asteroza + algorithm   238

A fork() in the road - Microsoft Research
You'll pry this from my cold dead... oh, you forked it?
computer  science  algorithm  research  history  unix  process  fork 
10 days ago by asteroza
[1812.00417] Snorkel DryBell: A Case Study in Deploying Weak Supervision at Industrial Scale
Automating labeling of training data for machine learning, using Snorkel Drybell, an addon to Snorkel, an open source data labeling and management system
training  data  automated  labeling  snorkel  drybell  algorithm  research  google  deep  machine  learning 
4 weeks ago by asteroza
CiteSeerX — An Evolved Circuit, Intrinsic in Silicon, Entwined with Physics
This had a circuit that was temperature sensitive, but it optimized better than human and it used a cell not connected to the circuit that could not be removed without altering the output (likely evolved to use crosstalk beneficially)
genetic  algorithm  evolution  FPGA  circuit  optimization  hardware  electronics  devices  digital  analog  VLSI 
january 2019 by asteroza
Alexandr Andoni -- Columbia University
fuzzy hash == nearest neighbor search, which means this guys Ph.D is required reading
nearest  neighbor  search  fuzzy  hash  hashing  algorithm  research 
december 2018 by asteroza
Cryptology ePrint Archive: Report 2018/962 - Zexe: Enabling Decentralized Private Computation
Interesting use of zcash protocol for arbitrary computation purposes. Might enable a distributed exchange
Zcash  protocol  zero  knowledge  proof  algorithm  cryptography  research  computer  science 
october 2018 by asteroza
Cryptology ePrint Archive: Report 2018/183
zero knowledge proof-of-time for cryptocurrencies, by Bram Cohen (for use by Chia?)
cryptography  algorithm  research  zero  knowledge  proof-of-time  cryptocurrency 
august 2018 by asteroza
djbsort: Intro
New constant time (relative to array size) sort algorithm using AVX2 for int32
algorithm  sort  sorting  performance  AVX2  opensource  programming  development 
july 2018 by asteroza
dropbox/divans: Building better compression together
Apparently the format supports seeks in 4mb chunks but the library doesn't do it natively yet
DivANS  compression  algorithm  ANS  Brotli 
june 2018 by asteroza
Building better compression together with DivANS | Dropbox Tech Blog
So another ANS approach like Zstd? But they seem to be splitting apart the problem differently...
DivANS  compression  algorithm  ANS  Brotli 
june 2018 by asteroza
Linkers and Loaders
Apparently the bible on how stuff gets loaded from disk to memory
computer  science  algorithm  linker  loader  documentation  reference  information  programming  development  software  design  learning  education 
june 2018 by asteroza
Open Quantum Safe
early testing of post-quantum encryption, including a patched fork of openSSL to play with
OpenSSL  post-quatum  encryption  algorithm  library  testing  programming  development  security  QA  softare  networking  PQE 
june 2018 by asteroza
Distributed Localization: A Linear Theory - IEEE Journals & Magazine
Using linear approximations seems to work decently to calculate location using a distributed architecture. AKA using cellphones to geolocate each other rather than triangulate strictly from basestations, and using it like a graph node network so your tracking ability can reach like a tentacle into buildings and closed spaces, assuming nobody is feeding fake info...
p2p  5G  geolocation  IoT  decentralized  positioning  location  algorithm  anchorless  dynamic  privacy  security  anonymity  mapping 
may 2018 by asteroza
Round 1 Submissions - Post-Quantum Cryptography | CSRC
Round 1 candidates for the new NIST post-quantum cryptographic algorithm contest
NIST  contest  post-quantum  post  quantum  encryption  cryptography  algorithm  research 
december 2017 by asteroza
The Case for Learned Index Structures – Arxiv Vanity
Machine learning indexes beat b-trees, 3x faster in 10-100x less space. Run it on GPU's which are still getting faster at rates higher than CPU's, and you could have a real shift in computing, assuming you can stuff enough data into GPU RAM.
google  database  index  algorithm  research  machine  learning  b-tree  computer  science  mathematics  programming  engineering 
december 2017 by asteroza
Using the coprocessor to work the edges while the CPU does the global stuff, with a NVMe SSD to keep up. Suppose you could sub some GPU's for the Phi, and I wonder how real (not emulated) AVX512 in the Xeons and the Phi would affect it.
heterogeneous  graph  processing  database  research  algorithm  distributed  xeon  phi  edge  calculation  coprocessor  GPGPU  GPU  NVMe  SSD  hybrid  Delicious 
may 2017 by asteroza
« earlier      
per page:    204080120160

related tags

0-RTT  2.0  2D  3D  5G  128bit  802.11  academic  accelerated  accelerator  accesspoint  actuator  ACTUV  aggregator  AI  aircraft  AIST  algebra  algorithm  algorithmic  algorithms  alternative  amazon  analog  analysis  analyzer  anchorless  android  angle  animation  anonimization  anonymity  anonymous  ANS  ant  anti-face-detection  antisubmarine  antisurveillance  antivirus  api  app  apple  approximation  arbiter  architecture  archive  arduino  Argon2  arm  arrangement  array  art  article  ASIC  assembly  assistant  ASW  atmospheric  attack  audio  authenticated  authentication  authenticity  automated  autonomoous  autonomous  autonomy  AUV  availability  AVX2  aware  b-tree  B.A.T.M.A.N.  backdoor  backup  based  bayesian  BBC  behavior  benchmark  bigdata  binary  biology  biometric  biometrics  biomimicry  block  book  boost  boosting  BPG  Brotli  bug  build  building  C  C#  C++  C4  cache  caching  CAESAR  calculation  calendar  Camellia  camera  camoflage  camouflage  cancelable  cancellable  candidate  capture  car  carpool  carving  cat  catch  catching  cavity  CCTV  chase  chaser  check  china  chip  chochlea  choice  chrome  cipher  circuit  classification  Cleversafe  cluster  CoCoRo  code  codec  coded  coding  coherent  collection  collector  collision  color  communication  comparison  compatible  competition  compiler  complexity  composite  compression  compressor  computation  computational  computer  computing  comunication  concept  concurrency  concurrent  consensus  conservation  constellation  constructed  content  contest  context  continuous  control  controller  cooperation  cooperative  coprocessor  correct  correction  count  counterfeiting  countersurveillance  counting  Courgette  CRDT  crime  crowdsourcing  cryptanalysis  cryptocurrency  cryptographic  cryptography  cryptograpy  crytography  CSAIL  currency  custom  d3.js  DARPA  dashboard  data  database  datacenter  dataset  dataviz  date  decentralized  decision  decoder  decompression  decompressor  deep  deepfakes  defense  defined  deflate  delay  Delicious  demo  dependency  depth  descattering  design  detection  development  device  devices  dictionary  diff  differential  diffie-hellman  Digimarc  digital  Dirac  Disney  dispersal  dispersed  distributed  distribution  DivANS  DNA  docking  documentation  domestic  drone  drybell  DSP  DTN  dynamic  dynamo  ecurity  edge  edgeXL  editing  editor  education  efficency  eigenface  eigenvector  electrochemical  electronics  email  emailbomb  embedded  EMTG  encoder  encryption  energy  engine  engineering  enhancement  environment  error  estimation  EU  Eureqa  EURion  europe  evolution  evolutionary  exchange  exploit  exposure  external  fabbing  face  facebook  facial  factor  failsafe  fair  fake  false  fast  FAST21  Fastpass  fature  FEC  field  file  filesystem  filetype:pdf  film  filter  fingerprint  FIPS-202  FIPS202  floating  FMIQ  folding  fon  footprint  forensics  fork  form  format  forward  FPGA  frame  framerate  framework  freestart  function  fusion  fuzzed  fuzzing  fuzzy  gabor  game  GAN  garbage  generative  generator  genetic  genome  genomics  geolocation  GIF  go  google  gorilla  GPGPU  GPS  GPU  gradient  graph  graphic  graphics  graphing  graphs  grep  grid  grouping  guidance  guide  gzip  hack  hacking  hadoop  hallway  hand  hardware  hash  hashcache  hashing  health  helicopter  heterogeneous  high  history  HiveCache  hollow  homomorphic  hosting  hostproof  HTTP  human  humor  hunt  hunter  hunting  hybrid  hyperloglog  IBM  IDA  idea  identification  identity  IETF  image  imaging  ImgSeek  implementation  index  indexless  indoor  inferred  information  infosec  infovell  infovis  infoviz  infrared  infrastructure  inmemory  inner  INS  integer  interface  internet  interplanetary  interview  inverse  IO  ionizing  iOS  IoT  IP  iPhone  IR  iris  israel  jamming  japan  java  javascript  jinni  JPEG  JPG  JSON  key  knowledge  Knuth  labeling  landing  language  large  latency  lawsuit  layout  learning  lens  LEVAN  level  library  license  LIDAR  light  lightfield  lightweight  likelihood  limb  linear  link  linked  linker  linux  list  listing  LNT  loader  location  lock  lockfree  log  long  loop  low  luhn  LZ4  LZFSE  LZO  LZSSE  mac  machine  magic  mailbomb  makeup  management  map  mapping  mass  matching  math  mathematics  MAV  maximum  media:document  medicine  memory  MEMS  meraki  mergesort  mesh  micro  microsoft  military  MIMO  mirror  mission  MIT  Mnet  model  modulator  moduli  modulus  moment  money  monitoring  MOSAIC  motion  movie  MPEG  multi  multicopter  multipath  mvirtual  Nanolux  NASA  natural  navigation  navigtion  nearest  neighbor  nesting  network  networking  neural  neurotechnologija  nework  news  news360  Niels  nightvision  NIST  noise  nonlinear  NORX  NSA  NTT  nuclear  number  NVMe  object  obstruction  online  open-mesh  OpenCL  OpenCV  opensource  opensourrce  OpenSSL  opinion  OPSEC  optical  optics  optimization  orangemesh  orbit  orbital  origami  OSX  output  p2p  packing  page  paging  Pandora  Panoptes  paper  parallel  parallelizing  parser  password  patent  pattern  payload  perceptual  performance  personal  phantom  pHash  phi  photo  photography  photon  photoshop  phrase  phyllotactic  physical  picture  piecewise  PIN  planning  platform  PNG  point  polaris  polarized  portable  positioning  post  post-quantum  post-quatum  power  PQE  predator  predicition  prefix  primary  prime  printing  privacy  PRNG  probabilistic  process  processing  product  production  program  programing  programming  programmming  progressive  project  proof  proof-of-time  protocol  PROTOS  Provos  proxy  psychology  python  QA  quadcopter  quantum  question  queue  quicksort  radiation  raft  random  randomness  range  ray  reader  realtime  recognition  recommendation  reconstruction  recursion  reference  register  remote  removal  rendering  report  repository  reproducing  research  resistant  resize  resizing  resolution  resource  response  retina  retransmission  reverse  revokable  revokation  revoke  RF  riffle  RLNC  RNG  RO.B.IN  robot  robotics  room  root  routing  RSTEG  S3  sample  SAT  scalability  scanner  scanning  science  scientist  scrypt  SDDC  SDK  seam  SEAMonster  search  secret  secure  security  selective  self  semantic  sensing  sensor  series  server  service  set  SHA-1  SHA-3  SHA1  SHA3  siggraph  signal  silence  silicon  SIMD  similarity  SIMON  simulation  simulator  single  single-sign-on  skein  sketch  skip  SLA  SLAM  small  smartphone  SMAVNET  SMT  snappy  snorkel  SOA  softare  software  solver  sort  sorting  sound  source  space  spam  spamplant  spatial  specialist  SPECK  spectrum  speech  speed  SPL  spookyhash  SpotFI  spying  SQLite  square  SSD  SSE  SSO  stacked  standard  station  statistical  statistics  stealth  steganography  stegbreak  stitching  STL  storage  store  streamgraph  streaming  string  structure  structures  STS  STXXL  submarine  substrate  sunglasses  super  support  surface  surveillance  swarming  Switzerland  symmetric  sync  SynthNet  system  table  tactical  tactics  tar  taste  TCP  technique  technology  template  test  testing  themeriver  thermodynamics  throughput  time  timeline  timezone  tolerant  toolkit  tools  tor  TPIE  tracing  tracking  traffic  training  trajectory  transparent  tree  treemap  trusted  tutorial  UAV  UGV  UI  underwater  universal  unix  upscale  user  USV  UTC  utilities  utility  UUV  value  Varnish  vector  vehicle  verification  verifinger  versioning  video  virtual  vision  visual  visualization  VLSI  VOIP  voronoi  VPN  WAN  warfare  watermark  watertight  wavelength  wavelet  web  webcam  webdev  wideband  wifi  windows  wireless  writer  xeon  XGBoost  yahoo  Zcash  zero  zip  zlib  zoom  Zopfli  Zstandard  ZSTD 

Copy this bookmark: