Skip to main content

Showing 1–10 of 10 results for author: Fuchs, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.06165  [pdf, other

    cs.CV cs.DB

    The IMPTC Dataset: An Infrastructural Multi-Person Trajectory and Context Dataset

    Authors: Manuel Hetzel, Hannes Reichert, Günther Reitberger, Erich Fuchs, Konrad Doll, Bernhard Sick

    Abstract: Inner-city intersections are among the most critical traffic areas for injury and fatal accidents. Automated vehicles struggle with the complex and hectic everyday life within those areas. Sensor-equipped smart infrastructures, which can cooperate with vehicles, can benefit automated traffic by extending the perception capabilities of drivers and vehicle perception systems. Additionally, they offe… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: IEEE Intelligent Vehicles Conference (IV) 2023

  2. QFT: Post-training quantization via fast joint finetuning of all degrees of freedom

    Authors: Alex Finkelstein, Ella Fuchs, Idan Tal, Mark Grobman, Niv Vosco, Eldad Meller

    Abstract: The post-training quantization (PTQ) challenge of bringing quantized neural net accuracy close to original has drawn much attention driven by industry demand. Many of the methods emphasize optimization of a specific degree-of-freedom (DoF), such as quantization step size, preconditioning factors, bias fixing, often chained to others in multi-step solutions. Here we rethink quantized network parame… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

    Comments: Presented at CADL2022 workshop at ECCV2022

    Journal ref: Computer Vision - {ECCV} 2022 Workshops - Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {VII}

  3. arXiv:2107.10906  [pdf, other

    cs.CR math.NT

    A Cryptographic Hash Function from Markoff Triples

    Authors: Elena Fuchs, Kristin Lauter, Matthew Litman, Austin Tran

    Abstract: Cryptographic hash functions from expander graphs were proposed by Charles, Goren, and Lauter in [CGL] based on the hardness of finding paths in the graph. In this paper, we propose a new candidate for a hash function based on the hardness of finding paths in the graph of Markoff triples modulo p. These graphs have been studied extensively in number theory and various other fields, and yet finding… ▽ More

    Submitted 27 November, 2021; v1 submitted 22 July, 2021; originally announced July 2021.

  4. arXiv:1911.08397  [pdf, ps, other

    cs.DM math.CO

    On the path partition number of 6-regular graphs

    Authors: Uriel Feige, Ella Fuchs

    Abstract: A path partition (also referred to as a linear forest) of a graph $G$ is a set of vertex-disjoint paths which together contain all the vertices of $G$. An isolated vertex is considered to be a path in this case. The path partition conjecture states that every $n$-vertices $d$-regular graph has a path partition with at most $\frac{n}{d+1}$ paths. The conjecture has been proved for all $d<6$. We pro… ▽ More

    Submitted 19 November, 2019; originally announced November 2019.

  5. arXiv:1809.03916  [pdf

    cs.AI

    Detecting Intentions of Vulnerable Road Users Based on Collective Intelligence

    Authors: Maarten Bieshaar, Günther Reitberger, Stefan Zernetsch, Bernhard Sick, Erich Fuchs, Konrad Doll

    Abstract: Vulnerable road users (VRUs, i.e. cyclists and pedestrians) will play an important role in future traffic. To avoid accidents and achieve a highly efficient traffic flow, it is important to detect VRUs and to predict their intentions. In this article a holistic approach for detecting intentions of VRUs by cooperative methods is presented. The intention detection consists of basic movement primitiv… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 20 pages, published at Automatisiertes und vernetztes Fahren (AAET), Braunschweig, Germany, 2017

  6. arXiv:1803.03479  [pdf, other

    cs.AI

    Highly Automated Learning for Improved Active Safety of Vulnerable Road Users

    Authors: Maarten Bieshaar, Günther Reitberger, Viktor Kreß, Stefan Zernetsch, Konrad Doll, Erich Fuchs, Bernhard Sick

    Abstract: Highly automated driving requires precise models of traffic participants. Many state of the art models are currently based on machine learning techniques. Among others, the required amount of labeled data is one major challenge. An autonomous learning process addressing this problem is proposed. The initial models are iteratively refined in three steps: (1) detection and context identification, (2… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

    Comments: 4 pages, 1 figure

    Journal ref: published in ACM Chapters Computer Science in Cars Symposium (CSCS-17). Munich, Germany. 2017

  7. arXiv:1803.02096  [pdf, other

    cs.CY cs.AI

    Cooperative Tracking of Cyclists Based on Smart Devices and Infrastructure

    Authors: Günther Reitberger, Stefan Zernetsch, Maarten Bieshaar, Bernhard Sick, Konrad Doll, Erich Fuchs

    Abstract: In future traffic scenarios, vehicles and other traffic participants will be interconnected and equipped with various types of sensors, allowing for cooperation based on data or information exchange. This article presents an approach to cooperative tracking of cyclists using smart devices and infrastructure-based sensors. A smart device is carried by the cyclists and an intersection is equipped wi… ▽ More

    Submitted 3 July, 2018; v1 submitted 6 March, 2018; originally announced March 2018.

    Comments: 7 pages, 6 figures. submitted (accepted for publication) IEEE Conference on Intelligent Transportation Systems(ITSC) 2018, Maui, HI

  8. arXiv:cmp-lg/9603004  [pdf, ps

    cs.CL

    Attempto - From Specifications in Controlled Natural Language towards Executable Specifications

    Authors: Rolf Schwitter, Norbert E. Fuchs

    Abstract: Deriving formal specifications from informal requirements is difficult since one has to take into account the disparate conceptual worlds of the application domain and of software development. To bridge the conceptual gap we propose controlled natural language as a textual view on formal specifications in logic. The specification language Attempto Controlled English (ACE) is a subset of natural… ▽ More

    Submitted 12 March, 1996; originally announced March 1996.

    Comments: 15 pages, compressed, uuencoded Postscript, to be presented at EMISA Workshop 'Naturlichsprachlicher Entwurf von Informationssystemen - Grundlagen, Methoden, Werkzeuge, Anwendungen', May 28-30, 1996, Ev. Akademie Tutzing

  9. arXiv:cmp-lg/9603003  [pdf, ps

    cs.CL

    Attempto Controlled English (ACE)

    Authors: Norbert E. Fuchs, Rolf Schwitter

    Abstract: Attempto Controlled English (ACE) allows domain specialists to interactively formulate requirements specifications in domain concepts. ACE can be accurately and efficiently processed by a computer, but is expressive enough to allow natural usage. The Attempto system translates specification texts in ACE into discourse representation structures and optionally into Prolog. Translated specification… ▽ More

    Submitted 13 March, 1996; originally announced March 1996.

    Comments: 13 pages, compressed, uuencoded Postscript, to be presented at CLAW 96, The First International Workshop on Controlled Language Applications, Katholieke Universiteit Leuven, 26-27 March 1996

  10. arXiv:cmp-lg/9507009  [pdf, ps

    cs.CL

    Specifying Logic Programs in Controlled Natural Language

    Authors: Norbert E. Fuchs, Rolf Schwitter

    Abstract: Writing specifications for computer programs is not easy since one has to take into account the disparate conceptual worlds of the application domain and of software development. To bridge this conceptual gap we propose controlled natural language as a declarative and application-specific specification language. Controlled natural language is a subset of natural language that can be accurately a… ▽ More

    Submitted 21 July, 1995; originally announced July 1995.

    Comments: 16 pages, compressed, uuencoded Postscript, published in Proceedings CLNLP 95, COMPULOGNET/ELSNET/EAGLES Workshop on Computational Logic for Natural Language Processing, Edinburgh, April 3-5, 1995

    Report number: IFI 95.17

    Journal ref: Proceedings CLNLP 95, COMPULOGNET/ELSNET/EAGLES