Design und Implementierung eines computergestützten Evaluierungsverfahrens von Single-Choice-Aufgabenstellungen im Medizinstudium

DescriptionIm Rahmen des Medizinstudiums werden für die schriftlichen, internen (z.B. Semesterabschlussklausuren) und externen Prüfungen häufig Aufgaben in Form von Single-Choice-Fragen verwendet. Der Fragenstamm setzt sich meist aus der eigentlichen Frage und einer sog. „Fallvignette“ zusammen, die der Frage voran steht und eine (mitunter medizinisch kritische) Situation schildert. Diese Vignette kann unterschiedliche inhaltliche Komplexitätsgrade erreichen. Die … Read more

Privacy E2E Project Meeting

On August 26, the first project meeting of all participants of the Privacy E2E project (funded by the German Federal Ministry of Education and Research) took place in Bochum. Participants of all three partners met at RUB to discuss current developments within the topics of privacy & data proctection and to share first research results. … Read more

Race Track Progress

To further research and teach about autonomous vehicles, our chair is using all available resources, including hallway space. In addition to Turtlebots, we’re currently building F1Tenth model race cars and a whole race track to go along with it! Here are some impressions of its current progress.

New Project: Privacy E2E

Late last year, the Chair’s new project Privacy E2E (funded by the German Federal Ministry of Education and Research) launched. It aims at developing a framework for AI-systems that balances privacy/data protection with optimal performance. We’re currently looking for student assistants interested in joining and supporting the research! More info here.

We’ve moved!

The Chair of Software Engineering has moved to the 4th floor of the MC building. We’re still located on the southern side, directly above our old offices. The main office can now be found in room 4.146.

Identification and Analysis of Security Features

Description The goal of the thesis is to identify and analyze the parts of the code of open-source software where security features are implemented. Since it is difficult to find all security feature implementations in a software system, we want to use a systematic approach starting from easily identifiable security-critical fields and methods. Based on … Read more