Skip to main content

Showing 1–7 of 7 results for author: Rahman, A A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.07189  [pdf, ps, other

    cs.IT cond-mat.dis-nn math-ph math.ST

    A multiscale cavity method for sublinear-rank symmetric matrix factorization

    Authors: Jean Barbier, Justin Ko, Anas A. Rahman

    Abstract: We consider a statistical model for symmetric matrix factorization with additive Gaussian noise in the high-dimensional regime where the rank $M$ of the signal matrix to infer scales with its size $N$ as $M = o(N^{1/10})$. Allowing for a $N$-dependent rank offers new challenges and requires new methods. Working in the Bayesian-optimal setting, we show that whenever the signal has i.i.d. entries th… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  2. arXiv:2307.05979  [pdf, other

    cs.LG cs.AI cs.CV

    Transformers in Reinforcement Learning: A Survey

    Authors: Pranav Agarwal, Aamer Abdul Rahman, Pierre-Luc St-Charles, Simon J. D. Prince, Samira Ebrahimi Kahou

    Abstract: Transformers have significantly impacted domains like natural language processing, computer vision, and robotics, where they improve performance compared to other neural networks. This survey explores how transformers are used in reinforcement learning (RL), where they are seen as a promising solution for addressing challenges such as unstable training, credit assignment, lack of interpretability,… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 35 pages, 11 figures

  3. arXiv:2211.15071  [pdf, other

    cs.CV

    Pitfalls of Conditional Batch Normalization for Contextual Multi-Modal Learning

    Authors: Ivaxi Sheth, Aamer Abdul Rahman, Mohammad Havaei, Samira Ebrahimi Kahou

    Abstract: Humans have perfected the art of learning from multiple modalities through sensory organs. Despite their impressive predictive performance on a single modality, neural networks cannot reach human level accuracy with respect to multiple modalities. This is a particularly challenging task due to variations in the structure of respective modalities. Conditional Batch Normalization (CBN) is a popular… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: Accepted at ICBINB workshop @ NeurIPS 2022

  4. arXiv:2207.01338  [pdf, ps, other

    cs.LO

    Formal Verification of Safety Properties Using Interpolation and k-induction

    Authors: Tephilla Prince, Atif Abdur Rahman, Sheerazuddin Syed

    Abstract: This technical report presents implementation of two symbolic model checking algorithms that use SAT/SMT Solvers, namely interpolation based model checking and k-induction based model checking. We also do a comparative analysis of these two model checking algorithms.

    Submitted 4 July, 2022; originally announced July 2022.

    MSC Class: 68Q60 ACM Class: F.3.1; D.2.4; I.6.4

  5. arXiv:1206.0988  [pdf

    cs.DC

    Virtualization Implementation Model for Cost Effective & Efficient Data Centers

    Authors: Mueen Uddin, Azizah Abdul Rahman

    Abstract: Data centers form a key part of the infrastructure upon which a variety of information technology services are built. They provide the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous increase in the demand for energy consumption. These data centers not only… ▽ More

    Submitted 7 April, 2012; originally announced June 2012.

    Comments: 6 pages, 1 Figure, Journal Paper. arXiv admin note: substantial text overlap with arXiv:1010.5037

    Journal ref: International Journal of Advanced Computer Science and Applications, (IJACSA) Vol. 2, No.1, January 2011 pg. 69-74

  6. arXiv:1010.5037  [pdf

    cs.OH

    Server Consolidation: An Approach to make Data Centers Energy Efficient and Green

    Authors: Mueen Uddin, Azizah Abdul Rahman

    Abstract: Data centers are the building blocks of IT business organizations providing the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous increase in the demand for energy consumption. These data centers not only consume a tremendous amount of energy but are riddled w… ▽ More

    Submitted 25 October, 2010; originally announced October 2010.

    Comments: 7 pages, IJSER Journal accepted paper

    Journal ref: International Journal of Scientific & Engineering Research, Volume 1, Issue 1, October-2010

  7. arXiv:1010.5036  [pdf

    cs.CR

    Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents

    Authors: Mueen Uddin, Azizah Abdul Rahman

    Abstract: Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial that efficient scalable techniques should be developed for IDS systems. Signature based detection is the most extensively used threat detection technique for Intrusion Detection Systems (IDS). One of the foremost challenges… ▽ More

    Submitted 25 October, 2010; originally announced October 2010.

    Comments: 13 pages, IJNSA Journal Accepted Paper

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010