Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predictive State Representations in Continuous Domains. (2004)Intrusion Detection Using Cost-Sensitive Classification, , and . CoRR, (2008)Randomised Bayesian Least-Squares Policy Iteration., , and . CoRR, (2019)Nearly Optimal Exploration-Exploitation Decision Thresholds.. ICANN (1), volume 4131 of Lecture Notes in Computer Science, page 850-859. Springer, (2006)Cost-Minimising Strategies for Data Labelling: Optimal Stopping and Active Learning., and . FoIKS, volume 4932 of Lecture Notes in Computer Science, page 96-111. Springer, (2008)Differential Privacy for Bayesian Inference through Posterior Sampling., , , , and . J. Mach. Learn. Res., (2017)VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things., , , , , , , , , and 4 other author(s). Pervasive Mob. Comput., (2018)Decision Making Under Uncertainty and Reinforcement Learning - Theory and Algorithms, and . Intelligent Systems Reference Library Springer, (2022)Simulating University Application Data for Fair Matchings., , and . NAIS, volume 1650 of Communications in Computer and Information Science, page 132-138. Springer, (2022)Epistemic Risk-Sensitive Reinforcement Learning., and . ESANN, page 339-344. (2020)