Nyalleng Moorosi

According to our database1, Nyalleng Moorosi authored at least 12 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Length of Stay prediction for Hospital Management using Domain Adaptation.
CoRR, 2023

2022
Fair Wrapping for Black-box Predictions.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Healthsheet: Development of a Transparency Artifact for Health Datasets.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

2021
Constructing a Visual Dataset to Study the Effects of Spatial Apartheid in South Africa.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

2020
Fairness Preferences, Actual and Hypothetical: A Study of Crowdworker Incentives.
CoRR, 2020

Characterising Bias in Compressed Models.
CoRR, 2020

Diversity and Inclusion Metrics in Subset Selection.
Proceedings of the AIES '20: AAAI/ACM Conference on AI, 2020

2018
Exploring data science for public good in South Africa: evaluating factors that lead to success.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

2017
Employment relations: a data driven analysis of job markets using online job boards and online professional networks.
Proceedings of the International Conference on Web Intelligence, 2017

A Critical and Systemic Consideration of Data for Sustainable Development in Africa.
Proceedings of the Information and Communication Technologies for Development, 2017

2016
Construction and evaluation of Bayesian networks with expert-defined latent variables.
Proceedings of the 19th International Conference on Information Fusion, 2016

2015
Privacy in mining crime data from social Media: A South African perspective.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015


  Loading...