Adaptive submodularity: Theory and applications in active learning and stochastic optimization

D Golovin, A Krause - Journal of Artificial Intelligence Research, 2011 - jair.org
Many problems in artificial intelligence require adaptively making a sequence of decisions
with uncertain outcomes under partial observability. Solving such stochastic optimization …

Near-optimal bayesian active learning with noisy observations

D Golovin, A Krause, D Ray - Advances in Neural …, 2010 - proceedings.neurips.cc
We tackle the fundamental problem of Bayesian active learning with noise, where we need
to adaptively select from a number of expensive tests in order to identify an unknown …

Diatom taxonomy and identification keys

S Blanco - Modern Trends in Diatom Identification: Fundamentals …, 2020 - Springer
Correct identification of diatom taxa is indispensable for diatom-based water quality studies,
as well as for biotechnological applications. Biological applications of taxonomy include the …

Minimum-effort driven dynamic faceted search in structured databases

S Basu Roy, H Wang, G Das, U Nambiar… - Proceedings of the 17th …, 2008 - dl.acm.org
In this paper, we propose minimum-effort driven navigational techniques for enterprise
database systems based on the faceted search paradigm. Our proposed techniques …

Adaptive informative path planning in metric spaces

ZW Lim, D Hsu, WS Lee - The International Journal of …, 2016 - journals.sagepub.com
In contrast to classic geometric motion planning, informative path planning (IPP) seeks a
path for a robot to sense the world and gain information. In adaptive IPP, the robot chooses …

Coresets for decision trees of signals

I Jubran, EE Sanches Shayda… - Advances in Neural …, 2021 - proceedings.neurips.cc
Abstract A $ k $-decision tree $ t $(or $ k $-tree) is a recursive partition of a matrix (2D-
signal) into $ k\geq 1$ block matrices (axis-parallel rectangles, leaves) where each …

Might I get pwned: A second generation compromised credential checking service

B Pal, M Islam, MS Bohuk, N Sullivan… - 31st USENIX Security …, 2022 - usenix.org
Credential stuffing attacks use stolen passwords to log into victim accounts. To defend
against these attacks, recently deployed compromised credential checking (C3) services …

Physical movement monitoring using body sensor networks: A phonological approach to construct spatial decision trees

H Ghasemzadeh, R Jafari - IEEE Transactions on Industrial …, 2010 - ieeexplore.ieee.org
Monitoring human activities using wearable sensor nodes has the potential to enable many
useful applications for everyday situations. Limited computation, battery lifetime and …

Approximation algorithms for optimal decision trees and adaptive TSP problems

A Gupta, V Nagarajan, R Ravi - Mathematics of Operations …, 2017 - pubsonline.informs.org
We consider the problem of constructing optimal decision trees: given a collection of tests
that can disambiguate between a set of m possible diseases, each test having a cost, and …

Question selection for interactive program synthesis

R Ji, J Liang, Y Xiong, L Zhang, Z Hu - Proceedings of the 41st ACM …, 2020 - dl.acm.org
Interactive program synthesis aims to solve the ambiguity in specifications, and selecting the
proper question to minimize the rounds of interactions is critical to the performance of …