Denoising Based Sequence-to-Sequence Pre-Training for Text Generation

This paper presents a new sequence-to-sequence (seq2seq) pre-training methodPoDA (Pre-training of Denoising Autoencoders), which learns representationssuitable for text generation tasks. Unlike... | Continue reading


@arxiv.org | 4 years ago

FPGA-accelerated ML inference as a service for particle physics computing

Large-scale particle physics experiments face challenging demands forhigh-throughput computing resources both now and in the future. Newheterogeneous computing paradigms on dedicated hardware... | Continue reading


@arxiv.org | 4 years ago

Semi-Supervised Adversarial Active Learning on Attributed Graphs

Active learning (AL) on attributed graphs has received increasing attentionwith the prevalence of graph-structured data. Although AL has been widelystudied for alleviating label sparsity issues... | Continue reading


@arxiv.org | 4 years ago

Affine equivalence for quadratic rotation symmetric Boolean functions

Let $f_n(x_0, x_1, \ldots, x_{n-1})$ denote the algebraic normal form(polynomial form) of a rotation symmetric (RS) Boolean function of degree $d$in $n \geq d$ variables and let $wt(f_n)$ denote... | Continue reading


@arxiv.org | 4 years ago

Compact Linear Collider (CLIC)

The Compact Linear Collider (CLIC) is a proposed TeV-scale high-luminosityelectron-positron collider. For an optimal exploitation of its physicspotential, CLIC is foreseen to be built and... | Continue reading


@arxiv.org | 4 years ago

Unveiling Elite Developers’ Activities in Open Source Projects

Open-source developers, particularly the elite developers, maintain a diverseportfolio of contributing activities. They do not only commit source code butalso spend a significant amount of... | Continue reading


@arxiv.org | 4 years ago

On the statistical mechanics of life: Schrödinger revisited

We study the statistical underpinnings of life. We question some commonassumptions about the thermodynamics of life and illustrate how, contrary towidespread belief, even in a closed system... | Continue reading


@arxiv.org | 4 years ago

Text Summarization with Pretrained Encoders

Bidirectional Encoder Representations from Transformers (BERT) represents thelatest incarnation of pretrained language models which have recently advanced awide range of natural language... | Continue reading


@arxiv.org | 4 years ago

Improving Neural Machine Translation with Pre-Trained Representation

Monolingual data has been demonstrated to be helpful in improving thetranslation quality of neural machine translation (NMT). The current methodsstay at the usage of word-level knowledge, such... | Continue reading


@arxiv.org | 4 years ago

There Is No Reliable Way to Detect Hacked Ballot-Marking Devices

Election system vendors are marketing ballot-marking devices (BMDs) as auniversal system, and some states are deploying them for all voters, not justthose who need a BMD to vote independently.... | Continue reading


@arxiv.org | 4 years ago

MoEL: Mixture of Empathetic Listeners

Previous research on empathetic dialogue systems has mostly focused ongenerating responses given certain emotions. However, being empathetic not onlyrequires the ability of generating emotional... | Continue reading


@arxiv.org | 4 years ago

Re-Route Package Pickup and Delivery Planning with Random Demands

Recently, a higher competition in logistics business introduces newchallenges to the vehicle routing problem (VRP). Re-route planning, also knownas dynamic VRP, is one of the important... | Continue reading


@arxiv.org | 4 years ago

Technical Report on Implementing Ranking-Based Semantics in ConArg

ConArg is a suite of tools that offers a wide series of applications fordealing with argumentation problems. In this work, we present the advances wemade in implementing a ranking-based... | Continue reading


@arxiv.org | 4 years ago

Reinforcement Learning is not a Causal problem

We use an analogy between non-isomorphic mathematical structures defined overthe same set and the algebras induced by associative and causal levels ofinformation in order to argue that... | Continue reading


@arxiv.org | 4 years ago

Latent Relation Language Models

In this paper, we propose Latent Relation Language Models (LRLMs), a class oflanguage models that parameterizes the joint distribution over the words in adocument and the entities that occur... | Continue reading


@arxiv.org | 4 years ago

Counting Immutable Beans: Reference Counting Optimized for Purely FP

Most functional languages rely on some garbage collection for automaticmemory management. They usually eschew reference counting in favor of a tracinggarbage collector, which has less... | Continue reading


@arxiv.org | 4 years ago

Araml: A Stable Adversarial Training Framework for Text Generation

Most of the existing generative adversarial networks (GAN) for textgeneration suffer from the instability of reinforcement learning trainingalgorithms such as policy gradient, leading to... | Continue reading


@arxiv.org | 4 years ago

CatE: Category-Name GuidedWord Embedding

Unsupervised word embedding has benefited a wide spectrum of NLP tasks due toits effectiveness of encoding word semantics in distributed wordrepresentations. However, unsupervised word embedding... | Continue reading


@arxiv.org | 4 years ago

Cbowra: A Representation Learning Approach for Medication Anomaly Detection

Electronic health record is an important source for clinical researches andapplications, and errors inevitably occur in the data, which could lead tosevere damages to both patients and hospital... | Continue reading


@arxiv.org | 4 years ago

Teacher-Student Framework Enhanced Multi-Domain Dialogue Generation

Dialogue systems dealing with multi-domain tasks are highly required. How torecord the state remains a key problem in a task-oriented dialogue system.Normally we use human-defined features as... | Continue reading


@arxiv.org | 4 years ago

A Path to DOT: Formalizing Fully Path-Dependent Types

The Dependent Object Types (DOT) calculus aims to formalize the Scalaprogramming language with a focus on path-dependent types $-$ types such as$x.a_1\dots a_n.T$ that depend on the runtime... | Continue reading


@arxiv.org | 4 years ago

Universal Adversarial Triggers for NLP

Adversarial examples highlight model vulnerabilities and are useful forevaluation and interpretation. We define universal adversarial triggers:input-agnostic sequences of tokens that trigger a... | Continue reading


@arxiv.org | 4 years ago

Reinforcement Learning for Real Life

We start with a brief introduction to reinforcement learning (RL), about itssuccessful stories, basics, an example, issues, the ICML 2019 Workshop on RLfor Real Life, how to use it, study... | Continue reading


@arxiv.org | 4 years ago

The Natural Selection of Words: Finding the Features of Fitness

We introduce a dataset for studying the evolution of words, constructed fromWordNet and the Google Books Ngram Corpus. The dataset tracks the evolution of4,000 synonym sets (synsets), containing... | Continue reading


@arxiv.org | 4 years ago

LogicENN: A Neural Based Knowledge Graphs Embedding Model with Logical Rules

Knowledge graph embedding models have gained significant attention in AIresearch. Recent works have shown that the inclusion of background knowledge,such as logical rules, can improve the... | Continue reading


@arxiv.org | 4 years ago

The Surprising Creativity of Digital Evolution

Biological evolution provides a creative fount of complex and subtleadaptations, often surprising the scientists who discover them. However,because evolution is an algorithmic process that... | Continue reading


@arxiv.org | 4 years ago

Transductive Auxiliary Task Self-Training for Neural Multi-Task Models

Multi-task learning and self-training are two common ways to improve amachine learning model's performance in settings with limited training data.Drawing heavily on ideas from those two... | Continue reading


@arxiv.org | 4 years ago

CFO: A Framework for Building Production NLP Systems

This paper introduces a novel orchestration framework, called CFO(COMPUTATION FLOW ORCHESTRATOR), for building, experimenting with, anddeploying interactive NLP (Natural Language Processing) and... | Continue reading


@arxiv.org | 4 years ago

Continuous Relaxation of Symbolic Planner for One-Shot Imitation Learning

We address one-shot imitation learning, where the goal is to execute apreviously unseen task based on a single demonstration. While there has beenexciting progress in this direction, most of the... | Continue reading


@arxiv.org | 4 years ago

Assessing the Safety and Reliability of Autonomous Vehicles from Road Testing

There is an urgent societal need to assess whether autonomous vehicles (AVs)are safe enough. From published quantitative safety and reliability assessmentsof AVs, we know that, given the goal of... | Continue reading


@arxiv.org | 4 years ago

The History of Digital Spam

Spam!: that's what Lorrie Faith Cranor and Brian LaMacchia exclaimed in thetitle of a popular call-to-action article that appeared twenty years ago onCommunications of the ACM. And yet, despite... | Continue reading


@arxiv.org | 4 years ago

Weight Friction for Neural Networks

In recent years, deep neural networks have found success in replicatinghuman-level cognitive skills, yet they suffer from several major obstacles. Onesignificant limitation is the inability to... | Continue reading


@arxiv.org | 4 years ago

Search Algorithms for Mastermind

his paper presents two novel approaches to solving the classic board gamemastermind, including a variant of simulated annealing (SA) and a technique weterm maximum expected reduction in... | Continue reading


@arxiv.org | 4 years ago

Variational Adversarial Active Learning

Active learning aims to develop label-efficient algorithms by sampling themost representative queries to be labeled by an oracle. We describe apool-based semi-supervised active learning... | Continue reading


@arxiv.org | 4 years ago

Language-Conditioned Graph Networks for Relational Reasoning

Solving grounded language tasks often requires reasoning about relationshipsbetween objects in the context of a given task. For example, to answer thequestion "What color is the mug on the... | Continue reading


@arxiv.org | 4 years ago

Abductive Commonsense Reasoning

Abductive reasoning is inference to the most plausible explanation. Forexample, if Jenny finds her house in a mess when she returns from work, andremembers that she left a window open, she can... | Continue reading


@arxiv.org | 4 years ago

Simple and Effective Noisy Channel Modeling for Neural Machine Translation

Previous work on neural noisy channel modeling relied on latent variablemodels that incrementally process the source and target sentence. This makesdecoding decisions based on partial source... | Continue reading


@arxiv.org | 4 years ago

Improving Multi-Word Entity Recognition for Biomedical Texts

Biomedical Named Entity Recognition (BioNER) is a crucial step for analyzingBiomedical texts, which aims at extracting biomedical named entities from agiven text. Different supervised machine... | Continue reading


@arxiv.org | 4 years ago

Towards Making the Most of Bert in Neural Machine Translation

GPT-2 and BERT demonstrate the effectiveness of using pre-trained languagemodels (LMs) on various natural language processing tasks. However, LMfine-tuning often suffers from catastrophic... | Continue reading


@arxiv.org | 4 years ago

The Regularization of Small Sub-Constraint Satisfaction Problems

This paper describes a new approach on optimization of constraintsatisfaction problems (CSPs) by means of substituting sub-CSPs with locallyconsistent regular membership constraints. The purpose... | Continue reading


@arxiv.org | 4 years ago

Pushing the Limits of Low-Resource Morphological Inflection

Recent years have seen exceptional strides in the task of automaticmorphological inflection generation. However, for a long tail of languages thenecessary resources are hard to come by, and... | Continue reading


@arxiv.org | 4 years ago

SFSegNet: Parse Freehand Sketches Using Deep Fully Convolutional Networks

Parsing sketches via semantic segmentation is attractive but challenging,because (i) free-hand drawings are abstract with large variances in depictingobjects due to different drawing styles and... | Continue reading


@arxiv.org | 4 years ago

Dual Adversarial Inference for Text-to-Image Synthesis

Synthesizing images from a given text description involves engaging two typesof information: the content, which includes information explicitly described inthe text (e.g., color, composition,... | Continue reading


@arxiv.org | 4 years ago

Conv-MCD: A Plug-and-Play Multi-Task Module for Medical Image Segmentation

For the task of medical image segmentation, fully convolutional network (FCN)based architectures have been extensively used with various modifications. Arising trend in these architectures is to... | Continue reading


@arxiv.org | 4 years ago

3D Human Pose Estimation Under Limited Supervision Using Metric Learning

Estimating 3D human pose from monocular images demands large amounts of 3Dpose and in-the-wild 2D pose annotated datasets which are costly and requiresophisticated systems to acquire. In this... | Continue reading


@arxiv.org | 4 years ago

Demystifying Differentiable Programming: Shift/Reset, Penultimate Backpropagator

Deep learning has seen tremendous success over the past decade in computervision, machine translation, and gameplay. This success rests in crucial wayson gradient-descent optimization and the... | Continue reading


@arxiv.org | 4 years ago

Straggling for Covert Message Passing on Complete Graphs

We introduce a model for mobile, multi-agent information transfer thatincreases the communication covertness through a protocol which also increasesthe information transfer delay. Covertness is... | Continue reading


@arxiv.org | 4 years ago

Large-Scale-Exploit of GitHub Repository Metadata and Preventive Measures

When working with Git, a popular version-control system, email addresses arepart of the metadata for each individual commit. When those commits are pushedto remote hosting services like GitHub,... | Continue reading


@arxiv.org | 4 years ago