Author of the publication

Exploiting Probabilistic Independence for Permutations.

, , , and . AISTATS, volume 5 of JMLR Proceedings, page 248-255. JMLR.org, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic roadmap simulation: an efficient representation and algorithm for analyzing molecular motion., , , , and . RECOMB, page 12-21. ACM, (2002)How optimized environmental sensing helps address information overload on the web.. KDD Workshop on Knowledge Discovery from Sensor Data, page 11. ACM, (2009)A Hardware-Software Blueprint for Flexible Deep Learning Specialization., , , , , , , , , and 1 other author(s). IEEE Micro, 39 (5): 8-16 (2019)ACORN: Performant and Predicate-Agnostic Search Over Vector Embeddings and Structured Data., , , and . CoRR, (2024)Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks., , , , , and . CoRR, (2023)TVM: End-to-End Optimization Stack for Deep Learning., , , , , , , , , and . CoRR, (2018)Nothing Else Matters: Model-Agnostic Explanations By Identifying Prediction Invariance., , and . CoRR, (2016)Usability in machine learning at scale with graphlab.. CIKM, page 5-6. ACM, (2013)Exploiting Probabilistic Independence for Permutations., , , and . AISTATS, volume 5 of JMLR Proceedings, page 248-255. JMLR.org, (2009)Kernel Belief Propagation., , , , and . AISTATS, volume 15 of JMLR Proceedings, page 707-715. JMLR.org, (2011)