Search
Now showing items 271-280 of 559
IO Pattern Aware Methods to Improve the Performance and Lifetime of NAND SSD
Modern SSDs can store multiple bits per transistor which enables it to have higher
storage capacities. Low cost per bit of such SSDs has made it a commercial success. As
of 2018, cells with an ability to store three bits ...
Algorithms for Multilingual IR in Low Resource Languages using Weakly Aligned Corpora
Multilingual information retrieval (MLIR) methods generally rely on linguistic resources such
as dictionaries, parallel corpora, etc., to overcome the language barrier. For low resource
languages without these resources, ...
Integrating Read-Copy-Update Synchronization and Memory Allocation
The evolution of multicore systems with thousands of cores has led to the exploration
of non-traditional procrastination-based synchronization techniques such as Read-Copy-
Update (RCU). Deferred destruction is the ...
Optimizing Dense Matrix Computations with PolyMage
Linear algebra computations and other arbitrary affine accesses are ubiquitous in applications
from domains like scientific computing, digital signal processing (DSP), and deep
neural networks. Libraries such as OpenBLAS, ...
Algorithms for Fair Clustering
Many decisions today are taken by various machine learning algorithms, hence it is crucial to
accommodate fairness in such algorithms to remove/reduce any kind of bias in the decision.
We incorporate fairness in the ...
Neural Models for Personalized Recommendation Systems with External Information
Personalized recommendation systems use the data generated by user-item interactions (for example, in the form of ratings) to predict different users interests in available items and recommend a set of items or products ...
On symmetries of and equivalence tests for two polynomial families and a circuit class
Two polynomials f, g ∈ F[x1, . . . , xn] over a field F are said to be equivalent if there exists an
n×n invertible matrix A over F such that g = f(Ax), where x = (x1 · · · xn)T . The equivalence
test (in short, ET) for ...
Neural Approaches for Natural Language Query Answering over Source Code
During software development, developers need to ensure that the developed code is bug-free and the best coding practices are followed during the code development process. To guarantee this, the developers require answers ...
Model-based Safe Deep Reinforcement Learning and Empirical Analysis of Safety via Attribution
During initial iterations of training in most Reinforcement Learning (RL) algorithms, agents
perform a significant number of random exploratory steps, which in the real-world limit the
practicality of these algorithms ...
An Evaluation of Basic Protection Mechanisms in Financial Apps on Mobile Devices
This thesis concerns the robustness of security checks in financial mobile applications (or simply
financial apps). The best practices recommended by OWASP for developing such apps demand
that developers include several ...

