Alert button
Picture for Erdem Koyuncu

Erdem Koyuncu

Alert button

Memorization Capacity of Neural Networks with Conditional Computation

Add code
Bookmark button
Alert button
Mar 20, 2023
Erdem Koyuncu

Figure 1 for Memorization Capacity of Neural Networks with Conditional Computation
Figure 2 for Memorization Capacity of Neural Networks with Conditional Computation
Figure 3 for Memorization Capacity of Neural Networks with Conditional Computation
Figure 4 for Memorization Capacity of Neural Networks with Conditional Computation
Viaarxiv icon

Class Based Thresholding in Early Exit Semantic Segmentation Networks

Add code
Bookmark button
Alert button
Oct 27, 2022
Alperen Görmez, Erdem Koyuncu

Figure 1 for Class Based Thresholding in Early Exit Semantic Segmentation Networks
Figure 2 for Class Based Thresholding in Early Exit Semantic Segmentation Networks
Figure 3 for Class Based Thresholding in Early Exit Semantic Segmentation Networks
Figure 4 for Class Based Thresholding in Early Exit Semantic Segmentation Networks
Viaarxiv icon

Pruning Early Exit Networks

Add code
Bookmark button
Alert button
Jul 08, 2022
Alperen Görmez, Erdem Koyuncu

Figure 1 for Pruning Early Exit Networks
Figure 2 for Pruning Early Exit Networks
Figure 3 for Pruning Early Exit Networks
Viaarxiv icon

Federated Momentum Contrastive Clustering

Add code
Bookmark button
Alert button
Jun 10, 2022
Runxuan Miao, Erdem Koyuncu

Figure 1 for Federated Momentum Contrastive Clustering
Figure 2 for Federated Momentum Contrastive Clustering
Figure 3 for Federated Momentum Contrastive Clustering
Figure 4 for Federated Momentum Contrastive Clustering
Viaarxiv icon

Multiplication-Avoiding Variant of Power Iteration with Applications

Add code
Bookmark button
Alert button
Oct 22, 2021
Hongyi Pan, Diaa Badawi, Runxuan Miao, Erdem Koyuncu, Ahmet Enis Cetin

Figure 1 for Multiplication-Avoiding Variant of Power Iteration with Applications
Figure 2 for Multiplication-Avoiding Variant of Power Iteration with Applications
Figure 3 for Multiplication-Avoiding Variant of Power Iteration with Applications
Figure 4 for Multiplication-Avoiding Variant of Power Iteration with Applications
Viaarxiv icon

Robust Principal Component Analysis Using a Novel Kernel Related with the L1-Norm

Add code
Bookmark button
Alert button
May 25, 2021
Hongyi Pan, Diaa Badawi, Erdem Koyuncu, A. Enis Cetin

Figure 1 for Robust Principal Component Analysis Using a Novel Kernel Related with the L1-Norm
Figure 2 for Robust Principal Component Analysis Using a Novel Kernel Related with the L1-Norm
Figure 3 for Robust Principal Component Analysis Using a Novel Kernel Related with the L1-Norm
Figure 4 for Robust Principal Component Analysis Using a Novel Kernel Related with the L1-Norm
Viaarxiv icon

Class Means as an Early Exit Decision Mechanism

Add code
Bookmark button
Alert button
Mar 01, 2021
Alperen Gormez, Erdem Koyuncu

Figure 1 for Class Means as an Early Exit Decision Mechanism
Figure 2 for Class Means as an Early Exit Decision Mechanism
Figure 3 for Class Means as an Early Exit Decision Mechanism
Viaarxiv icon

Quantizing Multiple Sources to a Common Cluster Center: An Asymptotic Analysis

Add code
Bookmark button
Alert button
Oct 23, 2020
Erdem Koyuncu

Figure 1 for Quantizing Multiple Sources to a Common Cluster Center: An Asymptotic Analysis
Figure 2 for Quantizing Multiple Sources to a Common Cluster Center: An Asymptotic Analysis
Figure 3 for Quantizing Multiple Sources to a Common Cluster Center: An Asymptotic Analysis
Figure 4 for Quantizing Multiple Sources to a Common Cluster Center: An Asymptotic Analysis
Viaarxiv icon

A Generalization of Principal Component Analysis

Add code
Bookmark button
Alert button
Nov 15, 2019
Samuele Battaglino, Erdem Koyuncu

Figure 1 for A Generalization of Principal Component Analysis
Figure 2 for A Generalization of Principal Component Analysis
Figure 3 for A Generalization of Principal Component Analysis
Figure 4 for A Generalization of Principal Component Analysis
Viaarxiv icon

Robust and Computationally-Efficient Anomaly Detection using Powers-of-Two Networks

Add code
Bookmark button
Alert button
Oct 30, 2019
Usama Muneeb, Erdem Koyuncu, Yasaman Keshtkarjahromi, Hulya Seferoglu, Mehmet Fatih Erden, Ahmet Enis Cetin

Figure 1 for Robust and Computationally-Efficient Anomaly Detection using Powers-of-Two Networks
Figure 2 for Robust and Computationally-Efficient Anomaly Detection using Powers-of-Two Networks
Figure 3 for Robust and Computationally-Efficient Anomaly Detection using Powers-of-Two Networks
Figure 4 for Robust and Computationally-Efficient Anomaly Detection using Powers-of-Two Networks
Viaarxiv icon