mirror of
https://github.com/papers-we-love/papers-we-love.git
synced 2025-06-13 12:54:28 +00:00
Merge branch 'master' into master
This commit is contained in:
commit
542934d516
26
README.md
26
README.md
@ -23,18 +23,15 @@ Here are our official chapters. Let us know if you are interested in [starting o
|
||||
* [Bhubaneswar](https://www.facebook.com/groups/pwlbbsr/)
|
||||
* [Boston](http://www.meetup.com/Papers-We-Love-Boston-Cambridge/)
|
||||
* [Brasilia](http://www.meetup.com/papers-we-love-bsb)
|
||||
* [Boulder](http://www.meetup.com/Papers-We-Love-Boulder/)
|
||||
* [Bucharest](http://www.meetup.com/papers-we-love-bucharest/)
|
||||
* [Buenos Aires](https://paperswelove.org/buenos-aires/)
|
||||
* [Cairo](http://www.meetup.com/Papers-We-Love-Cairo/)
|
||||
* [Chattanooga](http://www.meetup.com/Papers-We-Love-Chattanooga/)
|
||||
* [Chicago](http://www.meetup.com/papers-we-love-chicago/)
|
||||
* [Columbus, Ohio](http://www.meetup.com/Papers-We-Love-Columbus/)
|
||||
* [Dallas](http://www.papersdallas.com/)
|
||||
* [Gothenburg](https://www.meetup.com/Papers-We-Love-Gothenburg/)
|
||||
* [Guadalajara](https://www.facebook.com/pwlgdl/)
|
||||
* [Hamburg](http://www.meetup.com/Papers-We-Love-Hamburg/)
|
||||
* [Hyderabad](http://www.meetup.com/papers-we-love-hyderabad/)
|
||||
* [Iasi](http://www.meetup.com/Papers-We-Love-Iasi/)
|
||||
* [Iowa City](https://www.meetup.com/techcorridorio)
|
||||
* [Kathmandu](https://www.facebook.com/groups/PapersWeLoveKathmandu/)
|
||||
* [Kyiv](https://www.facebook.com/groups/PapersWeLoveKyiv)
|
||||
@ -42,18 +39,11 @@ Here are our official chapters. Let us know if you are interested in [starting o
|
||||
* [London](http://www.meetup.com/papers-we-love-london)
|
||||
* [Los Angeles](http://www.meetup.com/papers-we-love-la)
|
||||
* [Madrid](http://www.meetup.com/Papers-We-Love-Madrid/)
|
||||
* [Medellín](https://www.meetup.com/paperswelovemde/)
|
||||
* [Montreal](http://www.meetup.com/Papers-We-Love-Montreal/)
|
||||
* [Mumbai](https://www.meetup.com/Papers-We-Love-Mumbai/)
|
||||
* [Munich](http://www.meetup.com/Papers-We-Love-Munich/)
|
||||
* [New York City](http://www.meetup.com/papers-we-love/)
|
||||
* [Paris](http://www.meetup.com/Papers-We-Love-Paris/)
|
||||
* [Philadelphia](http://www.meetup.com/Papers-We-Love-Philadelphia/)
|
||||
* [Portland](http://www.meetup.com/Papers-We-Love-PDX/)
|
||||
* [Porto](https://www.meetup.com/Papers-We-Love-Porto)
|
||||
* [Pune](http://www.meetup.com/Doo-Things)
|
||||
* [Raleigh-Durham](https://www.meetup.com/Papers-We-Love-Raleigh-Durham/)
|
||||
* [Reykjavík](http://www.meetup.com/Papers-We-Love-Reykjavik)
|
||||
* [Rio de Janeiro](https://www.meetup.com/pt-BR/papers-we-love-rio-de-janeiro/)
|
||||
* [San Diego](http://www.meetup.com/Papers-We-Love-San-Diego/)
|
||||
* [San Francisco](http://www.meetup.com/papers-we-love-too/)
|
||||
@ -98,7 +88,7 @@ We're looking for pull requests related to papers we should add, better organiza
|
||||
* [Readings in Distributed Systems](http://christophermeiklejohn.com/distributed/systems/2013/07/12/readings-in-distributed-systems.html)
|
||||
* [Gradual Typing Bibliography](http://samth.github.io/gradual-typing-bib/)
|
||||
* [Security Data Science Papers](http://www.covert.io/the-definitive-security-datascience-and-machinelearning-guide/)
|
||||
* [Research Papers from Robert Harper, Carnegie Mellon University](http://www.cs.cmu.edu/~rwh/papers.html)
|
||||
* [Research Papers from Robert Harper, Carnegie Mellon University](https://www.cs.cmu.edu/~rwh/papers/index.html)
|
||||
* [Lobste.rs tagged as PDF](https://lobste.rs/t/pdf)
|
||||
* [The Morning Paper](http://blog.acolyer.org/)
|
||||
|
||||
@ -118,6 +108,18 @@ Reading a paper is not the same as reading a blogpost or a novel. Here are a few
|
||||
|
||||
* Love a Paper - [@loveapaper](https://twitter.com/loveapaper)
|
||||
|
||||
### Download papers
|
||||
|
||||
Open your favourite terminal and run:
|
||||
|
||||
```bash
|
||||
$ ./scripts/download.sh
|
||||
```
|
||||
|
||||
This will scrape markdown files for links to PDFs and download papers to their respective directories.
|
||||
|
||||
See [README.md](./scripts/README.md) for more options.
|
||||
|
||||
## Contributing Guidelines
|
||||
|
||||
Please take a look at our [CONTRIBUTING.md](https://github.com/papers-we-love/papers-we-love/blob/master/.github/CONTRIBUTING.md) file.
|
||||
|
6
bioinformatics/README.md
Normal file
6
bioinformatics/README.md
Normal file
@ -0,0 +1,6 @@
|
||||
Bioinformatics
|
||||
===========
|
||||
## Sequence Analysis
|
||||
* [SneakySnake: A Fast and Accurate Universal Genome Pre-Alignment Filter for CPUs, GPUs, and FPGAs (2019)](https://arxiv.org/abs/1910.09020v2)
|
||||
* [Shouji: a fast and efficient pre-alignment filter for sequence alignment (2019)](https://arxiv.org/ftp/arxiv/papers/1809/1809.07858.pdf)
|
||||
* [Shifted Hamming distance: a fast and accurate SIMD-friendly filter to accelerate alignment verification in read mapping (2015)](https://doi.org/10.1093/bioinformatics/btu856)
|
6
brain-computer-interface/README.md
Normal file
6
brain-computer-interface/README.md
Normal file
@ -0,0 +1,6 @@
|
||||
# Brain–computer Interface
|
||||
|
||||
- [Brain-computer interfaces for communication and control](http://www.cs.cmu.edu/~tanja/BCI/BCIreview.pdf)
|
||||
- [Breaking the silence: Brain-computer interfaces (BCI) for communication and motor control](https://onlinelibrary.wiley.com/doi/full/10.1111/j.1469-8986.2006.00456.x)
|
||||
- [Learning to Control a Brain–Machine Interface for Reaching and Grasping by Primates](https://journals.plos.org/plosbiology/article?id=10.1371/journal.pbio.0000042)
|
||||
- [BrainNet: A Multi-Person Brain-to-Brain Interface for Direct Collaboration Between Brains](https://arxiv.org/pdf/1809.08632.pdf)
|
@ -28,7 +28,7 @@ This is a really great paper that is both complex and straightforward. This pape
|
||||
* [Light Propagation Volumes in CryEngine 3](http://www.crytek.com/download/Light_Propagation_Volumes.pdf)
|
||||
|
||||
### Bump mapping
|
||||
* [Interactive Horizon Mapping: Shadows for bump-mapped surfaces](http://research.microsoft.com/en-us/um/people/cohen/bs.pdf)
|
||||
* [Interactive Horizon Mapping: Shadows for bump-mapped surfaces](https://www.ppsloan.org/publications/bs.pdf)
|
||||
|
||||
### Interior mapping
|
||||
* [Interior Mapping: A new technique for rendering realistic buildings](http://www.proun-game.com/Oogst3D/CODING/InteriorMapping/InteriorMapping.pdf)
|
||||
@ -54,3 +54,8 @@ This is a really great paper that is both complex and straightforward. This pape
|
||||
- A seminal paper that lead to many interesting applications in
|
||||
graphics as well as more broadly in design; see also the
|
||||
bibliography at [shapegrammar.org](http://shapegrammar.org/).
|
||||
|
||||
### Simulating Ocean Water
|
||||
|
||||
* [Simulating Ocean Water](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.161.9102&rep=rep1&type=pdf)
|
||||
- Seminal paper on water surface simulation and rendering.
|
||||
|
@ -6,3 +6,7 @@
|
||||
|
||||
* [Panorama Weaving:
|
||||
Fast and Flexible Seam Processing](http://www.sci.utah.edu/~bsumma/projects/weaving/)
|
||||
|
||||
* [Object Identification for Computer Vision Using Image Segmentation](https://ieeexplore.ieee.org/document/5529412)
|
||||
|
||||
* [Computer Vision Based Detection and Localization of Potholes in Asphalt Pavement Images](https://ieeexplore.ieee.org/document/7726722)
|
||||
|
@ -10,7 +10,7 @@
|
||||
* [Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 (2017)](https://papers.mathyvanhoef.com/ccs2017.pdf) (Mathy Vanhoef, Frank Piessens)
|
||||
|
||||
## Related Works
|
||||
### [A Mathematical Theory of Cryptography (1945)](http://www.cs.bell-labs.com/who/dmr/pdfs/shannoncryptshrt.pdf) - Shannon
|
||||
### [A Mathematical Theory of Cryptography (1945)](https://www.iacr.org/museum/shannon/shannon45.pdf) - Shannon
|
||||
The original classified memo for Bell Labs that was republished in 1949 as ["Communication Theory of Secrecy Systems"](communication-theory-of-secrecy-systems.pdf).
|
||||
|
||||
### :scroll: [A Mathematical Theory of Communication (1948)](../information_theory/a-mathematical-theory-of-communication-1948.pdf) - Shannon
|
||||
|
@ -1,18 +1,22 @@
|
||||
# Data Compression
|
||||
|
||||
* :scroll: [Data Compression](data-compression.pdf)
|
||||
> This paper surveys a variety of data compression methods spanning almost 40 years of research, from the work of Shannon, Fano and Huffman in the 40's, to a technique developed in 1986.
|
||||
|
||||
> This paper surveys a variety of data compression methods spanning almost 40 years of research, from the work of Shannon, Fano and Huffman in the 40's, to a technique developed in 1986.
|
||||
|
||||
## Scientific Data Compression
|
||||
|
||||
* :scroll: [Fast Error-bounded Lossy HPC Data Compression with SZ](https://www.mcs.anl.gov/papers/P5437-1115.pdf)
|
||||
>This is the first version of SZ. In this paper, SZ is introduced to achieve data reduction using regression-based data point prediction.
|
||||
|
||||
> This is the first version of SZ. In this paper, SZ is introduced to achieve data reduction using regression-based data point prediction.
|
||||
|
||||
* :scroll: [Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error-Controlled Quantization](https://arxiv.org/pdf/1706.03791.pdf)
|
||||
|
||||
> This work is known as SZ-1.4. In this work, SZ employs multi-dimensional data prediction so that data with dimension larger than 1 is no longer linearized into single dimension before compression. In this way, more data locality is preserved thus compression ratio is improved.
|
||||
|
||||
* :scroll: [Error-Controlled Lossy Compression Optimized for High Compression Ratios of Scientific Datasets](https://www.mcs.anl.gov/~hguo/publications/LiangDTLLGCC18.pdf)
|
||||
> This work is known as SZ-2.0. In this work, authors proposed an online selection tool between 2 predictors, the mean-integrated Lorenzo predictor and linear regression-based predictor. Users can choose the predictor that yields larger compression ratio with higher prediction accuracy.
|
||||
* :scroll: [Error-Controlled Lossy Compression Optimized for High Compression Ratios of Scientific Datasets](https://www.mcs.anl.gov/~hguo/publications/LiangDTLLGCC18.pdf)
|
||||
|
||||
> This work is known as SZ-2.0. In this work, authors proposed an online selection tool between 2 predictors, the mean-integrated Lorenzo predictor and linear regression-based predictor. Users can choose the predictor that yields larger compression ratio with higher prediction accuracy.
|
||||
|
||||
* :scroll: [Fixed-Rate Compressed Floating-Point Arrays](http://vis.cs.ucdavis.edu/vis2014papers/TVCG/papers/2674_20tvcg12-lindstrom-2346458.pdf)
|
||||
|
||||
|
@ -63,7 +63,7 @@
|
||||
|
||||
* [Unicorn: A System for Searching the Social Graph](http://db.disi.unitn.eu/pages/VLDBProgram/pdf/industry/p871-curtiss.pdf)
|
||||
|
||||
* [Unikernels: Library Operating Systems for the Cloud](http://anil.recoil.org/papers/2013-asplos-mirage.pdf)
|
||||
* [Unikernels: Library Operating Systems for the Cloud](http://unikernel.org/files/2013-asplos-mirage.pdf)
|
||||
|
||||
* [Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms](http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf)
|
||||
|
||||
|
@ -6,6 +6,8 @@
|
||||
|
||||
* [Optimal Bidding in Online Auctions (2001)](http://www.mit.edu/~dbertsim/papers/Revenue%20Management/Optimal%20Bidding%20in%20Online%20Auctions.pdf) by Dimitris Bertsimas, Jerey Hawkinsy, Georgia Perakis
|
||||
|
||||
* [Online Ad Auctions (2009)](online-ad-auctions.pdf) by Hal Varian
|
||||
|
||||
## Open Source
|
||||
|
||||
* [The Simple economics of Open Source (2000)](http://www.people.hbs.edu/jlerner/simple.pdf) by Josh Lerner and Jean Tirole
|
||||
* [The Simple Economics of Open Source (2000)](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=224008) by Josh Lerner and Jean Tirole
|
||||
|
BIN
economics/online-ad-auctions.pdf
Normal file
BIN
economics/online-ad-auctions.pdf
Normal file
Binary file not shown.
@ -8,7 +8,7 @@
|
||||
|
||||
* [Exploring the Potential of Gamification Among Frail Elderly Persons](http://gamification-research.org/wp-content/uploads/2011/04/12-Gerling.pdf)
|
||||
|
||||
* [From Game Design Elements to Gamefulness: Defining “Gamification”](http://dl.dropboxusercontent.com/u/220532/MindTrek_Gamification_PrinterReady_110806_SDE_accepted_LEN_changes_1.pdf)
|
||||
* [From Game Design Elements to Gamefulness: Defining “Gamification”](https://uwaterloo.ca/scholar/sites/ca.scholar/files/lnacke/files/From_game_design_elements_to_gamefulness-_defining_gamification.pdf)
|
||||
|
||||
* [MoviPill: Improving Medication Compliance for Elders - Using a Mobile Persuasive Social Game](http://www.ic.unicamp.br/~oliveira/doc/Ubicomp2010_MoviPill.pdf)
|
||||
|
||||
|
@ -47,4 +47,14 @@ The included documents are
|
||||
|
||||
* [:scroll:](authoritative-sources-in-a-hyperlinked-environment.pdf) [Authoritative Sources in a Hyperlinked Environment](https://www.cs.cornell.edu/home/kleinber/auth.pdf) - Jon M. Kleinberg
|
||||
|
||||
This paper introduces the **HITS algorithm**, a link analysis algorithm that rates webpages. Unlike the more famous page rank algorithm, the hits algorithm makes a distinction between webpage behavior classifies them as hubs and authorities. A page is authoratitative (in the sense the page has a large number of incoming links) or acts as a hub (a directory of sort, which can be measured by the number of outgoing link). The hits algorithm computes two scores for a page (authority and hub score) where the algorithm iteratively computes the hub score as sum of authority scores of outgoing links and authority scores as sum of hub scores of incoming links until a convergence is attained. These scores can then be used to rank documents. While this algorithm is famous in academia, its not very widely used in the industry (a variant of this algorithm was used by a company called Teoma which was acquired by AskJeeves)
|
||||
This paper introduces the **HITS algorithm**, a link analysis algorithm that rates webpages.
|
||||
Unlike the more famous page rank algorithm, the hits algorithm makes a distinction between
|
||||
webpage behavior classifies them as hubs and authorities. A page is authoratitative
|
||||
(in the sense the page has a large number of incoming links) or acts as a hub
|
||||
(a directory of sort, which can be measured by the number of outgoing link).
|
||||
The hits algorithm computes two scores for a page (authority and hub score) where
|
||||
the algorithm iteratively computes the hub score as sum of authority scores of
|
||||
outgoing links and authority scores as sum of hub scores of incoming links until
|
||||
a convergence is attained. These scores can then be used to rank documents.
|
||||
While this algorithm is famous in academia, its not very widely used in the
|
||||
industry (a variant of this algorithm was used by a company called Teoma which was acquired by AskJeeves)
|
||||
|
@ -1,6 +1,6 @@
|
||||
# Functional Programming
|
||||
|
||||
* [:scroll:](organizing-programs-without-classes.pdf) [Organizing Programs Without Classes](http://cs.au.dk/~hosc/local/LaSC-4-3-pp223-242.pdf)
|
||||
* :scroll: [Organizing Programs Without Classes](organizing-programs-without-classes.pdf)
|
||||
* [:scroll:](functional-programming-with-bananas-lenses-envelops-and-barbed-wire.pdf) [Functional Programming with Bananas, Lenses, Envelopes and Barbed Wire](http://eprints.eemcs.utwente.nl/7281/01/db-utwente-40501F46.pdf)
|
||||
|
||||
From Patrick Thomson's [An introduction to Recursion Schemes](http://patrickthomson.ghost.io/an-introduction-to-recursion-schemes/):
|
||||
|
@ -2,26 +2,27 @@
|
||||
|
||||
* [Can Programming Be Liberated from the von Neumann Style? A Functional Style and Its Algebra of Programs](http://www.thocp.net/biographies/papers/backus_turingaward_lecture.pdf)
|
||||
|
||||
* [:scroll:](https://github.com/papers-we-love/papers-we-love/blob/master/plt/programming-with-algebraic-effects-and-handlers.pdf) [Programming and Reasoning with Algebraic Effects and Dependent Types](http://eb.host.cs.st-andrews.ac.uk/drafts/effects.pdf)
|
||||
* [:scroll:](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/programming-with-algebraic-effects-and-handlers.pdf) [Programming and Reasoning with Algebraic Effects and Dependent Types](http://eb.host.cs.st-andrews.ac.uk/drafts/effects.pdf)
|
||||
|
||||
* [Programming Languages: History and Future](http://www.csee.umbc.edu/courses/undergraduate/CMSC331/resources/papers/sammet1972.pdf)
|
||||
|
||||
* [Soft Typing](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.9333&rep=rep1&type=pdf)
|
||||
|
||||
* [:scroll:](https://github.com/papers-we-love/papers-we-love/blob/master/plt/composable-and-compilable-macros-you-want-it-when.pdf) [Composable and Compilable Macros: You Want it When?](https://www.cs.utah.edu/plt/publications/macromod.pdf)
|
||||
* [:scroll:](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/composable-and-compilable-macros-you-want-it-when.pdf) [Composable and Compilable Macros: You Want it When?](https://www.cs.utah.edu/plt/publications/macromod.pdf)
|
||||
|
||||
* :scroll: [Propositions as Types](http://homepages.inf.ed.ac.uk/wadler/papers/propositions-as-types/propositions-as-types.pdf)
|
||||
|
||||
* :scroll: [Fundamental Concepts in Programming Languages](https://github.com/papers-we-love/papers-we-love/blob/master/plt/fundamental-concepts-in-programming-languages.pdf)
|
||||
* :scroll: [Fundamental Concepts in Programming Languages](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/fundamental-concepts-in-programming-languages.pdf)
|
||||
|
||||
* :scroll: [On Understanding Types,
Data Abstraction, and Polymorphism](https://github.com/papers-we-love/papers-we-love/blob/master/plt/on-understanding-types-data-abstraction-polymorphism.pdf)
|
||||
* :scroll: [On Understanding Types,
|
||||
Data Abstraction, and Polymorphism](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/on-understanding-types-data-abstraction-polymorphism.pdf)
|
||||
|
||||
* :scroll: [Predicate Dispatching](https://github.com/papers-we-love/papers-we-love/blob/master/plt/predicate-dispatching.pdf)
|
||||
* :scroll: [Predicate Dispatching](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/predicate-dispatching.pdf)
|
||||
|
||||
* :scroll: [Principal type-schemes for functional programs](https://github.com/papers-we-love/papers-we-love/blob/master/plt/principal-type-schemes-for-functional-programs.pdf)
|
||||
* :scroll: [Principal type-schemes for functional programs](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/principal-type-schemes-for-functional-programs.pdf)
|
||||
|
||||
* :scroll: [Programming Languages: Application and Interpretation](https://github.com/papers-we-love/papers-we-love/blob/master/plt/programming-languages-application-and-interpretation.pdf)
|
||||
* :scroll: [Programming Languages: Application and Interpretation](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/programming-languages-application-and-interpretation.pdf)
|
||||
|
||||
* :scroll: [The Derivative of a Regular Type is its Type of One-Hole Contexts](https://github.com/papers-we-love/papers-we-love/blob/master/plt/the-derivative-of-a-regular-type-one-hole-contexts.pdf)
|
||||
* :scroll: [The Derivative of a Regular Type is its Type of One-Hole Contexts](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/the-derivative-of-a-regular-type-one-hole-contexts.pdf)
|
||||
|
||||
* :scroll: [Theory in Programming Practice](https://github.com/papers-we-love/papers-we-love/blob/master/plt/theory-in-programming-practice.pdf)
|
||||
* :scroll: [Theory in Programming Practice](https://github.com/papers-we-love/papers-we-love/blob/master/languages-theory/theory-in-programming-practice.pdf)
|
||||
|
BIN
machine_learning/General-self-similarity--an-overview.pdf
Normal file
BIN
machine_learning/General-self-similarity--an-overview.pdf
Normal file
Binary file not shown.
@ -1,29 +1,59 @@
|
||||
# Machine Learning
|
||||
|
||||
|
||||
## External Papers
|
||||
|
||||
* [Top 10 algorithms in data mining](http://www.cs.uvm.edu/~icdm/algorithms/10Algorithms-08.pdf) - While it is difficult to identify the top 10, this paper contains 10 very important data mining/machine learning algorithms
|
||||
* [A Few Useful Things to Know about Machine Learning](http://homes.cs.washington.edu/~pedrod/papers/cacm12.pdf) - Just like the title says, it contains many useful tips and gotchas for machine learning
|
||||
* [Random Forests](https://www.stat.berkeley.edu/~breiman/randomforest2001.pdf) - The initial paper on random forests
|
||||
* [Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data](http://repository.upenn.edu/cgi/viewcontent.cgi?article=1162&context=cis_papers) - The paper introducing conditional random fields as a framework for building probabilistic models.
|
||||
* [Support-Vector Networks](http://rd.springer.com/content/pdf/10.1007%2FBF00994018.pdf) - The initial paper on support-vector networks for classification.
|
||||
* [Top 10 algorithms in data mining](https://www.researchgate.net/publication/29467751_Top_10_algorithms_in_data_mining)
|
||||
|
||||
While it is difficult to identify the top 10, this paper contains 10 very important data mining/machine learning algorithms
|
||||
|
||||
* [A Few Useful Things to Know about Machine Learning](http://homes.cs.washington.edu/~pedrod/papers/cacm12.pdf)
|
||||
|
||||
Just like the title says, it contains many useful tips and gotchas for machine learning
|
||||
* [Random Forests](https://www.stat.berkeley.edu/~breiman/randomforest2001.pdf)
|
||||
|
||||
The initial paper on random forests
|
||||
* [Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data](http://repository.upenn.edu/cgi/viewcontent.cgi?article=1162&context=cis_papers)
|
||||
|
||||
The paper introducing conditional random fields as a framework for building probabilistic models.
|
||||
* [Support-Vector Networks](http://rd.springer.com/content/pdf/10.1007%2FBF00994018.pdf)
|
||||
|
||||
The initial paper on support-vector networks for classification.
|
||||
|
||||
* [The Fast Johnson-Lindenstrauss Transforms](https://www.cs.princeton.edu/~chazelle/pubs/FJLT-sicomp09.pdf)
|
||||
|
||||
The Johnson-Lindenstrauss transform (JLT) prescribes that there exists a matrix of size `k x d`, where `k = O(1/eps^2 log d)` such that with high probability, a matrix A drawn from this distribution preserves pairwise distances up to epsilon (e.g. `(1-eps) * ||x-y|| < ||Ax - Ay|| < (1+eps) ||x-y||`). This paper was the first paper to show that you can actually compute the JLT in less that `O(kd)` operations (e.g. you don't need to do the full matrix multiplication). They used their faster algorithm to construct one of the fastest known approximate nearest neighbor algorithms.
|
||||
|
||||
*Ailon, Nir, and Bernard Chazelle. "The fast Johnson-Lindenstrauss transform and approximate nearest neighbors." SIAM Journal on Computing 39.1 (2009): 302-322. Available: https://www.cs.princeton.edu/~chazelle/pubs/FJLT-sicomp09.pdf*
|
||||
|
||||
* [Applications of Machine Learning to Location Data](http://www.berkkapicioglu.com/wp-content/uploads/2013/11/thesis_final.pdf) - Using machine learning to design and analyze novel algorithms that leverage location data.
|
||||
* [Applications of Machine Learning to Location Data](http://www.berkkapicioglu.com/wp-content/uploads/2013/11/thesis_final.pdf)
|
||||
|
||||
* ["Why Should I Trust You?" Explaining the Predictions of Any Classifier](http://www.kdd.org/kdd2016/papers/files/rfp0573-ribeiroA.pdf) - This paper introduces an explanation technique for any classifier in a interpretable manner.
|
||||
Using machine learning to design and analyze novel algorithms that leverage location data.
|
||||
|
||||
* [Multiple Narrative Disentanglement: Unraveling *Infinite Jest*](http://dreammachin.es/p1-wallace.pdf) - uses an unsupervised approach to natural language processing to classify narrators in David Foster Wallace's 1,000-page novel.
|
||||
* ["Why Should I Trust You?" Explaining the Predictions of Any Classifier](http://www.kdd.org/kdd2016/papers/files/rfp0573-ribeiroA.pdf)
|
||||
|
||||
* [ImageNet Classification with Deep Convolutional Neural Networks](http://papers.nips.cc/paper/4824-imagenet-classification-with-deep-convolutional-neural-networks.pdf) - This paper introduces AlexNet, a neural network architecture which dramatically improved over the state-of-the-art in image classification algorithms and is widely regarded as a breakthrough moment for deep learning.
|
||||
This paper introduces an explanation technique for any classifier in a interpretable manner.
|
||||
|
||||
* [Interpretable machine learning: definitions, methods, and applications](https://arxiv.org/pdf/1901.04592.pdf) - This paper introduces the foundations of the rapidly emerging field of interpretable machine learning.
|
||||
* [Multiple Narrative Disentanglement: Unraveling *Infinite Jest*](http://dreammachin.es/p1-wallace.pdf)
|
||||
|
||||
Uses an unsupervised approach to natural language processing that classifies narrators in David Foster Wallace's 1,000-page novel.
|
||||
|
||||
* [ImageNet Classification with Deep Convolutional Neural Networks](http://papers.nips.cc/paper/4824-imagenet-classification-with-deep-convolutional-neural-networks.pdf)
|
||||
|
||||
This paper introduces AlexNet, a neural network architecture which dramatically improved over the state-of-the-art in image classification algorithms and is widely regarded as a breakthrough moment for deep learning.
|
||||
|
||||
* [Interpretable machine learning: definitions, methods, and applications](https://arxiv.org/pdf/1901.04592.pdf)
|
||||
|
||||
This paper introduces the foundations of the rapidly emerging field of interpretable machine learning.
|
||||
|
||||
* [Distilling the Knowledge in a Neural Network](https://arxiv.org/pdf/1503.02531.pdf)
|
||||
|
||||
This seminal paper introduces a method to distill information from an ensemble of neural networks into a single model.
|
||||
|
||||
* [Truncation of Wavelet Matrices: Edge Effects and the Reduction of Topological Control](https://reader.elsevier.com/reader/sd/pii/0024379594000395?token=EB0AA78D59A9648480596F018EFB72E0A02FD5FA70326B24B9D501E1A6869FE72CC4D97FA9ACC8BAB56060D6C908EC83) by Freedman
|
||||
|
||||
In this paper by Michael Hartley Freedman, he applies Robion Kirby “torus trick”, via wavelets, to the problem of compression.
|
||||
|
||||
* [Distilling the Knowledge in a Neural Network](https://arxiv.org/pdf/1503.02531.pdf) - This seminal paper introduces a method to distill information from an ensemble of neural networks into a single model.
|
||||
|
||||
## Hosted Papers
|
||||
|
||||
@ -39,3 +69,11 @@
|
||||
|
||||
*Bourgain, Jean, and Jelani Nelson. "Toward a unified theory of sparse dimensionality reduction in euclidean space." arXiv preprint arXiv:1311.2542; Accepted in an AMS Journal but unpublished at the moment (2013). Available: http://arxiv.org/abs/1311.2542*
|
||||
|
||||
|
||||
* :scroll: **[Understanding Deep Convolutional Networks](Understanding-Deep-Convolutional-Networks.pdf)** by Mallat
|
||||
|
||||
Stéphane Mallat proposes a model by which renormalisation can identify self-similar structures in deep networks. [This video of Curt MacMullen discussing renormalization](https://www.youtube.com/watch?v=_qjPFF5Gv1I) can help with more context.
|
||||
|
||||
* :scroll: **[General self-similarity: an overview](General-self-similarity--an-overview.pdf)** by Leinster
|
||||
|
||||
Dr. Leinster's paper provides a concise, straightforward, picture of self-similarity, and its role in renormalization.
|
||||
|
BIN
machine_learning/Understanding-Deep-Convolutional-Networks.pdf
Normal file
BIN
machine_learning/Understanding-Deep-Convolutional-Networks.pdf
Normal file
Binary file not shown.
@ -1,5 +1,48 @@
|
||||
## Mathematics
|
||||
|
||||
* [:scroll:](transcendence-of-pi.pdf) [The Transcendence of pi](https://github.com/papers-we-love/papers-we-love/blob/master/mathematics/transcendence-of-pi.pdf) by Steve Mayer
|
||||
* :scroll: [The Transcendence of Pi](transcendence-of-pi.pdf) by Steve Mayer
|
||||
|
||||
* :scroll: [Tilings](tilings.pdf) by Ardila
|
||||
|
||||
The paper covers a broad swath of the topic on analysis of tiling, and related strategies.
|
||||
|
||||
* :scroll: [From Dominoes to Hexagons](from-dominoes-to-hexagons.pdf) by Thurston
|
||||
|
||||
A paper on the generalization of tilings across different base planes.
|
||||
|
||||
* :scroll: [Graph Isomorphism and Representation Theory](graph-isomorphism-and-representation-theory.pdf) by Daniel Litt
|
||||
|
||||
The *graph isomorphism problem* shows how to construct graphs using a simple building-block ("basis"). The same method applies to finding different building blocks to construct the same things. This technique can be applied to file systems, greplin, trees, virtual DOM, etc.
|
||||
|
||||
A short paper, it also shows how to use `𝔰𝔩₂(ℂ)` as a simple mathematical object that leads into the area of real mathematics—represention theory.
|
||||
|
||||
* [Conway's ZIP proof](https://www.maths.ed.ac.uk/~v1ranick/papers/francisweeks.pdf) by George Francis and Jeffrey Weeks
|
||||
|
||||
This paper presents a classification proof: "How can it be that you know something about _all possible_ `X`, even the `xϵX` you haven’t seen yet?" The well-diagramed discussion requires no calculus, crypto, ML, or dense notation, making it good for most knowledge levels.
|
||||
|
||||
* [Packing of Spheres](http://neilsloane.com/doc/Me109.pdf) by N. Sloane
|
||||
|
||||
Discusses the role of E8 & Leech lattices in optimal codes for mathematically-ideal compression. Ikosahedrons, a tool in this investigation, are also presented.
|
||||
|
||||
* [Some Underlying Geometric Notions](https://pi.math.cornell.edu/~hatcher/AT/AT.pdf) by Hatcher
|
||||
|
||||
High-Level survey which relates disparate topics, e.g. Platonic solids (A-D-E), Milnor’s exceptional fibre, and algebra.
|
||||
|
||||
* [What is a Young Tableaux?](https://www.ams.org/notices/200702/whatis-yong.pdf) by Alexander Yong
|
||||
|
||||
Young Tableau appear in combinatoric problems, representation theory, and the calculus of Grassmannians. Another common topic is sorting, and smarter ways to organise sub-sorts.
|
||||
|
||||
|
||||
### Topology
|
||||
|
||||
* [Topology of Numbers](https://pi.math.cornell.edu/~hatcher/TN/TNbook.pdf) by hatcher
|
||||
|
||||
* [Applied Algebraic Topology and Sensor Networks](https://www.math.upenn.edu/~ghrist/preprints/ATSN.pdf) by Robert Ghrist
|
||||
|
||||
* :scroll: [Intro to Tropical Algebra Geometry](intro-to-tropical-algebraic-geometry.pdf)
|
||||
|
||||
Recently there have been some papers posted about tropical geometry of neural nets. Tropical is also said to be derived from CS. This is a good introduction.
|
||||
|
||||
* [Elements of Algebraic Topology: Sheaves](https://www.math.upenn.edu/~ghrist/EAT/EATchapter9.pdf) by Ghrist
|
||||
|
||||
Seminal writing on topological structures, from one most lauded books 'Elements of Algebraic Topology'
|
||||
|
BIN
mathematics/from-dominoes-to-hexagons.pdf
Normal file
BIN
mathematics/from-dominoes-to-hexagons.pdf
Normal file
Binary file not shown.
BIN
mathematics/graph-isomorphism-and-representation-theory.pdf
Normal file
BIN
mathematics/graph-isomorphism-and-representation-theory.pdf
Normal file
Binary file not shown.
BIN
mathematics/intro-to-tropical-algebraic-geometry.pdf
Normal file
BIN
mathematics/intro-to-tropical-algebraic-geometry.pdf
Normal file
Binary file not shown.
BIN
mathematics/tilings.pdf
Normal file
BIN
mathematics/tilings.pdf
Normal file
Binary file not shown.
@ -2,6 +2,6 @@
|
||||
|
||||
* [Bimodal Multicast](http://www.csl.mtu.edu/cs6461/www/Reading/Birman99.pdf)
|
||||
* [End-to-End Arguments in System Design](http://www.deepplum.com/dpr/locus/Papers/EndtoEnd.html)
|
||||
* [Can SPDY Really Make the Web Faster?](http://www.comp.lancs.ac.uk/~elkhatib//Docs/2014.06_Netw.pdf)
|
||||
* [Can SPDY Really Make the Web Faster?](http://www.eecs.qmul.ac.uk/~tysong/files/IFIPNetworking14.pdf)
|
||||
* [Datacenter Traffic Control: Understanding Techniques and Trade-offs](https://osf.io/6qzxc/)
|
||||
* [B4: Experience with a Globally-Deployed Software Defined WAN](https://dl.acm.org/citation.cfm?id=2486019)
|
||||
|
@ -8,7 +8,6 @@
|
||||
|
||||
## Jails and containers
|
||||
|
||||
* :scroll: [Jails: Confining the omnipotent root.](https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdf)
|
||||
|
||||
* :scroll: [Solaris Zones: Operating System Support for Consolidating Commercial Workloads](https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdf)
|
||||
* :scroll: [Jails: Confining the omnipotent root.](http://phk.freebsd.dk/pubs/sane2000-jail.pdf)
|
||||
|
||||
* :scroll: [Solaris Zones: Operating System Support for Consolidating Commercial Workloads](https://www.usenix.org/legacy/event/lisa04/tech/full_papers/price/price.pdf)
|
||||
|
10
privacy/README.md
Normal file
10
privacy/README.md
Normal file
@ -0,0 +1,10 @@
|
||||
## Privacy
|
||||
|
||||
* [k-ANONYMITY: A model for Protecting Privacy (1998)](https://dataprivacylab.org/dataprivacy/projects/kanonymity/kanonymity.pdf)
|
||||
* [Differential Privacy(2006)](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/dwork.pdf)
|
||||
* [Robust De-anonymization of Large Sparse Datasets(2008)](https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf)
|
||||
* [Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization(2010)](https://www.uclalawreview.org/broken-promises-of-privacy-responding-to-the-surprising-failure-of-anonymization-2/)
|
||||
* [Timing Attacks on Web Privacy(2000)](https://sip.cs.princeton.edu/pub/webtiming.pdf)
|
||||
* [Protecting Browser State from Web Privacy Attacks(2006)](https://crypto.stanford.edu/sameorigin/sameorigin.pdf)
|
||||
* [KHyperLogLog: Estimating Reidentifiability and
|
||||
Joinability of Large Data at Scale(2019)](https://storage.googleapis.com/pub-tools-public-publication-data/pdf/40bc2804cbd3e41ed28dc8991316361eca48630c.pdf)
|
@ -9,7 +9,7 @@ Robotics
|
||||
|
||||
[Online Trajectory Generation: Basic Concepts for Instantaneous Reactions to Unforeseen Events](http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5350749)
|
||||
|
||||
[Probablistic Roadmaps for Path Planning in High-Dimensional Configuration Spaces](http://www.kavrakilab.org/sites/default/files/kavraki1996prm-high-dim-conf.pdf)
|
||||
[Probablistic Roadmaps for Path Planning in High-Dimensional Configuration Spaces](https://www.cs.cmu.edu/~./motionplanning/papers/sbp_papers/PRM/prmbasic_01.pdf)
|
||||
|
||||
[Rapidly-Exploring Random Trees: A New Tool for Path Planning](http://msl.cs.uiuc.edu/~lavalle/papers/Lav98c.pdf)
|
||||
|
||||
@ -29,7 +29,7 @@ planning. The problem of motion planning scales exponentially with the
|
||||
degrees of freedom a robot has and the degrees of freedom the obstacles
|
||||
in an environment have. Thus, planning with high degrees of freedom leads to many problems
|
||||
such as incompleteness and extremely slow speed. The PRM method was the first to
|
||||
propose a sampling-based stratey to deal with motion planning and
|
||||
propose a sampling-based strategy to deal with motion planning and
|
||||
created a practical method for offline planning of robot manipulators.
|
||||
The RRT method modified PRM by using a tree structure rather than a
|
||||
graph so that non-holonomic and other constraints could be considered
|
||||
|
22
scripts/README.md
Normal file
22
scripts/README.md
Normal file
@ -0,0 +1,22 @@
|
||||
# Scripts
|
||||
|
||||
Scripts for working with repository content.
|
||||
|
||||
## Download Utility
|
||||
A convenience script to download papers. This will scrape the README.md files for URLs containing links to pdfs and download them to their respective directories.
|
||||
|
||||
The download utility is idempotent and can be run multiple times safely.
|
||||
|
||||
### Usage
|
||||
Open your favourite terminal and run:
|
||||
|
||||
```bash
|
||||
$ ./scripts/download.sh
|
||||
```
|
||||
|
||||
|
||||
Optionally, to download specific topics specify their directories as arguments:
|
||||
|
||||
```bash
|
||||
$ ./scripts/download.sh android concurrency
|
||||
```
|
46
scripts/download.sh
Executable file
46
scripts/download.sh
Executable file
@ -0,0 +1,46 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Guard clause check if required binaries are installed
|
||||
which wget > /dev/null || { echo "Error: wget not installed." ; exit 1 ; }
|
||||
which egrep > /dev/null || { echo "Error: egrep not installed." ; exit 1 ; }
|
||||
|
||||
# Recursively traverse directories in repo scraping markdown file for URLs
|
||||
# containing pdfs. Downloads pdfs into respective directories.
|
||||
download_for_directory() {
|
||||
cd $1 || { echo "Error: directory not found." ; exit 1 ; }
|
||||
|
||||
for f in *; do
|
||||
if [[ -d ${f} ]]; then
|
||||
download_for_directory ${f} &
|
||||
fi
|
||||
done
|
||||
|
||||
# Scrape URLs from markdown files
|
||||
urls=$(ls | cat *.md 2> /dev/null | egrep -o 'https?://[^ ]+' | grep '\.pdf' | tr -d ')')
|
||||
|
||||
for url in "$urls"; do
|
||||
# Ignore empty URLs
|
||||
if [[ ! -z ${url} ]]; then
|
||||
wget ${url} --no-clobber --quiet --timeout=5 --tries=2
|
||||
fi
|
||||
done
|
||||
|
||||
cd ..
|
||||
echo "$1 done."
|
||||
}
|
||||
|
||||
# If no directories are supplied, iterate over the entire repo.
|
||||
if [[ "$#" -eq 0 ]]; then
|
||||
REPO_ROOT_DIR="$(dirname $0)/.."
|
||||
download_for_directory ${REPO_ROOT_DIR}
|
||||
else
|
||||
# Iterate over the specified directories
|
||||
for dir in "$@"
|
||||
do
|
||||
download_for_directory ${dir}
|
||||
done
|
||||
fi
|
||||
|
||||
# Wait for child processes to terminate
|
||||
wait
|
||||
|
@ -1,17 +1,23 @@
|
||||
## Security
|
||||
|
||||
Security
|
||||
===========
|
||||
* [Reflections on Trusting Trust (1984)](http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf)
|
||||
* [Internet Census via Insecure Routers (2012)](https://internetcensus2012.bitbucket.io/paper.html)
|
||||
* [Internet Census via Insecure Routers (2012)](https://www.researchgate.net/publication/279069631_The_Internet_Census_2012_Dataset_An_Ethical_Examination)
|
||||
* [Looking inside the (Drop) Box (2013)](https://www.usenix.org/system/files/conference/woot13/woot13-kholia.pdf)
|
||||
* [Making Programs Forget: Enforcing Lifetime For Sensitive Data (2011)](https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdf)
|
||||
* [Breach: Reviving The Crime Attack (2013)](http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf)
|
||||
* [Why Silent Updates Boost Security (2009)](http://www.techzoom.net/Papers/Browser_Silent_Updates_%282009%29.pdf)
|
||||
* [A survey of coordinated attacks and collaborative intrusion detection (2010)](https://www.tk.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TK/zhou2010survey.pdf)
|
||||
* [Meltdown (2018)](https://meltdownattack.com/meltdown.pdf)
|
||||
* [Spectre Attacks: Exploiting Speculative Execution (2018)](https://spectreattack.com/spectre.pdf)
|
||||
|
||||
* :scroll: [Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud (2014)](macaroons-cookies-with-contextual-caveats.pdf)
|
||||
* :scroll: [Insertion, Evasion, and Denial of Service: eluding network intrusion detection (1998)](ids-evasion-ptacek-newsham.pdf)
|
||||
|
||||
## Hardware Security
|
||||
|
||||
* [Meltdown (2018)](https://meltdownattack.com/meltdown.pdf)
|
||||
* [Spectre Attacks: Exploiting Speculative Execution (2018)](https://spectreattack.com/spectre.pdf)
|
||||
* [DRAM Row Hammer (2014)](https://people.inf.ethz.ch/omutlu/pub/dram-row-hammer_isca14.pdf)
|
||||
- Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors
|
||||
|
||||
* :scroll: [SoK: Eternal War in Memory (2013)](sok-eternal-war-in-memory.pdf)
|
||||
- Classifies memory attacks into a taxonomy that is usable by both black- and white-hats.
|
||||
- An excellent primer on the different memory-related vulnerabilities that exist, (more importantly) why they exist, and the ways in which various defences act to counter them.
|
||||
|
@ -27,7 +27,7 @@
|
||||
|
||||
### Introduction
|
||||
|
||||
* [Unikernels: Library Operating Systems for the Cloud](http://anil.recoil.org/papers/2013-asplos-mirage.pdf)
|
||||
* [Unikernels: Library Operating Systems for the Cloud](http://unikernel.org/files/2013-asplos-mirage.pdf)
|
||||
* [Unikernels: the rise of the virtual library operating system](https://cacm.acm.org/magazines/2014/1/170866-unikernels/fulltext)
|
||||
* [Maximizing hypervisor scalability using minimal virtual machines](https://core.ac.uk/download/pdf/35074556.pdf)
|
||||
* [Breaking up is hard to do: security and functionality in a commodity hypervisor](https://open.library.ubc.ca/media/download/pdf/24/1.0052016/1)
|
||||
|
Loading…
Reference in New Issue
Block a user