E-Dissertationen: Search
Now showing items 271-280 of 358
Calculating Sparse and Dense Correspondences for Near-Isometric Shapes
(2018-05-29)
Comparing and analysing digital models are basic techniques of geometric shape processing. These techniques have a variety of applications, such as extracting the domain knowledge contained in the growing number of digital ...
Fine-Scaled 3D Geometry Recovery from Single RGB Images
(2018-01-04)
3D geometry recovery from single RGB images is a highly ill-posed and inherently ambiguous problem, which has been a challenging research topic in computer vision for several decades. When fine-scaled 3D geometry is required, ...
Beyond Worst-Case Analysis of Max-Cut and Local Search
(2018-08-15)
Since the formal definition of NP-completeness, there has been a huge discrepancy between theory and practice. The theoretical point of view for an NP-complete problem is that we do not know of any efficient, that is, ...
Building multiscale computable model of Alzheimer's disease and identification of novel mechanisms for new therapeutic interventions
(2018-08-28)
Despite an avalanche of data in the field of biomedicine, we are obviously not managing well to extract meaningful information from this vast amount of data to better understand complex diseases and their mechanisms. ...
Detection of Unknown Cyber Attacks Using Convolution Kernels Over Attributed Language Models
(2018-07-05)
Over the past decade the Internet has emerged as a key communication platform for businesses and private users demonstrated by an exponential increase of hosts connected to the Internet as well as Internet users. In light ...
Foresighted People Finding and Following
(2018-07-05)
Mobile service robots are needed in several applications (e.g., transportation systems, autonomous shopping carts, household activities ... etc). In such scenarios the robot aids the user with tasks that require the robot ...
Semantic Question Answering Over Knowledge Graphs: Pitfalls and Pearls
(2021-06-07)
Nowadays, the Web provides an infrastructure to share all kinds of information which are easily accessible to humans around the world. Furthermore, the amount of information is growing rapidly and requires computing machines ...
A Human-Centric Approach For Binary Code Decompilation
(2018-03-06)
Many security techniques have been developed both in academia and industry to analyze source code, including methods to discover bugs, apply taint tracking, or find vulnerabilities. These source-based techniques leverage ...
Predicting Rules for Cancer Subtype Classification using Grammar-Based Genetic Programming on various Genomic Data Types
(2018-03-12)
With the advent of high-throughput methods more genomic data then ever has been generated during the past decade. As these technologies remain cost intensive and not worthwhile for every research group, databases, such as ...
Constructive Approximation and Learning by Greedy Algorithms
(2018-09-06)
This thesis develops several kernel-based greedy algorithms for different machine learning problems and analyzes their theoretical and empirical properties. Greedy approaches have been extensively used in the past for ...