Year 2014 passed under the huge Deep Learning sign. At the last seminar of computational neuroscience I’ve presented a very recent article, which looks into…
Seminar overview of the third article produced by Google DeepMind. This one again contains conceptual novelties: adding external memory to machine learning pipeline (using an…
The presentation is given during the Computer Graphics seminar at the University of Tartu. It is an introductory overview of the GPGPU idea in general…
The course presents an introduction to the basic methods of computer graphics. The primary focus is on three-dimensional graphics (projection, lighting, shadows, texturing, raytracing). On…
The tool is freely available here: http://ikuz.eu/csv2arff
Download PDF: http://ikuz.eu/wp-content/uploads/2017/06/Multi-armed-Bandit-Algorithms-and-Empirical-Evaluation.pdf
When encrypting binary files, especially big ones, it not sensible to use asymmetric key cryptography. This will be slow and may produce data inconsistency errors….