Skip to main content

Showing 1–23 of 23 results for author: Wolf, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11292  [pdf, other

    cs.RO

    Daedalus 2: Autorotation Entry, Descent and Landing Experiment on REXUS29

    Authors: Philip Bergmann, Clemens Riegler, Zuri Klaschka, Tobias Herbst, Jan M. Wolf, Maximilian Reigl, Niels Koch, Sarah Menninger, Jan von Pichowski, Cedric Bös, Bence Barthó, Frederik Dunschen, Johanna Mehringer, Ludwig Richter, Lennart Werner

    Abstract: In recent years, interplanetary exploration has gained significant momentum, leading to a focus on the development of launch vehicles. However, the critical technology of edl mechanisms has not received the same level of attention and remains less mature and capable. To address this gap, we took advantage of the REXUS program to develop a pioneering edl mechanism. We propose an alternative to conv… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 12 pages, 9 figures

  2. Automatic registration with continuous pose updates for marker-less surgical navigation in spine surgery

    Authors: Florentin Liebmann, Marco von Atzigen, Dominik Stütz, Julian Wolf, Lukas Zingg, Daniel Suter, Laura Leoty, Hooman Esfandiari, Jess G. Snedeker, Martin R. Oswald, Marc Pollefeys, Mazda Farshad, Philipp Fürnstahl

    Abstract: Established surgical navigation systems for pedicle screw placement have been proven to be accurate, but still reveal limitations in registration or surgical guidance. Registration of preoperative data to the intraoperative anatomy remains a time-consuming, error-prone task that includes exposure to harmful radiation. Surgical guidance through conventional displays has well-known drawbacks, as inf… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  3. arXiv:2211.02870  [pdf, other

    eess.SY cs.AR

    Electronics and Sensor Subsystem Design for Daedalus 2 on REXUS 29: An Autorotation Probe for Sub-Orbital Re-Entry

    Authors: Jan M. Wolf, Lennart Werner, Philip Bergmann, Clemens Riegler, Frederik Dunschen

    Abstract: The Daedalus 2 mission aboard REXUS 29 is a technology demonstrator for an alternative descent mechanism for very high altitude drops based on auto-rotation. It consists of two probes that are ejected from a sounding rocket at an altitude of about 80 km and decelerate to a soft landing using only a passive rotor with pitch control. This type of autonomous, scientific experiment poses great challen… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

    Comments: 8 pages, 10 figures

    Report number: A-123

    Journal ref: Proceedings of the 25th ESA Symposium on European Balloons and Rockets Programmes and related Research; 1-5 May 2022, Biarritz, France; SP-743, ISBN 978-92-9221-308-4, ISSN 0379-6566; Page 271-278

  4. arXiv:2107.05186  [pdf

    cs.CV

    Early warning of pedestrians and cyclists

    Authors: Joerg Christian Wolf

    Abstract: State-of-the-art motor vehicles are able to break for pedestrians in an emergency. We investigate what it would take to issue an early warning to the driver so he/she has time to react. We have identified that predicting the intention of a pedestrian reliably by position is a particularly hard challenge. This paper describes an early pedestrian warning demonstration system.

    Submitted 12 July, 2021; originally announced July 2021.

  5. arXiv:2011.00867  [pdf, other

    cs.DB cs.IR

    Accessible Data Curation and Analytics for International-Scale Citizen Science Datasets

    Authors: Benjamin Murray, Eric Kerfoot, Mark S. Graham, Carole H. Sudre, Erika Molteni, Liane S. Canas, Michela Antonelli, Kerstin Klaser, Alessia Visconti, Andrew T. Chan, Paul W. Franks, Richard Davies, Jonathan Wolf, Tim Spector, Claire J. Steves, Marc Modat, Sebastien Ourselin

    Abstract: The Covid Symptom Study, a smartphone-based surveillance study on COVID-19 symptoms in the population, is an exemplar of big data citizen science. Over 4.7 million participants and 189 million unique assessments have been logged since its introduction in March 2020. The success of the Covid Symptom Study creates technical challenges around effective data curation for two reasons. Firstly, the scal… ▽ More

    Submitted 17 February, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    ACM Class: D.m; E.2; H.3.3; I.7

  6. arXiv:1712.03713  [pdf, other

    cs.CR

    I Trust my Zombies: A Trust-enabled Botnet

    Authors: Emmanouil Vasilomanolakis, Jan Helge Wolf, Leon Böck, Shankar Karuppayah, Max Mühlhäuser

    Abstract: Defending against botnets has always been a cat and mouse game. Cyber-security researchers and government agencies attempt to detect and take down botnets by playing the role of the cat. In this context, a lot of work has been done towards reverse engineering certain variants of malware families as well as understanding the network protocols of botnets to identify their weaknesses (if any) and exp… ▽ More

    Submitted 11 December, 2017; originally announced December 2017.

  7. arXiv:1305.0051  [pdf, ps, other

    cs.SI cs.LG physics.soc-ph stat.ML

    Revealing social networks of spammers through spectral clustering

    Authors: Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woolf, Alfred O. Hero III

    Abstract: To date, most studies on spam have focused only on the spamming phase of the spam cycle and have ignored the harvesting phase, which consists of the mass acquisition of email addresses. It has been observed that spammers conceal their identity to a lesser degree in the harvesting phase, so it may be possible to gain new insights into spammers' behavior by studying the behavior of harvesters, which… ▽ More

    Submitted 30 April, 2013; originally announced May 2013.

    Comments: Source code and data available at http://tbayes.eecs.umich.edu/xukevin/spam_icc09 Proceedings of the IEEE International Conference on Communications (2009)

  8. On the Capacity of Channels with Timing Synchronization Errors

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We consider a new formulation of a class of synchronization error channels and derive analytical bounds and numerical estimates for the capacity of these channels. For the binary channel with only deletions, we obtain an expression for the symmetric information rate in terms of subsequence weights which reduces to a tight lower bound for small deletion probabilities. We are also able to exactly ch… ▽ More

    Submitted 2 October, 2015; v1 submitted 12 February, 2013; originally announced February 2013.

    Comments: 23 pages, 5 figures, submitted to the IEEE Transactions on Information Theory, Feb 2013. Summary of some results presented at ISIT 2011 (http://arxiv.longhoe.net/abs/1106.0070) Revised Feb 2015

  9. arXiv:1210.7515  [pdf, ps, other

    cs.IT

    Rewriting Codes for Flash Memories

    Authors: Eitan Yaakobi, Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf

    Abstract: Flash memory is a non-volatile computer memory comprising blocks of cells, wherein each cell can take on q different values or levels. While increasing the cell level is easy, reducing the level of a cell can be accomplished only by erasing an entire block. Since block erasures are highly undesirable, coding schemes - known as floating codes (or flash codes) and buffer codes - have been designed i… ▽ More

    Submitted 28 October, 2012; originally announced October 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:0905.1512

  10. arXiv:1210.6917  [pdf, ps, other

    cs.DM cs.DS math.CO

    Sampling-based proofs of almost-periodicity results and algorithmic applications

    Authors: Eli Ben-Sasson, Noga Ron-Zewi, Madhur Tulsiani, Julia Wolf

    Abstract: We give new combinatorial proofs of known almost-periodicity results for sumsets of sets with small doubling in the spirit of Croot and Sisask, whose almost-periodicity lemma has had far-reaching implications in additive combinatorics. We provide an alternative (and L^p-norm free) point of view, which allows for proofs to easily be converted to probabilistic algorithms that decide membership in al… ▽ More

    Submitted 25 October, 2012; originally announced October 2012.

    Comments: 28 pages

    MSC Class: 11B30

  11. arXiv:1106.0075  [pdf, other

    cs.IT

    Windowed Decoding of Spatially Coupled Codes

    Authors: Aravind R. Iyengar, Paul H. Siegel, Rudiger L. Urbanke, Jack K. Wolf

    Abstract: Spatially coupled codes have been of interest recently owing to their superior performance over memoryless binary-input channels. The performance is good both asymptotically, since the belief propagation thresholds approach capacity, as well as for finite lengths, since degree-2 variables that result in high error floors can be completely avoided. However, to realize the promised good performance,… ▽ More

    Submitted 30 November, 2012; v1 submitted 31 May, 2011; originally announced June 2011.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory, November 2012. Summary presented at ISIT 2011 <http://arxiv.longhoe.net/abs/1106.0075v1>

  12. arXiv:1106.0070  [pdf, other

    cs.IT

    Modeling and Information Rates for Synchronization Error Channels

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We propose a new channel model for channels with synchronization errors. Using this model, we give simple, non-trivial and, in some cases, tight lower bounds on the capacity for certain synchronization error channels.

    Submitted 31 May, 2011; originally announced June 2011.

    Comments: 5 pages, 1 figure, to be presented at ISIT 2011

  13. arXiv:1105.4372  [pdf, ps, other

    cs.DS cs.DM math.CO

    Quadratic Goldreich-Levin Theorems

    Authors: Madhur Tulsiani, Julia Wolf

    Abstract: Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseudorandom with respect to linear phases. The Goldreich-Levin algorithm can be viewed as an algorithmic analogue of such a decomposition as it gives a way to efficiently find the linear phases associated with large Fourier… ▽ More

    Submitted 22 May, 2011; originally announced May 2011.

    MSC Class: 11B30

  14. Write Channel Model for Bit-Patterned Media Recording

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We propose a new write channel model for bit-patterned media recording that reflects the data dependence of write synchronization errors. It is shown that this model accommodates both substitution-like errors and insertion-deletion errors whose statistics are determined by an underlying channel state process. We study information theoretic properties of the write channel model, including the capac… ▽ More

    Submitted 21 October, 2010; originally announced October 2010.

    Comments: 11 pages, 12 figures, journal

  15. Windowed Decoding of Protograph-based LDPC Convolutional Codes over Erasure Channels

    Authors: Aravind Iyengar, Marco Papaleo, Paul Siegel, Jack Wolf, Alessandro Vanelli-Coralli, Giovanni Corazza

    Abstract: We consider a windowed decoding scheme for LDPC convolutional codes that is based on the belief-propagation (BP) algorithm. We discuss the advantages of this decoding scheme and identify certain characteristics of LDPC convolutional code ensembles that exhibit good performance with the windowed decoder. We will consider the performance of these ensembles and codes over erasure channels with and wi… ▽ More

    Submitted 22 October, 2011; v1 submitted 21 October, 2010; originally announced October 2010.

    Comments: 18 pages, 9 figures, accepted for publication in the IEEE Transactions on Information Theory

  16. arXiv:0911.3992  [pdf, ps, other

    cs.IT

    Storage Coding for Wear Leveling in Flash Memories

    Authors: Anxiao, Jiang, Robert Mateescu, Eitan Yaakobi, Jehoshua Bruck, Paul H. Siegel, Alexander Vardy, Jack K. Wolf

    Abstract: Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell is implemented as either NAND or NOR floating gate. NAND flash is currently the most widely used type of flash memory. In a NAND flash memory, every block of cells consists of numerous pages; rewriting even a single page requires the whole block to be erased and reprogrammed. Block erasures determine b… ▽ More

    Submitted 20 November, 2009; originally announced November 2009.

  17. arXiv:0905.1512  [pdf, ps, other

    cs.IT

    A Nearly Optimal Construction of Flash Codes

    Authors: Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf, Eitan Yaakobi

    Abstract: Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell can take on q different values or levels. While increasing the cell level is easy, reducing the level of a cell can be accomplished only by erasing an entire block. Since block erasures are highly undesirable, coding schemes - known as floating codes or flash codes - have been designed in order to maxi… ▽ More

    Submitted 10 May, 2009; originally announced May 2009.

  18. arXiv:0901.0702  [pdf, other

    cs.IT

    Multidimensional Flash Codes

    Authors: Eitan Yaakobi, Alexander Vardy, Paul H. Siegel, Jack K. Wolf

    Abstract: Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell can take on q different levels corresponding to the number of electrons it contains. Increasing the cell level is easy; however, reducing a cell level forces all the other cells in the same block to be erased. This erasing operation is undesirable and therefore has to be used as infrequently as possibl… ▽ More

    Submitted 3 April, 2009; v1 submitted 6 January, 2009; originally announced January 2009.

  19. Gaussian Belief Propagation Solver for Systems of Linear Equations

    Authors: Ori Shental, Paul H. Siegel, Jack K. Wolf, Danny Bickson, Danny Dolev

    Abstract: The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we develop a solution based upon Gaussian belief propagation (GaBP) that does not involve direct matrix inversion. The iterative nature of our approach allows for a distributed message-passing implementation of the soluti… ▽ More

    Submitted 9 October, 2008; originally announced October 2008.

    Comments: 5 pages, 2 figures, appeared in the 2008 IEEE International Symposium on Information Theory, Toronto, July 2008

    ACM Class: E.5

    Journal ref: The 2008 IEEE International Symposium on Information Theory (ISIT 2008), Toronto, July 2008

  20. Gaussian Belief Propagation Based Multiuser Detection

    Authors: Danny Bickson, Danny Dolev, Ori Shental, Paul H. Siegel, Jack K. Wolf

    Abstract: In this work, we present a novel construction for solving the linear multiuser detection problem using the Gaussian Belief Propagation algorithm. Our algorithm yields an efficient, iterative and distributed implementation of the MMSE detector. We compare our algorithm's performance to a recent result and show an improved memory consumption, reduced computation steps and a reduction in the number… ▽ More

    Submitted 9 October, 2008; originally announced October 2008.

    Comments: 6 pages, 1 figures, appeared in the 2008 IEEE International Symposium on Information Theory, Toronto, July 2008

    ACM Class: E.5

    Journal ref: The 2008 IEEE International Symposium on Information Theory (ISIT 2008), Toronto, July 2008

  21. arXiv:0810.1119  [pdf, ps, other

    cs.IT

    Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application

    Authors: Ori Shental, Danny Bickson, Paul H. Siegel, Jack K. Wolf, Danny Dolev

    Abstract: The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we develop a solution based upon Gaussian belief propagation (GaBP) that does not involve direct matrix inversion. The iterative nature of our approach allows for a distributed message-passing implementation of the soluti… ▽ More

    Submitted 7 October, 2008; originally announced October 2008.

    Comments: Submitted to IEEE Transactions on Information Theory

    ACM Class: E.4

  22. arXiv:0805.0918  [pdf

    cs.OH

    Through Silicon Vias as Enablers for 3D Systems

    Authors: E. Jung, Andreas Ostmann, Peter Ramm, Jürgen Wolf, Michael Toepper, Maik Wiemer

    Abstract: This special session on 3D TSV's will highlight some of the fabrication processes and used technologies to create vias from the frontside of an active circuit to its backside and potential implementation solutions to form complex systems leveraging these novel possibilities. General techniques for via formation are discussed as well as advanced integration solutions leveraging the power of 3D TS… ▽ More

    Submitted 7 May, 2008; originally announced May 2008.

    Comments: Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)

    Journal ref: Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)

  23. arXiv:0805.0917  [pdf

    cs.OH

    Technologies for 3D Heterogeneous Integration

    Authors: Jürgen Wolf, P. Ramm, Armin Klumpp, H. Reichl

    Abstract: 3D-Integration is a promising technology towards higher interconnect densities and shorter wiring lengths between multiple chip stacks, thus achieving a very high performance level combined with low power consumption. This technology also offers the possibility to build up systems with high complexity just by combining devices of different technologies. For ultra thin silicon is the base of this… ▽ More

    Submitted 7 May, 2008; originally announced May 2008.

    Comments: Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)

    Journal ref: Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)