Skip to main content

Showing 1–6 of 6 results for author: Maier, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.15886  [pdf, other

    cs.HC cs.RO

    Beyond Attention: Investigating the Threshold Where Objective Robot Exclusion Becomes Subjective

    Authors: Clarissa Sabrina Arlinghaus, Ashita Ashok, Ashim Mandal, Karsten Berns, Günter W. Maier

    Abstract: As robots become increasingly involved in decision-making processes (e.g., personnel selection), concerns about fairness and social inclusion arise. This study examines social exclusion in robot-led group interviews by robot Ameca, exploring the relationship between objective exclusion (robot's attention allocation), subjective exclusion (perceived exclusion), mood change, and need fulfillment. In… ▽ More

    Submitted 22 April, 2025; originally announced April 2025.

  2. arXiv:2410.23440  [pdf, ps, other

    cs.LG math.NA

    The Sample Complexity of Learning Lipschitz Operators with respect to Gaussian Measures

    Authors: Ben Adcock, Michael Griebel, Gregor Maier

    Abstract: Operator learning, the approximation of mappings between infinite-dimensional function spaces using machine learning, has gained increasing research attention in recent years. Approximate operators, learned from data, can serve as efficient surrogate models for problems in computational science and engineering, complementing traditional methods. However, despite their empirical success, our unders… ▽ More

    Submitted 26 June, 2025; v1 submitted 30 October, 2024; originally announced October 2024.

    Comments: Section 6 about pointwise sampling in v2 of this paper has been cut and will appear elsewhere

  3. arXiv:1911.02080  [pdf, other

    eess.IV cs.LG

    Lesson Learnt: Modularization of Deep Networks Allow Cross-Modality Reuse

    Authors: Weilin Fu, Lennart Husvogt, Stefan Ploner James G. Fujimoto Andreas Maier

    Abstract: Fundus photography and Optical Coherence Tomography Angiography (OCT-A) are two commonly used modalities in ophthalmic imaging. With the development of deep learning algorithms, fundus image processing, especially retinal vessel segmentation, has been extensively studied. Built upon the known operator theory, interpretable deep network pipelines with well-defined modules have been constructed on f… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

    Comments: 6 pages, 3 figures

  4. arXiv:1907.04784  [pdf, other

    cs.NI eess.SP

    AWG-based Nonblocking Shuffle-Exchange Networks

    Authors: Tong Ye, Jingjie Ding, Tony Tong Lee, Guido Maier

    Abstract: Optical shuffle-exchange networks (SENs) have wide application in different kinds of interconnection networks. This paper proposes an approach to construct modular optical SENs, using a set of arrayed waveguide gratings (AWGs) and tunable wavelength converters (TWCs). According to the wavelength routing property of AWGs, we demonstrate for the first time that an AWG is functionally equivalent to a… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

    Comments: 13 pages, 8 figures

  5. arXiv:1611.03356  [pdf, other

    cs.CG

    Numerically robust computation of circular visibility

    Authors: Stephan Brummer, Georg Maier, Tomas Sauer

    Abstract: We address the question of whether a point inside a domain bounded by a simple closed arc spline is circularly visible from a specified arc from the boundary. We provide a simple and numerically stable linear time algorithm that solves this problem. In particular, we present an easy-to-check criterion that implies that a point is not visible from a specified boundary arc.

    Submitted 5 December, 2017; v1 submitted 9 November, 2016; originally announced November 2016.

    Comments: Preprint submitted to CAGD on Nov. 08 2016, accepted Nov. 26 2017

  6. arXiv:1602.06686  [pdf, ps, other

    cs.NI cs.DC

    Designing a Disaster-resilient Network with Software Defined Networking

    Authors: An Xie, Xiaoliang Wang, Guido Maier, Sanglu Lu

    Abstract: With the wide deployment of network facilities and the increasing requirement of network reliability, the disruptive event like natural disaster, power outage or malicious attack has become a non-negligible threat to the current communication network. Such disruptive event can simultaneously destroy all devices in a specific geographical area and affect many network based applications for a long t… ▽ More

    Submitted 23 February, 2016; v1 submitted 22 February, 2016; originally announced February 2016.