Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung |
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
16 | David L. Dill |
Timing Assumptions and Verification of Finite-State Concurrent Systems. |
Automatic Verification Methods for Finite State Systems |
1989 |
DBLP DOI BibTeX RDF |
|
15 | Su Chang, Thomas E. Daniels |
P2P botnet detection using behavior clustering & statistical tests. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
machine learning, network security, anomaly detection |
15 | Achour Mostéfaoui |
What Agreement Problems Owe Michel. |
DISC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation |
15 | Yi Deng 0002, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. |
CSR |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Zurab Khasidashvili, Gavriel Gavrielov, Tom Melham |
Assume-guarantee validation for STE properties within an SVA environment. |
FMCAD |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Emerson R. Murphy-Hill, Chris Parnin, Andrew P. Black |
How we refactor, and how we know it. |
ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Kosta Dosen, Zoran Petric |
Equality of proofs for linear equality. |
Arch. Math. Log. |
2008 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 03F07, 03F52, 03G30, 18C05, 18A40, 18D10, 03F05 |
15 | Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Hai H. Wang |
Specifying and Verifying Event-Based Fairness Enhanced Systems. |
ICFEM |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Luca Benvenuti, Alberto Ferrari, Emanuele Mazzi, Alberto L. Sangiovanni-Vincentelli |
Contract-Based Design for Computation and Verification of a Closed-Loop Hybrid System. |
HSCC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Martin Feilkas, Daniel Ratiu |
Ensuring Well-Behaved Usage of APIs through Syntactic Constraints. |
ICPC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Kritsada Sriphaew, Hiroya Takamura, Manabu Okumura |
Cool Blog Identi?cation Using Topic-Based Models. |
Web Intelligence |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Flora P. McMartin, Brandon Muramatsu |
Use vs. access: design and use in educational digital libraries. |
JCDL |
2007 |
DBLP DOI BibTeX RDF |
digital libraries, collections, educational digital libraries, usage, NSDL |
15 | Juan M. Huerta |
A model for contact center analysis and simulation. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Douglas L. Vail, Manuela M. Veloso, John D. Lafferty |
Conditional random fields for activity recognition. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
conditional random fields (CRFs), hidden Markov models (HMMs), activity recognition |
15 | Siri-on Setamanit, Wayne W. Wakeland, David Raffo |
Exploring the Impact of Task Allocation Strategies for Global Software Development Using Simulation. |
SPW/ProSim |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Carrie Gates, Carol Taylor |
Challenging the anomaly detection paradigm: a provocative discussion. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
security, intrusion detection |
15 | Michael de Mare, Rebecca N. Wright |
Secure Set Membership Using 3Sat. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Daniel Große, Rolf Drechsler |
Acceleration of SAT-Based Iterative Property Checking. |
CHARME |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Rafael Pass |
Bounded-concurrent secure multi-party computation with a dishonest majority. |
STOC |
2004 |
DBLP DOI BibTeX RDF |
constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition |
15 | Elena A. Erosheva, Stephen E. Fienberg |
Bayesian Mixed Membership Models for Soft Clustering and Classification. |
GfKl |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Sang Ho Lee, Kyu-Young Whang, Yang-Sae Moon, Wook-Shin Han, Il-Yeol Song |
Dynamic Buffer Allocation in Video-on-Demand Systems. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
VOD systems, dynamic buffer allocation, buffer scheduling methods, multimedia systems |
15 | Andrew Rae, Daniel Jackson 0001, Prasad Ramanan, Jay Flanz, Didier Leyman |
Critical Feature Analysis of a Radiotherapy Machine. |
SAFECOMP |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Boaz Barak, Yehuda Lindell, Salil P. Vadhan |
Lower Bounds for Non-Black-Box Zero Knowledge. |
FOCS |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Yann Loyer, Nicolas Spyratos |
Hypothesis-Founded Semantics for Datalog Programs with Negation. |
MFCS |
2002 |
DBLP DOI BibTeX RDF |
semantics of logic programs, non-monotonic reasoning, hypothesis |
15 | Fernando Pedone |
Boosting System Performance with Optimistic Distributed Protocols. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Benjamin Geisler, Vu A. Ha, Peter Haddawy |
Modeling user preferences via theory refinement. |
IUI |
2001 |
DBLP DOI BibTeX RDF |
neural networks, personalization, user modeling, decision theory |
15 | Sang Ho Lee, Kyu-Young Whang, Yang-Sae Moon, Il-Yeol Song |
Dynamic Buffer Allocation in Video-on-Demand Systems. |
SIGMOD Conference |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Rosario Gennaro, Shai Halevi, Tal Rabin |
Secure Hash-and-Sign Signatures Without the Random Oracle. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
Hash and Sign, Smooth Numbers, Digital Signatures, RSA, Random Oracle, Chameleon Hashing |
15 | John J. Kyaruzi, Jan van Katwijk |
Beyond Components-Connections-Constraints: Dealing with Software Architecture Difficulties. |
ASE |
1999 |
DBLP DOI BibTeX RDF |
ontology, software architecture, formal methods, ADL |
15 | Radu Negulescu, Ad M. G. Peeters |
Verification of Speed-Dependences in Single-Rail Handshake Circuits. |
ASYNC |
1998 |
DBLP DOI BibTeX RDF |
single-rail, isochronic forks, verification, timing, asynchronous circuits, progress, speed-independent circuits, process spaces, handshake circuits |
15 | Paul E. Black, Phillip J. Windley |
Autotically Synthesized Term Denotation Predicates: A Proof Aid. |
TPHOLs |
1995 |
DBLP DOI BibTeX RDF |
|
15 | Mohamed G. Gouda, Sanjoy Paul |
A wireless link protocol: design by refinement. |
ICNP |
1995 |
DBLP DOI BibTeX RDF |
|
15 | Daniel R. Ries, Michael Stonebraker |
Locking Granularity Revisited. |
ACM Trans. Database Syst. |
1979 |
DBLP DOI BibTeX RDF |
locking granulaity, locking hierarchies, multiple updates, concurrency, database management |
15 | Roger M. Firestone |
An analytic model for parallel computation. |
AFIPS National Computer Conference |
1977 |
DBLP DOI BibTeX RDF |
|
12 | Päivi Seppälä, Magdalena Malecka |
AI and discriminative decisions in recruitment: Challenging the core assumptions. |
Big Data Soc. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohsen Esmaeilbeigi, Meysam Cheraghi |
Hybrid kernel approach to improving the numerical stability of machine learning for parametric equations with Gaussian processes in the noisy and noise-free data assumptions. |
Eng. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Matthew Abate, Mark Mote, Mehregan Dor, Corbin Klett, Sean Phillips, Kendra Lang, Panagiotis Tsiotras, Eric Feron, Samuel Coogan 0001 |
Run Time Assurance for Spacecraft Attitude Control Under Nondeterministic Assumptions. |
IEEE Trans. Control. Syst. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yusu Hong, Junhong Lin |
Revisiting Convergence of AdaGrad with Relaxed Assumptions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yusu Hong, Junhong Lin |
On Convergence of Adam for Stochastic Optimization under Relaxed Assumptions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ilias Diakonikolas, Daniel Kane 0001, Lisheng Ren, Yuxin Sun |
SQ Lower Bounds for Non-Gaussian Component Analysis with Weaker Assumptions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Thomas S. Richardson 0001, James M. Robins |
Assumptions and Bounds in the Instrumental Variable Model. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Eliad Tsfadia |
On Differentially Private Subspace Estimation Without Distributional Assumptions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chen Yang 0007, Peng Liang 0001, Zinan Ma |
An exploratory study on automatic identification of assumptions in the development of deep learning frameworks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ashwin Daswani, Rohan Sawant, Najoung Kim |
Syn-QA2: Evaluating False Assumptions in Long-tail Questions with Synthetic QA Datasets. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nilesh Vyas, Paulo Mendes 0001 |
Relaxing Trust Assumptions on Quantum Key Distribution Networks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Brandon C. Collins, Shouhuai Xu, Philip N. Brown |
SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Kaihong Zhang, Heqi Yin, Feng Liang, Jingbo Liu |
Minimax Optimality of Score-based Diffusion Models: Beyond the Density Lower Bound Assumptions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Quang Dao, Aayush Jain |
Lossy Cryptography from Code-Based Assumptions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aayush Jain, Huijia Lin, Amit Sahai |
Indistinguishability Obfuscation from Well-Founded Assumptions. |
Commun. ACM |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mark Taylor, Helen Kennedy, Susan Oman |
Challenging assumptions about the relationship between awareness of and attitudes to data uses amongst the UK public. |
Inf. Soc. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Quang Dao, Aayush Jain |
Lossy Cryptography from Code-Based Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Helger Lipmaa, Roberto Parisella, Janno Siim |
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Intak Hwang, Jinyeong Seo, Yongsoo Song |
Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade |
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Jeroen van de Graaf, Arjen K. Lenstra |
Delphi: sharing assessments of cryptographic assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Sacha Servan-Schreiber |
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen |
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy |
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Jan Bobolz, Jesus Diaz, Markulf Kohlweiss |
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Yilei Chen, Xinyu Mao |
Universal Computational Extractors from Lattice Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Xin Wang, Li Lin, Yao Wang |
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Roberta Cimorelli Belfiore, Andrea De Cosmo, Anna Lisa Ferrara |
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions. |
ACNS (2) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xinhui Liu, Zhenghao Chen, Luping Zhou, Dong Xu 0001, Wei Xi, Gairui Bai, Yihan Zhao, Jizhong Zhao |
UFDA: Universal Federated Domain Adaptation with Practical Assumptions. |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade |
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions. |
Public Key Cryptography (4) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy |
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Balthazar Bauer, Georg Fuchsbauer, Fabian Regen |
On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Romain Gay, Bogdan Ursu |
On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Helger Lipmaa, Roberto Parisella, Janno Siim |
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. |
EUROCRYPT (6) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen 0001 |
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions. |
EUROCRYPT (6) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Anne-Kathrin Schmuck, K. S. Thejaswini, Irmak Saglam, Satya Prakash Nayak |
Solving Two-Player Games Under Progress Assumptions. |
VMCAI (1) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Achille O. R. Nazaret, Claudia Shi, David M. Blei |
On the Misspecification of Linear Assumptions in Synthetic Controls. |
AISTATS |
2024 |
DBLP BibTeX RDF |
|
12 | Iosif Apostolakis, Zeynep G. Saribatur, Johannes Peter Wallner |
Abstracting Assumptions in Structured Argumentation. |
AAMAS |
2024 |
DBLP BibTeX RDF |
|
12 | Kuize Zhang |
Removing Two Fundamental Assumptions in Verifying Strong Periodic (D-)Detectability of Discrete-Event Systems. |
IEEE Control. Syst. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jean-François Biasse, Xavier Bonnetain, Elena Kirshanova, André Schrottenloher, Fang Song 0001 |
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Justin Grimmer, Dean Knox, Brandon M. Stewart |
Naive regression requires weaker assumptions than factor models to adjust for multiple cause confounding. |
J. Mach. Learn. Res. |
2023 |
DBLP BibTeX RDF |
|
12 | Tetiana Gorbach, Xavier de Luna, Juha Karvanen, Ingeborg Waernbaum |
Contrasting Identifying Assumptions of Average Causal Effects: Robustness and Semiparametric Efficiency. |
J. Mach. Learn. Res. |
2023 |
DBLP BibTeX RDF |
|
12 | Xiaoxi Jia, Christian Kanzow, Patrick Mehlitz |
Convergence Analysis of the Proximal Gradient Method in the Presence of the Kurdyka-Łojasiewicz Property Without Global Lipschitz Assumptions. |
SIAM J. Optim. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Liting Mai, Shuping Yang, Yu Wang, Rui Li 0028 |
Impacts of Shape Assumptions on Z-R Relationship and Satellite Remote Sensing Clouds Based on Model Simulations and GPM Observations. |
Remote. Sens. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Janaka Alawatugoda 0001 |
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions. |
Cryptogr. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Gabriele Eichfelder, Lars Grüne, Lisa Krügel, Jonas Schießl |
Relaxed dissipativity assumptions and a simplified algorithm for multiobjective MPC. |
Comput. Optim. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Clay Carper, Stone Olguin, Jarek Brown, Caylie Charlton, Mike Borowczak |
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis. |
J. Cybersecur. Priv. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Francis Mujjuni, Thomas R. Betts, Richard E. Blanchard |
Evaluation of Power Systems Resilience to Extreme Weather Events: A Review of Methods and Assumptions. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Moslem Forouzesh, Farid Samsami Khodadad, Paeiz Azmi, Ali Kuhestani, Hossein Ahmadi |
Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran |
Topology-Hiding Communication from Minimal Assumptions. |
J. Cryptol. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Iqbal Shamsudheen, Christian Hennig |
Should We Test the Model Assumptions Before Running a Model-based Test? |
J. Data Sci. Stat. Vis. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Axel Theorell, Jörg Stelling |
Assumptions on decision making and environment can yield multiple steady states in microbial community models. |
BMC Bioinform. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Queralt Viladevall, Salvador Linares-Mustarós, Maria Antonia Huertas, Joan Carles Ferrer-Comalat |
Understanding the Axioms and Assumptions of Logical Mathematical Systems through Raster Images: Application to the Construction of a Likert Scale. |
Axioms |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Noel Carroll, Kieran Conboy, Nik Rushdi Hassan, Thomas Hess, Iris A. Junglas, Lorraine Morgan |
Problematizing Assumptions on Digital Transformation Research in the Information Systems Field. |
Commun. Assoc. Inf. Syst. |
2023 |
DBLP BibTeX RDF |
|
12 | Wentao Cao, Yaling Li, Qingzhao Yu |
Sensitivity analysis for assumptions of general mediation analysis. |
Commun. Stat. Simul. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
Short attribute-based signatures for arbitrary Turing machines from standard assumptions. |
Des. Codes Cryptogr. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yanwei Zhou, Bo Yang 0003, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu 0001 |
Leakage-resilient identity-based cryptography from minimal assumptions. |
Des. Codes Cryptogr. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Maarten C. Vonk, Ninoslav Malekovic, Thomas Bäck, Anna V. Kononova |
Disentangling causality: assumptions in causal discovery and inference. |
Artif. Intell. Rev. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Leonid Barenboim, Harel Levin |
Secured distributed algorithms without hardness assumptions. |
J. Parallel Distributed Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jiaxu Peng, Jungpil Hahn, Ke-Wei Huang |
Handling Missing Values in Information Systems Research: A Review of Methods and Assumptions. |
Inf. Syst. Res. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Dirk Tasche |
Invariance assumptions for class distribution estimation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Amit Daniely, Nathan Srebro, Gal Vardi |
Efficiently Learning Neural Networks: What Assumptions May Suffice? |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jihyo Kim, Jeonghyeon Kim, Sangheum Hwang |
Deep Active Learning with Contrastive Learning Under Realistic Data Pool Assumptions. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Daniel Barzilai, Ohad Shamir |
Generalization in Kernel Regression Under Realistic Assumptions. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|