From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Turning Lemons into Peaches using Secure Computation., , и . CoRR, (2018)CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy., , , , , и . ICML, том 48 из JMLR Workshop and Conference Proceedings, стр. 201-210. JMLR.org, (2016)Margin Analysis of the LVQ Algorithm., , , и . NIPS, стр. 462-469. MIT Press, (2002)A Last Switch Dependent Analysis of Satiation and Seasonality in Bandits., , , и . AISTATS, том 151 из Proceedings of Machine Learning Research, стр. 971-990. PMLR, (2022)Challenges for designing notifications for affective computing systems., , , и . UbiComp Adjunct, стр. 1554-1559. ACM, (2016)Bayes and Tukey Meet at the Center Point., , и . COLT, том 3120 из Lecture Notes in Computer Science, стр. 549-563. Springer, (2004)Learning from mistakes: towards a correctable learning algorithm., , , и . CIKM, стр. 1930-1934. ACM, (2012)Staying in the Zone: Sequencing Content in Classrooms Based on the Zone of Proximal Development., , , , , , , и . EDM, International Educational Data Mining Society (IEDMS), (2019)The Median Hypothesis., и . Empirical Inference, стр. 161-175. Springer, (2013)E-Gotsky: Sequencing Content using the Zone of Proximal Development., , , , , , , и . CoRR, (2019)