Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Planning in the Presence of Cost Functions Controlled by an Adversary., , and . ICML, page 536-543. AAAI Press, (2003)A Unified View of Matrix Factorization Models., and . ECML/PKDD (2), volume 5212 of Lecture Notes in Computer Science, page 358-373. Springer, (2008)Learning Filaments., and . ICML, page 335-342. Morgan Kaufmann, (2000)Adversarial Task-Specific Privacy Preservation under Attribute Attack., , , and . CoRR, (2019)Expressiveness and Learning of Hidden Quantum Markov Models., , , and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 4151-4161. PMLR, (2020)Bounded real-time dynamic programming: RTDP with monotone upper bounds and performance guarantees., , and . ICML, volume 119 of ACM International Conference Proceeding Series, page 569-576. ACM, (2005)Practical Learning of Predictive State Representations., , and . CoRR, (2017)Reduced-Rank Hidden Markov Models, , and . CoRR, (2009)Two-Manifold Problems, and . CoRR, (2011)Efficient Computation of Moments in Sum-Product Networks., and . CoRR, (2017)