Follow
Zohar Karnin
Zohar Karnin
Verified email at amazon.com
Title
Cited by
Cited by
Year
Almost optimal exploration in multi-armed bandits
Z Karnin, T Koren, O Somekh
International Conference on Machine Learning, 1238-1246, 2013
3542013
Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in
ZS Karnin, A Shpilka
2008 23rd Annual IEEE Conference on Computational Complexity, 280-291, 2008
982008
Reducing dueling bandits to cardinal bandits
N Ailon, Z Karnin, T Joachims
International Conference on Machine Learning, 856-864, 2014
942014
Copeland dueling bandits
M Zoghi, ZS Karnin, S Whiteson, M De Rijke
Advances in neural information processing systems 28, 2015
762015
Distributed exploration in multi-armed bandits
E Hillel, ZS Karnin, T Koren, R Lempel, O Somekh
Advances in Neural Information Processing Systems 26, 2013
762013
Online principal components analysis
C Boutsidis, D Garber, Z Karnin, E Liberty
Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete …, 2014
752014
How many folders do you really need? classifying email into a handful of categories
M Grbovic, G Halawi, Z Karnin, Y Maarek
Proceedings of the 23rd ACM International Conference on Conference on …, 2014
692014
Optimal quantile approximation in streams
Z Karnin, K Lang, E Liberty
2016 ieee 57th annual symposium on foundations of computer science (focs), 71-78, 2016
652016
Elastic machine learning algorithms in amazon sagemaker
E Liberty, Z Karnin, B Xiang, L Rouesnel, B Coskun, R Nallapati, ...
Proceedings of the 2020 ACM SIGMOD International Conference on Management of …, 2020
592020
Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in
ZS Karnin, P Mukhopadhyay, A Shpilka, I Volkovich
SIAM Journal on Computing 42 (6), 2114-2131, 2013
582013
You've got mail, and here is what you could do with it! analyzing and predicting actions on email messages
D Di Castro, Z Karnin, L Lewin-Eytan, Y Maarek
Proceedings of the ninth acm international conference on web search and data …, 2016
532016
Optimal dynamic distributed MIS
K Censor-Hillel, E Haramaty, Z Karnin
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing …, 2016
472016
Reconstruction of generalized depth-3 arithmetic circuits with bounded top fan-in
ZS Karnin, A Shpilka
2009 24th Annual IEEE Conference on Computational Complexity, 274-285, 2009
472009
Threading machine generated email
N Ailon, ZS Karnin, E Liberty, Y Maarek
Proceedings of the sixth ACM international conference on Web search and data …, 2013
462013
Tabtransformer: Tabular data modeling using contextual embeddings
X Huang, A Khetan, M Cvitkovic, Z Karnin
arXiv preprint arXiv:2012.06678, 2020
422020
Multi-armed bandits: Competing with optimal sequences
ZS Karnin, O Anava
Advances in Neural Information Processing Systems 29, 2016
402016
Near-optimal entrywise sampling for data matrices
D Achlioptas, ZS Karnin, E Liberty
Advances in Neural Information Processing Systems 26, 2013
402013
Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in
ZS Karnin, A Shpilka
Combinatorica 31 (3), 333-364, 2011
382011
Amazon SageMaker Autopilot: a white box AutoML solution at scale
P Das, N Ivkin, T Bansal, L Rouesnel, P Gautier, Z Karnin, L Dirac, ...
Proceedings of the fourth international workshop on data management for end …, 2020
362020
An empirical process approach to the union bound: Practical algorithms for combinatorial and linear bandits
J Katz-Samuels, L Jain, KG Jamieson
Advances in Neural Information Processing Systems 33, 10371-10382, 2020
322020
The system can't perform the operation now. Try again later.
Articles 1–20