Program in Detail


The program is still subject to change.


Invited Speakers

Have a look at the details on our invited speakers.


Session 1: Quantum Computing

Wednesday, June 12, 2024, 10:45 a.m.

Melanie van Dommelen and Frank PhillipsonQUBO Formulation for Sparse Sensor Placement for Classification
Abstract: The demand for facial recognition technology has grown in various sectors over the past decade, but the need for efficient feature selection methods is crucial due to high-dimensional data complexity. This paper explores the potential of quantum computing for Sparse Sensor Placement optimisation (SSPO) in facial image classification. It studies a well known Filter Approach, based on statistical measures like Pearson correlation and Mutual Information, as it offers computational simplicity and speed. The proposed Quadratic Unconstrained Binary optimisation (QUBO) formulation for SSPO, inspired by the Quadratic Programming Feature Selection approach, aims to select a sparse set of relevant features while minimising redundancy. QUBO formulations can be solved by simulated annealing and by quantum annealing. Two experiments were conducted to compare the QUBO with a machine learning (ML) approach. The results showed that the QUBO approach, utilising simulated annealing, achieved an accuracy between random placed sensors and ML based sensors. The ML algorithm outperformed the QUBO approach, likely due to its ability to capture relevant features more effectively. The QUBO approach’s advantage lies in its much shorter running time. The study suggests potential improvements by using Mutual Information instead of Pearson correlation as a measure of feature relevance. Additionally, it highlights the limitations of quantum annealers’ current connectivity and the need for further advancements in quantum hardware.
Frank Phillipson

Leveraging Quantum Technology to Enhance Community Services and Supportive ICT Infrastructure

Abstract: ...

Sebastian Zielinski, Magdalena Benkard, Jonas Nüßlein, Claudia Linnhoff-Popien and Sebastian Feld

SATQUBOLIB: A Python Framework for Creating and Benchmarking (Max)-3SAT QUBOs
Abstract: ...

Back to Program Overview, Top


Session 2: Pervasive Computing

Wednesday, June 12, 2024, 1:15 p.m.

Wessel Kraaij, Marloes van der Klauw, Geiske Bouma and Pepijn van Empelen

Better Together – Empowering Citizen Collectives with Community Learning

Abstract: ...
Lucie Schmidt, Christian ErfurthThe Future of Aging at Home: A Trend Analysis of Smart Home Innovations
Abstract: ...
Sabrina Hölzer, Christian ErfurthExamining Smart Neighborhood Platforms: A Qualitative Exploration of Features and Applications
Abstract: ...

Back to Program Overview, Top


Session 3: Information Analysis

Wednesday, June 12, 2024, 3:00 p.m.

Mario M. Kubek, Shiraj Pokharel and Georg P. RoßruckerWebMap – Large Language Model-assisted Semantic Link Induction in the Web
Abstract: ...
Patrick Seidel, Steffen SpätheDevelopment and validation of AI-driven NLP algorithms for chatbots in Requirement Engineering
Abstract: ...

Sergej Schultenkämper and Frederik Simon Bäumer

Structured Knowledge Extraction for Digital Twins: Leveraging LLMs to Analyze Tweets
Abstract: ...

Back to Program Overview, Top


Session 4: Graphs and Routing

Thursday, June 13, 2024, 8:30 a.m.

Sam Leder and Thijs LaarhovenOblivious graph algorithms for solving TSP and VRP using FHE and MPC
Abstract: ...
Florian Blauensteiner and Günter FahrnbergerRoute Optimization of an Unmanned Aerial Vehicle beyond Visual Line of Sight
Abstract: ...
Laurent Hussenet, Cherifa Boucetta and Michel HerbinSpanning Thread: A Multidimensional Classification Method for Efficient Data Center Management
Abstract: ...

Back to Program Overview, Top


Session 5: Information Security in Supply Chains

Thursday, June 13, 2024, 10:30 a.m

Maximilian Greiner, Judith Strussenberg, Andreas Seiler, Stefan Hofbauer, Michael Schuster, Damian Stano, Günter Fahrnberger, Stefan Schauer and Ulrike LechnerScared? Prepared? Towards a Ransomware Incident Response Scenario
Abstract: ...
Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque, Tiago Gasiba and Didem OnguCOPYCAT: Applying Serious Games in Industry for Defending Supply Chain Attack
Abstract: ...
Andreas Seiler, Ulrike Lechner, Judith Strussenberg and Stefan HofbauerOperation Raven - Design of a Cyber Security Incident Response Game
Abstract: ...

Back to Program Overview, Top  


Session 6: Secure Applications

Thursday, June 13, 2024, 1:45 p.m..

Guntur Budi Herwanto, Gerald Quirchmayr, A Min Tjoa, Annisa Ningtyas, Diyah Putri and Anis FuadIntegrating Contextual Integrity in Privacy Requirements Engineering: A Study Case in Personal E-Health Applications
Abstract: ...
Manuel Gerwien, Marcel Großmann and Udo R. KriegerThe System Architecture of a Reliable Telesurgery Service and its Performance Analysis
Abstract: ...
Marcel Großmann and Noelle WeinmannEmulation of Denial-of-Service Attacks for Software Defined Networks Accessible on Commodity Hardware with Katharà
Abstract: ...

Back to Program Overview, Top 


Session 7: Blockchain and Digital Sovereignty

Friday, June 14, 2024, 9:00 a.m.

Karl Seidenfad, Maximilian Greiner, Jan Biermann, David Dannenberg, Sven Keineke and Ulrike LechnerGreenhouse Gas Emissions as Commons: A Community Service Approach with Blockchain on the Edge
Abstract: ...
Maximilian Greiner, Karl Seidenfad, Andreas Hofmann, Christoph Langewisch and Ulrike LechnerThe Digital Product Passport: Enabling Interoperable Information Flows through Blockchain Consortia for Sustainability
Abstract: ...
John Bechara and Ulrike LechnerDigital Sovereignty and Open Source Software - A Discussion Paper
Abstract: ...
Michael Hofmeier, Karl Seidenfad, Manfred Hofmeier and Wolfgang HommelWeb-based Protocol Enabling Distributed Identity Information Networks for Greater Sovereignty
Abstract: ...

Back to Program Overview, Top