Exploring concepts in category theory and abstract algebra -- in particular, functors and comonads -- to solve problems in analyzing, modeling, and implementing digital image filters, with possible extensions to signal processing and numerical algorithms in general.
APL is an interesting beast, with an immense level of expressiveness locked away in a syntax that instantly scares away all but the initiated.
In this talk, we'll take a gentle introduction to APL and demonstrate its power to implement complex algorithms in very little code. We'll compare examples with equivalents in C# to illustrate why APL is much better suited as a "thinking tool" for programmers.
APL is an interesting beast, with an immense level of expressiveness locked away in a syntax that instantly scares away all but the initiated.
In this talk, we'll take a gentle introduction to APL and demonstrate its power to implement complex algorithms in very little code. We'll compare examples with equivalents in C# to illustrate why APL is much better suited as a "thinking tool" for programmers.
Paper Study: Melding the data decision pipelineChenYiHuang5
Melding the data decision pipeline: Decision-Focused Learning for Combinatorial Optimization from AAAI2019.
Derive the math equation from myself and match the same result as two mentioned CMU papers [Donti et. al. 2017, Amos et. al. 2017] while applying the same derivation procedure.
a paper review. This presentation introduces Abductive Commonsense Reasoning which is the published paper in ICLR 2020. In this paper, the authors use commonsense to generate plausible hypotheses. They generate new data set 'ART' and propose new models for 'aNLI', 'aNLG' using BERT, and GPT.
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Umbra Ignite 2015: Rulon Raymond – The State of Skinning – a dive into modern...Umbra Software
Rulon Raymond was the keynote speaker of Umbra Ignite. His talk “The State of Skinning – a dive into modern approaches to model skinning” leads us in to a quick yet deep journey through real time skinning trends.
Incremental View Maintenance for openCypher QueriesGábor Szárnyas
Presented at the Fourth openCypher Implementers Meeting
Numerous graph use cases require continuous evaluation of queries over a constantly changing data set, e.g. fraud detection in financial systems, recommendations, and checking integrity constraints. For relational systems, incremental view maintenance has been researched for three decades, resulting in a wide body of literature. The property graph data model and the openCypher language, however, are recent developments, and therefore lack established techniques to perform efficient view maintenance. In this talk, we give an overview of the view maintenance problem for property graphs, discuss why it is particularly difficult and present an approach that tackles a meaningful subset of the language.
This is a slide for Fully Convolutional Refined Auto-Encoding Generative Adversarial Networks for 3D Multi Object Scenes which is my work at Stanford AI Lab as a visiting scholar.
Special thanks to Christopher Choy and Prof. Silvio Savarese.
Github:
https://github.com/yunishi3/3D-FCR-alphaGAN
Similar to Functors, Comonads, and Digital Image Processing (20)
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
No unifying framework; ad-hoc. Cannot be analyzed meaningfully across different types as composition. Multiple implementations means more bugs, optimizations yield less returns. Must be a better way.
Once you get a category with composition, you can do lots of crazy analysis
Actually a very surprising result that these can compose meaningfully if and only iff W is a comonad.
New composition => new category => opens up worlds of analysis
The fact that you can do this in a meaningful way is also surprising