个人资料封面照片
您正在关注
关注用户错误。
该用户不允许他人关注他们。
您已经关注了这个用户。
您的会员计划仅允许0个关注。升级在此。
成功取消关注
取消关注用户错误
您已成功推荐
推荐用户错误。
出问题了,请刷新页面并重新尝试。
电子邮箱已成功验证。
用户头像
$15 USD / 小时
INDIA的国旗
delhi, india
$15 USD / 小时
目前这里是10:00 上午
七月 30, 2010已加入
0 推荐

Ajay B.

@asbidyrthy

0.0 (0条评论)
0.0
0.0
0%
0%
$15 USD / 小时
INDIA的国旗
delhi, india
$15 USD / 小时
不适用
工作已完成
不适用
在预算内
不适用
按时
不适用
重复雇用率

Data Scientist; Statistician; Programmer; Analyst

Living in the crossroads of technology and education, he enjoy working with founders, data scientists, statisticians, designers and developers who build their dreams with passion, stamina and fury. He had completed his [login to view URL]. in Mathematics and Computing from IIT Guwahati. He is instrumental in driving analytics & research for businesses and shaping decision support framework. He has been instrumental in implementing decision support frameworks for 20+ leading firms worldwide. He has gained expertise over the course of few years in Optimization, Operations Research, Statistical Modeling, Big Data Analytics, Machine Learning, and Approximation Algorithms. Specialties: His area of specialization lies in Machine Learning, Mathematical Optimization, Operations Research, Approximation Algorithms, Statistical Data Analysis, Predictive Modeling, Network Security and Computational Finance.

联系Ajay B.询问您的工作详情

登录并通过聊天讨论所有细节。

评论

变更已保存
这里没有评论!

经验

Data Scientist

India
5月 2013 - 7月 2015 (2 年, 2 个月)
Worked on various projects range from statistical modeling, data analytics, machine learning, optimization and operations research.

教育

B.Tech

Indian Institute of Technology, Guwahati, India 2009 - 2013
(4 年)

出版物

A toolbox for fast and approximate solutions for large linear and semidefinite programs

ACM
The multiplicative weights update is an algorithmic design technique that, over the years, has been discovered independently by several groups of researchers in different contexts. The earliest known use of this technique is by Brown and vonNeumann for the computation of equilibrium strategies in zero-sum games. These ideas and variants thereof have found applications in solving games, linear and semidefinite programming, computational geometry, machine learning, auctions and mechanism design.

A behavior based model for detecting data exfiltration in network environment

IEEE IMSAA-11
There is a growing concern across the globe about exfiltration of sensitive data over network. This coupled with the increase in other insider threats pose greater challenge. Present day perimeter security solutions such as Intrusion detection & prevention system, firewall are not capable of detecting data-exfiltration. Also existing behavior models that can detect intrusions and worms do not incorporate mechanims to detect data-exfiltration.

Fast approximations to solve packing/covering LPs and constant-sum games via multiplicative-weights

International Symposium on Combinatorial Optimization - CO 2012, Sept. 12 - University of Oxford, UK
Abstract: The multiplicative weights algorithm is a well-known technique for approximately solving packing/covering linear programs. The technique originated in the 1940s in the context of solving constant-sum games. There has been considerable recent research building on this work, developing fast and approximate solutions to packing/covering linear as well as semi-denite programs.

联系Ajay B.询问您的工作详情

登录并通过聊天讨论所有细节。

认证

优选威客
身份已验证
支付已验证
电话已验证
邮箱已验证
Facebook已关联
之前的用户 下一个用户
邀请已发送成功!
谢谢!我们已通过电子邮件向您发送了索取免费积分的链接。
发送电子邮件时出现问题。请再试一次。
已注册用户 发布工作总数
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
加载预览
授予地理位置权限。
您的登录会话已过期而且您已经登出,请再次登录。