SlideShare a Scribd company logo
1 of 22
Download to read offline
Weiwei Cheng & Eyke Hüllermeier
Knowledge Engineering & Bioinformatics Lab
Department of Mathematics and Computer Science
University of Marburg, Germany
Label Ranking (an example)
Learning customers’ preferences on cars:

                                 label ranking  
       customer 1           MINI      Toyota    BMW 
       customer 2           BMW      MINI      Toyota
       customer 3           BMW      Toyota      MINI
       customer 4           Toyota      MINI      BMW
       new customer                   ???

   where the customers are typically described by feature 
   vectors, e.g., (gender, age, place of birth, has child, …)
                                                                1/16
Label Ranking (an example)
Learning customers’ preferences on cars:

                        MINI       Toyota      BMW
       customer 1         1          2           3
       customer 2         2          3           1
       customer 3         3          2           1
       customer 4         2           1          3
       new customer       ?           ?          ?


        π(i) = position of the i‐th label in the ranking
             1: MINI        2: Toyota       3: BMW
                                                           2/16
Label Ranking (more formally)
Given:
  a set of training instances 
  a set of labels
  for each training instance     : a set of pairwise preferences
  of the form

Find:
  a ranking function (            mapping) that maps each           
  to a ranking      of L (permutation     )


                                                                   3/16
Model‐Based Approaches
… essentially reduce label ranking to classification:

  Ranking by pairwise comparison (RPC)
  Fürnkranz and Hüllermeier,  ECML‐03



  Constraint classification (CC)
  Har‐Peled , Roth and Zimak,  NIPS‐03



  Log linear models for label ranking (LL)
  Dekel, Manning and Singer,  NIPS‐03
                                                        4/16
Instance‐Based Approach (this work)
 Lazy learning: Instead of eagerly inducing a model 
 from the data, simply store the observations.

 Target functions are estimated on demand in a local 
 way, no need to define the       mapping explicitly.

 Core part is the aggregation of preference (order) 
 information from neighbored examples.

                                                        5/16
Related Work
Case‐based Label Ranking (Brinker and Hüllermeier, ECML‐06)

Aggregation of complete rankings is done by
    median ranking
    Borda count


Our aggregation method is based on a probabilistic model 
and can handle both complete and incomplete rankings.


                                                              6/16
Instance‐Based Prediction
Basic assumption: Distribution of output is (approximately) 
constant in the neighborhood of the query; consider outputs 
of neighbors as an i.i.d. sample. 

Conventional classification: 
  discrete distribution on class labels
  estimate probabilities by relative class frequencies
  class prediction by majority vote 



                                                           7/16
Probabilistic Model for Ranking 
Mallows model (Mallows, Biometrika, 1957)


with 
center ranking
spread parameter
and        is a right invariant metric on permutations




                                                         8/16
Inference (full rankings)
We have observed        from the neighbors.

                             ML




                                              monotone in θ
Inference (incomplete ranking)
“marginal” distibution

where       denotes all consistent extensions of    .

Example for label set {a,b,c}:
              Observation σ        Extensions E(σ)
                                      a      b   c
                  a   b               a c        b
                                      c      a   b



                                                        10/16
Inference (incomplete ranking)  cont.
The corresponding likelihood:




ML estimation                                         becomes more difficult.

                                                                          11/16
Inference
Not only the estimated ranking     is of interest …

… but also the spread parameter    , which is a measure of 
precision and, therefore, reflects the confidence/reliability of 
the prediction (just like the variance of an estimated mean). 

The bigger   , the more peaked the distribution around the 
center ranking.



                                                               12/16
Experimental Setting
Data sets
  Name        #instances   #features    #labels
  Iris1           150         4            3
  Wine1           178         13           3
  Glass1          214         9           6
  Vehicle1       846          18          4
  Dtt2           2465         24          4
  Cold2          2465         24          4

 1 UCI data sets. 
 2 Phylogenetic profiles and DNA microarray expression data.

                                                               13/16
Accuracy (Kendall tau)
A typical run:
        Kendall tau




                            missing rate of labels
Main observation:  Our approach is quite competitive with the state‐of‐the‐art  
model based approaches. 
                                                                                   14/16
Accuracy‐Rejection Curve
θ as a measure of the reliability of a prediction




                          ratio of the data that predicted

Main observation:  Decreasing curve confirms that θ is a reasonable measure of 
confidence.
                                                                              15/16
Take‐away Messages
  An instance‐based label ranking approach using a 
  probabilistic model.
  Suitable for complete and incomplete rankings.
  Comes with a natural measure of the reliability of a 
  prediction.

o More efficient inference for the incomplete case. 
o Generalization: distance‐weighted prediction.
o Dealing with variants of the label ranking problem, such as 
  calibrated label ranking and multi‐label classification.

                                                             16/16
Median rank
                     MINI     Toyota      BMW
      ranking 1       1         3          2
      ranking 2       2         3          1
      ranking 3       3         2          1
      median rank     2         3          1



  ‐ tends to optimize Spearman footrule
Borda count
        ranking 1           MINI      Toyota      BMW 
        ranking 2           BMW      MINI      Toyota
        ranking 3           BMW      Toyota      MINI
        Borda count        BMW: 4  MINI: 3  Toyota:2



‐ tends to optimize Spearman rank correlation
21
22

More Related Content

What's hot

Database normalization
Database normalizationDatabase normalization
Database normalizationJignesh Jain
 
Normalization in Database
Normalization in DatabaseNormalization in Database
Normalization in DatabaseRoshni Singh
 
Normalization in a Database
Normalization in a DatabaseNormalization in a Database
Normalization in a DatabaseBishrul Haq
 
Database Concept - Normalization (1NF, 2NF, 3NF)
Database Concept - Normalization (1NF, 2NF, 3NF)Database Concept - Normalization (1NF, 2NF, 3NF)
Database Concept - Normalization (1NF, 2NF, 3NF)Oum Saokosal
 
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NFNormalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NFBiplap Bhattarai
 
Database normalization
Database normalizationDatabase normalization
Database normalizationEdward Blurock
 
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of e...
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of e...Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of e...
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of e...FACE
 
Database Normalisation
Database NormalisationDatabase Normalisation
Database NormalisationAmin Omi
 
Infections as Abstract Symbolic Finite Automata: Formal Model and Applications
Infections as Abstract Symbolic Finite Automata: Formal Model and ApplicationsInfections as Abstract Symbolic Finite Automata: Formal Model and Applications
Infections as Abstract Symbolic Finite Automata: Formal Model and ApplicationsFACE
 
Relational database
Relational  databaseRelational  database
Relational databaseamkrisha
 
Unveiling Metamorphism by Abstract Interpretation of Code Properties
Unveiling Metamorphism by Abstract Interpretation of Code PropertiesUnveiling Metamorphism by Abstract Interpretation of Code Properties
Unveiling Metamorphism by Abstract Interpretation of Code PropertiesFACE
 

What's hot (18)

Database normalization
Database normalizationDatabase normalization
Database normalization
 
Normalization in Database
Normalization in DatabaseNormalization in Database
Normalization in Database
 
Normalization
NormalizationNormalization
Normalization
 
Normalization in a Database
Normalization in a DatabaseNormalization in a Database
Normalization in a Database
 
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Normalization in DBMS
 
Database Concept - Normalization (1NF, 2NF, 3NF)
Database Concept - Normalization (1NF, 2NF, 3NF)Database Concept - Normalization (1NF, 2NF, 3NF)
Database Concept - Normalization (1NF, 2NF, 3NF)
 
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NFNormalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
 
Database normalization
Database normalizationDatabase normalization
Database normalization
 
Database normalization
Database normalizationDatabase normalization
Database normalization
 
Normalization
NormalizationNormalization
Normalization
 
Normalization in databases
Normalization in databasesNormalization in databases
Normalization in databases
 
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of e...
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of e...Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of e...
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of e...
 
Computer Scinece:RDBMS :Normalisation
Computer Scinece:RDBMS :NormalisationComputer Scinece:RDBMS :Normalisation
Computer Scinece:RDBMS :Normalisation
 
Database Normalisation
Database NormalisationDatabase Normalisation
Database Normalisation
 
Infections as Abstract Symbolic Finite Automata: Formal Model and Applications
Infections as Abstract Symbolic Finite Automata: Formal Model and ApplicationsInfections as Abstract Symbolic Finite Automata: Formal Model and Applications
Infections as Abstract Symbolic Finite Automata: Formal Model and Applications
 
Crf
CrfCrf
Crf
 
Relational database
Relational  databaseRelational  database
Relational database
 
Unveiling Metamorphism by Abstract Interpretation of Code Properties
Unveiling Metamorphism by Abstract Interpretation of Code PropertiesUnveiling Metamorphism by Abstract Interpretation of Code Properties
Unveiling Metamorphism by Abstract Interpretation of Code Properties
 

Similar to A new instance-based label ranking approach using the Mallows model

A Simple Instance-Based Approach to Multilabel Classi cation Using the Mallow...
A Simple Instance-Based Approach to Multilabel Classication Using the Mallow...A Simple Instance-Based Approach to Multilabel Classication Using the Mallow...
A Simple Instance-Based Approach to Multilabel Classi cation Using the Mallow...roywwcheng
 
0 Model Interpretation setting.pdf
0 Model Interpretation setting.pdf0 Model Interpretation setting.pdf
0 Model Interpretation setting.pdfLeonardo Auslender
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016Hagai Aronowitz
 
Everything about Special Discrete Distributions
Everything about Special Discrete DistributionsEverything about Special Discrete Distributions
Everything about Special Discrete DistributionsSoftsasi
 
Query Linguistic Intent Detection
Query Linguistic Intent DetectionQuery Linguistic Intent Detection
Query Linguistic Intent Detectionbutest
 
VSSML17 Review. Summary Day 1 Sessions
VSSML17 Review. Summary Day 1 SessionsVSSML17 Review. Summary Day 1 Sessions
VSSML17 Review. Summary Day 1 SessionsBigML, Inc
 
Dimensionality reduction
Dimensionality reductionDimensionality reduction
Dimensionality reductionShatakirti Er
 
Arabic Handwritten Script Recognition Towards Generalization: A Survey
Arabic Handwritten Script Recognition Towards Generalization: A Survey Arabic Handwritten Script Recognition Towards Generalization: A Survey
Arabic Handwritten Script Recognition Towards Generalization: A Survey Randa Elanwar
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality ReductionSaad Elbeleidy
 
Algoritma Random Forest beserta aplikasi nya
Algoritma Random Forest beserta aplikasi nyaAlgoritma Random Forest beserta aplikasi nya
Algoritma Random Forest beserta aplikasi nyabatubao
 
07 dimensionality reduction
07 dimensionality reduction07 dimensionality reduction
07 dimensionality reductionMarco Quartulli
 
13 random forest
13 random forest13 random forest
13 random forestVishal Dutt
 
acmsigtalkshare-121023190142-phpapp01.pptx
acmsigtalkshare-121023190142-phpapp01.pptxacmsigtalkshare-121023190142-phpapp01.pptx
acmsigtalkshare-121023190142-phpapp01.pptxdongchangim30
 
Coreference Resolution
Coreference ResolutionCoreference Resolution
Coreference Resolutionwushumin
 

Similar to A new instance-based label ranking approach using the Mallows model (14)

A Simple Instance-Based Approach to Multilabel Classi cation Using the Mallow...
A Simple Instance-Based Approach to Multilabel Classication Using the Mallow...A Simple Instance-Based Approach to Multilabel Classication Using the Mallow...
A Simple Instance-Based Approach to Multilabel Classi cation Using the Mallow...
 
0 Model Interpretation setting.pdf
0 Model Interpretation setting.pdf0 Model Interpretation setting.pdf
0 Model Interpretation setting.pdf
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016
 
Everything about Special Discrete Distributions
Everything about Special Discrete DistributionsEverything about Special Discrete Distributions
Everything about Special Discrete Distributions
 
Query Linguistic Intent Detection
Query Linguistic Intent DetectionQuery Linguistic Intent Detection
Query Linguistic Intent Detection
 
VSSML17 Review. Summary Day 1 Sessions
VSSML17 Review. Summary Day 1 SessionsVSSML17 Review. Summary Day 1 Sessions
VSSML17 Review. Summary Day 1 Sessions
 
Dimensionality reduction
Dimensionality reductionDimensionality reduction
Dimensionality reduction
 
Arabic Handwritten Script Recognition Towards Generalization: A Survey
Arabic Handwritten Script Recognition Towards Generalization: A Survey Arabic Handwritten Script Recognition Towards Generalization: A Survey
Arabic Handwritten Script Recognition Towards Generalization: A Survey
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reduction
 
Algoritma Random Forest beserta aplikasi nya
Algoritma Random Forest beserta aplikasi nyaAlgoritma Random Forest beserta aplikasi nya
Algoritma Random Forest beserta aplikasi nya
 
07 dimensionality reduction
07 dimensionality reduction07 dimensionality reduction
07 dimensionality reduction
 
13 random forest
13 random forest13 random forest
13 random forest
 
acmsigtalkshare-121023190142-phpapp01.pptx
acmsigtalkshare-121023190142-phpapp01.pptxacmsigtalkshare-121023190142-phpapp01.pptx
acmsigtalkshare-121023190142-phpapp01.pptx
 
Coreference Resolution
Coreference ResolutionCoreference Resolution
Coreference Resolution
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

A new instance-based label ranking approach using the Mallows model