Martin Gaedke

Martin Gaedke
Technische Universität Chemnitz · Department of Computer Science

Prof. Dr.-Ing.

About

280
Publications
105,376
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,356
Citations
Introduction
Prof. Dr.-Ing. Martin Gaedke is Director of the University's Computing Center and Dean of the Department of Computer Science at the Chemnitz University of Technology (TUC), where he is also full professor and head of the chair for Distributed and Self-organizing Systems (VSR). http://vsr.informatik.tu-chemnitz.de
Additional affiliations
March 2019 - July 2019
TU Wien
Position
  • Professor
Description
  • Lecture: Talent Engineering - From Purpose to Impact Worked on project ideas and proposals
April 2019 - present
Technische Universität Chemnitz
Position
  • Head of Faculty
April 2016 - March 2019
Technische Universität Chemnitz
Position
  • Head of Faculty

Publications

Publications (280)
Conference Paper
Full-text available
Nowadays, Generative Artificial Intelligence (GenAI) can outper-form humans in creative professions, such as design. As a result, GenAI attracted a lot of attention from researchers and industry. However, GenAI could used to augment humans with a multimodal user interface, as proposed by Ben Shneiderman in his recent work on Human-Centred Artificia...
Article
Application logic is inherently distributed between client and server due to the fundamental Client/Server architecture of the Web. The individual distribution is specified at design time and remains unchanged stable, preventing individual load distribution between clients and server at runtime. Dynamic code mobility at runtime, in contrast, allows...
Preprint
Full-text available
Nowadays, Generative Artificial Intelligence (GenAI) can outper-form humans in creative professions, such as design. As a result, GenAI attracted a lot of attention from researchers and industry. However, GenAI could used to augment humans with a multimodal user interface, as proposed by Ben Shneiderman in his recent work on Human-Centred Artificia...
Chapter
Full-text available
While Dark Patterns are widely present in graphical user interfaces, in this research we set out to find out whether they are also starting to appear in Chatbots. Dark Patterns are intentionally deceptive designs that trick users into acting contrary to their intention - and in favor of the organization that implements them. Chatbots, as a kind of...
Presentation
Full-text available
The research on Dark Patterns, both established and new ones, in chatbots by building a dataset of real-life negative chatbot interactions and coding it with labels including Dark Patterns and Usability Smells. Some established Dark Patterns could be found, while no new chatbot specific Dark Patterns could be labeled. The findings also indicate tha...
Chapter
Full-text available
Dynamic migration of code between client and server of a web application allows to balance the needs of users for smooth and responsive user interactions with the interests of software providers to reduce costs and use resources efficiently. The ability to change the execution location of parts of the application logic at runtime means that dependi...
Chapter
Full-text available
The engineering of user interfaces (UIs) increasingly relies on software tools that aid in ideation, design, evaluation, etc., but involve no real users. Particularly, user behavior models (UBMs) bear the potential to improve human-centered design processes, but their adoption in practice remains low. In this paper, we present a taxonomy for UBM to...
Chapter
The Web of Things (WoT) concept proposes to integrate the existing Web ecosystem with Things to provide an interoperable infrastructure which goes beyond basic network connectivity. Existing approaches unify the process to integrate the devices into the Web by automatically generating Web APIs based on semantic device descriptions. However, they ar...
Chapter
Full-text available
The underlying Client/Server architecture of the Web inherently raises the question of the distribution of application logic between client and server. Currently, this distribution is static and fixed at design time, inhibiting dynamic and individual load distribution between clients and server at runtime. The benefits of dynamic migration allow ba...
Presentation
Full-text available
Conference presentation on the a Taxonomy for User Behavior Model (UBM)-based Tools for UI Design and Research held by Sebastian Heil at ICWE 2023 in Alicante, Spain. See also: UBM Taxonomy Online Appendix at https://github.com/heseba/UBMToolsTaxonomy
Conference Paper
Full-text available
Indoor-navigation systems often present a challenge to people with impairments who have specifc informational needs. We envision two directions for inclusive indoor-navigation systems by using a Conversational User Interface (CUI): A feedback option in an indoor-navigation system and a map editor. Both will empower people with impairments to indepe...
Article
Artificial intelligence (AI)-based user-interface (UI) design and evaluation are currently constrained by the scarcity of human-generated training data. Correspondingly, choosing appropriate neural network (NN) architecture and carefully planning the sample size is essential for building accurate machine learning models. Previously, we have estimat...
Article
Full-text available
Training data for user behavior models that predict subjective dimensions of visual perception are often too scarce for deep learning methods to be applicable. With the typical datasets in HCI limited to thousands or even hundreds of records, feature-based approaches are still widely used in visual analysis of graphical user interfaces (UIs). In ou...
Presentation
Full-text available
Conference presentation on the results of a survey on the adoption of user-less automation tools by 34 UI design practicioners held at ICWE 2022 in Bari, Italy.
Conference Paper
Full-text available
Counterfeit products are a major problem that the market has faced for a long time. According to the Global Brand Counterfeiting Report 2018, "Amount of Total Counterfeiting, globally has reached to 1.2 Trillion USD in 2017 and is Bound to Reach 1.82 Trillion USD by the Year 2020" a solution to this concern has already been researched and published...
Chapter
Full-text available
The main principles for designing successful UIs in a perfect world have long been known—considering many possible solutions for a problem and involving representative users in the process. In practice, however, reasons for violating those principles can be plentiful: the infamous tight budgets and schedules, lack of management buy-in, restrictions...
Chapter
Full-text available
Deep Learning techniques have become the mainstream and unquestioned standard in many fields, e.g. convolutional neural networks (CNN) for image analysis and recognition tasks. As testing and validation of graphical user interfaces (GUIs) is increasingly relying on computer vision, CNN models that predict such subjective and informal dimensions of...
Conference Paper
Full-text available
Counterfeit products are a major problem that the market has been facing for a long time. According to the Global Brand Counterfeiting Report 2018 "Amount of Total Counterfeiting, globally has reached to 1.2 Trillion USD in 2017 and is Bound to Reach 1.82 Trillion USD by the Year 2020", a solution to this concern has already been researched and pub...
Conference Paper
Full-text available
To address the All the Agents Challenge (ATAC), we developed a solution for an Industry 4.0 use-case scenario that allows autonomous agents to reason on knowledge graphs, perceive, decide and act for reaching their goals, and coordinate the whole process in their Web of Things (WoT) environments. Our approach integrates the research works performed...
Conference Paper
Full-text available
The overall growth in the share of online sales has grown in comparison to total sales intensively. Online shopping is comfortable for consumers, but it also raises specific challenges in terms of product safety. For this, the European Commission published a notice on market surveillance of products sold online on August 1, 2017, to support authori...
Presentation
Full-text available
Knowledge and technology transfer between an academic institution and partners in the economy has gained importance in recent years. Universities seek to increase the visibility of their research activities and offered services, whereas business companies primarily focus on available expertise and services. In the past, this information was provide...
Chapter
Full-text available
Web Engineering becomes increasingly hungry for training data, as the application of machine learning (ML) methods in the field intensifies. Human-labeled datasets are particularly indispensable for ML-based validation and design of user interfaces (UIs). The production of such datasets is often outsourced to crowdworkers, who typically have lower...
Chapter
Full-text available
One of the main challenges in the Internet of Things (IoT) is the lack of semantic interoperability between heterogeneous sources. In the Semantic Web domain, ontologies are one way to achieve semantic interoperability by using a common vocabulary that represents heterogeneous sources. However, recent studies have shown that the amount of concept r...
Chapter
Full-text available
Tests, evaluations, and solution comparisons in complex use cases are often realized by creating a testbed for a domain of use cases and solutions. Web-based testbeds add key advantages like results sharing, remote test execution, and collaboration. Focusing on their research objectives, creators see their testbeds as a means to that end. The resul...
Chapter
Full-text available
In the publishing process for research data, common user interfaces for gathering descriptive structured metadata traditionally rely on static free-text input elements. This constitutes an obstacle for interdisciplinary, unambiguous, fine-grained data descriptions. Reusing already existing domain-specific metadata models based on semantic ontologie...
Chapter
In academic and industrial research, writing a project proposal is one of the essential but time-consuming activities. Nevertheless, most proposals end in rejection. Moreover, research funding is getting more competitive these days. Funding agencies are increasingly looking for more extensive and more interdisciplinary research proposals. To increa...
Chapter
How to understand better the knowledge provided by Google results to build future “smart vehicle-centric” applications? What is the knowledge expertise required to build a smart vehicle application (e.g., driver assistance system)? Automotive companies (e.g., Toyota, BMW, Renault) are employing Internet of Things (IoT) and Semantic Web technologies...
Article
Full-text available
An increasing number of companies offer their capabilities as Web services and publish them through public registries. Such Web services enable users to access and manipulate online data programmatically. Moreover, they can be deployed in service-based systems (SBS) or composite web applications and mashups to offer value-added services. A crucial...
Preprint
Full-text available
HCI increasingly employs Machine Learning and Image Recognition, in particular for visual analysis of user interfaces (UIs). A popular way for obtaining human-labeled training data is Crowdsourcing, typically using the quality control methods ground truth and majority consensus, which necessitate redundancy in the outcome. In our paper we propose a...
Conference Paper
Full-text available
With the wide adoption of service-oriented architectures, many service-based systems (SBSs) and mashups composed of Web services have been developed. Meanwhile, web service discovery, as a crucial component to guarantee the quality of Web service composition in SBS, gained increasing attention. Web service discovery aims to select the set of best s...
Conference Paper
Full-text available
ResearchAndMarkets wrote in their report on May 15, 2018, that up to 1.2 Trillion USD in 2017 of products are counterfeited goods. The report estimated this damage globally at 1.82 Trillion USD in 2020. This paper does not consider copyright infringement, digital piracy, counterfeiting or fraudulent documents, but rather examines the prevention of...
Conference Paper
Full-text available
One of the main challenges of the Internet of Things (IoT) is to enable end-users without technical experience to use, control or monitor smart devices. However, enabling end-users to interact with these smart devices in an intuitive and natural way becomes increasingly important as they become more pervasive in our homes, workplaces and public env...
Article
Full-text available
User behavior models see increased usage in automated evaluation and design of user interfaces (UIs). Obtaining training data for the models is costly, since it generally requires the involvement of human subjects. For interaction's subjective quality parameters, like aesthetic impressions, it is even inevitable. In our paper, we study applicabilit...
Chapter
Full-text available
The main objective of smart homes is to improve the quality of life and comfort of their inhabitants through automation systems and ambient intelligence. Voice-based interaction like dialogue systems is the current emerging trend in these systems. Natural Language Understanding (NLU) model can identify the end-users’ intentions in the utterances pr...
Chapter
In the context of Open Science, researchers are encouraged to publish their research datasets in digital data repositories so that others can find and reuse it.
Article
Recounts the career and contributions of Florian Daniel.
Conference Paper
Full-text available
ResearchAndMarkets wrote in their report on May 15, 2018, that up to 1.2 Trillion USD in 2017 of products are counterfeited goods. The report estimated this damage globally at 1.82 Trillion USD in 2020 (RESEARCH AND MARKETS, 2018). This paper does not consider copyrights or digital piracy, counterfeiting, fraudulent documents but rather investigate...
Conference Paper
Full-text available
The lack of therapy compliance (adherence) is an already well-studied phenomenon in the health sector. It is known that numerous factors can influence regular medication intake. A promising approach for increasing therapy compliance are patient-related factors. In order to increase motivation, Gamification-based approaches have already been selecti...
Conference Paper
Full-text available
OECD wrote in their report 2016 that up to 5% of imports are counterfeited goods. The report estimated this damage at EUR 85 billion (OECD/EUIPO, 2016). The presence of counterfeit products on the European market is on the increase, therefore the intervention of inspection bodies and authorities alone is not sufficient, consumers can make their con...
Conference Paper
Enabling end users to take a proactive role in the development of Web of Things (WoT) applications that achieves their goals is a challenge for End User Development (EUD) in the context of WoT. This can be achieved through Artificial Intelligence (AI) planning algorithms if the relevant WoT concepts and relationships are described in an interoperab...
Conference Paper
Full-text available
Analysis of user interfaces (UIs) based on their visual representation (screenshots) is gaining increasing popularity, institutionalizing the HCI vision field. Witnessing the same visual appearance of a UI like a human user provides the advantage of taking into account layouts, whitespace, graphical content, etc. independent of the concrete platfor...
Conference Paper
The human gait offers a variety of information about the human being. In order to make accurate statements about this information, it is necessary to analyse the gait patterns of numerous participants. This requires the same conditions for all participants, which are difficult to realize in reality. In this paper, we describe an approach with which...
Chapter
Full-text available
This article details the idea of Crowdsourced Reverse Engineering (CSRE) by analysing three major challenges: (1) automatic task extraction, (2) source code anonymization and (3) results aggregation and quality control. We re-formulate the Reverse Engineering activity of concept assignment as a crowdsourced classification task to exemplify these ch...
Conference Paper
Full-text available
Empowering end users to be directly involved in the development and composition of their smart devices surrounding them that achieves their goals is a major challenge for End User Development (EUD) in the context of Web of Things (WoT). This can be achieved through Artificial Intelligence (AI) planning. Planning is intended as the ability of a WoT...
Article
Full-text available
We present a software tool for collecting web UI metrics from different providers and integrating them in a single database for further analysis. The platform’s architecture supports both code- and image-based UI assessment, thus allowing to combine advantages of the two approaches. The data structures are based on a web UI measurement domain ontol...
Article
The Internet of Things (IoT) primary objective is to make a hyper-connected world for various application domains. However, IoT suffers from a lack of interoperability leading to a substantial threat to the predicted economic value. Schema.org provides semantic interoperability to structure heterogeneous data on the Web. An extension of this vocabu...
Chapter
Full-text available
Internet of Things (IoT) applications incorporate heterogenous smart devices that support different communication protocols (Zigbee, RFID, Bluetooth, custom protocols). Enabling application development employing different protocols require interoperability between the different types of heterogenous devices that co-exist in the IoT ecosystem. In th...
Article
Full-text available
Metric-based assessment of web user interface (WUI) quality attributes is shifting from code (HTML/CSS) analysis to mining webpages’ visual representations based on image recognition techniques. In our paper, we describe a visual analysis tool which takes a WUI screenshot and produces structured and machine-readable representation (JSON) of the int...
Conference Paper
Over the last decade, the smartphone has become an important part of our everyday lives and is used even in the most rural regions. The use cases of this device go far beyond communication for which they were mainly designed. It can, e.g., be used for activity recognition or serve as a measuring device. However, for these use cases, smartphones mig...
Conference Paper
Full-text available
Semantic web technologies are a major driver for semantic interoperability in IoT-generated data by using shared vocabularies in an ontology-driven approach. While there is a growing interest in standardization of ontologies for IoT, there is still a lack of common agreement for a specific IoT ontology. Numerous concepts and relations have been des...
Chapter
Cloud benchmarking has become a hot topic in cloud computing research. The idea to attach performance footprints to compute resources in order to select an appropriate setup for any application is very appealing. Especially in the scientific cloud, a lot of resources can be preserved by using just the right setup instead of needlessly over-provisio...
Conference Paper
Full-text available
Users' subjective impressions of websites are actively being researched, as they are formed very early in the interaction and affect the whole subsequent user experience. The subjective visual complexity is known to affect both website users' cognitive load and overall affective impressions. In our work we construct artificial neural network model...
Conference Paper
Full-text available
Each day, a vast amount of data is published on the web. In addition, the rate at which content is being published is growing, which has the potential to overwhelm users, particularly those who are technically unskilled. Furthermore, users from various domains of expertise face challenges when trying to retrieve the data they require. They may rely...
Article
Full-text available
In the last few years, many smart objects found in the physical world are interconnected and communicate through the existing internet infrastructure which creates a global network infrastructure called the Internet of Things (IoT). Research has shown a substantial development of solutions for a wide range of devices and IoT platforms over the past...
Article
Full-text available
Most techniques for webpage structure and design mining are based on code analysis and are detached from a human user’s perception of the web user interface (WUI). Our paper is dedicated to approaches that instead focus on analysis of webpage’s visual representation – the way it is rendered in different browsers and environments and delivered to th...
Chapter
Full-text available
The World Wide Web represents a tremendous source of knowledge, whose amount constantly increases. Open Data initiatives and the Semantic Web community have emphasized the need to publish data in a structured format based on open standards and ideally linked to other data sources. But that does not necessarily lead to error-free information and dat...
Chapter
Full-text available
Empowering end users to develop web applications for temporal needs is a well-researched web engineering challenge. Increasing usability, lowering the learning overhead and minimizing the gap between user’s intention and the provided solution are the ultimate goals of EUD practices. In this paper, we propose an architecture which addresses these ch...
Chapter
Full-text available
The Internet of Things (IoT) is an important research area, and substantial developments for a wide range of devices and IoT platforms is evident. However, one of the critical issues in IoT is that the different proprietary IoT platforms and systems are still not interoperable; unable to talk with each other. In this paper, we survey the state-of-t...
Conference Paper
Full-text available
Web Components are an essential building block for modularizing large and complex web applications into smaller pieces. Due to the web's nature, functionality encapsulated into Web Components consist of presentation and business logic. The former executes inside the user agent and the latter on the server-side. Many Web Components are not self-cont...