Author of the publication

Experiments With Hierarchical Text Classification

, and . Proceedings of 9th IASTED International Conference onArtifical Intelligence, IASTED, ACTA Press, Benidorm, Spain, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relevance Feedback Models for Content-Based Image Retrieval., and . Multimedia Analysis, Processing and Communications, 346, (2011)Learning of Depth Two Neural Networks with Constant Fan-In at the Hidden Nodes (Extended Abstract)., , , and . COLT, page 333-343. ACM, (1996)PAC-Bayesian Analysis of the Exploration-Exploitation Trade-off, , , , , and . CoRR, (2011)PAC-Bayes-Bernstein Inequality for Martingales and its Application to Multiarmed Bandits, , , , and . CoRR, (2011)On-Line Learning of Rectangles in Noisy Environments.. COLT, page 253-261. ACM, (1993)Workshop summary: On-line learning with limited feedback., , , , , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 8. ACM, (2009)A distributed voting scheme to maximize preferences., and . RAIRO Theor. Informatics Appl., 40 (2): 389-403 (2006)Upper-Confidence-Bound Algorithms for Active Learning in Multi-armed Bandits., , , , and . ALT, volume 6925 of Lecture Notes in Computer Science, page 189-203. Springer, (2011)Pareto Front Identification from Stochastic Bandit Feedback., , , and . AISTATS, volume 51 of JMLR Workshop and Conference Proceedings, page 939-947. JMLR.org, (2016)Learning with Malicious Noise.. Encyclopedia of Algorithms, Springer, (2008)