Zum Hauptinhalt springen

Showing 1–29 of 29 results for author: Thakoor, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.00118  [pdf, other

    cs.CL cs.AI

    Gemma 2: Improving Open Language Models at a Practical Size

    Authors: Gemma Team, Morgane Riviere, Shreya Pathak, Pier Giuseppe Sessa, Cassidy Hardin, Surya Bhupatiraju, Léonard Hussenot, Thomas Mesnard, Bobak Shahriari, Alexandre Ramé, Johan Ferret, Peter Liu, Pouya Tafti, Abe Friesen, Michelle Casbon, Sabela Ramos, Ravin Kumar, Charline Le Lan, Sammy Jerome, Anton Tsitsulin, Nino Vieillard, Piotr Stanczyk, Sertan Girgin, Nikola Momchev, Matt Hoffman , et al. (172 additional authors not shown)

    Abstract: In this work, we introduce Gemma 2, a new addition to the Gemma family of lightweight, state-of-the-art open models, ranging in scale from 2 billion to 27 billion parameters. In this new version, we apply several known technical modifications to the Transformer architecture, such as interleaving local-global attentions (Beltagy et al., 2020a) and group-query attention (Ainslie et al., 2023). We al… ▽ More

    Submitted 2 August, 2024; v1 submitted 31 July, 2024; originally announced August 2024.

  2. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1110 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 8 August, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  3. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  4. arXiv:2308.09198  [pdf, other

    cs.LG cs.SI

    Half-Hop: A graph upsampling approach for slowing down message passing

    Authors: Mehdi Azabou, Venkataramana Ganesh, Shantanu Thakoor, Chi-Heng Lin, Lakshmi Sathidevi, Ran Liu, Michal Valko, Petar Veličković, Eva L. Dyer

    Abstract: Message passing neural networks have shown a lot of success on graph-structured data. However, there are many instances where message passing can lead to over-smoothing or fail when neighboring nodes belong to different classes. In this work, we introduce a simple yet general framework for improving learning in message passing neural networks. Our approach essentially upsamples edges in the origin… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: Published as a conference paper at ICML 2023

  5. arXiv:2305.00654  [pdf, other

    cs.LG cs.AI

    Representations and Exploration for Deep Reinforcement Learning using Singular Value Decomposition

    Authors: Yash Chandak, Shantanu Thakoor, Zhaohan Daniel Guo, Yunhao Tang, Remi Munos, Will Dabney, Diana L Borsa

    Abstract: Representation learning and exploration are among the key challenges for any deep reinforcement learning agent. In this work, we provide a singular value decomposition based method that can be used to obtain representations that preserve the underlying transition structure in the domain. Perhaps interestingly, we show that these representations also capture the relative frequency of state visitati… ▽ More

    Submitted 2 May, 2023; v1 submitted 1 May, 2023; originally announced May 2023.

    Comments: Accepted at the 40th International Conference on Machine Learning (ICML 2023)

  6. arXiv:2303.08811  [pdf, other

    cs.LG cs.RO

    Relax, it doesn't matter how you get there: A new self-supervised approach for multi-timescale behavior analysis

    Authors: Mehdi Azabou, Michael Mendelson, Nauman Ahad, Maks Sorokin, Shantanu Thakoor, Carolina Urzay, Eva L. Dyer

    Abstract: Natural behavior consists of dynamics that are complex and unpredictable, especially when trying to predict many steps into the future. While some success has been found in building representations of behavior under constrained or simplified task-based conditions, many of these models cannot be applied to free and naturalistic settings where behavior becomes increasingly hard to model. In this wor… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2206.07041

  7. arXiv:2212.03319  [pdf, other

    cs.LG cs.AI

    Understanding Self-Predictive Learning for Reinforcement Learning

    Authors: Yunhao Tang, Zhaohan Daniel Guo, Pierre Harvey Richemond, Bernardo Ávila Pires, Yash Chandak, Rémi Munos, Mark Rowland, Mohammad Gheshlaghi Azar, Charline Le Lan, Clare Lyle, András György, Shantanu Thakoor, Will Dabney, Bilal Piot, Daniele Calandriello, Michal Valko

    Abstract: We study the learning dynamics of self-predictive learning for reinforcement learning, a family of algorithms that learn representations by minimizing the prediction error of their own future latent representations. Despite its recent empirical success, such algorithms have an apparent defect: trivial representations (such as constants) minimize the prediction error, yet it is obviously undesirabl… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.

  8. arXiv:2206.08736  [pdf, other

    stat.ML cs.LG

    Generalised Policy Improvement with Geometric Policy Composition

    Authors: Shantanu Thakoor, Mark Rowland, Diana Borsa, Will Dabney, Rémi Munos, André Barreto

    Abstract: We introduce a method for policy improvement that interpolates between the greedy approach of value-based reinforcement learning (RL) and the full planning approach typical of model-based RL. The new method builds on the concept of a geometric horizon model (GHM, also known as a gamma-model), which models the discounted state-visitation distribution of a given policy. We show that we can evaluate… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: ICML 2022

  9. arXiv:2206.08332  [pdf, other

    cs.LG cs.AI stat.ML

    BYOL-Explore: Exploration by Bootstrapped Prediction

    Authors: Zhaohan Daniel Guo, Shantanu Thakoor, Miruna Pîslar, Bernardo Avila Pires, Florent Altché, Corentin Tallec, Alaa Saade, Daniele Calandriello, Jean-Bastien Grill, Yunhao Tang, Michal Valko, Rémi Munos, Mohammad Gheshlaghi Azar, Bilal Piot

    Abstract: We present BYOL-Explore, a conceptually simple yet general approach for curiosity-driven exploration in visually-complex environments. BYOL-Explore learns a world representation, the world dynamics, and an exploration policy all-together by optimizing a single prediction loss in the latent space with no additional auxiliary objective. We show that BYOL-Explore is effective in DM-HARD-8, a challeng… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  10. arXiv:2206.07041  [pdf, other

    cs.LG

    Learning Behavior Representations Through Multi-Timescale Bootstrapping

    Authors: Mehdi Azabou, Michael Mendelson, Maks Sorokin, Shantanu Thakoor, Nauman Ahad, Carolina Urzay, Eva L. Dyer

    Abstract: Natural behavior consists of dynamics that are both unpredictable, can switch suddenly, and unfold over many different timescales. While some success has been found in building representations of behavior under constrained or simplified task-based conditions, many of these models cannot be applied to free and naturalistic settings due to the fact that they assume a single scale of temporal dynamic… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

  11. arXiv:2206.02198  [pdf, ps, other

    cs.IT

    A Quasi-Uniform Approach to Characterizing the Boundary of the Almost Entropic Region

    Authors: Satyajit Thakor, Dauood Saleem

    Abstract: The convex closure of entropy vectors for quasi-uniform random vectors is the same as the closure of the entropy region. Thus, quasi-uniform random vectors constitute an important class of random vectors for characterizing the entropy region. Moreover, the one-to-one correspondence between quasi-uniform codes and quasi-uniform random vectors makes quasi-uniform random vectors of central importance… ▽ More

    Submitted 5 June, 2022; originally announced June 2022.

    Comments: 5 pages

  12. arXiv:2112.06276  [pdf, other

    cs.LG cs.CR

    Quantifying and Understanding Adversarial Examples in Discrete Input Spaces

    Authors: Volodymyr Kuleshov, Evgenii Nikishin, Shantanu Thakoor, Tingfung Lau, Stefano Ermon

    Abstract: Modern classification algorithms are susceptible to adversarial examples--perturbations to inputs that cause the algorithm to produce undesirable behavior. In this work, we seek to understand and extend adversarial examples across domains in which inputs are discrete, particularly across new domains, such as computational biology. As a step towards this goal, we formalize a notion of synonymous ad… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

  13. arXiv:2107.09422  [pdf, other

    cs.LG cs.AI cs.SI stat.ML

    Large-scale graph representation learning with very deep GNNs and self-supervision

    Authors: Ravichandra Addanki, Peter W. Battaglia, David Budden, Andreea Deac, Jonathan Godwin, Thomas Keck, Wai Lok Sibon Li, Alvaro Sanchez-Gonzalez, Jacklynn Stott, Shantanu Thakoor, Petar Veličković

    Abstract: Effectively and efficiently deploying graph neural networks (GNNs) at scale remains one of the most challenging aspects of graph representation learning. Many powerful solutions have only ever been validated on comparatively small datasets, often with counter-intuitive outcomes -- a barrier which has been broken by the Open Graph Benchmark Large-Scale Challenge (OGB-LSC). We entered the OGB-LSC wi… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: To appear at KDD Cup 2021. 13 pages, 3 figures. All authors contributed equally

  14. arXiv:2102.06514  [pdf, other

    cs.LG cs.SI stat.ML

    Large-Scale Representation Learning on Graphs via Bootstrapping

    Authors: Shantanu Thakoor, Corentin Tallec, Mohammad Gheshlaghi Azar, Mehdi Azabou, Eva L. Dyer, Rémi Munos, Petar Veličković, Michal Valko

    Abstract: Self-supervised learning provides a promising path towards eliminating the need for costly label information in representation learning on graphs. However, to achieve state-of-the-art performance, methods often need large numbers of negative examples and rely on complex augmentations. This can be prohibitively expensive, especially for large graphs. To address these challenges, we introduce Bootst… ▽ More

    Submitted 20 February, 2023; v1 submitted 12 February, 2021; originally announced February 2021.

    Comments: Published as a conference paper at ICLR 2022

  15. arXiv:2101.02055  [pdf, other

    cs.LG

    Geometric Entropic Exploration

    Authors: Zhaohan Daniel Guo, Mohammad Gheshlaghi Azar, Alaa Saade, Shantanu Thakoor, Bilal Piot, Bernardo Avila Pires, Michal Valko, Thomas Mesnard, Tor Lattimore, Rémi Munos

    Abstract: Exploration is essential for solving complex Reinforcement Learning (RL) tasks. Maximum State-Visitation Entropy (MSVE) formulates the exploration problem as a well-defined policy optimization problem whose solution aims at visiting all states as uniformly as possible. This is in contrast to standard uncertainty-based approaches where exploration is transient and eventually vanishes. However, exis… ▽ More

    Submitted 7 January, 2021; v1 submitted 6 January, 2021; originally announced January 2021.

  16. arXiv:2011.09464  [pdf, other

    cs.LG

    Counterfactual Credit Assignment in Model-Free Reinforcement Learning

    Authors: Thomas Mesnard, Théophane Weber, Fabio Viola, Shantanu Thakoor, Alaa Saade, Anna Harutyunyan, Will Dabney, Tom Stepleton, Nicolas Heess, Arthur Guez, Éric Moulines, Marcus Hutter, Lars Buesing, Rémi Munos

    Abstract: Credit assignment in reinforcement learning is the problem of measuring an action's influence on future rewards. In particular, this requires separating skill from luck, i.e. disentangling the effect of an action on rewards from that of external factors and subsequent actions. To achieve this, we adapt the notion of counterfactuals from causality theory to a model-free RL setup. The key idea is to… ▽ More

    Submitted 14 December, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

  17. On the Partition Bound for Undirected Unicast Network Information Capacity

    Authors: Mohammad Ishtiyaq Qureshi, Satyajit Thakor

    Abstract: One of the important unsolved problems in information theory is the conjecture that network coding has no rate benefit over routing in undirected unicast networks. Three known bounds on the symmetric rate in undirected unicast information networks are the sparsest cut, the LP bound and the partition bound. In this paper, we present three results on the partition bound. We show that the decision ve… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

    Comments: ISIT'20 (c) 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  18. Undirected Unicast Network Capacity: A Partition Bound

    Authors: Satyajit Thakor, Mohammad Ishtiyaq Qureshi

    Abstract: In this paper, we present a new technique to obtain upper bounds on undirected unicast network information capacity. Using this technique, we characterize an upper bound, called partition bound, on the symmetric rate of information flow in undirected unicast networks and give an algorithm to compute it. Two classes of networks are presented for which the bound is tight and the capacity is achievab… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

    Comments: ISIT'19 (c) 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  19. On Characterization of Entropic Vectors at the Boundary of Almost Entropic Cones

    Authors: Hitika Tiwari, Satyajit Thakor

    Abstract: The entropy region is a fundamental object in information theory. An outer bound for the entropy region is defined by a minimal set of Shannon-type inequalities called elemental inequalities also referred to as the Shannon region. This paper focuses on characterization of the entropic points at the boundary of the Shannon region for three random variables. The proper faces of the Shannon region fo… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

    Comments: ITW'19 (c) 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  20. arXiv:1807.08573  [pdf, other

    cs.IT

    On Enumerating Distributions for Associated Vectors in the Entropy Space

    Authors: Sultan Alam, Satyajit Thakor, Syed Abbas

    Abstract: This paper focuses on the problem of finding a distribution for an associated entropic vector in the entropy space nearest to a given, possibly non-entropic, target vector for random variables with a constraint on alphabet size. We show the feasibility to find distribution for associated vector via a sequence of perturbations in the probability mass function. Then we present an algorithm for numer… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

    Comments: ISITA2018, extended version

  21. arXiv:1706.03513  [pdf, ps, other

    cs.IT

    A Minimal Set of Shannon-type Inequalities for Functional Dependence Structures

    Authors: Satyajit Thakor, Terence Chan, Alex Grant

    Abstract: The minimal set of Shannon-type inequalities (referred to as elemental inequalities), plays a central role in determining whether a given inequality is Shannon-type. Often, there arises a situation where one needs to check whether a given inequality is a constrained Shannon-type inequality. Another important application of elemental inequalities is to formulate and compute the Shannon outer bound… ▽ More

    Submitted 12 June, 2017; originally announced June 2017.

    Comments: 5 pagers, accepted ISIT2017

  22. arXiv:1607.02822  [pdf, other

    cs.IT

    Capacity Bounds for Networks with Correlated Sources and Characterisation of Distributions by Entropies

    Authors: Satyajit Thakor, Terence Chan, Alex Grant

    Abstract: Characterising the capacity region for a network can be extremely difficult. Even with independent sources, determining the capacity region can be as hard as the open problem of characterising all information inequalities. The majority of computable outer bounds in the literature are relaxations of the Linear Programming bound which involves entropy functions of random variables related to the sou… ▽ More

    Submitted 11 July, 2016; originally announced July 2016.

    Comments: 24 pager, 1 figure, submitted to IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:1309.1517

  23. arXiv:1602.03618  [pdf, other

    cs.IT

    Characterising Probability Distributions via Entropies

    Authors: Satyajit Thakor, Terence Chan, Alex Grant

    Abstract: Characterising the capacity region for a network can be extremely difficult, especially when the sources are dependent. Most existing computable outer bounds are relaxations of the Linear Programming bound. One main challenge to extend linear program bounds to the case of correlated sources is the difficulty (or impossibility) of characterising arbitrary dependencies via entropy functions. This pa… ▽ More

    Submitted 11 February, 2016; v1 submitted 11 February, 2016; originally announced February 2016.

    Comments: 5 pages, 1 figure

  24. arXiv:1601.06686  [pdf, other

    cs.IT

    Upper Bounds on the Capacity of 2-Layer $N$-Relay Symmetric Gaussian Network

    Authors: Satyajit Thakor, Syed Abbas

    Abstract: The Gaussian parallel relay network, in which two parallel relays assist a source to convey information to a destination, was introduced by Schein and Gallager. An upper bound on the capacity can be obtained by considering broadcast cut between the source and relays and multiple access cut between relays and the destination. Niesen and Diggavi derived an upper bound for Gaussian parallel $N$-relay… ▽ More

    Submitted 12 April, 2016; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: submitted to ISITA2016

  25. arXiv:1309.1517  [pdf, other

    cs.IT

    On the Capacity of Networks with Correlated Sources

    Authors: Satyajit Thakor, Terence Chan, Alex Grant

    Abstract: Characterizing the capacity region for a network can be extremely difficult. Even with independent sources, determining the capacity region can be as hard as the open problem of characterizing all information inequalities. The majority of computable outer bounds in the literature are relaxations of the Linear Programming bound which involves entropy functions of random variables related to the sou… ▽ More

    Submitted 5 September, 2013; originally announced September 2013.

  26. Cut-Set Bounds on Network Information Flow

    Authors: Satyajit Thakor, Alex Grant, Terence Chan

    Abstract: Explicit characterization of the capacity region of communication networks is a long standing problem. While it is known that network coding can outperform routing and replication, the set of feasible rates is not known in general. Characterizing the network coding capacity region requires determination of the set of all entropic vectors. Furthermore, computing the explicitly known linear programm… ▽ More

    Submitted 10 February, 2016; v1 submitted 16 May, 2013; originally announced May 2013.

    Comments: to appear in IEEE Transactions on Information Theory

  27. arXiv:1305.3358  [pdf, other

    cs.IT

    Symmetry in Distributed Storage Systems

    Authors: Satyajit Thakor, Terence Chan, Kenneth W. Shum

    Abstract: The max-flow outer bound is achievable by regenerating codes for functional repair distributed storage system. However, the capacity of exact repair distributed storage system is an open problem. In this paper, the linear programming bound for exact repair distributed storage systems is formulated. A notion of symmetrical sets for a set of random variables is given and equalities of joint entropie… ▽ More

    Submitted 15 May, 2013; originally announced May 2013.

    Comments: Accepted, ISIT 2013

  28. arXiv:1201.2231  [pdf, other

    cs.IT

    Reduced Functional Dependence Graph and Its Applications

    Authors: Xiaoli Xu, Satyajit Thakor, Yong Liang Guan

    Abstract: Functional dependence graph (FDG) is an important class of directed graph that captures the dominance relationship among a set of variables. FDG is frequently used in calculating network coding capacity bounds. However, the order of FDG is usually much larger than the original network and the computational complexity of many bounds grows exponentially with the order of FDG. In this paper, we intro… ▽ More

    Submitted 9 March, 2012; v1 submitted 10 January, 2012; originally announced January 2012.

  29. arXiv:0901.4612  [pdf, other

    cs.IT

    Network Coding Capacity: A Functional Dependence Bound

    Authors: Satyajit Thakor, Alex Grant, Terence Chan

    Abstract: Explicit characterization and computation of the multi-source network coding capacity region (or even bounds) is long standing open problem. In fact, finding the capacity region requires determination of the set of all entropic vectors $Γ^{*}$, which is known to be an extremely hard problem. On the other hand, calculating the explicitly known linear programming bound is very hard in practice due… ▽ More

    Submitted 29 January, 2009; originally announced January 2009.

    Comments: 5 pages, 2 figures, submitted to the International Symposium on Information Theory 2009