Zobrazeno 1 - 10
of 777
pro vyhledávání: '"Wing, A. M."'
Autor:
Elliott, Mark T., author, Ward, Dominic, author, Stables, Ryan, author, Fraser, Dagmar, author, Jacoby, Nori, author, Wing, Alan M., author
Publikováno v:
Timing and Time Perception: Procedures, Measures, and Applications. :177-215
We initiate the study of fair classifiers that are robust to perturbations in the training distribution. Despite recent progress, the literature on fairness has largely ignored the design of fair and robust classifiers. In this work, we develop class
Externí odkaz:
http://arxiv.org/abs/2007.06029
Autor:
Wing, Jeannette M.
The promise of AI is huge. AI systems have already achieved good enough performance to be in our streets and in our homes. However, they can be brittle and unfair. For society to reap the benefits of AI systems, society needs to be able to trust them
Externí odkaz:
http://arxiv.org/abs/2002.06276
Autor:
Wing, Jeannette M.
Although data science builds on knowledge from computer science, mathematics, statistics, and other disciplines, data science is a unique field with many mysteries to unlock: challenging scientific questions and pressing questions of societal importa
Externí odkaz:
http://arxiv.org/abs/2002.05658
Autor:
WING, JEANNETTE M.1,2 wing@columbia.edu
Publikováno v:
Communications of the ACM. Oct2021, Vol. 64 Issue 10, p64-71. 8p. 1 Color Photograph.
An item of your personal information is inversely private if some party has access to it but you do not. We analyze the provenance of inversely private information and its rise to dominance over other kinds of personal information. In a nutshell, the
Externí odkaz:
http://arxiv.org/abs/1510.03311
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Wing, Hannah M.1 (AUTHOR) hwing@fordham.edu, Park-Taylor, Jennie1 (AUTHOR)
Publikováno v:
Cultural Diversity & Ethnic Minority Psychology. Apr2024, Vol. 30 Issue 2, p395-403. 9p.
Information flow analysis has largely ignored the setting where the analyst has neither control over nor a complete model of the analyzed system. We formalize such limited information flow analyses and study an instance of it: detecting the usage of
Externí odkaz:
http://arxiv.org/abs/1405.2376
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.