Sort by
Refine Your Search
-
formula is true or false (EXPTIME vs NP). Can we develop and implement efficient algorithms for this problem? This problem has been attacked using multiple different methods for the past 40 years, without
-
algorithms for computing MML solutions beyond the one-dimensional case. Extend existing dynamic programming approaches to higher-dimensional problems or develop novel approximation methods that preserve
-
guarantee that what one believes to be one’s secrets will remain secret. Namely, a DP algorithm cannot ensure that private attributes cannot be inferred from publicly observable attributes if they have strong
-
The relationship between the information-theoretic Bayesian minimum message length (MML) principle and the notion of Solomonoff-Kolmogorov complexity from algorithmic information theory (Wallace and
-
. Wallace (1996). MML estimation of the parameters of the spherical Fisher Distribution. In S. Arikawa and A. K. Sharma (eds.), Proc. 7th International Workshop on Algorithmic Learning Theory (ALT'96
-
publicly available datasets; 3) Proposing algorithms aimed at improving the accuracy of human activity detection; 4) Implementing these algorithms, evaluating their performance empirically, and comparing
-
This project aims to develop robust algorithms capable of identifying and analyzing fingertips extracted from both static images and video footage. Machine learning techniques, particularly computer
-
. With the widespread adoption of ML algorithms for data analysis and decision-making, preserving the privacy of individuals' data has become a paramount concern. The project focuses on exploring
-
This PhD project aims to mitigate the data scarcity of new NLP and Multimodal applications by developing novel active learning algorithms. In this project, the student will leverage large foundation
-
Learning, Algorithms and Data Structures