Alert button
Picture for Zissis Poulos

Zissis Poulos

Alert button

A Robust Quantile Huber Loss With Interpretable Parameter Adjustment In Distributional Reinforcement Learning

Add code
Bookmark button
Alert button
Jan 07, 2024
Parvin Malekzadeh, Konstantinos N. Plataniotis, Zissis Poulos, Zeyu Wang

Viaarxiv icon

Deep Hedging of Derivatives Using Reinforcement Learning

Add code
Bookmark button
Alert button
Mar 29, 2021
Jay Cao, Jacky Chen, John Hull, Zissis Poulos

Viaarxiv icon

Valuing Exotic Options and Estimating Model Risk

Add code
Bookmark button
Alert button
Mar 22, 2021
Jay Cao, Jacky Chen, John Hull, Zissis Poulos

Figure 1 for Valuing Exotic Options and Estimating Model Risk
Figure 2 for Valuing Exotic Options and Estimating Model Risk
Figure 3 for Valuing Exotic Options and Estimating Model Risk
Figure 4 for Valuing Exotic Options and Estimating Model Risk
Viaarxiv icon

Training CNNs faster with Dynamic Input and Kernel Downsampling

Add code
Bookmark button
Alert button
Oct 15, 2019
Zissis Poulos, Ali Nouri, Andreas Moshovos

Figure 1 for Training CNNs faster with Dynamic Input and Kernel Downsampling
Figure 2 for Training CNNs faster with Dynamic Input and Kernel Downsampling
Figure 3 for Training CNNs faster with Dynamic Input and Kernel Downsampling
Figure 4 for Training CNNs faster with Dynamic Input and Kernel Downsampling
Viaarxiv icon

Bit-Tactical: Exploiting Ineffectual Computations in Convolutional Neural Networks: Which, Why, and How

Add code
Bookmark button
Alert button
Mar 09, 2018
Alberto Delmas, Patrick Judd, Dylan Malone Stuart, Zissis Poulos, Mostafa Mahmoud, Sayeh Sharify, Milos Nikolic, Andreas Moshovos

Figure 1 for Bit-Tactical: Exploiting Ineffectual Computations in Convolutional Neural Networks: Which, Why, and How
Figure 2 for Bit-Tactical: Exploiting Ineffectual Computations in Convolutional Neural Networks: Which, Why, and How
Figure 3 for Bit-Tactical: Exploiting Ineffectual Computations in Convolutional Neural Networks: Which, Why, and How
Figure 4 for Bit-Tactical: Exploiting Ineffectual Computations in Convolutional Neural Networks: Which, Why, and How
Viaarxiv icon