Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection Using Cost-Sensitive Classification, , and . CoRR, (2008)Cost-Minimising Strategies for Data Labelling: Optimal Stopping and Active Learning., and . FoIKS, volume 4932 of Lecture Notes in Computer Science, page 96-111. Springer, (2008)Nearly Optimal Exploration-Exploitation Decision Thresholds.. ICANN (1), volume 4131 of Lecture Notes in Computer Science, page 850-859. Springer, (2006)Predictive State Representations in Continuous Domains. (2004)Complexity of Stochastic Branch and Bound Methods for Belief Tree Search in Bayesian Reinforcement Learning.. ICAART (1), page 259-264. INSTICC Press, (2010)Efficient Methods for Near-Optimal Sequential Decision Making under Uncertainty.. Interactive Collaborative Information Systems, volume 281 of Studies in Computational Intelligence, Springer, (2010)Randomised Bayesian Least-Squares Policy Iteration., , and . CoRR, (2019)Differential Privacy for Bayesian Inference through Posterior Sampling., , , , and . J. Mach. Learn. Res., (2017)VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things., , , , , , , , , and 4 other author(s). Pervasive Mob. Comput., (2018)Fair Set Selection: Meritocracy and Social Welfare., , , and . CoRR, (2021)