Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No Regret Bound for Extreme Bandits., , and . CoRR, (2015)Lossy Compression of Partially Masked Still Images., and . Data Compression Conference, page 528. IEEE Computer Society, (1998)Masked Wavelets: Applications to Image Compression., and . Data Compression Conference, page 510. IEEE Computer Society, (2001)Learning using Large Datasets., and . NATO ASI Mining Massive Data Sets for Security, volume 19 of NATO Science for Peace and Security Series - D: Information and Communication Security, page 15-26. IOS Press, (2007)Erratum: SGDQN is Less Careful than Expected., , , , and . J. Mach. Learn. Res., (2010)Unifying distillation and privileged information, , , and . (2015)cite arxiv:1511.03643.Experiments with time delay networks and dynamic time warping for speaker independent isolated digits recognition., , , and . EUROSPEECH, page 2537-2540. ISCA, (1989)Breaking SVM Complexity with Cross-Training., , and . NIPS, page 81-88. (2004)L'apprentissage statistique à grande échelle., and . Monde des Util. Anal. Données, (2010)Efficient Conversion of Digital Documents to Multilayer Raster Formats., , and . ICDAR, page 444-449. IEEE Computer Society, (2001)