{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:41:24Z","timestamp":1773376884291,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:00:00Z","timestamp":1720310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:00:00Z","timestamp":1720310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,7]]},"DOI":"10.1109\/isit57864.2024.10619514","type":"proceedings-article","created":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T13:25:01Z","timestamp":1724073901000},"page":"13-18","source":"Crossref","is-referenced-by-count":1,"title":["Erasure Coded Neural Network Inference via Fisher Averaging"],"prefix":"10.1109","author":[{"given":"Divyansh","family":"Jhunjhunwala","sequence":"first","affiliation":[{"name":"Carnegie Mellon University,Department of Electrical and Computer Engineering,Pittsburgh,PA,USA"}]},{"given":"Neharika","family":"Jali","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University,Department of Electrical and Computer Engineering,Pittsburgh,PA,USA"}]},{"given":"Gauri","family":"Joshi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University,Department of Electrical and Computer Engineering,Pittsburgh,PA,USA"}]},{"given":"Shiqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"IBM Research,Yorktown Heights,NY,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"On the opportunities and risks of foundation models","author":"Bommasani","year":"2021","journal-title":"ar Xiv preprint"},{"key":"ref2","first-page":"329","article-title":"Bobtail: Avoiding long tails in the cloud","volume-title":"10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)","author":"Xu"},{"key":"ref3","first-page":"613","article-title":"Clipper: A Low-Latency online prediction serving system","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Crankshaw"},{"key":"ref4","first-page":"265","article-title":"Reining in the outliers in map-reduce clus-ters using mantri","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI\u2019 10","author":"Ananthanarayanan","year":"2010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1249"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1994.6.2.181"},{"key":"ref7","volume-title":"A review of sparse expert models in deep learning","author":"Fedus","year":"2022"},{"key":"ref8","volume-title":"What are we searching for"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref10","first-page":"10","article-title":"Spark: cluster computing with working sets","volume-title":"Proceedings of the 2nd USENIX conference on Hot topics in cloud computing","volume":"10","author":"Zaharia","year":"2010"},{"key":"ref11","first-page":"185","article-title":"Effective straggler mitigation: Attack of the clones","volume-title":"Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation","author":"Ananthanarayanan"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3199524.3199530"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/3393691.3394214","article-title":"Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix- Vector Multiplication","volume-title":"Proceedings of ACM Sigmetrics 2020","author":"Mallick"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262713"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1109\/ITW.2018.8613504","article-title":"Service rate region of content access from erasure coded storage","volume-title":"Proc. Allerton Conf. Commun., Control and Computing","author":"Anderson"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3492866.3549713"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007058"},{"key":"ref18","first-page":"3368","article-title":"Gradient coding: Avoiding stragglers in distributed learning","volume-title":"Proceedings of the 34th International Conference on Machine Learning, ser. Proceedings of Machine Learning Research","volume":"70","author":"Tandon","year":"2017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437467"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437852"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITW54588.2022.9965760"},{"key":"ref22","volume-title":"Parity models: A general framework for coding-based resilience in ML inference","volume":"abs\/1905.00863","author":"Kosaian","year":"2019"},{"key":"ref23","article-title":"Communication algorithms via deep learning","volume-title":"International Conference on Learning Representations","author":"Kim","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/jsait.2020.2986752"},{"key":"ref25","first-page":"23965","article-title":"Model soups: averaging weights of multiple fine-tuned models improves accuracy without increasing inference time","volume-title":"International Conference on Machine Learning. PMLR","author":"Wortsman","year":"2022"},{"key":"ref26","article-title":"Editing models with task arithmetic","volume-title":"The Eleventh International Conference on Learning Representations, ICLR 2023","author":"Ilharco"},{"key":"ref27","article-title":"Dataless knowledge fusion by merging weights of language models","volume-title":"The Eleventh International Conference on Learning Representations, ICLR 2023","author":"Jin"},{"key":"ref28","first-page":"17703","article-title":"Merging models with fisher-weighted averaging","volume":"35","author":"Matena","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007379606734"},{"key":"ref30","volume-title":"Algebraic coding theory","author":"Berkelamp","year":"1968"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref32","author":"Hinton","year":"2015","journal-title":"Distilling the knowledge in a neural network"},{"key":"ref33","first-page":"2351","article-title":"Ensemble distillation for robust model fusion in federated learning","volume":"33","author":"Lin","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref34","author":"Freitag","year":"2017","journal-title":"Ensemble distillation for neural machine translation"},{"key":"ref35","first-page":"2038","article-title":"Model fusion with kullback-leiblcr divergence","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020","volume":"119","author":"Claici"},{"issue":"9","key":"ref36","article-title":"Clustering on the unit hypersphere using von mises-fisher distributions","volume":"6","author":"Banerjee","year":"2005","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"ref37","first-page":"5776","article-title":"New insights and perspectives on the natural gradient method","volume":"21","author":"Martens","year":"2020","journal-title":"The Journal of Machine Learning Research"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"ref39","article-title":"Optimal brain damage","volume":"2","author":"LeCun","year":"1989","journal-title":"Advances in neural information processing systems"},{"key":"ref40","first-page":"18098","article-title":"Woodfisher: Efficient second-order approximation for neural network compression","volume":"33","author":"Singh","year":"2020","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"2024 IEEE International Symposium on Information Theory (ISIT)","location":"Athens, Greece","start":{"date-parts":[[2024,7,7]]},"end":{"date-parts":[[2024,7,12]]}},"container-title":["2024 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10619013\/10619074\/10619514.pdf?arnumber=10619514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:28:58Z","timestamp":1773347338000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10619514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,7]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/isit57864.2024.10619514","relation":{},"subject":[],"published":{"date-parts":[[2024,7,7]]}}}