
From Shallow to Deep Interactions Between Knowledge Representation, Reasoning and Machine Learning (Kay R. Amel group)
This paper proposes a tentative and original survey of meeting points be...
read it

Thresholding Bandit for Doseranging: The Impact of Monotonicity
We analyze the sample complexity of the thresholding bandit problem, wit...
read it

Feature uncertainty bounding schemes for large robust nonlinear SVM classifiers
We consider the binary classification problem when data are large and su...
read it

The ratio of normalizing constants for Bayesian graphical Gaussian model selection
The ratio of normalizing constants for the GWishart distribution, for t...
read it

Convergence rate of a simulated annealing algorithm with noisy observations
In this paper we propose a modified version of the simulated annealing a...
read it

A minimax and asymptotically optimal algorithm for stochastic bandits
We propose the klUCB ++ algorithm for regret minimization in stochastic...
read it

Learning the distribution with largest mean: two bandit frameworks
Over the past few years, the multiarmed bandit model has become increas...
read it

A supermartingale approach to Gaussian process based sequential design of experiments
Gaussian process (GP) models have become a wellestablished frameworkfor...
read it

Nested Kriging predictions for datasets with large number of observations
This work falls within the context of predicting the value of a real fun...
read it

Refined Lower Bounds for Adversarial Bandits
We provide new lower bounds on the regret that must be suffered by adver...
read it

Maximin Action Identification: A New Bandit Framework for Games
We study an original problem of pure exploration in a strategic bandit m...
read it

Regret bounds for NarendraShapiro bandit algorithms
NarendraShapiro (NS) algorithms are bandittype algorithms that have be...
read it

Classification with the nearest neighbor rule in general finite dimensional spaces: necessary and sufficient conditions
Given an nsample of random vectors (X_i,Y_i)_1 ≤ i ≤ n whose joint law ...
read it

On the Complexity of Best Arm Identification in MultiArmed Bandit Models
The stochastic multiarmed bandit model is a simple abstraction that has...
read it

Optimal discovery with probabilistic expert advice: finite time analysis and macroscopic optimality
We consider an original problem that arises from the issue of security a...
read it

Optimal designs for Lasso and Dantzig selector using Expander Codes
We investigate the highdimensional regression problem using adjacency m...
read it

Optimizing an Organized Modularity Measure for Topographic Graph Clustering: a Deterministic Annealing Approach
This paper proposes an organized generalization of Newman and Girvan's m...
read it

Batch kernel SOM and related Laplacian methods for social network analysis
Large graphs are natural mathematical models for describing the structur...
read it

Symbolic Computations of First Integrals for Polynomial Vector Fields
In this article we show how to generalize to the Darbouxian, Liouvillian...
read it

Ergodicity of some classes of cellular automata subject to noise
Cellular automata (CA) are dynamical systems on symbolic configurations ...
read it

How to cut a cake with a gram matrix
In this article we study the problem of fair division. In particular we ...
read it

A Central Limit Theorem for Wasserstein type distances between two different laws
This article is dedicated to the estimation of Wasserstein distances and...
read it

Algebraic Geometric codes on Hirzebruch surfaces
We define a linear code C_η(δ_T,δ_X) by evaluating polynomials of bidegr...
read it

Gaussian Processes indexed on the symmetric group: prediction and learning
In the framework of the supervised learning of a real function defined o...
read it

Auxiliary information : the rakingratio empirical process
We study the empirical measure associated to a sample of size n and modi...
read it

Don't cry to be the first! Symmetric fair division algorithms exist
In this article we study a cake cutting problem. More precisely, we stud...
read it

Stein kernels and moment maps
We describe a construction of Stein kernels using moment maps, which are...
read it

Gaussian Process Forecast with multidimensional distributional entries
In this work, we propose to define Gaussian Processes indexed by multidi...
read it

Uniform regret bounds over R^d for the sequential linear regression problem with the square loss
We consider the setting of online linear regression for arbitrary determ...
read it

Sequential Test for the Lowest Mean: From Thompson to Murphy Sampling
Learning the minimum/maximum mean among a finite set of distributions is...
read it

Post hoc false positive control for spatially structured hypotheses
In a high dimensional multiple testing framework, we present new confide...
read it

Optimization of a SSP's Header Bidding Strategy using Thompson Sampling
Over the last decade, digital media (web or app publishers) generalized ...
read it

Cumulative distribution functions for the five simplest natural exponential families
Suppose that the distribution of X_a belongs to a natural exponential fa...
read it

Semi Parametric Estimations of rotating and scaling parameters for aeronautic loads
In this paper, we perform registration of noisy curves. We provide an ap...
read it

How to share a cake with a secret agent
In this note we study a problem of fair division in the absence of full ...
read it

Location and scale behaviour of the quantiles of a natural exponential family
Let P_0 be a probability on the real line generating a natural exponenti...
read it

Prediction of Preliminary Maximum Wing Bending Moments under Discrete Gust
Many methodologies have been proposed to quickly identify among a very l...
read it

Optimal Uncertainty Quantification on moment class using canonical moments
We gain robustness on the quantification of a risk measurement by accoun...
read it

Spatial Blind Source Separation
Recently a blind source separation model was suggested for multivariate ...
read it

Optimal Uncertainty Quantification of a risk measurement from a thermalhydraulic code using Canonical Moments
We study an industrial computer code related to nuclear safety. A major ...
read it

Rakingratio empirical process with auxiliary information learning
The rakingratio method is a statistical and computational method which ...
read it

A conditional BerryEsseen inequality
As an extension of a central limit theorem established by Svante Janson,...
read it

Adjacencyconstrained hierarchical clustering of a band similarity matrix with application to Genomics
Motivation: Genomic data analyses such as GenomeWide Association Studie...
read it

Anticanonical codes from del Pezzo surfaces with Picard rank one
We construct algebraic geometric codes from del Pezzo surfaces and focus...
read it

Aggregated kernel based tests for signal detection in a regression model
Considering a regression model, we address the question of testing the n...
read it

Weighted Lifted Codes: Local Correctabilities and Application to Robust Private Information Retrieval
Low degree ReedMuller codes are known to satisfy local decoding propert...
read it

Multiple Testing and Variable Selection along Least Angle Regression's path
In this article we investigate the outcomes of the standard Least Angle ...
read it

Cake cutting: Explicit examples for impossibility results
In this article we suggest a model of computation for the cake cutting p...
read it

On the NoiseInformation Separation of a Private Principal Component Analysis Scheme
In a survey disclosure model, we consider an additive noise privacy mech...
read it

Applicability and Interpretability of Hierarchical Agglomerative Clustering With or Without Contiguity Constraints
Hierarchical Agglomerative Classification (HAC) with Ward's linkage has ...
read it
Université de Toulouse
44389 The University of Toulouse is a university in France that was established by papal bull in 1229, making it one of the earliest universities to emerge in Europe.