Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning using Large Datasets., and . NATO ASI Mining Massive Data Sets for Security, volume 19 of NATO Science for Peace and Security Series - D: Information and Communication Security, page 15-26. IOS Press, (2007)Erratum: SGDQN is Less Careful than Expected., , , , and . J. Mach. Learn. Res., (2010)Wasserstein Generative Adversarial Networks., , and . ICML, volume 70 of Proceedings of Machine Learning Research, page 214-223. PMLR, (2017)Music Source Separation in the Waveform Domain., , , and . CoRR, (2019)Demucs: Deep Extractor for Music Sources with extra unlabeled data remixed., , , and . CoRR, (2019)L'apprentissage statistique à grande échelle., and . Monde des Util. Anal. Données, (2010)Unifying distillation and privileged information, , , and . (2015)cite arxiv:1511.03643.The need for open source software in machine learning, , , , , , , , , and . Made available in DSpace on 2010-12-20T06: 05: 49Z (GMT). No. of bitstreams: 1 Sonnenburg\_Need2007. pdf: 1278865 bytes, checksum: 31b77a03c5967cafb7381eee2f47fe56 (MD5) Previous issue date: 2009-05-22T01: 55: 10Z, (2007)No Regret Bound for Extreme Bandits., , and . CoRR, (2015)Breaking SVM Complexity with Cross-Training., , and . NIPS, page 81-88. (2004)