Skip to main content

Showing 1–3 of 3 results for author: Lundbaek, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2207.12852  [pdf, ps, other

    cs.LG cs.CL cs.IR

    Extreme compression of sentence-transformer ranker models: faster inference, longer battery life, and less storage on edge devices

    Authors: Amit Chaulwar, Lukas Malik, Maciej Krajewski, Felix Reichel, Leif-Nissen Lundbæk, Michael Huth, Bartlomiej Matejczyk

    Abstract: Modern search systems use several large ranker models with transformer architectures. These models require large computational resources and are not suitable for usage on devices with limited computational resources. Knowledge distillation is a popular compression technique that can reduce the resource needs of such models, where a large teacher model transfers knowledge to a small student model.… ▽ More

    Submitted 29 June, 2022; originally announced July 2022.

  2. Owner-centric sharing of physical resources, data, and data-driven insights in digital ecosystems

    Authors: Kwok Cheung, Michael Huth, Laurence Kirk, Leif-Nissen Lundbæk, Rodolphe Marques, Jan Petsche

    Abstract: We are living in an age in which digitization will connect more and more physical assets with IT systems and where IoT endpoints will generate a wealth of valuable data. Companies, individual users, and organizations alike therefore have the need to control their own physical or non-physical assets and data sources. At the same time, they recognize the need for, and opportunity to, share access to… ▽ More

    Submitted 4 June, 2019; originally announced June 2019.

    Journal ref: ACM SACMAT 2019: 73-81

  3. arXiv:1612.00407  [pdf, other

    cs.CR

    Optimizing Governed Blockchains for Financial Process Authentications

    Authors: Leif-Nissen Lundbaek, Andrea Callia D'Iddio, Michael Huth

    Abstract: We propose the formal study of governed blockchains that are owned and controlled by organizations and that neither create cryptocurrencies nor provide any incentives to solvers of cryptographic puzzles. We view such approaches as frameworks in which system parts, such as the cryptographic puzzle, may be instantiated with different technology. Owners of such a blockchain procure puzzle solvers as… ▽ More

    Submitted 16 May, 2017; v1 submitted 1 December, 2016; originally announced December 2016.

    Comments: 25 pages, 4 tables, minor corrections and edits throughout second version, updated relation work in second version, statistical evaluation of random variable for disputes added in second version