Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
approximation algorithms for deriving dual bound within a branch-and-bound algorithms. Other directions could use Machine Learning or new decompositions. This subject is generally quite open so it is important to
-
/C++) computer codes implementing a cryptographic algorithm. Although desired, background in advanced cryptography is not a must. Application of a PET algorithm to solve a real-life problem: This
-
science conference [1]; one of our papers is recognised as Clarivate Web of Science HighCite (top 1% of papers for the field of research) [2]; three of our algorithms (TS-Chief, InceptionTime and Rocket
-
as networks or graphs in the hope of reasoning about them - but the tools that we have for understanding such network structured data (whether algorithmic analytics or visualisation tools) remain crude
-
Anomaly detection is an important task in data mining. Traditionally most of the anomaly detection algorithms have been designed for ‘static’ datasets, in which all the observations are available
-
This project will investigate and develop the ways in which AI algorithms and practices can be made transparent and explainable for use in law enforcement and judicial applications The Faculty
-
Connected Autonomous Vehicle (MCAV) team. Required knowledge Artificial Intelligence Machine learning Software Testing Genetic Algorithms
-
guarantees of FL. In this project, we aim at an ambitious goal - designing secure and privacy-enhancing algorithms and framework for FL and applying our designs into real-world applications. To achieve
-
challenging data problem. Weak signals from collisions of compact objects can be dug out of noisy time series because we understand what the signal should look like, and can therefore use simple algorithms
-
Learning, Algorithms and Data Structures