Our range of books are being complemented by a number of high-grade publications:
- A Sapegin, D Jaeger, F Cheng, C Meinel
Towards a system for complex analysis of security events in large-scale networks
Computers & Security 67, 2017, 16-34
After almost two decades of development, modern Security Information and Event
Management (SIEM) systems still face issues with normalisation of heterogeneous data
sources, high number of false positive alerts and long analysis times, especially in large-
scale networks with high volumes of security events. In this paper, we present our own
prototype of SIEM system, which is capable of dealing with these issues. For efficient data
processing, our system employs in-memory data storage (SAP HANA) and our own ...
- J Renz, D Hoffmann, T Staubitz, C Meinel
Using A/B testing in MOOC environments
Proceedings of the Sixth International Conference on Learning Analytics & Knowledge, 2016, 304-313
In recent years, Massive Open Online Courses (MOOCs) have become a
phenomenon offering the possibility to teach thousands of participants simultaneously. In the
same time the platforms used to deliver these courses are still in their fledgling stages. While
course content and didactics of those massive courses are the primary key factors for the
success of courses, still a smart platform may increase or decrease the learners experience
and his learning outcome.
- T Staubitz, D Petrick, M Bauer, J Renz, C Meinel
Improving the peer assessment experience on MOOC platforms
Proceedings of the Third (2016) ACM Conference on Learning@ Scale, 389-398
Massive Open Online Courses (MOOCs) have revolutionized higher education by
offering university-like courses for a large amount of learners via the Internet. The paper at
hand takes a closer look on peer assessment as a tool for delivering individualized feedback
and engaging assignments to MOOC participants. Benefits, such as scalability for MOOCs
and higher order learning, and challenges, such as grading accuracy and rogue reviewers,
- T Staubitz, H Klement, J Renz, R Teusner, C Meinel
Towards practical programming exercises and automated assessment in massive open online courses
Teaching, Assessment, and Learning for Engineering (TALE), 2015 IEEE, S. 23-30
In recent years, Massive Open Online Courses (MOOCs) have become a
phenomenon presenting the prospect of free high class education to everybody. They bear a
tremendous potential for teaching programming to a large and diverse audience. The typical
MOOC components, such as video lectures, reading material, and easily assessable
quizzes, however, are not sufficient for proper programming education.
- M Löwis, T Staubitz, R Teusner, J Renz, C Meinel, S Tannert
Scaling youth development training in IT using an xMOOC platform
Frontiers in Education Conference (FIE), 2015. 32614 2015. IEEE, 1-9
The paper at hand evaluates the Massive Open Online Course (MOOC) Spielend
Programmieren Lernen (Playfully learning to program), an effort to scale the youth
development program at the Hasso Plattner Institute (HPI) for a larger audience. The HPI
has a strong tradition in attracting children and adolescents to take their first steps towards a
career in IT at an early age.
- Lea Seeber, Bettina Michl, Gabriella Rundblad, Brett Trusko, Maxim Schnjakin, Christoph Meinel, Ulrich Weinberg, Gerhard Gaedicke, Barbara Rath
A design thinking approach to effective vaccine safety communication
Current drug safety, 10, 2015, S. 31-40
The highly complex and controversial topic of vaccine safety communication warrants
innovative, user-centered solutions that would start with gaining mutual respect while taking
into account the needs, concerns and underlying motives of patients, parents and
physicians. To this end, a non-profit collaborative project was conducted by The Vienna
Vaccine Safety Initiative, an international think tank aiming to promote vaccine safety
research and communication, and the School of Design Thinking in Potsdam, Germany, ...
- D Jaeger, H Graupner, A Sapegin, F Cheng, C Meinel
Gathering and analyzing identity leaks for security awareness
Technology and Practice of Passwords, 2015, 102-115
The amount of identity data leaks in recent times is drastically increasing. Not only
smaller web services, but also established technology companies are affected. However, it
is not commonly known, that incidents covered by media are just the tip of the iceberg.
Accordingly, more detailed investigation of not just publicly accessible parts of the web but
also deep web is imperative to gain greater insight into the large number of data leaks. This
paper presents methods and experiences of our deep web analysis.
- J von Thienen, A Perlich, C Meinel
Tele-board MED: supporting twenty-first century medicine for mutual benefit
Design Thinking Research, 2015, 101-130
Tele-Board MED is a medical documentation system designed to support patient-
doctor cooperation at eye level. In particular, it tackles the challenge of turning medical
documentation from a necessity, which disturbs the treatment flow, into a curative process by
itself. With its focus on cooperative documentation, Tele-Board MED embraces a call uttered
by many scientists and politicians nowadays for twenty-first century medicine and patient
- T Staubitz, S Woinar, J Renz, C Meinel
Towards social gamification-implementing a social graph in an xmooc platform
Proceedings of the 7th International Conference of Education, Research and Innovation, 2014, 17-19
High dropout rates and poor user participation are some of the major challenges for
xMOOC providers. Similar to others, openHPI also faces these problems. Gamification is a
mechanism that recently has been successfully employed to raise user motivation in web
applications. A concept to gamify the openHPI platform has been proposed and
implemented. Parts of it are already published on the platform.
- L Gericke, M Wenzel, C Meinel
Asynchronous understanding of creative sessions using archived collaboration artifacts
Collaboration Technologies and Systems (CTS), 2014 International Conference, S. 41-48
To a large extend, collaboration and communication consists of the understanding
of extrinsic activity. This task is especially hard to achieve in remote settings or also locally
when people cannot take part in meetings. In this paper we are addressing the question, if
understanding of the essential decisions, facts, and processes can be achieved by just
consuming collaboration data afterwards.
- F Grünewald, C Meinel, M Totschnig, C Willems
Designing MOOCs for the support of multiple learning styles
European Conference on Technology Enhanced Learning, 2013, 371-382
“Internetworking with TCP/IP” is a Massive Open Online Course, held in German at
openHPI end of 2012, that attracted a large audience that has not been in contact with
higher education before. The course followed the xMOOC model based on a well-defined
sequence of learning content, mainly video lectures and interactive self-tests, and with
heavy reliance on social collaboration features.
- H Rafiee, C Meinel
A secure, flexible framework for dns authentication in ipv6 autoconfiguration
Network Computing and Applications (NCA), 2013 12th IEEE, 165-172.
In The Domain Name System (DNS) is an essential part of the Internet on whose
function many other protocols rely. One key DNS function is Dynamic Update, which allows
hosts on the network to make updates to DNS records dynamically, without the need for
restarting the DNS service. Unfortunately, this dynamic process does expose DNS servers to
security issues. To address these issues two protocols were introduced: Transaction
Signature (TSIG) and Domain Name System Security Extensions (DNSSEC).
- F Grünewald, H Yang, E Mazandarani, M Bauer, C Meinel
Next generation tele-teaching: Latest recording technology, user engagement and automatic metadata retrieval
Human Factors in Computing and Informatics, 2013, 391-408
With the amount of tele-teaching content growing, issues with sucient metadata start existing. One solution is the user engagement. User engagement is based on the theory of the culture of participation and includes the usage of web 2.0 technology to activate students. This also has positive didactical side-e ects. Another solutionis the automatic creation of metadata.
- Christoph Meinel, Christian Willems
openHPI. Das MOOC-Angebot des Hasso-Plattner-Instituts
Technical Report No. 79, Hasso-Plattner-Institut (2013)
The paper reports on start and first experiences of our engagement in the new field of massive open online courses (MOOCs). On the MOOC platform openHPI, which we have developed, we started already in the "year of MOOCs" 2012 to offer MOOCs about IT Systems Engineering which are attended by several ten thousends of learner.
- Wesam Dawoud, Ibrahim Takouna, Christoph Meinel
Infrastructure as a service security: Challenges and solutions
7th IEEE Informatics and Systems (INFOS) (2010)
In cloud computing infrastructure as a Service (IaaS) serves as the foundation layer for the other delivery models, and a lack of security in this layer affects the other delivery models, i.e., PaaS, and SaaS that are built upon IaaS layer. This paper presents an elaborated study of IaaS components’ security and determines vulnerabilities and countermeasures. As a result of this research, we propose a Security Model for IaaS (SMI).
- S. Roschke, F. Cheng, Christoph Meinel
Intrusion Detection in the Cloud
8th IEEE Dependable, Autonomic and Secure Computing (DASC'09) (2009)
Intrusion detection systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. Facing new application scenarios in cloud computing, the IDS approaches yield several problems. This paper summarizes several requirements for deploying IDS in the cloud and propose an extensible IDS architecture for being easily used in a distributed cloud infrastructure.
- MG Noll, Christoph Meinel
Personalization 2.0: Web Search Personlization via Social Bookmarking and Tagging
Semantic Web, 367-380 (2007)
In this paper, we present a new approach to web search personalization based on user collaboration and sharing of information about web documents. The proposed personalization technique separates data collection and user profiling from the information system whose contents and indexed documents are being searched for, i.e. the search engines, and uses social bookmarking and tagging to re-rank web search results.
- Christoph Meinel, Volker Klotz
10 Years ECCC - A Digital Library in World Wide Use
Communication of the ACM, Vol. 49, No. 1 (2006), 131-134.
This paper summarizes our experiences in designing, establishing and maintainining the (worldwide first) electronic colloquium. Focusing on computational complexity ECCC opens new ways for fast and reliable communicating of new scientific results and enhances (Internet-based) scientific discussions.
- Christoph Meinel, J. Hu
Tele-Lab "IT-Security" on CD: Portable, Reliable and Safe IT Security Training
Computers & Security Journal, COSE 234, Vol. 23, Iss. 4 (2004) pp. 282-289.
- Christoph Meinel, T. Theobald
Ordered Binary Decision Diagrams and Their Significance in Computer-Aided Design of VLSI-Circuits
Journal of Ciruits, Systems and Computers, Vol. 9, Nos. 3 & 4 (1999), 181-198.
The paper founds the use of ordered binary decisions diagrams (OBDDs) as a data structure for representing mirco-electronic circuits as well as surveys our contributions to increase their efficiency.
- Carsten Damm, Matthias Krause, Christoph Meinel, Stephan Waack
On Relations Between Counting Communication Complexity Classes
Journal on Computer and Systems Science, (1998)
Here we introduce and investigate new complexity classes which are characterized by different modes of communication complexity. By proving various exponential lower bounds we are even able to show that these classes are all different when communication complexity is restricted.
- Christoph Meinel, S. Waack
The "Log Rank" Conjecture for Modular Communication Complexity
Computational Complexity, Vol. 10 (2001), 70-91
- Christoph Meinel, F. Somenzi, T. Theobald
Linear Sifting of Decision Diagrams and ist Application in Synthesis
IEEE Transactions on CAD, Vol. 19 (2000), No. 5, 521-533.
Shifting ist a powerful technique to find suited variable order which minimize complexity of OBDD-based cuircuit representations and, therefore, enhance OBDD-based synthesis and verification. We considerably improved this method by exploiting and utilizing powerful algebraic techniques.
- Jordan Gergov, Christoph Meinel
Efficient Analysis and Manipulation of OBDD's can be Extended to FBDD's
IEEE Transactions on Computers, Vol. 43, No. 10 (1994), 1197-1209. OBDDs are a famous data structure for the formal verification of electronic micro-cicuits since they allow efficient Boolean synthesis and equivalence testing. It was a great surprise when we could show that same is true for the more compact FBDDs. More you can read here
- G. Buntrock, C. Damm, U. Hertrampf, Christoph Meinel
Structure and Importance of Logspace-MOD-Classes
Mathématical Systems Theory, Vol. 25, (1992), 223-237.
As a generalization of the computational parity mode we newly invent modulo acceptation modes, and define and investigate corresponding Log-space MOD complexity classes.
- Christoph Meinel
Polynomial Size Omega-Branching Programs and Their Computational Power
Information and Computation, Vol. 85, No. 2 (1990), 163-182.
This paper provides a first systematic categorization of all possible computational modes in the context of Log-space bounded computations. It was detected that beside of the well-known deterministic and nondeterministic / co-nondeterministic modes there exits merely one additional mode, the firstly characterized parity mode. More you can read here.
- Christoph Meinel
Symbolic Simulation of Synchronous Parallel Systems
EIK 22 (1986), 7/8, 355-370.
In this paper a formal calulus was developed that makes it possible to describe and formally verify processings of synchronously working parallel systems. This calculus made it possible to detect a serious design error in a famous systolic VLSI system ...
Our design of a virtual lab opens completely new ways to teach and exercise IT-security. Concept and architecuture of our Tele-Lab "IT-security" was one of the first attemps to utilize virtual machines for e-learning.