Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Berger, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02267  [pdf, ps, other

    cs.CL

    Prompting Large Language Models with Human Error Markings for Self-Correcting Machine Translation

    Authors: Nathaniel Berger, Stefan Riezler, Miriam Exel, Matthias Huck

    Abstract: While large language models (LLMs) pre-trained on massive amounts of unpaired language data have reached the state-of-the-art in machine translation (MT) of general domain texts, post-editing (PE) is still required to correct errors and to enhance term translation quality in specialized domains. In this paper we present a pilot study of enhancing translation memories (TM) produced by PE (source se… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: To appear at The 25th Annual Conference of the European Association for Machine Translation (EAMT 2024)

  2. arXiv:2307.08416  [pdf, other

    cs.CL

    Enhancing Supervised Learning with Contrastive Markings in Neural Machine Translation Training

    Authors: Nathaniel Berger, Miriam Exel, Matthias Huck, Stefan Riezler

    Abstract: Supervised learning in Neural Machine Translation (NMT) typically follows a teacher forcing paradigm where reference tokens constitute the conditioning context in the model's prediction, instead of its own previous predictions. In order to alleviate this lack of exploration in the space of translations, we present a simple extension of standard maximum likelihood estimation by a contrastive markin… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: Proceedings of the 24th Annual Conference of the European Association for Machine Translation, p. 69-78 Tampere, Finland, June 2023

  3. arXiv:2206.11535  [pdf, other

    cs.DC physics.ins-det

    Online Event Selection for Mu3e using GPUs

    Authors: Valentin Henkys, Bertil Schmidt, Niklaus Berger

    Abstract: In the search for physics beyond the Standard Model the Mu3e experiment tries to observe the lepton flavor violating decay $μ^+ \rightarrow e^+ e^- e^+$. By observing the decay products of $1 \cdot 10^8μ$/s it aims to either observe the process, or set a new upper limit on its estimated branching ratio. The high muon rates result in high data rates of $80$\,Gbps, dominated by data produced through… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

    Comments: 8 pages, to be published in IEEE ISPDC 2022 conference proceedings

  4. arXiv:2110.12383  [pdf, other

    cs.CL

    Automated Extraction of Sentencing Decisions from Court Cases in the Hebrew Language

    Authors: Mohr Wenger, Tom Kalir, Noga Berger, Carmit Chalamish, Renana Keydar, Gabriel Stanovsky

    Abstract: We present the task of Automated Punishment Extraction (APE) in sentencing decisions from criminal court cases in Hebrew. Addressing APE will enable the identification of sentencing patterns and constitute an important stepping stone for many follow up legal NLP applications in Hebrew, including the prediction of sentencing decisions. We curate a dataset of sexual assault sentencing decisions and… ▽ More

    Submitted 24 October, 2021; originally announced October 2021.

    Comments: Accepted to the Natural Legal Language Processing workshop (NLLP 2021), colocated with EMNLP 2021

  5. arXiv:2109.07926  [pdf, other

    cs.CL

    Don't Search for a Search Method -- Simple Heuristics Suffice for Adversarial Text Attacks

    Authors: Nathaniel Berger, Stefan Riezler, Artem Sokolov, Sebastian Ebert

    Abstract: Recently more attention has been given to adversarial attacks on neural networks for natural language processing (NLP). A central research topic has been the investigation of search algorithms and search constraints, accompanied by benchmark algorithms and tasks. We implement an algorithm inspired by zeroth order optimization-based attacks and compare with the benchmark results in the TextAttack f… ▽ More

    Submitted 4 October, 2021; v1 submitted 16 September, 2021; originally announced September 2021.

    Comments: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP Main Conference)

  6. arXiv:2006.01759  [pdf, other

    stat.ML cs.LG math.OC

    Sparse Perturbations for Improved Convergence in Stochastic Zeroth-Order Optimization

    Authors: Mayumi Ohta, Nathaniel Berger, Artem Sokolov, Stefan Riezler

    Abstract: Interest in stochastic zeroth-order (SZO) methods has recently been revived in black-box optimization scenarios such as adversarial black-box attacks to deep neural networks. SZO methods only require the ability to evaluate the objective function at random input points, however, their weakness is the dependency of their convergence speed on the dimensionality of the function to be evaluated. We pr… ▽ More

    Submitted 29 June, 2020; v1 submitted 2 June, 2020; originally announced June 2020.

    Comments: International Conference on Machine Learning, Optimization, and Data Science (LOD), Siena, Italy

    Journal ref: LOD 2020

  7. arXiv:2004.11222  [pdf, other

    cs.CL

    Correct Me If You Can: Learning from Error Corrections and Markings

    Authors: Julia Kreutzer, Nathaniel Berger, Stefan Riezler

    Abstract: Sequence-to-sequence learning involves a trade-off between signal strength and annotation cost of training data. For example, machine translation data range from costly expert-generated translations that enable supervised learning, to weak quality-judgment feedback that facilitate reinforcement learning. We present the first user study on annotation cost and machine learnability for the less popul… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

    Comments: To appear at EAMT 2020 (Research Track)

  8. arXiv:1811.07767  [pdf, other

    cs.CV

    Injecting and removing malignant features in mammography with CycleGAN: Investigation of an automated adversarial attack using neural networks

    Authors: Anton S. Becker, Lukas Jendele, Ondrej Skopek, Nicole Berger, Soleen Ghafoor, Magda Marcon, Ender Konukoglu

    Abstract: $\textbf{Purpose}$ To train a cycle-consistent generative adversarial network (CycleGAN) on mammographic data to inject or remove features of malignancy, and to determine whether these AI-mediated attacks can be detected by radiologists. $\textbf{Material and Methods}… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Comments: To be presented at RSNA 2018

    MSC Class: 68T45

  9. arXiv:1108.5673  [pdf, ps, other

    physics.data-an cs.GR hep-ex

    Partial wave analysis at BES III harnessing the power of GPUs

    Authors: Niklaus Berger

    Abstract: Partial wave analysis is a core tool in hadron spectroscopy. With the high statistics data available at facilities such as the Beijing Spectrometer III, this procedure becomes computationally very expensive. We have successfully implemented a framework for performing partial wave analysis on graphics processors. We discuss the implementation, the parallel computing frameworks employed and the perf… ▽ More

    Submitted 29 August, 2011; originally announced August 2011.

    Comments: 6 pages, 2 figures, prepared for the proceedings of Computing in High Energy Physics (CHEP) 2010

  10. arXiv:cs/0701198  [pdf, ps, other

    cs.NI

    Fitting the WHOIS Internet data

    Authors: R. M. D'Souza, C. Borgs, J. T. Chayes, N. Berger, R. D. Kleinberg

    Abstract: We consider the RIPE WHOIS Internet data as characterized by the Cooperative Association for Internet Data Analysis (CAIDA), and show that the Tempered Preferential Attachment model [1] provides an excellent fit to this data. [1] D'Souza, Borgs, Chayes, Berger and Kleinberg, to appear PNAS USA, 2007.

    Submitted 30 January, 2007; originally announced January 2007.

    Comments: Supplemental information for "Emergence of Tempered Preferential Attachment From Optimization", to appear (open access) PNAS USA, 2007

  11. arXiv:math/0611666  [pdf, ps, other

    math.PR cs.DM math-ph

    Anomalous heat-kernel decay for random walk among bounded random conductances

    Authors: Noam Berger, Marek Biskup, Christopher E. Hoffman, Gady Kozma

    Abstract: We consider the nearest-neighbor simple random walk on $\Z^d$, $d\ge2$, driven by a field of bounded random conductances $ω_{xy}\in[0,1]$. The conductance law is i.i.d. subject to the condition that the probability of $ω_{xy}>0$ exceeds the threshold for bond percolation on $\Z^d$. For environments in which the origin is connected to infinity by bonds with positive conductances, we study the dec… ▽ More

    Submitted 26 June, 2007; v1 submitted 21 November, 2006; originally announced November 2006.

    Comments: 22 pages. Includes a self-contained proof of isoperimetric inequality for supercritical percolation clusters. Version to appear in AIHP + additional corrections

    MSC Class: 60G50; 58J35; 80A20

    Journal ref: Ann. Inst. H. Poincare Probab. Statist. 274 (2008), no. 2, 374-392

  12. arXiv:cond-mat/0502205  [pdf, ps, other

    cond-mat.dis-nn cond-mat.stat-mech cs.NI math.PR

    Degree Distribution of Competition-Induced Preferential Attachment Graphs

    Authors: N. Berger, C. Borgs, J. T. Chayes, R. M. D'Souza, R. D. Kleinberg

    Abstract: We introduce a family of one-dimensional geometric growth models, constructed iteratively by locally optimizing the tradeoffs between two competing metrics, and show that this family is equivalent to a family of preferential attachment random graph models with upper cutoffs. This is the first explanation of how preferential attachment can arise from a more basic underlying mechanism of local com… ▽ More

    Submitted 8 February, 2005; v1 submitted 8 February, 2005; originally announced February 2005.

    Comments: 24 pages, one figure. To appear in the journal: Combinatorics, Probability and Computing. Note, this is a long version, with complete proofs, of the paper "Competition-Induced Preferential Attachment" (cond-mat/0402268)

  13. arXiv:cond-mat/0402268  [pdf, ps, other

    cond-mat.stat-mech cond-mat.dis-nn cs.NI

    Competition-Induced Preferential Attachment

    Authors: N. Berger, C. Borgs, J. T. Chayes, R. M. D'Souza, R. D. Kleinberg

    Abstract: Models based on preferential attachment have had much success in reproducing the power law degree distributions which seem ubiquitous in both natural and engineered systems. Here, rather than assuming preferential attachment, we give an explanation of how it can arise from a more basic underlying mechanism of competition between opposing forces. We introduce a family of one-dimensional geometr… ▽ More

    Submitted 10 February, 2004; originally announced February 2004.

    Comments: Submitted to Intnl. Colloq. on Automata, Languages and Programming (ICALP 2004)

    Journal ref: Proceedings of the 31st International Colloquium on Automata, Languages and Programming, 208-221 (2004).