Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Second Order Cone Programming Approaches for Handling Missing and Uncertain Data., , and . J. Mach. Learn. Res., (2006)Ellipsoidal Machines., and . AISTATS, volume 2 of JMLR Proceedings, page 484-491. JMLR.org, (2007)Boosted multi-task learning., , , , , and . Mach. Learn., 85 (1-2): 149-173 (2011)Maximum Relative Margin and Data-Dependent Regularization., and . J. Mach. Learn. Res., (2010)Laplacian Spectrum Learning., and . ECML/PKDD (3), volume 6323 of Lecture Notes in Computer Science, page 261-276. Springer, (2010)Online Learning with Preference Feedback, and . CoRR, (2011)A Support Vector Approach to Censored Targets., , and . ICDM, page 655-660. IEEE Computer Society, (2007)Variance Penalizing AdaBoost., and . NIPS, page 1908-1916. (2011)Multi-task learning for boosting with application to web search ranking., , , , , and . KDD, page 1189-1198. ACM, (2010)Multi-armed Bandit Problems with History., and . AISTATS, volume 22 of JMLR Proceedings, page 1046-1054. JMLR.org, (2012)