Skip to main content

Showing 1–50 of 55 results for author: Wolf, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.16882  [pdf, ps, other

    cs.CV

    Tracking the Flight: Exploring a Computational Framework for Analyzing Escape Responses in Plains Zebra (Equus quagga)

    Authors: Isla Duporge, Sofia Minano, Nikoloz Sirmpilatze, Igor Tatarnikov, Scott Wolf, Adam L. Tyson, Daniel Rubenstein

    Abstract: Ethological research increasingly benefits from the growing affordability and accessibility of drones, which enable the capture of high-resolution footage of animal movement at fine spatial and temporal scales. However, analyzing such footage presents the technical challenge of separating animal movement from drone motion. While non-trivial, computer vision techniques such as image registration an… ▽ More

    Submitted 23 May, 2025; v1 submitted 22 May, 2025; originally announced May 2025.

    Comments: Accepted to the CV4Animals workshop at CVPR 2025

  2. arXiv:2505.13186  [pdf, other

    cs.RO cs.LG

    Interpretable Robotic Friction Learning via Symbolic Regression

    Authors: Philipp Scholl, Alexander Dietrich, Sebastian Wolf, Jinoh Lee, Alin-Albu Schäffer, Gitta Kutyniok, Maged Iskandar

    Abstract: Accurately modeling the friction torque in robotic joints has long been challenging due to the request for a robust mathematical description. Traditional model-based approaches are often labor-intensive, requiring extensive experiments and expert knowledge, and they are difficult to adapt to new scenarios and dependencies. On the other hand, data-driven methods based on neural networks are easier… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

  3. arXiv:2503.02112  [pdf, other

    cs.LG astro-ph.IM

    Building Machine Learning Challenges for Anomaly Detection in Science

    Authors: Elizabeth G. Campolongo, Yuan-Tang Chou, Ekaterina Govorkova, Wahid Bhimji, Wei-Lun Chao, Chris Harris, Shih-Chieh Hsu, Hilmar Lapp, Mark S. Neubauer, Josephine Namayanja, Aneesh Subramanian, Philip Harris, Advaith Anand, David E. Carlyn, Subhankar Ghosh, Christopher Lawrence, Eric Moreno, Ryan Raikman, Jiaman Wu, Ziheng Zhang, Bayu Adhi, Mohammad Ahmadi Gharehtoragh, Saúl Alonso Monsalve, Marta Babicz, Furqan Baig , et al. (125 additional authors not shown)

    Abstract: Scientific discoveries are often made by finding a pattern or object that was not predicted by the known rules of science. Oftentimes, these anomalous events or objects that do not conform to the norms are an indication that the rules of science governing the data are incomplete, and something new needs to be present to explain these unexpected outliers. The challenge of finding anomalies can be c… ▽ More

    Submitted 29 March, 2025; v1 submitted 3 March, 2025; originally announced March 2025.

    Comments: 17 pages 6 figures to be submitted to Nature Communications

  4. arXiv:2503.01808  [pdf, other

    cs.CG

    Visualization of Event Graphs for Train Schedules

    Authors: Johann Hartleb, Marie Schmidt, Samuel Wolf, Alexander Wolff

    Abstract: Software that is used to compute or adjust train schedules is based on so-called event graphs. The vertices of such a graph correspond to events; each event is associated with a point in time, a location, and a train. A train line corresponds to a sequence of events (ordered by time) that are associated with the same train. The event graph has a directed edge from an earlier to a later event if th… ▽ More

    Submitted 3 March, 2025; originally announced March 2025.

  5. arXiv:2502.14353  [pdf, other

    cs.CC cs.SI

    Eliminating Majority Illusions

    Authors: Foivos Fioravantes, Abhiruk Lahiri, Antonio Lauerbach, Lluís Sabater, Marie Diana Sieper, Samuel Wolf

    Abstract: An opinion illusion refers to a phenomenon in social networks where agents may witness distributions of opinions among their neighbours that do not accurately reflect the true distribution of opinions in the population as a whole. A specific case of this occurs when there are only two possible choices, such as whether to receive the COVID-19 vaccine or vote on EU membership, which is commonly refe… ▽ More

    Submitted 20 February, 2025; originally announced February 2025.

    Comments: To be presented in AAMAS'25

  6. arXiv:2501.06836  [pdf, other

    cs.CV

    SAM-DA: Decoder Adapter for Efficient Medical Domain Adaptation

    Authors: Javier Gamazo Tejero, Moritz Schmid, Pablo Márquez Neila, Martin S. Zinkernagel, Sebastian Wolf, Raphael Sznitman

    Abstract: This paper addresses the domain adaptation challenge for semantic segmentation in medical imaging. Despite the impressive performance of recent foundational segmentation models like SAM on natural images, they struggle with medical domain images. Beyond this, recent approaches that perform end-to-end fine-tuning of models are simply not computationally tractable. To address this, we propose a nove… ▽ More

    Submitted 12 January, 2025; originally announced January 2025.

    Comments: WACV25

  7. arXiv:2501.05840  [pdf, other

    cs.HC

    Applying Think-Aloud in ICTD: A Case Study of a Chatbot Use by Teachers in Rural Côte d'Ivoire

    Authors: Vikram Kamath Cannanure, Sharon Wolf, Kaja Jasińska, Timothy X Brown, Amy Ogan

    Abstract: Think-alouds are a common HCI usability method where participants verbalize their thoughts while using interfaces. However, their utility in cross-cultural settings, particularly in the Global South, is unclear, where cultural differences impact user interactions. This paper investigates the usability challenges teachers in rural Côte d'Ivoire faced when using a chatbot designed to support an educ… ▽ More

    Submitted 10 January, 2025; originally announced January 2025.

    Comments: ICTD 24, Notes track. International Conference on Information & Communication Technologies and Development 2024

    Report number: ICTD24Note02 ACM Class: H.5.2; K.3.1; K.4.2

  8. arXiv:2406.14441  [pdf, other

    cs.MA cs.DC

    Vahana.jl -- A framework (not only) for large-scale agent-based models

    Authors: Steffen Fürst, Tim Conrad, Carlo Jaeger, Sarah Wolf

    Abstract: Agent-based models (ABMs) offer a powerful framework for understanding complex systems. However, their computational demands often become a significant barrier as the number of agents and complexity of the simulation increase. Traditional ABM platforms often struggle to fully exploit modern computing resources, hindering the development of large-scale simulations. This paper presents Vahana.jl, a… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    MSC Class: 37E25 ACM Class: D.1.3; I.6.5; J.4

  9. arXiv:2405.17698  [pdf, other

    cs.CV

    BaboonLand Dataset: Tracking Primates in the Wild and Automating Behaviour Recognition from Drone Videos

    Authors: Isla Duporge, Maksim Kholiavchenko, Roi Harel, Scott Wolf, Dan Rubenstein, Meg Crofoot, Tanya Berger-Wolf, Stephen Lee, Julie Barreau, Jenna Kline, Michelle Ramirez, Charles Stewart

    Abstract: Using drones to track multiple individuals simultaneously in their natural environment is a powerful approach for better understanding group primate behavior. Previous studies have demonstrated that it is possible to automate the classification of primate behavior from video data, but these studies have been carried out in captivity or from ground-based cameras. To understand group behavior and th… ▽ More

    Submitted 3 June, 2024; v1 submitted 27 May, 2024; originally announced May 2024.

    Comments: Dataset will be published shortly

  10. arXiv:2405.14788  [pdf, other

    cs.CV

    Masked Image Modelling for retinal OCT understanding

    Authors: Theodoros Pissas, Pablo Márquez-Neila, Sebastian Wolf, Martin Zinkernagel, Raphael Sznitman

    Abstract: This work explores the effectiveness of masked image modelling for learning representations of retinal OCT images. To this end, we leverage Masked Autoencoders (MAE), a simple and scalable method for self-supervised learning, to obtain a powerful and general representation for OCT images by training on 700K OCT images from 41K patients collected under real world clinical settings. We also provide… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  11. arXiv:2312.06295  [pdf, other

    cs.CV

    Cataract-1K: Cataract Surgery Dataset for Scene Segmentation, Phase Recognition, and Irregularity Detection

    Authors: Negin Ghamsarian, Yosuf El-Shabrawi, Sahar Nasirihaghighi, Doris Putzgruber-Adamitsch, Martin Zinkernagel, Sebastian Wolf, Klaus Schoeffmann, Raphael Sznitman

    Abstract: In recent years, the landscape of computer-assisted interventions and post-operative surgical video analysis has been dramatically reshaped by deep-learning techniques, resulting in significant advancements in surgeons' skills, operation room management, and overall surgical outcomes. However, the progression of deep-learning-powered surgical technologies is profoundly reliant on large-scale datas… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 12 pages, 5 figures, 7 tables

  12. arXiv:2312.03409  [pdf, other

    cs.CV

    DeepPyramid+: Medical Image Segmentation using Pyramid View Fusion and Deformable Pyramid Reception

    Authors: Negin Ghamsarian, Sebastian Wolf, Martin Zinkernagel, Klaus Schoeffmann, Raphael Sznitman

    Abstract: Semantic Segmentation plays a pivotal role in many applications related to medical image and video analysis. However, designing a neural network architecture for medical image and surgical video segmentation is challenging due to the diverse features of relevant classes, including heterogeneity, deformability, transparency, blunt boundaries, and various distortions. We propose a network architectu… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

    Comments: 13 pages, 3 figures

  13. Learning-based adaption of robotic friction models

    Authors: Philipp Scholl, Maged Iskandar, Sebastian Wolf, Jinoh Lee, Aras Bacho, Alexander Dietrich, Alin Albu-Schäffer, Gitta Kutyniok

    Abstract: In the Fourth Industrial Revolution, wherein artificial intelligence and the automation of machines occupy a central role, the deployment of robots is indispensable. However, the manufacturing process using robots, especially in collaboration with humans, is highly intricate. In particular, modeling the friction torque in robotic joints is a longstanding problem due to the lack of a good mathemati… ▽ More

    Submitted 9 May, 2025; v1 submitted 25 October, 2023; originally announced October 2023.

    Journal ref: Robotics and Computer-Integrated Manufacturing 2024

  14. arXiv:2310.08501  [pdf, other

    cs.LG cs.CV

    Unsupervised Learning of Object-Centric Embeddings for Cell Instance Segmentation in Microscopy Images

    Authors: Steffen Wolf, Manan Lalit, Henry Westmacott, Katie McDole, Jan Funke

    Abstract: Segmentation of objects in microscopy images is required for many biomedical applications. We introduce object-centric embeddings (OCEs), which embed image patches such that the spatial offsets between patches cropped from the same object are preserved. Those learnt embeddings can be used to delineate individual objects and thus obtain instance segmentations. Here, we show theoretically that, unde… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Journal ref: Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2023, pages 21263-21272

  15. ALE: A Simulation-Based Active Learning Evaluation Framework for the Parameter-Driven Comparison of Query Strategies for NLP

    Authors: Philipp Kohl, Nils Freyer, Yoka Krämer, Henri Werth, Steffen Wolf, Bodo Kraft, Matthias Meinecke, Albert Zündorf

    Abstract: Supervised machine learning and deep learning require a large amount of labeled data, which data scientists obtain in a manual, and time-consuming annotation process. To mitigate this challenge, Active Learning (AL) proposes promising data points to annotators they annotate next instead of a subsequent or random sample. This method is supposed to save annotation effort while maintaining model perf… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

    Comments: The Version of Record of this contribution is published in Deep Learning Theory and Applications 4th International Conference, DeLTA 2023 Proceedings, and is available online at https://doi.org/10.1007/978-3-031-39059-3_16

    Journal ref: Conte, D., Fred, A., Gusikhin, O., Sansone, C. (eds) Deep Learning Theory and Applications. DeLTA 2023. Communications in Computer and Information Science, vol 1875. Springer, Cham

  16. arXiv:2307.16660  [pdf, other

    cs.CV

    Domain Adaptation for Medical Image Segmentation using Transformation-Invariant Self-Training

    Authors: Negin Ghamsarian, Javier Gamazo Tejero, Pablo Márquez Neila, Sebastian Wolf, Martin Zinkernagel, Klaus Schoeffmann, Raphael Sznitman

    Abstract: Models capable of leveraging unlabelled data are crucial in overcoming large distribution gaps between the acquired datasets across different imaging devices and configurations. In this regard, self-training techniques based on pseudo-labeling have been shown to be highly effective for semi-supervised domain adaptation. However, the unreliability of pseudo labels can hinder the capability of self-… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: 11 pages, 5 figures, accepted at 26th international conference on Medical Image Computing & Computer Assisted Intervention (MICCAI 2023)

  17. arXiv:2303.11678  [pdf, other

    cs.CV

    Full or Weak annotations? An adaptive strategy for budget-constrained annotation campaigns

    Authors: Javier Gamazo Tejero, Martin S. Zinkernagel, Sebastian Wolf, Raphael Sznitman, Pablo Márquez Neila

    Abstract: Annotating new datasets for machine learning tasks is tedious, time-consuming, and costly. For segmentation applications, the burden is particularly high as manual delineations of relevant image content are often extremely expensive or can only be done by experts with domain-specific knowledge. Thanks to developments in transfer learning and training with weak supervision, segmentation models can… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: CVPR23

  18. arXiv:2210.13278  [pdf, ps, other

    quant-ph cs.CR

    Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography

    Authors: Xavier Coiteux-Roy, Stefan Wolf

    Abstract: In line with advances in recent years about realizing cryptographic functionalities in an information-theoretically secure way from physical phenomena and laws, we propose here to obtain useful tasks from the sole assumption of limited free energy. Specifically, based on that assumption -- resulting in a setting loosely related to Maurer's bounded-storage model -- we derive protocols for unconditi… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Comments: 6 pages

  19. arXiv:2209.11650  [pdf, ps, other

    cs.CR cs.CC math.AG math.NT quant-ph

    An Algebraic-Geometry Approach to Prime Factorization

    Authors: Alberto Montina, Stefan Wolf

    Abstract: New algorithms for prime factorization that outperform the existing ones or take advantage of particular properties of the prime factors can have a practical impact on present implementations of cryptographic algorithms that rely on the complexity of factorization. Currently used keys are chosen on the basis of the present algorithmic knowledge and, thus, can potentially be subject to future breac… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

  20. arXiv:2206.01501  [pdf, other

    quant-ph cs.CR

    Key Agreement and Oblivious Transfer from Free-Energy Limitations

    Authors: Xavier Coiteux-Roy, Stefan Wolf

    Abstract: We propose one of the very few constructive consequences of the second law of thermodynamics. More specifically, we present protocols for secret-key establishment and multiparty computation the security of which is based fundamentally on Landauer's principle. The latter states that the erasure cost of each bit of information is at least kTln2 (where k is Boltzmann's constant and T is the absolute… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: 31 pages, 3 figures

  21. arXiv:2205.07628  [pdf, other

    quant-ph cs.IT

    Thermodynamics as Combinatorics: A Toy Theory

    Authors: Ämin Baumeler, Carla Rieger, Stefan Wolf

    Abstract: We discuss a simple toy model which allows, in a natural way, for deriving central facts from thermodynamics such as its fundamental laws, including Carnot's version of the second principle. Our viewpoint represents thermodynamic systems as binary strings, and it links their temperature to their Hamming weight. From this, we can reproduce the possibility of negative temperatures, the notion of equ… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

    Comments: 6 pages, 5 figures

  22. arXiv:2201.09595  [pdf, other

    cs.HC cs.AI cs.RO eess.AS eess.SP

    Towards a Real-time Measure of the Perception of Anthropomorphism in Human-robot Interaction

    Authors: Maria Tsfasman, Avinash Saravanan, Dekel Viner, Daan Goslinga, Sarah de Wolf, Chirag Raman, Catholijn M. Jonker, Catharine Oertel

    Abstract: How human-like do conversational robots need to look to enable long-term human-robot conversation? One essential aspect of long-term interaction is a human's ability to adapt to the varying degrees of a conversational partner's engagement and emotions. Prosodically, this can be achieved through (dis)entrainment. While speech-synthesis has been a limiting factor for many years, restrictions in this… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Journal ref: MuCAI'21: Proceedings of the 2nd ACM Multimedia Workshop on Multimodal Conversational AI, 2021

  23. arXiv:2108.10565  [pdf, other

    cs.DC cs.MS physics.comp-ph physics.geo-ph

    An Efficient ADER-DG Local Time Stepping Scheme for 3D HPC Simulation of Seismic Waves in Poroelastic Media

    Authors: Sebastian Wolf, Martin Galis, Carsten Uphoff, Alice-Agnes Gabriel, Peter Moczo, David Gregor, Michael Bader

    Abstract: Many applications from geosciences require simulations of seismic waves in porous media. Biot's theory of poroelasticity describes the coupling between solid and fluid phases and introduces a stiff source term, thereby increasing computational cost and motivating efficient methods utilising High-Performance Computing. We present a novel realisation of the discontinuous Galerkin scheme with Arbitra… ▽ More

    Submitted 1 March, 2022; v1 submitted 24 August, 2021; originally announced August 2021.

    Comments: 37 pages, 18 figures, published in the Journal of Computational Physics

    Journal ref: Journal of Computational Physics: Volume 455, 2022

  24. arXiv:2106.11048  [pdf, other

    eess.IV cs.CV

    CataNet: Predicting remaining cataract surgery duration

    Authors: Andrés Marafioti, Michel Hayoz, Mathias Gallardo, Pablo Márquez Neila, Sebastian Wolf, Martin Zinkernagel, Raphael Sznitman

    Abstract: Cataract surgery is a sight saving surgery that is performed over 10 million times each year around the world. With such a large demand, the ability to organize surgical wards and operating rooms efficiently is critical to delivery this therapy in routine clinical care. In this context, estimating the remaining surgical duration (RSD) during procedures is one way to help streamline patient through… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

    Comments: Accepted at MICCAI 2021

  25. arXiv:2009.04998  [pdf, other

    cs.CV

    Proposal-Free Volumetric Instance Segmentation from Latent Single-Instance Masks

    Authors: Alberto Bailoni, Constantin Pape, Steffen Wolf, Anna Kreshuk, Fred A. Hamprecht

    Abstract: This work introduces a new proposal-free instance segmentation method that builds on single-instance segmentation masks predicted across the entire image in a sliding window style. In contrast to related approaches, our method concurrently predicts all masks, one for each pixel, and thus resolves any conflict jointly across the entire image. Specifically, predictions from overlapping masks are com… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.

    Comments: Presented at GCPR 2020

  26. Wearable vibrotactile stimulation for upper extremity rehabilitation in chronic stroke: clinical feasibility trial using the VTS Glove

    Authors: Caitlyn E. Seim, Steven L. Wolf, Thad E. Starner

    Abstract: Objective: Evaluate the feasibility and potential impacts on hand function using a wearable stimulation device (the VTS Glove) which provides mechanical, vibratory input to the affected limb of chronic stroke survivors. Methods: A double-blind, randomized, controlled feasibility study including sixteen chronic stroke survivors (mean age: 54; 1-13 years post-stroke) with diminished movement and t… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    ACM Class: J.3; H.1.2; H.5.2

    Journal ref: Journal Neuroengineering and Rehabilitation 18, 14 (2021)

  27. arXiv:2003.00891  [pdf, other

    cs.CV cs.LG stat.ML

    Instance Separation Emerges from Inpainting

    Authors: Steffen Wolf, Fred A. Hamprecht, Jan Funke

    Abstract: Deep neural networks trained to inpaint partially occluded images show a deep understanding of image composition and have even been shown to remove objects from images convincingly. In this work, we investigate how this implicit knowledge of image composition can be leveraged for fully self-supervised instance separation. We propose a measure for the independence of two image regions given a fully… ▽ More

    Submitted 28 February, 2020; originally announced March 2020.

  28. arXiv:2002.09109  [pdf, other

    cs.MA

    Adversarial Impacts on Autonomous Decentralized Lightweight Swarms

    Authors: Shaya Wolf, Rafer Cooley, Mike Borowczak

    Abstract: The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some drones rely on decentralized protocols that exhibit e… ▽ More

    Submitted 20 February, 2020; originally announced February 2020.

    Comments: 7 pages, 4 figures, 5th International IEEE Smart Cities Conference

    MSC Class: 68T42 ACM Class: I.2.8; I.2.9

  29. arXiv:1912.12717  [pdf, other

    cs.CV

    The Semantic Mutex Watershed for Efficient Bottom-Up Semantic Instance Segmentation

    Authors: Steffen Wolf, Yuyan Li, Constantin Pape, Alberto Bailoni, Anna Kreshuk, Fred A. Hamprecht

    Abstract: Semantic instance segmentation is the task of simultaneously partitioning an image into distinct segments while associating each pixel with a class label. In commonly used pipelines, segmentation and label assignment are solved separately since joint optimization is computationally expensive. We propose a greedy algorithm for joint graph partitioning and labeling derived from the efficient Mutex W… ▽ More

    Submitted 29 December, 2019; originally announced December 2019.

  30. arXiv:1907.06955  [pdf, other

    cs.CV cs.LG

    Fused Detection of Retinal Biomarkers in OCT Volumes

    Authors: Thomas Kurmann, Pablo Márquez-Neila, Siqing Yu, Marion Munk, Sebastian Wolf, Raphael Sznitman

    Abstract: Optical Coherence Tomography (OCT) is the primary imaging modality for detecting pathological biomarkers associated to retinal diseases such as Age-Related Macular Degeneration. In practice, clinical diagnosis and treatment strategies are closely linked to biomarkers visible in OCT volumes and the ability to identify these plays an important role in the development of ophthalmic pharmaceutical pro… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

  31. arXiv:1907.04563  [pdf, other

    cs.CV cs.LG

    Deep Multi Label Classification in Affine Subspaces

    Authors: Thomas Kurmann, Pablo Marquez Neila, Sebastian Wolf, Raphael Sznitman

    Abstract: Multi-label classification (MLC) problems are becoming increasingly popular in the context of medical imaging. This has in part been driven by the fact that acquiring annotations for MLC is far less burdensome than for semantic segmentation and yet provides more expressiveness than multi-class classification. However, to train MLCs, most methods have resorted to similar objective functions as with… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

  32. arXiv:1907.01285  [pdf, other

    cs.LG cs.AI

    Learning the Arrow of Time

    Authors: Nasim Rahaman, Steffen Wolf, Anirudh Goyal, Roman Remme, Yoshua Bengio

    Abstract: We humans seem to have an innate understanding of the asymmetric progression of time, which we use to efficiently and safely perceive and manipulate our environment. Drawing inspiration from that, we address the problem of learning an arrow of time in a Markov (Decision) Process. We illustrate how a learned arrow of time can capture meaningful information about the environment, which in turn can b… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: A shorter version of this work was presented at the Theoretical Phyiscs for Deep Learning Workshop, ICML 2019

  33. arXiv:1906.11713  [pdf, other

    cs.CV cs.LG

    GASP, a generalized framework for agglomerative clustering of signed graphs and its application to Instance Segmentation

    Authors: Alberto Bailoni, Constantin Pape, Nathan Hütsch, Steffen Wolf, Thorsten Beier, Anna Kreshuk, Fred A. Hamprecht

    Abstract: We propose a theoretical framework that generalizes simple and fast algorithms for hierarchical agglomerative clustering to weighted graphs with both attractive and repulsive interactions between the nodes. This framework defines GASP, a Generalized Algorithm for Signed graph Partitioning, and allows us to explore many combinations of different linkage criteria and cannot-link constraints. We prov… ▽ More

    Submitted 3 June, 2022; v1 submitted 27 June, 2019; originally announced June 2019.

    Comments: Published in CVPR 2022

  34. arXiv:1904.12654  [pdf, other

    cs.CV cs.LG stat.ML

    The Mutex Watershed and its Objective: Efficient, Parameter-Free Graph Partitioning

    Authors: Steffen Wolf, Alberto Bailoni, Constantin Pape, Nasim Rahaman, Anna Kreshuk, Ullrich Köthe, Fred A. Hamprecht

    Abstract: Image partitioning, or segmentation without semantics, is the task of decomposing an image into distinct segments, or equivalently to detect closed contours. Most prior work either requires seeds, one per segment; or a threshold; or formulates the task as multicut / correlation clustering, an NP-hard problem. Here, we propose an efficient algorithm for graph partitioning, the "Mutex Watershed''. U… ▽ More

    Submitted 19 April, 2021; v1 submitted 25 April, 2019; originally announced April 2019.

    Journal ref: IEEE Transactions on Pattern Analysis and Machine Intelligence (2020) 1-1

  35. arXiv:1903.03132  [pdf, other

    cs.CR cs.LG

    Dynamic Anonymized Evaluation for Behavioral Continuous Authentication

    Authors: Rasana Manandhar, Shaya Wolf, Mike Borowczak

    Abstract: Emerging technology demands reliable authentication mechanisms, particularly in interconnected systems. Current systems rely on a single moment of authentication, however continuous authentication systems assess a users identity utilizing a constant biometric analysis. Spy Hunter, a continuous authentication mechanism uses keystroke dynamics to validate users over blocks of data. This easily-incor… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    Comments: 6 pages, 1 figure, 3 tables

    MSC Class: 68T05 ACM Class: I.2.1; K.6.5; D.4.6

  36. Proving Erasure

    Authors: Xavier Coiteux-Roy, Stefan Wolf

    Abstract: It seems impossible to certify that a remote hosting service does not leak its users' data --- or does quantum mechanics make it possible? We investigate if a server hosting data can information-theoretically prove its definite deletion using a "BB84-like" protocol. To do so, we first rigorously introduce an alternative to privacy by encryption: privacy delegation. We then apply this novel concept… ▽ More

    Submitted 3 May, 2019; v1 submitted 18 February, 2019; originally announced February 2019.

    Comments: 5 pages, 3 figures

  37. TF-Ranking: Scalable TensorFlow Library for Learning-to-Rank

    Authors: Rama Kumar Pasumarthi, Sebastian Bruch, Xuanhui Wang, Cheng Li, Michael Bendersky, Marc Najork, Jan Pfeifer, Nadav Golbandi, Rohan Anil, Stephan Wolf

    Abstract: Learning-to-Rank deals with maximizing the utility of a list of examples presented to the user, with items of higher relevance being prioritized. It has several practical applications such as large-scale search, recommender systems, document summarization and question answering. While there is widespread support for classification and regression based learning, support for learning-to-rank in deep… ▽ More

    Submitted 17 May, 2019; v1 submitted 30 November, 2018; originally announced December 2018.

    Comments: KDD 2019

  38. Simultaneous Recognition and Pose Estimation of Instruments in Minimally Invasive Surgery

    Authors: Thomas Kurmann, Pablo Marquez Neila, Xiaofei Du, Pascal Fua, Danail Stoyanov, Sebastian Wolf, Raphael Sznitman

    Abstract: Detection of surgical instruments plays a key role in ensuring patient safety in minimally invasive surgery. In this paper, we present a novel method for 2D vision-based recognition and pose estimation of surgical instruments that generalizes to different surgical applications. At its core, we propose a novel scene model in order to simultaneously recognize multiple instruments as well as their pa… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

    Comments: 8 pages, 2 figures, MICCAI 2017

  39. arXiv:1707.04931  [pdf, other

    cs.CV

    Pathological OCT Retinal Layer Segmentation using Branch Residual U-shape Networks

    Authors: Stefanos Apostolopoulos, Sandro De Zanet, Carlos Ciller, Sebastian Wolf, Raphael Sznitman

    Abstract: The automatic segmentation of retinal layer structures enables clinically-relevant quantification and monitoring of eye disorders over time in OCT imaging. Eyes with late-stage diseases are particularly challenging to segment, as their shape is highly warped due to pathological biomarkers. In this context, we propose a novel fully Convolutional Neural Network (CNN) architecture which combines dila… ▽ More

    Submitted 16 July, 2017; originally announced July 2017.

    Comments: 9 pages, 5 figures, MICCAI 2017

  40. arXiv:1704.02249  [pdf, other

    cs.CV

    Learned Watershed: End-to-End Learning of Seeded Segmentation

    Authors: Steffen Wolf, Lukas Schott, Ullrich Köthe, Fred Hamprecht

    Abstract: Learned boundary maps are known to outperform hand- crafted ones as a basis for the watershed algorithm. We show, for the first time, how to train watershed computation jointly with boundary map prediction. The estimator for the merging priorities is cast as a neural network that is con- volutional (over space) and recurrent (over iterations). The latter allows learning of complex shape priors. Th… ▽ More

    Submitted 4 September, 2017; v1 submitted 7 April, 2017; originally announced April 2017.

    Comments: The first two authors contributed equally

  41. Computational tameness of classical non-causal models

    Authors: Ämin Baumeler, Stefan Wolf

    Abstract: We show that the computational power of the non-causal circuit model, i.e., the circuit model where the assumption of a global causal order is replaced by the assumption of logical consistency, is completely characterized by the complexity class~$\operatorname{\mathsf{UP}}\cap\operatorname{\mathsf{coUP}}$. An example of a problem in that class is factorization. Our result implies that classical de… ▽ More

    Submitted 12 January, 2018; v1 submitted 17 November, 2016; originally announced November 2016.

    Comments: 7 pages, 3 figures, 1 algorithm, revised

    Journal ref: Proceedings of the Royal Society A 474, 20170698, 2018

  42. arXiv:1610.03628  [pdf, other

    cs.CV cs.LG cs.NE

    RetiNet: Automatic AMD identification in OCT volumetric data

    Authors: Stefanos Apostolopoulos, Carlos Ciller, Sandro I. De Zanet, Sebastian Wolf, Raphael Sznitman

    Abstract: Optical Coherence Tomography (OCT) provides a unique ability to image the eye retina in 3D at micrometer resolution and gives ophthalmologist the ability to visualize retinal diseases such as Age-Related Macular Degeneration (AMD). While visual inspection of OCT volumes remains the main method for AMD identification, doing so is time consuming as each cross-section within the volume must be inspec… ▽ More

    Submitted 12 October, 2016; originally announced October 2016.

    Comments: 14 pages, 10 figures, Code available

  43. arXiv:1609.06269  [pdf, ps, other

    quant-ph cs.IT

    Can non-local correlations be discriminated in polynomial time?

    Authors: Alberto Montina, Stefan Wolf

    Abstract: In view of the importance of quantum non-locality in cryptography, quantum computation and communication complexity, it is crucial to decide whether a given correlation exhibits non-locality or not. In the light of a theorem by Pitowski, it is generally believed that this problem is computationally intractable. In this paper, we first prove that the Euclidean distance of given correlations from th… ▽ More

    Submitted 20 September, 2016; originally announced September 2016.

    Comments: An extended version will be updated soon

  44. Causality - Complexity - Consistency: Can Space-Time Be Based on Logic and Computation?

    Authors: Ämin Baumeler, Stefan Wolf

    Abstract: The difficulty of explaining non-local correlations in a fixed causal structure sheds new light on the old debate on whether space and time are to be seen as fundamental. Refraining from assuming space-time as given a priori has a number of consequences. First, the usual definitions of randomness depend on a causal structure and turn meaningless. So motivated, we propose an intrinsic, physically m… ▽ More

    Submitted 12 January, 2018; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: 17 pages, 16 figures, small corrections

    Journal ref: In Renner R., Stupar S. (eds) Time in Physics (Birkhäuser, Cham, 2017)

  45. Optimal measurements for nonlocal correlations

    Authors: Sacha Schwarz, Andre Stefanov, Stefan Wolf, Alberto Montina

    Abstract: A problem in quantum information theory is to find the experimental setup that maximizes the nonlocality of correlations with respect to some suitable measure such as the violation of Bell inequalities. The latter has however some drawbacks. First and foremost it is unfeasible to determine the whole set of Bell inequalities already for a few measurements and thus unfeasible to find the experimenta… ▽ More

    Submitted 29 August, 2016; v1 submitted 17 February, 2016; originally announced February 2016.

    Comments: Some typos and errors have been corrected, especially in the section concerning the relation between Bell violation and communication complexity

    Journal ref: Phys. Rev. A 94, 022322 (2016)

  46. arXiv:1601.06522  [pdf, ps, other

    quant-ph cs.CC cs.LO

    Non-causal computation

    Authors: Ämin Baumeler, Stefan Wolf

    Abstract: Computation models such as circuits describe sequences of computation steps that are carried out one after the other. In other words, algorithm design is traditionally subject to the restriction imposed by a fixed causal order. We address a novel computing paradigm beyond quantum computing, replacing this assumption by mere logical consistency: We study non-causal circuits, where a fixed time stru… ▽ More

    Submitted 5 April, 2017; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: 6 pages, 4 figures

    Journal ref: Entropy 19(7), 326, 2017

  47. arXiv:1512.03257  [pdf, ps, other

    quant-ph cs.IT math.OC

    Simple algorithm for computing the communication complexity of quantum communication processes

    Authors: A. Hansen, A. Montina, S. Wolf

    Abstract: A two-party quantum communication process with classical inputs and outcomes can be simulated by replacing the quantum channel with a classical one. The minimal amount of classical communication required to reproduce the statistics of the quantum process is called its communication complexity. In the case of many instances simulated in parallel, the minimal communication cost per instance is calle… ▽ More

    Submitted 29 February, 2016; v1 submitted 10 December, 2015; originally announced December 2015.

    Comments: Corrected few typos

    Journal ref: Phys. Rev. A 93, 042315 (2016)

  48. arXiv:1512.02413  [pdf, other

    cs.CV

    Tracking Objects with Higher Order Interactions using Delayed Column Generation

    Authors: Shaofei Wang, Steffen Wolf, Charless Fowlkes, Julian Yarkony

    Abstract: We study the problem of multi-target tracking and data association in video. We formulate this in terms of selecting a subset of high-quality tracks subject to the constraint that no pair of selected tracks is associated with a common detection (of an object). This objective is equivalent to the classic NP-hard problem of finding a maximum-weight set packing (MWSP) where tracks correspond to sets… ▽ More

    Submitted 9 August, 2016; v1 submitted 8 December, 2015; originally announced December 2015.

  49. Necessary and sufficient optimality conditions for classical simulations of quantum communication processes

    Authors: Alberto Montina, Stefan Wolf

    Abstract: We consider the process consisting of preparation, transmission through a quantum channel, and subsequent measurement of quantum states. The communication complexity of the channel is the minimal amount of classical communication required for classically simulating it. Recently, we reduced the computation of this quantity to a convex minimization problem with linear constraints. Every solution of… ▽ More

    Submitted 2 March, 2014; v1 submitted 25 February, 2014; originally announced February 2014.

    Comments: Corrected some typos and replaced the (dim) proof of Theorem 1 with a much more elegant one. This paper is the extended journal version of the conference version arXiv:1401.4126. The journal version contains considerable new material. See comment to the first version for a list of the new material

    Journal ref: Phys. Rev. A 90, 012309 (2014)

  50. arXiv:1401.4126  [pdf, ps, other

    quant-ph cs.IT

    Lower bounds on the communication complexity of two-party (quantum) processes

    Authors: Alberto Montina, Stefan Wolf

    Abstract: The process of state preparation, its transmission and subsequent measurement can be classically simulated through the communication of some amount of classical information. Recently, we proved that the minimal communication cost is the minimum of a convex functional over a space of suitable probability distributions. It is now proved that this optimization problem is the dual of a geometric progr… ▽ More

    Submitted 16 January, 2014; originally announced January 2014.

    Comments: Conference version. A more extensive version with more details will be available soon