Florian Westphal

Orcid: 0000-0002-2161-7371

According to our database1, Florian Westphal authored at least 13 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring demonstration pre-training with improved Deep Q-learning.
Proceedings of the 14th Scandinavian Conference on Artificial Intelligence SCAI 2024, 2024

A Semantic Representation of Pedestrian Crossing Behavior.
Proceedings of the Joint Proceedings of the ESWC 2024 Workshops and Tutorials co-located with 21th European Semantic Web Conference (ESWC 2024), 2024

2023
Explaining rifle shooting factors through multi-sensor body tracking.
Intell. Data Anal., 2023

2020
Data and Time Efficient Historical Document Analysis.
PhD thesis, 2020

Representative Image Selection for Data Efficient Word Spotting.
Proceedings of the Document Analysis Systems - 14th IAPR International Workshop, 2020

2019
Learning Character Recognition with Graph-Based Privileged Information.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

Cluster-Based Sample Selection for Document Image Binarization.
Proceedings of the Second International Workshop on Machine Learning, 2019

A Case for Guided Machine Learning.
Proceedings of the Machine Learning and Knowledge Extraction, 2019

2018
Efficient document image binarization using heterogeneous computing and parameter tuning.
Int. J. Document Anal. Recognit., 2018

User Feedback and Uncertainty in User Guided Binarization.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Document Image Binarization Using Recurrent Neural Networks.
Proceedings of the 13th IAPR International Workshop on Document Analysis Systems, 2018

2014
VMI-PL: A monitoring language for virtual platforms using virtual machine introspection.
Digit. Investig., 2014

2013
CGA integration into IPsec/IKEv2 authentication.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013


  Loading...