Zoltan Nochta

Zoltan Nochta
Karlsruhe University of Applied Sciences · Department of Computer Science

Professor

About

28
Publications
1,612
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
166
Citations
Additional affiliations
October 2014 - present
Karlsruhe University of Applied Sciences
Position
  • Professor

Publications

Publications (28)
Article
Full-text available
In this paper, we present an approach to the price-optimized charging of electric vehicles (EVs) based on energy flexibility. Fleet operators determine the minimum and the maximum power demand to charge EVs at a specific time and share this information as so-called power corridors (PCs) with an energy aggregator. The energy aggregator collects the...
Article
Full-text available
Smart charging is a means of monitoring and actively controlling EV chargers to optimize the distribution and consumption of energy with a focus on peak-load avoidance. This paper describes the most important requirements that have influenced the design and implementation of the “Smart Charging System” (SCS). It presents the architecture and main f...
Conference Paper
Efficient identity management is not only a concern of the virtual world but also paramount for modern open societies like the European Union. Non-intrusive, AI-based techniques of continuous authentication have recently been proposed to increase the security , efficiency and user friendliness of online systems and services. We introduce the resear...
Chapter
Machine learning techniques are used in numerous applications to identify complex patterns and relationships in data. However, data of a single actor is often insufficient, as large amounts of data are required to train powerful machine learning models. One approach to tackle this problem is the federated training of models by multiple cooperating...
Article
Full-text available
Resource sharing in general is a means of solving the problem of infrequent and, thus, inefficient utilization of expensive or scarce resources. In this paper, we present an approach to run shared EV-charging infrastructures in the context of commercial real-estate facilities. Collaborating EV-charger owners thereby create a pool of chargers for sh...
Patent
Full-text available
Systems and methods allow service-to-device mapping by which services are mapped onto best-suited smart items selected from a plurality of smart items of a sensor network. As part of the mapping, and/or subsequent thereto, a deployment of the service(s) onto the smart items is initiated. However, in some cases, the deployment may fail, or may only...
Article
Full-text available
The term "ubiquitous technology" refers to any technology that extends common objects with data processing capabilities, e.g. RFID systems, wireless sensor networks or networked embedded systems. In this study, we uncover the mechanisms by which these technologies contribute to an increased business process performance. We apply the theory of task-...
Chapter
In this chapter we introduce the Internet of Things (IoT) from the perspective of companies. The Internet of Things mainly refers to the continuous tracking and observation of real-world objects over the Internet. The resulting information can be used to optimize many processes along the entire value chain. Important prerequisites for the IoT are t...
Chapter
Full-text available
Dominierende Einflussfaktoren für die Entwicklung Intelligenter Objekte sind die zunehmende Leistungsfähigkeit und Miniaturisierung der Hardwarekomponenten sowie Fortschritte in der Softwaretechnologie. Der technologische Fortschritt der Mikroelektronik und Mikrosystemtechnik bildet hierbei die notwendige Voraussetzung. Rechenleistung, repräsentier...
Article
Full-text available
This paper presents an approach for closely coupling enterprise sys-tems and tiny wireless sensor nodes that are embedded into physical items. Cou-pling is done by implementing services from the enterprise system on the wire-less sensor node system and by letting part of the business logic run on the nodes. The paper analyses concrete application s...
Article
This chapter deals with the idea of how-as we call them-"smart items" can contribute to the overall vision of the real time enterprise by utilizing ubiquitous computing (UC) technologies. First, an overview of functionality is given that smart items can offer to improve enterprise business processes. The discussed capabilities making everyday objec...
Article
The following contribution introduces an approach to avert removal-reapplication attacks of RIFD transponders. This is achieved by tightly coupling security tags with individual objects using object specific data.
Chapter
This chapter deals with the idea of how—as we call them—“smart items” can contribute to the overall vision of the real time enterprise by utilizing ubiquitous computing (UC) technologies. First, an overview of functionality is given that smart items can offer to improve enterprise business processes. The discussed capabilities making everyday objec...
Conference Paper
In today's business, there is a growing problem of product counterfeiting and piracy. Criminals have considerable expertise and resources that enable them to produce and sell counterfeits of products. The proposed solution aims at providing unique and secure authentication mechanisms of a given item, in order to distinguish between genuine products...
Article
Hergestellt on demand. - Auch im Internet unter der Adresse http://www.uvka.de/univerlag/volltexte/2005/33 verfügbar. Zugl.: Karlsruhe, Universiẗat, Diss., 2004.
Conference Paper
In this paper we present PAMINA (Privilege Admini- stration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distributed environments where autono- mous authorities can manage and delegate privileges in accordance with their own policies. We introduce Im- proved Certification Verifi...
Conference Paper
Full-text available
π2 is a generic CORBA proxy platform that is used to support applications in mobile and wireless environments. π2 consists of two proxies which are transparently integrated into the application. Due to the broadcast characteristics of wireless communication, mobile users have very high security requirements. Since the CORBA security service as the...
Conference Paper
Dieser Beitrag beschäftigt sich mit Sichcrhcitsfragestellungen einer auf CORBA basierenden Dienstmanagement-Architektur. Diese erlaubt Dienstnehmern die Verwaltung der von ihnen in Anspruch genommenen IT-Dienste. Aus diesem Szenario ergeben sich erhöhte, spezifische Sicherheitsanforderungen. Zur Erfüllung dieser Anforderungen wurde ein Konzept entw...
Chapter
Dieser Beitrag behandelt die Erweiterung der objektorientierten Middleware-Plattform CORBA um Sicherheitsfunktionen, die auf Public-Key-Infrastrukturen (PKI) basieren. Es werden die durch PKIs erfüllbaren Sicherheitsanforderungen und in CORBA vorgesehenen Sicherheitsmechanismen vorgestellt. Anschließend werden Ansätze vorgeschlagen, die die Integra...
Conference Paper
Due to the complexity of running distributed and networked systems, we can recognise a trend of virtual re-centralisation of distributed systems. Since outsourcing IT resources, IT service providers are born. The aim of service providers is to run IT components offering qualified IT services to customers, who specify quality demands as service leve...
Article
Zugl.: Karlsruhe, Universiẗat, Diss., 2004. Computerdatei im Fernzugriff.

Network

Cited By