Search Results - "Plewnia, Joana"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Understanding Counterexamples for Relational Properties with DIbugger by Herda, Mihai, Kirsten, Michael, Brunner, Etienne, Plewnia, Joana, Scheler, Ulla, Staudenmaier, Chiara, Wagner, Benedikt, Zwick, Pascal, Beckert, Bernhard

    “…Software verification is a tedious process that involves the analysis of multiple failed verification attempts, and adjustments of the program or…”
    Get full text
    Journal Article
  2. 2

    Forgetting in Robotic Episodic Long-Term Memory by Plewnia, Joana, Peller-Konrad, Fabian, Asfour, Tamim

    “…Artificial cognitive architectures traditionally rely on complex memory models to encode, store, and retrieve information. However, the conventional practice…”
    Get full text
    Conference Proceeding
  3. 3

    Episodic Memory Verbalization using Hierarchical Representations of Life-Long Robot Experience by Bärmann, Leonard, DeChant, Chad, Plewnia, Joana, Peller-Konrad, Fabian, Bauer, Daniel, Asfour, Tamim, Waibel, Alex

    Published 26-09-2024
    “…Verbalization of robot experience, i.e., summarization of and question answering about a robot's past, is a crucial ability for improving human-robot…”
    Get full text
    Journal Article
  4. 4

    Data-driven Development of Digital Health Applications on the Example of Dementia Screening by Schinle, Markus, Erler, Christina, Schneider, Timon, Plewnia, Joana, Stork, Wilhelm

    “…Following the paradigm of precision medicine, the combination of health data and Machine Learning (ML) is promising to improve the quality of healthcare…”
    Get full text
    Conference Proceeding
  5. 5

    Understanding Counterexamples for Relational Properties with DIbugger by Herda, Mihai, Kirsten, Michael, Brunner, Etienne, Plewnia, Joana, Scheler, Ulla, Staudenmaier, Chiara, Wagner, Benedikt, Zwick, Pascal, Beckert, Bernhard

    Published 09-07-2019
    “…EPTCS 296, 2019, pp. 6-13 Software verification is a tedious process that involves the analysis of multiple failed verification attempts, and adjustments of…”
    Get full text
    Journal Article