Skip to main content

Showing 1–50 of 99 results for author: Becker, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.04397  [pdf, other

    cs.LG

    Generating Synthetic Ground Truth Distributions for Multi-step Trajectory Prediction using Probabilistic Composite Bézier Curves

    Authors: Ronny Hug, Stefan Becker, Wolfgang Hübner, Michael Arens

    Abstract: An appropriate data basis grants one of the most important aspects for training and evaluating probabilistic trajectory prediction models based on neural networks. In this regard, a common shortcoming of current benchmark datasets is their limitation to sets of sample trajectories and a lack of actual ground truth distributions, which prevents the use of more expressive error metrics, such as the… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

  2. HyLiMo: A Hybrid Live-Synchronized Modular Diagramming Editor as IDE Extension for Technical and Scientific Publications

    Authors: Niklas Krieger, Sandro Speth, Steffen Becker

    Abstract: Creating suitable diagrams for technical and scientific publications is challenging and time-consuming, as manual control over the layout is required to communicate information effectively. Existing diagramming tools usually allow modeling the diagrams via a textual domain-specific language (DSL) that can be rendered and auto-layouted or via a graphical editor. While auto-layout is fast, the resul… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: 6 pages, 5 figures, ICSE'24 IDE Workshop

  3. arXiv:2403.10086  [pdf, ps, other

    cs.SE cs.AI cs.ET cs.PL

    Large Language Models to Generate System-Level Test Programs Targeting Non-functional Properties

    Authors: Denis Schwachhofer, Peter Domanski, Steffen Becker, Stefan Wagner, Matthias Sauer, Dirk Pflüger, Ilia Polian

    Abstract: System-Level Test (SLT) has been a part of the test flow for integrated circuits for over a decade and still gains importance. However, no systematic approaches exist for test program generation, especially targeting non-functional properties of the Device under Test (DUT). Currently, test engineers manually compose test suites from off-the-shelf software, approximating the end-user environment of… ▽ More

    Submitted 19 March, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

    Comments: Testmethoden und Zuverlässigkeit von Schaltungen und Systemen, TuZ 2024

  4. arXiv:2403.06607  [pdf, ps, other

    cs.HC

    Decoding Complexity: Exploring Human-AI Concordance in Qualitative Coding

    Authors: Elisabeth Kirsten, Annalina Buckmann, Abraham Mhaidli, Steffen Becker

    Abstract: Qualitative data analysis provides insight into the underlying perceptions and experiences within unstructured data. However, the time-consuming nature of the coding process, especially for larger datasets, calls for innovative approaches, such as the integration of Large Language Models (LLMs). This short paper presents initial findings from a study investigating the integration of LLMs for codin… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  5. CARISMA: CAR-Integrated Service Mesh Architecture

    Authors: Kevin Klein, Pascal Hirmer, Steffen Becker

    Abstract: The amount of software in modern cars is increasing continuously with traditional electric/electronic (E/E) architectures reaching their limit when deploying complex applications, e.g., regarding bandwidth or computational power. To mitigate this situation, more powerful computing platforms are being employed and applications are developed as distributed applications, e.g., involving microservices… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

  6. arXiv:2403.00289  [pdf, ps, other

    physics.med-ph cs.LG math.OC

    Optimization of array encoding for ultrasound imaging

    Authors: Jacob Spainhour, Korben Smart, Stephen Becker, Nick Bottenus

    Abstract: Objective: The transmit encoding model for synthetic aperture imaging is a robust and flexible framework for understanding the effects of acoustic transmission on ultrasound image reconstruction. Our objective is to use machine learning (ML) to construct scanning sequences, parameterized by time delays and apodization weights, that produce high-quality B-mode images. Approach: We use a custom ML m… ▽ More

    Submitted 20 June, 2024; v1 submitted 1 March, 2024; originally announced March 2024.

    Comments: 31 pages, 12 figures

    ACM Class: J.3

    Journal ref: Phys. Med. Biol. 69 125024 (2024)

  7. I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering

    Authors: René Walendy, Markus Weber, **gjie Li, Steffen Becker, Carina Wiesen, Malte Elson, Younghyun Kim, Kassem Fawaz, Nikol Rummel, Christof Paar

    Abstract: Trust in digital systems depends on secure hardware, often assured through Hardware Reverse Engineering (HRE). This work develops methods for investigating human problem-solving processes in HRE, an underexplored yet critical aspect. Since reverse engineers rely heavily on visual information, eye tracking holds promise for studying their cognitive processes. To gain further insights, we additional… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

  8. arXiv:2402.11345  [pdf, other

    stat.ML cs.LG math.OC

    Variational Entropy Search for Adjusting Expected Improvement

    Authors: Nuo** Cheng, Stephen Becker

    Abstract: Bayesian optimization is a widely used technique for optimizing black-box functions, with Expected Improvement (EI) being the most commonly utilized acquisition function in this domain. While EI is often viewed as distinct from other information-theoretic acquisition functions, such as entropy search (ES) and max-value entropy search (MES), our work reveals that EI can be considered a special case… ▽ More

    Submitted 17 February, 2024; originally announced February 2024.

  9. Towards a Peer-to-Peer Data Distribution Layer for Efficient and Collaborative Resource Optimization of Distributed Dataflow Applications

    Authors: Dominik Scheinert, Soeren Becker, Jonathan Will, Luis Englaender, Lauritz Thamsen

    Abstract: Performance modeling can help to improve the resource efficiency of clusters and distributed dataflow applications, yet the available modeling data is often limited. Collaborative approaches to performance modeling, characterized by the sharing of performance data or models, have been shown to improve resource efficiency, but there has been little focus on actual data sharing strategies and implem… ▽ More

    Submitted 23 January, 2024; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: 7 pages, 4 figures, 2 tables

    Journal ref: IEEE BigData (2023) 2339-2345

  10. Utilizing dataset affinity prediction in object detection to assess training data

    Authors: Stefan Becker, Jens Bayer, Ronny Hug, Wolfgang Hübner, Michael Arens

    Abstract: Data pooling offers various advantages, such as increasing the sample size, improving generalization, reducing sampling bias, and addressing data sparsity and quality, but it is not straightforward and may even be counterproductive. Assessing the effectiveness of pooling datasets in a principled manner is challenging due to the difficulty in estimating the overall information content of individual… ▽ More

    Submitted 8 May, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: Accepted at the International Conference on Robotics, Computer Vision and Intelligent Systems (ROBOVIS) 2024

  11. arXiv:2310.05573  [pdf, other

    cs.LG

    ODEFormer: Symbolic Regression of Dynamical Systems with Transformers

    Authors: Stéphane d'Ascoli, Sören Becker, Alexander Mathis, Philippe Schwaller, Niki Kilbertus

    Abstract: We introduce ODEFormer, the first transformer able to infer multidimensional ordinary differential equation (ODE) systems in symbolic form from the observation of a single solution trajectory. We perform extensive evaluations on two datasets: (i) the existing "Strogatz" dataset featuring two-dimensional systems; (ii) ODEBench, a collection of one- to four-dimensional systems that we carefully cura… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

  12. arXiv:2310.03514  [pdf, other

    physics.flu-dyn cs.CE

    Vocal Fold Reconstruction from Optical Velocity and Displacement Measurements

    Authors: Daniel Zieger, Christoph Näger, Stefan Becker, Tobias Günther

    Abstract: The three-dimensional reconstruction of vocal folds in medicine usually involves endoscopy and an approach to extract depth information like structured light or stereo matching of images. The resulting mesh can accurately represent the superior area of the vocal folds, while new approaches also try to reconstruct the inferior area. We propose a novel approach to extract the time-dependent 3D geome… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  13. arXiv:2309.05740  [pdf, other

    cs.CR cs.HC

    REVERSIM: A Game-Based Environment to Study Human Aspects in Hardware Reverse Engineering

    Authors: Steffen Becker, René Walendy, Markus Weber, Carina Wiesen, Nikol Rummel, Christof Paar

    Abstract: Hardware Reverse Engineering (HRE) is a technique for analyzing Integrated Circuits (ICs). Experts employ HRE for security-critical tasks, such as detecting Trojans or intellectual property violations. They rely not only on their experience and customized tools but also on their cognitive abilities. Conducting controlled experiments to assess the cognitive processes involved in HRE can open new av… ▽ More

    Submitted 24 March, 2024; v1 submitted 11 September, 2023; originally announced September 2023.

  14. arXiv:2307.12617  [pdf, other

    cs.LG

    Predicting Ordinary Differential Equations with Transformers

    Authors: Sören Becker, Michal Klein, Alexander Neitz, Giambattista Parascandolo, Niki Kilbertus

    Abstract: We develop a transformer-based sequence-to-sequence model that recovers scalar ordinary differential equations (ODEs) in symbolic form from irregularly sampled and noisy observations of a single solution trajectory. We demonstrate in extensive empirical evaluations that our model performs better or on par with existing methods in terms of accurate recovery across various settings. Moreover, our me… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: Published at ICML 2023

  15. 52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time

    Authors: Marvin Kowalewski, Christine Utz, Martin Degeling, Theodor Schnitzler, Franziska Herbert, Leonie Schaewitz, Florian M. Farke, Steffen Becker, Markus Dürmuth

    Abstract: The COVID-19 pandemic has prompted countries around the world to introduce smartphone apps to support disease control efforts. Their purposes range from digital contact tracing to quarantine enforcement to vaccination passports, and their effectiveness often depends on widespread adoption. While previous work has identified factors that promote or hinder adoption, it has typically examined data co… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 45 pages, 19 figures, 10 tables

  16. arXiv:2306.12900  [pdf, other

    cs.LG physics.flu-dyn

    In Situ Framework for Coupling Simulation and Machine Learning with Application to CFD

    Authors: Riccardo Balin, Filippo Simini, Cooper Simpson, Andrew Shao, Alessandro Rigazzi, Matthew Ellis, Stephen Becker, Alireza Doostan, John A. Evans, Kenneth E. Jansen

    Abstract: Recent years have seen many successful applications of machine learning (ML) to facilitate fluid dynamic computations. As simulations grow, generating new training datasets for traditional offline learning creates I/O and storage bottlenecks. Additionally, performing inference at runtime requires non-trivial coupling of ML framework libraries with simulation codes. This work offers a solution to b… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  17. arXiv:2306.10963  [pdf, other

    cs.CV

    Eigenpatches -- Adversarial Patches from Principal Components

    Authors: Jens Bayer, Stefan Becker, David Münch, Michael Arens

    Abstract: Adversarial patches are still a simple yet powerful white box attack that can be used to fool object detectors by suppressing possible detections. The patches of these so-called evasion attacks are computational expensive to produce and require full access to the attacked detector. This paper addresses the problem of computational expensiveness by analyzing 375 generated patches, calculating the p… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

  18. arXiv:2305.16530  [pdf, other

    stat.ML cs.LG math.NA

    Bi-fidelity Variational Auto-encoder for Uncertainty Quantification

    Authors: Nuo** Cheng, Osman Asif Malik, Subhayan De, Stephen Becker, Alireza Doostan

    Abstract: Quantifying the uncertainty of quantities of interest (QoIs) from physical systems is a primary objective in model validation. However, achieving this goal entails balancing the need for computational efficiency with the requirement for numerical accuracy. To address this trade-off, we propose a novel bi-fidelity formulation of variational auto-encoders (BF-VAE) designed to estimate the uncertaint… ▽ More

    Submitted 17 October, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

  19. arXiv:2305.12823  [pdf, other

    cs.CV

    READMem: Robust Embedding Association for a Diverse Memory in Unconstrained Video Object Segmentation

    Authors: Stéphane Vujasinović, Sebastian Bullinger, Stefan Becker, Norbert Scherer-Negenborn, Michael Arens, Rainer Stiefelhagen

    Abstract: We present READMem (Robust Embedding Association for a Diverse Memory), a modular framework for semi-automatic video object segmentation (sVOS) methods designed to handle unconstrained videos. Contemporary sVOS works typically aggregate video frames in an ever-expanding memory, demanding high hardware resources for long-term applications. To mitigate memory requirements and prevent near object dup… ▽ More

    Submitted 25 September, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: Accepted to BMVC 2023. Code @ https://github.com/Vujas-Eteph/READMem

    Journal ref: 34th British Machine Vision Conference 2023, {BMVC} 2023, Aberdeen, UK, November 20-24, 2023

  20. arXiv:2302.14661  [pdf, other

    cs.CY

    Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW)

    Authors: Timo Speith, Julian Speith, Steffen Becker, Yixin Zou, Asia Biega, Christof Paar

    Abstract: In today's age of digital technology, ethical concerns regarding computing systems are increasing. While the focus of such concerns currently is on requirements for software, this article spotlights the hardware domain, specifically microchips. For example, the opaqueness of modern microchips raises security issues, as malicious actors can manipulate them, jeopardizing system integrity. As a conse… ▽ More

    Submitted 25 April, 2024; v1 submitted 28 February, 2023; originally announced February 2023.

  21. arXiv:2301.05777  [pdf

    cs.LG eess.IV q-bio.TO

    Lung airway geometry as an early predictor of autism: A preliminary machine learning-based study

    Authors: Asef Islam, Anthony Ronco, Stephen M. Becker, Jeremiah Blackburn, Johannes C. Schittny, Kyoungmi Kim, Rebecca Stein-Wexler, Anthony S. Wexler

    Abstract: The goal of this study is to assess the feasibility of airway geometry as a biomarker for ASD. Chest CT images of children with a documented diagnosis of ASD as well as healthy controls were identified retrospectively. 54 scans were obtained for analysis, including 31 ASD cases and 23 age and sex-matched controls. A feature selection and classification procedure using principal component analysis… ▽ More

    Submitted 9 February, 2023; v1 submitted 13 January, 2023; originally announced January 2023.

  22. Digital Security -- A Question of Perspective. A Large-Scale Telephone Survey with Four At-Risk User Groups

    Authors: Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse

    Abstract: This paper investigates the digital security experiences of four at-risk user groups in Germany, including older adults (70+), teenagers (14-17), people with migration backgrounds, and people with low formal education. Using computer-assisted telephone interviews, we sampled 250 participants per group, representative of region, gender, and partly age distributions. We examine their device usage, c… ▽ More

    Submitted 12 September, 2023; v1 submitted 25 December, 2022; originally announced December 2022.

  23. A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries

    Authors: Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth

    Abstract: Misconceptions about digital security and privacy topics in the general public frequently lead to insecure behavior. However, little is known about the prevalence and extent of such misconceptions in a global context. In this work, we present the results of the first large-scale survey of a global population on misconceptions: We conducted an online survey with n = 12, 351 participants in 12 count… ▽ More

    Submitted 22 December, 2022; v1 submitted 20 December, 2022; originally announced December 2022.

  24. Probabilistic Time Series Forecasting for Adaptive Monitoring in Edge Computing Environments

    Authors: Dominik Scheinert, Babak Sistani Zadeh Aghdam, Soeren Becker, Odej Kao, Lauritz Thamsen

    Abstract: With increasingly more computation being shifted to the edge of the network, monitoring of critical infrastructures, such as intermediate processing nodes in autonomous driving, is further complicated due to the typically resource-constrained environments. In order to reduce the resource overhead on the network link imposed by monitoring, various methods have been discussed that either follow a fi… ▽ More

    Submitted 30 January, 2023; v1 submitted 24 November, 2022; originally announced November 2022.

    Comments: 6 pages, 5 figures, 2 tables

    Journal ref: IEEE BigData (2022) 4583-4588

  25. Towards Advanced Monitoring for Scientific Workflows

    Authors: Jonathan Bader, Joel Witzke, Soeren Becker, Ansgar Lößer, Fabian Lehmann, Leon Doehler, Anh Duc Vu, Odej Kao

    Abstract: Scientific workflows consist of thousands of highly parallelized tasks executed in a distributed environment involving many components. Automatic tracing and investigation of the components' and tasks' performance metrics, traces, and behavior are necessary to support the end user with a level of abstraction since the large amount of data cannot be analyzed manually. The execution and monitoring o… ▽ More

    Submitted 18 July, 2023; v1 submitted 23 November, 2022; originally announced November 2022.

    Comments: Paper accepted in 2022 IEEE International Conference on Big Data Workshop SCDM 2022

  26. Leveraging Reinforcement Learning for Task Resource Allocation in Scientific Workflows

    Authors: Jonathan Bader, Nicolas Zunker, Soeren Becker, Odej Kao

    Abstract: Scientific workflows are designed as directed acyclic graphs (DAGs) and consist of multiple dependent task definitions. They are executed over a large amount of data, often resulting in thousands of tasks with heterogeneous compute requirements and long runtimes, even on cluster infrastructures. In order to optimize the workflow performance, enough resources, e.g., CPU and memory, need to be provi… ▽ More

    Submitted 18 July, 2023; v1 submitted 22 November, 2022; originally announced November 2022.

    Comments: Paper accepted in 2022 IEEE International Conference on Big Data Workshop BPOD 2022

  27. Perona: Robust Infrastructure Fingerprinting for Resource-Efficient Big Data Analytics

    Authors: Dominik Scheinert, Soeren Becker, Jonathan Bader, Lauritz Thamsen, Jonathan Will, Odej Kao

    Abstract: Choosing a good resource configuration for big data analytics applications can be challenging, especially in cloud environments. Automated approaches are desirable as poor decisions can reduce performance and raise costs. The majority of existing automated approaches either build performance models from previous workload executions or conduct iterative resource configuration profiling until a near… ▽ More

    Submitted 30 January, 2023; v1 submitted 15 November, 2022; originally announced November 2022.

    Comments: 8 pages, 5 figures, 3 tables

    Journal ref: IEEE BigData (2022) 209-216

  28. arXiv:2211.07619  [pdf, other

    cs.LG

    Federated Learning for Autoencoder-based Condition Monitoring in the Industrial Internet of Things

    Authors: Soeren Becker, Kevin Styp-Rekowski, Oliver Vincent Leon Stoll, Odej Kao

    Abstract: Enabled by the increasing availability of sensor data monitored from production machinery, condition monitoring and predictive maintenance methods are key pillars for an efficient and robust manufacturing production cycle in the Industrial Internet of Things. The employment of machine learning models to detect and predict deteriorating behavior by analyzing a variety of data collected across sever… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

    Comments: Accepted for 2022 IEEE International Conference on Big Data (IEEE BigData 2022)

  29. arXiv:2211.05151  [pdf, other

    cs.LG cs.AI cs.CE math.NA

    QuadConv: Quadrature-Based Convolutions with Applications to Non-Uniform PDE Data Compression

    Authors: Kevin Doherty, Cooper Simpson, Stephen Becker, Alireza Doostan

    Abstract: We present a new convolution layer for deep learning architectures which we call QuadConv -- an approximation to continuous convolution via quadrature. Our operator is developed explicitly for use on non-uniform, mesh-based data, and accomplishes this by learning a continuous kernel that can be sampled at arbitrary locations. Moreover, the construction of our operator admits an efficient implement… ▽ More

    Submitted 28 August, 2023; v1 submitted 9 November, 2022; originally announced November 2022.

    Comments: 26 pages, 18 figures, 5 tables

  30. arXiv:2211.02830  [pdf, other

    cs.LG

    Discovering ordinary differential equations that govern time-series

    Authors: Sören Becker, Michal Klein, Alexander Neitz, Giambattista Parascandolo, Niki Kilbertus

    Abstract: Natural laws are often described through differential equations yet finding a differential equation that describes the governing law underlying observed data is a challenging and still mostly manual task. In this paper we make a step towards the automation of this process: we propose a transformer-based sequence-to-sequence model that recovers scalar autonomous ordinary differential equations (ODE… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

    Comments: Workshop paper at NeurIPS 2022 workshop "AI for Science"

  31. Macaw: The Machine Learning Magnetometer Calibration Workflow

    Authors: Jonathan Bader, Kevin Styp-Rekowski, Leon Doehler, Soeren Becker, Odej Kao

    Abstract: In Earth Systems Science, many complex data pipelines combine different data sources and apply data filtering and analysis steps. Typically, such data analysis processes are historically grown and implemented with many sequentially executed scripts. Scientific workflow management systems (SWMS) allow scientists to use their existing scripts and provide support for parallelization, reusability, mon… ▽ More

    Submitted 18 July, 2023; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: Paper accepted in 2022 IEEE International Conference on Data Mining Workshops (ICDMW)

  32. arXiv:2209.05662  [pdf, other

    math.NA cs.DS

    Fast Algorithms for Monotone Lower Subsets of Kronecker Least Squares Problems

    Authors: Osman Asif Malik, Yiming Xu, Nuo** Cheng, Stephen Becker, Alireza Doostan, Akil Narayan

    Abstract: Approximate solutions to large least squares problems can be computed efficiently using leverage score-based row-sketches, but directly computing the leverage scores, or sampling according to them with naive methods, still requires an expensive manipulation and processing of the design matrix. In this paper we develop efficient leverage score-based sampling methods for matrices with certain Kronec… ▽ More

    Submitted 12 September, 2022; originally announced September 2022.

    Comments: 33 pages, 5 figures

  33. arXiv:2208.05862  [pdf, other

    cs.DC

    Network Emulation in Large-Scale Virtual Edge Testbeds: A Note of Caution and the Way Forward

    Authors: Soeren Becker, Tobias Pfandzelter, Nils Japke, David Bermbach, Odej Kao

    Abstract: The growing research and industry interest in the Internet of Things and the edge computing paradigm has increased the need for cost-efficient virtual testbeds for large-scale distributed applications. Researchers, students, and practitioners need to test and evaluate the interplay of hundreds or thousands of real software components and services connected with a realistic edge network without acc… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

    Comments: Accepted for 2nd International Workshop on Testing Distributed Internet of Things Systems (TDIS 2022)

  34. arXiv:2206.10573  [pdf

    cs.CV q-bio.QM

    H&E-based Computational Biomarker Enables Universal EGFR Screening for Lung Adenocarcinoma

    Authors: Gabriele Campanella, David Ho, Ida Häggström, Anton S Becker, Jason Chang, Chad Vanderbilt, Thomas J Fuchs

    Abstract: Lung cancer is the leading cause of cancer death worldwide, with lung adenocarcinoma being the most prevalent form of lung cancer. EGFR positive lung adenocarcinomas have been shown to have high response rates to TKI therapy, underlying the essential nature of molecular testing for lung cancers. Despite current guidelines consider testing necessary, a large portion of patients are not routinely pr… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

  35. Embrace your incompetence! Designing appropriate CUI communication through an ecological approach

    Authors: Sophie Becker, Philip Doyle, Justin Edwards

    Abstract: People form impressions of their dialogue partners, be they other people or machines, based on cues drawn from their communicative style. Recent work has suggested that the gulf between people's expectations and the reality of CUI interaction widens when these impressions are misaligned with the actual capabilities of conversational user interfaces (CUIs). This has led some to rally against a perc… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Journal ref: 4th Conference on Conversational User Interfaces (CUI 2022)

  36. arXiv:2205.03672  [pdf, other

    math.NA cs.LG math.PR

    Deep learning approximations for non-local nonlinear PDEs with Neumann boundary conditions

    Authors: Victor Boussange, Sebastian Becker, Arnulf Jentzen, Benno Kuckuck, Loïc Pellissier

    Abstract: Nonlinear partial differential equations (PDEs) are used to model dynamical processes in a large number of scientific fields, ranging from finance to biology. In many applications standard local models are not sufficient to accurately account for certain non-local phenomena such as, e.g., interactions at a distance. In order to properly capture these phenomena non-local nonlinear PDE models are fr… ▽ More

    Submitted 7 May, 2022; originally announced May 2022.

    Comments: 59 pages

    MSC Class: 35R09 (Primary) 65M75; 45K05; 35K20; 65C05; 65M22; 68T07 (Secondary)

  37. arXiv:2205.01754  [pdf, other

    stat.ML cs.LG

    Bézier Curve Gaussian Processes

    Authors: Ronny Hug, Stefan Becker, Wolfgang Hübner, Michael Arens, Jürgen Beyerer

    Abstract: Probabilistic models for sequential data are the basis for a variety of applications concerned with processing timely ordered information. The predominant approach in this domain is given by recurrent neural networks, implementing either an approximate Bayesian approach (e.g. Variational Autoencoders or Generative Adversarial Networks) or a regression-based approach, i.e. variations of Mixture Den… ▽ More

    Submitted 18 November, 2022; v1 submitted 3 May, 2022; originally announced May 2022.

  38. SyncMesh: Improving Data Locality for Function-as-a-Service in Meshed Edge Networks

    Authors: Daniel Habenicht, Kevin Kreutz, Soeren Becker, Jonathan Bader, Lauritz Thamsen, Odej Kao

    Abstract: The increasing use of Internet of Things devices coincides with more communication and data movement in networks, which can exceed existing network capabilities. These devices often process sensor or user information, where data privacy and latency are a major concern. Therefore, traditional approaches like cloud computing do not fit well, yet new architectures such as edge computing address this… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

  39. arXiv:2203.05362  [pdf, other

    cs.DC

    Efficient Runtime Profiling for Black-box Machine Learning Services on Sensor Streams

    Authors: Soeren Becker, Dominik Scheinert, Florian Schmidt, Odej Kao

    Abstract: In highly distributed environments such as cloud, edge and fog computing, the application of machine learning for automating and optimizing processes is on the rise. Machine learning jobs are frequently applied in streaming conditions, where models are used to analyze data streams originating from e.g. video streams or sensory data. Often the results for particular data samples need to be provided… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

    Comments: Accepted as a short paper at the 6th IEEE International Conference on Fog and Edge Computing 2022

  40. Revisiting Click-based Interactive Video Object Segmentation

    Authors: Stephane Vujasinovic, Sebastian Bullinger, Stefan Becker, Norbert Scherer-Negenborn, Michael Arens, Rainer Stiefelhagen

    Abstract: While current methods for interactive Video Object Segmentation (iVOS) rely on scribble-based interactions to generate precise object masks, we propose a Click-based interactive Video Object Segmentation (CiVOS) framework to simplify the required user workload as much as possible. CiVOS builds on de-coupled modules reflecting user interaction and mask propagation. The interaction module converts c… ▽ More

    Submitted 7 June, 2022; v1 submitted 3 March, 2022; originally announced March 2022.

    Comments: ICIP 2022. 5 pages = 4 pages of content + 1 page of references

    Journal ref: IEEE International Conference on Image Processing (ICIP), 2022, pp. 2756-2760

  41. arXiv:2111.08503  [pdf, other

    eess.SP cond-mat.dis-nn cs.ET cs.SD eess.AS physics.app-ph

    Binary classification of spoken words with passive phononic metamaterials

    Authors: Tena Dubček, Daniel Moreno-Garcia, Thomas Haag, Parisa Omidvar, Henrik R. Thomsen, Theodor S. Becker, Lars Gebraad, Christoph Bärlocher, Fredrik Andersson, Sebastian D. Huber, Dirk-Jan van Manen, Luis Guillermo Villanueva, Johan O. A. Robertsson, Marc Serra-Garcia

    Abstract: Mitigating the energy requirements of artificial intelligence requires novel physical substrates for computation. Phononic metamaterials have a vanishingly low power dissipation and hence are a prime candidate for green, always-on computers. However, their use in machine learning applications has not been explored due to the complexity of their design process: Current phononic metamaterials are re… ▽ More

    Submitted 7 July, 2023; v1 submitted 14 November, 2021; originally announced November 2021.

    Comments: 13 pages, 11 figures

  42. arXiv:2109.13009  [pdf, other

    cs.DC

    LOS: Local-Optimistic Scheduling of Periodic Model Training For Anomaly Detection on Sensor Data Streams in Meshed Edge Networks

    Authors: Soeren Becker, Florian Schmidt, Lauritz Thamsen, Ana Juan Ferrer, Odej Kao

    Abstract: Anomaly detection is increasingly important to handle the amount of sensor data in Edge and Fog environments, Smart Cities, as well as in Industry 4.0. To ensure good results, the utilized ML models need to be updated periodically to adapt to seasonal changes and concept drifts in the sensor data. Although the increasing resource availability at the edge can allow for in-situ execution of model tr… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: 2nd IEEE International Conference on Autonomic Computing and Self-Organizing Systems - ACSOS 2021

  43. EdgePier: P2P-based Container Image Distribution in Edge Computing Environments

    Authors: Soeren Becker, Florian Schmidt, Odej Kao

    Abstract: Edge and fog computing architectures utilize container technologies in order to offer a lightweight application deployment. Container images are stored in registry services and operated by orchestration platforms to download and start the respective applications on nodes of the infrastructure. During large application rollouts, the connection to the registry is prone to become a bottleneck, which… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: 40th IEEE International Performance Computing and Communications Conference 2021

  44. Generating Synthetic Training Data for Deep Learning-Based UAV Trajectory Prediction

    Authors: Stefan Becker, Ronny Hug, Wolfgang Hübner, Michael Arens, Brendan T. Morris

    Abstract: Deep learning-based models, such as recurrent neural networks (RNNs), have been applied to various sequence learning tasks with great success. Following this, these models are increasingly replacing classic approaches in object tracking applications for motion prediction. On the one hand, these models can capture complex object dynamics with less modeling required, but on the other hand, they depe… ▽ More

    Submitted 1 November, 2021; v1 submitted 1 July, 2021; originally announced July 2021.

    Comments: Accepted at the International Conference on Robotics, Computer Vision and Intelligent Systems (ROBOVIS) 2021

  45. MissFormer: (In-)attention-based handling of missing observations for trajectory filtering and prediction

    Authors: Stefan Becker, Ronny Hug, Wolfgang Hübner, Michael Arens, Brendan T. Morris

    Abstract: In applications such as object tracking, time-series data inevitably carry missing observations. Following the success of deep learning-based models for various sequence learning tasks, these models increasingly replace classic approaches in object tracking applications for inferring the objects' motion states. While traditional tracking approaches can deal with missing observations, most of their… ▽ More

    Submitted 2 December, 2021; v1 submitted 30 June, 2021; originally announced June 2021.

    Comments: Accepted at the International Symposium on Visual Computing (ISVC) 2021

  46. arXiv:2106.05946  [pdf, other

    cs.CV

    Curiously Effective Features for Image Quality Prediction

    Authors: Sören Becker, Thomas Wiegand, Sebastian Bosse

    Abstract: The performance of visual quality prediction models is commonly assumed to be closely tied to their ability to capture perceptually relevant image aspects. Models are thus either based on sophisticated feature extractors carefully designed from extensive domain knowledge or optimized through feature learning. In contrast to this, we find feature extractors constructed from random noise to be suffi… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

    Comments: To be published at ICIP 2021

  47. arXiv:2105.14943  [pdf, ps, other

    cs.CR cs.HC

    An Exploratory Study of Hardware Reverse Engineering Technical and Cognitive Processes

    Authors: Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar

    Abstract: Understanding the internals of Integrated Circuits (ICs), referred to as Hardware Reverse Engineering (HRE), is of interest to both legitimate and malicious parties. HRE is a complex process in which semi-automated steps are interwoven with human sense-making processes. Currently, little is known about the technical and cognitive processes which determine the success of HRE. This paper performs… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

  48. Promoting the Acquisition of Hardware Reverse Engineering Skills

    Authors: Carina Wiesen, Steffen Becker, Nils Albartus Christof Paar, Nikol Rummel

    Abstract: This full research paper focuses on skill acquisition in Hardware Reverse Engineering (HRE) - an important field of cyber security. HRE is a prevalent technique routinely employed by security engineers (i) to detect malicious hardware manipulations, (ii) to conduct VLSI failure analysis, (iii) to identify IP infringements, and (iv) to perform competitive analyses. Even though the scientific commun… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  49. arXiv:2104.02019  [pdf, other

    quant-ph cs.IT math-ph

    From Classical to Quantum: Uniform Continuity Bounds on Entropies in Infinite Dimensions

    Authors: Simon Becker, Nilanjana Datta, Michael G. Jabbour

    Abstract: We prove a variety of new and refined uniform continuity bounds for entropies of both classical random variables on an infinite state space and of quantum states of infinite-dimensional systems. We obtain the first tight continuity estimate on the Shannon entropy of random variables with a countably infinite alphabet. The proof relies on a new mean-constrained Fano-type inequality and the notion o… ▽ More

    Submitted 17 July, 2023; v1 submitted 5 April, 2021; originally announced April 2021.

    Comments: comments welcome

    Journal ref: IEEE Transactions on Information Theory, vol. 69, no. 7, pp. 4128-4144, July 2023

  50. Handling Missing Observations with an RNN-based Prediction-Update Cycle

    Authors: Stefan Becker, Ronny Hug, Wolfgang Hübner, Michael Arens, Brendan T. Morris

    Abstract: In tasks such as tracking, time-series data inevitably carry missing observations. While traditional tracking approaches can handle missing observations, recurrent neural networks (RNNs) are designed to receive input data in every step. Furthermore, current solutions for RNNs, like omitting the missing data or data imputation, are not sufficient to account for the resulting increased uncertainty.… ▽ More

    Submitted 1 November, 2021; v1 submitted 22 March, 2021; originally announced March 2021.

    Comments: Accepted at the International Conference on Computer Analysis of Images and Patterns (CAIP) 2021