no code implementations • 24 Mar 2023 • Simon Lutz, Florian Wittbold, Simon Dierl, Benedikt Böing, Falk Howar, Barbara König, Emmanuel Müller, Daniel Neider
Anomaly detection is essential in many application domains, such as cyber security, law enforcement, medicine, and fraud protection.
no code implementations • 27 May 2022 • Rebecca Bernemann, Barbara König, Matthias Schaffeld, Torben Weis
We consider probabilistic systems with hidden state and unobservable transitions, an extension of Hidden Markov Models (HMMs) that in particular admits unobservable {\epsilon}-transitions (also called null transitions), allowing state changes of which the observer is unaware.
no code implementations • 20 Jan 2021 • Paolo Baldan, Richard Eggert, Barbara König, Tomasso Padoan
Knaster-Tarski's theorem, characterising the greatest fixpoint of a monotone function over a complete lattice as the largest post-fixpoint, naturally leads to the so-called coinduction proof principle for showing that some element is below the greatest fixpoint (e. g., for providing bisimilarity witnesses).
Logic in Computer Science
no code implementations • 30 Sep 2020 • Rebecca Bernemann, Benjamin Cabrera, Reiko Heckel, Barbara König
In particular, Bayesian networks are used as symbolic representations of probability distributions, modelling the observer's knowledge about the tokens in the net.
1 code implementation • 26 Oct 2018 • Paolo Baldan, Barbara König, Tommaso Padoan, Christina Mika-Michalski
A simple parity game, referred to as fixpoint game, is defined that provides a correct and complete characterisation of the solution of equation systems over continuous lattices, a quite general class of lattices widely used in semantics.
Logic in Computer Science D.2.4; F.3.1; F.3.2