Adaptive submodularity: Theory and applications in active learning and stochastic optimization
Many problems in artificial intelligence require adaptively making a sequence of decisions
with uncertain outcomes under partial observability. Solving such stochastic optimization …
with uncertain outcomes under partial observability. Solving such stochastic optimization …
Near-optimal bayesian active learning with noisy observations
We tackle the fundamental problem of Bayesian active learning with noise, where we need
to adaptively select from a number of expensive tests in order to identify an unknown …
to adaptively select from a number of expensive tests in order to identify an unknown …
Diatom taxonomy and identification keys
S Blanco - Modern Trends in Diatom Identification: Fundamentals …, 2020 - Springer
Correct identification of diatom taxa is indispensable for diatom-based water quality studies,
as well as for biotechnological applications. Biological applications of taxonomy include the …
as well as for biotechnological applications. Biological applications of taxonomy include the …
Minimum-effort driven dynamic faceted search in structured databases
In this paper, we propose minimum-effort driven navigational techniques for enterprise
database systems based on the faceted search paradigm. Our proposed techniques …
database systems based on the faceted search paradigm. Our proposed techniques …
Adaptive informative path planning in metric spaces
In contrast to classic geometric motion planning, informative path planning (IPP) seeks a
path for a robot to sense the world and gain information. In adaptive IPP, the robot chooses …
path for a robot to sense the world and gain information. In adaptive IPP, the robot chooses …
Coresets for decision trees of signals
I Jubran, EE Sanches Shayda… - Advances in Neural …, 2021 - proceedings.neurips.cc
Abstract A $ k $-decision tree $ t $(or $ k $-tree) is a recursive partition of a matrix (2D-
signal) into $ k\geq 1$ block matrices (axis-parallel rectangles, leaves) where each …
signal) into $ k\geq 1$ block matrices (axis-parallel rectangles, leaves) where each …
Might I get pwned: A second generation compromised credential checking service
Credential stuffing attacks use stolen passwords to log into victim accounts. To defend
against these attacks, recently deployed compromised credential checking (C3) services …
against these attacks, recently deployed compromised credential checking (C3) services …
Physical movement monitoring using body sensor networks: A phonological approach to construct spatial decision trees
H Ghasemzadeh, R Jafari - IEEE Transactions on Industrial …, 2010 - ieeexplore.ieee.org
Monitoring human activities using wearable sensor nodes has the potential to enable many
useful applications for everyday situations. Limited computation, battery lifetime and …
useful applications for everyday situations. Limited computation, battery lifetime and …
Approximation algorithms for optimal decision trees and adaptive TSP problems
We consider the problem of constructing optimal decision trees: given a collection of tests
that can disambiguate between a set of m possible diseases, each test having a cost, and …
that can disambiguate between a set of m possible diseases, each test having a cost, and …
Question selection for interactive program synthesis
Interactive program synthesis aims to solve the ambiguity in specifications, and selecting the
proper question to minimize the rounds of interactions is critical to the performance of …
proper question to minimize the rounds of interactions is critical to the performance of …