Skip to main content

Showing 1–15 of 15 results for author: Winter, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.15863  [pdf, ps, other

    cs.CV cs.AI cs.RO

    Generative AI for Autonomous Driving: A Review

    Authors: Katharina Winter, Abhishek Vivekanandan, Rupert Polley, Yinzhe Shen, Christian Schlauch, Mohamed-Khalil Bouzidi, Bojan Derajic, Natalie Grabowsky, Annajoyce Mariani, Dennis Rochau, Giovanni Lucente, Harsh Yadav, Firas Mualla, Adam Molin, Sebastian Bernhard, Christian Wirth, Ömer Şahin Taş, Nadja Klein, Fabian B. Flohr, Hanno Gottschalk

    Abstract: Generative AI (GenAI) is rapidly advancing the field of Autonomous Driving (AD), extending beyond traditional applications in text, image, and video generation. We explore how generative models can enhance automotive tasks, such as static map creation, dynamic scenario generation, trajectory forecasting, and vehicle motion planning. By examining multiple generative approaches ranging from Variatio… ▽ More

    Submitted 21 May, 2025; originally announced May 2025.

    Comments: This work has been submitted to the IEEE for possible publication

  2. arXiv:2503.03074  [pdf, other

    cs.RO cs.CV

    BEVDriver: Leveraging BEV Maps in LLMs for Robust Closed-Loop Driving

    Authors: Katharina Winter, Mark Azer, Fabian B. Flohr

    Abstract: Autonomous driving has the potential to set the stage for more efficient future mobility, requiring the research domain to establish trust through safe, reliable and transparent driving. Large Language Models (LLMs) possess reasoning capabilities and natural language understanding, presenting the potential to serve as generalized decision-makers for ego-motion planning that can interact with human… ▽ More

    Submitted 4 March, 2025; originally announced March 2025.

    Comments: This work has been submitted to the IEEE for possible publication

  3. arXiv:2501.06234  [pdf, other

    cs.OS cs.CR

    Fast, Secure, Adaptable: LionsOS Design, Implementation and Performance

    Authors: Gernot Heiser, Ivan Velickovic, Peter Chubb, Alwin Joshy, Anuraag Ganesh, Bill Nguyen, Cheng Li, Courtney Darville, Guangtao Zhu, James Archer, Jingyao Zhou, Krishnan Winter, Lucy Parker, Szymon Duchniewicz, Tianyi Bai

    Abstract: We present LionsOS, an operating system for security- and safety-critical embedded systems. LionsOS is based on the formally verified seL4 microkernel and designed with verification in mind. It uses a static architecture and features a highly modular design driven by strict separa- tion of concerns and a focus on simplicity. We demonstrate that LionsOS achieves excellent performance on system-call… ▽ More

    Submitted 27 May, 2025; v1 submitted 8 January, 2025; originally announced January 2025.

    Comments: 14 pages, 13 figures

    ACM Class: D.4.7; D.4.8

  4. arXiv:2404.03431  [pdf, other

    cs.MA

    MEDIATE: Mutually Endorsed Distributed Incentive Acknowledgment Token Exchange

    Authors: Philipp Altmann, Katharina Winter, Michael Kölle, Maximilian Zorn, Thomy Phan, Claudia Linnhoff-Popien

    Abstract: Recent advances in multi-agent systems (MAS) have shown that incorporating peer incentivization (PI) mechanisms vastly improves cooperation. Especially in social dilemmas, communication between the agents helps to overcome sub-optimal Nash equilibria. However, incentivization tokens need to be carefully selected. Furthermore, real-world applications might yield increased privacy requirements and l… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: 12 pages, 5 figures

  5. arXiv:2402.13916  [pdf, other

    cs.LG

    Bias correction of wind power forecasts with SCADA data and continuous learning

    Authors: Stefan Jonas, Kevin Winter, Bernhard Brodbeck, Angela Meyer

    Abstract: Wind energy plays a critical role in the transition towards renewable energy sources. However, the uncertainty and variability of wind can impede its full potential and the necessary growth of wind power capacity. To mitigate these challenges, wind power forecasting methods are employed for applications in power management, energy trading, or maintenance scheduling. In this work, we present, evalu… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: 20 pages

  6. Bridging MDE and AI: A Systematic Review of Domain-Specific Languages and Model-Driven Practices in AI Software Systems Engineering

    Authors: Simon Raedler, Luca Berardinelli, Karolin Winter, Abbas Rahimi, Stefanie Rinderle-Ma

    Abstract: Background:Technical systems are growing in complexity with more components and functions across various disciplines. Model-Driven Engineering (MDE) helps manage this complexity by using models as key artifacts. Domain-Specific Languages (DSL) supported by MDE facilitate modeling. As data generation in product development increases, there's a growing demand for AI algorithms, which can be challeng… ▽ More

    Submitted 6 May, 2024; v1 submitted 10 July, 2023; originally announced July 2023.

    Comments: 57 pages, 2 figures, 8 tables

    ACM Class: A.1; H.1.0; I.2.4

  7. Predictive Compliance Monitoring in Process-Aware Information Systems: State of the Art, Functionalities, Research Directions

    Authors: Stefanie Rinderle-Ma, Karolin Winter, Janik-Vasily Benzin

    Abstract: Business process compliance is a key area of business process management and aims at ensuring that processes obey to compliance constraints such as regulatory constraints or business rules imposed on them. Process compliance can be checked during process design time based on verification of process models and at runtime based on monitoring the compliance states of running process instances. For ex… ▽ More

    Submitted 2 March, 2023; v1 submitted 10 May, 2022; originally announced May 2022.

  8. arXiv:2004.14475  [pdf, other

    cs.LG eess.SP

    Detecting Production Phases Based on Sensor Values using 1D-CNNs

    Authors: Burkhard Hoppenstedt, Manfred Reichert, Ghada El-Khawaga, Klaus Kammerer, Karl-Michael Winter, Rüdiger Pryss

    Abstract: In the context of Industry 4.0, the knowledge extraction from sensor information plays an important role. Often, information gathered from sensor values reveals meaningful insights for production levels, such as anomalies or machine states. In our use case, we identify production phases through the inspection of sensor values with the help of convolutional neural networks. The data set stems from… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

    Comments: 2 Pages

  9. arXiv:2004.00577  [pdf, ps, other

    cs.PL cs.CR cs.LO

    An abstract semantics of speculative execution for reasoning about security vulnerabilities

    Authors: Robert J. Colvin, Kirsten Winter

    Abstract: Reasoning about correctness and security of software is increasingly difficult due to the complexity of modern microarchitectural features such as out-of-order execution. A class of security vulnerabilities termed Spectre that exploits side effects of speculative, out-of-order execution was announced in 2018 and has since drawn much attention. In this paper we formalise speculative execution and i… ▽ More

    Submitted 9 March, 2020; originally announced April 2020.

  10. arXiv:2002.02672  [pdf, other

    cs.SE

    How do Quantifiers Affect the Quality of Requirements?

    Authors: Katharina Winter, Henning Femmer, Andreas Vogelsang

    Abstract: Context: Requirements quality can have a substantial impact on the effectiveness and efficiency of using requirements artifacts in a development process. Quantifiers such as "at least", "all", or "exactly" are common language constructs used to express requirements. Quantifiers can be formulated by affirmative phrases ("At least") or negative phrases ("Not less than"). Problem: It is long assumed… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

  11. arXiv:1811.03399  [pdf, other

    cs.CL

    Untangling the GDPR Using ConRelMiner

    Authors: Karolin Winter, Stefanie Rinderle-Ma

    Abstract: The General Data Protection Regulation (GDPR) poses enormous challenges on companies and organizations with respect to understanding, implementing, and maintaining the contained constraints. We report on how the ConRelMiner method can be used for untangling the GDPR. For this, the GDPR is filtered and grouped along the roles mentioned by the GDPR and the reduction of sentences to be read by analys… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

  12. Correctness of Concurrent Objects under Weak Memory Models

    Authors: Graeme Smith, Kirsten Winter, Robert J. Colvin

    Abstract: In this paper we develop a theory for correctness of concurrent objects under weak memory models. Central to our definitions is the concept of observations which determine when effects of operations become visible, and hence determine the semantics of objects, under a given memory model. The resulting notion of correctness, called object refinement, is generic as it is parameterised by the memory… ▽ More

    Submitted 22 October, 2018; originally announced October 2018.

    Comments: In Proceedings Refine 2018, arXiv:1810.08739. arXiv admin note: text overlap with arXiv:1802.04954

    Journal ref: EPTCS 282, 2018, pp. 53-67

  13. arXiv:1802.04954  [pdf, other

    cs.LO

    A sound and complete definition of linearizability on weak memory models

    Authors: Graeme Smith, Kirsten Winter, Robert J. Colvin

    Abstract: Linearizability is a widely accepted notion of correctness for concurrent objects. Recent research has investigated redefining linearizability for particular hardware weak memory models, in particular for TSO. In this paper, we provide an overview of this research and show that such redefinitions of linearizability are not required: under an interpretation of specification behaviour which abstract… ▽ More

    Submitted 1 July, 2019; v1 submitted 13 February, 2018; originally announced February 2018.

    Comments: 33 pages, including appendix. arXiv admin note: text overlap with arXiv:1810.09612

  14. arXiv:1710.03352  [pdf, other

    cs.LO cs.SE

    A synchronous program algebra: a basis for reasoning about shared-memory and event-based concurrency

    Authors: Ian J. Hayes, Larissa A. Meinicke, Kirsten Winter, Robert J. Colvin

    Abstract: This research started with an algebra for reasoning about rely/guarantee concurrency for a shared memory model. The approach taken led to a more abstract algebra of atomic steps, in which atomic steps synchronise (rather than interleave) when composed in parallel. The algebra of rely/guarantee concurrency then becomes an instantiation of the more abstract algebra. Many of the core properties neede… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: Extended version of a Formal Methods 2016 paper, "An algebra of synchronous atomic steps"

  15. An algebra of synchronous atomic steps

    Authors: Ian J. Hayes, Robert Colvin, Larissa Meinicke, Kirsten Winter, Andrius Velykis

    Abstract: This research started with an algebra for reasoning about rely/guarantee concurrency for a shared memory model. The approach taken led to a more abstract algebra of atomic steps, in which atomic steps synchronise (rather than interleave) when composed in parallel. The algebra of rely/guarantee concurrency then becomes an interpretation of the more abstract algebra. Many of the core properties need… ▽ More

    Submitted 17 January, 2022; v1 submitted 1 September, 2016; originally announced September 2016.

    ACM Class: D.2.4; F.3.1

    Journal ref: Fitzgerald J., Heitmeyer C., Gnesi S., Philippou A. (eds) FM 2016: Formal Methods. FM 2016. Lecture Notes in Computer Science, vol 9995. Springer, Cham