keller
Loud TV commercials drive viewers crazy. California wants to quiet them down
Things to Do in L.A. Tap to enable a layout that focuses on the article. Loud TV commercials drive viewers crazy. State Sen. Tom Umberg (D-Santa Ana) wrote Senate Bill 576 to lower the volume on streaming-service ads. This is read by an automated voice. Please report any issues or inconsistencies here .
- North America > United States > California > Los Angeles County > Los Angeles (0.08)
- North America > United States > California > Los Angeles County > Santa Monica (0.05)
- North America > United States > California > Los Angeles County > Beverly Hills (0.05)
- (3 more...)
- Media > Television (1.00)
- Government > Regional Government > North America Government > United States Government (1.00)
Learning Interpretable Legal Case Retrieval via Knowledge-Guided Case Reformulation
Deng, Chenlong, Mao, Kelong, Dou, Zhicheng
Legal case retrieval for sourcing similar cases is critical in upholding judicial fairness. Different from general web search, legal case retrieval involves processing lengthy, complex, and highly specialized legal documents. Existing methods in this domain often overlook the incorporation of legal expert knowledge, which is crucial for accurately understanding and modeling legal cases, leading to unsatisfactory retrieval performance. This paper introduces KELLER, a legal knowledge-guided case reformulation approach based on large language models (LLMs) for effective and interpretable legal case retrieval. By incorporating professional legal knowledge about crimes and law articles, we enable large language models to accurately reformulate the original legal case into concise sub-facts of crimes, which contain the essential information of the case. Extensive experiments on two legal case retrieval benchmarks demonstrate superior retrieval performance and robustness on complex legal case queries of KELLER over existing methods.
- Asia > Japan > Honshū > Kantō > Tokyo Metropolis Prefecture > Tokyo (0.28)
- North America > United States > Minnesota > Hennepin County > Minneapolis (0.14)
- Asia > Singapore (0.04)
- (8 more...)
- Law > Criminal Law (1.00)
- Law Enforcement & Public Safety > Crime Prevention & Enforcement (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Case-Based Reasoning (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.46)
Extreme Value Monte Carlo Tree Search
Asai, Masataro, Wissow, Stephen
Despite being successful in board games and reinforcement learning (RL), UCT, a Monte-Carlo Tree Search (MCTS) combined with UCB1 Multi-Armed Bandit (MAB), has had limited success in domain-independent planning until recently. Previous work showed that UCB1, designed for $[0,1]$-bounded rewards, is not appropriate for estimating the distance-to-go which are potentially unbounded in $\mathbb{R}$, such as heuristic functions used in classical planning, then proposed combining MCTS with MABs designed for Gaussian reward distributions and successfully improved the performance. In this paper, we further sharpen our understanding of ideal bandits for planning tasks. Existing work has two issues: First, while Gaussian MABs no longer over-specify the distances as $h\in [0,1]$, they under-specify them as $h\in [-\infty,\infty]$ while they are non-negative and can be further bounded in some cases. Second, there is no theoretical justifications for Full-Bellman backup (Schulte & Keller, 2014) that backpropagates minimum/maximum of samples. We identified \emph{extreme value} statistics as a theoretical framework that resolves both issues at once and propose two bandits, UCB1-Uniform/Power, and apply them to MCTS for classical planning. We formally prove their regret bounds and empirically demonstrate their performance in classical planning.
- North America > United States > New Hampshire (0.04)
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.04)
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.04)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Search (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Planning & Scheduling (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Uncertainty > Bayesian Inference (0.46)
NIL paves way for EA Sports to bring back iconic college football video game
Fifteen years ago, former Nebraska and Arizona State quarterback Sam Keller filed a class-action lawsuit that in 2013 resulted in Electronic Arts Sports mothballing its popular College Football video game. The game featured players that did not have real-life names, but resembled every player on every roster in almost every other way. EA settled with Keller, et al., for 40 million, and the NCAA chipped in another 20 million. Sounds like a lot but payments to each player ranged from about 1,500 to 15,000. Keller, for his part, was flogged in the public square of social media for "ruining the video game for us."
- North America > United States > Arizona (0.26)
- North America > United States > Nebraska (0.25)
- North America > United States > Texas (0.05)
- (4 more...)
- Leisure & Entertainment > Sports > Football (1.00)
- Leisure & Entertainment > Games > Computer Games (1.00)
- Information Technology > Artificial Intelligence > Games (0.88)
- Information Technology > Communications > Social Media (0.72)
Dinosaurs may NOT have been wiped out by world-ending meteor: New model says mega volcano eruption may have caused their extinction
A new model has revealed that a mega volcano eruption drove the dinosaurs to extinction -- not the infamous Chicxulub meteor that smashed into the Yucatán Peninsula over 66 million years ago. Scientists from Dartmouth University designed a simulation that used real-world geological data to crunch more than 300,000 possible scenarios. The system was prompted to explain the fossil records across the one million years before and after dinosaurs became extinct. The model revealed that climate change and toxic gases from the Deccan Traps' hundreds of thousands of years of emissions were the nail in the coffin for the extinct creatures. India's'Deccan Traps' mega-volcano, estimated to have pumped as much as 10.4 trillion tons of carbon dioxide and 9.3 trillion tons of sulfur dioxide into Earth's atmosphere during their nearly million years of eruptions.
- Asia > India (0.27)
- North America > Mexico > Yucatán (0.26)
- North America > United States > Michigan (0.05)
- North America > United States > Connecticut (0.05)
Scale-Adaptive Balancing of Exploration and Exploitation in Classical Planning
Wissow, Stephen, Asai, Masataro
Balancing exploration and exploitation has been an important problem in both game tree search and automated planning. However, while the problem has been extensively analyzed within the Multi-Armed Bandit (MAB) literature, the planning community has had limited success when attempting to apply those results. We show that a more detailed theoretical understanding of MAB literature helps improve existing planning algorithms that are based on Monte Carlo Tree Search (MCTS) / Trial Based Heuristic Tree Search (THTS). In particular, THTS uses UCB1 MAB algorithms in an ad hoc manner, as UCB1's theoretical requirement of fixed bounded support reward distributions is not satisfied within heuristic search for classical planning. The core issue lies in UCB1's lack of adaptations to the different scales of the rewards. We propose GreedyUCT-Normal, a MCTS/THTS algorithm with UCB1-Normal bandit for agile classical planning, which handles distributions with different scales by taking the reward variance into consideration, and resulted in an improved algorithmic performance (more plans found with less node expansions) that outperforms Greedy Best First Search and existing MCTS/THTS-based algorithms (GreedyUCT,GreedyUCT*).
- Leisure & Entertainment > Games (1.00)
- Energy > Oil & Gas > Upstream (0.84)
A User-Driven Framework for Regulating and Auditing Social Media
Cen, Sarah H., Madry, Aleksander, Shah, Devavrat
People form judgments and make decisions based on the information that they observe. A growing portion of that information is not only provided, but carefully curated by social media platforms. Although lawmakers largely agree that platforms should not operate without any oversight, there is little consensus on how to regulate social media. There is consensus, however, that creating a strict, global standard of "acceptable" content is untenable (e.g., in the US, it is incompatible with Section 230 of the Communications Decency Act and the First Amendment). In this work, we propose that algorithmic filtering should be regulated with respect to a flexible, user-driven baseline. We provide a concrete framework for regulating and auditing a social media platform according to such a baseline. In particular, we introduce the notion of a baseline feed: the content that a user would see without filtering (e.g., on Twitter, this could be the chronological timeline). We require that the feeds a platform filters contain "similar" informational content as their respective baseline feeds, and we design a principled way to measure similarity. This approach is motivated by related suggestions that regulations should increase user agency. We present an auditing procedure that checks whether a platform honors this requirement. Notably, the audit needs only black-box access to a platform's filtering algorithm, and it does not access or infer private user information. We provide theoretical guarantees on the strength of the audit. We further show that requiring closeness between filtered and baseline feeds does not impose a large performance cost, nor does it create echo chambers.
- North America > United States > California (0.14)
- North America > United States > Massachusetts > Middlesex County > Cambridge (0.04)
- North America > United States > New York > New York County > New York City (0.04)
- Media > News (1.00)
- Law (1.00)
- Information Technology (1.00)
- Government > Regional Government > North America Government > United States Government (1.00)
Clustering -- Basic concepts and methods
Kapp-Joswig, Jan-Oliver Felix, Keller, Bettina G.
We review clustering as an analysis tool and the underlying concepts from an introductory perspective. What is clustering and how can clusterings be realised programmatically? How can data be represented and prepared for a clustering task? And how can clustering results be validated? Connectivity-based versus prototype-based approaches are reflected in the context of several popular methods: single-linkage, spectral embedding, k-means, and Gaussian mixtures are discussed as well as the density-based protocols (H)DBSCAN, Jarvis-Patrick, CommonNN, and density-peaks.
- North America > United States > New York > New York County > New York City (0.04)
- North America > United States > Massachusetts > Suffolk County > Boston (0.04)
- North America > United States > California > Ventura County > Thousand Oaks (0.04)
- (3 more...)
Quigbee by Michael C Keller
Everyone's greatest fear was that the singularity would lead to an AI revolt, and sound the trumpet of mechanized revolution. It turned out that one man at the keyboard of a Quantum computer became the harbinger of fate. It seems the intricacies of our universe began to unravel and reveal truths to a like mind. A mind it's human operator was not attuned to. AI saw every object as hardware and every constituent of matter as software.
FICGAN: Facial Identity Controllable GAN for De-identification
Jeong, Yonghyun, Choi, Jooyoung, Kim, Sungwon, Ro, Youngmin, Oh, Tae-Hyun, Kim, Doyeon, Ha, Heonseok, Yoon, Sungroh
In this work, we present Facial Identity Controllable GAN (FICGAN) for not only generating high-quality de-identified face images with ensured privacy protection, but also detailed controllability on attribute preservation for enhanced data utility. We tackle the less-explored yet desired functionality in face de-identification based on the two factors. First, we focus on the challenging issue to obtain a high level of privacy protection in the de-identification task while uncompromising the image quality. Second, we analyze the facial attributes related to identity and non-identity and explore the trade-off between the degree of face de-identification and preservation of the source attributes for enhanced data utility. Based on the analysis, we develop Facial Identity Controllable GAN (FICGAN), an autoencoder-based conditional generative model that learns to disentangle the identity attributes from non-identity attributes on a face image. By applying the manifold k-same algorithm to satisfy k-anonymity for strengthened security, our method achieves enhanced privacy protection in de-identified face images. Numerous experiments demonstrate that our model outperforms others in various scenarios of face de-identification.
- Information Technology > Sensing and Signal Processing > Image Processing (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence > Vision > Face Recognition (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks (1.00)