solved first. Not only feasible applications and end-systems have to be developed but also smart network technology has to be devised.

The lecture addresses the above outlined problem scope. The characteristics/principles underlying the problem are discussed in detail and practical solutions are presented. Hereby our focus is on the network layer, which is often regarded as the glue of communication systems. In addition to describing the state of the art in technology we discuss actual research problems and learn about methodologies to approach such problems systematically.


The Web contains more than 10 billion indexable web pages, which can be retrieved via search queries. The lecture will present Natural Language Processing (NLP) methods to (1) automatically process large amounts of unstructured text from the web and (2) analyse the use of Web data as a resource for other NLP tasks.

Objectives

The integrated lecture Protection in Networked Systems — Trust, Resilience, and Privacy covers the topics of computational trust, resilient and anonymous networks, and collaborative defense mechanisms. By attending this course, the students will be able to understand the problems and solutions in the context of networked systems. The course content will consider the concept of End-to-End systems emphasizing on users, devices, networks, and applications or services.

Content

  • Protection in Networked Systems: background, motivation, challenges

  • Trust (Computational Trust): models and mechanisms

  • Trust (Computational Trust): application in PKI, Cloud Computing, Reputation Systems, and Web Services

  • Trust: regret management and device comfort

  • Privacy: privacy definitions, models, data anonymity, communication anonymity

  • Privacy & Trust: privacy-preserving trust models, mechanisms, and application to IDM

  • Security & Economics

  • Resilience: models, network intrusion detection systems, collaborative intrusion detection systems, honeypots

  • Resilient networks

Literature

  • Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence, Elizabeth Chang, Tharam Dillon, and Farookh K. Hussain, 374 pages, 2006. ISBN: 978-0-470-01547-6
  • Detailing Reviews and Ratings for Trust-Enhanced Composition, Florian Volk, 272 pages, 2015, ISBN: 9783736991668 (print), 9783736981669 (e-book)
  • On anonymity in an electronic society: A survey of anonymous communication systems, Matthew Edman and Bülent Yener, ACM Computing Surveys, Vol. 42,  Issue 1, 2009.
  • Taxonomy and Survey of Collaborative Intrusion Detection, Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer, ACM Computing Surveys, Vol. 47 Issue 4, 2015.
  • Selected book chapters and scientific publications

Prerequisites

Knowledge of IT Security and Mathematics according to 1-4 semester of B.Sc. Computer Science

The course deals with cutting edge development topics in the area of network security with particular focus on mobile networked systems. Beside a general overview it provides a deep insight into a special development topic. The topics are selected according to the specific working areas of the participating researchers and convey technical and basic scientific competences.


In this seminar, recent developments on the formal foundations of computer security will be presented and discussed. The seminar will be based on recent research articles covering selected foundational aspects of computer security. Each article will be presented by one participant of the seminar and will then be discussed intensely by the entire group of participants.

Formal foundations of computer security are necessary to clarify desirable security guarantees and possible security threats. For instance, formal security models can be used to capture security requirements precisely and can then serve as a reliable basis for verifying whether these requirements are met. Formal foundations of security can also serve as a basis for establishing security by design, including a precise definition of security requirements, a component-based development of secure systems, and the stepwise refinement of high-level system specifications to more-detailed specifications, ultimately to secure program code.


Exemplary topics include:
  •     composition, abstraction and refinement in computer security,
  •     information-flow security and information-flow control,
  •     language-based security,
  •     security models and properties,
  •     secure usage and usage control,
  •     quantitative security, and
  •     verifiable security.

The Seminar as well as the Advanced Seminar on Networking, Security, Mobility, and Wireless Communications cover current research in the given topic areas. Under supervision of the tutors, the seminar includes studying, critically analyzing and discussing, summarizing, and presenting selected research articles. Deliverables are a short presentation, a final presentation, and a seminar paper. The Advanced Seminar additionally emphasizes on the entire research process.

Can hundreds or thousands of untrained people do the job of an expert? This seminar will explore the benefits of this idea and investigate the techniques needed to make it work.

Natural language processing (NLP) requires vast amounts of annotated text data for training and evaluating algorithms, as well as for analysing language to further the underlying theory. Expert annotators have very limited time, but if we can break the annotation task into many simple sub-tasks, they can be distributed to a large number of non-experts workers. This is the idea behind crowdsourcing, which provides a way to annotate text data cheaply at larger scale, with commercial platforms such as Amazon Mechanical Turk providing access to many thousands of workers. However, it is far from trivial to obtain good annotations using crowdsourcing, so it has become an active research topic in fields such as machine learning and human-computer interaction. Intelligent crowdsourcing techniques aim to increase efficiency and improve the quality of results by solving problems such as annotation errors and untrusted workers in an automated manner.

This seminar will introduce the fundamentals of text annotation tasks and crowdsourcing, and review in depth the latest research into crowdsourcing methods, including the increasing use of statistical machine learning to optimise the crowdsourcing process. We will investigate how general approaches can be adapted to linguistic annotation tasks, and analyse their strengths, limitations and potential improvements.