Gathering labeled data to train well-performing machine learning models is one of the critical challenges in many applications. Active learning aims at red
Bayesian Methods for Hackers : An intro to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view.
B. Axelrod, I. Diakonikolas, A. Sidiropoulos, A. Stewart, and G. Valiant. (2019)cite arxiv:1907.08306Comment: The present paper is a merger of two independent works arXiv:1811.03204 and arXiv:1812.05524, proposing essentially the same algorithm to compute the log-concave MLE.
S. Chatzis. Proceedings of the 30th International Conference on Machine Learning, volume 28 of Proceedings of Machine Learning Research, page 729--737. Atlanta, Georgia, USA, PMLR, (17--19 Jun 2013)
D. Simpson, H. Rue, T. Martins, A. Riebler, and S. Sørbye. (2014)cite arxiv:1403.4630Comment: Major revision of previous version. Includes a beefed up literature review and new desiderata for hierarchical priors. Removes (for space) the Cox proportional hazard model and the section on hyperparameters for Gaussian random fields.
A. Foong, Y. Li, J. Hernández-Lobato, and R. Turner. (2019)cite arxiv:1906.11537Comment: Presented at the ICML 2019 Workshop on Uncertainty and Robustness in Deep Learning.
R. Neal. (1992)cite arxiv:hep-lat/9208011Comment: 15 pages, 4 figures (only one of which is present), New version with corrected LaTex, Submitted to J. of Comp. Physics.