Search Results for author: Stephen Lee

Found 6 papers, 2 papers with code

sat2pc: Estimating Point Cloud of Building Roofs from 2D Satellite Images

no code implementations25 May 2022 Yoones Rezaei, Stephen Lee

In this paper, we propose sat2pc, a deep learning architecture that predicts the point cloud of a building roof from a single 2D satellite image.

Energy-Efficient Parking Analytics System using Deep Reinforcement Learning

1 code implementation15 Feb 2022 Yoones Rezaei, Stephen Lee, Daniel Mosse

Advances in deep vision techniques and ubiquity of smart cameras will drive the next generation of video analytics.

reinforcement-learning

Federated Intrusion Detection for IoT with Heterogeneous Cohort Privacy

no code implementations25 Jan 2021 Ajesh Koyatan Chathoth, Abhyuday Jagannatha, Stephen Lee

Internet of Things (IoT) devices are becoming increasingly popular and are influencing many application domains such as healthcare and transportation.

Continual Learning Network Intrusion Detection

WattScale: A Data-driven Approach for Energy Efficiency Analytics of Buildings at Scale

no code implementations2 Jul 2020 Srinivasan Iyengar, Stephen Lee, David Irwin, Prashant Shenoy, Benjamin Weil

In this paper, we present \texttt{WattScale}, a data-driven approach to identify the least energy-efficient buildings from a large population of buildings in a city or a region.

Bayesian Inference Fault Detection +1

FastFabric: Scaling Hyperledger Fabric to 20,000 Transactions per Second

1 code implementation3 Jan 2019 Christian Gorenflo, Stephen Lee, Lukasz Golab, S. Keshav

Blockchain technologies are expected to make a significant impact on a variety of industries.

Distributed, Parallel, and Cluster Computing

Making Contextual Decisions with Low Technical Debt

no code implementations13 Jun 2016 Alekh Agarwal, Sarah Bird, Markus Cozowicz, Luong Hoang, John Langford, Stephen Lee, Jiaji Li, Dan Melamed, Gal Oshri, Oswaldo Ribas, Siddhartha Sen, Alex Slivkins

The Decision Service enables all aspects of contextual bandit learning using four system abstractions which connect together in a loop: explore (the decision space), log, learn, and deploy.

Multi-Armed Bandits online learning

Cannot find the paper you are looking for? You can Submit a new open access paper.