Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
. With the widespread adoption of ML algorithms for data analysis and decision-making, preserving the privacy of individuals' data has become a paramount concern. The project focuses on exploring
-
operators for these notions. Over the past fifty years, such non-classical logics have proved vital in computer science and logic-based artificial intelligence: after all, any intelligent agent must be able
-
. Wallace (1996). MML estimation of the parameters of the spherical Fisher Distribution. In S. Arikawa and A. K. Sharma (eds.) , Proc. 7th International Workshop on Algorithmic Learning Theory (ALT'96
-
software frameworks, algorithms, robust testing and validation methods, and/or empirically validated solutions that contribute directly to social good, promoting trust, fairness, transparency, and
-
group of experts to predict (probabilistically) whether these occupations will be automated, augmented or unaffected by emerging technologies. Using this data, a classification algorithm is then trained
-
This project aims to employ advanced machine learning techniques to analyse text, audio, images, and videos for signs of harmful behaviour. Natural language processing algorithms are utilized
-
the different actors' beliefs and intentions. We will study the properties of such explanations, present algorithms for automatically computing them as well as extensions to existing frameworks and evaluate
-
quantum engineering, quantum computing, and/or quantum information sciences A deep understanding of quantum algorithms and/or experience with quantum hardware will also be beneficial. A passion for
-
Optimisation methods, such as mixed integer linear programming, have been very successful at decision-making for more than 50 years. Optimisation algorithms support basically every industry behind
-
defence algorithms are remain a challenge in the research community. Furthermore, most existing AML algorithms can only apply to Euclidean space. How to extend existing AML algorithms to non-Euclidean and