You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
How is it possible to allow multiple data owners to collaboratively train and use a shared prediction model while keeping all the local training data private? Traditional machine learning approaches need to combine all data at one location, typically a data center, which may very well violate the laws on user privacy and data confidentiality. Today, many parts of the world demand that technology companies treat user data carefully according to user-privacy laws. The European Union's General Data Protection Regulation (GDPR) is a prime example. In this book, we describe how federated machine learning addresses this problem with novel solutions combining distributed machine learning, cryptography and security, and incentive mechanism design based on economic principles and game theory. We explain different types of privacy-preserving machine learning solutions and their technological backgrounds, and highlight some representative practical use cases. We show how federated learning can become the foundation of next-generation machine learning that caters to technological and societal needs for responsible AI development and application.
Introduces exciting new methods for assessing algorithms for problems ranging from clustering to linear programming to neural networks.
This book introduces theories, methods and applications of density ratio estimation, a newly emerging paradigm in the machine learning community.
The global #MeToo and #BlackLivesMatter movements as well as the push for LGBTQ+ rights are all emblematic of a growing interest in and focus on how to better embrace and capitalize on diversity. Yet these social movements exist alongside renewed efforts to constrain minority rights and stem immigration around the world. In Untapped Power, Carla Koppell has assembled a leading group of scholars, policy makers, researchers, and activists to provide a comprehensive overview for understanding and navigating these countervailing forces, so that we can build a more peaceful and inclusive world.
This book focuses on lived ancient religious communication in Roman Dacia. Testing for the first time the ‘Lived Ancient Religion’ approach in terms of a peripheral province from the Danubian area, this work looks at the role of ‘sacralised’ spaces, known commonly as sanctuaries in the religious communication of the province.
Similarity between objects plays an important role in both human cognitive processes and artificial systems for recognition and categorization. How to appropriately measure such similarities for a given task is crucial to the performance of many machine learning, pattern recognition and data mining methods. This book is devoted to metric learning, a set of techniques to automatically learn similarity and distance functions from data that has attracted a lot of interest in machine learning and related fields in the past ten years. In this book, we provide a thorough review of the metric learning literature that covers algorithms, theory and applications for both numerical and structured data....
We live in a highly connected world with multiple self-interested agents interacting and myriad opportunities for conflict and cooperation. The goal of game theory is to understand these opportunities. This book presents a rigorous introduction to the mathematics of game theory without losing sight of the joy of the subject. This is done by focusing on theoretical highlights (e.g., at least six Nobel Prize winning results are developed from scratch) and by presenting exciting connections of game theory to other fields such as computer science (algorithmic game theory), economics (auctions and matching markets), social choice (voting theory), biology (signaling and evolutionary stability), an...
Program synthesis is the task of automatically finding a program in the underlying programming language that satisfies the user intent expressed in the form of some specification. Since the inception of artificial intelligence in the 1950s, this problem has been considered the holy grail of Computer Science. Despite inherent challenges in the problem such as ambiguity of user intent and a typically enormous search space of programs, the field of program synthesis has developed many different techniques that enable program synthesis in different real-life application domains. It is now used successfully in software engineering, biological discovery, compute-raided education, end-user programm...
Winter 1948. Vienna. Debriefed by London Films, former spy turned novelist Graham Greene works on the screenplay for his next feature film, assisted by the enigmatic Elizabeth Montagu. However, Greene’s visit soon proves to be just as mysterious as his best-selling thrillers, winding through Vienna’s shadowy underground before the author finds himself in the midst of an intricate plot to unseat the government of Czechoslovakia in an event that would be remembered as The Prague Coup. Jean-Luc Fromental seamlessly merges fact and fiction in a spy thriller worthy of its protagonist, Graham Greene, who finds himself caught in a web of intrigue, espionage, and murder while writing the screenplay that would become the 1949 classic ‘The Third Man’ starring Orson Welles. “This will hook you from its opening panels. Plenty of intrigue, a killer plot, and evocative visuals. What more could you want?” – LA Review of Books