En poursuivant votre navigation sur ce site, vous acceptez l'utilisation d'un simple cookie d'identification. Aucune autre exploitation n'est faite de ce cookie. OK

Documents Petit, Jean 97 results

Filter
Select: All / None
Q
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Multi-armed bandits and beyond - Agrawal, Shipra (Author of the conference) | CIRM H

Multi angle

In this tutorial I will discuss recent advances in theory of multi-armed bandits and reinforcement learning, in particular the upper confidence bound (UCB) and Thompson Sampling (TS) techniques for algorithm design and analysis.

60J20 ; 68Q32 ; 68T05

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Optimization for machine learning - Bach, Francis (Author of the conference) | CIRM H

Multi angle

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Privacy in machine learning - Cummings, Rachel (Author of the conference) | CIRM H

Multi angle

Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can cause valuable data to go unused. How can data scientists make use of potentially sensitive data, while providing rigorous privacy guarantees to the individuals who provided data? A growing literature on differential privacy has emerged in the last decade to address some of these concerns. Differential privacy is a parameterized notion of database privacy that gives a mathematically rigorous worst-case bound on the maximum amount of information that can be learned about any one individual's data from the output of a computation. Differential privacy ensures that if a single entry in the database were to be changed, then the algorithm would still have approximately the same distribution over outputs. In this talk, we will see the definition and properties of differential privacy; survey a theoretical toolbox of differentially private algorithms that come with a strong accuracy guarantee; and discuss recent applications of differential privacy in major technology companies and government organizations.[-]
Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can cause valuable data to go unused. How can data scientists make use of potentially sensitive data, while providing rigorous privacy guarantees to the individuals who provided data? A growing literature on differential privacy has ...[+]

68W40 ; 68-02 ; 62-02 ; 90-02

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Machine learning on graphs - Vandergheynst, Pierre (Author of the conference) | CIRM H

Multi angle

There are a plethora of interesting applications that can leverage graph structured data, from drug discovery to route planning, and it is only natural that graph Machine Learning has attracted a lot of attention lately. We will review approaches in graph representation learning, leveraging intuition from graph signal processing to design and study graph neural networks and some of their recent extensions.

05C90 ; 05C50 ; 68T99

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Machine learning in natural language processing - Yvon, François (Author of the conference) | CIRM H

Multi angle

This talk is a short introduction to the automatic processing of utterances in natural language, presenting the various challenges that need to be addressed to handle the difficulties of human languages.

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y
In the two lectures an introduction to PDE-constrained optimization is given. Exemplary, the techniques are described for linear elliptic and parabolic equations. First-order optimality conditions are derived. Then, these techniques are extended to more difficult problems including inequality constraints and nonlinearities. Furthermore, second-order methods for optimization are explained.

49J20 ; 49K20 ; 49M41 ; 90Cxx

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y
This presentation will be kept at a basic level, both continuous and algebraic versions of the methods will be given in their most common variants and the main ingredients of domain decomposition methods will be presented. The content will follow the lines of the chapters 1 and 3 from the domain decomposition book. A short introduction to Freefem software will be given which will allow the students to use quickly the codes illustrating the methods.
Outcomes: At the end of this first lecture, students will have a basic understanding of the methods but also of their implementation.[-]
This presentation will be kept at a basic level, both continuous and algebraic versions of the methods will be given in their most common variants and the main ingredients of domain decomposition methods will be presented. The content will follow the lines of the chapters 1 and 3 from the domain decomposition book. A short introduction to Freefem software will be given which will allow the students to use quickly the codes illustrating the ...[+]

65N55

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y
We study an optimal reinsurance problem under the criterion of maximizing the expected utility of terminal wealth when the loss process exhibits jump clustering features and the insurance company has restricted information about the claims arrival intensity. By solving the associated filtering problem we reduce the original problem to a stochastic control problem under full information. Since the classical Hamilton-Jacobi-Bellman approach does not apply, due to the infinite dimensionality of the filter, we choose an alternative approach based on Backward Stochastic Differential Equations (BSDEs). Precisely, we characterize the value process and the optimal reinsurance strategy in terms of a BSDE driven by a marked point process. The talk is based on a joint work with M. Brachetta, G. Callegaro and C. Sgarra (arXiv:2207.05489, 2022).[-]
We study an optimal reinsurance problem under the criterion of maximizing the expected utility of terminal wealth when the loss process exhibits jump clustering features and the insurance company has restricted information about the claims arrival intensity. By solving the associated filtering problem we reduce the original problem to a stochastic control problem under full information. Since the classical Hamilton-Jacobi-Bellman approach does ...[+]

60G55 ; 60J60 ; 91G05 ; 91G10 ; 93E20

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Odd fluids - Fanelli, Francesco (Author of the conference) | CIRM H

Multi angle

In many physical fluid systems, the constituent particles present a parity-breaking intrinsic angular momentum: this is the case, for instance, of quantum fluids and super-fluids, polyatomic gases, chiral active matter and vortex dynamics. In such situations, only the skew-symmetric component of the total viscous stress tensor, often dubbed odd viscosity, is non-zero, implying that the viscosity becomes non-dissipative.
At the level of the mathematical model, the odd viscosity term is responsible for a loss of regularity, as it involves higher order space derivatives of the velocity field and, in the case of non-homogeneous fluids, of the density.
In this talk we consider the dynamics of non-homogeneous incompressible fluids having odd viscosity and we set up a well-posedness theory in Sobolev spaces for the related system of equations. The proof is based on the introduction of a set of suitable 'good unknowns' for the system, which allow to put in evidence an underlying hyperbolic structure and to circumvent, in this way, the loss of derivatives created by the odd viscosity term.
The talk is based on a joint work with Rafael Granero-Belinchón (Universidad de Cantabria) and Stefano Scrobogna (Università degli Studi di Trieste).[-]
In many physical fluid systems, the constituent particles present a parity-breaking intrinsic angular momentum: this is the case, for instance, of quantum fluids and super-fluids, polyatomic gases, chiral active matter and vortex dynamics. In such situations, only the skew-symmetric component of the total viscous stress tensor, often dubbed odd viscosity, is non-zero, implying that the viscosity becomes non-dissipative.
At the level of the ...[+]

35Q35 ; 76B03 ; 35B45 ; 76D09

Bookmarks Report an error