Habilitation Colloquium Dr. Erich Teppan

The Institute for Applied Computer Science, Research Group Intelligent Systems and Business Informatics invites you to the habilitation colloquium of Dr. Erich Teppan.

Time: Thursday, 18 January 2018, Start: 14:30 s. t.

Place: AAU, HS 2

Abstract: Constraint answer set programming (CASP) is a family of hybrid approaches integrating answer set programming (ASP) and constraint programming (CP). These hybrid approaches have already proven to be successful in various domains. In this talk the approach of heuristic CASP (HCASP) is presented. In HCASP, ASP is not only used for expressing constraint satisfaction problems (CSPs) to be solved by a CP solver, but also for the encoding of search heuristics that are exploited by the CP solver. In particular, the HCASP solver ASCASS (A Simple Constraint Answer Set Solver), which provides novel methods for defining and exploiting search heuristics, is presented.

Information Systems: Suggested Topics for Master Thesis

The following topic is offered for a Master’s thesis:
“Data analysis on the effectiveness of recommendation systems”
This topic is suitable for students of Applied Computer Science or Information Management.

For further information please contact Prof. Dietmar Jannach, Research Group Information Systems.

Project Semester at CERBERUS

Master students at the Institute for Applied Computer Science (AINF) have the opportunity to do their project semester as part of a national or international research project.

Thomas Grafenauer is currently working within his project semester on CERBERUS, a FFG/KIRAS project dealing with the protection of critical infrastructure (KIs).

Based on the information on critical infrastructure objects collected by the public agencies, the security relevant data is structurally prepared and imported in a developed data model in the course of the CERBERUS project. This enables to logically represent the interdependencies and cascading effects in an interdependency model. This interdependency model can be used to identify, evaluate and simulate possible cascade effects. The simulation is done in “Omnet++”, an event simulation tool. With the help of the simulation, the effects of the cascade effect are made visible, enabling targeted preventive measures to be taken at the most critical points of the network.

Learn hacking in a protected environment: Come to the Security Lab on 26.01

What happens in a hacker attack and how can such an attack be detected ?

This know-how is practically indispensable for students of computer science and information management. But how and where can one learn this legally?

On Friday, 26.1.2018 you have the possibility of guided LIVE hacking in a protected environment (room E 1.37,  in the Security Lab from 09.00-17.00h; language of instruction: German).

Attention, limited number of participants! Therefore register (if not already done) by e-mail  to peter [dot] schartner [at] aau [dot] at.

Thanks to the ÖH students’ representatives, catering is also provided!