Author of the publication

Learning using privileged information: Similarity control and knowledge transfer

, and . Journal of Machine Learning Research, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Cultivation in Privileged Information-augmented Detection., , and . IWSPA@CODASPY, page 73-80. ACM, (2017)Complete statistical theory of learning: learning using statistical invariants., and . COPA, volume 128 of Proceedings of Machine Learning Research, page 4-40. PMLR, (2020)Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems., , , , , and . MILCOM, page 874-879. IEEE, (2021)Coarse-grain dynamic replication schemes for scalable content delivery networks., , , and . GLOBECOM, page 2235-2239. IEEE, (2002)A QoS-aware routing framework for PIM-SM based IP-multicast., and . GLOBECOM, page 376-381. IEEE, (2000)Centralized multi-scale singular value decomposition for feature construction in LIDAR image classification problems., , , , and . AIPR, page 1-6. IEEE Computer Society, (2012)Adaptive rate-based feedback flow control algorithms-extensions to multicast connections., , and . ISCC, page 154-160. IEEE Computer Society, (1998)Non-real time content scheduling in wireless data networks., , , and . PIMRC, page 1375-1379. IEEE, (2004)Non-Real-Time Content Scheduling Algorithms for Wireless Data Networks., , and . IEEE Trans. Computers, 55 (7): 893-905 (2006)Peer-to-peer streaming of stored media: the indirect approach., , , , and . SIGMETRICS/Performance, page 371-372. ACM, (2006)