• SoftRobot

  • Java Workflow Tooling (JWT)

  • AWACS - Anticipating unWanted behavior in Autonomic Computing Systems Dipl.-Inf. Holger Kasinger (Programming Distributed Systems)


    From a developer unintended and not predictable states can cause self-organizing, emergent and thus autonomic systems at runtime to exhibit an unwanted and harmful behavior due to wrong self-adaption. The objective of the AWACS project is to proactively determine such critical system states at runtime before they occur as well as to avoid the unwanted behavior by means of appropriate self-adaption mechanisms.


    Unexpected and not predictable environment situations at runtime may trigger even a correctly working advisor to adapt a self-organizing emergent system into previously unknown system states. On the one hand side unknown states are desired or rather required in order to adapt the system to dynamically changing or unexpected situations. On the other side unknown states are undesired if they cause a system to show an unwanted behavior, e.g. inefficiencies in problem solving or even system crashes. However, prohibiting unknown states or returning from them too early limits the adaptivity of the system, whereas staying too long may by contrast render such a returning void. Thus, the objective of the AWACS² (Anticipating Unwanted behavior in Autonomic Computing Systems) project is, based on the results of the AWACS project, to anticipate unwanted behavior at runtime way ahead of its occurrence and to give an advisor enough time to prevent or avoid misleading adaptations autonomously, which promotes the trustworthiness of advised self-organizing emergent systems. We therefore develop a test system embedded in the advisor that continuously tests possibly awkward environment situations, which will lead to unknown system states respectively unwanted behavior, in advance and, if applicable, triggers the advisor to adapt its advising accordingly.

  • Audio Brush Gregor van den Boogaart (Multimedia Computing)

    Hearing, analyzing and evaluating sounds is possible for everyone. The reference-sensor for audio, the human ear, is of amazing capabilities and high quality. In contrast editing and synthesizing audio is an indirect and non-intuitive task needing great expertise.

    To overcome these limitations we are creating Audio Brush, a smart visual audio editing tool. Audio Brush allows to edit the spectrogram of a sound in the visual domain similar to editing bitmaps. At the core is a very flexible audio spectrogram based on the Gabor analysis and synthesis. It gives maximum accuracy of the representation, is fully invertible, and enables manipulating the signal at any chosen time-frequency resolution.

  • Real-Time Event Detection and Control in Live Video Streams Prof. Dr. Rainer Lienhart Rainer Lienhart (Multimedia Computing)

    It is nowadays very common that public places such as pubs, restaurants, and fitness club have large TV screens to entertain their customers -- especially during national or international sports championship events. For the venue owner it would be desirable if they could control which commercials are shown to their audience. In other words they may have the desire to replace untargeted commercials by target commericals of their choice.

    In this joint project with Half Minute Media Ltd. we research algorithms for robost real-time commercial detection and control (such as replacement) in live streams. We are especially developing fast and extremely reliable algorithms for

    • Mining video channels automatically in order to extract all commercials and
    • Detecting known commericials in live streams using highly compact, but discriminate clip descriptors

  • Bayesian Face Recognition on Infrared Image Data Jochen Lux (Multimedia Computing)

    The availability of high-performance and low-cost desktop computing systems and digital camera equipment has given rise to a public interest towards applications that include the visual identification of human individuals. Examples for such applications are surveillance, biometrical identification or computer-human interaction. To that effect, research in biometrical technologies follows naturally. Above other methods, images of human faces offer a non-intrusive and easy-to-use means of identification. Although the recognition of faces is a problem that is effortlessly solved by human beings during their daily routine, it poses a challenge for researchers and scientists. Boundary conditions like illumination and occlusion, as well as pose and expression of an individual lead to intrapersonal variations that often exceed those between images of different persons under similar conditions.

    In association with Falcontrol Security GmbH we are researching reliable face recognition algorithms by using Bayesian methods on infrared image data.

  • SACCO - Self- and AutonomiC COnfiguration for 3G LTE Simon Lohmüller (Programming Distributed Systems)
    Mobile communication is based on highly complex network architectures requiring frequent (re)configurations of network elements. In this project a concept is developed for reducing management complexity and raising the degree of automation in mobile networks. For this purpose, policy-based techniques are applied, which enable the management system to take decisions autonomically by correlating events, conditions, and actions. Thus, human knowledge is encapsulated in a machine-executable way, thereby reducing the amount of work and time to be spent by human operators for operation, administration and maintenance of the network.

  • ECIDISI Florian Lautenbacher (Programming Distributed Systems)
    The goal of ECIDISI is to analyze the current requirements engineering processes using a fictive scenario of a company from two different viewpoints: the first viewpoint is the one of a software engineer of a software development department and the second one of a technical writer from a documentation department. Using these different viewpoints the concrete problems that companies have today should be evaluated and existing modeling methods are systematically explored and tested. Based on that a methodology will be developed and implemented in order to represent the different goals and views and to (re)use the documents in later steps of the development. Additionally the usage of semantic technologies for requirements engineering (annotating documents) and their added value for lated process steps will be evaluated.