Alert button
Picture for Akshay Rangamani

Akshay Rangamani

Alert button

Neural-guided, Bidirectional Program Search for Abstraction and Reasoning

Add code
Bookmark button
Alert button
Oct 26, 2021
Simon Alford, Anshula Gandhi, Akshay Rangamani, Andrzej Banburski, Tony Wang, Sylee Dandekar, John Chin, Tomaso Poggio, Peter Chin

Figure 1 for Neural-guided, Bidirectional Program Search for Abstraction and Reasoning
Figure 2 for Neural-guided, Bidirectional Program Search for Abstraction and Reasoning
Figure 3 for Neural-guided, Bidirectional Program Search for Abstraction and Reasoning
Figure 4 for Neural-guided, Bidirectional Program Search for Abstraction and Reasoning
Viaarxiv icon

For interpolating kernel machines, the minimum norm ERM solution is the most stable

Add code
Bookmark button
Alert button
Jun 28, 2020
Akshay Rangamani, Lorenzo Rosasco, Tomaso Poggio

Figure 1 for For interpolating kernel machines, the minimum norm ERM solution is the most stable
Figure 2 for For interpolating kernel machines, the minimum norm ERM solution is the most stable
Viaarxiv icon

A Scale Invariant Flatness Measure for Deep Network Minima

Add code
Bookmark button
Alert button
Feb 06, 2019
Akshay Rangamani, Nam H. Nguyen, Abhishek Kumar, Dzung Phan, Sang H. Chin, Trac D. Tran

Figure 1 for A Scale Invariant Flatness Measure for Deep Network Minima
Figure 2 for A Scale Invariant Flatness Measure for Deep Network Minima
Figure 3 for A Scale Invariant Flatness Measure for Deep Network Minima
Figure 4 for A Scale Invariant Flatness Measure for Deep Network Minima
Viaarxiv icon

Automated software vulnerability detection with machine learning

Add code
Bookmark button
Alert button
Aug 02, 2018
Jacob A. Harer, Louis Y. Kim, Rebecca L. Russell, Onur Ozdemir, Leonard R. Kosta, Akshay Rangamani, Lei H. Hamilton, Gabriel I. Centeno, Jonathan R. Key, Paul M. Ellingwood, Erik Antelman, Alan Mackay, Marc W. McConley, Jeffrey M. Opper, Peter Chin, Tomo Lazovich

Figure 1 for Automated software vulnerability detection with machine learning
Figure 2 for Automated software vulnerability detection with machine learning
Figure 3 for Automated software vulnerability detection with machine learning
Figure 4 for Automated software vulnerability detection with machine learning
Viaarxiv icon

Sparse Coding and Autoencoders

Add code
Bookmark button
Alert button
Oct 20, 2017
Akshay Rangamani, Anirbit Mukherjee, Amitabh Basu, Tejaswini Ganapathy, Ashish Arora, Sang Chin, Trac D. Tran

Figure 1 for Sparse Coding and Autoencoders
Figure 2 for Sparse Coding and Autoencoders
Viaarxiv icon