Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Venkataraman, Shobha"'
Autor:
Pineda, Luis, Fan, Taosha, Monge, Maurizio, Venkataraman, Shobha, Sodhi, Paloma, Chen, Ricky T. Q., Ortiz, Joseph, DeTone, Daniel, Wang, Austin, Anderson, Stuart, Dong, Jing, Amos, Brandon, Mukadam, Mustafa
We present Theseus, an efficient application-agnostic open source library for differentiable nonlinear least squares (DNLS) optimization built on PyTorch, providing a common framework for end-to-end structured learning in robotics and vision. Existin
Externí odkaz:
http://arxiv.org/abs/2207.09442
Autor:
Knott, Brian, Venkataraman, Shobha, Hannun, Awni, Sengupta, Shubho, Ibrahim, Mark, van der Maaten, Laurens
Secure multi-party computation (MPC) allows parties to perform computations on data while keeping that data private. This capability has great potential for machine-learning applications: it facilitates training of machine-learning models on private
Externí odkaz:
http://arxiv.org/abs/2109.00984
Autor:
Venkataraman, Shobha, Amos, Brandon
Fixed-point iterations are at the heart of numerical computing and are often a computational bottleneck in real-time applications that typically need a fast solution of moderate accuracy. We present neural fixed-point acceleration which combines idea
Externí odkaz:
http://arxiv.org/abs/2107.10254
Publikováno v:
In Computer Communications 2003 26(3):237-250
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Much research effort has focused on patternextraction techniques to gener
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e7e512fe58724c8bb6db75d8b871321f
Autor:
Caballero, Juan, Venkataraman, Shobha, Pongsin Poosankam, Kang, Min G, Song, Dawn, Avrim Blum
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running on a remote host. A fingerprint is essentially a set of queries and a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6928b61558855c1982129e9e7c97c79b
Autor:
Venkataraman, Shobha
"High-speed monitoring of Internet traffic is an important and challenging problem, with applications to real-time attack detection and mitigation, traffic engineering, etc. However, packet-level monitoring requires fast streaming algorithms that use
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6b18f5eb8e2a96058602345d85890a28
Automatic identification of anomalies on network data is a problem of fundamental interest to ISPs to diagnose incipient problems in their networks. ISPs gather diverse data sources from the network for monitoring, diagnostics or provisioning tasks.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c2ad49103103f5aad4c5358ef89cadf3
Autor:
Balachandran, Athula, Aggarwal, Vaneet, Halepovic, Emir, Pang, Jeffrey, Seshan, Srinivasan, Venkataraman, Shobha, Yan, He
Publikováno v:
Proceedings of the 20th Annual International Conference Mobile Computing & Networking; 9/7/2014, p213-224, 12p