Category: Git
Blog
Sensible Chuckle: The First `git commit` Message Of The Git Version Control System
Sensible Chuckle: The First
read moregit commit
Message Of The Git Version Control SystemCategory: Humor
Blog
Sensible Chuckle: The First `git commit` Message Of The Git Version Control System
Sensible Chuckle: The First
read moregit commit
Message Of The Git Version Control SystemCategory: Watercooler
Blog
Sensible Chuckle: The First `git commit` Message Of The Git Version Control System
Sensible Chuckle: The First
read moregit commit
Message Of The Git Version Control SystemCategory: Github
Category: Webdev
Category: Ai
Category: Docker
Category: Opensource
Category: Beginners
Category: Learning
Category: Lua
Category: Programming
Category: Ansible
Category: Linux
Category: Network
Category: Tooling
Category: Backend
Blog
Submitting GPU jobs to Slurm @ Loyola University Chicago
Submitting GPU jobs to Slurm @ Loyola University Chicago
read moreCategory: Hpc
Blog
Submitting GPU jobs to Slurm @ Loyola University Chicago
Submitting GPU jobs to Slurm @ Loyola University Chicago
read moreCategory: Slurm
Blog
Submitting GPU jobs to Slurm @ Loyola University Chicago
Submitting GPU jobs to Slurm @ Loyola University Chicago
read moreCategory: Softwareenginering
Blog
Submitting GPU jobs to Slurm @ Loyola University Chicago
Submitting GPU jobs to Slurm @ Loyola University Chicago
read moreCategory: ArXiv
Blog
A summary of Focal Loss for Dense Object Detection by Tsung-Yi Lin et al.
Posted in arXiv, 2018
read moreBlog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreCategory: Computerscience
Category: Database
Category: Softwareengineering
Category: Conferences
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreCategory: Costing
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreCategory: Focusing
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreCategory: Microcomputers
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreCategory: Operating Systems
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreCategory: Paper
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreBlog
A summary of Design and validation of precooked developer dashboards by Ivanov et al.
Posted in the ESEC/FSE 2018: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
read moreBlog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreCategory: Summary
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreBlog
A summary of Design and validation of precooked developer dashboards by Ivanov et al.
Posted in the ESEC/FSE 2018: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
read moreBlog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreBlog
A summary of Embracing Multimodal Data in Multimedia Data Analysis by Shu-Ching Chen et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of Where Are They Going? Clustering Event Camera Data to Detect and Track Moving Objects by Craig Laboni et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of Sustainable and Trustworthy Edge Machine Learning by Ivona Brandic
Posted in the IEEE Computing Edge, January 2023
read moreBlog
A summary of Trustworthy Machine Learning by Bhavani Thuraisingham et al.
Posted in the IEEE Computing Edge, January 2023
read moreBlog
A summary of The Ten Commandments of Ethical Medical AI by Heimo Muller et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Hidden Potential Within Video Game Consoles by Michael Mattioli et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Whack-a-Meltdown by Daniel Genkin and Yuval Yarom
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of COM-PACE: Compliance Aware Cloud Application Engineering Using Blockchain by Gagangeet Singh Aujla et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Smart Contracts In The Global South by Nir Kshetri et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Supercomputing In Python With Legate by Michael Bauer et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Interactive Supercomputing With Jupyter by Rollin Thomas et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Automated Payment Terminal Testing: How to Achieve Continuous Integration for Systems that are Almost Impossible to Virtualize by Martin Gloor et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Toward Fail Safety for Security Decisions by Trent Jaeger
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Pervasive Security and Privacy by - A Brief Reflection on Challenges and Opportunities by Florian Alt
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Economics of Artificial Intelligence in Cybersecurity by Nir Kshetri
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Sentiment Analysis and Topic Recognition in Video Transcripts by Lukas Stappen et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Advances in Human Activity Recognition by Gulustan Dogan
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Challenges and Opportunities for Autonomous Micro-UAVs in Precision Agriculture by Xu Liu et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Efficient Computer Vision for Embedded Systems by George K. Thiruvathukal and Yung-Hsiang Lu
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of On Being a Scientist: A Guide To Responsible Conduct In Research by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
Authored by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
read moreBlog
A summary of A Convolutional Neural Network Cascade for Face Detection by Haoxiang Li et al.
Posted in in CVPR, 2015
read moreBlog
A summary of by SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation by Vijay Badrinarayanan et al.
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2017
read moreBlog
A summary of Fully Convolutional Networks for Semantic Segmentation by Jonathan Long et al.
Posted in arXiv, 2015
read moreBlog
A summary of Focal Loss for Dense Object Detection by Tsung-Yi Lin et al.
Posted in arXiv, 2018
read moreBlog
A summary of Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks by Shaoqing Ren et al.
Posted in the IEEE Transactions on Patterns Analysis and Machine Intelligence, 2017
read moreBlog
A summary of Deep Residual Learning for Image Recognition by Kaiming He et al.
Posted in arXiv, 2015
read moreBlog
A summary of Distinctive Image Features from Scale-Invariant Keypoints by David G. Lowe
Posted in the International Journal of Computer Vision, 2004
read moreBlog
A summary of Hidden Technical Debt in Machine Learning Systems by D. Sculley et al.
Posted in the Proceedings of NeurIPS, 2015
read moreBlog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreBlog
A summary of Rich feature hierarchies for accurate object detection and semantic segmentation by Ross Girshick et al.
Posted in the Proceedings of CVPR, 2014
read moreBlog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreBlog
A summary of Small World with High Risks: A Study of Security Threats in the npm Ecosystem by Markus Zimmermann et al.
Posted in the Proceedings of the 28th USENIX Security Symposium; 2019
read moreBlog
A summary of "What are Weak Links in the npm Supply Chain?", by Nusrat Zahan et al.
Posted in the Proceedings of ICSE-SEIP 2022
read moreBlog
A summary of How Developers and Managers Define and Trade Productivity for Quality by Margaret-Anne Storey et al.
Published in the proceeding of the 2022 CHASE confrence
read moreBlog
A summary of Robust Real Time-Face Detection by P. Viola and M.J. Jones
Published in the 2004 International Journal of Computer Vision
read moreBlog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreBlog
A summary of How to implement SVMs by John Platt
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Applying SVMs to Face Detection by Edgar Osuna
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Using SVMs For Text Categorization by Susan Dumais et al
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of SVMs - A Practical Consequence of Learning Theory by Bernhard Scholkopf
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreBlog
A summary of ImageNet Classification with Deep Convolutional Neural Networks by Krizhevsky et al.
Published in the 60th volume, number 6 Communications of the ACM in 2017
read moreBlog
A summary of Very Deep Convolutional Networks for Large-Scale Image Recognition by Karen Simonyan and Andrew Zisserman
Published as a conference paper at ICLR 2015
read moreBlog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreBlog
A summary of How to Read a Paper by S. Keshav
Published in the 37th volume, issue 3 of the ACM SIGCOMM Computer Communication Review in 2007
read moreCategory: Technical Requirements
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreCategory: Virtualization
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreCategory: Software and Its Engineering
Blog
A summary of Design and validation of precooked developer dashboards by Ivanov et al.
Posted in the ESEC/FSE 2018: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
read moreBlog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreCategory: Software Creation and Management
Blog
A summary of Design and validation of precooked developer dashboards by Ivanov et al.
Posted in the ESEC/FSE 2018: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
read moreBlog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreCategory: Software Development Process Management
Blog
A summary of Design and validation of precooked developer dashboards by Ivanov et al.
Posted in the ESEC/FSE 2018: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
read moreCategory: Maintaining Software
Blog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreCategory: Reuhttps://Doi.org/10.1145/3023956.3023967sability
Blog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreCategory: Software Product Lines
Blog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreCategory: Software System Structures
Blog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreCategory: Cameras
Category: Cloud Computing
Category: Mobile Communication
Category: Multimedia Communication
Category: Navigation
Category: Streaming Media
Category: Article
Blog
A summary of Embracing Multimodal Data in Multimedia Data Analysis by Shu-Ching Chen et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of Where Are They Going? Clustering Event Camera Data to Detect and Track Moving Objects by Craig Laboni et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of Sustainable and Trustworthy Edge Machine Learning by Ivona Brandic
Posted in the IEEE Computing Edge, January 2023
read moreBlog
A summary of Trustworthy Machine Learning by Bhavani Thuraisingham et al.
Posted in the IEEE Computing Edge, January 2023
read moreBlog
A summary of The Ten Commandments of Ethical Medical AI by Heimo Muller et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Hidden Potential Within Video Game Consoles by Michael Mattioli et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Whack-a-Meltdown by Daniel Genkin and Yuval Yarom
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of COM-PACE: Compliance Aware Cloud Application Engineering Using Blockchain by Gagangeet Singh Aujla et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Smart Contracts In The Global South by Nir Kshetri et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Supercomputing In Python With Legate by Michael Bauer et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Interactive Supercomputing With Jupyter by Rollin Thomas et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Automated Payment Terminal Testing: How to Achieve Continuous Integration for Systems that are Almost Impossible to Virtualize by Martin Gloor et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Toward Fail Safety for Security Decisions by Trent Jaeger
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Pervasive Security and Privacy by - A Brief Reflection on Challenges and Opportunities by Florian Alt
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Economics of Artificial Intelligence in Cybersecurity by Nir Kshetri
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Sentiment Analysis and Topic Recognition in Video Transcripts by Lukas Stappen et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Advances in Human Activity Recognition by Gulustan Dogan
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Challenges and Opportunities for Autonomous Micro-UAVs in Precision Agriculture by Xu Liu et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Efficient Computer Vision for Embedded Systems by George K. Thiruvathukal and Yung-Hsiang Lu
Posted in IEEE Computing Edge, December 2022
read moreCategory: Eic Message
Blog
A summary of Embracing Multimodal Data in Multimedia Data Analysis by Shu-Ching Chen et al.
Posted in the IEEE Computing Edge, February 2023
read moreCategory: Magazine
Blog
A summary of Embracing Multimodal Data in Multimedia Data Analysis by Shu-Ching Chen et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of Where Are They Going? Clustering Event Camera Data to Detect and Track Moving Objects by Craig Laboni et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of Sustainable and Trustworthy Edge Machine Learning by Ivona Brandic
Posted in the IEEE Computing Edge, January 2023
read moreBlog
A summary of Trustworthy Machine Learning by Bhavani Thuraisingham et al.
Posted in the IEEE Computing Edge, January 2023
read moreBlog
A summary of The Ten Commandments of Ethical Medical AI by Heimo Muller et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Hidden Potential Within Video Game Consoles by Michael Mattioli et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Whack-a-Meltdown by Daniel Genkin and Yuval Yarom
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of COM-PACE: Compliance Aware Cloud Application Engineering Using Blockchain by Gagangeet Singh Aujla et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Smart Contracts In The Global South by Nir Kshetri et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Supercomputing In Python With Legate by Michael Bauer et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Interactive Supercomputing With Jupyter by Rollin Thomas et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Automated Payment Terminal Testing: How to Achieve Continuous Integration for Systems that are Almost Impossible to Virtualize by Martin Gloor et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Toward Fail Safety for Security Decisions by Trent Jaeger
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Pervasive Security and Privacy by - A Brief Reflection on Challenges and Opportunities by Florian Alt
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Economics of Artificial Intelligence in Cybersecurity by Nir Kshetri
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Sentiment Analysis and Topic Recognition in Video Transcripts by Lukas Stappen et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Advances in Human Activity Recognition by Gulustan Dogan
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Challenges and Opportunities for Autonomous Micro-UAVs in Precision Agriculture by Xu Liu et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Efficient Computer Vision for Embedded Systems by George K. Thiruvathukal and Yung-Hsiang Lu
Posted in IEEE Computing Edge, December 2022
read moreCategory: Internet of Things
Blog
A summary of Where Are They Going? Clustering Event Camera Data to Detect and Track Moving Objects by Craig Laboni et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of COM-PACE: Compliance Aware Cloud Application Engineering Using Blockchain by Gagangeet Singh Aujla et al.
Posted in the IEEE Computing Edge, October 2022
read moreCategory: View From the Cloud
Blog
A summary of Sustainable and Trustworthy Edge Machine Learning by Ivona Brandic
Posted in the IEEE Computing Edge, January 2023
read moreCategory: Ai Focus
Blog
A summary of Trustworthy Machine Learning by Bhavani Thuraisingham et al.
Posted in the IEEE Computing Edge, January 2023
read moreCategory: Artificial Intelligence
Blog
A summary of The Ten Commandments of Ethical Medical AI by Heimo Muller et al.
Posted in the IEEE Computing Edge, October 2022
read moreCategory: Machine Learning
Blog
A summary of The Ten Commandments of Ethical Medical AI by Heimo Muller et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreCategory: Security
Blog
A summary of Hidden Potential Within Video Game Consoles by Michael Mattioli et al.
Posted in the IEEE Computing Edge, October 2022
read moreCategory: People
Blog
A summary of COM-PACE: Compliance Aware Cloud Application Engineering Using Blockchain by Gagangeet Singh Aujla et al.
Posted in the IEEE Computing Edge, October 2022
read moreCategory: Processes
Blog
A summary of COM-PACE: Compliance Aware Cloud Application Engineering Using Blockchain by Gagangeet Singh Aujla et al.
Posted in the IEEE Computing Edge, October 2022
read moreCategory: It Economics
Blog
A summary of Smart Contracts In The Global South by Nir Kshetri et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Economics of Artificial Intelligence in Cybersecurity by Nir Kshetri
Posted in IEEE Computing Edge, December 2022
read moreCategory: Scientific Programming
Blog
A summary of Supercomputing In Python With Legate by Michael Bauer et al.
Posted in the IEEE Computing Edge, October 2022
read moreCategory: Leadership Computing
Blog
A summary of Interactive Supercomputing With Jupyter by Rollin Thomas et al.
Posted in the IEEE Computing Edge, October 2022
read moreCategory: From the Editors
Blog
A summary of Toward Fail Safety for Security Decisions by Trent Jaeger
Posted in IEEE Computing Edge, December 2022
read moreCategory: Pervasive Security and Privacy
Blog
A summary of Pervasive Security and Privacy by - A Brief Reflection on Challenges and Opportunities by Florian Alt
Posted in IEEE Computing Edge, December 2022
read moreCategory: Affective Computing and Sentiment Analysis
Blog
A summary of Sentiment Analysis and Topic Recognition in Video Transcripts by Lukas Stappen et al.
Posted in IEEE Computing Edge, December 2022
read moreCategory: Expert Opinion
Blog
A summary of Challenges and Opportunities for Autonomous Micro-UAVs in Precision Agriculture by Xu Liu et al.
Posted in IEEE Computing Edge, December 2022
read moreCategory: Discussion
Blog
A summary of Efficient Computer Vision for Embedded Systems by George K. Thiruvathukal and Yung-Hsiang Lu
Posted in IEEE Computing Edge, December 2022
read moreCategory: Round Table
Blog
A summary of Efficient Computer Vision for Embedded Systems by George K. Thiruvathukal and Yung-Hsiang Lu
Posted in IEEE Computing Edge, December 2022
read moreCategory: Book
Blog
A summary of On Being a Scientist: A Guide To Responsible Conduct In Research by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
Authored by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
read moreCategory: Diversity
Category: Leadership
Category: Ethics
Blog
A summary of On Being a Scientist: A Guide To Responsible Conduct In Research by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
Authored by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
read moreCategory: Responsible Conduct in Research
Blog
A summary of On Being a Scientist: A Guide To Responsible Conduct In Research by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
Authored by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
read moreCategory: Research
Category: Research Ethics
Category: Blog
Blog
The Age Rule: A Media Consumption Proposal
The Age Rule is an idea that I have to assist in the consumption of media.
read moreBlog
Hugo, Gopher, Gemini, and Annoyances
My story with setting up a Gopher and Gemini compatible website powered by Hugo
read moreCategory: 2015
Blog
A summary of Hidden Technical Debt in Machine Learning Systems by D. Sculley et al.
Posted in the Proceedings of NeurIPS, 2015
read moreBlog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreBlog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreBlog
A summary of Very Deep Convolutional Networks for Large-Scale Image Recognition by Karen Simonyan and Andrew Zisserman
Published as a conference paper at ICLR 2015
read moreCategory: 2018
Blog
A summary of Focal Loss for Dense Object Detection by Tsung-Yi Lin et al.
Posted in arXiv, 2018
read moreCategory: 2016
Category: CVPR
Blog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreBlog
A summary of Rich feature hierarchies for accurate object detection and semantic segmentation by Ross Girshick et al.
Posted in the Proceedings of CVPR, 2014
read moreCategory: Attention Mechanism
Category: Attentive Deep Local Features
Category: Attentive Local Feature Descriptor
Category: Convolutional Neural Networks
Category: DELE
Category: Feature Matching
Category: Geometric Verification
Category: Global Descriptors
Category: Google-Landmarks Dataset
Category: Image-Level Annotations
Category: Keypoint Detectors
Category: Landmark Image Dataset
Category: Large-Scale Dataset
Category: Large-Scale Image Retrieval
Category: Local Descriptors
Category: Network Layers
Category: Variable Scales
Category: Hessian Matrix
Category: Integral Image
Category: Interest Point
Category: Robust Feature
Category: Viewpoint Change
Category: 2004
Blog
A summary of Distinctive Image Features from Scale-Invariant Keypoints by David G. Lowe
Posted in the International Journal of Computer Vision, 2004
read moreBlog
A summary of Robust Real Time-Face Detection by P. Viola and M.J. Jones
Published in the 2004 International Journal of Computer Vision
read moreCategory: ICJV
Blog
A summary of Distinctive Image Features from Scale-Invariant Keypoints by David G. Lowe
Posted in the International Journal of Computer Vision, 2004
read moreCategory: Image Matching
Blog
A summary of Distinctive Image Features from Scale-Invariant Keypoints by David G. Lowe
Posted in the International Journal of Computer Vision, 2004
read moreCategory: Invariant Features
Blog
A summary of Distinctive Image Features from Scale-Invariant Keypoints by David G. Lowe
Posted in the International Journal of Computer Vision, 2004
read moreCategory: Object Recognition
Blog
A summary of Distinctive Image Features from Scale-Invariant Keypoints by David G. Lowe
Posted in the International Journal of Computer Vision, 2004
read moreCategory: Scale Invariance
Blog
A summary of Distinctive Image Features from Scale-Invariant Keypoints by David G. Lowe
Posted in the International Journal of Computer Vision, 2004
read moreCategory: NeurIPS
Blog
A summary of Hidden Technical Debt in Machine Learning Systems by D. Sculley et al.
Posted in the Proceedings of NeurIPS, 2015
read moreCategory: Computer Architecture
Blog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreCategory: Feature Extraction
Blog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreCategory: Object Detection
Blog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreBlog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreCategory: Open Source Software
Blog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreCategory: Pipelines
Blog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreCategory: Proposals
Blog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreCategory: Training
Blog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreCategory: 2014
Blog
A summary of Rich feature hierarchies for accurate object detection and semantic segmentation by Ross Girshick et al.
Posted in the Proceedings of CVPR, 2014
read moreBlog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreCategory: 1998
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreBlog
A summary of How to implement SVMs by John Platt
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Applying SVMs to Face Detection by Edgar Osuna
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Using SVMs For Text Categorization by Susan Dumais et al
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of SVMs - A Practical Consequence of Learning Theory by Bernhard Scholkopf
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: Bootstrapping
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreCategory: Classifier Combination
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreCategory: Decision Combination
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreCategory: Decision Forest
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreCategory: Decision Tree
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreCategory: Multiple-Classifier System
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreCategory: Pattern Recognition
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreCategory: Stochastic Discrimination
Blog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreCategory: Nature
Category: 2019
Blog
A summary of Small World with High Risks: A Study of Security Threats in the npm Ecosystem by Markus Zimmermann et al.
Posted in the Proceedings of the 28th USENIX Security Symposium; 2019
read moreCategory: USENIX Security Symposium
Blog
A summary of Small World with High Risks: A Study of Security Threats in the npm Ecosystem by Markus Zimmermann et al.
Posted in the Proceedings of the 28th USENIX Security Symposium; 2019
read moreCategory: 2022
Blog
A summary of "What are Weak Links in the npm Supply Chain?", by Nusrat Zahan et al.
Posted in the Proceedings of ICSE-SEIP 2022
read moreCategory: ICSE-SEIP
Blog
A summary of "What are Weak Links in the npm Supply Chain?", by Nusrat Zahan et al.
Posted in the Proceedings of ICSE-SEIP 2022
read moreCategory: Npm
Blog
A summary of "What are Weak Links in the npm Supply Chain?", by Nusrat Zahan et al.
Posted in the Proceedings of ICSE-SEIP 2022
read moreCategory: Software Ecosystem
Blog
A summary of "What are Weak Links in the npm Supply Chain?", by Nusrat Zahan et al.
Posted in the Proceedings of ICSE-SEIP 2022
read moreCategory: Supply Chain Security
Blog
A summary of "What are Weak Links in the npm Supply Chain?", by Nusrat Zahan et al.
Posted in the Proceedings of ICSE-SEIP 2022
read moreCategory: Weak Link Signal
Blog
A summary of "What are Weak Links in the npm Supply Chain?", by Nusrat Zahan et al.
Posted in the Proceedings of ICSE-SEIP 2022
read moreCategory: Management
Blog
A summary of How Developers and Managers Define and Trade Productivity for Quality by Margaret-Anne Storey et al.
Published in the proceeding of the 2022 CHASE confrence
read moreCategory: Software
Blog
A summary of How Developers and Managers Define and Trade Productivity for Quality by Margaret-Anne Storey et al.
Published in the proceeding of the 2022 CHASE confrence
read moreCategory: Software Creation
Blog
A summary of How Developers and Managers Define and Trade Productivity for Quality by Margaret-Anne Storey et al.
Published in the proceeding of the 2022 CHASE confrence
read moreCategory: Software Engineering
Blog
A summary of How Developers and Managers Define and Trade Productivity for Quality by Margaret-Anne Storey et al.
Published in the proceeding of the 2022 CHASE confrence
read moreCategory: Boosting
Blog
A summary of Robust Real Time-Face Detection by P. Viola and M.J. Jones
Published in the 2004 International Journal of Computer Vision
read moreCategory: Face Detection
Blog
A summary of Robust Real Time-Face Detection by P. Viola and M.J. Jones
Published in the 2004 International Journal of Computer Vision
read moreBlog
A summary of Applying SVMs to Face Detection by Edgar Osuna
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: Human Sensing
Blog
A summary of Robust Real Time-Face Detection by P. Viola and M.J. Jones
Published in the 2004 International Journal of Computer Vision
read moreCategory: International Journal of Computer Vision
Blog
A summary of Robust Real Time-Face Detection by P. Viola and M.J. Jones
Published in the 2004 International Journal of Computer Vision
read moreCategory: Cam
Blog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreCategory: Class Activation Mapping
Blog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreCategory: CNN
Blog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreBlog
A summary of Very Deep Convolutional Networks for Large-Scale Image Recognition by Karen Simonyan and Andrew Zisserman
Published as a conference paper at ICLR 2015
read moreCategory: DL
Blog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreCategory: CV
Blog
A summary of How to implement SVMs by John Platt
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Applying SVMs to Face Detection by Edgar Osuna
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Very Deep Convolutional Networks for Large-Scale Image Recognition by Karen Simonyan and Andrew Zisserman
Published as a conference paper at ICLR 2015
read moreBlog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreCategory: IEEE Intelligent Systems
Blog
A summary of How to implement SVMs by John Platt
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Applying SVMs to Face Detection by Edgar Osuna
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Using SVMs For Text Categorization by Susan Dumais et al
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of SVMs - A Practical Consequence of Learning Theory by Bernhard Scholkopf
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: Implementation
Blog
A summary of How to implement SVMs by John Platt
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: Ml
Blog
A summary of How to implement SVMs by John Platt
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Applying SVMs to Face Detection by Edgar Osuna
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Using SVMs For Text Categorization by Susan Dumais et al
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of SVMs - A Practical Consequence of Learning Theory by Bernhard Scholkopf
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreCategory: SVMs
Blog
A summary of How to implement SVMs by John Platt
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Applying SVMs to Face Detection by Edgar Osuna
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of SVMs - A Practical Consequence of Learning Theory by Bernhard Scholkopf
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: Applications
Blog
A summary of Using SVMs For Text Categorization by Susan Dumais et al
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: SVM
Blog
A summary of Using SVMs For Text Categorization by Susan Dumais et al
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: Text Categorization
Blog
A summary of Using SVMs For Text Categorization by Susan Dumais et al
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: Learning Theory
Blog
A summary of SVMs - A Practical Consequence of Learning Theory by Bernhard Scholkopf
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: Theory
Blog
A summary of SVMs - A Practical Consequence of Learning Theory by Bernhard Scholkopf
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreCategory: 2013
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: Clocks
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: Hardware
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: IEEE HPCA
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: Memory Management
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: Random Access Memory
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: Runtime
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: System-on-Chip
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: Xenon
Blog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreCategory: 2017
Blog
A summary of ImageNet Classification with Deep Convolutional Neural Networks by Krizhevsky et al.
Published in the 60th volume, number 6 Communications of the ACM in 2017
read moreCategory: Communications of the ACM
Blog
A summary of ImageNet Classification with Deep Convolutional Neural Networks by Krizhevsky et al.
Published in the 60th volume, number 6 Communications of the ACM in 2017
read moreCategory: Computer Vision
Blog
A summary of ImageNet Classification with Deep Convolutional Neural Networks by Krizhevsky et al.
Published in the 60th volume, number 6 Communications of the ACM in 2017
read moreBlog
A summary of Very Deep Convolutional Networks for Large-Scale Image Recognition by Karen Simonyan and Andrew Zisserman
Published as a conference paper at ICLR 2015
read moreBlog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreCategory: Deep Learning
Blog
A summary of ImageNet Classification with Deep Convolutional Neural Networks by Krizhevsky et al.
Published in the 60th volume, number 6 Communications of the ACM in 2017
read moreCategory: GPU
Blog
A summary of ImageNet Classification with Deep Convolutional Neural Networks by Krizhevsky et al.
Published in the 60th volume, number 6 Communications of the ACM in 2017
read moreCategory: ImageNet
Blog
A summary of ImageNet Classification with Deep Convolutional Neural Networks by Krizhevsky et al.
Published in the 60th volume, number 6 Communications of the ACM in 2017
read moreCategory: ICLR
Blog
A summary of Very Deep Convolutional Networks for Large-Scale Image Recognition by Karen Simonyan and Andrew Zisserman
Published as a conference paper at ICLR 2015
read moreCategory: ArXive
Blog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreCategory: Machine Learning Architecture
Blog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreCategory: 2007
Blog
A summary of How to Read a Paper by S. Keshav
Published in the 37th volume, issue 3 of the ACM SIGCOMM Computer Communication Review in 2007
read moreCategory: ACM
Blog
A summary of How to Read a Paper by S. Keshav
Published in the 37th volume, issue 3 of the ACM SIGCOMM Computer Communication Review in 2007
read moreCategory: ACM SIGCOMM
Blog
A summary of How to Read a Paper by S. Keshav
Published in the 37th volume, issue 3 of the ACM SIGCOMM Computer Communication Review in 2007
read moreCategory: ACM SIGCOMM Computer Communication Review
Blog
A summary of How to Read a Paper by S. Keshav
Published in the 37th volume, issue 3 of the ACM SIGCOMM Computer Communication Review in 2007
read moreCategory: Meta
Blog
A summary of How to Read a Paper by S. Keshav
Published in the 37th volume, issue 3 of the ACM SIGCOMM Computer Communication Review in 2007
read moreCategory: SIGCOMM
Blog
A summary of How to Read a Paper by S. Keshav
Published in the 37th volume, issue 3 of the ACM SIGCOMM Computer Communication Review in 2007
read moreCategory: Gemini
Blog
Hugo, Gopher, Gemini, and Annoyances
My story with setting up a Gopher and Gemini compatible website powered by Hugo
read moreCategory: Gopher
Blog
Hugo, Gopher, Gemini, and Annoyances
My story with setting up a Gopher and Gemini compatible website powered by Hugo
read moreCategory: Jam Stack
Blog
Hugo, Gopher, Gemini, and Annoyances
My story with setting up a Gopher and Gemini compatible website powered by Hugo
read moreCategory: Web Dev
Blog
Hugo, Gopher, Gemini, and Annoyances
My story with setting up a Gopher and Gemini compatible website powered by Hugo
read more