
Net2Vis: Transforming Deep Convolutional Networks into PublicationReady Visualizations
To properly convey neural network architectures in publications, appropr...
read it

Optimal Sensor Data Fusion Architecture for Object Detection in Adverse Weather Conditions
A good and robust sensor data fusion in diverse weather conditions is a ...
read it

Monte Carlo Convolution for Learning on NonUniformly Sampled Point Clouds
We propose an efficient and effective method to learn convolutions for n...
read it

DeepCLR: CorrespondenceLess Architecture for Deep EndtoEnd Point Cloud Registration
This work addresses the problem of point cloud registration using deep n...
read it

Training DeConfusion: An Interactive, NetworkSupported Visual Analysis System for Resolving Errors in Image Classification Training Data
Convolutional neural networks gain more and more popularity in image cla...
read it

Who wins the Miss Contest for Imputation Methods? Our Vote for Miss BooPF
Missing data is an expected issue when large amounts of data is collecte...
read it

Hierarchical State Abstractions for DecisionMaking Problems with Computational Constraints
In this semitutorial paper, we first review the informationtheoretic a...
read it

Justifications in Constraint Handling Rules for Logical Retraction in Dynamic Algorithms
We present a straightforward sourcetosource transformation that introd...
read it

Efficient Dictionary Learning with SparsenessEnforcing Projections
Learning dictionaries suitable for sparse coding instead of using engine...
read it

Sparse Activity and Sparse Connectivity in Supervised Learning
Sparseness is a useful regularizer for learning in a wide range of appli...
read it

Rapid Exact Signal Scanning with Deep Convolutional Neural Networks
A rigorous formulation of the dynamics of a signal processing scheme aim...
read it

The Configurable SAT Solver Challenge (CSSC)
It is well known that different solution strategies work well for differ...
read it

Exchanging Conflict Resolution in an Adaptable Implementation of ACTR
In computational cognitive science, the cognitive architecture ACTR is ...
read it

LowRank Matrix Recovery using Gabidulin Codes in Characteristic Zero
We present a new approach on lowrank matrix recovery (LRMR) based on Ga...
read it

Extended Object Tracking: Introduction, Overview and Applications
This article provides an elaborate overview of current research in exten...
read it

Syntactic vs. Semantic Locality: How Good Is a Cheap Approximation?
Extracting a subset of a given OWL ontology that captures all the ontolo...
read it

On the Relation between two Rotation Metrics
In their work "Global Optimization through Rotation Space Search", Richa...
read it

Eliminating Odd Cycles by Removing a Matching
We study the problem of determining whether a given graph G=(V, E) admit...
read it

Finding Small Weight Isomorphisms with Additional Constraints is FixedParameter Tractable
Lubiw showed that several variants of Graph Isomorphism are NPcomplete,...
read it

Decoding Interleaved Gabidulin Codes using Alekhnovich's Algorithm
We prove that Alekhnovich's algorithm can be used for row reduction of s...
read it

Algebraic Soft Decoding Algorithms for ReedSolomon Codes Using Module
The interpolation based algebraic decoding for ReedSolomon (RS) codes c...
read it

Improved Power Decoding of Interleaved OnePoint Hermitian Codes
We propose a new partial decoding algorithm for hinterleaved onepoint ...
read it

Analysis of Multivariate Data and Repeated Measures Designs with the R Package MANOVA.RM
The numerical availability of statistical inference methods for a modern...
read it

MultiplicationCombination Tests for Incomplete Paired Data
We consider statistical procedures for hypothesis testing of real valued...
read it

Rapid Testing of IaaS Resource Management Algorithms via Cloud Middleware Simulation
Infrastructure as a Service (IaaS) Cloud services allow users to deploy ...
read it

Confluence Modulo Equivalence with Invariants in Constraint Handling Rules
Confluence denotes the property of a state transition system that states...
read it

Intentions of Vulnerable Road Users  Detection and Forecasting by Means of Machine Learning
Avoiding collisions with vulnerable road users (VRUs) using sensorbased...
read it

Temporal Human Action Segmentation via Dynamic Clustering
We present an effective dynamic clustering algorithm for the task of tem...
read it

TYDR  Track Your Daily Routine. Android App for Tracking Smartphone Sensor and Usage Data
We present the Android app TYDR (Track Your Daily Routine) which tracks ...
read it

Estimation of geodesic tortuosity and constrictivity in stationary random closed sets
We investigate the problem of estimating geodesic tortuosity and constri...
read it

VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs
Vehicular networks are networks of communicating vehicles, a major enabl...
read it

MultiSource Fusion Operations in Subjective Logic
The purpose of multisource fusion is to combine information from more t...
read it

Detecting Traffic Lights by Single Shot Detection
Recent improvements in object detection are driven by the success of con...
read it

Disparity Sliding Window: Object Proposals From Disparity Images
Sliding window approaches have been widely used for object recognition t...
read it

A cautionary tale on using imputation methods for inference in matched pairs design
Imputation procedures in biomedical fields have turned into statistical ...
read it

Void Space Surfaces to Convey Depth in Vessel Visualizations
To enhance depth perception and thus data comprehension, additional dept...
read it

A solution to a linear integral equation with an application to statistics of infinitely divisible moving averages
For given measurable functions g,h:R^d →R and a (weighted) L^2function ...
read it

Weak dependence and GMM estimation of supOU and mixed moving average processes
We consider a mixed moving average (MMA) process X driven by a Lévy basi...
read it

More powerful logrank permutation tests for twosample survival data
Weighted logrank tests are a popular tool for analyzing right censored s...
read it

Coloured Ring Confidential Transactions
Privacy in blockchains is considered second to functionality, but a vit...
read it

A Flexible Network Approach to Privacy of Blockchain Transactions
For preserving privacy, blockchains can be equipped with dedicated mecha...
read it

Bounded Rational DecisionMaking with Adaptive Neural Network Priors
Bounded rationality investigates utilityoptimizing decisionmakers with...
read it

A comparative tour through the simulation algorithms for maxstable processes
Maxstable processes form a fundamental class of stochastic processes in...
read it

On a linear functional for infinitely divisible moving average random fields
Given a lowfrequency sample of the infinitely divisible moving average ...
read it

Minimum Reload Cost Graph Factors
The concept of Reload cost in a graph refers to the cost that occurs whi...
read it

Inviwo  A Visualization System with Usage Abstraction Levels
The complexity of today's visualization applications demands specific vi...
read it

An Empirical Study towards Understanding How Deep Convolutional Nets Recognize Falls
Detecting unintended falls is essential for ambient intelligence and hea...
read it

Local Temporal Bilinear Pooling for Finegrained Action Parsing
Finegrained temporal action parsing is important in many applications, ...
read it

A SubjectiveLogicbased Reliability Estimation Mechanism for Cooperative Information with Application to IV's Safety
Use of cooperative information, distributed by roadside units, offers l...
read it

Training a Fast Object Detector for LiDAR Range Images Using Labeled Data from Sensors with Higher Resolution
This paper presents an efficient model for object detection from LiDAR s...
read it
Universität Ulm
Research strong, young university with over 10,000 students in medicine and STEM subjects in the middle of the city of science Ulm.