334 research outputs found

    Searching for Nearest Strings with Neural-Like String Embedding

    Get PDF
    We analyze an approach to a similarity preserving coding of symbol sequences based on neural distributed representations and show that it can be viewed as a metric embedding process

    Counterfactual Learning from Bandit Feedback under Deterministic Logging: A Case Study in Statistical Machine Translation

    Full text link
    The goal of counterfactual learning for statistical machine translation (SMT) is to optimize a target SMT system from logged data that consist of user feedback to translations that were predicted by another, historic SMT system. A challenge arises by the fact that risk-averse commercial SMT systems deterministically log the most probable translation. The lack of sufficient exploration of the SMT output space seemingly contradicts the theoretical requirements for counterfactual learning. We show that counterfactual learning from deterministic bandit logs is possible nevertheless by smoothing out deterministic components in learning. This can be achieved by additive and multiplicative control variates that avoid degenerate behavior in empirical risk minimization. Our simulation experiments show improvements of up to 2 BLEU points by counterfactual learning from deterministic bandit feedback.Comment: Conference on Empirical Methods in Natural Language Processing (EMNLP), 2017, Copenhagen, Denmar

    Abuse of Public Use? Exploring the SmithKline v. Apotex Decision and the Future of Public Use, 4 J. Marshall Rev. Intell. Prop. L. 559 (2005)

    Get PDF
    In SmithKline Beecham Corp. v. Apotx Corp., the court incorrectly applied the statutory public use bar and held the clinical trials did not constitute an experimental use. This ruling set the bar too high. Applying a narrow construction of the law, the CAFC invalidated a claim in a clear case of experimental use. The decision not only misapplied the precedent defining an “inherent” feature of the invention, but also essentially eliminated the need for applying the policies that underlie and define the public use bar under 35 U.S.C. § 102(b)

    On Handling Replay Attacks in Intrusion Detection Systems

    Get PDF
    We propose a method for detecting and analyzing the so-called replay attacks in intrusion detection systems, when an intruder contributes a small amount of hostile actions to a recorded session of a legitimate user or process, and replays this session back to the system. The proposed approach can be applied if an automata-based model is used to describe behavior of active entities in a computer system

    Approaches to Sequence Similarity Representation

    Get PDF
    We discuss several approaches to similarity preserving coding of symbol sequences and possible connections of their distributed versions to metric embeddings. Interpreting sequence representation methods with embeddings can help develop an approach to their analysis and may lead to discovering useful properties
    • …
    corecore