What can you do with a rock? Affordance extraction via word embeddings

Autonomous agents must often detect affordances: the set of behaviors enabled by a situation. Affordance detection is particularly helpful in domains with large action spaces, allowing the agent to prune its search space by avoiding futile behaviors. This paper presents a method for affordance extraction via word embeddings trained on a Wikipedia corpus. The resulting word vectors are treated as a common knowledge database which can be queried using linear algebra. We apply this method to a reinforcement learning agent in a text-only environment and show that affordance-based action selection improves performance most of the time. Our method increases the computational complexity of each learning step but significantly reduces the total number of steps needed. In addition, the agent’s action selections begin to resemble those a human would choose.


The cognitive roots of regularization in language

Regularization occurs when the output a learner produces is less variable than the linguistic data they observed. In an artificial language learning experiment, we show that there exist at least two independent sources of regularization bias in cognition: a domain-general source based on cognitive load and a domain-specific source triggered by linguistic stimuli. Both of these factors modulate how frequency information is encoded and produced, but only the production-side modulations result in regularization (i.e. cause learners to eliminate variation from the observed input). We formalize the definition of regularization as the reduction of entropy and find that entropy measures are better at identifying regularization behavior than frequency-based analyses. We also use a model of cultural transmission to extrapolate from our experimental data in order to predict the amount of regularization which would develop in each experimental condition if the artificial language was transmitted over several generations of learners. Here we find an interaction between cognitive load and linguistic domain, suggesting that the effect of cognitive constraints can become more complex when put into the context of cultural evolution: although learning biases certainly carry information about the course of language evolution, we should not expect a one-to-one correspondence between the micro-level processes that regularize linguistic datasets and the macro-level evolution of linguistic regularity.


On-line Learning with Abstention

We introduce and analyze an on-line learning setting where the learner has the added option of abstaining from making a prediction at the price of a fixed cost. When the learner abstains, no feedback is provided, and she does not receive the label associated with the example. We design several algorithms and derive regret guarantees in both the adversarial and stochastic loss setting. In the process, we derive a new bound for on-line learning with feedback graphs that generalizes and extends existing work. We also design a new algorithm for on-line learning with sleeping experts that takes advantage of time-varying feedback graphs. We present natural extensions of existing algorithms as a baseline, and we then design more sophisticated algorithms that explicitly exploit the structure of our problem. We empirically validate the improvement of these more sophisticated algorithms on several datasets.


The Ontological Multidimensional Data Model

In this extended abstract we describe, mainly by examples, the main elements of the Ontological Multidimensional Data Model, which considerably extends a relational reconstruction of the multidimensional data model proposed by Hurtado and Mendelzon by means of tuple-generating dependencies, equality-generating dependencies, and negative constraints as found in Datalog+-. We briefly mention some good computational properties of the model.


Communications that Emerge through Reinforcement Learning Using a (Recurrent) Neural Network

Communication is not only an action of choosing a signal, but needs to consider the context and sensor signals. It also needs to decide what information is communicated and how it is represented in or understood from signals. Therefore, communication should be realized comprehensively together with its purpose and other functions. The recent successful results in end-to-end reinforcement learning (RL) show the importance of comprehensive learning and the usefulness of end-to-end RL. Although little is known, we have shown that a variety of communications emerge through RL using a (recurrent) neural network (NN). Here, three of them are introduced. In the 1st one, negotiation to avoid conflicts among 4 randomly-picked agents was learned. Each agent generates a binary signal from the output of its recurrent NN (RNN), and receives 4 signals from the agents three times. After learning, each agent made an appropriate final decision after negotiation for any combination of 4 agents. Differentiation of individuality among the agents also could be seen. The 2nd one focused on discretization of communication signal. A sender agent perceives the receiver’s location and generates a continuous signal twice by its RNN. A receiver agent receives them sequentially, and moves according to its RNN’s output to reach the sender’s location. When noises were added to the signal, it was binarized through learning and 2-bit communication was established. The 3rd one focused on end-to-end comprehensive communication. A sender receives 1,785 pixel real camera image on which a real robot can be seen, and sends two sounds whose frequencies are computed by its NN. A receiver receives them, and two motion commands for the robot are generated by its NN. After learning, the robot could reach the goal successfully from any initial location though some preliminary learning was necessary.


NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

Nowadays, a big part of people rely on available content in social media in their decisions (e.g. reviews and feedback on a topic or product). The possibility that anybody can leave a review provide a golden opportunity for spammers to write spam reviews about products and services for different interests. Identifying these spammers and the spam content is a hot topic of research and although a considerable number of studies have been done recently toward this end, but so far the methodologies put forth still barely detect spam reviews, and none of them show the importance of each extracted feature type. In this study, we propose a novel framework, named NetSpam, which utilizes spam features for modeling review datasets as heterogeneous information networks to map spam detection procedure into a classification problem in such networks. Using the importance of spam features help us to obtain better results in terms of different metrics experimented on real-world review datasets from Yelp and Amazon websites. The results show that NetSpam outperforms the existing methods and among four categories of features; including review-behavioral, user-behavioral, reviewlinguistic, user-linguistic, the first type of features performs better than the other categories.


Learning Gradient Descent: Better Generalization and Longer Horizons

Training deep neural networks is a highly nontrivial task, involving carefully selecting appropriate training algorithms, scheduling step sizes and tuning other hyperparameters. Trying different combinations can be quite labor-intensive and time consuming. Recently, researchers have tried to use deep learning algorithms to exploit the landscape of the loss function of the training problem of interest, and learn how to optimize over it in an automatic way. In this paper, we propose a new learning-to-learn model and some useful and practical tricks. Our optimizer outperforms generic, hand-crafted optimization algorithms and state-of-the-art learning-to-learn optimizers by DeepMind in many tasks. We demonstrate the effectiveness of our algorithms on a number of tasks, including deep MLPs, CNNs, and simple LSTMs.


GPU accelerated population annealing algorithm

Population annealing is a promising recent approach for Monte Carlo simulations in statistical physics, in particular for the simulation of systems with complex free-energy landscapes. It is a hybrid method, combining importance sampling through Markov chains with elements of sequential Monte Carlo in the form of population control. While it appears to provide algorithmic capabilities for the simulation of such systems that are roughly comparable to those of more established approaches such as parallel tempering, it is intrinsically much more suitable for massively parallel computing. Here, we tap into this structural advantage and present a highly optimized implementation of the population annealing algorithm on GPUs that promises speed-ups of several orders of magnitude as compared to a serial implementation on CPUs. While the sample code is for simulations of the 2D ferromagnetic Ising model, it should be easily adapted for simulations of other spin models, including disordered systems. Our code includes implementations of some advanced algorithmic features that have only recently been suggested, namely the automatic adaptation of temperature steps and a multi-histogram analysis of the data at different temperatures.


Opinion-Based Centrality in Multiplex Networks: A Convex Optimization Approach

Most people simultaneously belong to several distinct social networks, in which their relations can be different. They have opinions about certain topics, which they share and spread on these networks, and are influenced by the opinions of other persons. In this paper, we build upon this observation to propose a new nodal centrality measure for multiplex networks. Our measure, called Opinion centrality, is based on a stochastic model representing opinion propagation dynamics in such a network. We formulate an optimization problem consisting in maximizing the opinion of the whole network when controlling an external influence able to affect each node individually. We find a mathematical closed form of this problem, and use its solution to derive our centrality measure. According to the opinion centrality, the more a node is worth investing external influence, and the more it is central. We perform an empirical study of the proposed centrality over a toy network, as well as a collection of real-world networks. Our measure is generally negatively correlated with existing multiplex centrality measures, and highlights different types of nodes, accordingly to its definition.


Uniform estimation of a class of random graph functionals

Entanglement Complexity in Quantum Many-Body Dynamics, Thermalization and Localization

Temporal evolution of notoriety of Wikipedia pages with origin in social networks

Forward-Backward-Half Forward Algorithm with non Self-Adjoint Linear Operators for Solving Monotone Inclusions

Using Options for Long-Horizon Off-Policy Evaluation

Sample Efficient Feature Selection for Factored MDPs

A connection between MAX $κ$-CUT and the inhomogeneous Potts spin glass in the large degree limit

Parallel Markov Chain Monte Carlo for the Indian Buffet Process

Position Tracking for Virtual Reality Using Commodity WiFi

Deep Radial Kernel Networks: Approximating Radially Symmetric Functions with Deep Networks

On generalized max-linear models in max-stable random fields

Auxiliary Variables for Bayesian Inference in Multi-Class Queueing Networks

Enhancing sensitivity in quantum metrology by Hamiltonian extensions

Combinatorial Auctions with Online XOS Bidders

Composability of Permutation Classes

A New Representation of Skeleton Sequences for 3D Action Recognition

On Optimizing Feedback Interval for Gauss-Markov MIMO Channels With Finite-Rate Feedback

Minimal obstructions to $2$-polar cographs

Density Level Set Estimation on Manifolds with DBSCAN

Decorrelated Jet Substructure Tagging using Adversarial Neural Networks

Outage Performance for Cooperative NOMA Transmission with an AF Relay

Towards Computing Victory Margins in STV Elections

Perfect fractional matchings in k-out hypergraphs

Notions of the ergodic hierarchy for curved statistical manifolds

Some Time-changed fractional Poisson processes

A New Evaluation Protocol and Benchmarking Results for Extendable Cross-media Retrieval

Crossing the Logarithmic Barrier for Dynamic Boolean Data Structure Lower Bounds

Anderson localization in Non-Hermitian Aubry-André-Harper model with physical gain and loss

Some spectral properties of chain graphs

The xDotGrid Native, Cross-Platform, High-Performance xDFS File Transfer Framework

High SNR Consistent Compressive Sensing

The Densest Subgraph Problem with a Convex/Concave Size Function

The Efficiency Challenges of Resource Discovery in Grid Environments

Multi-frequency image reconstruction for radio-interferometry with self-tuned regularization parameters

Fast LIDAR-based Road Detection Using Convolutional Neural Networks

Lattice-based Motion Planning for a General 2-trailer system

Symbol-level and Multicast Precoding for Multiuser Multiantenna Downlink: A Survey, Classification and Challenges

From Depth Data to Head Pose Estimation: a Siamese approach

First-order Euler scheme for SDEs driven by fractional Brownian motions: the rough case

Carleman estimates for forward and backward stochastic fourth order Schrödinger equations and their applications

Critical percolation on random regular graphs

A Study of Metrics of Distance and Correlation Between Ranked Lists for Compositionality Detection

Centralities in Simplicial Complexes

Performance Analysis of Mixed-ADC Massive MIMO Systems over Rician Fading Channels

Pomelo, a tool for computing Generic Set Voronoi Diagrams of Aspherical Particles of Arbitrary Shape

Construction of Non-asymptotic Confidence Sets in 2-Wasserstein Space

Parallel Multiscale Autoregressive Density Estimation

Comparison of SMT and RBMT; The Requirement of Hybridization for Marathi-Hindi MT

Special cases of pairwise comparisons matrices represented by Toeplitz matrices

Uncoordinated Frequency Shifts based Pilot Contamination Attack Detection

Many body localization transition in quantum spin glasses on the Bethe lattice

Strong convergence rates of probabilistic integrators for ordinary differential equations

A Hybrid MILP and IPM for Dynamic Economic Dispatch with Valve Point Effect

Best Laid Plans of Lions and Men

On the Coherence of Large-Scale Networks with Distributed PI- and PD-Control

Data-Driven Color Augmentation Techniques for Deep Skin Image Analysis

Quantum reading capacity: General definition and bounds

Distant sum distinguishing index of graphs

Applying the Wizard-of-Oz Technique to Multimodal Human-Robot Dialogue

Right for the Right Reasons: Training Differentiable Models by Constraining their Explanations

Convergence of radial loop-erased random walk in the natural parametrization

On matrices with displacement structure: generalized operators and faster algorithms

On the Matroid Isomorphism Problem

Representation of chance-constraints with strong asymptotic guarantees

Latent Gaussian Mixture Models for Nationwide Kidney Transplant Center Evaluation

The extremal function for geometry minors of matroids over prime fields

A unified treatment of linked and lean tree-decompositions

Integer Factorization with a Neuromorphic Sieve

A Novel Convex Relaxation for Non-Binary Discrete Tomography

Coping with Construals in Broad-Coverage Semantic Annotation of Adpositions

Evolutionary Image Composition Using Feature Covariance Matrices

Summertime, and the livin is easy: Winter and summer pseudoseasonal life expectancy in the United States

A Genetic Algorithm-based Beamforming Approach for Delay-constrained Networks

DNA Origami and Unknotted A-trails in Torus Graphs

The 4-girth-thickness of the complete graph

Advertisements