User profiles for Chad Scherrer

Chad Scherrer

Redpoll
Verified email at informativeprior.com
Cited by 592

Feature clustering for accelerating parallel coordinate descent

C Scherrer, A Tewari… - Advances in Neural …, 2012 - proceedings.neurips.cc
Large scale $\ell_1 $-regularized loss minimization problems arise in numerous applications
such as compressed sensing and high dimensional supervised learning, including …

Scaling Up Coordinate Descent Algorithms for Large Regularization Problems

C Scherrer, M Halappanavar, A Tewari… - arXiv preprint arXiv …, 2012 - arxiv.org
We present a generic framework for parallel coordinate descent (CD) algorithms that includes,
as special cases, the original sequential algorithms Cyclic CD and Stochastic CD, as well …

[BOOK][B] Multivariate circular symmetry models

C Scherrer - 2003 - search.proquest.com
This work presents results relating to estimation and hypothesis testing problems for multivariate
normal distributions that are invariant under circular permutations of an index family. …

Evaluating the potential of multithreaded platforms for irregular scientific computations

…, D Chavarría-Miranda, G Chin, C Scherrer… - Proceedings of the 4th …, 2007 - dl.acm.org
The resurgence of current and upcoming multithreaded architectures and programming
models led us to conduct a detailed study to understand the potential of these platforms to …

Applied Measure Theory for Probabilistic Modeling

C Scherrer, M Schauer - arXiv preprint arXiv:2110.00602, 2021 - arxiv.org
Probabilistic programming and statistical computing are vibrant areas in the development of
the Julia programming language, but the underlying infrastructure dramatically predates …

Hashing strategies for the Cray XMT

EL Goodman, DJ Haglin, C Scherrer… - … on Parallel & …, 2010 - ieeexplore.ieee.org
Two of the most commonly used hashing strategies-linear probing and hashing with
chaining-are adapted for efficient execution on a Cray XMT. These strategies are designed to …

[PDF][PDF] An exponential family basis for probabilistic programming

C Scherrer - Proc, 2017 - cscherrer.github.io
Many common distributional families take the form of exponential families. The functional
form of the conditional densities of these families gives them convenient compositional …

Early experience with out-of-core applications on the Cray XMT

…, J Nieplocha, K Maschhoff, C Scherrer - … on Parallel and …, 2008 - ieeexplore.ieee.org
This paper describes our early experiences with a pre- production Cray XMT system that
implements a scalable shared memory architecture with hardware support for multithreading. …

Putting security in context: Visual correlation of network activity with real-world information

WA Pike, C Scherrer, S Zabriskie - … 2007: Proceedings of the Workshop on …, 2008 - Springer
To effectively identify and respond to cyber threats, computer security analysts must understand
the scale, motivation, methods, source, and target of an attack. Central to developing this …

[PDF][PDF] What's the over/under? probabilistic bounds on information leakage

I Sweet, JMC Trilla, C Scherrer, M Hicks… - Principles of Security …, 2018 - library.oapen.org
Quantitative information flow (QIF) is concerned with measuring how much of a secret is
leaked to an adversary who observes the result of a computation that uses it. Prior work has …