Research Departments Computer Vision and Machine Learning Publications Current Year Publications - Current Year 2025 1 Paper D2 M. Asim, C. Wewer, T. Wimmer, B. Schiele, and J. E. Lenssen “MEt3R: Measuring [...] ion constraints in the PFD branch and spatial merging at both latent and residual levels, PersonaHOI preserves personalized facial details while ensuring interactive non-facial regions. Experiments, validated [...] set of previous methods for novel view and video generation, including our open, multi-view latent diffusion model. 2 Paper D2 X. Hu, H. Wang, J. E. Lenssen, and B. Schiele “PersonaHOI: Effortlessly Improving
D1 Algorithms & Complexity D2 Computer Vision and Machine Learning D3 Internet Architecture D4 Computer Graphics D5 Databases and Information Systems D6 Visual Computingand Artificial Intelligence BIO Research [...] 1985-2001 Information andComputation 1988-2001 SIAM Journal of Computing 1988-2001 Journal of Discrete andComputational Geometry 1990-2001 International Journal of Computational Geometry & Applications [...] Distributed Computing Fine-Grained Complexity and Algorithm Design Graph Algorithms Learning-Augmented Algorithms Optimization Parameterized and Counting Algorithms and Complexity String Algorithms and Data
für Softwaresysteme, das Zentrum für Bioinformatik und das Forschungs-Cluster für „MultimodalComputingandInteraction“ sowie die Universität des Saarlandes mit drei vernetzten Fachbereichen (Informatik [...] am Georgia Institute of Technology, USA, mit einer Arbeit, die mit dem Principles of Distributed Computing Doctoral Dissertation Award ausgezeichnet wurde. Bevor er zur Max-Planck-Gesellschaft kam, war er [...] Auszeichnungen wie den Distinguished Dissertation Award der European Association for Theoretical Computer Science (EATCS), den Best Paper und Best Student Paper Award der SOSA und ICALP sowie das Google
D1 Algorithms & Complexity D2 Computer Vision and Machine Learning D3 Internet Architecture D4 Computer Graphics D5 Databases and Information Systems D6 Visual Computingand Artificial Intelligence BIO Research [...] Research Group Computational Biology RG1 Automation of Logic RG2 Network and Cloud Systems RG3 Multimodal Language Processing Databases and Information Systems People Former Members and Guests Research [...] 2015-05-05-lin_alg_and_svd.pdf 2015-05-12-pre-processing.pdf 2015-05-19-interpreting_and_computing_svd.pdf 2015-05-26-intro-to-nmf.pdf 2015-06-02-nmf_variations_and_applications.pdf 2015-06-09-cx_and_cur_decompositions
D1 Algorithms & Complexity D2 Computer Vision and Machine Learning D3 Internet Architecture D4 Computer Graphics D5 Databases and Information Systems D6 Visual Computingand Artificial Intelligence BIO Research [...] Research Group Computational Biology RG1 Automation of Logic RG2 Network and Cloud Systems RG3 Multimodal Language Processing Databases and Information Systems People Former Members and Guests Research [...] TPDBlearn TriAD YAGO Demo Systems Deutsch Departments Databases and Information Systems Teaching Data Mining and Matrices Data Mining and Matrices Advanced lecture, 6 ECTS credits, summer semester 2017
official announcement will be given during the lecture and repeated in the tutorials. Literature (non-compulsory) James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach . Addison-Wesley [...] 2002. (deutsch) Larry L. Peterson and Bruce S. Davie. Computer Networks: A Systems Approach. Morgan Kaufmann, fourth edition, 2007. (english) Andrew S. Tanenbaum. Computer Networks . Prentice Hall Professional [...] down to the network layer (IP). Lastly, we will examine the interactions between the protocols. We further explain the principles of computer networks based on the fundamentals of the area, including network
down to the network layer (IP). Lastly, we will examine the interactions between the protocols. We further explain the principles of computer networks based on the fundamentals of the area, including network [...] the internet including the basics of internet communication. We will start at the application layer and investigate services like web (HTTP), mail (SMTP, POP, IMAP), domain name systems (DNS), or routing [...] algorithms, advanced network architectures, network simulations, measurements, protocol specifications, and verification techniques. This course is worth 9 LP/ECTS points. In compliance with the current COVID-19
s, protocol specifications, and verification techniques – in the context of other specializations in computer science, from databases, to distributed systems, andcomputer security. Overview Lecturer Anja [...] UDP). By taking a comprehensive look at the interactions between these protocols, you attain the ability to reason on the principles of computer networks, and apply the fundamentals of the area – including [...] official announcement will be given during the lecture and repeated in the tutorials. Literature (non-compulsory) James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach . Addison-Wesley
s, protocol specifications, and verification techniques – in the context of other specializations in computer science, from databases, to distributed systems, andcomputer security. Overview Lecturer Anja [...] UDP). By taking a comprehensive look at the interactions between these protocols, you attain the ability to reason on the principles of computer networks, and apply the fundamentals of the area – including [...] 2002. (deutsch) Larry L. Peterson and Bruce S. Davie. Computer Networks: A Systems Approach. Morgan Kaufmann, fourth edition, 2007. (english) Andrew S. Tanenbaum. Computer Networks . Prentice Hall Professional
s, protocol specifications, and verification techniques – in the context of other specializations in computer science, from databases, to distributed systems, andcomputer security. Overview Lecturer Anja [...] UDP). By taking a comprehensive look at the interactions between these protocols, you attain the ability to reason on the principles of computer networks, and apply the fundamentals of the area – including [...] official announcement will be given during the lecture and repeated in the tutorials. Literature (non-compulsory) James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach . Addison-Wesley