Search
Skip to Search Results- 2Reinforcement Learning
- 1Android Malware Detection, Static Analysis, Factorization Machine
- 1Cloud Computing
- 1Cloud-storage Providers
- 1Congestion Control
- 1Continuous Action Space
Results for "supervisors_tesim:"Niu, Di (Electrical and Computer Engineering)""
-
Fall 2023
With the increasing complexity and capacity of modern Field-Programmable Gate Arrays (FPGAs), there is a growing demand for efficient FPGA computer-aided design (CAD) tools, particularly at the placement stage. While some previous works, such as RLPlace, have explored the efficacy of single-state...
-
Fall 2021
Malware classification is a critical task in cybersecurity. It offers insights on the threats posed to victim devices from different malware and aids in the designing of precautionary measures. In real world applications, due to the vast amount of malware present in the networks, real-time...
-
Fall 2018
With the increasing popularity of Android smart phones in recent years, the amount of Android malware is growing rapidly. Due to its great threat and damage to mobile phone users, Android malware detection has become increasingly important in cyber security. Traditional methods for android...
-
Spring 2020
With the popularity of smart mobile devices, the need to control mobile devices using voice is increasing. Also, there is greater expectation for the accuracy of keyword spotting. Many existing researches have applied neural networks to keyword spotting, and have great performances. However, at...
-
Fall 2019
Search query understanding is a trending topic in the field of Information Retrieval (IR). The goal is to learn higher-level representations for the intents or concepts behind a search query and utilize these representations to further enhance down-stream services like content recommendation....
-
Spring 2019
The development of modern machine learning systems not only provides the opportunity of applications in various fields but also creates many challenges. The core of machine learning is to train a model based on a dataset, which can be posed as solving an optimization problem, usually expressed...
-
On the Application of Continuous Deterministic Reinforcement Learning in Neural Architecture Search
DownloadSpring 2021
Architecture evaluation is a major bottleneck of Neural Architecture Search (NAS). Recent trends have seen a shift in favor of weight-sharing networks capable of superimposing all possible candidate architectures in a search space. Nevertheless, this technique is not beyond reproach, and has...
-
Fall 2016
We provide a case study of current inefficiencies in how traffic to well-known cloud-storage providers (e.g., Dropbox, Google Drive, Microsoft OneDrive) can vary significantly in throughput (e.g., a factor of 5 or more) depending on the location of the source and sink of the data. Our case study...
-
Fall 2023
With the rapid growth of data-intensive applications, congestion control algorithms for datacenter networks under RDMA over Converged Ethernet protocol have become vital in managing various traffic patterns that demand ultra-low latency and high end-to-end throughput. Although many rule-based and...
-
Spring 2020
Natural Language Processing (NLP) and understanding aims to read from unformatted text to accomplish different tasks. As a first step, it is necessary to represent text as a simplified model. Traditionally, Vector Space Model (VSM) is most commonly used, in which text is represented as a bag of...