Skip to main content

Showing 1–13 of 13 results for author: Boehm, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.11949  [pdf, other

    cs.CV

    Coconut Palm Tree Counting on Drone Images with Deep Object Detection and Synthetic Training Data

    Authors: Tobias Rohe, Barbara Böhm, Michael Kölle, Jonas Stein, Robert Müller, Claudia Linnhoff-Popien

    Abstract: Drones have revolutionized various domains, including agriculture. Recent advances in deep learning have propelled among other things object detection in computer vision. This study utilized YOLO, a real-time object detector, to identify and count coconut palm trees in Ghanaian farm drone footage. The farm presented has lost track of its trees due to different planting phases. While manual countin… ▽ More

    Submitted 16 December, 2024; originally announced December 2024.

    Comments: 9 pages

  2. arXiv:2411.08764  [pdf, other

    cs.LG cs.AI physics.flu-dyn

    Flow reconstruction in time-varying geometries using graph neural networks

    Authors: Bogdan A. Danciu, Vito A. Pagone, Benjamin Böhm, Marius Schmidt, Christos E. Frouzakis

    Abstract: The paper presents a Graph Attention Convolutional Network (GACN) for flow reconstruction from very sparse data in time-varying geometries. The model incorporates a feature propagation algorithm as a preprocessing step to handle extremely sparse inputs, leveraging information from neighboring nodes to initialize missing features. In addition, a binary indicator is introduced as a validity mask to… ▽ More

    Submitted 13 November, 2024; originally announced November 2024.

  3. arXiv:2305.00004  [pdf, other

    cs.LG physics.app-ph

    Accurate ignition detection of solid fuel particles using machine learning

    Authors: Tao Li, Zhangke Liang, Andreas Dreizler, Benjamin Böhm

    Abstract: In the present work, accurate determination of single-particle ignition is focused on using high-speed optical diagnostics combined with machine learning approaches. Ignition of individual particles in a laminar flow reactor are visualized by simultaneous 10 kHz OH-LIF and DBI measurements. Two coal particle sizes of 90-125μm and 160-200μm are investigated in conventional air and oxy-fuel conditio… ▽ More

    Submitted 20 April, 2023; originally announced May 2023.

    Comments: 9 pages, 6 figures, Mediterranean Combustion Symposium 2023

  4. arXiv:2203.08080  [pdf, other

    cs.CV cs.AI

    Implicit Feature Decoupling with Depthwise Quantization

    Authors: Iordanis Fostiropoulos, Barry Boehm

    Abstract: Quantization has been applied to multiple domains in Deep Neural Networks (DNNs). We propose Depthwise Quantization (DQ) where $\textit{quantization}$ is applied to a decomposed sub-tensor along the $\textit{feature axis}$ of weak statistical dependence. The feature decomposition leads to an exponential increase in $\textit{representation capacity}$ with a linear increase in memory and parameter c… ▽ More

    Submitted 29 March, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

    Comments: to be published in CVPR-2022

    ACM Class: I.4.10; I.2.10; H.1.1

  5. arXiv:2112.00663  [pdf, other

    cs.LG cs.PL

    Graph Conditioned Sparse-Attention for Improved Source Code Understanding

    Authors: Junyan Cheng, Iordanis Fostiropoulos, Barry Boehm

    Abstract: Transformer architectures have been successfully used in learning source code representations. The fusion between a graph representation like Abstract Syntax Tree (AST) and a source code sequence makes the use of current approaches computationally intractable for large input sequence lengths. Source code can have long-range dependencies that require larger sequence lengths to model effectively. Cu… ▽ More

    Submitted 3 December, 2021; v1 submitted 1 December, 2021; originally announced December 2021.

  6. arXiv:2111.08874  [pdf, other

    cs.LG cs.PL

    GN-Transformer: Fusing Sequence and Graph Representation for Improved Code Summarization

    Authors: Junyan Cheng, Iordanis Fostiropoulos, Barry Boehm

    Abstract: As opposed to natural languages, source code understanding is influenced by grammatical relationships between tokens regardless of their identifier name. Graph representations of source code such as Abstract Syntax Tree (AST) can capture relationships between tokens that are not obvious from the source code. We propose a novel method, GN-Transformer to learn end-to-end on a fused sequence and grap… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

  7. Understanding the Relative Strength of QBF CDCL Solvers and QBF Resolution

    Authors: Olaf Beyersdorff, Benjamin Böhm

    Abstract: QBF solvers implementing the QCDCL paradigm are powerful algorithms that successfully tackle many computationally complex applications. However, our theoretical understanding of the strength and limitations of these QCDCL solvers is very limited. In this paper we suggest to formally model QCDCL solvers as proof systems. We define different policies that can be used for decision heuristics and un… ▽ More

    Submitted 13 April, 2023; v1 submitted 10 September, 2021; originally announced September 2021.

    Journal ref: Logical Methods in Computer Science, Volume 19, Issue 2 (April 14, 2023) lmcs:8519

  8. Study of the Utility of Text Classification Based Software Architecture Recovery Method RELAX for Maintenance

    Authors: Daniel Link, Kamonphop Srisopha, Barry Boehm

    Abstract: Background. The software architecture recovery method RELAX produces a concern-based architectural view of a software system graphically and textually from that system's source code. The method has been implemented in software which can be run on subject systems whose source code is written in Java. Aims. Our aim was to find out whether the availability of architectural views produced by RELAX can… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: To be published in ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (ESEM '21)

    ACM Class: D.2.11

  9. arXiv:1903.06895  [pdf, other

    cs.SE

    Recover and RELAX: Concern-Oriented Software Architecture Recovery for Systems Development and Maintenance

    Authors: Daniel Link, Pooyan Behnamghader, Ramin Moazeni, Barry Boehm

    Abstract: The stakeholders of a system are legitimately interested in whether and how its architecture reflects their respective concerns at each point of its development and maintenance processes. Having such knowledge available at all times would enable them to continually adjust their systems structure at each juncture and reduce the buildup of technical debt that can be hard to reduce once it has persis… ▽ More

    Submitted 16 March, 2019; originally announced March 2019.

    Comments: 10 pages, 9 figures. To be published in the proceedings of the International Conference on Software and System Processes, Montreal 2019

  10. arXiv:1901.09474  [pdf, ps, other

    cs.SE

    Do users talk about the software in my product? Analyzing user reviews on IoT products

    Authors: Kamonphop Srisopha, Pooyan Behnamghader, Barry Boehm

    Abstract: Consumer product reviews are an invaluable source of data because they contain a wide range of information that could help requirement engineers to meet user needs. Recent studies have shown that tweets about software applications and reviews on App Stores contain useful information, which enable a more responsive software requirements elicitation. However, all of these studies' subjects are merel… ▽ More

    Submitted 27 January, 2019; originally announced January 2019.

    Comments: 14 pages, accepted to the Proceedings of CIbSE XXI Ibero-American Conference on Software Engineering (CIbSE), 2018 (ISBN: 9781510869370)

  11. arXiv:1901.07700  [pdf, other

    cs.SE

    The Value of Software Architecture Recovery for Maintenance

    Authors: Daniel Link, Pooyan Behnam, Ramin Moazeni, Barry Boehm

    Abstract: In order to maintain a system, it is beneficial to know its software architecture. In the common case that this architecture is unavailable, architecture recovery provides a way to recover an architectural view of the system. Many different methods and tools exist to provide such a view. While there have been taxonomies of different recovery methods and surveys of their results along with measurem… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

  12. arXiv:1609.05563  [pdf, other

    cs.SE

    Negative Results for Software Effort Estimation

    Authors: Tim Menzies, Ye Yang, George Mathew, Barry Boehm, Jairus Hihn

    Abstract: Context:More than half the literature on software effort estimation (SEE) focuses on comparisons of new estimation methods. Surprisingly, there are no studies comparing state of the art latest methods with decades-old approaches. Objective:To check if new SEE methods generated better estimates than older methods. Method: Firstly, collect effort estimation methods ranging from "classical" COCOMO (p… ▽ More

    Submitted 29 September, 2016; v1 submitted 18 September, 2016; originally announced September 2016.

    Comments: 22 pages, EMSE 2016 accepted submission. Affiliated to "Jet Propulsion Laboratory, California Institute of Technology"

  13. arXiv:1410.6656  [pdf, other

    cs.MM cs.CR

    StegExpose - A Tool for Detecting LSB Steganography

    Authors: Benedikt Boehm

    Abstract: Steganalysis tools play an important part in saving time and providing new angles of attack for forensic analysts. StegExpose is a solution designed for use in the real world, and is able to analyse images for LSB steganography in bulk using proven attacks in a time efficient manner. When steganalytic methods are combined intelligently, they are able generate even more accurate results. This is th… ▽ More

    Submitted 24 October, 2014; originally announced October 2014.