Several cloud-based applications, such as cloud gaming, rent servers to
...
Treatment effect estimation is a fundamental problem in causal inference...
e consider the experimental design problem in an online environment, an
...
We study the error resilience of transitive linear codes over 𝔽_2.
We gi...
The goal of Approximate Query Processing (AQP) is to provide very fast b...
Many models for graphs fall under the framework of edge-independent dot
...
Many real-world applications require aligning two temporal sequences,
in...
We give tight bounds on the degree ℓ homogenous parts f_ℓ of a
bounded f...
In this work, we study longest common substring, pattern matching, and
w...
Understanding generalization and estimation error of estimators for simp...
We study the problem of machine unlearning and identify a notion of
algo...
We study the online discrepancy minimization problem for vectors in
ℝ^d ...
Adversarial training is among the most effective techniques to improve t...
In this paper, we introduce a generalization of graphlets to heterogeneo...
In this work, we reframe the problem of balanced treatment assignment as...
Graph Neural Networks (GNNs) have proven to be useful for many different...
We study sample complexity of optimizing "hill-climbing friendly" functi...
We study model selection in stochastic bandit problems. Our approach rel...
In this paper, we study the problem of finding a maximum matching in the...
A sunflower is a family of sets that have the same pairwise intersection...
In this paper, we introduce the notion of motif closure and describe
hig...
Many real-world applications give rise to large heterogeneous networks w...
Higher-order connectivity patterns such as small induced sub-graphs call...
Following the success of deep convolutional networks in various vision a...
We investigate the use of bootstrapping in the bandit setting. We first ...
Many problems in computer vision and recommender systems involve low-ran...