The Deconstructed Cloud Databases project stems from a simple question: What are the minimum components required to build a data management system in the cloud? Our motivation for this project is based on the idea that reducing a system to its minimum set of components makes it easier to build, test, and maintain cloud data management systems. This approach requires less engineering effort, …
Supervisors:
Martin Hentschel
Semester: Fall 2024
Tags: data management, security, open source, open standards
Invasive bird species can be a serious problem in cities, towns and in agriculture. The common pigeon is a very unwelcome guest on many balconies, roofs, terraces. Conventional scarecrows often show no effect, as these birds are known to be quite intelligent, and capable of learning fast. The idea is to built a sensor/camera enhanced scarecrow that - can recognize birds present within its …
Supervisors:
Sebastian Büttrich
Semester: Fall 2022
Tags: IoT, ML, machineLearning, sensors, security
Recent progress in LoRaWAN development has made a new generation of satellite communications offerings available to IoT devices. In these, the LoRaWAN gateway is satellite born, and collecting data from small inexpensive ground stations. So far, this is predominantly seen as a means of communciation for remote sensor data, e.g. in agriculture, logistics or wildlife monitoring. However, one can …
Supervisors:
Sebastian Büttrich
Semester: Fall 2021
Tags: IoT, LoRaWAN, LPWAN, satellite, networks, edge, security
Hash-based authentication is an effective way of protecting passwords in software systems. Hashing obscures the original passwords, such that it cannot be recovered in case of a database breach. However, as demonstrated by our paper titled Hash-Based Authentication Revisited in the Age of High-Performance Computers, the practical security depends on which hashing algorithm is used as well as the …
Supervisors:
Pınar Tözün, Niclas Hedam
Tags: benchmarking, hashing, security, GPU, hacking, HPC