We introduce a new algorithm and a new analysis technique that is applicable to a variety of online optimization scenarios, including regret minimization for Lipschitz regret func...
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
We start by showing that in an active learning setting, the Perceptron algorithm needs Ω( 1 ε2 ) labels to learn linear separators within generalization error ε. We then prese...
Sanjoy Dasgupta, Adam Tauman Kalai, Claire Montele...
Active database management systems have been developed for applications needing an automatic reaction in response to certain events. Events can be simple in nature or complex. Com...
Independent component analysis (ICA) is a statistical and computational technique for revealing hidden factors that underlie sets of signals. We propose an improved ICA framework ...
Jing Sui, Jingyu Liu, Lei Wu, Andrew Michael, Lai ...