Contextual-Bandit Approach to Recommendation Konstantin Knauf
|
|
|
- Derrick Cannon
- 9 years ago
- Views:
Transcription
1 Contextual-Bandit Approach to Recommendation Konstantin Knauf 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 1
2 Agenda Problem Scenario Scenario Multi-armed Bandit Model for Online Recommendation Algorithms to Balance Exploration & Exploitation Evaluating Multi-armed Bandit Algorithms Empirical Results 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 2
3 Agenda Problem Scenario Scenario Multi-armed Bandit Model for Online Recommendation Algorithms to Balance Exploration & Exploitation Evaluating Multi-armed Bandit Algorithms Empirical Results 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 3
4 Scenario: News Article Recommendation Which articles to feature? Challenges: A lot of new users & articles Changing relevance of articles Incorporation of content information Goal: Quickly identify relevant news stories on a personal level 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 4
5 Agenda Problem Scenario Scenario Multi-armed Bandit Model for Online Recommendation Algorithms to Balance Exploration & Exploitation Evaluating Multi-armed Bandit Algorithms Empirical Results 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 5
6 The Original Multi-Armed Bandit Problem Which machine should I play to maximize my overall reward? Exploration Exploitation 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 6
7 Multi-armed Bandit Model for Online-Recommendation Contextual Bandit Example: News Recommendation 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 7
8 Agenda Problem Scenario Scenario Multi-armed Bandit Model for Online Recommendation Algorithms to Balance Exploration & Exploitation Exploration vs. Exploitation UCB LinUCB Evaluating Multi-armed Bandit Algorithms Empirical Results 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 8
9 Algorithms to Balance Exploration & Exploitation Exploration Trade off Exploitation n-bandit-algorithm Context-free 1. -greedy 2. UCB Contextual 1. epoch-greedy 2. LinUCB 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 9
10 Agenda Problem Scenario Scenario Multi-armed Bandit Model for Online Recommendation Algorithms to Balance Exploration & Exploitation Exploration vs. Exploitation UCB LinUCB Evaluating Multi-armed Bandit Algorithms Empirical Results 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 10
11 UCB (Upper Confidence Bound) Algorithm Result 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 11
12 UCB Example Action A B C D Reward Action A Action B Action C Action D 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 12
13 Agenda Problem Scenario Scenario Multi-armed Bandit Model for Online Recommendation Algorithms to Balance Exploration & Exploitation Exploration vs. Exploitation UCB LinUCB Evaluating Multi-armed Bandit Algorithms Empirical Results 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 13
14 LinUCB (Disjoint Linear Models) I Algorithm For each Action Reward Context(!) 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 14
15 LinUCB (Disjoint Linear Models) II Now for the fixed context Reward Action A Action B Action C Action D 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 15
16 LinUCB (Hybrid Linear Models) Algorithm 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 16
17 Agenda Problem Scenario Scenario Multi-armed Bandit Model for Online Recommendation Algorithms to Balance Exploration & Exploitation Evaluating Multi-armed Bandit Algorithms Empirical Results 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 17
18 Evaluation Interactive Algorithm Algorithm User Solution? Testing on Live Data Too Expensive Testing offline Different logging policy Simulator based approach Biased 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 18
19 Unbiased Evaluation based on Logged Data I Assumption Algorithm 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 19
20 Assumptions revisited Assumption Are those assumption fulfilled for online news recommendation? Independence Identical Distribution Infinite Stream 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 20
21 Agenda Problem Scenario Scenario Multi-armed Bandit Model for Online Recommendation Algorithms to Balance Exploration & Exploitation Evaluating Multi-armed Bandit Algorithms Empirical Results 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 21
22 Empirical Results Scenario 4.7m events (featured article, infos, click) in tuning set 36m events in test set Articles and Users clustered into 5 categories Two five-dim. feature vectors Results Eps-Greedy UCB LinUCB (disjoint) LinUCB (hybrid) Rel. CTR 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 22
23 Questions? 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 23
24 Backup: LinUCB Example I Assumtpions: 2 users, 3 articles, 2 genres Trial History Actio n User Genr e A B A C C A C Click 22. Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 24
25 Backup: LinUCB Example II New Trial: User 1 visits page. Which article do we show? Action A (1,1) B (1,1) C (1,2) Januar 2014 Prof. Ulf Brefeld Knowledge Mining & Assesment 25
A Contextual-Bandit Approach to Personalized News Article Recommendation
A Contextual-Bandit Approach to Personalized News Article Recommendation Lihong Li,WeiChu, Yahoo! Labs lihong,[email protected] John Langford Yahoo! Labs [email protected] Robert E. Schapire + + Dept
Collaborative Filtering. Radek Pelánek
Collaborative Filtering Radek Pelánek 2015 Collaborative Filtering assumption: users with similar taste in past will have similar taste in future requires only matrix of ratings applicable in many domains
Handling Advertisements of Unknown Quality in Search Advertising
Handling Advertisements of Unknown Quality in Search Advertising Sandeep Pandey Carnegie Mellon University [email protected] Christopher Olston Yahoo! Research [email protected] Abstract We consider
Un point de vue bayésien pour des algorithmes de bandit plus performants
Un point de vue bayésien pour des algorithmes de bandit plus performants Emilie Kaufmann, Telecom ParisTech Rencontre des Jeunes Statisticiens, Aussois, 28 août 2013 Emilie Kaufmann (Telecom ParisTech)
Introduction to Online Learning Theory
Introduction to Online Learning Theory Wojciech Kot lowski Institute of Computing Science, Poznań University of Technology IDSS, 04.06.2013 1 / 53 Outline 1 Example: Online (Stochastic) Gradient Descent
Prerequisites. Course Outline
MS-55040: Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot Description This three-day instructor-led course will introduce the students to the concepts of data mining,
CoolaData Predictive Analytics
CoolaData Predictive Analytics 9 3 6 About CoolaData CoolaData empowers online companies to become proactive and predictive without having to develop, store, manage or monitor data themselves. It is an
Monotone multi-armed bandit allocations
JMLR: Workshop and Conference Proceedings 19 (2011) 829 833 24th Annual Conference on Learning Theory Monotone multi-armed bandit allocations Aleksandrs Slivkins Microsoft Research Silicon Valley, Mountain
Programming Using Python
Introduction to Computation and Programming Using Python Revised and Expanded Edition John V. Guttag The MIT Press Cambridge, Massachusetts London, England CONTENTS PREFACE xiii ACKNOWLEDGMENTS xv 1 GETTING
Online Network Revenue Management using Thompson Sampling
Online Network Revenue Management using Thompson Sampling Kris Johnson Ferreira David Simchi-Levi He Wang Working Paper 16-031 Online Network Revenue Management using Thompson Sampling Kris Johnson Ferreira
Putting IBM Watson to Work In Healthcare
Martin S. Kohn, MD, MS, FACEP, FACPE Chief Medical Scientist, Care Delivery Systems IBM Research [email protected] Putting IBM Watson to Work In Healthcare 2 SB 1275 Medical data in an electronic or
Machine Learning tools for Online Advertisement
Year 2008-2009. Research Internship Report Machine Learning tools for Online Advertisement Victor Gabillon [email protected] Supervisors INRIA : Philippe Preux Jérémie Mary Supervisors Orange Labs
Exploitation and Exploration in a Performance based Contextual Advertising System
Exploitation and Exploration in a Performance based Contextual Advertising System ABSTRACT Wei Li, Xuerui Wang, Ruofei Zhang, Ying Cui, Jianchang Mao Yahoo! Labs, Sunnyvale, CA, 94089 {lwei,xuerui,rzhang,ycui,jmao}@yahooinc.com
Online Optimization and Personalization of Teaching Sequences
Online Optimization and Personalization of Teaching Sequences Benjamin Clément 1, Didier Roy 1, Manuel Lopes 1, Pierre-Yves Oudeyer 1 1 Flowers Lab Inria Bordeaux Sud-Ouest, Bordeaux 33400, France, [email protected]
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
An Introduction to Advanced Analytics and Data Mining
An Introduction to Advanced Analytics and Data Mining Dr Barry Leventhal Henry Stewart Briefing on Marketing Analytics 19 th November 2010 Agenda What are Advanced Analytics and Data Mining? The toolkit
Data Mining Practical Machine Learning Tools and Techniques
Ensemble learning Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 8 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Combining multiple models Bagging The basic idea
2. A typical business process
I. Basic Concepts on ERP 1. Enterprise resource planning (ERP) Enterprise resource planning (ERP) is the planning of how business resources (materials, employees, customers etc.) are acquired and moved
Information Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli ([email protected])
Acknowledgments. Data Mining with Regression. Data Mining Context. Overview. Colleagues
Data Mining with Regression Teaching an old dog some new tricks Acknowledgments Colleagues Dean Foster in Statistics Lyle Ungar in Computer Science Bob Stine Department of Statistics The School of the
CITY UNIVERSITY OF HONG KONG. Revenue Optimization in Internet Advertising Auctions
CITY UNIVERSITY OF HONG KONG l ½ŒA Revenue Optimization in Internet Advertising Auctions p ]zwû ÂÃÙz Submitted to Department of Computer Science õò AX in Partial Fulfillment of the Requirements for the
STATISTICA Solutions for Financial Risk Management Management and Validated Compliance Solutions for the Banking Industry (Basel II)
STATISTICA Solutions for Financial Risk Management Management and Validated Compliance Solutions for the Banking Industry (Basel II) With the New Basel Capital Accord of 2001 (BASEL II) the banking industry
Feature Selection with Monte-Carlo Tree Search
Feature Selection with Monte-Carlo Tree Search Robert Pinsler 20.01.2015 20.01.2015 Fachbereich Informatik DKE: Seminar zu maschinellem Lernen Robert Pinsler 1 Agenda 1 Feature Selection 2 Feature Selection
Predictive Analytics in Pork Production
Predictive Analytics in Pork Production Chad Grouwinkel Senior Manager, Pork Productivity Solutions, Zoetis Agenda An Innovative Predictive Analytic Model 1. What is Predictive Analytics? 2. Application
Big Data for Big Value @ Intel
Big Data for Big Value @ Intel Moty Fania, PE Big data Analytics Assaf Araki, Sr. Arch. Big data Analytics Advanced Analytics team @ Intel IT Corporate ownership of advanced analytics Team charter Solve
Cost effective Outbreak Detection in Networks
Cost effective Outbreak Detection in Networks Jure Leskovec Joint work with Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance Diffusion in Social Networks One of
TURKISH ORACLE USER GROUP
TURKISH ORACLE USER GROUP Data Mining in 30 Minutes Husnu Sensoy Global Maksimum Data & Information Tech. Founder VLDB Expert Agenda Who am I? Different problems of Data Mining In database data mining?!?
Monte-Carlo Methods. Timo Nolle
Monte-Carlo Methods Timo Nolle Outline Minimax Expected Outcome Monte-Carlo Monte-Carlo Simulation Monte-Carlo Tree Search UCT AMAF RAVE MC-RAVE UCT-RAVE Playing Games Go, Bridge, Scrabble Problems with
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
Preliminaries: Problem Definition Agent model, POMDP, Bayesian RL
POMDP Tutorial Preliminaries: Problem Definition Agent model, POMDP, Bayesian RL Observation Belief ACTOR Transition Dynamics WORLD b Policy π Action Markov Decision Process -X: set of states [x s,x r
Distributed and Scalable QoS Optimization for Dynamic Web Service Composition
Distributed and Scalable QoS Optimization for Dynamic Web Service Composition Mohammad Alrifai L3S Research Center Leibniz University of Hannover, Germany [email protected] Supervised by: Prof. Dr. tech.
Tracking in flussi video 3D. Ing. Samuele Salti
Seminari XXIII ciclo Tracking in flussi video 3D Ing. Tutors: Prof. Tullio Salmon Cinotti Prof. Luigi Di Stefano The Tracking problem Detection Object model, Track initiation, Track termination, Tracking
Challenges of Cloud Scale Natural Language Processing
Challenges of Cloud Scale Natural Language Processing Mark Dredze Johns Hopkins University My Interests? Information Expressed in Human Language Machine Learning Natural Language Processing Intelligent
our algorithms will work and our results will hold even when the context space is discrete given that it is bounded. arm (or an alternative).
1 Context-Adaptive Big Data Stream Mining - Online Appendix Cem Tekin*, Member, IEEE, Luca Canzian, Member, IEEE, Mihaela van der Schaar, Fellow, IEEE Electrical Engineering Department, University of California,
SQL Server Virtualization 101. David Klee, Group Principal and Practice Lead. SQL PASS Virtualization VC, 2014.01.08
SQL Server Virtualization 101 David Klee, Group Principal and Practice Lead SQL PASS Virtualization VC, 2014.01.08 www.linchpinpeople.com 1 David Klee Group Principal and Practice Lead @kleegeek davidklee.net
Downloaded from UvA-DARE, the institutional repository of the University of Amsterdam (UvA) http://hdl.handle.net/11245/2.122992
Downloaded from UvA-DARE, the institutional repository of the University of Amsterdam (UvA) http://hdl.handle.net/11245/2.122992 File ID Filename Version uvapub:122992 1: Introduction unknown SOURCE (OR
Email: [email protected] Office: LSK 5045 Begin subject: [ISOM3360]...
Business Intelligence and Data Mining ISOM 3360: Spring 2015 Instructor Contact Office Hours Course Schedule and Classroom Course Webpage Jia Jia, ISOM Email: [email protected] Office: LSK 5045 Begin subject:
Semi-Supervised Support Vector Machines and Application to Spam Filtering
Semi-Supervised Support Vector Machines and Application to Spam Filtering Alexander Zien Empirical Inference Department, Bernhard Schölkopf Max Planck Institute for Biological Cybernetics ECML 2006 Discovery
Estimation Bias in Multi-Armed Bandit Algorithms for Search Advertising
Estimation Bias in Multi-Armed Bandit Algorithms for Search Advertising Min Xu Machine Learning Department Carnegie Mellon University [email protected] ao Qin Microsoft Research Asia [email protected]
Web Help Desk. Auto Route & Assign Tickets
Help Has Arrived. Web Help Desk Auto Route & Assign Tickets Maximize the Power of the Web Help Desk Software with Dynamic Routing and Assignment of Service Requests www.webhelpdesk.com Powerful Software
Machine Learning for Cyber Security Intelligence
Machine Learning for Cyber Security Intelligence 27 th FIRST Conference 17 June 2015 Edwin Tump Senior Analyst National Cyber Security Center Introduction whois Edwin Tump 10 yrs at NCSC.NL (GOVCERT.NL)
Markov Decision Processes for Ad Network Optimization
Markov Decision Processes for Ad Network Optimization Flávio Sales Truzzi 1, Valdinei Freire da Silva 2, Anna Helena Reali Costa 1, Fabio Gagliardi Cozman 3 1 Laboratório de Técnicas Inteligentes (LTI)
Algorithms for the multi-armed bandit problem
Journal of Machine Learning Research 1 (2000) 1-48 Submitted 4/00; Published 10/00 Algorithms for the multi-armed bandit problem Volodymyr Kuleshov Doina Precup School of Computer Science McGill University
Defending Networks with Incomplete Information: A Machine Learning Approach. Alexandre Pinto [email protected] @alexcpsec @MLSecProject
Defending Networks with Incomplete Information: A Machine Learning Approach Alexandre Pinto [email protected] @alexcpsec @MLSecProject Agenda Security Monitoring: We are doing it wrong Machine Learning
The Adomaton Prototype: Automated Online Advertising Campaign Monitoring and Optimization
: Automated Online Advertising Campaign Monitoring and Optimization 8 th Ad Auctions Workshop, EC 12 Kyriakos Liakopoulos 1, Stamatina Thomaidou 1, Michalis Vazirgiannis 1,2 1 : Athens University of Economics
Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski [email protected]
Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski [email protected] Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems
Microsoft Azure Machine learning Algorithms
Microsoft Azure Machine learning Algorithms Tomaž KAŠTRUN @tomaz_tsql [email protected] http://tomaztsql.wordpress.com Our Sponsors Speaker info https://tomaztsql.wordpress.com Agenda Focus on explanation
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Beyond Traditional Management Reporting. 2013 IBM Corporation
Beyond Traditional Management Reporting 1 Agenda From Reporting to Business Analytics Expanding your capabilities set Workspace Authoring Statistical Analysis Predictive Modeling What-if analysis and planning
Data Mining for Knowledge Management. Classification
1 Data Mining for Knowledge Management Classification Themis Palpanas University of Trento http://disi.unitn.eu/~themis Data Mining for Knowledge Management 1 Thanks for slides to: Jiawei Han Eamonn Keogh
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
SaPHAL Sales Prediction powered by HANA and Predictive Analytics
SaPHAL Sales Prediction powered by HANA and Predictive Analytics 1 SaPHAL Sales Prediction Powered by HANA and Predictive Analytics 1 Introduction - SaPHAL Agenda 2 3 4 Business Case Pain Points & Solution
STORM: Stochastic Optimization Using Random Models Katya Scheinberg Lehigh University. (Joint work with R. Chen and M. Menickelly)
STORM: Stochastic Optimization Using Random Models Katya Scheinberg Lehigh University (Joint work with R. Chen and M. Menickelly) Outline Stochastic optimization problem black box gradient based Existing
Projektgruppe. Categorization of text documents via classification
Projektgruppe Steffen Beringer Categorization of text documents via classification 4. Juni 2010 Content Motivation Text categorization Classification in the machine learning Document indexing Construction
Linear programming approach for online advertising
Linear programming approach for online advertising Igor Trajkovski Faculty of Computer Science and Engineering, Ss. Cyril and Methodius University in Skopje, Rugjer Boshkovikj 16, P.O. Box 393, 1000 Skopje,
Machine Learning using MapReduce
Machine Learning using MapReduce What is Machine Learning Machine learning is a subfield of artificial intelligence concerned with techniques that allow computers to improve their outputs based on previous
SPSS Modeler Integration with IBM DB2 Analytics Accelerator
SPSS Modeler Integration with IBM DB2 Analytics Accelerator Markus Nentwig August 31, 2012 Markus Nentwig SPSS Modeler Integration with IDAA 1 / 12 Agenda 1 Motivation 2 Basics IBM SPSS Modeler IBM DB2
Acronis Backup & Recovery 10 Online Initial Seeding Step-by-Step Guide
Acronis Backup & Recovery 10 Online Initial Seeding Step-by-Step Guide Introduction Initial Seeding is an optional service for customers who want to back up large amounts of data online. If the size of
Session 61 L, Applications of Data Analytics in Health Insurance. Moderator/Presenter: Henning Chiv, FSA, MAAA
Session 61 L, Applications of Data Analytics in Health Insurance Moderator/Presenter: Henning Chiv, FSA, MAAA Session 61: Applications of Data Analytics in Health Insurance Henning Chiv, FSA, MAAA June
Distance Metric Learning in Data Mining (Part I) Fei Wang and Jimeng Sun IBM TJ Watson Research Center
Distance Metric Learning in Data Mining (Part I) Fei Wang and Jimeng Sun IBM TJ Watson Research Center 1 Outline Part I - Applications Motivation and Introduction Patient similarity application Part II
Massive Cloud Auditing using Data Mining on Hadoop
Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed
LZ77. Example 2.10: Let T = badadadabaab and assume d max and l max are large. phrase b a d adadab aa b
LZ77 The original LZ77 algorithm works as follows: A phrase T j starting at a position i is encoded as a triple of the form distance, length, symbol. A triple d, l, s means that: T j = T [i...i + l] =
Statistics Graduate Courses
Statistics Graduate Courses STAT 7002--Topics in Statistics-Biological/Physical/Mathematics (cr.arr.).organized study of selected topics. Subjects and earnable credit may vary from semester to semester.
Data mining techniques: decision trees
Data mining techniques: decision trees 1/39 Agenda Rule systems Building rule systems vs rule systems Quick reference 2/39 1 Agenda Rule systems Building rule systems vs rule systems Quick reference 3/39
ANALYTICS CENTER LEARNING PROGRAM
Overview of Curriculum ANALYTICS CENTER LEARNING PROGRAM The following courses are offered by Analytics Center as part of its learning program: Course Duration Prerequisites 1- Math and Theory 101 - Fundamentals
Invited Applications Paper
Invited Applications Paper - - Thore Graepel Joaquin Quiñonero Candela Thomas Borchert Ralf Herbrich Microsoft Research Ltd., 7 J J Thomson Avenue, Cambridge CB3 0FB, UK [email protected] [email protected]
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
Maximizing Return and Minimizing Cost with the Decision Management Systems
KDD 2012: Beijing 18 th ACM SIGKDD Conference on Knowledge Discovery and Data Mining Rich Holada, Vice President, IBM SPSS Predictive Analytics Maximizing Return and Minimizing Cost with the Decision Management
TD(0) Leads to Better Policies than Approximate Value Iteration
TD(0) Leads to Better Policies than Approximate Value Iteration Benjamin Van Roy Management Science and Engineering and Electrical Engineering Stanford University Stanford, CA 94305 [email protected] Abstract
Analysis of gene expression data. Ulf Leser and Philippe Thomas
Analysis of gene expression data Ulf Leser and Philippe Thomas This Lecture Protein synthesis Microarray Idea Technologies Applications Problems Quality control Normalization Analysis next week! Ulf Leser:
Statistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
SAP FINUG Teknologiaseminaari
SAP FINUG Teknologiaseminaari SAP Advanced Analytics Joni Ahola, 09 September 2015 Human Centric Innovation On the Agenda Advanced Analytics Approach SAP Predictive Analytics Tools, Functions & Libraries
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
Predictive Analytics Techniques: What to Use For Your Big Data. March 26, 2014 Fern Halper, PhD
Predictive Analytics Techniques: What to Use For Your Big Data March 26, 2014 Fern Halper, PhD Presenter Proven Performance Since 1995 TDWI helps business and IT professionals gain insight about data warehousing,
Java Modules for Time Series Analysis
Java Modules for Time Series Analysis Agenda Clustering Non-normal distributions Multifactor modeling Implied ratings Time series prediction 1. Clustering + Cluster 1 Synthetic Clustering + Time series
Advanced Big Data Analytics with R and Hadoop
REVOLUTION ANALYTICS WHITE PAPER Advanced Big Data Analytics with R and Hadoop 'Big Data' Analytics as a Competitive Advantage Big Analytics delivers competitive advantage in two ways compared to the traditional
CONTENTS. List of Figures List of Tables. List of Abbreviations
List of Figures List of Tables Preface List of Abbreviations xiv xvi xviii xx 1 Introduction to Value at Risk (VaR) 1 1.1 Economics underlying VaR measurement 2 1.1.1 What is VaR? 4 1.1.2 Calculating VaR
