Mobilitätsdaten nutzen – Potenziale, Perspektiven, Partnerschaften Die Mobilität der Zukunft ist datenbasiert – doch wie können Mobilitätsdaten heute schon sinnvoll genutzt werden? Welche innovativen Anwendungen sind möglich, wenn unterschiedliche Akteure gemeinsam an einem Strang ziehen?
Enhancing the efficiency of high-quality image generation using Diffusion Models (DMs) is a significant challenge due to the iterative nature of the process. Flow Matching (FM) is emerging as a powerful generative modeling paradigm based on a …
Today’s software systems have become increasingly connected and complex, requiring comprehensive analysis to ensure quality properties like confidentiality. Architecture-based confidentiality analysis enables the early identification of …
Bist du neugierig auf die faszinierende Welt der Künstlichen Intelligenz (KI)? Möchtest du herausfinden, was KI ist, wo du ihr bereits begegnest und wie sie unsere Zukunft gestaltet? Dann laden wir dich herzlich ein, deinen Girls‘Day mit dem TRIANGEL und FZI Forschungszentrum Informatik zu verbringen!
Selfish mining attacks threaten the tamper-resistance of blockchain systems with consensus mechanisms based on proof-of-work and probabilistic finality. Optimizing blockchain system configurations can mitigate these attacks. This, however, requires …
The adoption of Homomorphic Encryption (HE) and Secure Function Evaluation (SFE) applications in the real world remains limited, even nearly 50 years after the introduction of HE. This is particularly unfortunate given the strong privacy and …
Achieving and maintaining certain quality attributes of software-intensive systems is challenging, especially when these systems undergo change. In particular, information security is more difficult to maintain and degrades more rapidly than other …
In our modern world, the ever-expanding exchange of data and the increased complexity of interconnected software systems make software security challenging. Ideally, security concerns are already addressed early, as discussed with security by design. …