Showing 20 of 613 papers

Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks

Shaoqing Ren, Kaiming He, Ross Girshick, Jian Sun
2015
1 reference

State-of-the-art object detection networks depend on region proposal algorithms to hypothesize object locations. Advances like SPPnet and Fast R-CNN have reduced the running time of these detection networks, exposing region proposal computation as a ...

Fast Multiplication of Large Integers: Implementation and Analysis of the DKSS Algorithm

Christoph Lüders
2015
1 reference

The Sch\"onhage-Strassen algorithm (SSA) is the de-facto standard for multiplication of large integers. For $N$-bit numbers it has a time bound of $O(N \cdot \log N \cdot \log \log N)$. De, Kurur, Saha and Saptharishi (DKSS) presented an asymptotical...

Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies

Jerry Weltman
2015
1 reference

Humanities majors often find themselves in jobs where they either manage programmers or work with them in close collaboration. These interactions often pose difficulties because specialists in literature, history, philosophy, and so on are not usuall...

Implementing a Generic Radix Trie in Rust

Michael Cochez, Ferrante Neri
2015
1 reference

Incorporating Nesterov Momentum into

Timothy Dozat
2015
1 reference

Cognition and behavior exhibit biases consistent with future expectations, and some of these biases result in momentum-like effects and have been linked with the idea of momentum. These momentum-like effects include representational momentum, operati...

Precision-Recall-Gain Curves: PR Analysis Done Right.

Lucas Lemasters, John Flach
2015
1 reference

Woodworth’s Two-Component model (1899) partitioned speeded limb movements into two distinct phases: (1) a central ballistic open-loop mechanism and (2) a closed-loop feedback component. The present study investigated the implementation of multi-gain ...

Reenix: Implementing a Unix-Like Operating System in Rust

2015
1 reference

This paper describes the experience, problems and successes found in implementing a unix-like operating system kernel in rust. Using the basic design and much of the lowest-level support code from the Weenix operating system written for CS167/9 I was...

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

National Institute of Standards and Technology (US)
2015
1 reference

TinyLFU: A Highly Efficient Cache Admission Policy

Gil Einziger, Roy Friedman, Ben Manes
2015
1 reference

This paper proposes to use a frequency based cache admission policy in order to boost the effectiveness of caches subject to skewed access distributions. Given a newly accessed item and an eviction candidate from the cache, our scheme decides, based ...

Trust Region Policy Optimization

John Schulman, Sergey Levine, Philipp Moritz, Michael I. Jordan, Pieter Abbeel
2015
1 reference

We describe an iterative procedure for optimizing policies, with guaranteed monotonic improvement. By making several approximations to the theoretically-justified procedure, we develop a practical algorithm, called Trust Region Policy Optimization (T...

Convergence Theory for Preconditioned Eigenvalue Solvers in a Nutshell

M. Argentati, A. Knyazev, K. Neymeyr, E. Ovtchinnikov, M. Zhou
2014
1 reference

Preconditioned iterative methods for numerical solution of large matrix eigenvalue problems are increasingly gaining importance in various application areas, ranging from material sciences to data mining. Some of them, e.g., those using multilevel pr...

Image Super-Resolution Using Deep Convolutional Networks

Chao Dong, Chen Change Loy, Kaiming He, Xiaoou Tang
2014
1 reference

We propose a deep learning method for single image super-resolution (SR). Our method directly learns an end-to-end mapping between the low/high-resolution images. The mapping is represented as a deep convolutional neural network (CNN) that takes the ...

Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation.

Kyunghyun Cho, Bart van Merriënboer, Çaǧlar Gülçehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwe...
2014
1 reference

Kyunghyun Cho, Bart van Merriënboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, Yoshua Bengio. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). 2014.

Merge Path - A Visually Intuitive Approach to Parallel Merging

Oded Green, Saher Odeh, Yitzhak Birk
2014
1 reference

Merging two sorted arrays is a prominent building block for sorting and other functions. Its efficient parallelization requires balancing the load among compute cores, minimizing the extra work brought about by parallelization, and minimizing inter-t...

Probabilistic Forecasting

2014
1 reference

A probabilistic forecast takes the form of a predictive probability distribution over future quantities or events of interest. Probabilistic forecasting aims to maximize the sharpness of the predictive distributions, subject to calibration, on the ba...

Recommendation for Key Management - Part 1 General

Elaine B. Barker
2014
1 reference

3541 et seq., Public Law (P.L.) 113-283.NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national se...

Sequence to Sequence Learning with Neural Networks.

Ilya Sutskever, Oriol Vinyals, Quoc V. Le
2014
1 reference

Simple and Effective Type Check Removal through Lazy Basic Block Versioning

Maxime Chevalier-Boisvert, Marc Feeley
2014
1 reference

Dynamically typed programming languages such as JavaScript and Python defer type checking to run time. In order to maximize performance, dynamic language VM implementations must attempt to eliminate redundant dynamic type checks. However, type infere...

A Blockwise Descent Algorithm for Group-penalized Multiresponse and Multinomial Regression

Noah Simon, Jerome H. Friedman, Trevor Hastie
2013
1 reference

In this paper we purpose a blockwise descent algorithm for group-penalized multiresponse regression. Using a quasi-newton framework we extend this to group-penalized multinomial regression. We give a publicly available implementation for these in R, ...

Digital signature standard (DSS)

National Institute of Standards and Technology (US)
2013
1 reference