Skip to main content Skip to main navigation

Projects

Displaying results 31 to 40 of 64.
  1. CrowdHEALTH – Collective Wisdom Driving Public Health Policies

    CrowdHEALTH – Collective Wisdom Driving Public Health Policies

    The aim of the international and multidisciplinary collaborative project CrowdHEALTH is to integrate these heterogeneous and distributed data …

  2. SecRec – Security by Reconfiguration - Physikalische Sicherheit durch dynamische Hardware-Rekonfiguration

    SecRec – Security by Reconfiguration - Physikalische Sicherheit durch dynamische Hardware-Rekonfiguration

    Field-programmable gate arrays are a highly efficient platform for cryptographic hardware implementations. Despite of their benefits, …

  3. ModEst_RD – Walker-module for posture-recognition and fall-prevention

    ModEst_RD – Walker-module for posture-recognition and fall-prevention

    Walkers play an important role in the everyday life of many people and the correct use must be properly learned and practiced continuously. The aim of …

  4. SELFIE – Self-Verification of Electronic Systems

    SELFIE – Self-Verification of Electronic Systems

    The exponential growth of the complexity of electronic systems makes it increasingly diffult to prove their correctness (verification). Addressing …

  5. MANIAC – BDD Manipulation for Approximate Computing

    MANIAC – BDD Manipulation for Approximate Computing

    The project MANIAC aims to optimise algorithms for approximate computing on the basis of binary decision diagrams. Approximate computing (AC) exploits …

  6. WaRoBema – Maintainable Role-Based Rights Management

    WaRoBema – Maintainable Role-Based Rights Management

    The industrial partner employs concepts of role-based access controls within several of its applications. They allow a description and implementation …

  7. SaferApps – Safe Execution of Foreign Application in an Enterprise Infrastructure

    SaferApps – Safe Execution of Foreign Application in an Enterprise Infrastructure

    The project aims at the development and implementation of appropriate security policies and mechanisms that allow one to incrementally integrate …

  8. KI-Suche – Developing a Search Machine using Principles of Artificial Intelligence

    KI-Suche – Developing a Search Machine using Principles of Artificial Intelligence

    eProcurementsysteme allow for an efficient as well as cheap (with respect to personnel as well as financial costs) handling of consumable orderings in …

  9. MORES2 – Modelling and Refinement of Security Requirements on Data and Processes 2

    MORES2 – Modelling and Refinement of Security Requirements on Data and Processes 2

    MORES2 aims at the development of appropriate refinement techniques for workflow specifications. In particular, the notion of refinement to be …

  10. HYSOCIATEA – Hybrid Social Teams for Long-Term Collaboration in Cyber-Physical Environments

    HYSOCIATEA – Hybrid Social Teams for Long-Term Collaboration in Cyber-Physical Environments

    The project HySociaTea (Hybrid Social Teams for Long-Term Collaboration in Cyber-Physical Environments), which is funded by the German Federal …