Author of the publication

Adaptive Low-Precision Training for Embeddings in Click-Through Rate Prediction.

, , , , , , , and . AAAI, page 4435-4443. AAAI Press, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Survey on Training Acceleration for Large Machine Learning Models in IoT., , , , , , , and . IEEE Internet Things J., 9 (2): 939-963 (2022)Gradient Scheduling With Global Momentum for Asynchronous Federated Learning in Edge Environment., , , , , , and . IEEE Internet Things J., 9 (19): 18817-18828 (2022)Role updating in information systems using model checking., , , , and . Knowl. Inf. Syst., 51 (1): 187-234 (2017)Distributed caching in unstructured peer-to-peer file sharing networks., , , and . Comput. Electr. Eng., 40 (2): 688-703 (2014)A flabellate overlay network for multi-attribute search., , , , and . J. Parallel Distributed Comput., 71 (3): 407-423 (2011)Divide-and-conquer approach for solving singular value decomposition based on MapReduce., , , , , , , and . Concurr. Comput. Pract. Exp., 28 (2): 331-350 (2016)Sentiment analysis using deep learning approaches: an overview., , , , and . Sci. China Inf. Sci., 63 (1): 111102 (2020)Polynomial and Exponential Bounded Logic Programs with Function Symbols: Some New Decidable Classes., , , and . J. Artif. Intell. Res., (2019)The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 125-138 (January 2024)面向Android第三方库的共谋行为检测 (Collusion Behavior Detection Towards Android Third-party Libraries)., , , , and . 计算机科学, 46 (5): 83-91 (2019)