PaperReading20200219
CanChen ggchen@mail.ustc.edu.cn
This is my first day sharing my reading paper and I will try to paraphrase core ideas in these papers with very simple words. Every paper consists three parts, namely, motivation, method, and contribution. In each part, no more than 3 sentences will be used.
NAS-Bench-201
- Motivation:Network search algorithms are often quite expensive and different search spaces also make it difficult for us to compare these algorithms. In fact, we can treat network architectures as X and their corresponding accuracies as Y, and construct a standard dataset to solve this problem.
- Method: Using cell-based strategy, we only need to find a cell and insert it into the macro structure. In the paper, 4 nodes and 5 operations are used, which means we need to train 15625 cells. As last,the author just trained 15625 models on cifar10,cifar100 and sampled-ImageNet,and provided us with the corresponding training logs.
- Contribution: The paper is a ICLR paper and is not very novel(at least I think). It shows us again: computing resources is very important. At least, it gives us a benchmark for NAS research and now we can use CPU to do NAS.
Peephole
- Motivation: Can we get the network's performance without training?
- Method: The author only considers sequential network architectures since we can treat the sequential network architectures as "a language". Then the author uses LSTM to deal with this problem like language modeling.
- Contribution: The work is kind of limited since it only deals with sequential network architecures while other structures such shortcut paths are in fact dominating this field.
Latency-aware
- Motivation: Current Darts algorithms do not take latency into consideration.
- Method: First, the author train a regression model that can predict a network's latency based on the network's structure. Then the author inserts this model into bi-level optimization equation as part of the loss function.
- Contribution: This work is an extension of Darts and can be very useful since latency is important in real scenarios.
PaperReading20200219的更多相关文章
随机推荐
- 树状数组(fenwick tree)
树状数组又称芬威克树,概念上是树状,实际上是使用数组实现的,表现为一种隐式数据结构,balabala...详情请见:https://en.wikipedia.org/wiki/Fenwick_tree ...
- oracle用户表字段注释
SELECT C.TABLE_NAME,NUM_ROWS,(select COMMENTS from user_tab_comments WHERE TABLE_NAME=C.TABLE_NAME) ...
- 基础_04_list and tuple
一.list(列表) list是Python里的一种容器,里面可以存储多个任何类型的数据,长度也可以任意伸缩,可以像C语言中数组那样,按照索引下标获取对应的值.但数组是一个存储多个固定类型变量的连续内 ...
- 以 CheatEngine 为例的六个质量属性
日期:2020.02.23 博客期:158 星期日 这个软件是什么? 首先你可能不认识 CE 修改器,那我就简单一句话说明一下,Cheat Engine 是一款能够编辑进程内存的.能够编译分析汇编语言 ...
- /var/lib/gems/2.5.0/gems/seccomp-tools-1.3.0/lib/seccomp-tools/dumper.rb:125: warning: Insecure world writable dir /home/python/.local in PATH, mode 040777 解决方案
/var/lib/gems/2.5.0/gems/seccomp-tools-1.3.0/lib/seccomp-tools/dumper.rb:125: warning: Insecure worl ...
- 【代码审计】VAuditDemo SQL注入漏洞
这里我们定位 sqlwaf函数 在sys/lib.php中,过滤了很多关键字,但是42 43 44行可以替换为空 比如我们可以 uni||on来绕过过滤
- PyQt5打印机
1.打印机操作(打印默认文本里面的内容)from PyQt5 import QtGui,QtWidgets,QtPrintSupportfrom PyQt5.QtWidgets import *imp ...
- Java面向对象编程 -2.2
构造方法与匿名对象 现在的程序在使用类的时候一般都按照了如下的步骤进行: 声明并实例化对象,这个时候实例化对象中的属性并没有任何的数据存在,都是其对于数据类型的默认值 需要通过一系列的setter方法 ...
- Python学习第二十三课——Mysql 表记录的一些基本操作 (查)
查(select * from 表名) 基本语法: select <字段1,字段2,...> from <表名> where <表达式>; 例如,查询student ...
- 【转载】五分钟让你彻底了解TDD、ATDD、BDD&RBE
在目前比较流行的敏捷开发模式(如极限编程.Scrum方法等)中,推崇“测试驱动开发(Test Driven Development,TDD)”——测试在先.编码在后的开发实践.TDD有别于以往的“先编 ...