Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy., , , , , and . ICML, volume 48 of JMLR Workshop and Conference Proceedings, page 201-210. JMLR.org, (2016)Turning Lemons into Peaches using Secure Computation., , and . CoRR, (2018)Learning from mistakes: towards a correctable learning algorithm., , , and . CIKM, page 1930-1934. ACM, (2012)Challenges for designing notifications for affective computing systems., , , and . UbiComp Adjunct, page 1554-1559. ACM, (2016)Bayes and Tukey Meet at the Center Point., , and . COLT, volume 3120 of Lecture Notes in Computer Science, page 549-563. Springer, (2004)Margin Analysis of the LVQ Algorithm., , , and . NIPS, page 462-469. MIT Press, (2002)A Last Switch Dependent Analysis of Satiation and Seasonality in Bandits., , , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 971-990. PMLR, (2022)Staying in the Zone: Sequencing Content in Classrooms Based on the Zone of Proximal Development., , , , , , , and . EDM, International Educational Data Mining Society (IEDMS), (2019)The Median Hypothesis., and . Empirical Inference, page 161-175. Springer, (2013)Gait Detection from a Wrist-Worn Sensor Using Machine Learning Methods: A Daily Living Study in Older Adults and People with Parkinson's Disease., , , , , and . Sensors, 22 (18): 7094 (2022)