-
Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models
Authors:
Aarohi Srivastava,
Abhinav Rastogi,
Abhishek Rao,
Abu Awal Md Shoeb,
Abubakar Abid,
Adam Fisch,
Adam R. Brown,
Adam Santoro,
Aditya Gupta,
AdriĆ Garriga-Alonso,
Agnieszka Kluska,
Aitor Lewkowycz,
Akshat Agarwal,
Alethea Power,
Alex Ray,
Alex Warstadt,
Alexander W. Kocurek,
Ali Safaya,
Ali Tazarv,
Alice Xiang,
Alicia Parrish,
Allen Nie,
Aman Hussain,
Amanda Askell,
Amanda Dsouza
, et al. (426 additional authors not shown)
Abstract:
Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur…
▽ More
Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-future capabilities and limitations of language models. To address this challenge, we introduce the Beyond the Imitation Game benchmark (BIG-bench). BIG-bench currently consists of 204 tasks, contributed by 450 authors across 132 institutions. Task topics are diverse, drawing problems from linguistics, childhood development, math, common-sense reasoning, biology, physics, social bias, software development, and beyond. BIG-bench focuses on tasks that are believed to be beyond the capabilities of current language models. We evaluate the behavior of OpenAI's GPT models, Google-internal dense transformer architectures, and Switch-style sparse transformers on BIG-bench, across model sizes spanning millions to hundreds of billions of parameters. In addition, a team of human expert raters performed all tasks in order to provide a strong baseline. Findings include: model performance and calibration both improve with scale, but are poor in absolute terms (and when compared with rater performance); performance is remarkably similar across model classes, though with benefits from sparsity; tasks that improve gradually and predictably commonly involve a large knowledge or memorization component, whereas tasks that exhibit "breakthrough" behavior at a critical scale often involve multiple steps or components, or brittle metrics; social bias typically increases with scale in settings with ambiguous context, but this can be improved with prompting.
△ Less
Submitted 12 June, 2023; v1 submitted 9 June, 2022;
originally announced June 2022.
-
Assessing Emoji Use in Modern Text Processing Tools
Authors:
Abu Awal Md Shoeb,
Gerard de Melo
Abstract:
Emojis have become ubiquitous in digital communication, due to their visual appeal as well as their ability to vividly convey human emotion, among other factors. The growing prominence of emojis in social media and other instant messaging also leads to an increased need for systems and tools to operate on text containing emojis. In this study, we assess this support by considering test sets of twe…
▽ More
Emojis have become ubiquitous in digital communication, due to their visual appeal as well as their ability to vividly convey human emotion, among other factors. The growing prominence of emojis in social media and other instant messaging also leads to an increased need for systems and tools to operate on text containing emojis. In this study, we assess this support by considering test sets of tweets with emojis, based on which we perform a series of experiments investigating the ability of prominent NLP and text processing tools to adequately process them. In particular, we consider tokenization, part-of-speech tagging, as well as sentiment analysis. Our findings show that many tools still have notable shortcomings when operating on text containing emojis.
△ Less
Submitted 2 January, 2021;
originally announced January 2021.
-
Are Emojis Emotional? A Study to Understand the Association between Emojis and Emotions
Authors:
Abu Shoeb,
Gerard de Melo
Abstract:
Given the growing ubiquity of emojis in language, there is a need for methods and resources that shed light on their meaning and communicative role. One conspicuous aspect of emojis is their use to convey affect in ways that may otherwise be non-trivial to achieve. In this paper, we seek to explore the connection between emojis and emotions by means of a new dataset consisting of human-solicited a…
▽ More
Given the growing ubiquity of emojis in language, there is a need for methods and resources that shed light on their meaning and communicative role. One conspicuous aspect of emojis is their use to convey affect in ways that may otherwise be non-trivial to achieve. In this paper, we seek to explore the connection between emojis and emotions by means of a new dataset consisting of human-solicited association ratings. We additionally conduct experiments to assess to what extent such associations can be inferred from existing data, such that similar associations can be predicted for a larger set of emojis. Our experiments show that this succeeds when high-quality word-level information is available.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Is Private Browsing in Modern Web Browsers Really Private?
Authors:
Abu Awal Md Shoeb
Abstract:
Web browsers are the most common tool to perform various activities over the internet. Along with normal mode, all modern browsers have private browsing mode. The name of the mode varies from browser to browser but the purpose of the private mode remains same in every browser. In normal browsing mode, the browser keeps track of users' activity and related data such as browsing histories, cookies,…
▽ More
Web browsers are the most common tool to perform various activities over the internet. Along with normal mode, all modern browsers have private browsing mode. The name of the mode varies from browser to browser but the purpose of the private mode remains same in every browser. In normal browsing mode, the browser keeps track of users' activity and related data such as browsing histories, cookies, auto-filled fields, temporary internet files, etc. In private mode, it is said that no information is stored while browsing or all information is destroyed after closing the current private session. However, some researchers have already disproved this claim by performing various tests in most popular browsers. I have also some personal experience where private mode browsing fails to keep all browsing information as private. In this position paper, I take the position against private browsing. By examining various facts, it is proved that the private browsing mode is not really private as it is claimed; it does not keep everything private. In following sections, I will present the proof to justify my argument. Along with some other already performed research work, I will show my personal case studies and experimental data as well.
△ Less
Submitted 5 January, 2018;
originally announced February 2018.
-
In Quest of the Better Mobile Broadband Solution for South Asia Taking WiMAX and LTE into Consideration
Authors:
Nafiz Imtiaz Bin Hamid,
Md. R. H. Khandokar,
Taskin Jamal,
Md. A. Shoeb,
Md. Zakir Hossain
Abstract:
Internet generation is growing accustomed to having broadband access wherever they go and not just at home or in the office, which turns mobile broadband into a reality. This paper aims to look for a suitable mobile broadband solution in the South Asian region through comparative analysis in various perspectives. Both WiMAX and LTE are 4G technologies designed to move data rather than voice having…
▽ More
Internet generation is growing accustomed to having broadband access wherever they go and not just at home or in the office, which turns mobile broadband into a reality. This paper aims to look for a suitable mobile broadband solution in the South Asian region through comparative analysis in various perspectives. Both WiMAX and LTE are 4G technologies designed to move data rather than voice having IP networks based on OFDM technology. Proving competency in various significant aspects WiMAX and LTE already have made a strong position in telecommunication industry. Again, because of certain similarities in technology; they aren't like technological rivals as of GSM and CDMA. But still they are treated as opponents and viewed as a major threat in case of the flourishing of each other. Such view point is surely not conducive for getting the best out of them. In this paper various aspects and applications of WiMAX and LTE for deployment have been analyzed. South Asia being the residence of an enormous number of people presents an exciting opportunity for mobile operators, developers and internet service providers. So, every consideration that has been made here also correlates successfully with south Asia i.e. how mass people of this region may be benefited from it. As a result, it might be regarded as a good source in case of making major BWA deployment decisions in this region. Besides these, it also opens the path for further research and thinking in this issue.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.
-
Mobile Broadband Possibilities considering the Arrival of IEEE 802.16m & LTE with an Emphasis on South Asia
Authors:
Nafiz Imtiaz Bin Hamid,
Md. Zakir Hossain,
Md. R. H. Khandokar,
Taskin Jamal,
Md. A. Shoeb
Abstract:
This paper intends to look deeper into finding an ideal mobile broadband solution. Special stress has been put in the South Asian region through some comparative analysis. Proving their competency in numerous aspects, WiMAX and LTE already have already made a strong position in telecommunication industry. Both WiMAX and LTE are 4G technologies designed to move data rather than voice having IP netw…
▽ More
This paper intends to look deeper into finding an ideal mobile broadband solution. Special stress has been put in the South Asian region through some comparative analysis. Proving their competency in numerous aspects, WiMAX and LTE already have already made a strong position in telecommunication industry. Both WiMAX and LTE are 4G technologies designed to move data rather than voice having IP networks based on OFDM technology. So, they aren't like typical technological rivals as of GSM and CDMA. But still a gesture of hostility seems to outburst long before the stable commercial launch of LTE. In this paper various aspects of WiMAX and LTE for deployment have been analyzed. Again, we tried to make every possible consideration with respect to south Asia i.e. how mass people of this region may be benefited. As a result, it might be regarded as a good source in case of making major BWA deployment decisions in this region. Besides these, it also opens the path for further research and in depth thinking in this issue.
△ Less
Submitted 11 April, 2010;
originally announced April 2010.