Computational Technology for All

SaaS is for Suckers: AI Already Builds Better Custom Software | HackerNoon

It used to be that every company faced a definitive choice: buy or build. For most, the answer was to buy. Software-as-a-Service (SaaS) dominated because it was cheaper, faster, and easier than building proprietary software from scratch. But things have changed now that many tasks within SaaS companies and many features within SaaS products can now be completed by your own AI. Today, more companies are realizing that building, once seen as prohibitively expensive, is

Read More »

Additional Numerical Experiments on K-SIF and SIF: Depth, Noise, and Discrimination Power | HackerNoon

Authors: (1) Guillaume Staerman, INRIA, CEA, Univ. Paris-Saclay, France; (2) Marta Campi, CERIAH, Institut de l’Audition, Institut Pasteur, France; (3) Gareth W. Peters, Department of Statistics & Applied Probability, University of California Santa Barbara, USA. Table of Links Abstract and 1. Introduction 2. Background & Preliminaries 2.1. Functional Isolation Forest 2.2. The Signature Method 3. Signature Isolation Forest Method 4. Numerical Experiments 4.1. Parameters Sensitivity Analysis 4.2. Advantages of (K-)SIF over FIF 4.3. Real-data Anomaly

Read More »

Unlocking the Power of Signatures in Anomaly Detection | HackerNoon

Authors: (1) Guillaume Staerman, INRIA, CEA, Univ. Paris-Saclay, France; (2) Marta Campi, CERIAH, Institut de l’Audition, Institut Pasteur, France; (3) Gareth W. Peters, Department of Statistics & Applied Probability, University of California Santa Barbara, USA. Table of Links Abstract and 1. Introduction 2. Background & Preliminaries 2.1. Functional Isolation Forest 2.2. The Signature Method 3. Signature Isolation Forest Method 4. Numerical Experiments 4.1. Parameters Sensitivity Analysis 4.2. Advantages of (K-)SIF over FIF 4.3. Real-data Anomaly

Read More »

Decoding Split Window Sensitivity in Signature Isolation Forests | HackerNoon

Authors: (1) Guillaume Staerman, INRIA, CEA, Univ. Paris-Saclay, France; (2) Marta Campi, CERIAH, Institut de l’Audition, Institut Pasteur, France; (3) Gareth W. Peters, Department of Statistics & Applied Probability, University of California Santa Barbara, USA. Table of Links Abstract and 1. Introduction 2. Background & Preliminaries 2.1. Functional Isolation Forest 2.2. The Signature Method 3. Signature Isolation Forest Method 4. Numerical Experiments 4.1. Parameters Sensitivity Analysis 4.2. Advantages of (K-)SIF over FIF 4.3. Real-data Anomaly

Read More »
Software

What is the Signature Isolation Forest? | HackerNoon

Authors: (1) Guillaume Staerman, INRIA, CEA, Univ. Paris-Saclay, France; (2) Marta Campi, CERIAH, Institut de l’Audition, Institut Pasteur, France; (3) Gareth W. Peters, Department of Statistics & Applied Probability, University of California Santa Barbara, USA. Table of Links Abstract and 1. Introduction 2. Background & Preliminaries 2.1. Functional Isolation Forest 2.2. The Signature Method 3. Signature Isolation Forest Method 4. Numerical Experiments 4.1. Parameters Sensitivity Analysis 4.2. Advantages of (K-)SIF over FIF 4.3. Real-data Anomaly

Read More »
Software

Privacy in Cloud Computing through Immersion-based Coding: Conclusion and References | HackerNoon

Authors: (1) Haleh Hayati, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands; (2) Nathan van de Wouw, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands; (3) Carlos Murguia, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands, and with the School of Electrical Engineering and Robotics, Queensland University of Technology, Brisbane, Australia. Table of Links Abstract and Introduction

Read More »

Privacy in Cloud Computing through Immersion-based Coding: Case Studies | HackerNoon

Authors: (1) Haleh Hayati, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands; (2) Nathan van de Wouw, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands; (3) Carlos Murguia, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands, and with the School of Electrical Engineering and Robotics, Queensland University of Technology, Brisbane, Australia. Table of Links Abstract and Introduction

Read More »

Privacy in Cloud Computing through Immersion-based Coding: Privacy Guarantee | HackerNoon

Authors: (1) Haleh Hayati, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands; (2) Nathan van de Wouw, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands; (3) Carlos Murguia, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands, and with the School of Electrical Engineering and Robotics, Queensland University of Technology, Brisbane, Australia. Table of Links Abstract and Introduction

Read More »
Software

A Data-centric Approach to Class-specific Bias in Image Data Augmentation: Conclusion and Limitation | HackerNoon

Authors: (1) Athanasios Angelakis, Amsterdam University Medical Center, University of Amsterdam – Data Science Center, Amsterdam Public Health Research Institute, Amsterdam, Netherlands (2) Andrey Rass, Den Haag, Netherlands. Table of Links 3 Conclusion and Limitations This study extends the analysis initiated by Balestriero, Bottou, and LeCun (2022), focusing on the impact of data augmentations, particularly Random Crop, on class-specific bias in image classification models. Our contributions are multi-faceted, addressing the need for a more nuanced

Read More »
Software

A Data-centric Approach to Class-specific Bias in Image Data Augmentation: Appendices A-L

:::info Authors: (1) Athanasios Angelakis, Amsterdam University Medical Center, University of Amsterdam – Data Science Center, Amsterdam Public Health Research Institute, Amsterdam, Netherlands (2) Andrey Rass, Den Haag, Netherlands. ::: Table of Links Abstract and 1 Introduction 2 The Effect Of Data Augmentation-Induced Class-Specific Bias Is Influenced By Data, Regularization and Architecture 2.1 Data Augmentation Robustness Scouting 2.2 The Specifics Of Data Affect Augmentation-Induced Bias 2.3 Adding Random Horizontal Flipping Contributes To Augmentation-Induced Bias 2.4

Read More »