Stefan Ludwig

Learn More
Decreasing feature sizes have led to an increased vulnerability of random logic to soft errors. A particle strike may cause a glitch or single event transient (SET) at the output of a gate, which in turn can propagate to a register and cause a single event upset (SEU) there. Circuit level modeling and analysis of SETs provides an attractive compromise(More)
The increasing functional integrity of the organism during fetal maturation is connected with increasing complex internal coordination. We hypothesize that time scales of complexity and dynamics of heart rate patterns reflect the increasing inter-dependencies within the fetal organism during its prenatal development. We investigated multi-scale complexity,(More)
Islet transplantation is a feasible therapeutic alternative for metabolically labile patients with type 1 diabetes. The primary therapeutic target is stable glycemic control and prevention of complications associated with diabetes by reconstitution of endogenous insulin secretion. However, critical shortage of donor organs, gradual loss in graft function(More)
Existing cryptographic file systems for Unix do not take into account that sensitive data must often be shared with other users, but still kept secret. By design, the only one who has access to the secret data is the person who encrypted it and therefore knows the encryption key or password. This paper presents a kernel driver for a new encrypted file(More)
Designers trying to build intuitive interaction need to identify screen elements that (potentially) distract users from reaching their goals. The analysis of cursor movements has been proposed as a scalable and low-cost approach to analyze user distraction. Previous research, however, was mainly focused on finding gaze-analogous variables in cursor tracking(More)
  • 1