Showing 20 of 232 papers

Fast Image Scanning with Deep Max-Pooling Convolutional Neural Networks

Alessandro Giusti, Dan C. Cireşan, Jonathan Masci, Luca M. Gambardella, Jürgen Schmidhuber
2013
1 reference

Deep Neural Networks now excel at image classification, detection and segmentation. When used to scan images by means of a sliding window, however, their high computational complexity can bring even the most powerful hardware to its knees. We show ho...

On the importance of initialization and momentum in deep learning.

Ilya Sutskever, James Martens, George E. Dahl, Geoffrey E. Hinton
2013
1 reference

Scalable Object Detection using Deep Neural Networks

Dumitru Erhan, Christian Szegedy, Alexander Toshev, Dragomir Anguelov
2013
1 reference

Deep convolutional neural networks have recently achieved state-of-the-art performance on a number of image recognition benchmarks, including the ImageNet Large-Scale Visual Recognition Challenge (ILSVRC-2012). The winning model on the localization s...

Left Recursion in Parsing Expression Grammars

Sérgio Medeiros, Fabio Mascarenhas, Roberto Ierusalimschy
2012
1 reference

Parsing Expression Grammars (PEGs) are a formalism that can describe all deterministic context-free languages through a set of rules that specify a top-down parser for some language. PEGs are easy to use, and there are efficient implementations of PE...

On the difficulty of training recurrent neural networks

Razvan Pascanu, Tomas Mikolov, Yoshua Bengio
2012
1 reference

There are two widely known issues with properly training recurrent neural networks, the vanishing and the exploding gradient problems detailed in Bengio et al. (1994). In this paper we attempt to improve the understanding of the underlying issues by ...

A contextual-bandit approach to personalized news article recommendation

Lihong Li, Wei Chu, J. Langford, R. Schapire
2010
1 reference

Personalized web services strive to adapt their services (advertisements, news articles, etc.) to individual users by making use of both content and user information. Despite a few recent advances, this problem remains challenging for at least two re...

Serializable isolation for snapshot databases

2009
1 reference

Many popular database management systems implement a multiversion concurrency control algorithm called snapshot isolation rather than providing full serializability based on locking. There are well-known anomalies permitted by snapshot isolation that...

Novel Table Lookup-Based Algorithms for High-Performance CRC Generation

M. Kounavis, Frank L. Berry
2008
1 reference

A framework for designing a family of novel fast cyclic redundancy code (CRC) generation algorithms is presented. Our algorithms can ideally read arbitrarily large amounts of data at a time, while optimizing their memory requirement to meet the const...

Packrat parsers can support left recursion.

Alessandro Warth, James R. Douglass, Todd D. Millstein
2008
1 reference

Packrat parsing offers several advantages over other parsing techniques, such as the guarantee of linear parse times while supporting backtracking and unlimited look-ahead. Unfortunately, the limited support for left recursion in packrat parser imple...

Less hashing, same performance: Building a better Bloom filter

Adam Kirsch, M. Mitzenmacher
2006
1 reference

Abstract A standard technique from the hashing literature is to use two hash functions h 1 ( x ) and h 2 ( x ) to simulate additional hash functions of the form g i ( x ) = h 1 ( x ) + i h 2 ( x ). We demonstrate that this technique can be usefully a...

Accurate Sum and Dot Product

T. Ogita, S. Rump, S. Oishi
2005
1 reference

Algorithms for summation and dot product of floating-point numbers are presented which are fast in terms of measured computing time. We show that the computed results are as accurate as if computed in twice or K-fold working precision, $K\ge 3$. For ...

Optimization of Collective Communication Operations in MPICH.

Rajeev Thakur, Rolf Rabenseifner, William Gropp
2005
1 reference

We describe our work on improving the performance of collective communication operations in MPICH for clusters connected by switched networks. For each collective operation, we use multiple algorithms depending on the message size, with the goal of m...

Accuracy and stability of numerical algorithms, Second Edition.

Nicholas J. Higham
2002
1 reference

From the Publisher: What is the most accurate way to sum floating point numbers? What are the advantages of IEEE arithmetic? How accurate is Gaussian elimination and what were the key breakthroughs in the development of error analysis for the method?...

Accurate garbage collection in an uncooperative environment.

Fergus Henderson
2002
1 reference

Previous attempts at garbage collection in uncooperative environments have generally used conservative or mostly-conservative approaches. We describe a technique for doing fully type-accurate garbage collection in an uncooperative environment, using ...

Learning Precise Timing with LSTM Recurrent Networks.

Felix A. Gers, Nicol N. Schraudolph, Jürgen Schmidhuber
2002
1 reference

In response to Rodriguez's recent article (2001), we compare the performance of simple recurrent nets and long short-term memory recurrent nets on context-free and context-sensitive languages.

Long Short-Term Memory.

Sepp Hochreiter, Jürgen Schmidhuber
1997
1 reference

Learning to store information over extended time intervals by recurrent backpropagation takes a very long time, mostly because of insufficient, decaying error backflow. We briefly review Hochreiter's (1991) analysis of this problem, then address it b...

A monotonic superclass linearization for Dylan

Kim Barrett, B. Cassels, Paul Haahr, D. A. Moon, Keith Playford, P. T. Withington
1996
1 reference

Object-oriented languages with multiple inheritance and automatic conflict resolution typically use a linearization of superclasses to determine which version of a property to inherit when several superclasses provide definitions. Recent work has def...