DRN: A Deep Reinforcement Learning Framework for News Recommendation
|
|
- Thomasine Glenn
- 5 years ago
- Views:
Transcription
1 DRN: A Deep Reinforcement Learning Framework for News Recommendation Guanjie Zheng, Fuzheng Zhang, Zihan Zheng, Yang Xiang, Nicholas Jing Yuan, Xing Xie, Zhenhui (Jessie) Li 11/9/18 1
2 Introduction: Why reinforcement recommendation First round Second round Equal rewarding recommendation for current round Images from: /9/
3 Introduction: News recommendation is dynamic The life period for news is usually very short. User s interest may change during time. Ratio of click for di erent categories 100% 80% 60% 40% 20% 0% Auto Business Politics Education Entertainment Military Real estate Technology Week Society Sports Travel Others 11/9/18 3
4 Introduction: Is there more than click/noclick? User s clicks on news are usually very dense in a short period. Then, user usually leave the app! # of request t = 24 hours t = 48 hours User may return everyday! Time interval between two consecutive request (hour) 11/9/18 4
5 Introduction: Should we keep recommending similar items? Lebron James will be the MVP! Tony Parker has come back from injury! Paul Gasol promises to help the Spurs in the playoff. Will you get bored if all the recommended news are from NBA when you are browsing the sports news? Images from: 11/9/18 5
6 Method: Using reinforcement learning to do recommendation Environment State User News... Action 1 Action 2 Action m Action Agent Reward DQN Explore Click / no click User activiness Memory 11/9/18 6
7 t 1 t 2 t 3 t 4 t 5 Timeline Interaction log Candidates Candidates Candidates Candidates Candidates Training Policy Policy Policy Policy Policy Offline Part Push Explore Minor update Push Minor update Push Major update Push Minor update Push Feedback Feedback Feedback Replay Mini-batch Feedback Feedback Activeness analysis Memory Online Part 11/9/18 7
8 Method: Dueling network structure value and advantage function Q(s, a) V(s) A(s, a) User features Context features User-news features News features 11/9/18 8
9 Method: user activeness modeling -- survival analysis User activeness decay function User activeness User activeness t 1 t 2 t 3 t 4 t 5 t 6 t 7 t 8 t 9 t 10 Time 11/9/18 9
10 Method: Effective exploration Current Network Explore Network Step1: get recommendation from! and "! Step2: probabilistic interleave these two lists Step3: get feedback from user and compare the performance of two network Step4: if "! performs better, update! towards it A B C List A C D List Probabilistic Interleave Push to user Collect feedback Keep A C D C D B List Feedback Step towards Model choice 11/9/18 10
11 Dataset # of users # of news # of request # of times pushed to users 11/9/18 11
12 Results: Offline 0.20 LR FM W&D LinUCB HLinUCB DN DDQN DDQN+U DDQN+U+EG DDQN+U+DBGD 0.15 CTR Request sessions 11/9/18 Accuracy 12
13 Results: Online Accuracy Diversity 11/9/18 13
14 Summary of motivation and solution Motivation Long term effect in recommendation Dynamic nature of news recommendation Consider more measures for long term effect Recommendation diversity Solution Deep reinforcement learning (DRL) Online learning feature of DRL Reward functiondesign of DRL Explore in DRL 11/9/18 14
15 Conclusion We propose a reinforcement learning framework to do online personalized news recommendation, taking care of both immediate and future reward. Our framework can be generalized to many other recommendation problems. We consider user activeness to help improve recommendation accuracy, which can provide extra information than simply using user click labels. Our system has been deployed online in a commercial news recommendation application. Extensive offline and online experiments have shown the superior performance of our methods. 11/9/18 15
A Brief Review of Representation Learning in Recommender 赵鑫 RUC
A Brief Review of Representation Learning in Recommender Systems @ 赵鑫 RUC batmanfly@qq.com Representation learning Overview of recommender systems Tasks Rating prediction Item recommendation Basic models
More informationarxiv: v1 [cs.cv] 2 Sep 2018
Natural Language Person Search Using Deep Reinforcement Learning Ankit Shah Language Technologies Institute Carnegie Mellon University aps1@andrew.cmu.edu Tyler Vuong Electrical and Computer Engineering
More informationAccelerating Reinforcement Learning in Engineering Systems
Accelerating Reinforcement Learning in Engineering Systems Tham Chen Khong with contributions from Zhou Chongyu and Le Van Duc Department of Electrical & Computer Engineering National University of Singapore
More informationSlides credited from Dr. David Silver & Hung-Yi Lee
Slides credited from Dr. David Silver & Hung-Yi Lee Review Reinforcement Learning 2 Reinforcement Learning RL is a general purpose framework for decision making RL is for an agent with the capacity to
More informationKnowledge Transfer for Deep Reinforcement Learning with Hierarchical Experience Replay
Knowledge Transfer for Deep Reinforcement Learning with Hierarchical Experience Replay Haiyan (Helena) Yin, Sinno Jialin Pan School of Computer Science and Engineering Nanyang Technological University
More informationWhen Network Embedding meets Reinforcement Learning?
When Network Embedding meets Reinforcement Learning? ---Learning Combinatorial Optimization Problems over Graphs Changjun Fan 1 1. An Introduction to (Deep) Reinforcement Learning 2. How to combine NE
More informationINTERACTIVE NOTIFICATION
INTERACTIVE NOTIFICATION Interactive notifications are the most exciting thing to happen to mobile engagement since push. We re so excited about Apple s ios 8 interactive notifications that we re offering
More informationTransforming Transport Infrastructure with GPU- Accelerated Machine Learning Yang Lu and Shaun Howell
Transforming Transport Infrastructure with GPU- Accelerated Machine Learning Yang Lu and Shaun Howell 11 th Oct 2018 2 Contents Our Vision Of Smarter Transport Company introduction and journey so far Advanced
More informationGUNREAL: GPU-accelerated UNsupervised REinforcement and Auxiliary Learning
GUNREAL: GPU-accelerated UNsupervised REinforcement and Auxiliary Learning Koichi Shirahata, Youri Coppens, Takuya Fukagai, Yasumoto Tomita, and Atsushi Ike FUJITSU LABORATORIES LTD. March 27, 2018 0 Deep
More informationSyn-Apps Desktop Notification Client for Windows Operating Systems User Manual Version Syn-Apps LLC
Syn-Apps Desktop Notification Client for Windows Operating Systems User Manual Version 8.3.12 About Syn-Apps Syn-Apps L.L.C. was founded in 2001 as a consulting firm focused on developing software for
More informationSherlock Diagnosing Problems in the Enterprise
Sherlock Diagnosing Problems in the Enterprise Srikanth Kandula Victor Bahl, Ranveer Chandra, Albert Greenberg, David Maltz, Ming Zhang Enterprise Management: Between a Rock and a Hard Place Manageability
More informationAdoption, Human Perception, and Performance of HTTP/2 Server Push
Adoption, Human Perception, and Performance of HTTP/2 Server Push https://comsys.rwth-aachen.de London / IETF 101 maprg, 23.2018 Why focus on HTTP/2 (H2) Server Push? H2 major changes over H1 Binary, single
More informationRewind to Track: Parallelized Apprenticeship Learning with Backward Tracklets
Rewind to Track: Parallelized Apprenticeship Learning with Backward Tracklets Jiang Liu 1,2, Jia Chen 2, De Cheng 2, Chenqiang Gao 1, Alexander G. Hauptmann 2 1 Chongqing University of Posts and Telecommunications
More informationTRENDY PRO FITNESS TRACKER USER GUIDE
2017 TRENDY PRO FITNESS TRACKER USER GUIDE Page1 Charging your TRENDY PRO Fitness Tracker Hold the tracker with both hands by the bracelet, pull the band that s next to the Touch key to reveal 2 gold strips.
More informationORACLE UTILITIES OPOWER PROFESSIONAL SERVICES DESCRIPTIONS
ORACLE UTILITIES OPOWER PROFESSIONAL SERVICES DESCRIPTIONS Oracle Utilities Opower Service Bundle Fees...3 Oracle Utilities Opower Basic Service Bundle Fee... 3 Oracle Utilities Opower Standard Service
More informationCertified Manager Certification
Certified Manager Certification Get Trained Get Certified Get Recognized www.hr-pulse.org In Partnership With HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business About ICPM
More informationNeural Episodic Control. Alexander pritzel et al (presented by Zura Isakadze)
Neural Episodic Control Alexander pritzel et al. 2017 (presented by Zura Isakadze) Reinforcement Learning Image from reinforce.io RL Example - Atari Games Observed States Images. Internal state - RAM.
More informationDS504/CS586: Big Data Analytics Data Pre-processing and Cleaning Prof. Yanhua Li
Welcome to DS504/CS586: Big Data Analytics Data Pre-processing and Cleaning Prof. Yanhua Li Time: 6:00pm 8:50pm R Location: KH116 Fall 2017 Merged CS586 and DS504 Examples of Reviews/ Critiques Random
More informationInterpreting Document Collections with Topic Models. Nikolaos Aletras University College London
Interpreting Document Collections with Topic Models Nikolaos Aletras University College London Acknowledgements Mark Stevenson, Sheffield Tim Baldwin, Melbourne Jey Han Lau, IBM Research Talk Outline Introduction
More informationMobile Robot Obstacle Avoidance based on Deep Reinforcement Learning
Mobile Robot Obstacle Avoidance based on Deep Reinforcement Learning by Shumin Feng Thesis submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of
More informationSemantic Estimation for Texts in Software Engineering
Semantic Estimation for Texts in Software Engineering 汇报人 : Reporter:Xiaochen Li Dalian University of Technology, China 大连理工大学 2016 年 11 月 29 日 Oscar Lab 2 Ph.D. candidate at OSCAR Lab, in Dalian University
More informationA Brief Introduction to Reinforcement Learning
A Brief Introduction to Reinforcement Learning Minlie Huang ( ) Dept. of Computer Science, Tsinghua University aihuang@tsinghua.edu.cn 1 http://coai.cs.tsinghua.edu.cn/hml Reinforcement Learning Agent
More informationWindows Security Master Class with Paula Januszkiewicz. May 22 24, 2013 Belgium (TBD)
Windows Security Master Class with Paula Januszkiewicz May 22 24, 2013 Belgium (TBD) Overview The deep dive Windows Security Master Class teaches advanced Windows operating system security, based on Windows
More informationA TRAINER S GUIDE TO THE DATA ENTRY SESSION
A TRAINER S GUIDE TO THE DATA ENTRY SESSION WHAT IS THIS GUIDE? This guide is a support document for the trainers of the DATIM session on Data Entry. This session follows the standard DATIM training approach
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationAMI Implementation in Singapore
AMI Implementation in Singapore Smart Water Forum 1 I About SUEZ 2 I SUEZ, at activities a glance employees over 90,000 operating on 5 continents industrial and business customers over 450,000 turnover
More informationDS504/CS586: Big Data Analytics Data Pre-processing and Cleaning Prof. Yanhua Li
Welcome to DS504/CS586: Big Data Analytics Data Pre-processing and Cleaning Prof. Yanhua Li Time: 6:00pm 8:50pm R Location: AK 232 Fall 2016 The Data Equation Oceans of Data Ocean Biodiversity Informatics,
More informationCollector for ArcGIS: What s New. Chris LeSueur & James Tedrick
Collector for ArcGIS: What s New Chris LeSueur & James Tedrick Outline Product overview Workflows Preparing data for Collector for ArcGIS What s new in Collector for ArcGIS v18.1.0 (Aurora) Advanced topics
More informationMaking the Most of the Splunk Scheduler
Making the Most of the Splunk Scheduler Paul J. Lucas Principal Software Engineer, Splunk September 25 28, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may
More informationLearning Social Graph Topologies using Generative Adversarial Neural Networks
Learning Social Graph Topologies using Generative Adversarial Neural Networks Sahar Tavakoli 1, Alireza Hajibagheri 1, and Gita Sukthankar 1 1 University of Central Florida, Orlando, Florida sahar@knights.ucf.edu,alireza@eecs.ucf.edu,gitars@eecs.ucf.edu
More informationPrivate Browsing: an Inquiry on Usability and Privacy Protection
Private Browsing: an Inquiry on Usability and Privacy Protection Xianyi Gao*, Yulong Yang*, Huiqing Fu*, Janne Lindqvist*, Yang Wang+ *Rutgers University +Syracuse University Published in WPES 2014 What
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationThis document was provided by Sheryl Moulden from Skyward on April 22, 2009.
This document was provided by Sheryl Moulden from Skyward on April 22, 2009. Advanced Master Schedule Builder Introduction Setup Utilities Master Schedule Builder Introduction The Advance Master Schedule
More informationJoint Modeling of Dense and Incomplete Trajectories for Citywide Traffic Volume Inference
Joint Modeling of Dense and Incomplete Trajectories for Citywide Traffic Volume Inference ABSTRACT Xianfeng Tang 1, Boqing Gong 2, Yanwei Yu 3, Huaxiu Yao 1, Yandong Li 4 Haiyong Xie 5, Xiaoyu Wang 6 1
More informationWelcome to Secure Wi-Fi. Your company enrolled you in this service to ensure the business and personal data on your device remains secure.
Secure Wi-Fi User Guide Welcome to Secure Wi-Fi. Your company enrolled you in this service to ensure the business and personal data on your device remains secure. Secure Wi-Fi protects on all Wi-Fi networks
More informationUSABILITY REPORT. for Wikimedia Foundation, by HUREO
USABILITY REPORT for Wikimedia Foundation, by HUREO CONTENT PAGE 1 User Attitudes User Attitudes towards the Concept of Offline Library. (Pre-study vs. Post-study) 4 About The Users Demographics. Internet
More informationGOOGLE S MOST-SEARCHED ONLINE PRODUCTS AND SERVICES JULY Perfect Search Media
GOOGLE S MOST-SEARCHED ONLINE PRODUCTS AND SERVICES JULY 2013 Perfect Search Media INTRODUCTION This study began with the word online. This report exclusively focuses on keyword queries typed into the
More informationYoutube Graph Network Model and Analysis Yonghyun Ro, Han Lee, Dennis Won
Youtube Graph Network Model and Analysis Yonghyun Ro, Han Lee, Dennis Won Introduction A countless number of contents gets posted on the YouTube everyday. YouTube keeps its competitiveness by maximizing
More informationA Deep Reinforcement Learning-Based Framework for Content Caching
A Deep Reinforcement Learning-Based Framework for Content Caching Chen Zhong, M. Cenk Gursoy, and Senem Velipasalar Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse,
More informationWeb Analyst: Software for Locating and Analyzing Virtual Communities, with a Korean-American Case Study
Web Analyst: Software for Locating and Analyzing Virtual Communities, with a Korean-American Case Study Sun-Ki Chai University of Hawai`I http://www2.hawaii.edu/~sunki/ Why the Need for Web Analysis Software?
More informationSupervised Web Forum Crawling
Supervised Web Forum Crawling 1 Priyanka S. Bandagale, 2 Dr. Lata Ragha 1 Student, 2 Professor and HOD 1 Computer Department, 1 Terna college of Engineering, Navi Mumbai, India Abstract - In this paper,
More informationDistributed Denial of Service
Distributed Denial of Service Vimercate 17 Maggio 2005 anegroni@cisco.com DDoS 1 Agenda PREFACE EXAMPLE: TCP EXAMPLE: DDoS CISCO S DDoS SOLUTION COMPONENTS MODES OF PROTECTION DETAILS 2 Distributed Denial
More informationbt-loganalyzer Administrators Companion Reporting
bt-loganalyzer Administrators Companion for Reporting Burst Technology, Inc. Contents Pre-Defined Report Definitions... 5 Sub Report Definitions and Samples... 9 User Audit Detail - Number of Web Pages
More informationT he Inbox Report REVEAL MORE CONSUMER PERCEPTIONS OF . Fluent LLC Inbox. Sent. Drafts. Spam. Trash. Click here to Reply
Inbox 1 Fluent LLC Sent Drafts Spam Trash T he Inbox Report CONSUMER PERCEPTIONS OF EMAIL loading... REVEAL MORE Click here to Reply Inbox Report 2018 Americans are addicted to email.
More informationJoomla User Guide Ver 3
LiveHelp Server Joomla User Guide Ver 3 Introduction The process of configuration and implementation of the LiveHelp server is divided into four stages, which are detailed below. The approximate time of
More informationThe DSB team welcomes your feedback about DSB Drive. Please send a description of problems you encounter to:
Mitsubishi Electric is improving our workflow. We hope you ve joined us by updating to Diamond System Builder to 3.0 and creating an account. With DSB Drive, Secure Cloud Backup: Your files are secure,
More informationCloud Monitoring as a Service. Built On Machine Learning
Cloud Monitoring as a Service Built On Machine Learning Table of Contents 1 2 3 4 5 6 7 8 9 10 Why Machine Learning Who Cares Four Dimensions to Cloud Monitoring Data Aggregation Anomaly Detection Algorithms
More informationSpotlight: A Smart Video Highlight Generator Stanford University CS231N Final Project Report
Spotlight: A Smart Video Highlight Generator Stanford University CS231N Final Project Report Jun-Ting (Tim) Hsieh junting@stanford.edu Chengshu (Eric) Li chengshu@stanford.edu Kuo-Hao Zeng khzeng@cs.stanford.edu
More informationSetting up alert notifications in Sferic Maps Alerting
Setting up alert notifications in Sferic Maps Alerting Sferic Maps allows customers to send custom alerts over email, text message (by formatting the phone number as an email address), or as a push notification
More informationModel-Free Control for Distributed Stream Data Processing using Deep Reinforcement Learning
Model-Free Control for Distributed Stream Data Processing using Deep Reinforcement Learning Teng Li, Zhiyuan Xu, Jian Tang and Yanzhi Wang {tli01, zxu105, jtang02, ywang393}@syr.edu Department of Electrical
More informationCrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information
CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information Abdeltawab M. Hendawi, Eugene Sturm, Dev Oliver, Shashi Shekhar hendawi@cs.umn.edu, sturm049@umn.edu,
More informationFinal Assigment Markus Roesch
Final Assigment Markus Roesch 1. Story A maintenance staff in the mechanical engineering industry is responsible to maintain customer machines in a regular interval but also fix critical problems when
More informationCTX-1259AI Citrix Presentation Server 4.5: Administration
C O U R S E D E S C R I P T I O N CTX-1259AI Citrix Presentation Server 4.5: Administration CTX-1259AI Citrix Presentation Server 4.5: Administration provides the foundation necessary to effectively deploy
More informationHeuristic Evaluation. Hall of Fame or Shame? Hall of Fame or Shame? Hall of Fame! Heuristic Evaluation
1 USER INTERFACE DESIGN + PROTOTYPING + EVALUATION Hall of Fame or Shame? Heuristic Evaluation Prof. James A. Landay University of Washington Pocket By Read It Later 11/1/2012 2 Hall of Fame or Shame?
More informationIntroduction to Deep Q-network
Introduction to Deep Q-network Presenter: Yunshu Du CptS 580 Deep Learning 10/10/2016 Deep Q-network (DQN) Deep Q-network (DQN) An artificial agent for general Atari game playing Learn to master 49 different
More informationDiversity in Recommender Systems Week 2: The Problems. Toni Mikkola, Andy Valjakka, Heng Gui, Wilson Poon
Diversity in Recommender Systems Week 2: The Problems Toni Mikkola, Andy Valjakka, Heng Gui, Wilson Poon Review diversification happens by searching from further away balancing diversity and relevance
More informationNewsletter: Volume 26 Number 2 April, May, June 2014
Newsletter: stcaug@gmail.com Volume 26 Number 2 April, May, June 2014 Meeting Schedule Contents Index Meeting p.1 Program p.1 Meeting Schedule p.1 Class Schedule p.2 Microsoft Support p.2 Run a backup
More informationNXConnect: Multi-User CAx on a Commercial Engineering Software Application
NXConnect: Multi-User CAx on a Commercial Engineering Software Application Edward Red, Greg Jensen, Jordan Ryskamp, Kenneth Mix Presentation Outline Motivation Background NX Multi-user Prototype NX Multi-user
More informationUSER INTERFACE DESIGN + PROTOTYPING + EVALUATION. Heuristic Evaluation. Prof. James A. Landay University of Washington CSE 440
USER INTERFACE DESIGN + PROTOTYPING + EVALUATION Heuristic Evaluation Prof. James A. Landay University of Washington CSE 440 February 19, 2013 Hall of Fame or Shame? Pocket By Read It Later Jan. 14-18,
More informationBest Practices in Customer Callback Strategy Design and Implementation
Best Practices in Customer Callback Strategy Design and Implementation Todd Marthaler Contact Center Consultant Interactive Intelligence, Inc. Contents What is a callback?... 3 How does the Interactive
More informationMobile Video Benchmark Study
Mobile Video Benchmark Study April 2014 MMA: Demonstrating Measurement and Impact 1 Acknowledgements MMA Member Data Contributors: Data Aggregation and Normalization ImServices Analysis Gerard Broussard,
More informationCellular Network Traffic Scheduling using Deep Reinforcement Learning
Cellular Network Traffic Scheduling using Deep Reinforcement Learning Sandeep Chinchali, et. al. Marco Pavone, Sachin Katti Stanford University AAAI 2018 Can we learn to optimally manage cellular networks?
More information2/27
1/27 2/27 3/27 4/27 5/27 6/27 Content diversity Open Platform 1. Platform Conversion 3D Smart TV 2. Content Service Broadband TV 3. UX & Input Device Digital TV 4. Ecosystem Analog TV Interactivity 7/27
More informationStudy of Residual Networks for Image Recognition
Study of Residual Networks for Image Recognition Mohammad Sadegh Ebrahimi Stanford University sadegh@stanford.edu Hossein Karkeh Abadi Stanford University hosseink@stanford.edu Abstract Deep neural networks
More informationEveryday Customer Support
Everyday Customer Support Page 1 Mobile Data APNs Page 1 SIM Card information Page 2 Voicemail Page 2 Text Message Centre No Page 3 Divert Codes Page 4 Basic Diagnostics Page 5 7 Mobile Data Tips Here
More informationHigh Availability- Disaster Recovery 101
High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com
More informationSun City Grand Computers Devices SIG. Grand Computers 1 GraComputers
Sun City Grand Computers Devices SIG Grand Computers www.grandcomputers.org 1 GraComputers www.grandcomputers.org Devices SIG The focus of Devices SIG is to inform, educate and entertain club members about
More informationMerchandise Vendor Reporting Manual
Merchandise Vendor Reporting Manual Cueto Event Management System February 2016 Table of Contents Introduction... 3 Contact Info... 3 Terms of Use... 3 Home Page... 4 Tools and Reports... 5 Movement Report...
More informationSupplementary Material: Unsupervised Domain Adaptation for Face Recognition in Unlabeled Videos
Supplementary Material: Unsupervised Domain Adaptation for Face Recognition in Unlabeled Videos Kihyuk Sohn 1 Sifei Liu 2 Guangyu Zhong 3 Xiang Yu 1 Ming-Hsuan Yang 2 Manmohan Chandraker 1,4 1 NEC Labs
More informationAn improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li
3rd International Conference on Mechatronics and Industrial Informatics (ICMII 2015) An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi
More informationCS 234 Winter 2018: Assignment #2
Due date: 2/10 (Sat) 11:00 PM (23:00) PST These questions require thought, but do not require long answers. Please be as concise as possible. We encourage students to discuss in groups for assignments.
More informationPRIME: A Novel Processing-in-memory Architecture for Neural Network Computation in ReRAM-based Main Memory
Scalable and Energy-Efficient Architecture Lab (SEAL) PRIME: A Novel Processing-in-memory Architecture for Neural Network Computation in -based Main Memory Ping Chi *, Shuangchen Li *, Tao Zhang, Cong
More informationMedia Diary Reloaded Mobile Media Research Best Practice Examples
Media Diary Reloaded Mobile Media Research Best Practice Examples Diana Livadic & Alexander Bohn, Ipsos MediaCT 23.10.2014, München, Research & Results 2014 Welcome to the world of Ipsos MediaCT 2 Evaluating
More informationAdding Mobile App Payments at PacifiCorp
Adding Mobile App Payments at PacifiCorp Industry Overview Rob Gilpin Changing Customer Expectations Then Fair value for fair price Responsive service Quality and reliability Courtesy and empathy Ease
More informationAlways Keep IT Purely Simple
Always Keep IT Purely Simple Network Monitoring Software Page 1 CEO Message AKiPS is a scalable, fully featured monitoring tool that collects, reports and alerts on the performance of your network infrastructure.
More informationAssignments. Assignment 2 is due TODAY, 11:59pm! Submit one per pair on Blackboard.
HCI and Design Assignments Assignment 2 is due TODAY, 11:59pm! Submit one per pair on Blackboard. Today Paper prototyping An essential tool in your design toolbox! How do we design things that actually
More informationGENERIC ANDROID DEVICE INFORMATION TIPS & TRICKS
DEVICE INFORMATION TIPS & TRICKS How to get the best experience from your mobile phone APP MANAGEMENT The S3 company mobile admin chooses apps for your company from the global library and assigns them
More informationUW TechConnect. OneDrive for Business (formerly known as SkyDrive Pro) Lync 2013 Exchange Online
UW TechConnect OneDrive for Business (formerly known as SkyDrive Pro) Lync 2013 Exchange Online Office 365 for Education OneDrive for Business Lync 2013 Exchange Online Microsoft Office SharePoint Online
More informationNetwork Agile Preference-Based Prefetching for Mobile Devices
Network Agile Preference-Based Prefetching for Mobile Devices JunZe Han, Xiang-Yang Li, Department of Computer Science, Illinois Institute of Technology, and TNLIST, Tsinghua University Email: jhan2@iit.edu,
More informationarxiv: v1 [cs.lg] 7 Dec 2018
A new multilayer optical film optimal method based on deep q-learning A.Q. JIANG, 1,* OSAMU YOSHIE, 1 AND L.Y. CHEN 2 1 Graduate school of IPS, Waseda University, Fukuoka 8080135, Japan 2 Department of
More informationCase-based Recommendation. Peter Brusilovsky with slides of Danielle Lee
Case-based Recommendation Peter Brusilovsky with slides of Danielle Lee Where we are? Search Navigation Recommendation Content-based Semantics / Metadata Social Modern E-Commerce Site The Power of Metadata
More informationEMS WEB APP User Guide
EMS WEB APP User Guide V44.1 Last Updated: August 14, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS Web App User Guide
More informationClient Services Procedure Manual
Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase
More informationYouTube Live and Twitch: A Tour of User-Generated Live Streaming System. Mengxue Zhang Dingkang Wang Xianxing Zhang
YouTube Live and Twitch: A Tour of User-Generated Live Streaming System Mengxue Zhang Dingkang Wang Xianxing Zhang User Generated Content (UGC) Any form of content created by users of a system or service
More informationRevolver: Vertex-centric Graph Partitioning Using Reinforcement Learning
Revolver: Vertex-centric Graph Partitioning Using Reinforcement Learning Mohammad Hasanzadeh Mofrad 1, Rami Melhem 1 and Mohammad Hammoud 2 1 University of Pittsburgh 2 Carnegie Mellon University Qatar
More informationA New Technique to Optimize User s Browsing Session using Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationTopics in AI (CPSC 532L): Multimodal Learning with Vision, Language and Sound. Lecture 12: Deep Reinforcement Learning
Topics in AI (CPSC 532L): Multimodal Learning with Vision, Language and Sound Lecture 12: Deep Reinforcement Learning Types of Learning Supervised training Learning from the teacher Training data includes
More informationebay Marketplace Architecture
ebay Marketplace Architecture Architectural Strategies, Patterns, and Forces Randy Shoup, ebay Distinguished Architect QCon SF 2007 November 9, 2007 What we re up against ebay manages Over 248,000,000
More informationHow Eventual is Eventual Consistency?
Probabilistically Bounded Staleness How Eventual is Eventual Consistency? Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica (UC Berkeley) BashoChats 002, 28 February
More informationBenchmarking Big Data for Trip Recommendation
Benchmarking Big Data for Trip Recommendation Kuien Liu Institute of Software, Chinese Academy of Sciences Beijing 100190, China kuien@iscas.ac.cn Yaguang Li Institute of Software, Chinese Academy of Sciences
More informationClustering Lecture 9: Other Topics. Jing Gao SUNY Buffalo
Clustering Lecture 9: Other Topics Jing Gao SUNY Buffalo 1 Basics Outline Motivation, definition, evaluation Methods Partitional Hierarchical Density-based Miture model Spectral methods Advanced topics
More informationPersonalizing Netflix with Streaming datasets
Personalizing Netflix with Streaming datasets Shriya Arora Senior Data Engineer Personalization Analytics @shriyarora What is this talk about? Helping you decide if a streaming pipeline fits your ETL problem
More informationfor Education Jason Trump Senior Education Specialist - Devices
for Education Jason Trump Senior Education Specialist - Devices a 2 + b 2 = c 2 WATCHING, LISTENING INDIVIDUAL STUDY READING COLLABORATING ASSESSING WRITING PRESENTING Ipad Chromebook Surface Design Principles
More informationE±cient Detection Of Compromised Nodes In A Wireless Sensor Network
E±cient Detection Of Compromised Nodes In A Wireless Sensor Network Cheryl V. Hinds University of Idaho cvhinds@vandals.uidaho.edu Keywords: Compromised Nodes, Wireless Sensor Networks Abstract Wireless
More informationMODELING USER INTERESTS FROM WEB BROWSING ACTIVITIES. Team 11. research paper review: author: Fabio Gasparetti publication date: November 1, 2016
research paper review: MODELING USER INTERESTS FROM WEB BROWSING ACTIVITIES author: Fabio Gasparetti publication date: November 1, 2016 Team 11 Angelique Elkins Jim Saeturn Michael Yang BACKGROUND & PROBLEM
More informationDealer Ordering Guide
Dealer Ordering Guide Cross-Carline Technologies Mercedes-Benz mbrace mbrace Dealer Support (877) 826-6319 mbrace Customer Support (866) 990-9007 Date of last revision: August 02, 2016 Mercedes-Benz mbrace
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationHigh Availability- Disaster Recovery 101
High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com
More informationTransition Plan (TP)
Transition Plan (TP) Healthy Kids Zone Survey App Team 14 Name Jessie Kim Primary Role Contact Email JKim@chc-inc.org Joseph Martinez JMartinez2@chc-inc.org Carson Malcoln MCarson@chc-inc.org Yang Wang
More informationDay #1. Determining an exponential function from a table Ex #1: Write an exponential function to model the given data.
Algebra I Name Unit #2: Sequences & Exponential Functions Lesson #7: Determining an Exponential Function from a Table or Graph Period Date Day #1 Ok, so we spent a lot of time focusing on exponential growth
More information