Christopher Meek

ORCID: 0000-0003-1696-6152
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Bayesian Modeling and Causal Inference
  • Topic Modeling
  • Data Management and Algorithms
  • Machine Learning and Algorithms
  • Natural Language Processing Techniques
  • Bayesian Methods and Mixture Models
  • AI-based Problem Solving and Planning
  • Statistical Methods and Bayesian Inference
  • Data Quality and Management
  • Recommender Systems and Techniques
  • Machine Learning and Data Classification
  • Data Stream Mining Techniques
  • Data Visualization and Analytics
  • Text and Document Classification Technologies
  • Data Mining Algorithms and Applications
  • Time Series Analysis and Forecasting
  • Multi-Criteria Decision Making
  • Mobile Crowdsensing and Crowdsourcing
  • Web Data Mining and Analysis
  • Algorithms and Data Compression
  • Multimodal Machine Learning Applications
  • Anomaly Detection Techniques and Applications
  • Statistical Methods and Inference
  • Advanced Text Analysis Techniques
  • Software Engineering Research

Microsoft (United States)
2012-2022

Microsoft Research (United Kingdom)
1997-2021

Carnegie Mellon University
1994-2013

Technion – Israel Institute of Technology
2006-2010

Israel Institute
2009-2010

Microsoft (Israel)
2009

University of California, Berkeley
2006

University of California, Riverside
2004

Microsoft (Finland)
1998

Many classification tasks, such as spam filtering, intrusion detection, and terrorism are complicated by an adversary who wishes to avoid detection. Previous work on adversarial has made the unrealistic assumption that attacker perfect knowledge of classifier [2]. In this paper, we introduce reverse engineering (ACRE) learning problem, task sufficient information about a construct attacks. We present efficient algorithms for linear classifiers with either continuous or Boolean features...

10.1145/1081870.1081950 article EN 2005-08-21

In this paper, we provide new complexity results for algorithms that learn discrete-variable Bayesian networks from data. Our apply whenever the learning algorithm uses a scoring criterion favors simplest structure which model is able to represent generative distribution exactly. therefore hold consistent and applied sufficiently large dataset. We show identifying high-scoring structures NP-hard, even when any combination of one or more following hold: perfect with respect some DAG...

10.5555/1005332.1044703 article EN Journal of Machine Learning Research 2004-12-01

We develop a semantic parsing framework based on similarity for open domain question answering (QA).We focus single-relation questions and decompose each into an entity mention relation pattern.Using convolutional neural network models, we measure the of mentions with entities in knowledge base (KB) patterns relations KB.We score relational triples KB using these measures select top scoring triple to answer question.When evaluated open-domain QA task, our method achieves higher precision...

10.3115/v1/p14-2105 article EN cc-by 2014-01-01

While relation extraction has traditionally been viewed as a task relying solely on textual data, recent work shown that by taking input existing facts in the form of entity-relation triples from both knowledge bases and performance can be improved significantly. Following this new paradigm, we propose tensor decomposition approach for base embedding is highly scalable, especially suitable extraction. By leveraging relational domain about entity type information, our learning algorithm...

10.3115/v1/d14-1165 article EN 2014-01-01

We present a new methodology for visualizing navigation patterns on Web site. In our approach, we rst partition site users into clusters such that only with similar paths through the are placed same cluster. Then, each cluster, display these within The clustering approach employ is model based (as opposed to distance based) and partitions according order in which they request pages. particular, cluster by learning mixture of rst-order Markov models using ExpectationMaximization algorithm....

10.1145/347090.347151 article EN 2000-08-01

We present several methods for mining knowledge from the query logs of MSN search engine. Using logs, we build a time series each word or phrase (e.g., 'Thanksgiving' 'Christmas gifts') where elements are number times that is issued on day. All describe use sequences this form and can be applied to data generally. Our primary goal discovery semantically similar queries do so by identifying with demand patterns. Utilizing best Fourier coefficients energy omitted components, improve upon...

10.1145/1007568.1007586 article EN 2004-06-13

10.1023/a:1024992613384 article EN Data Mining and Knowledge Discovery 2003-01-01

The statistical community has brought logical rigor and mathematical precision to the problem of using data make inferences about a model's parameter values. TETRAD project, related work in computer science statistics, aims apply those standards background knowledge specification. We begin by drawing analogy between estimation model specification search. then describe how structural equation entails familiar constraints on covariance matrix for all admissible values its parameters; we survey...

10.1207/s15327906mbr3301_3 article EN Multivariate Behavioral Research 1998-01-01

We formulate necessary and sufficient conditions for an arbitrary discrete probability distribution to factor according undirected graphical model, or a log-linear other more general exponential models. For decomposable models these are equivalent set of conditional independence statements similar the Hammersley–Clifford theorem; however, we show that nondecomposable they not. also can have nonrational maximum likelihood estimates. These results used give several novel characterizations

10.1214/009053606000000263 article EN The Annals of Statistics 2006-06-01

Content-based recommendation systems can provide recommendations for "cold-start" items which little or no training data is available, but typically have lower accuracy than collaborative filtering systems. Conversely, techniques often accurate recommendations, fail on cold start items. Hybrid schemes attempt to combine these different kinds of information yield better across the board.

10.1145/1639714.1639735 article EN 2009-10-23

This is the Proceedings of Nineteenth Conference on Uncertainty in Artificial Intelligence, which was held Acapulco, Mexico, August 7-10 2003

10.48550/arxiv.1301.4606 preprint EN other-oa arXiv (Cornell University) 2013-01-01

Learning to capture text-table alignment is essential for tasks like text-to-SQL. A model needs correctly recognize natural language references columns and values ground them in the given database schema. In this paper, we present a novel weakly supervised Structure-Grounded pretraining framework (StruG) text-to-SQL that can effectively learn based on parallel corpus. We identify set of prediction tasks: column grounding, value grounding column-value mapping, leverage pretrain encoder....

10.18653/v1/2021.naacl-main.105 article EN cc-by Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies 2021-01-01

Modern systems can augment people's capabilities by using machine-learned models to surface intelligent behaviors. Unfortunately, building these remains challenging and beyond the reach of non-machine learning experts. We describe interactive machine teaching (IMT) its potential simplify creation models. One key characteristics IMT is iterative process in which human-in-the-loop takes role a teacher how perform task. explore alternative theories as theoretical foundations for IMT, intrinsic...

10.1080/07370024.2020.1734931 article EN Human-Computer Interaction 2020-04-30

We consider the dispute between causal decision theorists and evidential over Newcomb-like problems. introduce a framework relating causation directed graphs developed by Spirtes et al. (1993) evaluate several arguments in this context. argue that much of debate two camps is misplaced; disputes turn on distinction conditioning an event E as against I which action to bring about E. give essential machinery for calculating effect intervention recent work extends basic account given here case...

10.1093/bjps/45.4.1001 article EN The British Journal for the Philosophy of Science 1994-12-01

Soft keyboards offer touch-capable mobile and tabletop devices many advantages such as multiple language support room for larger displays. On the other hand, because soft lack haptic feedback, users often produce more typing errors. In order to make robust noisy input, researchers have developed key-target resizing algorithms, where underlying target areas keys are dynamically resized based on their probabilities. this paper, we describe how overly aggressive can sometimes prevent from...

10.1145/1719970.1719986 article EN 2010-02-07

The current processes for building machine learning systems require practitioners with deep knowledge of learning. This significantly limits the number that can be created and has led to a mismatch between demand ability organizations build them. We believe in order meet this growing we must increase individuals teach machines. postulate achieve goal by making process teaching machines easy, fast above all, universally accessible. While focuses on creating new algorithms improving accuracy...

10.48550/arxiv.1707.06742 preprint EN other-oa arXiv (Cornell University) 2017-01-01
Coming Soon ...