Search results

Jump to navigation Jump to search
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

Page text matches

  • ...experience, yet in complex domains for which a simulator is not available to the agents, the performance of model-based agents employing standard planni ...ct useful knowledge gathered from model simulations. This allows the agent to benefit from model-based imagination without the pitfalls of conventional m ...
    2 KB (210 words) - 20:39, 9 March 2018
  • ...ed using a convex combination to a number of clusters rather than uniquely to one cluster. This is an unsupervised version of the so-called multi-class c ...e data, authors have recently proposed discrete analogues to PCA. We refer to the method as multinomial PCA(mPCA) because it is a precise multinomial ana ...
    2 KB (321 words) - 09:45, 30 August 2017
  • ...ean discrepancy (JMMD) criterion. Adversarial training strategy is adopted to maximize JMMD such that the distributions of the source and target domains ...
    760 bytes (109 words) - 15:32, 2 October 2017
  • #REDIRECT [[sandbox to test w2l]] ...
    33 bytes (6 words) - 09:46, 30 August 2017
  • #REDIRECT [[link to my paper]] ...
    30 bytes (5 words) - 09:45, 30 August 2017
  • ...lt but there exists a probability distribution function g(x) which is easy to sample from, then <math>I</math> can be written as<br> ...playstyle E_g(w(x)) \rightarrow</math>the expectation of w(x) with respect to g(x) ...
    2 KB (395 words) - 09:45, 30 August 2017
  • #REDIRECT [[learning Spectral Clustering, With Application To Speech Separation]] ...
    81 bytes (9 words) - 09:45, 30 August 2017
  • #REDIRECT [[rOBPCA: A New Approach to Robust Principal Component Analysis]] ...
    75 bytes (10 words) - 09:46, 30 August 2017
  • #REDIRECT [[neural Machine Translation: Jointly Learning to Align and Translate]] ...
    81 bytes (10 words) - 09:46, 30 August 2017
  • #REDIRECT [[a Rank Minimization Heuristic with Application to Minimum Order System Approximation]] ...
    98 bytes (12 words) - 09:45, 30 August 2017
  • #REDIRECT [[a New Approach to Collaborative Filtering: Operator Estimation with Spectral Regularization]] ...
    105 bytes (12 words) - 09:45, 30 August 2017
  • To properly train a neural network a large labeled dataset, however large data These models scale linearly in proportion to the number of classes in the data sets. The number of evaluations could be ...
    466 bytes (70 words) - 09:46, 30 August 2017
  • #REDIRECT [[a Penalized Matrix Decomposition, with Applications to Sparse Principal Components and Canonical Correlation Analysis]] ...
    131 bytes (15 words) - 09:45, 30 August 2017
  • ...the methods used for video-based face recognition were based on the still-to-still techniques which aimed at selecting good frame and then performed som ...s kind of application, which is called online video. The other scenario is to process the video content offline, like indexing the meeting records or ana ...
    3 KB (512 words) - 09:45, 30 August 2017
  • ...ifically, this paper explores whether we can train machine learning models to learn from dialog. *Evaluated some baseline models on this data and compared them to standard supervised learning. ...
    2 KB (309 words) - 19:52, 17 November 2020
  • ...RECT [[graphical models for structured classification, with an application to interpreting images of protein subcellular location patterns]] ...
    145 bytes (17 words) - 09:46, 30 August 2017
  • #REDIRECT [[stat946f15/Sequence to sequence learning with neural networks]] ...
    75 bytes (10 words) - 09:46, 30 August 2017
  • #REDIRECT [[from Machine Learning to Machine Reasoning]] ...
    56 bytes (7 words) - 09:46, 30 August 2017
  • ...following table. Put your name and a link to the paper that you are going to present. Chose a date between Nov 16 and Dec 2 (inclusive). .../Correlate/pmd.pdf], [[A Penalized Matrix Decomposition, with Applications to Sparse Principal Components and Canonical Correlation Analysis|Summary]] ...
    4 KB (570 words) - 09:45, 30 August 2017
  • ...a document they will not examine the next document. This model is similar to hidden Markov model in that there is a conditional dependency between the p ...that if a URL clicked by a user that means it’s both examined and relevant to the query . In another word , given a query q , position i and URL u the pr ...
    3 KB (593 words) - 09:46, 30 August 2017
  • ...hence because of this for whatever data we need to feed in the network has to be continuous in nature. Images can easily be represented as real-valued ve ...parameters it needs to learn is quite high. There have been some solutions to it: ...
    4 KB (646 words) - 19:44, 26 October 2017
  • ...batch-normalization layers right before the activations (to have the input to the activations be normalized as desired). Both networks were trained with ...he 15th, 50th, and 85th percentiles of the input were recorded. The figure to the left demonstrates how these values changed during training. The y axis ...
    4 KB (637 words) - 02:07, 28 November 2018
  • ...properties (cite). Algorithms for inference do exist but they do however, come at a price of reduced expressive capabilities in logical inference and prob ...
    852 bytes (116 words) - 09:46, 30 August 2017
  • ==A Penalized Matrix Decomposition, with Applications to Sparse Principal Components and Canonical Correlation Analysis== [[A Penalized Matrix Decomposition, with Applications to Sparse Principal Components and Canonical Correlation Analysis]] ...
    2 KB (222 words) - 09:45, 30 August 2017
  • ...>; on the other hand we would reject the samples if the ratio is not close to 1. At x=9; we will reject samples according to the ratio <math> \frac {f(x)}{c \cdot g(x)} </math> after sampling from <ma ...
    6 KB (937 words) - 09:45, 30 August 2017
  • 3 data sets are used to compare CSL to existing methods, 1 function regression task and 2 image classification tas ...s <math>f_j</math> as well as determine which mapping function corresponds to each of the <math>m</math> observations. 3 scalar-valued, scalar-input func ...
    5 KB (878 words) - 19:25, 15 November 2020
  • ...d during training time. Here by defining tasks as domains, the paper tries to overcome the problem in a model-agnostic way. ...
    1 KB (200 words) - 15:47, 9 November 2020
  • ...sed for the uniform distribution, other methods must be developed in order to generate pseudo random numbers from other distributions. ...he fact that when a random sample from the uniform distribution is applied to the inverse of a cumulative density function (cdf) of some distribution, th ...
    5 KB (836 words) - 09:45, 30 August 2017
  • ...on of its classes. This decomposition is always possible and it is reduced to one class only in the case of an irreducible chain. ...ath> The state 3 can go to every other state but none of the others can go to it ...
    7 KB (1,129 words) - 09:45, 30 August 2017
  • -\textbf{u}^T\textbf{a} \; \textrm{ subject } \; \textrm{ to } \; \|\textbf{u}\|^2_2 \leq 1, \; \|\textbf{u}\|_1 \leq c_1 and we differentiate, set the derivative to 0 and solve for <math>\textbf{u}</math>: ...
    2 KB (311 words) - 09:45, 30 August 2017
  • '''NOTE: Wiki has been migrated from wikicoursenote.com to wiki.math.uwaterloo.ca/statwiki''' ==Go to [[stat841f10|Stat441/841 & CM 463/763-Fall 2010]] == ...
    5 KB (769 words) - 22:53, 5 September 2021
  • ...pefully, the pattern of the teams and lineups in the latent space can lead to interesting conclusions. Secondly, we apply the selected methods to lineup data sets and get the plots of the lineups in the low-dimensional sp ...
    6 KB (983 words) - 09:46, 30 August 2017
  • ...<math>f(x)</math> so that a variation of importance estimation can be used to estimate an integral in the form<br /> All that is required is a Markov chain which eventually converges to <math>f(x)</math>. ...
    5 KB (865 words) - 09:45, 30 August 2017
  • ...ork, the inputs are no longer normalized at each hidden layer. So, we want to reduce this internal covariate shift by normalizing the input at each hidde ...However, this is a very expensive operation, and does not necessarily lead to a gradient function that is well defined. ...
    6 KB (931 words) - 21:10, 28 November 2018
  • ...r the gander , some of which occasionally amuses but none of which amounts to much of a story” contains negative sentiment, but it is not immediately cle This competition seeks to implement machine learning algorithms that can determine the sentiment of a ...
    7 KB (1,125 words) - 09:46, 30 August 2017
  • ...n the Bayesian and Frequentist views on probability, along with references to '''Bayesian Inference'''. ...enough, by the central limit theorem, the Normal distribution can be used to approximate a Binomial distribution. ...
    6 KB (924 words) - 09:45, 30 August 2017
  • ...n up your name at the moment. When you chose the paper that you would like to present, add its title and a link to the paper. ...
    3 KB (418 words) - 09:45, 30 August 2017
  • ...ces as the parameters in the model are tuned, and thus the model is unable to evolve. ...would result in the error values of the deeper network being at most equal to those of the shallower network. However, this result is not seen in practic ...
    6 KB (1,020 words) - 12:01, 3 December 2021
  • ...riants of this model have been introduced by the authors, two of which try to learn task-specific word vectors for words. It is observed that learning ta ...different models for doing different tasks. For instance, they can be fed to CNNs for document or sentence classification. The vector representations us ...
    7 KB (1,086 words) - 22:49, 13 November 2018
  • ...playstyle E_g(h(x)) \rightarrow</math>the expectation of h(x) with respect to g(x), where <math>\displaystyle \frac{f(x)}{g(x)} </math> is a weight <math The method of Importance Sampling is simple but can lead to some problems. The <math> \displaystyle \hat I </math> estimated by Importa ...
    6 KB (1,083 words) - 09:45, 30 August 2017
  • |width="30pt"|Link to the paper |width="30pt"|Link to the video ...
    5 KB (642 words) - 23:29, 1 December 2021
  • {{Cleanup|date=September 2010|reason=explain what needs to be done}} ...
    255 bytes (46 words) - 09:45, 30 August 2017
  • ...nvolutional Neural Network, and Support Vector Machine models are proposed to address this issue. In 2019, Aashrith and et al. used CNN to recognize traffic signs. They achieved 99.18% accuracy on Belgium Data and ...
    4 KB (515 words) - 18:44, 17 December 2021
  • The Indian buffet process can also be used to define a prior distribution in any setting where the where <math> \alpha </math> is a hyper-parameter, which is similar to the parameter defined in DP. ...
    6 KB (1,032 words) - 09:46, 30 August 2017
  • ...Trevor Hastie. (2009) "A penalized matrix decomposition, with applications to sparse principal components and canonical correlation analysis". ''Biostati The penalized matrix decomposition can be used to obtain a version of sparse PCA. In this case, ...
    2 KB (277 words) - 09:45, 30 August 2017
  • ...tructure in the data explicityly but most of them are unable to generalize to new added data points as only implicit non-linear transformation is given. ...that it can handle out-of-sample extensions. Also, even though the matrix to be learned may be infinite-dimensional, it can be fully represented in term ...
    6 KB (1,007 words) - 09:46, 30 August 2017
  • ...o account to detect variants of mutations. This procedure should enable us to prognosis, diagnosis, and/or control a wide variety of diseases. ...type of interruptions on this important step of gene expression would lead to various kind of disease such as cancers and neurological disorders. ...
    6 KB (980 words) - 09:46, 30 August 2017
  • ...<math>\lambda_{\max}(\cdot)</math> at the matrix <math>X \in S_n</math>. To do this we must first define the subgradient. ...tion we are interested in is <math>\lambda_{\max}(\cdot)</math>. In order to define the subgradiant of this function we must first ensure it is convex. ...
    3 KB (589 words) - 09:45, 30 August 2017
  • ...order to get a distribution for the probability 'p' of a Binomial, we have to divide the Binomial distribution by n. This new distribution has the same s # Compute <math>\displaystyle \delta = p_1 - p_2</math> in order to get n values for <math>\displaystyle \delta</math>; ...
    7 KB (1,232 words) - 09:45, 30 August 2017
  • </ref>. Now we turn to ...
    204 bytes (22 words) - 09:45, 30 August 2017
  • ...out. However, the shortcomings of the existing methods are inevitable due to data sparsity and scalability. With deep learning and Convolutional Neural ...interpret. Therefore, the concept of compressing label space is introduced to effectively create lower-dimensional label vectors using either linear or n ...
    6 KB (969 words) - 21:50, 13 November 2021
  • ...order to get a distribution for the probability 'p' of a Binomial, we have to divide the Binomial distribution by n. This new distribution has the same s # Compute <math>\displaystyle \delta = p_1 - p_2</math> in order to get n values for <math>\displaystyle \delta</math>; ...
    5 KB (788 words) - 09:45, 30 August 2017
  • ...cases, we want to reduce the number of dimensions because we always want to save computations. The reason behind this kind of pooling method is based o ...od is that, it only passes the local patterns into the next layer. That is to say, if our original data set doesn't have the good property of neighborhoo ...
    8 KB (1,394 words) - 19:54, 20 March 2018
  • The paper presents an unsupervised method to machine translation using only monoligual corpora without any alignment bet The general approach of the methodology is to first use a unsupervised word-by-word translation model proposed by [Connea ...
    8 KB (1,359 words) - 22:48, 19 November 2018
  • ...lling a fair die repetitively to produce a series of random numbers from 1 to 6). One way to generate pseudo random numbers from the uniform distribution is using the ' ...
    8 KB (1,324 words) - 09:45, 30 August 2017
  • ...users click on what appears as the first search results and it is unlikely to click on results that do not appear at the beginning, even though relevant. ...el'' of user behavior, assumes that the user scans search results from top to bottom and eventually stops because either their information need is satisf ...
    11 KB (1,852 words) - 09:45, 30 August 2017
  • ...osal generally cannot model shared information between groups. One idea is to make <math>G_0</math> become discrete by limiting the choice of <math> G_0 ...e measure. Note that <math>G_0</math> is discrete with probability one due to the fact of Dirichlet process. ...
    8 KB (1,341 words) - 09:46, 30 August 2017
  • ...s that it is computationally expensive. Many algorithms have been proposed to solve the sparse PCA problem, and the authors introduced a fast block coord ...nsion of the data. Since <math>\hat{n}</math> could be very small compared to the dimension <math>n</math> of the data, this algorithm is computationally ...
    7 KB (1,209 words) - 09:46, 30 August 2017
  • ...s with computing k-nearest neighbors of each input and adding a constraint to preserve distances and angles between k-nearest neighbors:<br /> and also a constraint on outputs to be centerd on the origin:<br /> ...
    7 KB (1,093 words) - 09:45, 30 August 2017
  • ...easy to train and easy to generalize, while neuroscientists' objective is to produce useful representation of the scientific data. In other words, machi ...e at 1/2 of their maximum rate when at zero. A solution to this problem is to use a rectifier neuron which does not fire at it's zero value. This rectifi ...
    9 KB (1,338 words) - 09:46, 30 August 2017
  • ...based methods where they learn the i-th training examples are "remembered" to learn for corresponding weights. Prediction on untrained examples are then ...nal feature space and then apply existing linear methods. The main goal is to reduce the bottleneck of kernel-based inference methods. ...
    5 KB (753 words) - 12:51, 7 March 2018
  • |width="30pt"|Link to the paper |width="30pt"|Link to the summary ...
    14 KB (1,851 words) - 03:22, 2 December 2018
  • |width="15pt"|Link to the paper |width="30pt"|Link to the summary ...
    8 KB (1,194 words) - 04:28, 1 December 2021
  • ...o random variables could be in different dimensions. Second, dCov is equal to zero if and only is the two variables are independent. ...ritten in terms of the expectations of Euclidean distances which is easier to interpret: ...
    4 KB (586 words) - 09:46, 30 August 2017
  • ...stics and signal processing. Except in some special cases the RMP is known to be computationally hard. \mbox{subject to: } & X \in C, ...
    8 KB (1,446 words) - 09:45, 30 August 2017
  • ...rger. Furthermore, having many layers can theoretically cause problems due to vanishing gradients. ...number of input regions. This is caused by the deep hierarchy which allows to apply the same computation across different regions of the input space. ...
    8 KB (1,391 words) - 09:46, 30 August 2017
  • ..."bank" as a "financial institution" or the "land alongside or sloping down to a river or lake". ...e positional encoding, which has the same dimension as the word embedding, to obtain the sequential information of the inputs. BERT is built by the N uni ...
    9 KB (1,342 words) - 06:36, 10 December 2020
  • ...f pneumonia in CT Scan images. Then they carried out 10 k cross validation to estimate the model will perform on unseen dataset. And finally they evaluat ...iologists, radiologists and computer scientists have been working together to detect microbial diseases such as tuberculosis, malaria and pneumonia using ...
    7 KB (974 words) - 14:56, 21 November 2021
  • ...sform Method and sample from independent uniform distributions seen before to generate a sample following a Gamma distribution. ...le to use the Acceptance-Rejection method, but there are still better ways to sample from a Standard Normal Distribution. ...
    7 KB (1,114 words) - 09:45, 30 August 2017
  • ...imal). This creates a big problem, as this method becomes very susceptible to poor data (i.e., not very robust). This intuitively makes sense, as the age ...e noisy demonstration to be ranked according to their relative performance to each other. Another similar method requires extra labelling of the data wit ...
    10 KB (1,526 words) - 17:39, 26 November 2021
  • ...by its ability to be understood. There are two major approaches introduced to deal with this problem. One is unit-selection synthesis and the other one i ...make the sewing part of the process more natural. The latter objective is to optimize the concatenation cost. The overall cost for this approach can be ...
    10 KB (1,678 words) - 09:46, 30 August 2017
  • ...somewhere close to the initial configurations. The conventional method is to try a number of initial values, and pick up the best one of the results. ...ated with clustering process (ii) make effective use of cluster membership to connect reduced dimensional space and full dimension space. ...
    9 KB (1,428 words) - 09:46, 30 August 2017
  • Apply the idea of importance sampling to both numerator and denominator: This is very important and useful especially when f is known only up to a proportionality constant. Often, this is the case in Bayesian approach wh ...
    6 KB (1,113 words) - 09:45, 30 August 2017
  • ...eep recurrent neural network trained with reinforcement learning to attend to the most relevant regions of the input image. It has been shown that the pr ...e process continues until the model decides that there are no more objects to process. ...
    11 KB (1,714 words) - 09:46, 30 August 2017
  • ...ks. The goal of the algorithm is to utilize human-understandable reasoning to perform image classification tasks. ...ility is critical, where diagnosis using X-ray scans is based on comparing to other prototypical scans. [1] ...
    10 KB (1,573 words) - 23:36, 9 December 2020
  • ...wx + b = 0 separate the set exactly with the distance from the hyperplane to the nearest sample is maximum, then this hyperplane will be called an optim ...methods. In the kernel methods, we map the sample from the original space to a higher dimension and then we construct a hyperplane that separates the sa ...
    9 KB (1,392 words) - 01:45, 23 November 2021
  • ...ls. The first notion is the sparsity of the graph (i.e., something related to the number of edges in the graph). In this sense, a sparse model is one tha ...neural network literature, it means that we do not want the entire neurons to be activated in the same time. For our RBM, we want that the values of hidd ...
    9 KB (1,501 words) - 09:46, 30 August 2017
  • ...n machine based Deep Belief Network (DBN). Where layers of RBM are trained to learn unsupervised features of the data and then a final classification lay ...e on benchmark tasks and uses deep neural networks in an innovative manner to create a layered semi-supervised classification/generation model. ...
    9 KB (1,554 words) - 09:46, 30 August 2017
  • ...her type (i.e. has class labels that do not apply to data set that we wish to classify). ...hasize that the unlabeled data need not belong to the class labels we wish to assign, as long as it is related. This fact distinguishes it from semi-supe ...
    12 KB (1,871 words) - 09:45, 30 August 2017
  • ...synthesis requires a much larger and more complex set of contexts in order to achieve high quality synthesised speech. Examples of such contexts are the * Identity of neighbouring phones to the central phone. Two phones to the left and the right of the centre phone are usually considered as phonet ...
    8 KB (1,374 words) - 09:45, 30 August 2017
  • ...twork (DNN) in predicting outcome of splicing, and compare the performance to formerly trained model Bayesian Neural Network<ref>https://www.cs.cmu.edu/a The cost function we want to minimize here during training is <math>E=-\sum_a\sum_{k=1}^{C}{y_{n,k}log(h ...
    8 KB (1,353 words) - 09:46, 30 August 2017
  • |width="30pt"|Link to the paper |width="30pt"|Link to the summary ...
    10 KB (1,213 words) - 19:28, 19 November 2020
  • ...rvised learning). These methods were then tested on various bank databases to determine how effective they were in detecting fraud. ...a higher probability of being fraudulent. Different methods have been used to tackle this problem impacting financial institutions such as: Bayesian Netw ...
    12 KB (1,776 words) - 19:07, 24 November 2021
  • ...e or still images. It is very complex problem with high dimensionality due to the nature of digital images. Face recognition benefits many fields such a ...by speaker adaptation, this paper presents an Adaptive Hidden Markov model to recognize human face from frames sequence. The proposed model trains HMM on ...
    10 KB (1,640 words) - 09:46, 30 August 2017
  • ...etric learning algorithms because it uses a special optimization technique to solve the semi-definite programming (SDP) problem. ...etric to be positive semi-definite. Semi-definite programming is difficult to implement and does not scale well. Based on observation that any positive s ...
    9 KB (1,558 words) - 09:46, 30 August 2017
  • ...ome <math>\pm1</math> while some other cells are unknown. The main goal is to find matrix X such than it preserves the knowledge in Y, and predicts the v ...oblem of over-fitting in the prediction process. If the rank of X is equal to the rank of Y, we will have the trivial solution of X = Y. ...
    12 KB (2,046 words) - 09:45, 30 August 2017
  • ...umber of samples. Like other metric learning methods this paper also tries to optimize some cost function which is based one a similarity measure between The task is to learn a mapping from b(x) that project p-dimensional real valued input x on ...
    10 KB (1,792 words) - 09:46, 30 August 2017
  • ...-based implementation of a class based maximum entropy model, that allows to easily control the trade-off between memory complexity and computational ...training neural network language models with maximum entropy models leads to better performance in terms of computational complexity. ...
    9 KB (1,542 words) - 09:46, 30 August 2017
  • Note that <math>\displaystyle\lim_{N\to\infty}\tilde{\mu} = \bar{x}</math>. Also note that when <math>N = 0</math> ...mann as a Los Alamos code word for the stochastic simulations they applied to building better atomic bombs. ...
    5 KB (870 words) - 09:45, 30 August 2017
  • ...igh demand there is incentive to build systems that can respond seamlessly to requests. ...d opinion or fact-based content. The ability to do this would elevate them to the level of task-oriented conversational applications. ...
    11 KB (1,713 words) - 13:09, 20 March 2018
  • ...pecially trained to be applied on one dataset alone and might be difficult to use for non-experts in a more general setting (Perslev et al., 2019). ...r architectural tuning to be applied to variable data sets, and it is able to classify sleep stages at any temporal resolution (Perslev et al., 2019). ...
    8 KB (1,170 words) - 01:41, 26 November 2021
  • ...ransformers, to learn how exactly the vision transformer solves its tasks, to compare and contrast the results of these two different architectures, and ...ResNet model. Typical CNNs often suffer if the model is deep, largely due to vanishing gradients. ...
    13 KB (2,006 words) - 00:11, 17 November 2021
  • ...and kernel dependence measures based on RKHSs, and generalizes the measure to metric spaces. ...ween random variables is simple. However, testing independence is hard due to the unknown non-linearity of the data. There is a theorem that binds the tw ...
    8 KB (1,240 words) - 09:46, 30 August 2017
  • ...ial moving averages of squared past gradients, thereby limiting the update to only rely on the past few gradients. The following formula shows the per-pa ...is suggest that this can be prevented through novel but simple adjustments to the ADAM optimization algorithm, which can improve convergence. This paper ...
    13 KB (2,153 words) - 16:54, 20 April 2018
  • ...fic test instance, and ''clean-label'' attacks do not require the attacker to have control over the poison’s labeling. ...on a pretrained InceptionV3 network and sees up to 70% success rate on end-to-end trained scaled-down AlexNet architecture when using watermarks and mult ...
    11 KB (1,590 words) - 18:29, 26 November 2021
  • ...ression methods, marginal distribution of explanatory variables are needed to calculate the independency measurement. This paper proposes that conditiona ...ptions with respect to the probability distribution of X which can be hard to justify[ref]. Most of the previous regression methods assume linearity betw ...
    6 KB (1,132 words) - 09:46, 30 August 2017
  • ...>d</math> variables has its own special meaning and it may be desirable to come up with some directions, as principal components, each of which is a combin ...have a limited number of non-zero elements. In other words, this helps us to perform feature selection, by selecting a subset of features in each direct ...
    13 KB (2,202 words) - 09:45, 30 August 2017
  • from <math>P_o(X|\bar{X})</math>, which is trained to estimate the ground truth <math>P(X|\bar{X})</math> P(X) and its partition function is thus easier to approximate. ...
    12 KB (1,906 words) - 09:46, 30 August 2017
  • ...exhibit unexpected and unintuitive behaviour, allowing minor perturbations to cause a complete misclassification. In addition, the classifier may accurat ...a saliency detection method to determine the focus of the classifier, and to understand how the classifier makes its decisions. ...
    12 KB (1,840 words) - 14:09, 20 March 2018
  • ...of very small (3 × 3) convolution filters in all layers. As a result, they come up with significantly more accurate ConvNet architectures. During training, the only preprocessing step is to subtract the mean RBG value computed on the training data. Then, the image ...
    11 KB (1,680 words) - 09:46, 30 August 2017
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)