Graduate Student in the Software Practices Lab supervised by Reid Holmes and Thomas Fritz. Working on increasing the productivity of developers by detecting patterns and workflows in their application usages.
Degree not finished due to transfer to University of British Columbia
- GPA: 1,3 (= “very good”, German Grading System)
- Area of Specification: Embedded Systems
- Thesis Topic: “Macro-based Data Serialization to JSON with Scala”
- General University Entrance Qualification (Abitur)
- Final Grade: 1,1 (= “very good”, German Grading System)
- Awarded “Best Graduating Student”
Extend Xi Editor to allow search using regular expressions, replacements of matched strings and multiple search queries. Additionally, integration of a more advanced interface for find and replace into the xi-mac frontend as well as highlighting matching text in opened documents.
Teaching assistant for the course 319 Software Engineering project. Supervised student teams in implementing a contractor management system and expense claim system for Coast Capital.
Teaching assistant for the course 304 Databases. Supported instructor during lectures, held tutorials, supervised project groups that had to implement a database system, held office hours and graded exams.
Development of software tools for audio problem analysis of the video conferencing software GoToMeeting. Pattern detection in log data and visualization of log files. Support implementation of cloud-based data analysis software.
Supported researchers at the chair of “Distributed and Self-organizing Systems” in developing approaches to enhance the information security in personal data management by web applications and web services. The concepts were mainly based on WebID. Realization of an approach for scope-aware delegations based on WebID. Implementation of a code annotation tool to support the migration of legacy software.
Managed the yearly budget of the Computer Science Graduate Student Association and supported the president, for example, in organizing social events and the orientation week. Took over responsibilities of the president during his absence.
Give advice to undergraduate student regarding course planning, student life and career.
Student initiative to administrate and maintain the internet connection in the dormitories on the TU Chemnitz campus
Responsible for software development, maintenance and extension work as well as second-level user support.
Participated in lectures about several computer science topics. 1st place in the competition on the subject “Object Oriented Programming” and 1st place in the competition on the subject “Artificial Intelligence”.
Improved the documentation of the Haiku operating system project.
Presentation of the software developed as part of a special academic assignment (”Besondere Lernleistung”).
Supported Team Chemnitz which was winner of the “Fan Favorite Award”.
- Federal Competition in Computer Science
- First round: 1st prize
- Second round: 3rd prize
Abstract: With increasing complexity of web-based applications, traditional engineering from scratch becomes an effortful matter with security aspects difficult to oversee. By composing applications from reusable building blocks, component-based web engineering approaches promise to reduce time to market while providing flexibility to changing conditions. Yet, they face a trade off between developing software in an agile fashion and establishing a solid security foundation. To mitigate risks through successful attacks, web engineers must however ensure security during the entire lifetime of web-based applications. The WAM++ approach combines well with existing methodology and assists engineers in designing web-based applications with a strong emphasis on security. Based on the theoretical foundation from prior work, WAM++ introduces a vocabulary to describe both the architecture of web-based applications and involved services. Furthermore, WAM++ supports engineers by an online diagraming tool that is prototypically implemented in the Sociddea identity management platform.
Abstract: Swiftly meeting challenges by distributing tasks to the most suitable knowledge workers is an important matter, especially for network-centric organizations. In such distributed work environments delegations help to solve tasks faster, but also require measures to prevent delegatees from exceeding assigned competencies. By providing universal identification, WebID by W3C can assist in establishing a basis for distributed collaboration. Yet, it does not allow users for delegating access rights to others in a controlled way to act on their behalves. This paper presents the DASC approach to enable scope-aware delegations in distributed social networks using WebID. We introduce a vocabulary to describe delegations including associated constraints and demonstrate a prototypical implementation of DASC within an existing WebID identity provider.
Development of a tool that statically analyses Python code for known vulnerable functions and dependencies. The tool provides an IDE plugin for Sublime for highlighting vulnerabilities as well as a command-line interface that allows to analyze local projects and GitHub repositories. The tool was used to conduct a study on popular Python libraries revealing that around 8% use unsafe methods.
Course project to explore whether interruptions cause measurable changes using psycho-physiological sensors by examining brain activity and head position. Execution of a controlled lab study with participants working on a Sudoku tasks and interrupting them while recording their EEG data. Trained machine learning classifier for detecting interruptions in the recorded EEG data.
Approach to efficiently serialize class instances and values to JSON. Developed as part of my bachelor thesis. Utilization of Scala macros for generating serialization logic at compile time based on the class structure to increase performance. Proof of concept implementation that outperformed existing state-of-the-art libraries.
Implemented approach to enable scope-aware delegations in distributed social networks using WebID. Enabling to outsource tasks in a controlled way to delegatee’s with prevention of improper use of access rights by delegatee’s to allow more trustworthy collaboration. Prototypical implementation and integration into the WebID identity provider Soccidea. The approach was published as a conference paper.
- 0Lines of Code50.000
- ConTeXt, LaTeX
- Akka, spray
- RDF, XML
- MySQL, PostgreSQL
- Redshift, S3, AWS Lambda
- HTML, CSS, Less, jQuery
- Angular.js, Knockout.js
- Muse SDK
- RESTful Web Services
- Object Oriented Programming
- Functional Programming