
Rethinking Assumptions in Deep Anomaly Detection
Though anomaly detection (AD) can be viewed as a classification problem ...
read it

Deep SemiSupervised Anomaly Detection
Deep approaches to anomaly detection have recently shown promising resul...
read it

Linkage between Piecewise Constant MumfordShah model and ROF model and its virtue in image segmentation
The piecewise constant MumfordShah (PCMS) model and the RudinOsherFat...
read it

FINNL: Library Extensions and Design Tradeoff Analysis for Variable Precision LSTM Networks on FPGAs
It is well known that many types of artificial neural networks, includin...
read it

Copula & Marginal Flows: Disentangling the Marginal from its Joint
Deep generative networks such as GANs and normalizing flows flourish in ...
read it

Survey of reasoning using Neural networks
Reason and inference require process as well as memory skills by humans....
read it

TensorQuant  A Simulation Toolbox for Deep Neural Network Quantization
Recent research implies that training and inference of deep neural netwo...
read it

Symbol Grounding Association in Multimodal Sequences with Missing Elements
In this paper, we extend a symbolic association framework for being able...
read it

Most central or least central? How much modeling decisions influence a node's centrality ranking in multiplex networks
To understand a node's centrality in a multiplex network, its centrality...
read it

Relating Strong Spatial Cognition to Symbolic Problem Solving  An Example
In this note, we discuss and analyse a shortest path finding approach us...
read it

Active Canny: Edge Detection and Recovery with Open Active Contour Models
We introduce an edge detection and recovery framework based on open acti...
read it

Variational Image Segmentation Model Coupled with Image Restoration Achievements
Image segmentation and image restoration are two important topics in ima...
read it

Nemo/Hecke: Computer Algebra and Number Theory Packages for the Julia Programming Language
We introduce two new packages, Nemo and Hecke, written in the Julia prog...
read it

Modular Techniques For Noncommutative Gröbner Bases
In this note, we extend modular techniques for computing Gröbner bases f...
read it

On Using Network Science in Mining Developers Collaboration in Software Engineering: A Systematic Literature Review
The goal of this study is to identify, review, and analyze the published...
read it

An introduction to approximate computing
Approximate computing is a research area where we investigate a wide spe...
read it

SpaceEfficient Algorithms for Longest Increasing Subsequence
Given a sequence of integers, we want to find a longest increasing subse...
read it

Learning Interesting Categorical Attributes for Refined Data Exploration
This work proposes and evaluates a novel approach to determine interesti...
read it

Bad Primes in Computational Algebraic Geometry
Computations over the rational numbers often suffer from intermediate co...
read it

On the computation of the HNF of a module over the ring of integers of a number field
We present a variation of the modular algorithm for computing the Hermit...
read it

Computing in quotients of rings of integers
We develop algorithms to turn quotients of rings of rings of integers in...
read it

E3Solver: decision tree unification by enumeration
We introduce E3Solver, a unificationbased solver for programmingbyexa...
read it

Reliable Distributed Authentication in MultiAccess Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected t...
read it

Physical Layer Authentication for Mission Critical Machine Type Communication using Gaussian Mixture Model based Clustering
The application of Mission Critical Machine Type Communication (MCMTC) ...
read it

Application of Machine Learning for Channel based Message Authentication in Mission Critical Machine Type Communication
The design of robust wireless communication systems for industrial appli...
read it

Providing Physical Layer Security for Mission Critical Machine Type Communication
The design of wireless systems for Mission Critical Machine Type Communi...
read it

Munchausen Iteration
We present a method for solving polynomial equations over idempotent ome...
read it

Devicecentric Energy Optimization for Edge Cloud Offloading
A wireless system is considered, where, computationally complex algorith...
read it

ACGreGate: A Framework for Practical Access Control for Applications using Weakly Consistent Databases
Scalable and highly available systems often require data stores that off...
read it

Efficient Gaussian Process Classification Using PolyaGamma Data Augmentation
We propose an efficient stochastic variational approach to GP classifica...
read it

Algorithmic Differentiation for Domain Specific Languages
Algorithmic Differentiation (AD) can be used to automate the generation ...
read it

An improved isomorphism test for boundedtreewidth graphs
We give a new fpt algorithm testing isomorphism of nvertex graphs of tr...
read it

Recognizing Challenging Handwritten Annotations with Fully Convolutional Networks
This paper introduces a very challenging dataset of historic German docu...
read it

Approximating multiobjective combinatorial optimization problems with the OWA criterion
The paper deals with a multiobjective combinatorial optimization problem...
read it

Demystifying Deception Technology:A Survey
Deception boosts security for systems and components by denial, deceit, ...
read it

Wireless Communication for Modular Production Facilities
The growing demand for individualized products leads to need for a more ...
read it

5G Island for Network Resilience and Autonomous Failsafe Operations
The resilience of 5G networks can be strongly challenged by central clou...
read it

Bayesian Convolutional Neural Networks
We propose a Bayesian convolutional neural network built upon Bayes by B...
read it

Implementation of a NearOptimal Complex Root Clustering Algorithm
We describe Ccluster, a software for computing natural ϵclusters of com...
read it

The Structure of Service Level Agreement of Slicebased 5G Network
Network slicing is considered to be one of the key enablers to Fifth Gen...
read it

Security Solutions for Local Wireless Networks in Control Applications based on Physical Layer Security
The Design of new wireless communication systems for industrial applicat...
read it

How do Convolutional Neural Networks Learn Design?
In this paper, we aim to understand the design principles in book cover ...
read it

Analysis of Dynamic Memory Bandwidth Regulation in Multicore RealTime Systems
One of the primary sources of unpredictability in modern multicore embe...
read it

Rational Impatience Strategy of 5G Network Tenants in QueueBased Slice Admission Control: Shall I Wait Further for My Network Slice?
The fifth generation (5G) technologies enable an emerge type of public c...
read it

A 5G Architecture for The Factory of the Future
Factory automation and production are currently undergoing massive chang...
read it

Rational Impatience Admission Control in 5Gsliced Networks: Shall I Bide my Slice Opportunity?
Recently, the specifications of the fifth generation (5G) of mobile netw...
read it

Advanced Memory Buoyancy for Forgetful Information Systems
Knowledge workers face an ever increasing flood of information in their ...
read it

InflectionTolerant OntologyBased Named Entity Recognition for RealTime Applications
A growing number of applications users daily interact with have to opera...
read it

How practical is it? Machine Learning for Identifying Conceptual Interoperability Constraints in API Documents
Building meaningful interoperation with external software units requires...
read it

LayerParallel Training of Deep Residual Neural Networks
Residual neural networks (ResNets) are a promising class of deep neural ...
read it
Technische Universität Kaiserslautern
TU Kaiserslautern is organized into 12 faculties. Approximately 14,500 students are enrolled at the moment.