Machine Learning Systems are Bloated and Vulnerable
Abstract
References
Index Terms
- Machine Learning Systems are Bloated and Vulnerable
Recommendations
Machine Learning Systems are Bloated and Vulnerable
SIGMETRICS/PERFORMANCE '24: Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer SystemsToday's software is bloated with both code and features that are not used by most users. This bloat is prevalent across the entire software stack, from operating systems and applications to containers. Containers are lightweight virtualization ...
Machine Learning Systems are Bloated and Vulnerable
POMACSToday's software is bloated with both code and features that are not used by most users. This bloat is prevalent across the entire software stack, from operating systems and applications to containers. Containers are lightweight virtualization ...
4 Systems Perspectives into Human-Centered Machine Learning
MobiCom '19: The 25th Annual International Conference on Mobile Computing and NetworkingMachine learning (ML) has had a tremendous impact in across the world over the last decade. As we think about ML solving complex tasks, sometimes at super-human levels, it is easy to forget that there is no machine learning without humans in the loop. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- June 2024120 pagesISBN:9798400706240DOI:10.1145/3652963
- General Chairs:
- Michele Garetto,
- Andrea Marin,
- Program Chairs:
- Florin Ciucu,
- Giulia Fanti,
- Rhonda Righter
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 19Total Downloads
- Downloads (Last 12 months)19
- Downloads (Last 6 weeks)5
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in