Outlier detection: Methods, models, and classification
A Boukerche, L Zheng, O Alfandi - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Over the past decade, we have witnessed an enormous amount of research effort dedicated
to the design of efficient outlier detection techniques while taking into consideration …
to the design of efficient outlier detection techniques while taking into consideration …
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems
Sharding is the prevalent approach to breaking the trilemma of simultaneously achieving
decentralization, security, and scalability in traditional blockchain systems, which are …
decentralization, security, and scalability in traditional blockchain systems, which are …
Rapidchain: Scaling blockchain via full sharding
A major approach to overcoming the performance and scalability limitations of current
blockchain protocols is to use sharding which is to split the overheads of processing …
blockchain protocols is to use sharding which is to split the overheads of processing …
Introduction to multi-armed bandits
A Slivkins - Foundations and Trends® in Machine Learning, 2019 - nowpublishers.com
Multi-armed bandits a simple but very powerful framework for algorithms that make
decisions over time under uncertainty. An enormous body of work has accumulated over the …
decisions over time under uncertainty. An enormous body of work has accumulated over the …
Laughing hyena distillery: Extracting compact recurrences from convolutions
Recent advances in attention-free sequence models rely on convolutions as alternatives to
the attention operator at the core of Transformers. In particular, long convolution sequence …
the attention operator at the core of Transformers. In particular, long convolution sequence …
The bitcoin backbone protocol: Analysis and applications
Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we
extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone …
extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone …
Detecting novel associations in large data sets
Identifying interesting relationships between pairs of variables in large data sets is
increasingly important. Here, we present a measure of dependence for two-variable …
increasingly important. Here, we present a measure of dependence for two-variable …
Sampling-based algorithms for optimal motion planning
S Karaman, E Frazzoli - The international journal of robotics …, 2011 - journals.sagepub.com
During the last decade, sampling-based path planning algorithms, such as probabilistic
roadmaps (PRM) and rapidly exploring random trees (RRT), have been shown to work well …
roadmaps (PRM) and rapidly exploring random trees (RRT), have been shown to work well …
Learning representations of ultrahigh-dimensional data for random distance-based outlier detection
Learning expressive low-dimensional representations of ultrahigh-dimensional data, eg,
data with thousands/millions of features, has been a major way to enable learning methods …
data with thousands/millions of features, has been a major way to enable learning methods …
Bitcoin as a transaction ledger: A composable treatment
Bitcoin is one of the most prominent examples of a distributed cryptographic protocol that is
extensively used in reality. Nonetheless, existing security proofs are property-based, and as …
extensively used in reality. Nonetheless, existing security proofs are property-based, and as …