[{"language":[{"iso":"eng"}],"keyword":["Training","Schedules","Codes","Search methods","Source coding","Computer architecture","Transformers"],"user_id":"93420","department":[{"_id":"660"}],"project":[{"name":"TRR 318: TRR 318 - Erklärbarkeit konstruieren","_id":"109"},{"name":"TRR 318 - C: TRR 318 - Project Area C","_id":"117"},{"_id":"126","name":"TRR 318 - C3: TRR 318 - Subproject C3"}],"_id":"58224","status":"public","type":"conference","publication":"2024 International Joint Conference on Neural Networks (IJCNN)","doi":"10.1109/IJCNN60899.2024.10650124","title":"No learning rates needed: Introducing SALSA - Stable Armijo Line Search Adaptation","author":[{"first_name":"Philip","last_name":"Kenneweg","full_name":"Kenneweg, Philip"},{"first_name":"Tristan","full_name":"Kenneweg, Tristan","last_name":"Kenneweg"},{"last_name":"Fumagalli","full_name":"Fumagalli, Fabian","first_name":"Fabian"},{"last_name":"Hammer","full_name":"Hammer, Barbara","first_name":"Barbara"}],"date_created":"2025-01-16T16:21:28Z","date_updated":"2025-09-11T15:37:42Z","citation":{"apa":"Kenneweg, P., Kenneweg, T., Fumagalli, F., &#38; Hammer, B. (2024). No learning rates needed: Introducing SALSA - Stable Armijo Line Search Adaptation. <i>2024 International Joint Conference on Neural Networks (IJCNN)</i>, 1–8. <a href=\"https://doi.org/10.1109/IJCNN60899.2024.10650124\">https://doi.org/10.1109/IJCNN60899.2024.10650124</a>","short":"P. Kenneweg, T. Kenneweg, F. Fumagalli, B. Hammer, in: 2024 International Joint Conference on Neural Networks (IJCNN), 2024, pp. 1–8.","mla":"Kenneweg, Philip, et al. “No Learning Rates Needed: Introducing SALSA - Stable Armijo Line Search Adaptation.” <i>2024 International Joint Conference on Neural Networks (IJCNN)</i>, 2024, pp. 1–8, doi:<a href=\"https://doi.org/10.1109/IJCNN60899.2024.10650124\">10.1109/IJCNN60899.2024.10650124</a>.","bibtex":"@inproceedings{Kenneweg_Kenneweg_Fumagalli_Hammer_2024, title={No learning rates needed: Introducing SALSA - Stable Armijo Line Search Adaptation}, DOI={<a href=\"https://doi.org/10.1109/IJCNN60899.2024.10650124\">10.1109/IJCNN60899.2024.10650124</a>}, booktitle={2024 International Joint Conference on Neural Networks (IJCNN)}, author={Kenneweg, Philip and Kenneweg, Tristan and Fumagalli, Fabian and Hammer, Barbara}, year={2024}, pages={1–8} }","ama":"Kenneweg P, Kenneweg T, Fumagalli F, Hammer B. No learning rates needed: Introducing SALSA - Stable Armijo Line Search Adaptation. In: <i>2024 International Joint Conference on Neural Networks (IJCNN)</i>. ; 2024:1-8. doi:<a href=\"https://doi.org/10.1109/IJCNN60899.2024.10650124\">10.1109/IJCNN60899.2024.10650124</a>","ieee":"P. Kenneweg, T. Kenneweg, F. Fumagalli, and B. Hammer, “No learning rates needed: Introducing SALSA - Stable Armijo Line Search Adaptation,” in <i>2024 International Joint Conference on Neural Networks (IJCNN)</i>, 2024, pp. 1–8, doi: <a href=\"https://doi.org/10.1109/IJCNN60899.2024.10650124\">10.1109/IJCNN60899.2024.10650124</a>.","chicago":"Kenneweg, Philip, Tristan Kenneweg, Fabian Fumagalli, and Barbara Hammer. “No Learning Rates Needed: Introducing SALSA - Stable Armijo Line Search Adaptation.” In <i>2024 International Joint Conference on Neural Networks (IJCNN)</i>, 1–8, 2024. <a href=\"https://doi.org/10.1109/IJCNN60899.2024.10650124\">https://doi.org/10.1109/IJCNN60899.2024.10650124</a>."},"page":"1-8","year":"2024"},{"year":"2020","quality_controlled":"1","title":"On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions","date_created":"2021-03-08T16:50:31Z","abstract":[{"text":"Verifiable random functions (VRFs) are essentially digital signatures with additional properties, namely verifiable uniqueness and pseudorandomness, which make VRFs a useful tool, e.g., to prevent enumeration in DNSSEC Authenticated Denial of Existence and the CONIKS key management system, or in the random committee selection of the Algorand blockchain.\r\n\r\nMost standard-model VRFs rely on admissible hash functions (AHFs) to achieve security against adaptive attacks in the standard model. Known AHF constructions are based on error-correcting codes, which yield asymptotically efficient constructions. However, previous works do not clarify how the code should be instantiated concretely in the real world. The rate and the minimal distance of the selected code have significant impact on the efficiency of the resulting cryptosystem, therefore it is unclear if and how the aforementioned constructions can be used in practice.\r\n\r\nFirst, we explain inherent limitations of code-based AHFs. Concretely, we assume that even if we were given codes that achieve the well-known Gilbert-Varshamov or McEliece-Rodemich-Rumsey-Welch bounds, existing AHF-based constructions of verifiable random functions (VRFs) can only be instantiated quite inefficiently. Then we introduce and construct computational AHFs (cAHFs). While classical AHFs are information-theoretic, and therefore work even in presence of computationally unbounded adversaries, cAHFs provide only security against computationally bounded adversaries. However, we show that cAHFs can be instantiated significantly more efficiently. Finally, we use our cAHF to construct the currently most efficient verifiable random function with full adaptive security in the standard model.","lang":"eng"}],"file":[{"file_size":706743,"file_id":"21399","file_name":"Jager und Niehues - 2020 - On the Real-World Instantiability of Admissible Ha.pdf","access_level":"closed","date_updated":"2021-03-08T17:02:37Z","creator":"davnie","date_created":"2021-03-08T17:02:37Z","relation":"main_file","content_type":"application/pdf"}],"publication":"Lecture Notes in Computer Science","keyword":["Admissible hash functions","Verifiable random functions","Error-correcting codes","Provable security"],"ddc":["000"],"language":[{"iso":"eng"}],"place":"Cham","citation":{"ieee":"T. Jager and D. Niehues, “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions,” in <i>Lecture Notes in Computer Science</i>, Cham, 2020.","chicago":"Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” In <i>Lecture Notes in Computer Science</i>. Cham, 2020. <a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">https://doi.org/10.1007/978-3-030-38471-5_13</a>.","ama":"Jager T, Niehues D. On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In: <i>Lecture Notes in Computer Science</i>. Cham; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>","bibtex":"@inbook{Jager_Niehues_2020, place={Cham}, title={On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>}, booktitle={Lecture Notes in Computer Science}, author={Jager, Tibor and Niehues, David}, year={2020} }","mla":"Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” <i>Lecture Notes in Computer Science</i>, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>.","short":"T. Jager, D. Niehues, in: Lecture Notes in Computer Science, Cham, 2020.","apa":"Jager, T., &#38; Niehues, D. (2020). On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In <i>Lecture Notes in Computer Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">https://doi.org/10.1007/978-3-030-38471-5_13</a>"},"has_accepted_license":"1","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030384708","9783030384715"]},"publication_status":"published","related_material":{"link":[{"relation":"later_version","url":"https://eprint.iacr.org/2019/1335.pdf"}]},"conference":{"location":"Waterloo, Canada","end_date":"2019-08-16","start_date":"2019-08-12","name":"Selected Areas in Cryptography"},"doi":"10.1007/978-3-030-38471-5_13","main_file_link":[{"url":"https://link.springer.com/content/pdf/10.1007%252F978-3-030-38471-5_13.pdf"}],"date_updated":"2022-01-06T06:54:58Z","author":[{"last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"David","full_name":"Niehues, David","id":"36113","last_name":"Niehues"}],"status":"public","type":"book_chapter","file_date_updated":"2021-03-08T17:02:37Z","_id":"21396","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"department":[{"_id":"558"}],"user_id":"36113"},{"type":"conference","publication":"IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)","abstract":[{"text":"In this paper we present a comparison of the recently proposed Soft-Feature Distributed Speech Recognition (SFDSR) with the two evaluated candidate codecs for Speech Enabled Services over wireless networks: Adaptive Multirate Codec (AMR) and the ETSI Extended Advanced Front-End for Distributed Speech Recognition (XAFE). It is shown that SFDSR achieves the best recognition performance on a simulated GSM transmission, followed by XAFE and AMR.We also present some new results concerning SFDSR which demonstrate the versatility of the approach. Further, a simple method is introduced which considerably reduces the computational effort.","lang":"eng"}],"status":"public","_id":"11828","user_id":"44006","department":[{"_id":"54"}],"keyword":["adaptive codes","adaptive multirate codec","AMR","distributed speech recognition","ETSI","extended advanced front-end","recognition performance","SFDSR","simulated GSM transmission","soft-feature distributed speech recognition","speech codecs","speech coding","speech recognition","variable rate codes","XAFE"],"language":[{"iso":"eng"}],"year":"2005","citation":{"ieee":"V. Ion and R. Haeb-Umbach, “A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services,” in <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>, 2005, vol. 1, pp. 333–336.","chicago":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services.” In <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>, 1:333–36, 2005. <a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">https://doi.org/10.1109/ICASSP.2005.1415118</a>.","ama":"Ion V, Haeb-Umbach R. A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services. In: <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>. Vol 1. ; 2005:333-336. doi:<a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">10.1109/ICASSP.2005.1415118</a>","apa":"Ion, V., &#38; Haeb-Umbach, R. (2005). A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services. In <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i> (Vol. 1, pp. 333–336). <a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">https://doi.org/10.1109/ICASSP.2005.1415118</a>","mla":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services.” <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>, vol. 1, 2005, pp. 333–36, doi:<a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">10.1109/ICASSP.2005.1415118</a>.","bibtex":"@inproceedings{Ion_Haeb-Umbach_2005, title={A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services}, volume={1}, DOI={<a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">10.1109/ICASSP.2005.1415118</a>}, booktitle={IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2005}, pages={333–336} }","short":"V. Ion, R. Haeb-Umbach, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005), 2005, pp. 333–336."},"intvolume":"         1","page":"333-336","oa":"1","date_updated":"2022-01-06T06:51:10Z","author":[{"first_name":"Valentin","full_name":"Ion, Valentin","last_name":"Ion"},{"full_name":"Haeb-Umbach, Reinhold","id":"242","last_name":"Haeb-Umbach","first_name":"Reinhold"}],"date_created":"2019-07-12T05:29:02Z","volume":1,"title":"A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2005/IoHa05-2.pdf","open_access":"1"}],"doi":"10.1109/ICASSP.2005.1415118"}]
