## Investigating Math Word Problems using Pretrained Multilingual Language Models

In this paper, we revisit math word problems~(MWPs) from the cross-lingualand multilingual perspective . We construct our MWP solvers over pretrainedmultilingual language models using sequence-to-sequence model with copymechanism . We compare how the solvers perform in cross-language andmultilingual scenarios . Our experiments show that the MWPsolvers may not be transferred toa different language even if the target expressions have the same operator setand constants .…

## VOILA Visual Observation Only Imitation Learning for Autonomous Navigation

Imitation Learning for Autonomous navigation (VOILA) is a new algorithm that can learn navigation policies from a single video demonstration collected from a physically different agent . VOILA successfully imitates the expert, but that it also learns navigation policies that can generalize to novel environments .…

## A Phase Transition in Large Network Games

In this paper, we use a model of large random network game to explore the conditions under which the Nash equilibrium (NE) of the game is affected by a perturbation . We use a phase transition phenomenon observed in finite rankdeformations of large .…

## Efficient three material PLIC interface positioning on unstructured polyhedral meshes

This paper introduces an efficient algorithm for the sequential positioning(or nested dissection) of two planar interfaces in an arbitrary polyhedron . Such that, after each truncation, the respectively remaining polyhedrons admit a prescribed volume . This task, among others, is frequently encountered in thenumerical simulation of three-phase flows when resorting to the geometricVolume-of-Fluid method .…

## Improving Adverse Drug Event Extraction with SpanBERT on Different Text Typologies

In recent years, Internet users are reporting Adverse Drug Events (ADE) on social media, blogs and health forums . Because of the large volume of reports, pharmacovigilance is seeking to resort to NLP to monitor these outlets . Wepropose for the first time the use of the SpanBERT architecture for the task ofADE extraction: this new version of the popular BERT transformer showedimproved capabilities with multi-token text spans .…

## QuatDE Dynamic Quaternion Embedding for Knowledge Graph Completion

QuatDE is anovel model with a dynamic mapping strategy to explicitly capture avariety of relational patterns . The mapping strategy dynamically selects the transitionvectors associated with each triplet, used to adjust the point position of theentity embedding vectors in the quaternion space via Hamilton product .…

## Dark Patterns Electronic Medical Records and the Opioid Epidemic

Dark patterns have emerged as a set of methods to exploit cognitive biases . These patterns can have consequences that might range fromconvenience to global disasters . We present a case of a drug company and anelectronic medical record vendor who colluded to modify the medical record’s interface to induce clinicians to increase the prescription of extended-releaseopioids .…

## Free Energy Node Embedding via Generalized Skip gram with Negative Sampling

A widely established set of unsupervised node embedding methods can beinterpreted as consisting of two distinctive steps: definition of asimilarity matrix based on graph of interest followed by explicit orimplicit factorization of such matrix . We propose a matrixfactorization method based on a loss function that generalizes that of theskip-gram model with negative sampling to arbitrary similarity matrices .…

## Wilf classes of non symmetric operads

Two operads are said to belong to the same Wilf class if they have the samegenerating series . If an operad has afinite Groebner basis, then the monomial basis of the operad forms anunambiguous context-free language . We discuss the deterministicgrammar which defines the language .…

## On the Secrecy Capacity of 2 user Gaussian Z Interference Channel with Shared Key

In this paper, the role of secret key with finite rate is studied to enhancethe secrecy performance of the system when users are operating in interferencelimited scenarios . To address this problem, a 2-user Gaussian Z-IC with secrecyconstraint at the receiver is considered .…

## Tool and Domain Agnostic Parameterization of Style Transfer Effects Leveraging Pretrained Perceptual Metrics

Current deep learning techniques for style transfer would not be optimal for design support since their “one-shot” transfer does not fit exploratory design processes . To overcome this gap, we propose parametric transcription, which transcribes an end-to-end style transfer effect into parameters available in existing content editing tools .…

## Separating Sessions Smoothly

Hypersequent GV (HGV) is a modular and extensible corecalculus for functional programming with session types that enjoy deadlockfreedom, confluence, and strong normalisation . HGV exploits hyper-environments, which are collections of type environments, to ensure that structuralcongruence is type preserving . As a consequence we obtain a tight operationalcorrespondence between HGV and HCP, a hypersequent-based process-calculusinterpretation of classical linear logic .…

## Isoparametric unfitted BDF Finite element method for PDEs on evolving domains

In [Lehrenfeld, Olshanskii. propose a new discretization method for PDEs on moving domains in thesetting of unfitted finite element methods, which is provably higher-orderaccurate in space and time . The keyingredient in the method, the transformation of the underlying mesh, is becomestime-dependent which gives rise to some technical issues .…

## Modeling Precomputation In Games Played Under Computational Constraints

Understanding the properties of games played under computational constraints remains challenging . This paper presents a novel model for theprecomputation (preparing moves in advance) aspect of computationallyconstrained games . A fundamental trade-off is shown between randomness of play,and susceptibility to precomputing .…

## Advances in integration of end to end neural and clustering based diarization for real conversational speech

A novel speaker diarization method called End-to-End-Neural-Diarization-vector clustering (EEND- vector clustering) was onlyevaluated so far on simulated 2-speaker meeting-like data . The proposed method combines advantages of bothframeworks, i.e. high performance and handling of overlapped speechbased on EEND, and robust handling of long recordings with an arbitrary number of speakers based on clustering-based approaches .…

## Subgrid multiscale stabilized finite element analysis of non Newtonian Casson model fully coupled with Advection Diffusion Reaction equations

Casson fluid flow model tightly coupled with variable coefficients ADR ($VADR$) equation . Casson viscositycoefficient is taken to be dependent upon solute mass concentration . This paper presents the stability and convergence analyses of the stabilized finiteelement solution . The proposed expressions of the stabilization parameters help in obtaining optimal order of convergences .…

## Exploring The Limits Of Data Augmentation For Retinal Vessel Segmentation

Retinal Vessel Segmentation is important for diagnosis of various diseases . The research on retinal vessel segmentation focuses mainly on improvement of the segmentation model which is usually based on U-Net architecture . The success of the data augmentationrelies on successfully addressing the problem of input images .…

## An Algebraic Characterisation of First Order Logic with Neighbour

We give an algebraic characterisation of first-order logic with the neighbourrelation, on finite words . For this, we consider languages of finite words overalphabets with an involution on them . The natural algebras for such languagesare involution semigroups . To characterise the logic, we define a special kindof semidirect product of involution .product…

## Federated Learning With Highly Imbalanced Audio Data

Federated learning (FL) is a privacy-preserving machine learning method . It is proposed to allow training of models using data from many different clients, without these clients having to transfer all their data to a centralserver . FL models trained using the high-volume clients can perform similarly to a centrally-trained model, though there is much more noise in results than would typically be expected for acentrally-trained models .…

## Methods for Detoxification of Texts for the Russian Language

First study of automatic detoxification of Russian texts to combat offensive language . Such a kind of textual style transfer can be used,for instance, for processing toxic content in social media . The results show that the testedapproaches can be successfully used for detoxification, although there is room for improvement .…

## Forecasting managerial turnover through e mail based social network analysis

Researchers analyzed communication behavior of 866 managers, out of which 111 left a large service company . Findings show managers who quit had lower closeness centrality and less engaged conversations . Researchers say managers who chose to quit tended to shift their communication behavior starting from 5 months before leaving, by increasing their degree, the complexity of their language, as well as their oscillations in betweenness centrality, and the number of “nudges” they need to send to peers before getting an answer .…

## A Guide to Reducing Carbon Emissions through Data Center Geographical Load Shifting

This paper focuses on how data centers can usetheir geographic load flexibility to reduce carbon emissions through cleverinteractions with electricity markets . Because electricity market clearingaccounts for congestion and power flow physics in the electric grid, the carbonemissions associated with electricity use varies between (potentiallygeographically close) locations .…

## Three Dimensional Popular Matching with Cyclic Preferences

Two actively researched problem settings in matchings under preferences are popular matchings and the three-dimensional stable matching problem with cyclicpreferences . We investigate the connection between stability, popularity, and their strict variants, strong stability andstrong popularity in 3-dimensional instances . We also derive results on the complexity of these problems whenthe preferences are derived from master lists .…

## An Overview of Computer Supported Query Formulation

An essential function of informationsystems should be the support of disclosure of this information . Without a set ofadequate information disclosure avenues an information system becomes worthless . We envision a computer supportedmechanism that allows for an easy and intuitive formulation of queries in allanguage that is as close to the user’s perception of the universe of discourseas possible.…