Abstract is missing.
- Neue Technologien: Chancen nutzen, Risiken vermeidenAnnika Selzer, Ingo J. Timm. 41 [doi]
- Privacy, Utility, Effort, Transparency and Fairness: Identifying and Swaying Trade-offs in Privacy Preserving Machine Learning through Hybrid MethodsMarian Eleks, Ihler Jakob, Jonas Rebstadt, Henrik Kortum-Landwehr, Oliver Thomas 0001. 43-57 [doi]
- Datenschutzrechtliches Risiko - eine Einschätzung betroffener Personen: Analyse des Unterschieds zwischen dem tatsächlichen und gefühlten Risiko bei der Verarbeitung personenbezogener DatenSarah Stummer. 59-79 [doi]
- Considering the Regulatory Framework of the AI Act: Cybersecurity in the Technical and Legal Integration of Dialogue SystemsLucas Reckziegel Weschenfelder. 81-86 [doi]
- Comparative Study: Legal Framework of Offensive Cybersecurity Research in Denmark and SwedenMaxine Folschweiller. 87-100 [doi]
- Der Einsatz von Open Source Intelligence im Darknet: Eine strafrechtliche BewertungLisa Schlindwein, Jessica Kriegel. 101-108 [doi]
- Rechtlicher Schutz im Metaverse: Von umfassenden Datenverarbeitungen über Straftaten gegen Avatare bis hin zu Eingriffen in den postmortalen PersönlichkeitsschutzInes Geissler. 109-120 [doi]
- Nutzerfreundliche Datenschutzinformationen: Erkenntnisse des Einflusses der gestalterischen Aufbereitung einer Datenschutzinformation auf das TextverständnisInes Geissler, Annika Selzer. 121-129 [doi]
- Recht und Technik - Datenschutz im Diskurs: Vorwort zu den WorkshopbeiträgenRüdiger Grimm, Gerrit Hornung, Christoph Sorge, Indra Spiecker genannt Döhmann. 133-134 [doi]
- Unvorhersehbare, unplanbare personenbezogene Datenverarbeitungen: Eine strukturierte Problemanalyse sowie eine Diskussion der Vor- und Nachteile der Datenschutz-Vorsorge als mögliche LösungAlina Boll, Julia Esser, Lilly Schröder. 135-151 [doi]
- Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den GeschlechtseintragLinda Seyda, Andreas Brüggemann, Gerrit Hornung, Thomas Schneider 0003. 153-167 [doi]
- Vertraulichkeit durch Technik anlässlich der Umsetzung von Art. 29 NIS-2-RLPiotr Ryszard Rataj. 169-182 [doi]
- Automated detection of infringing content in Meta's Oversight Board: How online content moderation is shaping new limits of freedom of expressionAndressa de Bittencourt Siqueira. 183-197 [doi]
- Zur grundrechtstheoretischen Dimension der Spannung zwischen dem Zweckbindungsgrundsatz und dem Once- Only-Prinzip: Datensouveränität zwischen E-Government und DatenschutzDiogo Sasdelli, Anna-Sophie Novak. 199-213 [doi]
- Die Haftung nach Art. 82 DSGVO bei unzureichender Cybersicherheit: Die EuGH-Entscheidung Natsionalna agentsia za prihodite zur Beweislast als Wendepunkt für private Schadensersatzklagen?Andreas Engel 0006. 215-230 [doi]
- The (un)lawful processing of personal data manifestly made public by the data subject for political advertising purposes: An analysis from the perspective of data protection based on the Brazilian experience and its European influencesEduarda Beutinger Paiva, Victoria Dickow Paganella. 231-245 [doi]
- KI-generierte Abbildungen von Kindesmissbrauch: Technische Grundlagen und rechtliche EinordnungMartin Steinebach, Julian Drechsler, Lilly Schröder. 247-261 [doi]
- Bridging the Gap: The Role of OWASP AI Exchange in AI StandardizationNiklas Bunzel, Nicolas Göller. 263-273 [doi]
- Künstliche Intelligenz und Geldwäschecompliance: Eine Annäherung aus juristischer, soziologischer und technischer PerspektiveTimo Hauler, Michael Hahne, Verena Battis. 275-291 [doi]
- Deepfakes als Beweismittel: Zur Notwendigkeit der Authentizitätsprüfung von Bild- , Audio- und Videodaten: Das digitale Rig als Authentifizierungsmethode zur Erkennung von synthetischen Bild- und VideodatenStefan Kellermann, Dirk Labudde. 295-307 [doi]
- Der forensische Wert von Thumbnails und Cache-Dateien im ErmittlungsverfahrenSabrina Herchel, Mirijam Steinert, Vivien Dehne, Dirk Labudde. 309-319 [doi]
- Semi-supervised topic modelling as a tool for hypothesis-driven forensic communication analysisJenny Felser, Michael Spranger. 321-330 [doi]
- Forensic strategies and methods in advanced software-defined networksFlorian Weijers, Meiko Jensen, Antje Raab-Düsterhöft. 331-341 [doi]
- Automated Reasoning for Conflict Solving in Knowledge GraphsJohannes Fähndrich, Maik Wischow. 343-353 [doi]
- Scenario-based Data Set Generation for Use in Digital Forensics: A Case StudyThomas Göbel, Harald Baier, Dennis Wolf 0003. 355-370 [doi]
- Potential approach for targeted matching of people in video footage based on 3D human pose estimationSabine Richter, Dirk Labudde. 371-380 [doi]
- Shell we find it: A Shelly Smart Home Device Discovery ToolJan Ackermann, Johannes Kaeppel, Patrick Schönberger, Carin Schreiner, Marc Stöttinger. 381-389 [doi]
- Identification of technology trends for effective policingMartin Morgenstern, Wilfried Honekamp. 391-403 [doi]
- Man vs. machine: A study comparing super-recognizers and artificial intelligenceMaria Lietsch, Svenja Preuß, Sven Becker, Dirk Labudde. 405-415 [doi]
- Proof of Concept zur Modellierung anatomisch orientierter Wirbelsäulen in digitalen MenschmodellenSven Becker, Dirk Labudde. 417-429 [doi]
- Netzwerkforensik in EVPN-UmgebungenDaniel Spiekermann. 431-440 [doi]
- Addressing Privacy in Passive Data Collection for Nursing DocumentationFarnod Bahrololloomi, Johannes Luderschmidt, Sergio Staab. 443-454 [doi]
- A Methodology and System For Big-Thick Data CollectionIvan Kayongo, Haonan Zhao, Leonardo Malcotti, Fausto Giunchiglia. 455-463 [doi]
- Understanding and addressing user needs for annotation of simple sensor data: Bridging the gap between human sensemaking and machine interpretationAlbrecht Kurze, Christin Reuter. 465-472 [doi]
- Variability of annotations over time: An experimental study in the dementia-related named entity recognition domainTeodor Stoev, Sumaiya Suravee, Kristina Yordanova. 473-486 [doi]
- Assessing Large Language Models for annotating data in Dementia-Related texts: A Comparative Study with Human AnnotatorsSumaiya Suravee, Teodor Stoev, Sara Konow, Kristina Yordanova. 487-498 [doi]
- A Comparative Analysis on Machine Learning Techniques for Research Metadata: the ARDUOUS Case StudyDipendra Yadav, Emma Tonkin, Teodor Stoev, Kristina Yordanova. 499-509 [doi]
- Challenges in Data Preservation for AI and ML SystemsEmma L. Tonkin, Gregory J. L. Tourte. 511-522 [doi]
- Safety in Bytes: IT-Security-Workshop zur digitalen Sicherheit für die nächste GenerationJonas Thelemann. 525-527 [doi]
- Using Pre-trained Transformers to Detect Malicious Source Code Within JavaScript PackagesMarc Ohm, Anja Götz. 529-538 [doi]
- Flash Tracing: A dynamic analysis technique for embedded systemsJ. Neuschäfer. 539-544 [doi]
- Wie trägt die NIS2-Richtlinie zur digitalen Souveränität bei?Silas Kämpchen. 545-547 [doi]
- Towards View-based Development of Quantum SoftwareJoshua Ammermann, Wolfgang Mauerer, Ina Schaefer. 551-554 [doi]
- Comparative Analysis of Vulnerabilities in Classical and Quantum Machine LearningVolker Reers, Marc Maußner. 555-571 [doi]
- Quantum versus Classical Computation: Automatic Decision-Making ApproachesMarkus Zajac, Valerie Restat, Uta Störl. 573-577 [doi]
- A Comparison of HPC based Quantum Computing Simulators using Quantum VolumeChristian Boehme, Lourens van Niekerk, Dhiraj Kumar, Aasish Kumar Sharma, Tino Meisel, Martín Leandro Paleico. 579-589 [doi]
- An approach to introduce entanglement to novicesSoyeon Jeong, Seoyeon Oh, Seojin Song, Seongbin Park. 591-594 [doi]
- Connecting the Hamiltonian structure to the QAOA performance and energy landscapeDaniel Müssig, Markus Wappler, Steve Lenk, Jörg Lässig. 595-604 [doi]
- Module Parametrization By Rewriting: Theory underlying our tutorial "D2d - valide aber lesbar"Markus Lepper 0001, Baltasar Trancón-y-Widemann. 607-625 [doi]
- Digitale Souveränität ist eine subjektive Entscheidung, die mit geeigneten Mitteln aktiv gemanagt werden kann!: Verständnisbildung, Herausforderungen und Lösungen für das Management Digitale SouveränitätRamon Mörl. 629-648 [doi]
- Digitale Kolonie und Lock-in verhindern: Der Weg zur digitalen Souveränität mit Open Source. Diskussionsbeitrag zum Workshop "Digitale Souveränität - MACHEN!"Harald Wehens. 651-662 [doi]
- Digital Sovereignty with "Living Guidelines for Responsible Use of Generative AI"Klaus Mainzer. 665-676 [doi]
- GRANITE - EJEA: Europe meets Japan: Intercultural Workshop on Data Sovereignty and Generative AI. Applications, Design, Social, Ethical, and Technological ImpactRené Reiners, Sabine Ganter-Richter. 679-681 [doi]
- Integrating Generative AI in Music Education: With AI in a Musical Question-Answer GameJörn Arnecke, Sebastian Oliver Eck, Pia Steuck, Alexander Vaughan. 683-689 [doi]
- Using Generative AI to Promote Gender Equality in German Legislation: Submission for the Poster Session in the INFORMATIK2024 EJEA WorkshopWanda Gaertner, Marius Nißlmüller. 691-692 [doi]
- Facilitation chatbots enhance student confidence in learning platformsJawad Ahmad Haqbeen, Sofia Sahab, Takayuki Ito 0001. 693-699 [doi]
- On Data Spaces for Retrieval Augmented GenerationFelix Hermsen, Lasse Nitz, Mehdi Akbari Gurabi, Roman Matzutt, Avikarsha Mandal. 701-707 [doi]
- Towards LLM-augmented Situation Space Analysis for the Hazard and Risk Assessment of Automotive SystemsDaniel Hillen, Catharina Helten, Jan Reich. 709-714 [doi]
- Comparative analysis of AI facilitator impact in online discussions: A cross-cultural studySofia Sahab, Jawad Ahmad Haqbeen, Takayuki Ito 0001. 715-725 [doi]
- Mit Open Source Software zu Digitaler Souveränität in IT InfrastrukturenUlrike Erb, Karin Vosseberg, Oliver Radfelder. 729-734 [doi]
- Designing inclusive learning platforms for ethnic minoritiesLorena Göritz, Daniel Stattkus, Malte Högemann, Halilcan Coban, Christian Hauff, Katharina Kolodziej, Maike Schmidt, Oliver Thomas 0001. 735-744 [doi]
- Enhancing Citizen Accessibility to Public Services: A Case Study on AI-Assisted Application for Housing Entitlement CertificatesLarbi Abdenebaoui, Saja Aljuneidi, Jochen Meyer 0001, Susanne Boll. 745-750 [doi]
- How-to: Digitale Souveränität und Mündigkeit dekonstruierenMareike Lisker, Oliver Vettermann. 751-762 [doi]
- Von der digitalen Souveränität zur digitalen IdentitätEkaterina Seppelfricke, Aline Vugrincic. 763-771 [doi]
- Ohne Big Brother und Cloud, aber nicht ohne Probleme: Fallbeispiele zu Implikationen smarter Technik mit einfachen Sensoren im ZuhauseAndy Börner, Karola Köpferl, Tanja Lehmann, Alexa Becker, Arne Berger, Andreas Bischof, Albrecht Kurze. 773-779 [doi]
- Digitale Souveränität in Hochschulen - am Beispiel des Projektes SecAware.nrwAndreas Harrer, Gabriele Kunau. 781-790 [doi]
- From Hidden Care to Being Aware: Designing a Conversational Agent to Support Informal Caregivers in Seeking Assistance During Role TransitionDavid Walter, Paul-Ferdinand Steuck, Marco Di Maria, Ralf Knackstedt. 793-808 [doi]
- Towards Ethical Agency in the Smart Home "Living Place": On the Conception and Development of Ethical Smart Home Systems by Elective Projects within Computer Science EducationSusanne Draheim, Jan Sudeikat. 811-821 [doi]
- Partizipative Ansätze in der Entwicklung smarter und privatsphärefreundlicher Technik für das ZuhauseKarola Köpferl, Tanja Lehmann, Andy Börner, Alexa Becker, Arne Berger, Andreas Bischof, Albrecht Kurze. 823-828 [doi]
- Living and Aging in Place in a Smart Neighborhood: Towards Development and Evaluation of a Digital Health ConceptSabrina Hölzer, Lucie Schmidt, Wesley Preßler, Christian Erfurth. 829-839 [doi]
- Telemedizinische Betreuung von pflegebedürftigen Personen mit einer Hörstörung im häuslichen UmfeldGregor Hohenberg, Kim Bender. 841-845 [doi]
- Einsatzmuster von Extended Realities (XR) in MuseenRalf Dörner 0001, Ulrike Spierling. 849-860 [doi]
- Patterns for immersive Augmented Reality multi-user experiences in cultural heritageJessica L. Bitter. 861-869 [doi]
- Considerations for cross-device Augmented Reality interaction patterns in the field of cultural heritage mediationYu Liu, Ulrike Spierling. 871-882 [doi]
- DoCH: Digitalization of Cultural Heritage. About the WorkshopChristina B. Class. 885-886 [doi]
- Recommendations for student excursions for digitalization of Cultural HeritagePaul Grimm, Julia Schnitzer. 887-895 [doi]
- Exploring the Boundaries of Digitalization of Cultural Heritage: Opportunities, Challenges and Future DirectionsSophie Reckers, Simon Biwer. 897-902 [doi]
- Photogrammetric Analysis for Accurate Three-Dimensional Reconstruction of the Mudhafaria Minaret in Erbil (Kurdistan Region of Iraq)Sima Mustafa, Aland Qader. 903-908 [doi]
- Virtual Reconstruction of Al-Baroud Khana Building: VR Model for the Cultural Heritage of MosulAbdullah Al-Sarraf, Ali Alsaffar, Ammar Ahmed, Omar Khalel, Mahmood Mahmood, Wesal Hummadi, Nagham Sultan, Omar Ibraheem, Oday Alchalabi, Basim Mahmood. 909-914 [doi]
- A Snapshot in Time and Space: Smart Digitalization of the Umayyad PalaceLeonard Merl, Erwin Riemer, Jan Tjark Schrem, Marcel Koch, Christopher Schneider. 915-920 [doi]
- Reviving Hercules: A Photogrammetry Case StudySilas Budde, Joel Kroiher, Lars Schwarze, Marcel Koch, Christopher Schneider. 921-926 [doi]
- Sustainable Automated 3D Scanning: Energy-Efficient Drone Photogrammetry for Large Scale Archaeological SitesAhmed Kamil, Basim Mahmood. 927-932 [doi]
- Digitization of Cultural Heritage: On Reduction, Construction and Ethical ConcernsChristina B. Class. 933-941 [doi]
- Concise Analysis of Intangible Cultural Heritage Practices in Connection with Sustainable Development GoalsBasim Mahmood, Zohair Al-Ameen, Ahmed Hassan. 943-952 [doi]
- Integrating the Technologies of Image Processing and Virtual Reality for the Digital Preservation of Disappeared Archaeological SitesZohair Al-Ameen, Basim Mahmood, Abdullah Al-Sarraf, Oday Alchalabi. 953-962 [doi]
- An Overview of Various 3D Scanning Methods in the Context of Cultural Heritage DocumentationAland Qader, Shari Shwan. 963-972 [doi]
- Cloud-Based Data Classification Framework for Cultural Heritage ConservationShaimaa Rashid, Rawaa Qasha. 973-983 [doi]
- Real-time collection and archiving of related posts to cultural heritage on the cloudShaimaa Rashid, Rawaa Qasha. 985-995 [doi]
- Using Digitization of the architectural heritage of old Mosul in promoting sustainable tourism/ideas and proposals for applicationAhmed Taha. 997-1005 [doi]
- Photogrammetry and iPhone LiDAR in Remote Places for Preparation of 3D-Objects in a Virtual MuseumEka Noviana, Uli Plank, Eku Wand. 1007-1016 [doi]
- Bridging Generations: Exploring Virtual Reality Tourism and Universal Design in an Intergenerational Civic Centre. A quest for a fit in the realms of technologyMirametta Botrous, Akram A. Elkhalifa. 1017-1026 [doi]
- Cultural Continuity in Crisis: The Interaction of Virtual Tourism and Heritage Culture in War-torn SudanGabass M. Tahir, Akram A. Elkhalifa. 1027-1035 [doi]
- Capturing the Past: Photogrammetry for Safeguarding Sudanese Cultural Heritage DigitallyDuaa Abdalhaleem, Akram A. Elkhalifa. 1037-1047 [doi]
- Digital Transformation Of Cultural Heritage In Sudan: An attempt to save a nation's history, the case study of old Dongola and Al-Khandag, SudanAlaa Khalifa, Lina Alhaj. 1049-1059 [doi]
- Digitization of cultural heritage using photogrammetry: The case of Al Bidya MosqueDuaa Abdalhaleem, Duaa Abdelrahman, Mohamedalmugtaba Ahmed, Zainab Ahmed. 1061-1068 [doi]
- 5. Workshop Künstliche Intelligenz in der UmweltinformatikAndreas Abecker, Grit Behrens, Stefan Naumann, Martina Willenbacher. 1071-1077 [doi]
- Energy Load Profile Analysis and Application for Production Simulation and Scheduling using Energy Load DisaggregationMario Klostermeier, Leonhard Kunz, William Motsch, Borys Ioshchikhes, Christiane Plociennik, Martin Ruskowski. 1079-1097 [doi]
- Autonomous mobile robot search strategy for automated compressed air leakage detectionPhilipp Richard, Satyam Uttamkumar Dudhagara, Leonhard Kunz, Christiane Plociennik, Martin Ruskowski. 1099-1111 [doi]
- Maschinelle Bilderkennung von Phänophasen bei PflanzenTim Seegert, Paul Schulze, Frank Fuchs-Kittowski. 1113-1126 [doi]
- Eine Methode für die Potenzialanalyse zur Identifikation von Anwendungsszenarien für Maschinelles LernenFrank Fuchs-Kittowski, Paul Schulze, Andreas Abecker, Jonas Lachowitzer, Stefan Lossow, Heino Rudolf, Erik Rodner. 1127-1144 [doi]
- Aktuelle Ansätze zum Einsatz von Verfahren der automatisierten Bilderkennung mittels maschinellen Lernens im Bereich des UmweltmonitoringsChristopher Galle. 1145-1154 [doi]
- Towards Sustainable Machine Learning: Analyzing Energy-Efficient Algorithmic Strategies for Environmental Sensor DataBerkay Cetkin, Lejla Begic Fazlic, Achim Guldner, Stefan Naumann, Guido Dartmann. 1155-1164 [doi]
- Artificial Intelligence-Based Assistance Systems for Environmental Sustainability in Smart Homes: A Systematic Literature Review on Requirements and Future DirectionsConstantin Brîncoveanu, Kim Valerie Carl, Simon Binz, Moritz-Andre Weiher, Oliver Thomas 0001, Oliver Hinz. 1165-1182 [doi]
- LLMs on the Edge: Quality, Latency, and Energy EfficiencySebastian Bast, Lejla Begic Fazlic, Stefan Naumann, Guido Dartmann. 1183-1192 [doi]
- Zum Einsatz von Maschinellem Lernen in der Umweltverwaltung: Der Simplex4Learning AnsatzAndreas Abecker, Matthias Budde, Frank Fuchs-Kittowski, Janik Großmann, Werner Koch, Jonas Lachowitzer, Stefan Lossow, Erik Rodner, Heino Rudolf, Paul Schulze. 1193-1206 [doi]
- An e-marketplace system for efficient, sustainable rural logistics and mobility, based on cyber-physical contracts: Enhancing rural infrastructure by connecting stakeholders on a privacy-focused web platformSam Kopp, Jens Schneider 0003, Guido Dartmann, Lars Creutz. 1209-1218 [doi]
- Die Ermittlung von Treibhausgas-Emissionen in der Cloud und Integration des Vorgehensmodells ins IT-ManagementMichael Mohr, Susanne Hartard, Stefan Naumann. 1219-1230 [doi]
- Green Coding für junge Softwareunternehmen: Herausforderungen für Startups im Zeitalter der Digitalisierung und NachhaltigkeitLisa Lill-Kochems. 1231-1240 [doi]
- Local energy demand of functionality distributionsFlorian Schmalriede, Andreas Winter 0001. 1241-1250 [doi]
- PhenoTruckAI: On-Site Hyperspectral Measurement for Distinction of Quarantine Grapevine Disease "flavescence dorée" and non-Quarantine Disease "bois noir" in a Mobile LaboratoryBonito Steffen Thielert, Patrick Menz, Gesa Marie Götte, Miriam Runne, Markus Michel, Sylvia Wagner, Wolfgang Jarausch, Sebastian Warnemünde. 1253-1260 [doi]
- AI-supported selection procedure for spectral sensors based on technical and economic characteristicsPatrick Menz, Lauritz Klein, Andreas Herzog. 1261-1267 [doi]
- Multi-level Personalised Federated Learning: A concept for data sovereign machine learning in digital agricultureMortesa Hussaini, Anthony Stein. 1269-1277 [doi]
- Assessing Large Language Models in the Agricultural Sector: A Comprehensive Analysis Utilizing a Novel Synthetic Benchmark DatasetMarvin Kästing, Christian Hänig. 1279-1286 [doi]
- Methods and techniques for plant and weed detection creating a database for future computer vision systems in weed control and practical implementations: Insights from the KIdetect project, funded by the BMELFaryal Noori, Lucas Hopf, Philipp Flierl, Alexander Zimmermann, Michael Niedermeier, Gerhard Holst, Anton Schmailzl. 1287-1293 [doi]
- Innovations- und Transformationspotentiale für die zirkuläre Wirtschaft heben: Innovationen für die Circular Economy durch modernes QuantencomputingAnna Hoffmann. 1297-1319 [doi]
- Towards Context-aware Recommender Systems for Supporting Knowledge Workers in Personal and Corporate Information SpaceMahta Bakhshizadeh, Christian Jilek, Heiko Maus, Andreas Dengel 0001. 1323-1332 [doi]
- Application of Graph Neural Networks to fraud classification problems in the insurance and financial domainJona Becher, Andreas Schäfer. 1335-1345 [doi]
- Using Large Language Models to Generate Authentic Multi-agent Knowledge Work DatasetsDesiree Heim, Christian Jilek, Adrian Ulges, Andreas Dengel 0001. 1347-1357 [doi]
- Anomaly Detection in Supermarket Refrigeration Systems using Transformer Models: A Comparative StudyMelina Meyer, Martin Gergeleit, Dirk Krechel. 1359-1369 [doi]
- Leveraging Distillation Techniques for Document Understanding: A Case Study with FLAN-T5Marcel Lamott, Muhammad Armaghan Shakir. 1371-1381 [doi]
- Computer-Assisted Short Answer Grading Using Large Language Models and RubricsTim Metzler, Paul G. Plöger, Jörn Hees. 1383-1393 [doi]
- Evaluating Contextualized Code Search in Practical User StudiesJohannes Villmow, Adrian Ulges, Ulrich Schwanecke. 1395-1405 [doi]
- Expanding Knowledge Graphs Through Text: Leveraging Large Language Models for Inductive Link PredictionFelix Hamann, Maurice Falk, Lukas Walker. 1407-1417 [doi]
- Bug Detection and Localization using Pre-trained Code Language ModelsViola Campos. 1419-1429 [doi]
- Automatisierte prädiktive Analytik in der GepäckabfertigungFinn Dohrn, Marina Tropmann-Frick. 1433-1448 [doi]
- Comparison of Classifiers for Eye-Tracking DataJennifer Landes, Sonja Köppl, Meike Klettke. 1449-1462 [doi]
- Entwicklung einer KI für automatisierte Tierschutzkontrollen in der SchweineschlachtungChristian Beecks, Alexander Graß, Anandraj Amalraj, Marc Jentsch, Felix Kitschke, Maximilian Norz, Patric Schäffer. 1463-1477 [doi]
- Data Analytics as a Service - Challenges and Opportunities: An Introduction to DAS-24Barbara Keller, Michael Möhring, Friedrich Augenstein. 1481-1489 [doi]
- Public and Expert Insights into Generative AI: The potential for the Financial IndustryJan Zacharias. 1491-1500 [doi]
- Ecosystem Intelligence im Zeitalter vernetzter Plattformen: PositionspapierRainer Schmidt 0001, Rainer Alt, Alfred Zimmermann. 1501-1504 [doi]
- KI-als-Service: Vergleich von Plattformen zur DokumentenklassifikationLeon Griesch, Leon Görgen, Kurt Sandkuhl. 1505-1518 [doi]
- HollerithEnergyML: A Prototype of a Machine Learning Energy Consumption Recommender SystemMichael Zanger, Alexander Schulz 0007, Lukas Grodmeier, Dion Agaj, Rafael Schindler, Lukas Weiss, Michael Möhring. 1519-1523 [doi]
- Data Analytics as a Service - A Summary of Keynotes and Poster of the DAS Workshop: An Extended Abstracts Point of ViewTorsten Kilias, Raymond Gao. 1525-1528 [doi]
- Key Users activities along ACTIVATE phases and associated challenges in a Public Cloud ERP introductionCarsten Brockmann, Jörg Rudat. 1531-1539 [doi]
- Optimierung der Kompetenzentwicklung von Berufseinsteigern und Auszubildenen mithilfe von Gamifizierten ProzessenAnnika Latz, Dennis Koob. 1541-1551 [doi]
- Capabilities of Gen AIEldar Sultanow, Marc Ulrich, Zied Kamel, Sebastian Sebrak, Joanna Pomaskow, Balaji Gobinathan, Christian Czarnecki, Alina M. Chircu, Marcus Grum. 1553-1569 [doi]
- Are We Still on Track with Our Responsibility Strategy? Introducing an Internal Assessment of Corporate Digital Responsibility EngagementKim Valerie Carl, Marc P. Hauer, Thomas Arnold. 1573-1585 [doi]
- 'To Code, or Not to Code': Unpacking the Understanding and Difficulties of Citizen Development ProgramsBjörn Binzer, Till J. Winkler. 1587-1596 [doi]
- Literaturstudie zu den Handlungsbereichen einer Governance für den Einsatz von KI-Systemen im UnternehmenMichael Klotz, Waldemar Adam, Lukas Noack-Sandring, Niklas Schueschke. 1597-1609 [doi]
- Identifikation von Einsatzpotenzialen von Generativer Künstlicher Intelligenz am Beispiel eines Unternehmens der VersorgungswirtschaftEmir Simsek, Sebastian Floerecke, Christoph Ertl 0002, Alexander Bogislav Herzfeldt. 1611-1621 [doi]
- Elefant im Raum - oder Mücke? Rollen und Rollenkonzepte in der Wirtschaftsinformatik und der IT-GovernanceViktoria Stienen, Matthias Goeken. 1623-1637 [doi]
- Erstellung von Enterprise Architectures mit COBIT, TOGAF und ArchiMateCassandra Seyboth, Helmut Beckmann. 1639-1648 [doi]
- Data Governance - Status und AusblickJan Czemmel, Helmut Beckmann. 1649-1660 [doi]
- A multi-label text classifier approach for understanding electronic word-of-mouth of restaurants on Google MapsFrederik Hering. 1663-1674 [doi]
- Taking a HINT on Industrial Anomaly DetectionJacqueline Höllig, Florian Grimm, Daniel Kiefer, Steffen Thoma. 1675-1680 [doi]
- Lektionen und Anwendungsfälle aus der Implementierung von Retrieval-Augmented-Generation-SystemenFrederik Simon Bäumer, Hans Brandt-Pook, André Matutat, Falk Maoro, David Pelkmann, Sergej Schultenkämper. 1681-1689 [doi]
- Machine Learning in Glass Bottle Printing Quality Control: A Collaboration with a Medium-Sized Industrial PartnerMaximilian Bundscherer, Thomas H. Schmitt, Tobias Bocklet. 1691-1704 [doi]
- Functional Requirements and Recommendations for AI-based Sustainable Energy SolutionsMaximilian Lowin, Cristina Mihale-Wilson. 1705-1716 [doi]
- Segmenting Wood Rot using Computer Vision ModelsRoland Kammerbauer, Thomas H. Schmitt, Tobias Bocklet. 1717-1730 [doi]
- Training a Computer Vision Model for Commercial Bakeries with Primarily Synthetic ImagesThomas H. Schmitt, Maximilian Bundscherer, Tobias Bocklet. 1731-1740 [doi]
- Schadenserkennung an Baukonstruktionen mit intelligenten Methoden der SystemidentifikationArmin Lenzen, Max Moeller, Maximilian Rohrer. 1741-1752 [doi]
- Umsetzung von KI-Transferprojekten: Praxisbericht zu Risiken und HerausforderungenReinhold von Schwerin, Daniel Schaudt, Alexander Hafner. 1753-1758 [doi]
- A Guide for Trustworthy AI Implementations in the Smart Living DomainCristina Mihale-Wilson, Maximilian Lowin. 1759-1770 [doi]
- 4. Workshop Nachhaltige WertschöpfungssystemeFriedemann Kammler, Paul Christoph Gembarski, Thorsten Schoormann, Simon Hagen. 1773-1777 [doi]
- Sustainable ecosystems: Findings from the NaWerSys workshop seriesThorsten Schoormann, Friedemann Kammler, Paul Christoph Gembarski, Simon Hagen, Jonas Brinker, Jessica Bollenbach, Ilka Jussen, Robert Keller, Henrik Kortum-Landwehr, Frederik Möller, Dimitri Petrik, Julia Schweihoff, Maleen Stachon, Stephanie Winkelmann. 1779-1797 [doi]
- Green data, green future? How data spaces enable the product carbon footprint calculation for the automotive industry: A case study on Catena-XAnna Gieß, Jenny Neumann, Ilka Jussen, Julia Schweihoff. 1799-1812 [doi]
- How to promote the spread of data-driven business models by involving all relevant stakeholders? The case of the pay-per-stress modelKim Valerie Carl, Constantin Brîncoveanu, Oliver Hinz. 1813-1824 [doi]
- Nachhaltiges Retourenmanagement im E-Commerce: Entwicklung eines Klassifikationsmodells zur Identifizierung von nicht mehr verwendbaren RetourenAnthony Boyd Stevenson, Katherina Meißner, Julia Rieck. 1825-1841 [doi]
- Keeper of the building data: Exploring the potential for data trustees in the building sector. Enabling sustainable buildings with data trusteesJulia Christina Schweihoff, Ilka Jussen. 1843-1854 [doi]
- Modeling value exchange in informal care support ecosystemsDavid Walter, Kathrin Seibert, Marco Di Maria, Ralf Knackstedt. 1855-1868 [doi]
- Potentials of Artificial Intelligence for the Return of Electric Vehicle Batteries to the Circular Economy: Concept approach for establishing intelligent battery cyclesSarah Merz, Dimitri Petrik. 1869-1876 [doi]
- Unlocking sustainable reporting: Leveraging knowledge graphs for ESG metrics extraction: The role of knowledge graphs in sustainability reportingJana Driller, Simon Thanh-Nam Trang. 1877-1883 [doi]
- Assets, Artifacts and (Multi-)Agents: On Enacting Adaptive Organizations in Cyber-physical Systems: Invited TalkJan Sudeikat, Michael Köhler-Bußmeier. 1887-1892 [doi]
- Understanding stegomalware in ICS: Attacks and PreventionNatasha Edeh, Romarick Yatagha, Oumayma Mejri, Karl Waedt. 1893-1904 [doi]
- Generative AI and Gametheory for the development and deployment of Honeypots to enhance the Security of Industrial Automation and Control SystemsLudger Peters, Georgios Gkoktsis. 1905-1916 [doi]
- AI Defenders: Machine learning driven anomaly detection in critical infrastructuresBetelhem Nebebe, Pavlina Kröckel, Romarick Yatagha, Natasha Edeh, Karl Waedt. 1917-1927 [doi]
- Ensuring trustworthy AI for sensitive infrastructure using Knowledge RepresentationOumayma Mejri, Karl Waedt, Romarick Yatagha, Natasha Edeh, Claudia Lemos Sebastiao. 1929-1938 [doi]
- Integrating Dynamic Thresholding in Anomaly Detection on Water Treatment FacilitiesRomarick Yatagha, Esin Oeztuerk, Betelhem Nebebe, Natasha Edeh, Oumayma Mejri. 1939-1945 [doi]
- Cybersecurity Testing for Industry 4.0: Enhancing Deployments in operational I&C systems Through Adversarial Testing and Explainable AINdeye Gagnessiry Ndiaye, Erkin Kirdan, Karl Waedt. 1947-1962 [doi]
- Scalable Modeling of Preventive and Detective Security Controls for Cyber-Physical SystemsHnin Yee Shun, Loui Al Sardy, Karl Waedt, Gabriel Le Berre. 1963-1976 [doi]
- Trustworthy Data Exchange: Leveraging Linked Data for Enhanced IDS CertificationSascha Hackel, Marie-Elisabeth Makohl, Simon Petrac. 1977-1987 [doi]
- A Common Logic for Industrial Digital Twins: Information Modeling and Semantics for AAS-sheltered Industrial ServicesJan deMeer, Olga Meyer. 1989-1999 [doi]
- Automated Extraction of Icon-based TablesBoris Thome, Friederike Hertweck, Lukas Jonas, Serife Yasar, Stefan Conrad 0001. 2003-2005 [doi]
- Analyzing Historical Legal Textcorpora: German VET and CVET regulationsThomas Reiser, Jens Dörpinghaus, Petra Steiner. 2007-2018 [doi]
- Extending the German Labor Market Ontology with Online DataDiana Martic, Andreas Fischer, Jens Dörpinghaus. 2019-2030 [doi]
- Educational pathways in a German labor market knowledge graphKaterina Kostadinovska, Jens Dörpinghaus. 2031-2033 [doi]
- Node and Edge Removal on Complex Networks in Labor Market Research and their Influence on Centrality MeasuresMeetkumar Pravinbhai Mangroliya, Jens Dörpinghaus, Robert Rockenfeller. 2035-2046 [doi]
- An analysis of Computer Science in OJAs with a dual-lingual ontology approachMichael Tiemann, Jens Dörpinghaus, Venkatesh Hariharapura Shivashankar. 2047-2058 [doi]
- Comparing a legacy tools taxonomy with digital tools from Computer Science OntologyMichael Tiemann, Jens Dörpinghaus, Venkatesh Hariharapura Shivashankar, Ralf Dorau. 2059-2061 [doi]
- Utilizing Personas to Create Infrastructures for Research Data and Software ManagementJan Bernoth, Firas Al Laban, Ulrike Lucke. 2065-2072 [doi]
- Nachhaltiges Forschungsdatenmanagement in Brandenburg: Auf dem Weg zu einer landesweiten InstitutionalisierungHeike Neuroth, Daniela Mertzen, Carsten Schneemann, Janine Straka, Ian Wolff. 2073-2080 [doi]
- Förderung der Digitalisierung von Hochschulen durch die Integration von IT-Service Management und Enterprise Architecture Management: Integration von TOGAF® in die CMDB einer IT-Service Management PlattformDennis Kraus, Michael Martin, Andreas Hartmann 0001. 2081-2094 [doi]
- Kooperative Erhebung der IT-Bebauung: Methoden, Ergebnisse und Übertragbarkeit auf weitere HochschulenMarkus Von Der Heyde, Andreas Hartmann 0001. 2095-2105 [doi]
- Methodische Ermittlung von Kooperationspotenzialen: Symbiose aus praxisorientierter Analyse und empirischer ErhebungMarkus Von Der Heyde. 2107-2122 [doi]
- Together Forward: Employee-driven Innovation as a Driver for Twin Transformation in Higher EducationStephan Leible, Dejan Simic, Gian-Luca Gücük, Constantin Von Brackel-Schmidt, Steffen Schlager. 2123-2137 [doi]
- Perceived Barriers to Open Science among Researchers in Mathematics, Natural Sciences, and Cognitive SciencesChristian Riedel, Shafayet Hossen Chowdhury, Ralf Engbert, Ulrike Lucke. 2139-2151 [doi]
- Forschungsgeleitete Vermittlung von Datenkompetenz: Mediendidaktische Aufbereitung von Fallstudien zu BildungsangebotenEvgenia Samoilova, Henny Sluyter-Gäthje, Daniil Skorinkin, Hannes Schnaitter, Peer Trilcke, Ulrike Lucke. 2153-2166 [doi]
- 15 Vorschläge von strategischen Green IT Leitlinien für eine Integration in die IT-Strategie der bayerischen HochschulenAnnette Kott, Rainer Groß, Harald Kosch, Jennifer Schuster, Christoph Bauer. 2167-2180 [doi]
- Exploring Existing Tools for Managing Different Types of Research DataAdrian Freund, Hamideh Hajiabadi, Anne Koziolek. 2181-2193 [doi]
- Aufbau einer überregionalen Data-Science-CommunityHelen Pfuhl, Lena Steinmann, Dirk Nowotka, Rolf Drechsler. 2197-2203 [doi]
- TU Dortmund - Center for Data Science & Simulation: Data Literacy Education an der TU DortmundHenrike Weinert, Alexander Munteanu. 2205-2211 [doi]
- Angewandte künstliche Intelligenz im Verbund verschiedener FachbereicheChristian Bockermann, Jörg Frochte, Daniel Schilberg. 2213-2222 [doi]
- Die Vermittlung von Best Practices zur Messung von Datenqualität in den quantitativen SozialwissenschaftenJulian Dehne, Jessica Daikeler, Henning Silber, Beatrice Rammstedt, Florian Keusch, Frauke Kreuter, Johannes Blumenberg, Clemens Lechner, Lena Römer, David Schoch, Pascal Siegers, Stefan Jünger, Katrin Weller. 2223-2235 [doi]
- Minor Digital Science at the University of Innsbruck: The Dynamics of Multidisciplinary Education for Heterogeneous GroupsJoanna Chimiak-Opoka, Justus H. Piater. 2237-2244 [doi]
- Wissenschaftlicher Nachwuchs an Hochschulen für Angewandte Wissenschaften - Neue Perspektiven durch ein eigenständiges PromotionsrechtRalf Dörner 0001, Thomas Barton 0001, Rainer Herpers, Martin Sternberg, Anett Mehler-Bicher, Sven Pagel, Martin Kappes. 2247-2270 [doi]