Picture for David G. Andersen

David G. Andersen

Google Brain

Accelerating Deep Learning by Focusing on the Biggest Losers

Add code
Oct 02, 2019
Figure 1 for Accelerating Deep Learning by Focusing on the Biggest Losers
Figure 2 for Accelerating Deep Learning by Focusing on the Biggest Losers
Figure 3 for Accelerating Deep Learning by Focusing on the Biggest Losers
Figure 4 for Accelerating Deep Learning by Focusing on the Biggest Losers
Viaarxiv icon

Scaling Video Analytics on Constrained Edge Nodes

Add code
May 24, 2019
Figure 1 for Scaling Video Analytics on Constrained Edge Nodes
Figure 2 for Scaling Video Analytics on Constrained Edge Nodes
Figure 3 for Scaling Video Analytics on Constrained Edge Nodes
Figure 4 for Scaling Video Analytics on Constrained Edge Nodes
Viaarxiv icon

SysML: The New Frontier of Machine Learning Systems

Add code
May 01, 2019
Viaarxiv icon

EDF: Ensemble, Distill, and Fuse for Easy Video Labeling

Add code
Dec 10, 2018
Figure 1 for EDF: Ensemble, Distill, and Fuse for Easy Video Labeling
Figure 2 for EDF: Ensemble, Distill, and Fuse for Easy Video Labeling
Figure 3 for EDF: Ensemble, Distill, and Fuse for Easy Video Labeling
Figure 4 for EDF: Ensemble, Distill, and Fuse for Easy Video Labeling
Viaarxiv icon

3LC: Lightweight and Effective Traffic Compression for Distributed Machine Learning

Add code
Feb 21, 2018
Figure 1 for 3LC: Lightweight and Effective Traffic Compression for Distributed Machine Learning
Figure 2 for 3LC: Lightweight and Effective Traffic Compression for Distributed Machine Learning
Figure 3 for 3LC: Lightweight and Effective Traffic Compression for Distributed Machine Learning
Figure 4 for 3LC: Lightweight and Effective Traffic Compression for Distributed Machine Learning
Viaarxiv icon

Learning to Protect Communications with Adversarial Neural Cryptography

Add code
Oct 21, 2016
Figure 1 for Learning to Protect Communications with Adversarial Neural Cryptography
Figure 2 for Learning to Protect Communications with Adversarial Neural Cryptography
Figure 3 for Learning to Protect Communications with Adversarial Neural Cryptography
Figure 4 for Learning to Protect Communications with Adversarial Neural Cryptography
Viaarxiv icon