Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Turning Lemons into Peaches using Secure Computation., , and . CoRR, (2018)CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy., , , , , and . ICML, volume 48 of JMLR Workshop and Conference Proceedings, page 201-210. JMLR.org, (2016)Margin Analysis of the LVQ Algorithm., , , and . NIPS, page 462-469. MIT Press, (2002)A Last Switch Dependent Analysis of Satiation and Seasonality in Bandits., , , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 971-990. PMLR, (2022)Staying in the Zone: Sequencing Content in Classrooms Based on the Zone of Proximal Development., , , , , , , and . EDM, International Educational Data Mining Society (IEDMS), (2019)Challenges for designing notifications for affective computing systems., , , and . UbiComp Adjunct, page 1554-1559. ACM, (2016)Bayes and Tukey Meet at the Center Point., , and . COLT, volume 3120 of Lecture Notes in Computer Science, page 549-563. Springer, (2004)Learning from mistakes: towards a correctable learning algorithm., , , and . CIKM, page 1930-1934. ACM, (2012)The Median Hypothesis., and . Empirical Inference, page 161-175. Springer, (2013)DART: Dropouts meet Multiple Additive Regression Trees., and . AISTATS, volume 38 of JMLR Workshop and Conference Proceedings, JMLR.org, (2015)