Recharging Bandits
We introduce a general model of bandit problems in which the expected payout of an arm is an increasing concave function of the time since it was last played. We first develop approximation algorithms for…
We introduce a general model of bandit problems in which the expected payout of an arm is an increasing concave function of the time since it was last played. We first develop approximation algorithms for…
John’s theorem proved in 1948 states that any centrally-symmetric convex body in R^d can be sandwiched by two ellipsoids up to a factor of sqrt{d}. In particular, it implies that any d-dimensional normed space embeds…
Recent discussion in the public sphere about classification by algorithms has involved tension between competing notions of what it means for such a classification to be fair to different groups. We consider several of the…
Machine learning can impact people with legal or ethical consequences when it is used to automate decisions in areas such as insurance, lending, hiring, and predictive policing. In many of these scenarios, previous decisions have…
Anomaly detection is important for data cleaning, cybersecurity, and robust AI systems. This talk will review recent work in our group on (a) benchmarking existing algorithms, (b) developing a theoretical understanding of their behavior, (c)…
The learnability of different neural architectures can be characterized directly by computable measures of data complexity. In this talk, we reframe the problem of architecture selection as understanding how data determines the most expressive and…
Episode 14, February 28, 2018 – Today, Dr. Crawford talks about both the promises and the problems of AI; why— when it comes to data – bigger isn’t necessarily better; and how – even in…