1. |
Automated Comparison between Cryptographic Protocol Descriptions and their Implementation
Kirstein, Niels
|
08.10.2025 |
2. |
Identifying Advertisements in Podcasts
Wolf, Felix V. J.
|
24.09.2025 |
3. |
Meinungsdynamiken in Pfadgraphen unter Anwendung von Group-Gossiping-Algorithmen mit sturen Agenten
Huesmann, Philipp
|
11.09.2025 |
4. |
Enhancing Knowledge Extraction from Violent Ancient Historical Texts through Fine-Tuned Large Language Models and Historical Databases
Abdelhalim, Alhassan Ahmed Said
|
04.09.2025 |
5. |
Generating Synthetic Drone Footage in Non-Optimal Visual Conditions in Unity
Reupert, Konstanze
|
04.09.2025 |
6. |
Reverse-engineering REST APIs: Enriching OpenAPI Specifications through Fuzzing
Hartkopf, Jan
|
13.08.2025 |
7. |
Integrating and Evaluating LLM‐Generated Code Documentation in the IDE
Kruse, Hans-Alexander
|
11.08.2025 |
8. |
Length Generalization on Multi-Digit Integer Addition with Transformers
Ibrahimli, Imran
|
12.06.2025 |
9. |
Inwieweit gehen Realität und Empfehlung auseinander? Analyse von Pflichtmodulen im Vergleich zu den GI-Empfehlungen für Informatik-Bachelorstudiengänge
Kobras, Louis
|
19.05.2025 |
10. |
Learnability of probabilistic context-free languages using small transformer models
Rath, David
|
28.04.2025 |