Skip to main content

Showing 1–8 of 8 results for author: Becker, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.19585  [pdf, other

    cs.RO

    Integrating Visuo-tactile Sensing with Haptic Feedback for Teleoperated Robot Manipulation

    Authors: Noah Becker, Erik Gattung, Kay Hansel, Tim Schneider, Yaonan Zhu, Yasuhisa Hasegawa, Jan Peters

    Abstract: Telerobotics enables humans to overcome spatial constraints and allows them to physically interact with the environment in remote locations. However, the sensory feedback provided by the system to the operator is often purely visual, limiting the operator's dexterity in manipulation tasks. In this work, we address this issue by equip** the robot's end-effector with high-resolution visuotactile G… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  2. arXiv:2404.16118  [pdf, other

    cs.CR

    Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models

    Authors: Daniel Reti, Norman Becker, Tillmann Angeli, Anasuya Chattopadhyay, Daniel Schneider, Sebastian Vollmer, Hans D. Schotten

    Abstract: With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: 12 pages

  3. arXiv:2305.13960  [pdf, other

    cs.CV

    From Model-Based to Data-Driven Simulation: Challenges and Trends in Autonomous Driving

    Authors: Ferdinand Mütsch, Helen Gremmelmaier, Nicolas Becker, Daniel Bogdoll, Marc René Zofka, J. Marius Zöllner

    Abstract: Simulation is an integral part in the process of develo** autonomous vehicles and advantageous for training, validation, and verification of driving functions. Even though simulations come with a series of benefits compared to real-world experiments, various challenges still prevent virtual testing from entirely replacing physical test-drives. Our work provides an overview of these challenges wi… ▽ More

    Submitted 31 July, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: Ferdinand Mütsch, Helen Gremmelmaier, and Nicolas Becker contributed equally. Accepted for publication at CVPR 2023 VCAD workshop

  4. arXiv:2108.11844  [pdf

    cs.CY cs.AI

    AI at work -- Mitigating safety and discriminatory risk with technical standards

    Authors: Nikolas Becker, Pauline Junginger, Lukas Martinez, Daniel Krupka, Leonie Beining

    Abstract: The use of artificial intelligence (AI) and AI methods in the workplace holds both great opportunities as well as risks to occupational safety and discrimination. In addition to legal regulation, technical standards will play a key role in mitigating such risk by defining technical requirements for development and testing of AI systems. This paper provides an overview and assessment of existing in… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

    ACM Class: K.4.1; K.6.1; K.6.4

  5. arXiv:2107.05802  [pdf, other

    cs.LG stat.ML

    How many degrees of freedom do we need to train deep networks: a loss landscape perspective

    Authors: Brett W. Larsen, Stanislav Fort, Nic Becker, Surya Ganguli

    Abstract: A variety of recent works, spanning pruning, lottery tickets, and training within random subspaces, have shown that deep neural networks can be trained using far fewer degrees of freedom than the total number of parameters. We analyze this phenomenon for random subspaces by first examining the success probability of hitting a training loss sub-level set when training within a random subspace of a… ▽ More

    Submitted 3 February, 2022; v1 submitted 12 July, 2021; originally announced July 2021.

    Comments: ICLR 2022

  6. arXiv:2104.03651  [pdf, other

    cs.CR cs.NI

    Escape the Fake: Introducing Simulated Container-Escapes for Honeypots

    Authors: Daniel Reti, Norman Becker

    Abstract: In the field of network security, the concept of honeypots is well established in research as well as in production. Honeypots are used to imitate a legitimate target on the network and to raise an alert on any interaction. This does not only help learning about a breach, but also allows researchers to study the techniques of an attacker. With the rise of cloud computing, container-based virtualiz… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Journal ref: 2020 Workshop on Next Generation Networks and Applications (NGNA)

  7. arXiv:1608.04024  [pdf, other

    cs.NI cs.PF

    A Non-stationary Service Curve Model for Estimation of Cellular Sleep Scheduling

    Authors: Nico Becker, Markus Fidler

    Abstract: While steady-state solutions of backlog and delay have been derived for essential wireless systems, the analysis of transient phases still poses significant challenges. Considering the majority of short-lived and interactive flows, transient startup effects, as caused by sleep scheduling in cellular networks, have, however, a substantial impact on the performance. To facilitate reasoning about the… ▽ More

    Submitted 13 August, 2016; originally announced August 2016.

    Comments: Extended version of arXiv:1506.04657

  8. arXiv:1506.04657  [pdf, other

    cs.NI cs.PF

    A Non-stationary Service Curve Model for Performance Analysis of Transient Phases

    Authors: Nico Becker, Markus Fidler

    Abstract: Steady-state solutions for a variety of relevant queueing systems are known today, e.g., from queueing theory, effective bandwidths, and network calculus. The behavior during transient phases, on the other hand, is understood to a much lesser extent as its analysis poses significant challenges. Considering the majority of short-lived flows, transient effects that have diverse causes, such as TCP s… ▽ More

    Submitted 15 June, 2015; originally announced June 2015.