Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unifying distillation and privileged information, , , and . (2015)cite arxiv:1511.03643.Learning using Large Datasets., and . NATO ASI Mining Massive Data Sets for Security, volume 19 of NATO Science for Peace and Security Series - D: Information and Communication Security, page 15-26. IOS Press, (2007)Experiments with time delay networks and dynamic time warping for speaker independent isolated digits recognition., , , and . EUROSPEECH, page 2537-2540. ISCA, (1989)Wasserstein Generative Adversarial Networks., , and . ICML, volume 70 of Proceedings of Machine Learning Research, page 214-223. PMLR, (2017)Breaking SVM Complexity with Cross-Training., , and . NIPS, page 81-88. (2004)Erratum: SGDQN is Less Careful than Expected., , , , and . J. Mach. Learn. Res., (2010)Efficient Conversion of Digital Documents to Multilayer Raster Formats., , and . ICDAR, page 444-449. IEEE Computer Society, (2001)Lossy Compression of Partially Masked Still Images., and . Data Compression Conference, page 528. IEEE Computer Society, (1998)Masked Wavelets: Applications to Image Compression., and . Data Compression Conference, page 510. IEEE Computer Society, (2001)Model Ratatouille: Recycling Diverse Models for Out-of-Distribution Generalization., , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 28656-28679. PMLR, (2023)