Filters








36 Hits in 8.2 sec

Creating Something from Nothing: Unsupervised Knowledge Distillation for Cross-Modal Hashing [article]

Hengtong Hu, Lingxi Xie, Richang Hong, Qi Tian
2020 arXiv   pre-print
In recent years, cross-modal hashing (CMH) has attracted increasing attentions, mainly because its potential ability of mapping contents from different modalities, especially in vision and language, into  ...  the same space, so that it becomes efficient in cross-modal data retrieval.  ...  Our Approach In this work, we focus on the idea named creating something from nothing, i.e., a supervised cross-modal hash- ing method can be guided by the output of an unsupervised method, which reveals  ... 
arXiv:2004.00280v1 fatcat:xrwcao6ayzepnpuj2pqsu3lv7e

Deep Semantic-Preserving Reconstruction Hashing for Unsupervised Cross-Modal Retrieval

Shuli Cheng, Liejun Wang, Anyu Du
2020 Entropy  
Deep hashing is the mainstream algorithm for large-scale cross-modal retrieval due to its high retrieval speed and low storage capacity, but the problem of reconstruction of modal semantic information  ...  In order to further solve the problem of unsupervised cross-modal retrieval semantic reconstruction, we propose a novel deep semantic-preserving reconstruction hashing (DSPRH).  ...  In terms of the network model, Hu proposed [14] unsupervised knowledge distillation to create something from nothing.  ... 
doi:10.3390/e22111266 pmid:33287034 pmcid:PMC7712897 fatcat:akxumxcwijfxpphu523bfechee

Improving Neural Topic Models using Knowledge Distillation [article]

Alexander Hoyle, Pranav Goel, Philip Resnik
2020 arXiv   pre-print
We use knowledge distillation to combine the best attributes of probabilistic topic models and pretrained transformers.  ...  We thank Pedro Rodriguez, Shi Feng, and our anonymous reviewers for their helpful comments. Appreciation to Adam Forbes for the design of Fig. 1 .  ...  We also thank the authors of Card et al. (2018 ), Nan et al. (2019, and Burkhardt and Kramer (2019) for their publicly available implementations.  ... 
arXiv:2010.02377v1 fatcat:xm7rr7hw7nc6nngheo4x5t6ncu

Table of Contents

2020 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)  
Fouhey (University of Michigan) Creating Something From Nothing: Unsupervised Knowledge Distillation for Cross-Modal Hashing 3120 Hengtong Hu (School of Computer Science and Information Engineering  ...  As Priors: Cross-Modal Knowledge Generalization for Datasets Without Superior Knowledge 6527 Long Zhao (Rutgers University), Xi Peng (University of Delaware), Yuxiao Chen (Rutgers University), Mubbasir  ... 
doi:10.1109/cvpr42600.2020.00004 fatcat:c7els2kee5cq7lh6cemeqhdcoa

Pretrained Transformers for Text Ranking: BERT and Beyond

Andrew Yates, Rodrigo Nogueira, Jimmy Lin
2021 Proceedings of the 14th ACM International Conference on Web Search and Data Mining  
The goal of text ranking is to generate an ordered list of texts retrieved from a corpus in response to a query for a particular task.  ...  We'd like to thank the following people for comments on earlier drafts of this work: Maura Grossman, Sebastian Hofstätter, Xueguang Ma, and Bhaskar Mitra.  ...  However, there remain many open research questions, and thus in addition to laying out the foundations of pretrained transformers for text ranking, this survey also attempts to prognosticate where the  ... 
doi:10.1145/3437963.3441667 fatcat:6teqmlndtrgfvk5mneq5l7ecvq

Pretrained Transformers for Text Ranking: BERT and Beyond [article]

Jimmy Lin, Rodrigo Nogueira, Andrew Yates
2021 arXiv   pre-print
The goal of text ranking is to generate an ordered list of texts retrieved from a corpus in response to a query.  ...  There are two themes that pervade our survey: techniques for handling long documents, beyond typical sentence-by-sentence processing in NLP, and techniques for addressing the tradeoff between effectiveness  ...  Special thanks goes out to two anonymous reviewers for their insightful comments and helpful feedback.  ... 
arXiv:2010.06467v3 fatcat:obla6reejzemvlqhvgvj77fgoy

Functional Representation of Prototypes in LVQ and Relevance Learning [chapter]

Friedrich Melchert, Udo Seiffert, Michael Biehl
2016 Advances in Intelligent Systems and Computing  
However, it does not exclude contributions from countries outside the Benelux.  ...  The overall acceptance rate was 88% (63% for regular papers, 100% for compressed contributions and demonstration abstracts, and 91% for thesis abstracts).  ...  This work was realized with the support from CNPq, National Council for Scientific and Technological Development -Brazil, through a scholarship which reference number is 235134/2014-7.  ... 
doi:10.1007/978-3-319-28518-4_28 fatcat:uwxvq6txmrba3ajulmblafgh2a

The State of AI Ethics Report (June 2020) [article]

Abhishek Gupta
2020 arXiv   pre-print
Our staff has worked tirelessly over the past quarter surfacing signal from the noise so that you are equipped with the right tools and knowledge to confidently tread this complex yet consequential domain  ...  Artificial intelligence has become the byword for technological progress and is being used in everything from helping us combat the COVID-19 pandemic to nudging our attention in different directions as  ...  were supposedly created with the intention of disallowing public buses from crossing via the underpasses to discourage the movement of users of public transportation, primarily disadvantaged groups from  ... 
arXiv:2006.14662v1 fatcat:q76dnqzh4ja5pofurjmpmyeyey

Artificial Intelligence and Law

ANTONIO A. MARTINO
1994 International Journal of Law and Information Technology  
The other key is to derive facts from the reviewed documents as quickly and efficiently as possible, and transfer the knowledge distilled from those facts to the decision makers in the most effective and  ...  Documents that have nothing in common with the "first chain group" but that do have something in common with this chain group ALL ARABIC for example In Figure Twenty One it is shown that the documents  ...  MD5 Hash Value Sampling: Random sample sets created by running a MS SQL Server query to select all records with MD5 hash values beginning with two designated characters (e.g., AF or 4A).  ... 
doi:10.1093/ijlit/2.2.154 fatcat:ff7kwvvn3vcbblhlkf63oqntyu

Artificial Intelligence and the Law

Charlotte Walker-Osborn, Christopher Chan
2017 ITNOW  
The other key is to derive facts from the reviewed documents as quickly and efficiently as possible, and transfer the knowledge distilled from those facts to the decision makers in the most effective and  ...  Documents that have nothing in common with the "first chain group" but that do have something in common with this chain group ALL ARABIC for example In Figure Twenty One it is shown that the documents  ...  MD5 Hash Value Sampling: Random sample sets created by running a MS SQL Server query to select all records with MD5 hash values beginning with two designated characters (e.g., AF or 4A).  ... 
doi:10.1093/itnow/bwx017 fatcat:62ezubai3fcwlpie35xjq3iyem

Evidence for public health on novel psychoactive substance use: a mixed-methods study

Kathryn Higgins, Nina O'Neill, Leeanne O'Hara, Julie-Ann Jordan, Mark McCann, Tara O'Neill, Mike Clarke, Tony O'Neill, Anne Campbell
2019 Public Health Research  
Drivers for use were considered alongside knowledge, perceptions and experience of harms.  ...  The level of missing data for some of the BYDS analysis was a limitation, as was the fact that the BYDS data were collected in 2011, so in a different context from the data collected during the narrative  ...  The team would like to sincerely thank members of the SAG and PLG for their attendance at meetings and teleconference calls and their very useful feedback on and input to the project findings and recommendations  ... 
doi:10.3310/phr07140 fatcat:xyy6ufbefrdxllnaj24dpx677i

Knowledge Graphs [article]

Aidan Hogan, Eva Blomqvist, Michael Cochez, Claudia d'Amato, Gerard de Melo, Claudio Gutierrez, José Emilio Labra Gayo, Sabrina Kirrane, Sebastian Neumaier, Axel Polleres, Roberto Navigli, Axel-Cyrille Ngonga Ngomo (+6 others)
2021 arXiv   pre-print
We conclude with high-level future research directions for knowledge graphs.  ...  In this paper we provide a comprehensive introduction to knowledge graphs, which have recently garnered significant attention from both industry and academia in scenarios that require exploiting diverse  ...  Acknowledgements: We thank the attendees of the Dagstuhl Seminar on "Knowledge Graphs" for discussions that inspired and influenced this paper, and all those that make such seminars possible.  ... 
arXiv:2003.02320v5 fatcat:ab4hmm2f2bbpvobwkjw4xbrz4u

Improving Neural Topic Models using Knowledge Distillation

Alexander Miserlis Hoyle, Pranav Goel, Philip Resnik
2020 Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP)   unpublished
We use knowledge distillation to combine the best attributes of probabilistic topic models and pretrained transformers.  ...  We thank Pedro Rodriguez, Shi Feng, and our anonymous reviewers for their helpful comments. Appreciation to Adam Forbes for the design of Fig. 1 .  ...  (2019, and Burkhardt and Kramer (2019) for their publicly available implementations.  ... 
doi:10.18653/v1/2020.emnlp-main.137 fatcat:oqzgaqdaonahxpi4m3wwr3drw4

Language Models are Few-Shot Learners [article]

Tom B. Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, Sandhini Agarwal, Ariel Herbert-Voss (+19 others)
2020 arXiv   pre-print
By contrast, humans can generally perform a new language task from only a few examples or from simple instructions - something which current NLP systems still largely struggle to do.  ...  For all tasks, GPT-3 is applied without any gradient updates or fine-tuning, with tasks and few-shot demonstrations specified purely via text interaction with the model.  ...  Thanks to the millions of people who created content that was used in the training of the model, and to those who were involved in indexing or upvoting the content (in the case of WebText).  ... 
arXiv:2005.14165v4 fatcat:kilb2lujxfax3kgfiuotql2iyy

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
Song, and Douglas Maughan; ISBN: 978-0-387-32720-4 Bleumer; ISBN: 978-0-387-29313-2 Additional information about this series can be obtained from http://www.springer.com The goals of the Springer International  ...  for advanced and timely topics in information security research and development.  ...  Authorization Authorization is the approval, permission, or empowerment for someone or something to do something.  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm
« Previous Showing results 1 — 15 out of 36 results