Investigating Math Word Problems using Pretrained Multilingual Language Models

In this paper, we revisit math word problems~(MWPs) from the cross-lingualand multilingual perspective . We construct our MWP solvers over pretrainedmultilingual language models using sequence-to-sequence model with copymechanism . We compare how the solvers perform in cross-language andmultilingual scenarios . Our experiments show that the MWPsolvers may not be transferred toa different language even if the target expressions have the same operator setand constants .…

A Phase Transition in Large Network Games

In this paper, we use a model of large random network game to explore the conditions under which the Nash equilibrium (NE) of the game is affected by a perturbation . We use a phase transition phenomenon observed in finite rankdeformations of large .…

Efficient three material PLIC interface positioning on unstructured polyhedral meshes

This paper introduces an efficient algorithm for the sequential positioning(or nested dissection) of two planar interfaces in an arbitrary polyhedron . Such that, after each truncation, the respectively remaining polyhedrons admit a prescribed volume . This task, among others, is frequently encountered in thenumerical simulation of three-phase flows when resorting to the geometricVolume-of-Fluid method .…

The Complex Community Structure of the Bitcoin Address Correspondence Network

Bitcoin is built on a blockchain, an immutable decentralised ledger thatallows entities (users) to exchange Bitcoins in a pseudonymous manner . Different heuristics exist to detect which addresses in a specific transaction belong to the same entity . In this paper, we analyse for the first time the Address Correspondence Network is characterised by a complex topology, signalled by a broad, skeweddegree distribution and a power-law component size distribution .…

Performability of Network Service Chains Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem

Service provisioning mechanisms implemented across 5G infrastructures takebroadly into use of the network service chain concept . The IP MultimediaSubsystem (IMS) is a key infrastructure of 5G networks, that we characterize bothby a performance and an availability perspective . We perform a stochastic assessment of a softwarized IMS architecture where twomain stages stand out: i) a performance analysis, i.…

Essay BR a Brazilian Corpus of Essays

Automatic Essay Scoring (AES) is defined as the computer technology that evaluates and scores the written essays . In order to bridge this gap, we create a large corpus with several essays written by Brazilian high school students on an online platform .…

Revisiting Data Compression in Column Stores

Data compression is widely used in contemporary column-oriented DBMSes . Pioneering systems have introduced compression to tackle the disk bandwidth bottleneck by trading CPU power for it . The main issue of this is a trade-off between the compression ratio and the decompression CPU cost .…

MedSensor Medication Adherence Monitoring Using Neural Networks on Smartwatch Accelerometer Sensor Data

Poor medication adherence presents serious economic and health problems including compromised treatment effectiveness, medical complications, and billions of dollars in wasted medicine or procedures . There is an urgent need to leverage light, smart, and minimally obtrusive technology such assmartwatches to develop user tools to improve medication use and adherence .…

Graph Neural Networks for Decentralized Multi Robot Submodular Action Selection

In this paper, we develop a learning-based approach for decentralizedsubmodular maximization . We focus on applications where robots are required to jointly select actions, e.g., to maximize team submodularobjectives with local communications only . We train the learning model by imitating an expert solution and implement the resulting model for decentralized action selection involving local observations and communications only.…

Improving Adverse Drug Event Extraction with SpanBERT on Different Text Typologies

In recent years, Internet users are reporting Adverse Drug Events (ADE) on social media, blogs and health forums . Because of the large volume of reports, pharmacovigilance is seeking to resort to NLP to monitor these outlets . Wepropose for the first time the use of the SpanBERT architecture for the task ofADE extraction: this new version of the popular BERT transformer showedimproved capabilities with multi-token text spans .…

Dark Patterns Electronic Medical Records and the Opioid Epidemic

Dark patterns have emerged as a set of methods to exploit cognitive biases . These patterns can have consequences that might range fromconvenience to global disasters . We present a case of a drug company and anelectronic medical record vendor who colluded to modify the medical record’s interface to induce clinicians to increase the prescription of extended-releaseopioids .…

Free Energy Node Embedding via Generalized Skip gram with Negative Sampling

A widely established set of unsupervised node embedding methods can beinterpreted as consisting of two distinctive steps: definition of asimilarity matrix based on graph of interest followed by explicit orimplicit factorization of such matrix . We propose a matrixfactorization method based on a loss function that generalizes that of theskip-gram model with negative sampling to arbitrary similarity matrices .…

Wilf classes of non symmetric operads

Two operads are said to belong to the same Wilf class if they have the samegenerating series . If an operad has afinite Groebner basis, then the monomial basis of the operad forms anunambiguous context-free language . We discuss the deterministicgrammar which defines the language .…

Separating Sessions Smoothly

Hypersequent GV (HGV) is a modular and extensible corecalculus for functional programming with session types that enjoy deadlockfreedom, confluence, and strong normalisation . HGV exploits hyper-environments, which are collections of type environments, to ensure that structuralcongruence is type preserving . As a consequence we obtain a tight operationalcorrespondence between HGV and HCP, a hypersequent-based process-calculusinterpretation of classical linear logic .…

Advances in integration of end to end neural and clustering based diarization for real conversational speech

A novel speaker diarization method called End-to-End-Neural-Diarization-vector clustering (EEND- vector clustering) was onlyevaluated so far on simulated 2-speaker meeting-like data . The proposed method combines advantages of bothframeworks, i.e. high performance and handling of overlapped speechbased on EEND, and robust handling of long recordings with an arbitrary number of speakers based on clustering-based approaches .…

Subgrid multiscale stabilized finite element analysis of non Newtonian Casson model fully coupled with Advection Diffusion Reaction equations

Casson fluid flow model tightly coupled with variable coefficients ADR ($VADR$) equation . Casson viscositycoefficient is taken to be dependent upon solute mass concentration . This paper presents the stability and convergence analyses of the stabilized finiteelement solution . The proposed expressions of the stabilization parameters help in obtaining optimal order of convergences .…

An Algebraic Characterisation of First Order Logic with Neighbour

We give an algebraic characterisation of first-order logic with the neighbourrelation, on finite words . For this, we consider languages of finite words overalphabets with an involution on them . The natural algebras for such languagesare involution semigroups . To characterise the logic, we define a special kindof semidirect product of involution .product…

Improved Product Based High Dimensional Expanders

High-dimensional expanders generalize the notion of expander graphs to higher-dimensional simplicial complexes . Noelementary combinatorial construction with near-optimal expansion is known . Our construction achieves a spectral gap of $Omega ($Omega) for randomwalks on the $k$-dimensional faces, which is only quadratically worse than the optimal bound of $Theta (Theta) The construction is based on a high-dimensional variant of a tensor product .…

Active Visual SLAM with independently rotating camera

In active Visual-SLAM, a robot relies on the information retrieved by its cameras to control its own movements for autonomous mapping of the environment . We obtain more accurate maps, with lower energy consumption, while maintaining the benefits of the active approach with respect to the baseline .…

Model based and Data driven Approaches for Downlink Massive MIMO Channel Estimation

Previous works have used the mean value as the estimate, motivated by channelhardening . However, this is associated with a performance loss in non-isotropicscattering environments . We propose two novel estimation methods that can be applied without downlink pilots . We compare the proposed methods with the state-of-the-art using the normalized mean-squared error and spectralefficiency (SE) The results suggest that the two proposed methods provide better SE than the state of theart when there is a low level of channel hardening, while the performance difference is relatively small with theuncorrelated channel model .…

Conelikes and Ranker Comparisons

The computation of pointlikes can beinterpreted as the algebraic counterpart of the covering problem . This leadsto the notion of conelikes for the corresponding algebraic framework . We apply this framework to the Trotter-Weil hierarchy and both the full and the half levels of the $\text{FO}^2$ quantifier alternation hierarchy .…

Low order divergence free approximations for the Stokes problem on Worsey Farin and Powell Sabin splits

We derive low-order, inf-sup stable and divergence-free finite element approximations for the Stokes problem using Worsey-Farin splits in threedimensions and Powell-Sabin splits in two dimensions . The velocity space simplyconsists of continuous, piecewise linear polynomials, where as the pressurespace is a subspace of piecewise constants with weak continuity properties atsingular edges (3D)…

Unsupervised Learning of Adaptive Codebooks for Deep Feedback Encoding in FDD Systems

In this work, we propose a joint adaptive codebook construction and feedbackgeneration scheme in frequency division duplex (FDD) systems . Both unsupervisedand supervised deep learning techniques are used for this purpose . Subsequently, the feedback encoder can be offloaded to the mobile terminals to generate channel feedback there as efficiently as possible, without training effort at the terminals or corresponding transfer of training andcodebook data .…

Stratified Data Integration

We propose a novel approach to the problem of semantic heterogeneity . Conceptual, Language, Knowledge, and Data are uniformly dealt within each single layer, independently from the others . The proposed framework has been evaluated in various pilot case studies and in a number of industrial data integration problems .…

Non cumulative measures of researcher citation impact

The most commonly used publication metrics for individual researchers are the total number of publications, and Hirsch’s $h$-index . Most other author-level measures in the literature share this cumulative property . By contrast, we aim to studynon-cumulative measures that answer the question “in terms of citation impact,what have you done lately?”…

Federated Learning With Highly Imbalanced Audio Data

Federated learning (FL) is a privacy-preserving machine learning method . It is proposed to allow training of models using data from many different clients, without these clients having to transfer all their data to a centralserver . FL models trained using the high-volume clients can perform similarly to a centrally-trained model, though there is much more noise in results than would typically be expected for acentrally-trained models .…

Methods for Detoxification of Texts for the Russian Language

First study of automatic detoxification of Russian texts to combat offensive language . Such a kind of textual style transfer can be used,for instance, for processing toxic content in social media . The results show that the testedapproaches can be successfully used for detoxification, although there is room for improvement .…

Forecasting managerial turnover through e mail based social network analysis

Researchers analyzed communication behavior of 866 managers, out of which 111 left a large service company . Findings show managers who quit had lower closeness centrality and less engaged conversations . Researchers say managers who chose to quit tended to shift their communication behavior starting from 5 months before leaving, by increasing their degree, the complexity of their language, as well as their oscillations in betweenness centrality, and the number of “nudges” they need to send to peers before getting an answer .…

Three Dimensional Popular Matching with Cyclic Preferences

Two actively researched problem settings in matchings under preferences are popular matchings and the three-dimensional stable matching problem with cyclicpreferences . We investigate the connection between stability, popularity, and their strict variants, strong stability andstrong popularity in 3-dimensional instances . We also derive results on the complexity of these problems whenthe preferences are derived from master lists .…

An Overview of Computer Supported Query Formulation

An essential function of informationsystems should be the support of disclosure of this information . Without a set ofadequate information disclosure avenues an information system becomes worthless . We envision a computer supportedmechanism that allows for an easy and intuitive formulation of queries in allanguage that is as close to the user’s perception of the universe of discourseas possible.…