{"id":313,"date":"2025-02-15T15:25:34","date_gmt":"2025-02-15T15:25:34","guid":{"rendered":"https:\/\/mmaresch.com\/?page_id=313"},"modified":"2025-02-15T16:38:10","modified_gmt":"2025-02-15T16:38:10","slug":"papers","status":"publish","type":"page","link":"https:\/\/mmaresch.com\/index.php\/papers\/","title":{"rendered":"Papers"},"content":{"rendered":"\n<div class=\"wp-block-themeisle-blocks-advanced-columns has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-default-gap has-vertical-unset\" id=\"wp-block-themeisle-blocks-advanced-columns-cb321e7c\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-f633996f\">\n<ul><li>VATE: Edge-Cloud System for Object Detection in Real-Time Video Streams<ul><li>Bachelor thesis and&nbsp;<a href=\"https:\/\/dsg.tuwien.ac.at\/team\/snastic\/publications\/ICFEC__Maresch_VATE_Object_Detection.pdf\">paper<\/a><\/li><li>Improved the state of the art given by a Microsoft Research System by up to 27.5%<\/li><li>Publication: IEEE International Conference on Fog and Edge Computing (<a href=\"https:\/\/icfec2024.ontariotechu.ca\/\">ICFEC 2024<\/a>)<\/li><\/ul><\/li><li>Compilers and Infrastructure for Tensor Operations and Deep Learning Models<ul><li>Compilerdesign seminar<\/li><li>Covers compiler infrastructure, such as MLIR and LLVM, deep learning compilers, such as XLA for TensorFlow and Apache TVM, and more<\/li><\/ul><\/li><li>Reinforcement Learning and Neural Networks for Autonomous Vehicles Task Offloading<ul><li>Seminar in Distributed Systems<\/li><li>Covers multi-agent deep reinforcement learning, diffusion models, seq2seq models and more<\/li><\/ul><\/li><li>Analysis of Energy Trading for Microgrids based on Reinforcement Learning and Game Theory<ul><li>Scientific Research and Writing course<\/li><li>Covers Q-learning, deep Q-networks, Nash bargaining games and more<\/li><\/ul><\/li><li>Key generation from measurements of a radio communication<ul><li>Diploma thesis<\/li><li>Implementation of a&nbsp;post-quantum Diffie-Hellman&nbsp;key exchange&nbsp;alternative<\/li><li>Won prize&nbsp;at the \u201cSecurity Competition\u201d 2019 by the Austrian Security Hub<\/li><\/ul><\/li><\/ul>\n\n\n\n<p>Feel free to contact me if you\u2019re interested in any of the papers.<\/p>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":179,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/pages\/313"}],"collection":[{"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":4,"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/pages\/313\/revisions"}],"predecessor-version":[{"id":325,"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/pages\/313\/revisions\/325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/media\/179"}],"wp:attachment":[{"href":"https:\/\/mmaresch.com\/index.php\/wp-json\/wp\/v2\/media?parent=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}