Jamie Morgenstern

According to our database1, Jamie Morgenstern authored at least 28 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
On the Compatibility of Privacy and Fairness.
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019

Network Formation under Random Attack and Probabilistic Spread.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Guarantees for Spectral Clustering with Fairness Constraints.
Proceedings of the 36th International Conference on Machine Learning, 2019

Fair k-Center Clustering for Data Summarization.
Proceedings of the 36th International Conference on Machine Learning, 2019

2018
The Price of Fair PCA: One Extra dimension.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

A Smoothed Analysis of the Greedy Algorithm for the Linear Contextual Bandit Problem.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Meritocratic Fairness for Infinite and Contextual Bandits.
Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, 2018

2017
Fairness Incentives for Myopic Agents.
Proceedings of the 2017 ACM Conference on Economics and Computation, 2017

Fairness in Reinforcement Learning.
Proceedings of the 34th International Conference on Machine Learning, 2017

2016
Strategic Network Formation with Attack and Immunization.
Proceedings of the Web and Internet Economics - 12th International Conference, 2016

Do prices coordinate markets?
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Simple Mechanisms for Agents with Complements.
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016

Fairness in Learning: Classic and Contextual Bandits.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Learning Simple Auctions.
Proceedings of the 29th Conference on Learning Theory, 2016

2015
Approximately Stable, School Optimal, and Student-Truthful Many-to-One Matchings (via Differential Privacy).
Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 2015

Private Pareto Optimal Exchange.
Proceedings of the Sixteenth ACM Conference on Economics and Computation, 2015

Simple Auctions with Simple Strategies.
Proceedings of the Sixteenth ACM Conference on Economics and Computation, 2015

Learning What's Going on: Reconstructing Preferences and Priorities from Opaque Transactions.
Proceedings of the Sixteenth ACM Conference on Economics and Computation, 2015

On the Pseudo-Dimension of Nearly Optimal Auctions.
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015

Privacy-Preserving Public Information for Sequential Games.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Impartial Peer Review.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Learning Valuation Distributions from Partial Observation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2013
Hierarchical community decomposition via oblivious routing techniques.
Proceedings of the Conference on Online Social Networks, 2013

How Bad Is Selfish Voting?
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
Additive Approximation for Near-Perfect Phylogeny Construction.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2012

On Maxsum Fair Cake Divisions.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
A Proof-Carrying File System with Revocable and Use-Once Certificates.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

2010
Security-typed programming within dependently typed programming.
Proceedings of the Proceeding of the 15th ACM SIGPLAN international conference on Functional programming, 2010


  Loading...