Search
Now showing items 1-10 of 19
Deep Learning without Poor Local Minima
(2016-05-23)
In this paper, we prove a conjecture published in 1989 and also partially address an open problem announced at the Conference on Learning Theory (COLT) 2015. For an expected loss function of a deep nonlinear neural network, ...
An Analysis of the Search Spaces for Generate and Validate Patch Generation Systems
(2016-02-18)
We present the first systematic analysis of the characteristics of patch search spaces for automatic patch generation systems. We analyze the search spaces of two current state-of- the-art systems, SPR and Prophet, with ...
Delphi: A Software Controller for Mobile Network Selection
(2016-02-25)
This paper presents Delphi, a mobile software controller that helps applications select the best network among available choices for their data transfers. Delphi optimizes a specified objective such as transfer completion ...
Outlier Detection in Heterogeneous Datasets using Automatic Tuple Expansion
(2016-02-08)
Rapidly developing areas of information technology are generating massive amounts of data. Human errors, sensor failures, and other unforeseen circumstances unfortunately tend to undermine the quality and consistency of ...
Initial report on Object Spreadsheets
(2016-01-12)
There is a growing demand for data-driven web applications that help automate organizational and business processes of low to medium complexity by letting users view and update structured data in controlled ways. We present ...
Report on the 2015 NSF Workshop on Unified Annotation Tooling
(2016-11-08)
On March 30 & 31, 2015, an international group of twenty-three researchers with expertise in linguistic annotation convened in Sunny Isles Beach, Florida to discuss problems with and potential solutions for the state of ...
Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata
(2016-10-05)
Alpenhorn is the first system for initiating an encrypted connection between two users that provides strong privacy and forward secrecy guarantees for metadata (i.e., information about which users connected to each other) ...
Examining Key Mobility Resources through Denial of Service Attacks on proposed Global Name Resolution Services
(2016-09-26)
The problem we address in this thesis is to uncover the design elements in a network architecture design that may open it up to denial of service (DoS) attacks and to expose the tradeoffs in mitigating those DoS opportunities. ...
Towards Practical Theory: Bayesian Optimization and Optimal Exploration
(2016-05-26)
This thesis discusses novel principles to improve the theoretical analyses of a class of methods, aiming to provide theoretically driven yet practically useful methods. The thesis focuses on a class of methods, called ...
Evaluating Caching Mechanisms In Future Internet Architectures
(2016-06-28)
This thesis seeks to test and evaluate the effects of in-network storage in novel proposed Internet architectures in terms of their performance. In a world where more and more people are mobile and connected to the Internet, ...