Robustness and safety are critical for the trustworthy deployment of dee...
Motivated by time series forecasting, we study Online Linear Optimizatio...
Temporal difference (TD) learning is a simple algorithm for policy evalu...
We develop a Distributionally Robust Optimization (DRO) formulation for
...
Real-world sequential decision making requires data-driven algorithms th...
Parameter-freeness in online learning refers to the adaptivity of an
alg...
We develop a method to learn bio-inspired foraging policies using human ...
Antimicrobial resistance (AMR) is a risk for patients and a burden for t...
In real-world decision making tasks, it is critical for data-driven
rein...
This monograph develops a comprehensive statistical learning framework t...
We consider speeding up stochastic gradient descent (SGD) by parallelizi...
The options framework for hierarchical reinforcement learning has increa...
Recent progress in online control has popularized online learning with
m...
In order for reinforcement learning techniques to be useful in real-worl...
Usage of automated controllers which make decisions on an environment ar...
We propose a Distributionally Robust Optimization (DRO) formulation with...
We develop Distributionally Robust Optimization (DRO) formulations for
M...
We consider speeding up stochastic gradient descent (SGD) by parallelizi...
We provide a discussion of several recent results which have overcome a ...
This paper is concerned with minimizing the average of n cost functions
...
We consider Mixed Linear Regression (MLR), where training data have
bee...
We augment linear Support Vector Machine (SVM) classifiers by adding thr...
Automatic extraction of clinical concepts is an essential step for turni...
Urban living in modern large cities has significant adverse effects on
h...
We present a Distributionally Robust Optimization (DRO) approach to outl...
Under Markovian assumptions, we leverage a Central Limit Theorem (CLT) f...
We consider the problem of learning a policy for a Markov decision proce...
We present five methods to the problem of network anomaly detection. The...