Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Vibhor Rastogi"'
Publikováno v:
Transactions of the Association for Computational Linguistics, Vol 2 (2024)
Externí odkaz:
https://doaj.org/article/59fe0de051914bc9bf536a578794ffa0
An Immersive Vehicle-in-the-Loop VR Platform for Evaluating Human-to-Autonomous Vehicle Interactions
Autor:
Anjan Rayamajhi, Andrew Robb, Roberto Merco, Marco Gavelli, Manveen Kaur, Gianluca Papa, Sabarish V. Babu, Vibhor Rastogi, Jim Martin, Pierluigi Pisu
Publikováno v:
SAE Technical Paper Series.
Publikováno v:
The VLDB Journal. 24:757-781
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. We describe the matrix mechanism, an algorithm for answering a workload of linear counting queries that adapts the noise distribut
Publikováno v:
Transactions of the Association for Computational Linguistics. 2:105-118
We propose a new method for unsupervised tagging that finds minimal models which are then further improved by Expectation Maximization training. In contrast to previous approaches that rely on manually specified and multi-step heuristics for model mi
Publikováno v:
Proceedings of the International AAAI Conference on Web and Social Media. 8:426-435
Asking the right question in the right way is an art (and a science). In a community question-answering setting, a good question is not just one that is found to be useful by other people: a question is good if it is also presented clearly and shows
Publikováno v:
ACM Transactions on Knowledge Discovery from Data. 7:1-24
In entity matching, a fundamental issue while training a classifier to label pairs of entities as either duplicates or nonduplicates is the one of selecting informative training examples. Although active learning presents an attractive solution to th
Publikováno v:
Proceedings of the VLDB Endowment. 3:1021-1032
We show that it is possible to significantly improve the accuracy of a general class of histogram queries while satisfying differential privacy. Our approach carefully chooses a set of queries to evaluate, and then exploits consistency constraints th
Publikováno v:
Proceedings of the VLDB Endowment. 1:821-832
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, permitting a simple allow/deny semantics. In this paper, we look at acce
Autor:
Magdalena Balazinska, Dan Suciu, Evan Welbourne, C. Borriello, Nodira Khoussainova, Vibhor Rastogi, Travis Kriplean, Tadayoshi Kohno
Publikováno v:
IEEE Pervasive Computing. 6:48-55
To protect the privacy of RFID data after an authorized system captures it, this policy-based approach constrains the data users can access to system events that occurred when and where they were physically present. RFID security is a vibrant researc
Publikováno v:
SoCC
Computing connected components of a graph lies at the core of many data mining algorithms, and is a fundamental subroutine in graph clustering. This problem is well studied, yet many of the algorithms with good theoretical guarantees perform poorly i