Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Resolving Unidentifiability in Inverse Reinforcement Learning., and . CoRR, (2016)Building an Integrated CBR-Big Data Oriented Architecture for Case-Based Reasoning Systems.. ICCBR (Workshops), volume 2028 of CEUR Workshop Proceedings, page 189-193. CEUR-WS.org, (2017)Advanced Similarity Measures Using Word Embeddings and Siamese Networks in CBR., , , , , and . IntelliSys (2), volume 1038 of Advances in Intelligent Systems and Computing, page 449-462. Springer, (2019)Bounding User Contributions: A Bias-Variance Trade-off in Differential Privacy., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 263-271. PMLR, (2019)Budget Optimization for Sponsored Search: Censored Learning in MDPs., , , and . UAI, page 54-63. AUAI Press, (2012)Graphical Models for Bandit Problems., , and . UAI, page 1-10. AUAI Press, (2011)Plume: Differential Privacy at Scale., , , , and . CoRR, (2022)Online Learning and Profit Maximization from Revealed Preferences., , , , and . CoRR, (2014)Private Algorithms with Private Predictions., , , and . CoRR, (2022)Budgeted Prediction with Expert Advice., , , and . AAAI, page 2490-2496. AAAI Press, (2015)