algorithms   76972

« earlier    

The Tyranny of Metrics
Schemes of measured performance are deceptively attrac- tive because they often “prove” themselves by spotting the most egregious cases of error or neglect, but are then applied to all cases. Tools appropriate for discovering real misconduct become tools for measuring all performance. The initial find- ings of performance measurement may lead poor performers to improve, or to drop out of the market. But in many cases, the extension of standardized measurement may be of dimin- ishing utility, or even counterproductive—sliding from sen- sible solutions to metric madness. Above all, measurement may become counterproductive when it tries to measure the unmeasurable and quantify the unquantifiable.

Concrete interests of power, money, and status are at stake. Metric fixation leads to a diversion of resources away from frontline producers toward managers, administrators, and those who gather and manipulate data.
algorithms  metrics  technique 
yesterday by ayjay
[1810.00845] CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs
Fully Homomorphic Encryption (FHE) refers to a set of encryption schemes that allow computations to be applied directly on encrypted data without requiring a secret key. This enables novel application scenarios where a client can safely offload storage and computation to a third-party cloud provider without having to trust the software and the hardware vendors with the decryption keys. Recent advances in both FHE schemes and implementations have moved such applications from theoretical possibilities into the realm of practicalities.
This paper proposes a compact and well-reasoned interface called the Homomorphic Instruction Set Architecture (HISA) for developing FHE applications. Just as the hardware ISA interface enabled hardware advances to proceed independent of software advances in the compiler and language runtimes, HISA decouples compiler optimizations and runtimes for supporting FHE applications from advancements in the underlying FHE schemes.
This paper demonstrates the capabilities of HISA by building an end-to-end software stack for evaluating neural network models on encrypted data. Our stack includes an end-to-end compiler, runtime, and a set of optimizations. Our approach shows generated code, on a set of popular neural network architectures, is faster than hand-optimized implementations.
to-understand  machine-learning  algorithms  distributed-processing  seems-important  languages  neural-networks 
yesterday by Vaguery
uizard
Инструмент превращает наброски интерфейсов на бумаге в достаточно аккуратные макеты Sketch. Давно следил за альфа- и бета-версиями, отличное применение идеи Airbnb для широкого круга дизайнеров.
UX  sketching  tools  AI  algorithms  trends 
2 days ago by jvetrau

« earlier    

related tags

?  2017  351  500  644  a*  activism  ads  advent-of-code  ai  algorithm  algoritmos  alpha  analog  android  angular  archive  art  artificialintelligence  automation  babysitting  backbone  bezier  bias  binary  blossom  bst  buzzfeed  c#  c++  c  camera  career  cartography  cassandra  channel  clarewardle  clojure  code.org  coding  collaboration  comparative-literature  compiler-writing  compilers  complexity  compression  compsci  computability  computer  computer_science  computers  context  course  crime  crypto  cs  css  cucumber  curve  data  datascience  datastructures  design  designpatterns  development  digihum  discovery  distance  distributed-processing  django  djikstra  drone  education  elasticsearch  electioncommission  emberjs  engineering  erlang  escrowtab  ethics  ethik  europe  evolution  evolutionarycomputation  exercises  experimental  facebook  facialrecognition  fake  flight  france  fucked  fun  gamedev  gameprogramming  games  generative-art  generative-models  geometry  glossary  go  golang  google  googleearth  graph  graphics-programming  graphics  graphs  graphtheory  guide  hex  hiring  history-of-science  hn  html  humanities  ibm  illustrations  information  information_theory  interactivepublishing  interesting  interpreters  interview  interviews  ionic  ios  java  javascript  journalism  jquery  knockoutjs  languages  learning-in-public  learning  less  lisp  list  lucene  machine-learning  machinelearning  macro_from_micro  math  mathematics  mers  metrics  misinformation  mismi  mongodb  motion  mysql  neo4j  networking  networks  neural-networks  news  nodejs  nudge-targets  number-theory  objective-c  oracle  parsing  partisanmedia  pathfinding  pdf  people  php  physics  politics  populism  postgres  practice  principles  programação  programming  protest  puzzle  python  quadrotor  quant  questions  racism  rails  rather-interesting  reactjs  reporting  representation  req  risk  ruby  sass  scala  schemes  science  security  seems-important  shell  shuffle  sketching  skip-list  skiplist  socialmedia  sorting  sql  stack_overflow  statistics  strange-loop  string  sudoku  surveillance  swift  taxes  teaching  technique  the-mangle-in-practice  thenetwork  time_complexity  to-understand  to-write-about  tools  toread  tree  trends  trigonometry  tutorial  unplugged  ux  verification  video  violence  vlztodo  web  weekly  wordpress  youtube  ywbt  zero 

Copy this bookmark:



description:


tags: