Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Venkatraman, Siddarth"'
Autor:
Venkatraman, Siddarth, Jain, Moksh, Scimeca, Luca, Kim, Minsu, Sendera, Marcin, Hasan, Mohsin, Rowe, Luke, Mittal, Sarthak, Lemos, Pablo, Bengio, Emmanuel, Adam, Alexandre, Rector-Brooks, Jarrid, Bengio, Yoshua, Berseth, Glen, Malkin, Nikolay
Diffusion models have emerged as effective distribution estimators in vision, language, and reinforcement learning, but their use as priors in downstream tasks poses an intractable posterior inference problem. This paper studies amortized sampling of
Externí odkaz:
http://arxiv.org/abs/2405.20971
Autor:
Venkatraman, Siddarth, Khaitan, Shivesh, Akella, Ravi Tej, Dolan, John, Schneider, Jeff, Berseth, Glen
Offline reinforcement learning (RL) holds promise as a means to learn high-reward policies from a static dataset, without the need for further environment interactions. However, a key challenge in offline RL lies in effectively stitching portions of
Externí odkaz:
http://arxiv.org/abs/2309.06599
Autor:
Daftry, Shreyansh, Abcouwer, Neil, Del Sesto, Tyler, Venkatraman, Siddarth, Song, Jialin, Igel, Lucas, Byon, Amos, Rosolia, Ugo, Yue, Yisong, Ono, Masahiro
We present MLNav, a learning-enhanced path planning framework for safety-critical and resource-limited systems operating in complex environments, such as rovers navigating on Mars. MLNav makes judicious use of machine learning to enhance the efficien
Externí odkaz:
http://arxiv.org/abs/2203.04563
Autor:
Abcouwer, Neil, Daftry, Shreyansh, Venkatraman, Siddarth, del Sesto, Tyler, Toupet, Olivier, Lanka, Ravi, Song, Jialin, Yue, Yisong, Ono, Masahiro
Enhanced AutoNav (ENav), the baseline surface navigation software for NASA's Perseverance rover, sorts a list of candidate paths for the rover to traverse, then uses the Approximate Clearance Evaluation (ACE) algorithm to evaluate whether the most hi
Externí odkaz:
http://arxiv.org/abs/2011.06022
Autor:
Agarwal, Shivam, Venkatraman, Siddarth
Steganography is the art of hiding a secret message inside a publicly visible carrier message. Ideally, it is done without modifying the carrier, and with minimal loss of information in the secret message. Recently, various deep learning based approa
Externí odkaz:
http://arxiv.org/abs/2003.13217