Search
Now showing items 371-376 of 376
Automatic Speech Recognition Solutions For Resource Constrained Devices
The current realm of Automatic Speech Recognition (ASR) systems, pivotal in applications ranging from voice assistants to transcription services and assistive technologies, requires an improvement when confronted with ...
Rational Secure Computation: New Definitions and Constructions
Cryptography and Game Theory are two fascinating areas of modern computing, and there have been numerous works since the early 2000s to bridge these. While cryptography provides mechanisms to detect deviations, game theory ...
Event-Related Potential Interpretation Approaches for Neonatal Hearing Screening
Biopotentials are the electrical discharges generated from the human body. They reflect the status underlying the phenomenon and are frequently used to assess the real-time physiological status of the human body. ...
Investigating Neural Mechanisms of Word Learning and Speech Perception
Language learning and speech perception are remarkable feats performed by the human brain, involving complex neural mechanisms that allow us to understand and communicate with one another. Unravelling the mysteries of these ...
Bandit Algorithms: Fairness, Welfare, and Applications in Causal Inference
We study regret in online learning from a welfarist perspective and explore an application of
bandit algorithms in causal inference. We introduce Nash regret, which measures the difference
between the optimal action ...
Exploring Fairness and Causality in Online Decision-Making
Online decision-making under uncertainty is a fundamental aspect of numerous real-world problems across various domains, including online resource allocation, crowd-sourcing, and online advertising. Multi-Armed Bandits ...