Essays about: "Decoder-only"

Found 5 essays containing the word Decoder-only.

  1. 1. Transforming Chess: Investigating Decoder-Only Architecture for Generating Realistic Game-Like Positions

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : William Pettersson; [2024]
    Keywords : Transformer; Decoder; Decoder-only; AI; Artificial intelligence; Generating; generative model; Chess;

    Abstract : Chess is a deep and intricate game, the master of which depends on learning tens of thousands of the patterns that may occur on the board. At Noctie, their mission is to aid this learning process through humanlike chess AI. A prominent challenge lies in curating instructive chess positions for students. READ MORE

  2. 2. Applicability of GPT models to high-performance compute languages

    University essay from Uppsala universitet/Högenergifysik

    Author : Urlich Icimpaye; [2023]
    Keywords : Data Science; Machine Learning; Artificial Intelligence; Transformers;

    Abstract : This thesis aims to investigate the feasibility of generating code in high-performance computing languages such as C++ with neural networks. This has been investigated by transfer learning publicly available pretrained transformers on C++ code. READ MORE

  3. 3. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  4. 4. Generating Terraform Configuration Files with Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oskar Bonde; [2022]
    Keywords : Terraform; Transformer models; Generating configuration files; Large Language Models; Codex; Terraform; Transformer-modeller; Generera konfigurationsfiler; Stora språkmodeller; Codex;

    Abstract : This thesis explores how large language models can be used to generate configuration files for Terraform from natural language descriptions. Few-shot and fine-tuning paradigms are evaluated on decoder-only models of varying size, including the state-of-the-art Codex model. READ MORE

  5. 5. A hardware MP3 decoder with low precision floating point intermediate storage

    University essay from Institutionen för systemteknik

    Author : Andreas Ehliar; Johan Eilert; [2003]
    Keywords : Datorteknik; MP3; audio; implementation; floating point; Datorteknik;

    Abstract : The effects of using limited precision floating point for intermediate storage in an embedded MP3 decoder are investigated in this thesis. The advantages of using limited precision is that the values need shorter word lengths and thus a smaller memory for storage. READ MORE