...
Using Machine Learning to Teach People How to Dance

This paper presents a novel approach for real-time dance performance evaluation that emphasizes robust pose matching despite temporal and spatial challenges.

...
Running powerful developer environments inside a browser

Spinning up IDE's with a integrated runtime inside a browser window, a hybrid approch to a editor with MicroVMs and WASI based embedded operating system.

...
Creating the Yebr Music Platform

Yebr, is a free music streaming and search service which aims to promote free and open-source software services

...
Chats White Paper

Our story on creating Kabeer's Chats, the free chat messenger service. Contains architecture descriptions and more.

This article is currently not available

...
Using Machine Learning to cluster news headlines

With over 0.25 billion web pages hosted in the World Wide Web, it is virtually impossible to navigate through the Internet.

...
How does Chromaprint work?

I've been meaning to write this post for a long time, but never really finished it. I hope it will h
Lukas Lalinsky

Writing a Base85 encoder/decoder written in pure javascript.

Where base64 adds approximately 1/3, base85 only adds about 1/4. Of course there's a tradeoff. The B

Service Login Flow - Alpha Spec

This document was written as an internal documentation. The content may be outdated and wrong.,First

Could music fingerprinting be copyright infringement?

Music fingerprinting is the process of extracting essential information from digitized audio recordi

A REVIEW OF ACTIVE NOISE CONTROL ALGORITHMS TOWARDS A USER-IMPLEMENTABLE AFTERMARKET ANC SYSTEM

Marko Stamenovic [email protected],University of Rochester Department of Electrical and Comp

...
Neural Topic Modeling with Continual Lifelong Learning

Lifelong learning has recently attracted attention in building machine learning systems that continually accumulate and transfer knowledge to help future learning. Unsupervised topic modeling has been popularly used to discover topics from document collections

LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

Github Repo: https://github.com/kabeer11000/lucid-ddos,More details on the architecture of LUCID and

...
Reflection paper based on The World’s Fastest Scrabble Program

When I first encountered the Scrabble Paper by Appel & Jacobson I was very intrigued and excited by the promises it held in the world of scrabble solving

Oscillator, Filter, Amplifier, Envelope, and LFO

Oscillator,The oscillator (or VCO, voltage-controlled oscillator) is essential to any synthesizer as

...
PaLM: Scaling Language Modeling with Pathways

Large language models have been shown to achieve remarkable performance across a variety of natural language tasks using few-shot learning, which drastically reduces the number of task-specific training examples needed to adapt the model to a particular application
Google Ai

...
Revokeable JWT's with Proof of Possession and counters

In traditional token exchange the resource server has no way to confirm if the token is stolen and belongs to the client. This system introduces a way to incorporate proof of possession into tokens using public key cryptography

...
Teach Me To Dance- An open source tool to bring SVG characters to life in the browser via motion capture

May 27, 2020,,By Shan Huang, Creative Technologist, Google Partner Innovation ,The PoseNet and

...
Dremel: Interactive Analysis of Web-Scale Datasets

Dremel is a scalable, interactive ad-hoc query system for analysis of read-only nested data. By combining multi-level execution trees and columnar data layout, it is capable of running aggregation queries over trillion-row tables in seconds. The system scales to thousands of CPUs and petabytes of data, and has thousands of users at Google. In this paper, we describe the architecture and implementation of Dremel, and explain how it complements MapReduce-based computing. We present a novel columnar storage representation for nested records and discuss experiments on few-thousand node instances of the system.
Google

...
Service Logins and Service Tokens on First-Party Apps

As our services have increased in complexity Authorization and Authentication is not simple and easy anymore.

...
Object aware SLAM based on efficient quadric initalization and joint data association

Semantic simultaneous localization and mapping (SLAM) is a popular technology enabling indoor mobile robots to sufficiently perceive and interact with the environment
Ulster

...
TF-IDF and how the BM25 search algorithim works

Okapi BM25 is one of the strongest “simple” scoring functions, and has proven a useful baseline for experiments and feature for ranking

Shepard tone explained

A Shepard tone, named after Roger Shepard, is a sound consisting of a superposition of sine waves se

How to Build a Scheduler

Up till now we have used a very simple loop such as,while(1) { taskA(); taskB(); taskC()

...
[BETA] Creating a audio based indexing system in Yebr

A complex mix of audio and ai that will help Yebr recognise tracks found anywhere on the web

Markdown and XSS

Cross-side scripting is a well known technique to gain access to private information of the users of
Michel Fortin

...
Kabeer Identity Platform [ALPHA]

ALPHA paper, for Kabeer Identity Platform, Service description and architecture research paper

Next Word Prediction

Deep neural transformer architecture (TA) systems can be considered the successors to LSTM (long, sh