Jump to main content Hotkeys
Distributed and Self-organizing Systems
Distributed and Self-organizing Systems
Seminar Web Engineering (SS 2022)


Seminar Web Engineering (SS 2022)

Welcome to the homepage of the Seminar Web Engineering

This website contains all important information about the seminar, including links to available topics as well as information about the seminar process in general.

The interdisciplinary research area Web Engineering develops approaches for the methodological construction of Web-based applications and distributed systems as well as their continuous development (evolution). For instance, Web Engineering deals with the development of interoperable Web Services, the implementation of web portals using service-oriented architectures (SOA), fully accessible user interfaces or even exotic web-based applications that are voice controlled via the telephone or that are represented on TV and Radio.

The following steps are necessary to complete the seminar:

  • Preparation of a presentation about the topic assigned to you.
  • An additional written report of your topic.
  • Each report is reviewed by two or three other particpants.

Seminar chairs

traubinger

christophgoepfert

gaedke


Contact

If you have any questions concerning this seminar or the exam as a participant, please contact us via OPAL.

We also offer a Feedback system, where you can provide anonymous feedback for a partiular session to the presenter on what you liked or where we can improve.

Participants

The seminar is offered for students of the following programmes (for pre-requisites, please refer to your study regulations):

If your programme is not listed here, please contact us prior to seminar registration and indicate your study programme, the version (year) of your study regulations (Prüfungsordnungsversion) and the module number (Modulnummer) to allow us to check whether we can offer the seminar for you and find an appropriate mapping.

Registration

You may only participate after registration in the Seminar Course in OPAL

The registration opens on 21.03.2022 and ends on 08.04.2022 at 23:59. As the available slots are usually rather quickly booked, we recommend to complete your registration early after registration opens.

Topics and Advisors

Questions:

  • How can you include Forgiveness and Regret in a Content Trust Model?
  • Why would these concepts enhance the Content Trust model?

Questions:

  • What are the FAIR principles and what are the CARE principles?
  • How can they particularly be applied for publishing research files?
  • Which tools exist that can assist a user and assess the quality of the provided file meta information?

Questions:

  • What are the use cases that it has been applied to in the scientific literature?
  • How does it compare with deep learning and semantic web?
  • How can we implement a use case with cognitive AI?

Questions:

  • What is User Interface Experience and why does it matter?
  • Which approaches exist to evaluate a good user interface experience?
  • Provide an own sample evaluation

Literature:

  • Sauro, J. (2016). Quantifying the user experience: Practical statistics for user research
  • Own research

Questions:

  • What are GOMS/KLM Models? How do they work? Why are they used? What is the (data) basis on which they were created?
  • For what kinds of user interfaces can they be or have they been applied? What are their limitations?
  • Apply GOMS modeling to real world examples (e.g. vsr website) and demonstrate how they can be used to improve these interfaces.

Literature:

  • https://cogulator.io/
  • https://syntagm.co.uk/design/klmcalc.shtml
  • https://www.cogtool.org/
  • Card, S. K., Moran, T. P., & Newell, A. (1983). The psychology of human-computer interaction. Hillsdale, N.J. : L. Erlbaum Associates.
  • Kieras, D. (1997). A guide to GOMS model usability evaluation using NGOMSL (Chapter 31). In M. Helander, T.K. Landauer & P.V. Prabhu (Eds.), Handbook of Human-Computer Interaction. Amsterdam: North-Holland Elsevier Science Publishers. Kim,
  • John, B. and Kieras, D. The GOMS family of user interface analysis techniques: comparison and contrast. ACM TOCHI, 3 (4). 1996. 320-351.
  • John, B. E. (2010). CogTool: Predictive human performance modeling by demonstration. 19th Annual Conference on Behavior Representation in Modeling and Simulation 2010, BRiMS 2010, 308–309.

Questions:

  • What are replication studies? Why are replication studies important? To what situation does the term "replication crisis" refer to and in which fields within computer science research has it been applied?
  • Find existing replication studies in Web Engineering and Software Engineering. What is replicated in them and how? Are there differences to replication studies in other fields (e.g. psychology, biology)?
  • Did the replication studies confirm the initial results? What were the problems?

Literature:

  • Cockburn, A., Dragicevic, P., Besançon, L., & Gutwin, C. (2020). Threats of a replication crisis in empirical computer science. Communications of the ACM, 63(8), 70–79. https://doi.org/10.1145/3360311
  • Echtler, F., & Häußler, M. (2018). Open Source, Open Science, and the Replication Crisis in HCI. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018-April, 1–8. https://doi.org/10.1145/3170427.3188395
  • Shepperd, M. (2018). Replication studies considered harmful. Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 73–76. https://doi.org/10.1145/3183399.3183423
  • Gómez, O. S., Juristo, N., & Vegas, S. (2014). Understanding replication of experiments in software engineering: A classification. Information and Software Technology, 56(8), 1033-1048.
  • Da Silva, F. Q., Suassuna, M., França, A. C. C., Grubb, A. M., Gouveia, T. B., Monteiro, C. V., & dos Santos, I. E. (2014). Replication of empirical studies in software engineering research: a systematic mapping study. Empirical Software Engineering, 19(3), 501-557.
  • Shepperd, M., Ajienka, N., & Counsell, S. (2018). The role and value of replication in empirical software engineering results. Information and Software Technology, 99, 120-132.

Questions:

  • Analyze provided/existing datasets of UI Object Detection for spatial characteristics. Create a queryable geo index of bounding boxes.
  • Analyze the 1-dimensional distributions, e.g. for x, y, CoG, width, height, area, distance to nearest neighbor (x, y and geometrical)? Create heatmap visualizations of the bounding boxes (left corner, right corner, CoG, full area).
  • Analyze alignments/alignment graphs. Are there regularities/patterns?
  • Are spatial aspects characteristic? Are there differences across classes? Can object types be predicted from spatial data? Are there differences compared to random/low-quality datasets?

Literature:

  • Heil, S., Bakaev, M., & Gaedke, M. (2021). Web User Interface as a Message: Power Law for Fraud Detection in Crowdsourced Labeling. In M. Brambilla, R. Chbeir, F. Frasincar, & I. Manolescu (Eds.), Web Engineering (Vol. 12706, pp. 88–96). Springer International Publishing. https://doi.org/10.1007/978-3-030-74296-6_7

Questions:

  • How can models be fine-tuned for usage in the HCI domain?
  • How can recognized entities be disambiguated?
  • Which methods for candidate ranking exist?
  • What are current limitations?

Literature:

  • Devlin, J., Chang, M., Lee, K., & Toutanova, K. (2019). BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. NAACL.
  • Beltagy, I., Lo, K., & Cohan, A. (2019). SciBERT: A Pretrained Language Model for Scientific Text. EMNLP.
  • Labusch, K., & Neudecker, C. (2020). Named Entity Disambiguation and Linking Historic Newspaper OCR with BERT. CLEF.
  • https://www.dbpedia.org/
  • https://www.wikidata.org/
  • own research

Questions:

  • What are the differnent types of approaches for extracting structured information from unstructured text
  • Compare the existing approaches in terms of performance?
  • What is the best state of the art solution for achieving this?
  • What are some of the existing European proved health discharge summaries?

Literature:

    Questions:

    • How does a Systematic Literature Review work? Prepare a guideline for computer science students explaining the main aspects and include a list of relevant publications search engines/catalogues.
    • What does "systematic" mean in SLR, how is it different from other literature review methods? How does it compare to a Structured Literature Review? How does it compare to a Systematic Mapping Studies? What are risks and limitations of the method?
    • How are research questions represented/quantified? What does coding mean in this context?
    • How are search queries constructed? Explain the technique of query expansion for generating additional queries.
    • Which SLR artifacts should be provided to allow for reproducibility and replicability?
    • What tools exist to support SLRs? Demonstrate a suitable tool.

    Literature:

    • Kitchenham, B. (2004). Procedures for Undertaking Systematic Reviews. https://www.inf.ufsc.br/~aldo.vw/kitchenham.pdf
    • Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., & Linkman, S. (2009). Systematic literature reviews in software engineering - A systematic literature review. Information and Software Technology, 51(1), 7–15.
    • Brereton, P., Kitchenham, B. a., Budgen, D., Turner, M., & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software, 80(4), 571–583.
    • Petersen, K., Vakkalanka, S., & Kuzniarz, L. (2015). Guidelines for conducting systematic mapping studies in software engineering: An update. Information and Software Technology, 64, 1–18.
    • Díaz, O., Medina, H., & Anfurrutia, F. I. (2019). Coding-Data Portability in Systematic Literature Reviews. Proceedings of the Evaluation and Assessment on Software Engineering - EASE ’19, 178–187.
    • Khadka, R., Saeidi, A. M., Idu, A., Hage, J., & Jansen, S. (2013). Legacy to SOA Evolution: A Systematic Literature Review. In A. D. Ionita, M. Litoiu, & G. Lewis (Eds.), Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments (pp. 40–71). IGI Global.
    • Jamshidi, P., Ahmad, A., & Pahl, C. (2013). Cloud Migration Research: A Systematic Review. IEEE Transactions on Cloud Computing, 1(2), 142–157.
    • Rai, R., Sahoo, G., & Mehfuz, S. (2015). Exploring the factors influencing the cloud computing adoption: a systematic study on cloud migration. SpringerPlus, 4(1), 197.
    • A. Hinderks, F. José, D. Mayo, J. Thomaschewski and M. J. Escalona, "An SLR-Tool: Search Process in Practice : A tool to conduct and manage Systematic Literature Review (SLR)," 2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 2020, pp. 81-84.
    • PRISMA 2020 http://www.prisma-statement.org/

    Questions:

    • What are ontology-based Digital Twins? In which domains have they been applied, for what and with what level of success (is there corresponding evidence)?
    • How are ontology-based Digital Twins constructed? What is their general architecture? In which parts are ontologies used? How are these ontologies created/influenced by existing ontologies/shared/reused?
    • What kinds of analyses and predictions have been implemented as ontology-based Digital Twins? Which algorithms are used? Which frameworks/tools/technologies are used? Prepare a demo by creating your own ontology-based Digital Twin for some analytical or predictive scenario.

    Literature:

    • Chevallier, Z., Finance, B., & Boulakia, B. C. (2020). A reference architecture for smart building digital twin. International Workshop on Semantic Digital Twins, CEUR Workshop Proceedings, 2615, 1–12.
    • Singh, S., Shehab, E., Higgins, N., Fowler, K., Reynolds, D., Erkoyuncu, J. A., & Gadd, P. (2020). Data management for developing digital twin ontology model. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, 095440542097811. https://doi.org/10.1177/0954405420978117
    • Jones, D., Snider, C., Nassehi, A., Yon, J., & Hicks, B. (2020). Characterising the Digital Twin: A systematic literature review. CIRP Journal of Manufacturing Science and Technology, 29, 36–52. https://doi.org/10.1016/j.cirpj.2020.02.002
    • Meyer, M., Yu, Z., Gulati, P., Delforouzi, A., Roggenbuck, J., & Wolf, K. (2020). Ontologies for Digital Twins in Smart manufacturing. Whitepaper. https://doi.org/10.1080/00207543.2017.1351644
    • Prieto Santamaría, L., Fernández Lobón, D., Díaz-Honrubia, A. J., Ruiz, E. M., Nifakos, S., & Rodríguez-González, A. (2021). Towards the Representation of Network Assets in Health Care Environments Using Ontologies. Methods of Information in Medicine, 60(S 02), e89–e102. https://doi.org/10.1055/s-0041-1735621
    • Nazir, A. (2021). An Ontology based Approach for Context-Aware Security in the Internet of Things (IoT). International Journal of Wireless and Microwave Technologies, 11(1), 28–46. https://doi.org/10.5815/ijwmt.2021.01.04
    • Vega-Barbas, M., Villagrá, V. A., Monje, F., Riesco, R., Larriva-Novo, X., & Berrocal, J. (2019). Ontology-Based System for Dynamic Risk Management in Administrative Domains. Applied Sciences, 9(21), 4547. https://doi.org/10.3390/app9214547
    • https://docs.microsoft.com/en-us/azure/digital-twins/concepts-ontologies
    • https://journals.sagepub.com/doi/pdf/10.1177/0954405420941160
    • https://www.sciencedirect.com/science/article/pii/S0007850620301086
    • https://ieeexplore.ieee.org/document/9344997

    Questions:

    • What are anonymization and pseudonymization and why does it matter?
    • Which anonymization and pseudonymization methods exist?
    • What is syntactical anonymization and differential privacy?
    • How can anonymized/pseudonymized datasets be attacked?

    Literature:

    • Gruschka, N. et al.: Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR. In Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018, 2019; S. 5027–5033.
    • Clifton, C.; Tassa, T.: On syntactic anonymity and differential privacy. In Transactions on Data Privacy, 2013, 6; S. 161–183.
    • Machanavajjhala, A. et al.: l-Diversity: Privacy Beyond. In Discovery, 2007, 1; S. 146.
    • Ninghui, L.; Tiancheng, L.; Venkatasubramanian, S.: t-Closeness: Privacy beyond k-anonymity and ℓ-diversity: Proceedings - International Conference on Data Engineering, 2007; S. 106–115.
    • Own research

    Questions:

    • What is Electron?
    • How does it work?
    • What are limitations?
    • Who uses Electron?

    Literature:

    Questions:

    • How research data can be treated as digital assets using blockchain technology?
    • How blockchain enables trust and ownership on research data?
    • How blockchain guarantees tamperproof research data?
    • What are the benefits of blockchain on sharing research data?
    • Demonstrate platforms for data sharing and data economy that are built using blockchain technology

    Literature:

    • Own research

    Questions:

    • How research data are controlled, monitored, assured and protected using data governance and security policies?
    • How research data are stored and standardized using data classification and quality frameworks?
    • How research data are collected, stored, assured and protected in hybrid cloud and multi-cloud in complient form?
    • Demonstrate research data management tools

    Literature:

    • Own research

    Questions:

    • What are existing best practices/guidelines etc. for scientific writing, particularly for writing bachelor/master theses, and especially in the fields of web engineering, software engineering, HCI, information systems.
    • How can texts be structured according to the "Pyramid Principle"? How to apply it to the argumentation structure of theses? How can it be combined with the SCQA scheme?
    • How does the CCC (Context-Content-Conclusion) Scheme work? What are the conflicts with the Pyramid Principle? How can they be combined in the same document?
    • What to consider when writing a thesis with regard to the use of tenses, wordings and consistency, abbreviations, subjunctive, wideness of claims, precision of claims, colloquial expressions, language complexity, and overall writing style?
    • For all best practices/guidelines/schemes/principles/advices etc., what is the current evidence base (e.g. experimental studies) supporting their effectiveness?
    • Demo Idea (can be discussed/modified): Prepare interactive self-learning materials (e.g. a quiz) for the best practices/guidelines/schemes/principles/advices etc. targeting bachelor/master students who are starting to write their theses.

    Literature:

    • B. Minto, The Pyrimid Principle: Logic in Writing and Thinking. London: Pitman, 1995.
    • B. Mensh and K. Kording, “Ten simple rules for structuring papers,” PLOS Comput. Biol., vol. 13, no. 9, p. e1005619, Sep. 2017, doi: 10.1371/journal.pcbi.1005619.

    Questions:

    • What is empirical Software Engineering Evaluation and how can it be done?
    • Why is evaluation important in the research process?
    • What is the difference between a qualitative and quantitative evaluation? (When do you use which one? What are advantages and disadvantages?)
    • Prepare a list of evaluation methods and tools that can be used to evaluate software. Explain them and add relevant literature for these methods.
    • Demonstrate one quantitative and one qualitative method. For this, find a feasible research question, conduct a survey on it with each of the two methods, compute the results, discuss and present them. You can choose a low level topic on your own that is related to Web Engineering. Use statistical methods to compute the results.

    Literature:

    • Own research
    • Creswell, J. W. (2014). Research design : Qualitative, quantitative, and mixed methods approaches (4. ed., in). SAGE. https://katalog.bibliothek.tu-chemnitz.de/Record/0008891954
    • Wohlin, C., Runeson, P., Höst, M., Ohlsson, M. C., Regnell, B., & Wesslén, A. (2012). Experimentation in Software Engineering. In Experimentation in Software Engineering (Vol. 9783642290). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-29044-2
    • Chatzigeorgiou, A., Chaikalis, T., Paschalidou, G., Vesyropoulos, N., Georgiadis, C. K., & Stiakakis, E. (2015). A Taxonomy of Evaluation Approaches in Software Engineering. Proceedings of the 7th Balkan Conference on Informatics Conference - BCI ’15, 1–8. https://doi.org/10.1145/2801081.2801084
    • Wainer, J., Novoa Barsottini, C. G., Lacerda, D., & Magalhães de Marco, L. R. (2009). Empirical evaluation in Computer Science research published by ACM. Information and Software Technology, 51(6), 1081–1085. https://doi.org/10.1016/j.infsof.2009.01.002

    Questions:

    • The Use Case for this topic is an Indoor-Navigation App: What is it, how is it used, what's special about it?
    • Accessible Applications need to encompass several features as people with a variety of individual impairments must be able to use them. Several needs may conflict as the app still has to be usable.
    • Implement a design for an Indoor-Navigation app for cognitive, auditive, motorical and visual impairments. You can use previous student works as a basis for the design choices and should generally keep in mind that the goal is to have a Universal Design for the Application.
    • Provide a list/table of different impairments, their needs and where they might conflict with or complement each other
    • Keep in mind that the output does not only have to be visual/auditive. Search for other interface options and how they might be integrated.

    Literature:

    • Own research
    • Previous reports from students (will be provided via mail) and their references
    • B. Bornemann, J. Entzminger, M. Erle, A. Frydyada de Piotrowski, P. Kowallik, P. Rozek, H. Weber, and C. Weiland, “Accessibility Universal Design,” German UPA e.V., April, 2016. [Online]. Available: https://germanupa.de/sites/default/files/2021-11/160721fsbarrierefreiheitenbfpdfua.pdf
    • United Nations, “Convention on the Rights of Persons with Disabilities (CRPD),” United Nations, n. d.. [Online]. Available: https://www.un.org/development/desa/disabilities/convention-on-the-rights-of-persons-with-disabilities.html
    • M. Gupta u. a., „Towards More Universal Wayfinding Technologies: Navigation Preferences Across Disabilities“, in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu HI USA, Apr. 2020, S. 1–13. doi: 10.1145/3313831.3376581.
    • Franzkowiak, L., Tauchmann, N., Costantino, M., Traubinger, V. & Ohler, P. (2021, September 8–10). A blind spot in indoor navigation - needs and requirements of visually impaired people [Posterpräsentation]. 12th Media Psychology Conference 2021 (MediaPsych 2021), Aachen, Germany. https://www.tu-chemnitz.de/phil/imf/mp/dynamik/infothek/dokumente/poster_mediapsych21.pdf

    Questions:

    • What is Routing? What are differences between indoor and outdoor navigation?
    • What information are important? Consider information from the building, but also from the surrounding area. (Use OpenStreetMap(OSM) tags as a data basis for this and don't forget to include accessibility information.) Is there other information in or about the building that is relevant? Give an overview over all of this data.
    • How can it be stored so that the information can be accessed easily? What concepts are used and how do they work? Give on overview over this and show examples.

    Literature:

    • Own research
    • https://www.openstreetmap.org
    • https://wiki.openstreetmap.org/wiki/Main_Page
    • R. Tscharn, T. Außenhofer, D. Reisler, und J. Hurtienne, „“Turn Left After the Heater”: Landmark Navigation for Visually Impaired Users“, S. 2, doi: 10.1145/2982142.2982195.
    • V. Traubinger, L. Franzkowiak, N. Tauchmann, M. Costantino, J. Richter, und M. Gaedke, „The Right Data at the Right Moment for the Right Person — User Requirements and Their Implications for the Design of Indoor Navigation Systems“, in 2021 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Lloret de Mar, Spain, Nov. 2021, S. 1–8. doi: 10.1109/IPIN51156.2021.9662570.
    • N. Fallah, I. Apostolopoulos, K. Bekris, und E. Folmer, „Indoor Human Navigation Systems: A Survey“, Interacting with Computers, Bd. 25, Nr. 1, S. 21–33, Jan. 2013, doi: 10.1093/iwc/iws010.
    • C. Bauer, M. Müller, und B. Ludwig, „Indoor pedestrian navigation systems: is more than one landmark needed for efficient self-localization?“, in Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia - MUM ’16, Rovaniemi, Finland, 2016, S. 75–79. doi: 10.1145/3012709.3012728.
    • A. Miyake, M. Hirao, M. Goto, C. Takayama, M. Watanabe, und H. Minami, „A Navigation Method for Visually Impaired People: Easy to Imagine the Structure of the Stairs“, in The 22nd International ACM SIGACCESS Conference on Computers and Accessibility, Virtual Event Greece, Okt. 2020, S. 1–4. doi: 10.1145/3373625.3418002.
    • M. Gupta u. a., „Towards More Universal Wayfinding Technologies: Navigation Preferences Across Disabilities“, in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu HI USA, Apr. 2020, S. 1–13. doi: 10.1145/3313831.3376581.
    • H. Nicolau, J. Jorge, und T. Guerreiro, „Blobby: how to guide a blind person“, in Proceedings of the 27th international conference extended abstracts on Human factors in computing systems - CHI EA ’09, Boston, MA, USA, 2009, S. 3601. doi: 10.1145/1520340.1520541.
    • K. L. Lovelace, M. Hegarty, und D. R. Montello, „Elements of Good Route Directions in Familiar and Unfamiliar Environments“, in Spatial Information Theory. Cognitive and Computational Foundations of Geographic Information Science, Bd. 1661, C. Freksa und D. M. Mark, Hrsg. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999, S. 65–82. doi: 10.1007/3-540-48384-5_5.

    Questions:

    • What is design science research? What are the objectives of design science research?
    • Which are activities? How research is conducted? How results are evaluated?
    • In which research areas of computer science this methodology is more practical?
    • Using design science research produce a viable and simplified artifact in the form of a construct, a model, a method and demonstrate activities

    Literature:

    • Own research
    • Johannesson Perjons (2021), An Introduction to Design Science, https://link.springer.com/book/10.1007/978-3-030-78132-3

    Questions:

    • What is Hyperledger Indy? What are advantages and limitations?
    • How Cross-Network Identity Management works on Hyperledger Indy?
    • How can Hyperledger Indy be used for managing research data?
    • Show an example how identity using Hyperledger Indy works and data ownership is implemented.

    Literature:

    • Own research

    Questions:

    • What is the main objective?
    • What principles does COAR NGR build on?
    • Which behaviors are recommended and how can they be realised?

    Literature:

    Questions:

    • What is signposting?
    • How can signposting be applied to improve machine-readbility of resources on the Web?

    Questions:

    • How is a scientific work, especially a thesis, structured? What is the importance of an introduction?
    • What makes a "good" motivation for your scientific work? Why is it important for the readers?
    • What is the scope of a scientific work? Why is it important? How should you include the scope in the introduction?
    • What is an argument? What are different forms of an argument? What is the meaning of the terms "validity" and "soundness"? How can you use singular arguments to reach a bigger conclusion? How can you use argumentation in an introduction?
    • Show an exemplary structure of an introduction and how it relates to other parts of the thesis.

    Literature:

    • Own research
    • Peat, J., Elliott, E., Baur, L., & Keena, V. (2013). Scientific writing: easy when you know how. John Wiley & Sons. DOI:10.1002/9781118708019
    • Barbara Minto: The Pyramid Principle. Pearson Education, 2009.
    • Mensh, B., & Kording, K. (2017). Ten simple rules for structuring papers. PLoS computational biology, 13(9), e1005619. DOI: https://doi.org/10.1371/journal.pcbi.1005619
    • J. M. Setchell, “Writing a Scientific Report,” in Studying Primates: How to Design, Conduct and Report Primatological Research, Cambridge: Cambridge University Press, 2019, pp. 271–298.
    • Blackwell, J., & Martin, J. (2011). A scientific approach to scientific writing. Springer Science & Business Media.
    • Williams, J. M., & Bizup, J. (2014). Lessons in clarity and grace. Pearson.
    • Oguduvwe, J. I. P. (2013). Nature, Scope and Role of Research Proposal in Scientific Investigations. IOSR Journal Of Humanities And Social Science (IOSR-JHSS), 17(2), 83-87. https://www.iosrjournals.org/iosr-jhss/papers/Vol17-issue2/L01728387.pdf

    Questions:

    • What is it? How does it work?
    • Compare it to at least three other Semantic Networks that are OpenSource based
    • Use the OpenSource code and implement a semantic network. As a basis for this, use tags from OpenStreetMap (OSM) for Indoor Navigation. (The Indoor tags will be provided, but you have to validate them with your own OSM Wiki research.) Add information about Accessibility Information.
    • For what can you use such a Semantic Network?

    Literature:

    • Own research
    • https://conceptnet.io/
    • https://github.com/commonsense/conceptnet5/wiki
    • https://www.openstreetmap.org
    • https://wiki.openstreetmap.org/wiki/Main_Page
    • V. Traubinger, L. Franzkowiak, N. Tauchmann, M. Costantino, J. Richter, und M. Gaedke, „The Right Data at the Right Moment for the Right Person — User Requirements and Their Implications for the Design of Indoor Navigation Systems“, in 2021 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Lloret de Mar, Spain, Nov. 2021, S. 1–8. doi: 10.1109/IPIN51156.2021.9662570.
    • P. M. Dudas, M. Ghafourian, and H. A. Karimi, “ONALIN: Ontology and Algorithm for Indoor Routing,” 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, Taipei, Taiwan, 2009, pp. 720–725. doi: 10.1109/MDM.2009.123.

    Questions:

    • Where can we find scientific files from experiments that deal with human-technology-interaction and how are they commonly described?
    • Which aspects are commonly described for such a data based on knowledge-domain specific requirements?
    • Conduct a systematic search about existing taxonomies for that.

    Questions:

    • What architectural differences and similarities exist?
    • How well do these frameworks perform in benchmarks regarding rendering performance?
    • How well is each framework established in the industry?

    Questions:

    • What is D3.js and what are its characteristics?
    • How to make use of D3.js in an exemplary use case?
    • How to make use of D3.js in an advanced exemplary use case?

    Questions:

    • What are common techniques to access big data in distributed (web) systems?
    • How to access large files in a distributed web application? Adapt different techniques from the big data community.

    Questions:

    • What are common knowledge extraction methods?
    • How to extract contentual knowledge dimensions by parsing linked data?
    • How to achieve such contentual knowledge extraction in real time?

    Questions:

    • What is Linked Data?
    • What examples for Linked Data can be found on the Web?
    • What visualization techniques and tools exist for Linked Data?
    • What metrics can be used to compare these techniques?
    • Based on these metrics, how are the techniques rated?

    Seminar Opening

    The date and time of the seminar opening meeting will be announced via OPAL.

    Short Presentation

    The date and time of the short presentations will be announced via OPAL.

    In your short presentation, you will provide a brief overview on your selected topic.

    This includes the following aspects:

    1. What is in your topic?
    2. Which literature sources did you research so far?
    3. What is your idea for a demonstration?

    Following your short presentations, the advisors will provide you with feedback and hints for your full presentations.

    Hints for your Presentation

    • As a rule of thumb, you should plan 2 minutes per slide. A significantly higher number of slides per minute exceeds the perceptive capacity of your audience.
    • Prior to your presentation, you should consider the following points: What is the main message of my presentaion? What should the listeners take away?
      Your presentation should be created based on these considerations.
    • The following site provides many good hints: http://www.garrreynolds.com/preso-tips/

    Seminar Days

    The date and time of the seminar opening meeting will be announced via OPAL.

    Report

    • Important hints on citing:
      • Any statement which does not originate from the author has to be provided with a reference to the original source.
      • "When to Cite Sources" - a very good overview by the Princeton University
      • Examples for correct citation can be found in the IEEE-citation reference
      • Web resources are cited with author, title and date including URL and Request date. For example:
        • [...] M. Nottingham and R. Sayre. (2005). The Atom Syndication Format - Request for Comments: 4287 [Online]. Available: http://www.ietf.org/rfc/rfc4287.txt (18.02.2008).
        • [...] Microsoft. (2015). Microsoft Azure Homepage [Online]. Available: http://azure.microsoft.com/ (23.09.2015).
        • A url should be a hyperlink, if it is technically possible. (clickable)
    • Further important hints for the submission of your written report:
      • Use apart from justifiable exceptions (for instance highlight of text using <strong>...</strong>) only HTML elements which occur in the template. The CSS file provides may not be changed.
      • Before submitting your work, carefully check spelling and grammar, preferably with software support, for example with the spell checker of Microsoft Word.
      • Make sure that your HTML5 source code has no errors. To check your HTML5 source code, use the online validator of W3.org
      • For submission compress all necessary files (HTML, CSS, images) using a ZIP or TAR.GZ.

    Review

    • Each seminar participant has to review exactly three reports. The reviews are not anonymous.
    • Use the review forms provided in the VSR Seminar Workflow, one per report.
    • Following the review phase, each seminar participant will receive the three peer reviews of his or her report and, if necessary, additional comments by the advisors. You will then have one more week to improve your report according to the received feedback.
    • The seminar grade will consider the final report.
      All comments in the reviews are for improving the text and therefore in the interest of the author.

    Press Articles