Skip to main content

Showing 1–10 of 10 results for author: Fischmeister, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.10076  [pdf, other

    cs.AI cs.LG

    VideoAgent: Self-Improving Video Generation

    Authors: Achint Soni, Sreyas Venkataraman, Abhranil Chandra, Sebastian Fischmeister, Percy Liang, Bo Dai, Sherry Yang

    Abstract: Video generation has been used to generate visual plans for controlling robotic systems. Given an image observation and a language instruction, previous work has generated video plans which are then converted to robot controls to be executed. However, a major bottleneck in leveraging video generation for control lies in the quality of the generated videos, which often suffer from hallucinatory con… ▽ More

    Submitted 9 February, 2025; v1 submitted 13 October, 2024; originally announced October 2024.

  2. Annotating Control-Flow Graphs for Formalized Test Coverage Criteria

    Authors: Sean Kauffman, Carlos Moreno, Sebastian Fischmeister

    Abstract: Control flow coverage criteria are an important part of the process of qualifying embedded software for safety-critical systems. Criteria such as modified condition/decision coverage (MC/DC) as defined by DO-178B are used by regulators to judge the adequacy of testing and by QA engineers to design tests when full path coverage is impossible. Despite their importance, these coverage criteria are… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  3. arXiv:2006.09504  [pdf, other

    cs.CV cs.LG

    A generalizable saliency map-based interpretation of model outcome

    Authors: Shailja Thakur, Sebastian Fischmeister

    Abstract: One of the significant challenges of deep neural networks is that the complex nature of the network prevents human comprehension of the outcome of the network. Consequently, the applicability of complex machine learning models is limited in the safety-critical domains, which incurs risk to life and property. To fully exploit the capabilities of complex neural networks, we propose a non-intrusive i… ▽ More

    Submitted 19 June, 2020; v1 submitted 16 June, 2020; originally announced June 2020.

  4. arXiv:2006.06993  [pdf, ps, other

    cs.CR

    CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring

    Authors: Shailja Thakur, Carlos Moreno, Sebastian Fischmeister

    Abstract: The lack of any sender authentication mechanism in place makes CAN (Controller Area Network) vulnerable to security threats. For instance, an attacker can impersonate an ECU (Electronic Control Unit) on the bus and send spoofed messages unobtrusively with the identifier of the impersonated ECU. To address this problem, we propose a novel sender authentication technique that uses power consumption… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

  5. arXiv:1904.05411  [pdf, other

    cs.LG stat.ML

    Deep Learning for System Trace Restoration

    Authors: Ilia Sucholutsky, Apurva Narayan, Matthias Schonlau, Sebastian Fischmeister

    Abstract: Most real-world datasets, and particularly those collected from physical systems, are full of noise, packet loss, and other imperfections. However, most specification mining, anomaly detection and other such algorithms assume, or even require, perfect data quality to function properly. Such algorithms may work in lab conditions when given clean, controlled data, but will fail in the field when giv… ▽ More

    Submitted 10 April, 2019; originally announced April 2019.

    Comments: Pre-print (accepted to IJCNN 2019)

  6. arXiv:1704.03397  [pdf, other

    cs.SE

    Debugging Behaviour of Embedded-Software Developers: An Exploratory Study

    Authors: Pansy Arafa, Daniel Solomon, Samaneh Navabpour, Sebastian Fischmeister

    Abstract: Many researchers have studied the behaviour of successful developers while debugging desktop software. In this paper, we investigate the embedded-software debugging by intermediate programmers through an exploratory study. The bugs are semantic low-level errors, and the participants are students who completed a real-time operating systems course in addition to five other programming courses. We co… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

    Comments: 5 pages

  7. arXiv:1703.02873  [pdf, other

    cs.SE cs.PF cs.PL

    Redundancy Suppression In Time-Aware Dynamic Binary Instrumentation

    Authors: Pansy Arafa, Hany Kashif, Sebastian Fischmeister

    Abstract: Software tracing techniques are well-established and used by instrumentation tools to extract run-time information for program analysis and debugging. Dynamic binary instrumentation as one tool instruments program binaries to extract information. Unfortunately, instrumentation causes perturbation that is unacceptable for time-sensitive applications. Consequently we developed DIME*, a tool for dyna… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: 11 pages

  8. arXiv:1503.00793  [pdf, ps, other

    cs.DM cs.LO cs.PL cs.SE

    DAG-width of Control Flow Graphs with Applications to Model Checking

    Authors: Therese Biedl, Sebastian Fischmeister, Neeraj Kumar

    Abstract: The treewidth of control flow graphs arising from structured programs is known to be at most six. However, as a control flow graph is inherently directed, it makes sense to consider a measure of width for digraphs instead. We use the so-called DAG-width and show that the DAG-width of control flow graphs arising from structured (goto-free) programs is at most three. Additionally, we also give a lin… ▽ More

    Submitted 2 March, 2015; originally announced March 2015.

    Comments: 12 pages, 4 figures

  9. arXiv:1411.2239  [pdf, other

    cs.LO

    Accelerated Runtime Verification of LTL Specifications with Counting Semantics

    Authors: Ramy Medhat, Yogi Joshi, Borzoo Bonakdarpour, Sebastian Fischmeister

    Abstract: Runtime verification is an effective automated method for specification-based offline testing and analysis as well as online monitoring of complex systems. The specification language is often a variant of regular expressions or a popular temporal logic, such as LTL. This paper presents a novel and efficient parallel algorithm for verifying a more expressive version of LTL specifications that incor… ▽ More

    Submitted 9 November, 2014; originally announced November 2014.

  10. arXiv:1410.6824  [pdf, other

    cs.DC

    Power Redistribution for Optimizing Performance in MPI Clusters

    Authors: Ramy Medhat, Borzoo Bonakdarpour, Sebastian Fischmeister

    Abstract: Power efficiency has recently become a major concern in the high-performance computing domain. HPC centers are provisioned by a power bound which impacts execution time. Naturally, a tradeoff arises between power efficiency and computational efficiency. This paper tackles the problem of performance optimization for MPI applications, where a power bound is assumed. The paper exposes a subset of HPC… ▽ More

    Submitted 24 October, 2014; originally announced October 2014.