Skip to main content

Showing 1–6 of 6 results for author: Sow, D

Searching in archive math. Search in all archives.
.
  1. arXiv:2308.03811  [pdf, other

    math.OC cs.LG

    Non-Convex Bilevel Optimization with Time-Varying Objective Functions

    Authors: Sen Lin, Daouda Sow, Kaiyi Ji, Yingbin Liang, Ness Shroff

    Abstract: Bilevel optimization has become a powerful tool in a wide variety of machine learning problems. However, the current nonconvex bilevel optimization considers an offline dataset and static functions, which may not work well in emerging online applications with streaming data and time-varying functions. In this work, we study online bilevel optimization (OBO) where the functions can be time-varying… ▽ More

    Submitted 8 November, 2023; v1 submitted 7 August, 2023; originally announced August 2023.

    Journal ref: NeurIPS 2023

  2. arXiv:2203.01123  [pdf, other

    math.OC cs.LG stat.ML

    A Primal-Dual Approach to Bilevel Optimization with Multiple Inner Minima

    Authors: Daouda Sow, Kaiyi Ji, Ziwei Guan, Yingbin Liang

    Abstract: Bilevel optimization has found extensive applications in modern machine learning problems such as hyperparameter optimization, neural architecture search, meta-learning, etc. While bilevel problems with a unique inner minimal point (e.g., where the inner function is strongly convex) are well understood, such a problem with multiple inner minimal points remains to be challenging and open. Existing… ▽ More

    Submitted 8 June, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

    Comments: Submitted for publication

  3. arXiv:2110.07004  [pdf, other

    cs.LG math.OC stat.ML

    On the Convergence Theory for Hessian-Free Bilevel Algorithms

    Authors: Daouda Sow, Kaiyi Ji, Yingbin Liang

    Abstract: Bilevel optimization has arisen as a powerful tool in modern machine learning. However, due to the nested structure of bilevel optimization, even gradient-based methods require second-order derivative approximations via Jacobian- or/and Hessian-vector computations, which can be costly and unscalable in practice. Recently, Hessian-free bilevel schemes have been proposed to resolve this issue, where… ▽ More

    Submitted 6 June, 2022; v1 submitted 13 October, 2021; originally announced October 2021.

    Comments: Submitted for publication

  4. arXiv:1211.1666  [pdf, ps, other

    cs.CR math.NT

    Pairings on Generalized Huff Curves

    Authors: Abdoul Aziz Ciss, Djiby Sow

    Abstract: This paper presents the Tate pairing computation on generalized Huff curves proposed by Wu and Feng. In fact, we extend the results of the Tate pairing computation on the standard Huff elliptic curves done previously by Joye, Tibouchi and Vergnaud. We show that the addition step of the Miller loop can be performed in $1\mathbf{M}+(k+15)\mathbf{m}+2\mathbf{c}$ and the doubling one in… ▽ More

    Submitted 6 November, 2012; originally announced November 2012.

  5. arXiv:1208.2442  [pdf, ps, other

    math.RA

    Noncommutative Gröbner bases over rings

    Authors: André Mialebama Bouesso, Djiby Sow

    Abstract: In this work, it is proposed a method for computing Noncommutative Gröbner bases over a valuation nœtherian ring. We have generalized the fundamental theorem on normal forms over an arbitrary ring. The classical method of dynamical commutative Gröbner bases is generalized for Buchberger's algorithm over $R=\mathcal{V}<x_1,...,x_m>$ a free associative algebra with non-commuting variables, where… ▽ More

    Submitted 12 August, 2012; originally announced August 2012.

  6. arXiv:1205.1212   

    cs.CR math.NT

    A Factoring and Discrete Logarithm based Cryptosystem

    Authors: Abdoul Aziz Ciss, Ahmed Youssef Ould Cheikh, Djiby Sow

    Abstract: This paper introduces a new public key cryptosystem based on two hard problems : the cube root extraction modulo a composite moduli (which is equivalent to the factorisation of the moduli) and the discrete logarithm problem. These two hard problems are combined during the key generation, encryption and decryption phases. By combining the IFP and the DLP we introduce a secure and efficient public k… ▽ More

    Submitted 23 September, 2012; v1 submitted 6 May, 2012; originally announced May 2012.

    Comments: Something was not correct in the paper