Skip to main content

Showing 1–15 of 15 results for author: König, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.00595  [pdf, ps, other

    cs.CR cs.PL cs.SE

    The Secrets Must Not Flow: Scaling Security Verification to Large Codebases (extended version)

    Authors: Linard Arquint, Samarth Kishor, Jason R. Koenig, Joey Dodds, Daniel Kroening, Peter Müller

    Abstract: Existing program verifiers can prove advanced properties about security protocol implementations, but are difficult to scale to large codebases because of the manual effort required. We develop a novel methodology called *Diodon* that addresses this challenge by splitting the codebase into the protocol implementation (the *Core*) and the remainder (the *Application*). This split allows us to apply… ▽ More

    Submitted 1 July, 2025; originally announced July 2025.

  2. Fully Composable and Adequate Verified Compilation with Direct Refinements between Open Modules (Technical Report)

    Authors: Ling Zhang, Yuting Wang, Jinhua Wu, Jérémie Koenig, Zhong Shao

    Abstract: Verified compilation of open modules (i.e., modules whose functionality depends on other modules) provides a foundation for end-to-end verification of modular programs ubiquitous in contemporary software. However, despite intensive investigation in this topic for decades, the proposed approaches are still difficult to use in practice as they rely on assumptions about the internal working of compil… ▽ More

    Submitted 18 November, 2023; v1 submitted 25 February, 2023; originally announced February 2023.

  3. arXiv:2302.02740  [pdf, other

    cs.CR

    AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

    Authors: Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Mobile applications are widely used for online services sharing a large amount of personal data online. One-time authentication techniques such as passwords and physiological biometrics (e.g., fingerprint, face, and iris) have their own advantages but also disadvantages since they can be stolen or emulated, and do not prevent access to the underlying device, once it is unlocked. To address these c… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: 16 pages, 7 figures

  4. Grounding Game Semantics in Categorical Algebra

    Authors: Jérémie Koenig

    Abstract: I present a formal connection between algebraic effects and game semantics, two important lines of work in programming languages semantics with applications in compositional software verification. Specifically, the algebraic signature enumerating the possible side-effects of a computation can be read as a game, and strategies for this game constitute the free algebra for the signature in a cate… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: In Proceedings ACT 2021, arXiv:2211.01102

    ACM Class: D.3.1; F.3.2

    Journal ref: EPTCS 372, 2022, pp. 368-383

  5. arXiv:2202.03714  [pdf, other

    cs.CV

    What's Cracking? A Review and Analysis of Deep Learning Methods for Structural Crack Segmentation, Detection and Quantification

    Authors: Jacob König, Mark Jenkins, Mike Mannion, Peter Barrie, Gordon Morison

    Abstract: Surface cracks are a very common indicator of potential structural faults. Their early detection and monitoring is an important factor in structural health monitoring. Left untreated, they can grow in size over time and require expensive repairs or maintenance. With recent advances in computer vision and deep learning algorithms, the automatic detection and segmentation of cracks for this monitori… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  6. arXiv:2112.05304  [pdf, ps, other

    cs.PL

    Inferring Invariants with Quantifier Alternations: Taming the Search Space Explosion

    Authors: Jason R. Koenig, Oded Padon, Sharon Shoham, Alex Aiken

    Abstract: We present a PDR/IC3 algorithm for finding inductive invariants with quantifier alternations. We tackle scalability issues that arise due to the large search space of quantified invariants by combining a breadth-first search strategy and a new syntactic form for quantifier-free bodies. The breadth-first strategy prevents inductive generalization from getting stuck in regions of the search space th… ▽ More

    Submitted 9 December, 2021; originally announced December 2021.

    Comments: 16 pages, 2 figures, submitted to TACAS 2022

    ACM Class: D.2.4; F.3.1

  7. arXiv:2109.00456  [pdf, other

    cs.CV

    Weakly-Supervised Surface Crack Segmentation by Generating Pseudo-Labels using Localization with a Classifier and Thresholding

    Authors: Jacob König, Mark Jenkins, Mike Mannion, Peter Barrie, Gordon Morison

    Abstract: Surface cracks are a common sight on public infrastructure nowadays. Recent work has been addressing this problem by supporting structural maintenance measures using machine learning methods. Those methods are used to segment surface cracks from their background, making them easier to localize. However, a common issue is that to create a well-functioning algorithm, the training data needs to have… ▽ More

    Submitted 27 October, 2021; v1 submitted 1 September, 2021; originally announced September 2021.

    Comments: This work has been submitted to the IEEE for possible publication

  8. "Look! It's a Computer Program! It's an Algorithm! It's AI!": Does Terminology Affect Human Perceptions and Evaluations of Algorithmic Decision-Making Systems?

    Authors: Markus Langer, Tim Hunsicker, Tina Feldkamp, Cornelius J. König, Nina Grgić-Hlača

    Abstract: In the media, in policy-making, but also in research articles, algorithmic decision-making (ADM) systems are referred to as algorithms, artificial intelligence, and computer programs, amongst other terms. We hypothesize that such terminological differences can affect people's perceptions of properties of ADM systems, people's evaluations of systems in application contexts, and the replicability of… ▽ More

    Submitted 26 May, 2022; v1 submitted 25 August, 2021; originally announced August 2021.

    Comments: Preregistrations for the studies included in this paper are available under https://aspredicted.org/LDC\_GSM and https://aspredicted.org/NTE\_WND

    Journal ref: In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems

  9. Optimized Deep Encoder-Decoder Methods for Crack Segmentation

    Authors: Jacob König, Mark Jenkins, Mike Mannion, Peter Barrie, Gordon Morison

    Abstract: Surface crack segmentation poses a challenging computer vision task as background, shape, colour and size of cracks vary. In this work we propose optimized deep encoder-decoder methods consisting of a combination of techniques which yield an increase in crack segmentation performance. Specifically we propose a decoder-part for an encoder-decoder based deep learning architecture for semantic segmen… ▽ More

    Submitted 26 August, 2021; v1 submitted 14 August, 2020; originally announced August 2020.

    Comments: Accepted Manuscript at Digital Signal Processing (Elsevier)

  10. arXiv:1810.10325  [pdf, other

    cs.CV cs.LG stat.ML

    Multi-Stage Reinforcement Learning For Object Detection

    Authors: Jonas Koenig, Simon Malberg, Martin Martens, Sebastian Niehaus, Artus Krohn-Grimberghe, Arunselvan Ramaswamy

    Abstract: We present a reinforcement learning approach for detecting objects within an image. Our approach performs a step-wise deformation of a bounding box with the goal of tightly framing the object. It uses a hierarchical tree-like representation of predefined region candidates, which the agent can zoom in on. This reduces the number of region candidates that must be evaluated so that the agent can affo… ▽ More

    Submitted 26 October, 2018; v1 submitted 15 October, 2018; originally announced October 2018.

    Comments: Accepted for the Computer Vision Conference (CVC) 2019

  11. Some complexity and approximation results for coupled-tasks scheduling problem according to topology

    Authors: Benoit Darties, Rodolphe Giroudeau, Jean-Claude König, Gilles Simonin

    Abstract: We consider the makespan minimization coupled-tasks problem in presence of compatibility constraints with a specified topology. In particular, we focus on stretched coupled-tasks, i.e. coupled-tasks having the same sub-tasks execution time and idle time duration. We study several problems in framework of classic complexity and approximation for which the compatibility graph is bipartite (star, cha… ▽ More

    Submitted 7 June, 2017; originally announced June 2017.

    Journal ref: RAIRO - Operations Research, EDP Sciences, 2016, 50, pp.781 - 795

  12. Isomorphic coupled-task scheduling problem with compatibility constraints on a single processor

    Authors: Gilles Simonin, Benoit Darties, Rodolphe Giroudeau, Jean-Claude König

    Abstract: The problem presented in this paper is a generalization of the usual coupled-tasks scheduling problem in presence of compatibility constraints. The reason behind this study is the data acquisition problem for a submarine torpedo. We investigate a particular configuration for coupled tasks (any task is divided into two sub-tasks separated by an idle time), in which the idle time of a coupled task i… ▽ More

    Submitted 7 June, 2017; originally announced June 2017.

    Journal ref: Journal of Scheduling, Springer Verlag, 2011, 14 (5), pp.501-509

  13. arXiv:1706.02200  [pdf, ps, other

    cs.CC cs.DS

    Bounds and approximation results for scheduling coupled-tasks with compatibility constraints

    Authors: Rodolphe Giroudeau, Jean-Claude König, Benoit Darties, Gilles Simonin

    Abstract: This article is devoted to propose some lower and upper bounds for the coupled-tasks scheduling problem in presence of compatibility constraints according to classical complexity hypothesis ($\mathcal{P} \neq \mathcal{NP}$, $\mathcal{ETH}$). Moreover, we develop an efficient polynomial-time approximation algorithm for the specific case for which the topology describing the compatibility constra… ▽ More

    Submitted 7 June, 2017; originally announced June 2017.

    Journal ref: 15th International Conference on Project Management and Scheduling, pp.94-97, 2016

  14. arXiv:1611.03699  [pdf, ps, other

    cs.IT

    Design and Analysis of Compressive Antenna Arrays for Direction of Arrival Estimation

    Authors: Mohamed Ibrahim, Venkatesh Ramireddy, Anastasia Lavrenko, Jonas König, Florian Römer, Markus Landmann, Marcus Grossmann, Giovanni Del Galdo, Reiner S. Thomä

    Abstract: In this paper we investigate the design of compressive antenna arrays for direction of arrival (DOA) estimation that aim to provide a larger aperture with a reduced hardware complexity by a linear combination of the antenna outputs to a lower number of receiver channels. We present a basic receiver architecture of such a compressive array and introduce a generic system model that includes differen… ▽ More

    Submitted 11 November, 2016; originally announced November 2016.

  15. Programming Language Features for Refinement

    Authors: Jason Koenig, K. Rustan M. Leino

    Abstract: Algorithmic and data refinement are well studied topics that provide a mathematically rigorous approach to gradually introducing details in the implementation of software. Program refinements are performed in the context of some programming language, but mainstream languages lack features for recording the sequence of refinement steps in the program text. To experiment with the combination of re… ▽ More

    Submitted 7 June, 2016; originally announced June 2016.

    Comments: In Proceedings Refine'15, arXiv:1606.01344

    ACM Class: D.2.4; D.3.2

    Journal ref: EPTCS 209, 2016, pp. 87-106