robench-2024b
Collection
48 items • Updated
text_with_holes stringlengths 390 2.35k | text_candidates stringlengths 81 848 | A stringclasses 6
values | B stringclasses 6
values | C stringclasses 6
values | D stringclasses 6
values | label stringclasses 4
values |
|---|---|---|---|---|---|---|
For Heterogeneous Stock Mice data set, ground truth is also available so that we could evaluate the methods based on the area under their ROC Curve as Figure 6. <|MaskedSetence|> The second best model is MCP with the area of 0.604. <|MaskedSetence|> The areas of the remaining models are all around 0.5, showing little... | **A**: The results are interesting: the left side of the figure mostly consists of traits regarding glucose and insulin in the mice, while the right side of the figure consists of traits related to immunity.
**B**: The areas under ROC of Tree-Lasso, Lasso and SCAD are 0.582, 0.591 and 0.590 respectively.
**C**: TgSLM... | CBA | CBA | ACB | CBA | Selection 1 |
The MIIV-2SLS estimator would be greatly strengthened if we knew which specific MIIVs in those equations are invalid or weak. The current manuscript’s unique contribution to the SEM estimation literature is to provide a variant of MIIV-Bayesian Model Averaging for Model Implied Instrumental Variable Two Stage Least S... | **A**: Finally, we present an empirical example demonstrating the use of MIIV-2SBMA for estimating a two factor CFA and determining which error covariances need to be included.
.
**B**: We conduct a series of Monte Carlo experiments to evaluate the performance of MIIV-2SBMA and our misspecification tests, and demonst... | CAB | CBA | CBA | CBA | Selection 3 |
A crucial decision in the design of world models is the inclusion of stochasticity. Although Atari is known to be a deterministic environment, it is stochastic given only a limited horizon of past observed frames (in our case 4444 frames). <|MaskedSetence|> The game dispatches diverse sets of new opponents, which can... | **A**: The level of stochasticity is game dependent; however, it can be observed in many Atari games.
An example of such behavior can be observed in the game Kung Fu Master – after eliminating the current set of opponents, the game screen always looks the same (it contains only player’s character and the background).
... | ACB | BAC | ACB | ACB | Selection 1 |
2 HISTORY OF THE BATTLE OF KURSK
After suffering a terrible defeat at Stalingrad in the winter of 1943, the Germans desperately wanted to regain the initiative. <|MaskedSetence|> The Germans planned in a classic pincer operation named Operation Citadel, to eliminate the salient and destroy the Soviet forces in it. ... | **A**: In the spring of 1943, the Eastern front was conquered by a salient, 200 km wide and 150 km deep, centred on the city of Kursk.
**B**: The victory of Kursk must be a blazing torch to the world" [22, 24, 42].
.
**C**: On 2 July 1943, Hitler declared, "This attack is of decisive importance and it must succeed, a... | ACB | ACB | ABC | ACB | Selection 1 |
The applied literature suggests manipulation in RD designs occurs frequently (e.g. Angrist et al.,, 2019; Davis et al.,, 2013; Dee et al.,, 2019). Yet, there is comparatively little clarity on how to proceed when these tests indicate manipulation. One method used in empirical work is the donut hole RD design (such as i... | **A**: The donut RD design deletes data within a window around the cutoff, with the goal being to remove all manipulated observations.
**B**: They consider Swedish math test data in which there is evidence of teachers inflating students’ grades.
**C**: While their focus is on a different causal effect than the one we... | ABC | ACB | ABC | ABC | Selection 3 |
II-A Dropout
Deep neural networks are the state of the art learning models used in artificial intelligence. The large number of parameters in neural networks make them very good at modelling and approximating any arbitrary function. <|MaskedSetence|> Dropout was first introduced in 2012 as a regularization techniqu... | **A**: The term Dropout methods was used to refer to them in general[14].
**B**: They include variational Dropout[15], Max-pooling Dropout[16], fast Dropout[17], Cutout[18], Monte Carlo Dropout[19], Concrete Dropout[20] and many others..
**C**: However the larger number of parameters also make them particularly prone... | CAB | CAB | CAB | CBA | Selection 1 |
Following Fernández-Delgado et al. <|MaskedSetence|> Afterward, the number of training examples is limited to nlimitsubscript𝑛limitn_{\text{limit}}italic_n start_POSTSUBSCRIPT limit end_POSTSUBSCRIPT examples per class. We evaluate the training with 5555, 10101010, 20202020, and 50505050 examples per class.
In contra... | **A**: (2014), each dataset is split into a training and a test set using a 50/50 split while maintaining the label distribution.
**B**: (2014), we extract validation sets from the training set (e.g., for hyperparameter tuning).
**C**: For some datasets which provide a separate test set, the test accuracy is evaluate... | ABC | ABC | ABC | ABC | Selection 2 |
Broadly speaking, our work is related to a vast body of work on value-based reinforcement learning in tabular (Jaksch et al., 2010; Osband et al., 2014; Osband and Van Roy, 2016; Azar et al., 2017; Dann et al., 2017; Strehl et al., 2006; Jin et al., 2018) and linear settings (Yang and Wang, 2019b, a; Jin et al., 2019;... | **A**: In comparison, we focus on policy-based reinforcement learning, which is significantly less studied in theory.
**B**: Despite the differences between policy-based and value-based reinforcement learning, our work shows that the general principle of “optimism in the face of uncertainty” (Auer et al., 2002; Bubeck... | CAB | CAB | CAB | ABC | Selection 2 |
Other recent approaches include DimReader [45], where the authors create so-called generalized axes for non-linear DR methods, but besides explaining a single dimension at a time, it is currently unclear how exactly it can be used in an interactive exploration scenario; and
Praxis [46], with two methods—backward and fo... | **A**: In summary, although there is a superficial similarity between the two techniques regarding how the user interacts with the scatterplot, their goals and their inner workings are quite different.
**B**: In our Dimension Correlation tool, the user also draws a polyline to identify a shape, but our intention is ex... | BCA | BCA | BCA | ACB | Selection 1 |
However, the existing methods are limited to graph type data while no graph is provided for general data clustering. Since a large proportion of clustering methods are based on the graph, it is reasonable to consider how to employ GCN to promote the performance of graph-based clustering methods.
In this paper, we propo... | **A**: We analyze the degeneration theoretically and experimentally to understand the phenomenon.
**B**: The main contributions are listed as follows:
(1) Via extending the generative graph models into general type data, GAE is naturally employed as the basic representation learning model and weighted graphs can be fu... | BAC | BAC | CBA | BAC | Selection 1 |
Traditionally, the literature has concentrated on estimation and inference in low-dimensional settings where p𝑝pitalic_p is fixed. Recent years, however, have witnessed considerable progress in the understanding and analysis of high-dimensional additive models that allow the number of components to grow with the sampl... | **A**: Approaches to construct confidence bands have been proposed by Härdle (1989), Sun and Loader (1994), Fan and Zhang (2000), Claeskens and Keilegom (2003) and Zhang and Peng (2010), but only in the widely studied fixed-dimensional setting.
**B**: While the number of parameters or covariates exceed the sample size... | BAC | BAC | BAC | BCA | Selection 2 |
<|MaskedSetence|> Finally, E1 suggested that the circular barcharts could only show the positive or negative difference compared to the first stored stack. To avoid an asymmetric design and retain a lower complexity level for StackGenVis, we omitted his proposal for the time being, but we consider implementing both me... | **A**: Efficiency and scalability were the major concerns raised by all the experts.
**B**: Also, the use of VA in between levels makes this even worse.
We believe that, with the rapid development of high-performance hardware and support for parallelism, these challenges are due to diminish in the near future..
**C**... | BAC | CAB | CAB | CAB | Selection 4 |
Szepesvári, 2018; Dalal et al., 2018; Srikant and Ying, 2019) settings. See Dann et al. <|MaskedSetence|> Also, when the value function approximator is linear, Melo et al. (2008); Zou et al. <|MaskedSetence|> (2019b) study the convergence of Q-learning. When the value function approximator is nonlinear, TD possibly d... | **A**: (2019); Chen et al.
**B**: (2014) for a detailed survey.
**C**: Specifically, the previous mean-field analysis casts SGD as the Wasserstein gradient flow of an energy functional, which corresponds to the objective function in supervised learning.
| BAC | BAC | BAC | BAC | Selection 4 |
The structure of the work is the following: in Sec. <|MaskedSetence|> 3 we then proceed to present and develop the methodology to assess the uncertainty associated with these FCSIs.
Finally, in Sec. 4 we tackle the motivating problem: moving from [17], we extend their results by providing, using the previously develop... | **A**: 2 we provide an extension to the theory and we define a new set of Finite Change Sensitivity Indices (FCSIs) for functional-valued responses, while in Sec.
**B**: Sec.
**C**: 5 concludes and devises additional research directions.
In the Supplementary Material to this paper the interested reader can find an ... | ABC | BAC | ABC | ABC | Selection 4 |
In this case, the sparsity assumption
Lin and Zhang (2006); Meier et al. <|MaskedSetence|> <|MaskedSetence|> (2010); Raskutti et al. <|MaskedSetence|> (2011); Chen et al. (2018)
may enable consistent estimation of the regression function.
Nevertheless, general sparse estimators, when applied to a vectorized tensor c... | **A**: (2009); Ravikumar et al.
**B**: (2009); Huang et al.
**C**: (2012); Fan et al.
| CBA | ABC | ABC | ABC | Selection 4 |
Nonstationary bandits
Bandit problems can be viewed as a special case of MDP problems with unit planning horizon. It is the simplest model that captures the exploration-exploitation tradeoff, a unique feature of sequential decision-making problems. There are several ways to define nonstationarity in the bandit literat... | **A**: Note that naïvely adapting existing nonstationary bandit algorithms to nonstationary RL leads to regret bounds with exponential dependence on the planing horizon H𝐻Hitalic_H.
.
**B**: The general strategy to adapt to nonstationarity
for bandit problems is the forgetting principle: run the algorithm designed fo... | BCA | BCA | BCA | CBA | Selection 3 |
<|MaskedSetence|> They aren’t really separating into nuisance and independent only.. they are also throwing away nuisance.
While the aforementioned models made significant progress on the problem, they suffer from an inherent trade-off between learning DR and reconstruction quality. If the latent space is heavily re... | **A**: On the other hand, if the unconstrained nuisance variables have enough capacity, the model can use them to achieve a high quality reconstruction while ignoring the latent variables related to the disentangled factors.
**B**: This phenomena is sometimes called the "shortcut problem" and has been discussed in pre... | CAB | CAB | ACB | CAB | Selection 2 |
Another relevant factor is interpretability of the set of selected views. Although sparser models are typically considered more interpretable, a researcher may be interested in interpreting not only the model and its coefficients, but also the set of selected views. For example, one may wish to make decisions on which ... | **A**: However, strict control of such an error rate could end up harming the predictive performance of the model, thus leading to a trade-off between the interpretability of the set of selected views and classification accuracy.
.
**B**: If the primary concern is sparsity, a researcher may be satisfied with just one... | CBA | ACB | CBA | CBA | Selection 4 |
CB-MNL enforces optimism via an optimistic parameter search (e.g. in Abbasi-Yadkori et al. [2011]), which is in contrast to the use of an exploration bonus as seen in Faury et al. <|MaskedSetence|> <|MaskedSetence|> <|MaskedSetence|> In non-linear reward models, both approaches may not follow similar trajectory bu... | **A**: Optimistic parameter search provides a cleaner description of the learning strategy.
**B**: [2010].
**C**: [2020], Filippi et al.
| CBA | CBA | CAB | CBA | Selection 2 |
With crossover, random pairs of underperforming models (originating from the same algorithm) are picked and their hyperparameters are fused with the goal of creating a better model. <|MaskedSetence|> It facilitates scanning for external regions of the solution space to discover additional local optima. These unexplore... | **A**: However, one question that emerges is: (RQ1) how to choose which models (and algorithms) should crossover and/or mutate, and to what extent, considering we have limited computational resources?
Various automatic ML methods [FH19] and practical frameworks [Com, NNI] have been proposed to deal with the challenge... | CBA | CBA | CAB | CBA | Selection 4 |
In this paper, we extend the symmetric Laplacian inverse matrix (SLIM) method (SLIM, ) to mixed membership networks and call this proposed method as mixed-SLIM. <|MaskedSetence|> SLIM combined the SLIM with the spectral method based on DCSBM for community detection. And the SLIM method outperforms state-of-art method... | **A**: Numerical results of simulations and substantial empirical datasets in Section 5 show that our proposed Mixed-SLIM indeed enjoys satisfactory performances when compared to the benchmark methods for both community detection problem and mixed membership community detection problem.
2 Degree-corrected mixed memb... | BCA | BCA | BCA | ACB | Selection 3 |
In addition to gradient-based MCMC, variational transport also shares similarity with Stein variational gradient descent (SVGD) (Liu and Wang, 2016), which is a more recent particle-based algorithm for Bayesian inference.
Variants of SVGD have been subsequently proposed. See, e.g.,
Detommaso et al. (2018); Han and Liu ... | **A**: (2019); Gong et al.
**B**: (2020); Ye et al.
**C**: (2018); Liu et al.
| CBA | CAB | CAB | CAB | Selection 2 |
There are several different techniques for computing feature importance that produce diverse outcomes per feature. <|MaskedSetence|> Another key point is that users should have the ability to include and exclude features during the entire exploration phase.
G3: Application of alternative feature transformations acco... | **A**: The tool should facilitate the visual comparison of alternative feature selection techniques for each feature (T2).
**B**: Statistical measures such as target correlation and mutual information shared between features, along with per class correlation, are necessary to evaluate the features’ influences in the r... | CBA | ABC | ABC | ABC | Selection 4 |
We have pointed to issues with the existing bias mitigation approaches, which alter the loss or use resampling. <|MaskedSetence|> <|MaskedSetence|> Causality is another relevant line of research, where the goal is to uncover the underlying causal mechanisms [49, 45, 9, 2]. Discovery and usage of causal concepts is ... | **A**: These areas have not been explicitly studied for their ability to overcome dataset bias.
.
**B**: An orthogonal avenue for attacking bias mitigation is to use alternative architectures.
**C**: Neuro-symbolic and graph-based systems could be created that focus on learning and grounding predictions on structure... | BCA | BCA | BAC | BCA | Selection 4 |
In the one-step ahead prediction paradigm uncertainties in emulation will propagate over time. It should be noted that the numerical simulation of a set of ODE (e.g., the numerical simulation of the Lorenz system) also propagates errors which depend upon the numerical scheme employed, as well as properties of the under... | **A**: After this point the emulator is not able to predict the simulator accurately, however, the uncertainty of the prediction is captured in the proposed method.
The dimensionality of the dynamical systems we considered in this work is two or three.
**B**: What we have shown for the systems studied is that the pr... | BAC | ACB | BAC | BAC | Selection 3 |
<|MaskedSetence|> <|MaskedSetence|> (2014)],
[Pfister et al. (2018)], [Chakraborty and Zhang (2019)]), graphical modeling ([Lauritzen (1996)], [Gan, Narisetty and Liang (2019)]), linguistics ([Nguyen and Eisenstein (2017)]), clustering (Székely and Rizzo, 2005), dimension reduction (Fukumizu, Bach and Jordan, 2004; S... | **A**: [Bach and Jordan (2003)], [Chen and Bickel (2006)], [Samworth and Yuan (2012)] and [Matteson and Tsay (2017)].
**B**: Testing independence also has many applications, including causal inference ([Pearl (2009)], [Peters et al.
**C**: The traditional approach for testing independence is based on Pearson’s correl... | ABC | ABC | BAC | ABC | Selection 4 |
Self-concordant functions have received strong interest in recent years due to the attractive properties that they allow to prove for many statistical estimation settings [Marteau-Ferey et al., 2019, Ostrovskii & Bach, 2021]. The original definition of self-concordance has been expanded and generalized since its incep... | **A**: [2015], in which more general properties of these
pseudo-self-concordant functions were established.
**B**: This was fully formalized in Sun & Tran-Dinh [2019], in which the concept of generalized self-concordant functions was introduced, along with key bounds, properties, and variants of Newton methods for the... | CAB | ACB | CAB | CAB | Selection 4 |
We measure the harm that past adaptivity causes to a future query by considering the query as evaluated on a posterior data distribution and comparing this with its value on a prior. The prior is the true data distribution, and the posterior is induced by observing the responses to past queries and updating the prior... | **A**: This type of triangle inequality first appeared as an analysis technique in Jung et al.
**B**: If the new query behaves similarly on the prior distribution as it does on this posterior (a guarantee we call Bayes stability; Definition 3.3), adaptivity has not led us too far astray.111This can be viewed as a gene... | BAC | BAC | ABC | BAC | Selection 1 |
4.2 Data
Most of the data sets were obtained from the UCI repository Dua2019 . Specific references are given in Table 2. This table also shows the number of data points and (used) features and the skewness and (Pearson) kurtosis of the response variable. All data sets were standardized (both features and target variab... | **A**: Even though some of them could be considered in a time series context, no autoregressive features were additionally extracted.
**B**: The data sets blog and fb1 were also analysed after first taking a log transform of the response variable because these data sets are extremely skewed, which is reflected in the ... | BCA | CAB | BCA | BCA | Selection 1 |
<|MaskedSetence|> <|MaskedSetence|> Observing a panel of linking decisions by a subset of nodes, set in small networks, allows us to directly (and tractably) estimate utility parameters from the evolution of gameplay. <|MaskedSetence|> Specifically, we no longer need to make assumptions regarding the meeting process... | **A**:
We can also relax the usual assumption that players move individually, which is common in the cross-sectional and large network estimators (Mele, 2017; Badev, 2021).
**B**: This assumption is typically used to ensure the convergence of logit-response dynamics to a steady state distribution (Foster and Young, 1... | ABC | ABC | ABC | CAB | Selection 2 |
<|MaskedSetence|> However, it is interesting to see that, while it is never very easy to get to hospitals in busy times (like at 18:20), the 2 Central Station is still in a good spot (as it is not too far, and not too crowded), conversely the 1 Garibaldi Station is in a less favorable location, as it becomes practic... | **A**: This can be surprising at first, but a look at the broader map of the city clarifies that they are closer to hospitals that are not in our grid and, therefore cannot be fully analyzed by our model.
.
**B**: Lastly, the always failing areas at the corners of the grid, and at the bottom-center tell us somethin... | ACB | CBA | CBA | CBA | Selection 2 |
<|MaskedSetence|> Determining the number of factors in a data-driven way has been an important research topic in the factor model literature. <|MaskedSetence|> Lam and Yao, (2012), Ahn and Horenstein, (2013) developed an alternative approach to study the ratio of each pair of adjacent eigenvalues. Recently, Han et al... | **A**: Bai and Ng, (2002, 2007), Hallin and Liška, (2007) proposed consistent estimators in the vector factor models based on the information criteria approach.
**B**: Those procedures can be extended to TFM-cp.
.
**C**:
Here the estimators are constructed with given rank r𝑟ritalic_r, though in the theoretical an... | CAB | CAB | BCA | CAB | Selection 2 |
<|MaskedSetence|> However, iForest can be used only for binary classification, while VisRuler can be used with multi-class data sets (as in the use case of Section System Overview and Use Case). Also, the feature flow, a node-link diagram, suffers from scalability issues (a challenge only partially overcome with aggre... | **A**: Therefore, VisRuler allows users to mine rules for both a particular class outcome and in connection to a specific case.
**B**: ExMatrix Neto2021Explainable is another VA tool for RF interpretation that operates using a matrix-like visual representation, facilitating the analysis of a model and connecting rule... | ACB | CAB | CAB | CAB | Selection 2 |