The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1007/978-3-030-30493-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Reservoir Topology in Deep Echo State Networks

Abstract: Deep Echo State Networks (DeepESNs) recently extended the applicability of Reservoir Computing (RC) methods towards the field of deep learning. In this paper we study the impact of constrained reservoir topologies in the architectural design of deep reservoirs, through numerical experiments on several RC benchmarks. The major outcome of our investigation is to show the remarkable effect, in terms of predictive performance gain, achieved by the synergy between a deep reservoir construction and a structured orga… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
3

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 26 publications
0
6
3
Order By: Relevance
“…The presented results differ by multiple orders of magnitude from e.g. Gallicchio and Micheli [9], who reached NARMA10 ≈ 10 −4 ± 10 −5 , MG17 ≈ 10 −9 ± 10 −10 , and MG30 ≈ 10 −8 ± 10 −9 . The parameters in the aforementioned work were tuned manually and the sparse topology ended up as the worst of the four.…”
Section: Resultscontrasting
confidence: 92%
See 4 more Smart Citations
“…The presented results differ by multiple orders of magnitude from e.g. Gallicchio and Micheli [9], who reached NARMA10 ≈ 10 −4 ± 10 −5 , MG17 ≈ 10 −9 ± 10 −10 , and MG30 ≈ 10 −8 ± 10 −9 . The parameters in the aforementioned work were tuned manually and the sparse topology ended up as the worst of the four.…”
Section: Resultscontrasting
confidence: 92%
“…Some authors (e.g., [25]) use the same constant for all the nonzero connection weights in the ring, chain, and permutation topologies instead of generating the values from N(𝜇 𝑟𝑒𝑠 , 𝜎 2 𝑟𝑒𝑠 ) as is the case for the sparse topology (e.g., [9]). In other words, the reservoir matrix 𝑊 can be expressed as 𝜆𝑊 𝑏 , where 𝑊 𝑏 is a binary matrix and 𝜆 is the desired constant.…”
Section: Topologiesmentioning
confidence: 99%
See 3 more Smart Citations