TRR 318-2 - Project WIKO: Questions about explainable technology
WIKO integrates AI explanation research with public outreach, now focusing on advancing eXplainable AI (XAI) Literacy to foster understanding and reflection on transparent AI. Through self conceptualized and conducted Co-Construction workshops (CCWS), participants from different public sectors actively engage with AI systems, promoting critical ...
Duration: 01/2026 - 06/2029
TRR 318-2 - Project RTG: Integrated Research Training Group
The RTG structures the further training of early career researchers and prepares them for their interdisciplinary research work by familiarizing them with different scientific practices, disciplinary cultures, methods, attitudes and values and by fostering communication across disciplines or discourse communities including the public. The RTG aims ...
Duration: 01/2026 - 06/2029
TRR 318-2 - Project Z: Central tasks of the Collaborative Research Center
Z is the central management hub of TRR 318: the project coordinates the budget, ensures internal communication, and organizes central events. In addition, Z pursues several missions aimed at best possible conditions, processes, and outcomes for the TRR’s research: offering an attractive interdisciplinary environment with empirical research support, ...
Duration: 01/2026 - 06/2029
KI-basierte Sprachmodelle an der Universit?t Paderborn: Ein Baustein auf dem Weg zu einer KI-Strategie
Mit dem Projekt soll ein weiterer Baustein auf dem Weg zu einer durablen KI-Strategie gelegt werden. Dazu baut die Universit?t Paderborn den bestehenden KI-Dienst AI-Chat.upb.de zur Produktreife aus und h?rtet das System für gr??ere Nutzerzahlen. Dazu wird die Inference-Infrastruktur erweitert, um KI breit in datenschutzrechtlich relevanten sowie ...
Duration: 01/2026 - 12/2027
Systematic Security Analyses of QUIC
Cryptographic protocols play a crucial role in securing the Internet. They are used, for example, to protect connections to websites, emails, and establishing secure messaging applications. To evaluate and strengthen cryptographic protocol implementations, research in the area of applied cryptographic attacks has been established. One prominent ...
Duration: 01/2026 - 12/2028
Towards Large-Scale Analyses of Censorship Circumvention Techniques for QUIC and DTLS
Various countries employ Internet censorship to restrict the network access of their residents. A common tactic for filtering web traffic is to block access to specific websites based on their domain names. For example, the Great Firewall of China (GFW), arguably the most sophisticated censor, filters widely used websites like wikipedia.org and ...
Duration: 01/2026 - 12/2028
Cybersecurity Certification and Assessment Tools
Cybersecurity regulations are becoming increasingly complex. The Cybersecurity Act (CSA) introduces an EU-wide cybersecurity
certification framework, while the Cyber Resilience Act (CRA) sets mandatory cybersecurity requirements for products with digital
components. A reliable and flexible set of tools is essential for continuous security ...
Duration: 01/2026 - 12/2028
Konfiguration und Co-Evolution von Daten?ko- und Arbeitssystemen
Duration: 01/2026 - 12/2028
Konfessionelle und interreligi?se Differenzsensibilit?t. Empirische Erkenntnisse und konzeptionelle Wege zu einer reflexiven Lehrkr?fteprofessionalisierung für den Religionsunterricht für alle
Das Projekt widmet sich der Unterrichts- und Professionsforschungim Blick auf den Religionsunterricht für alle (RUfa) in Hamburg und dort eingesetzte Lehrkr?fte. Es baut thematisch auf den Erkenntnissen des bereits in einer ersten Phase durchgeführten Forschungsprozesses zum Fort- und Weiterbildungswesen auf. Intendiert ist, aus den ...
Duration: 12/2025 - 11/2028