Datasets:

Modalities:
Text
Languages:
English
ArXiv:
Libraries:
Datasets
License:
parquet-converter commited on
Commit
47a0e24
1 Parent(s): 9ee5017

Update parquet files

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +2 -0
  2. .gitignore +0 -141
  3. README.md +0 -248
  4. ade_corpus_v2/raft-test.parquet +0 -0
  5. ade_corpus_v2/raft-train.parquet +0 -0
  6. banking_77/raft-test.parquet +0 -0
  7. banking_77/raft-train.parquet +0 -0
  8. data/ade_corpus_v2/task.json +0 -1
  9. data/ade_corpus_v2/test_unlabeled.csv +0 -0
  10. data/ade_corpus_v2/train.csv +0 -51
  11. data/banking_77/task.json +0 -1
  12. data/banking_77/test_unlabeled.csv +0 -0
  13. data/banking_77/train.csv +0 -51
  14. data/neurips_impact_statement_risks/task.json +0 -1
  15. data/neurips_impact_statement_risks/test_unlabeled.csv +0 -0
  16. data/neurips_impact_statement_risks/train.csv +0 -51
  17. data/one_stop_english/task.json +0 -1
  18. data/one_stop_english/test_unlabeled.csv +0 -0
  19. data/one_stop_english/train.csv +0 -0
  20. data/overruling/task.json +0 -1
  21. data/overruling/test_unlabeled.csv +0 -0
  22. data/overruling/train.csv +0 -51
  23. data/semiconductor_org_types/task.json +0 -1
  24. data/semiconductor_org_types/test_unlabeled.csv +0 -450
  25. data/semiconductor_org_types/train.csv +0 -51
  26. data/systematic_review_inclusion/task.json +0 -1
  27. data/systematic_review_inclusion/test_unlabeled.csv +0 -0
  28. data/systematic_review_inclusion/train.csv +0 -51
  29. data/tai_safety_research/task.json +0 -1
  30. data/tai_safety_research/test_unlabeled.csv +0 -0
  31. data/tai_safety_research/train.csv +0 -51
  32. data/terms_of_service/task.json +0 -1
  33. data/terms_of_service/test_unlabeled.csv +0 -0
  34. data/terms_of_service/train.csv +0 -51
  35. data/tweet_eval_hate/task.json +0 -1
  36. data/tweet_eval_hate/test_unlabeled.csv +0 -0
  37. data/tweet_eval_hate/train.csv +0 -51
  38. data/twitter_complaints/task.json +0 -1
  39. data/twitter_complaints/test_unlabeled.csv +0 -0
  40. data/twitter_complaints/train.csv +0 -51
  41. dataset_infos.json +0 -1
  42. neurips_impact_statement_risks/raft-test.parquet +0 -0
  43. neurips_impact_statement_risks/raft-train.parquet +0 -0
  44. one_stop_english/raft-test.parquet +3 -0
  45. one_stop_english/raft-train.parquet +0 -0
  46. overruling/raft-test.parquet +0 -0
  47. overruling/raft-train.parquet +0 -0
  48. raft.py +0 -295
  49. semiconductor_org_types/raft-test.parquet +0 -0
  50. semiconductor_org_types/raft-train.parquet +0 -0
.gitattributes CHANGED
@@ -15,3 +15,5 @@
15
  *.pt filter=lfs diff=lfs merge=lfs -text
16
  *.pth filter=lfs diff=lfs merge=lfs -text
17
  data/ filter=lfs diff=lfs merge=lfs -text
 
 
 
15
  *.pt filter=lfs diff=lfs merge=lfs -text
16
  *.pth filter=lfs diff=lfs merge=lfs -text
17
  data/ filter=lfs diff=lfs merge=lfs -text
18
+ one_stop_english/raft-test.parquet filter=lfs diff=lfs merge=lfs -text
19
+ systematic_review_inclusion/raft-test.parquet filter=lfs diff=lfs merge=lfs -text
.gitignore DELETED
@@ -1,141 +0,0 @@
1
- # Byte-compiled / optimized / DLL files
2
- __pycache__/
3
- *.py[cod]
4
- *$py.class
5
-
6
- # C extensions
7
- *.so
8
-
9
- # Distribution / packaging
10
- .Python
11
- build/
12
- develop-eggs/
13
- dist/
14
- downloads/
15
- eggs/
16
- .eggs/
17
- lib/
18
- lib64/
19
- parts/
20
- sdist/
21
- var/
22
- wheels/
23
- share/python-wheels/
24
- *.egg-info/
25
- .installed.cfg
26
- *.egg
27
- MANIFEST
28
-
29
- # PyInstaller
30
- # Usually these files are written by a python script from a template
31
- # before PyInstaller builds the exe, so as to inject date/other infos into it.
32
- *.manifest
33
- *.spec
34
-
35
- # Installer logs
36
- pip-log.txt
37
- pip-delete-this-directory.txt
38
-
39
- # Unit test / coverage reports
40
- htmlcov/
41
- .tox/
42
- .nox/
43
- .coverage
44
- .coverage.*
45
- .cache
46
- nosetests.xml
47
- coverage.xml
48
- *.cover
49
- *.py,cover
50
- .hypothesis/
51
- .pytest_cache/
52
- cover/
53
-
54
- # Translations
55
- *.mo
56
- *.pot
57
-
58
- # Django stuff:
59
- *.log
60
- local_settings.py
61
- db.sqlite3
62
- db.sqlite3-journal
63
-
64
- # Flask stuff:
65
- instance/
66
- .webassets-cache
67
-
68
- # Scrapy stuff:
69
- .scrapy
70
-
71
- # Sphinx documentation
72
- docs/_build/
73
-
74
- # PyBuilder
75
- .pybuilder/
76
- target/
77
-
78
- # Jupyter Notebook
79
- .ipynb_checkpoints
80
-
81
- # IPython
82
- profile_default/
83
- ipython_config.py
84
-
85
- # pyenv
86
- # For a library or package, you might want to ignore these files since the code is
87
- # intended to run in multiple environments; otherwise, check them in:
88
- # .python-version
89
-
90
- # pipenv
91
- # According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control.
92
- # However, in case of collaboration, if having platform-specific dependencies or dependencies
93
- # having no cross-platform support, pipenv may install dependencies that don't work, or not
94
- # install all needed dependencies.
95
- #Pipfile.lock
96
-
97
- # PEP 582; used by e.g. github.com/David-OConnor/pyflow
98
- __pypackages__/
99
-
100
- # Celery stuff
101
- celerybeat-schedule
102
- celerybeat.pid
103
-
104
- # SageMath parsed files
105
- *.sage.py
106
-
107
- # Environments
108
- .env
109
- .venv
110
- env/
111
- venv/
112
- ENV/
113
- env.bak/
114
- venv.bak/
115
-
116
- # Spyder project settings
117
- .spyderproject
118
- .spyproject
119
-
120
- # Rope project settings
121
- .ropeproject
122
-
123
- # mkdocs documentation
124
- /site
125
-
126
- # mypy
127
- .mypy_cache/
128
- .dmypy.json
129
- dmypy.json
130
-
131
- # Pyre type checker
132
- .pyre/
133
-
134
- # pytype static type analyzer
135
- .pytype/
136
-
137
- # Cython debug symbols
138
- cython_debug/
139
-
140
- # Datasets locks
141
- *.lock
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
README.md DELETED
@@ -1,248 +0,0 @@
1
- ---
2
- annotations_creators:
3
- - expert-generated
4
- - crowdsourced
5
- language_creators:
6
- - expert-generated
7
- language:
8
- - en
9
- license:
10
- - other
11
- multilinguality:
12
- - monolingual
13
- size_categories:
14
- - unknown
15
- source_datasets:
16
- - original
17
- - extended|ade_corpus_v2
18
- - extended|banking77
19
- task_categories:
20
- - text-classification
21
- task_ids:
22
- - multi-class-classification
23
- pretty_name: 'Real-world Annotated Few-shot Tasks: RAFT'
24
- language_bcp47:
25
- - en-US
26
- ---
27
-
28
- # Dataset Card for RAFT
29
-
30
- ## Table of Contents
31
- - [Table of Contents](#table-of-contents)
32
- - [Dataset Description](#dataset-description)
33
- - [Dataset Summary](#dataset-summary)
34
- - [Supported Tasks and Leaderboards](#supported-tasks-and-leaderboards)
35
- - [Languages](#languages)
36
- - [Dataset Structure](#dataset-structure)
37
- - [Data Instances](#data-instances)
38
- - [Data Fields](#data-fields)
39
- - [Data Splits](#data-splits)
40
- - [Dataset Creation](#dataset-creation)
41
- - [Curation Rationale](#curation-rationale)
42
- - [Source Data](#source-data)
43
- - [Annotations](#annotations)
44
- - [Personal and Sensitive Information](#personal-and-sensitive-information)
45
- - [Considerations for Using the Data](#considerations-for-using-the-data)
46
- - [Social Impact of Dataset](#social-impact-of-dataset)
47
- - [Discussion of Biases](#discussion-of-biases)
48
- - [Other Known Limitations](#other-known-limitations)
49
- - [Additional Information](#additional-information)
50
- - [Dataset Curators](#dataset-curators)
51
- - [Licensing Information](#licensing-information)
52
- - [Citation Information](#citation-information)
53
- - [Contributions](#contributions)
54
-
55
- ## Dataset Description
56
-
57
- - **Homepage:** https://raft.elicit.org
58
- - **Repository:** https://huggingface.co/datasets/ought/raft
59
- - **Paper:** [arxiv.org](https://arxiv.org/abs/2109.14076)
60
- - **Leaderboard:** https://huggingface.co/spaces/ought/raft-leaderboard
61
- - **Point of Contact:** [Eli Lifland](eli.d.lifland@gmail.com)
62
-
63
- ### Dataset Summary
64
-
65
- The Real-world Annotated Few-shot Tasks (RAFT) dataset is an aggregation of English-language datasets found in the real world. Associated with each dataset is a binary or multiclass classification task, intended to improve our understanding of how language models perform on tasks that have concrete, real-world value. Only 50 labeled examples are provided in each dataset.
66
-
67
- ### Supported Tasks and Leaderboards
68
-
69
- - `text-classification`: Each subtask in RAFT is a text classification task, and the provided train and test sets can be used to submit to the [RAFT Leaderboard](https://huggingface.co/spaces/ought/raft-leaderboard) To prevent overfitting and tuning on a held-out test set, the leaderboard is only evaluated once per week. Each task has its macro-f1 score calculated, then those scores are averaged to produce the overall leaderboard score.
70
-
71
- ### Languages
72
-
73
- RAFT is entirely in American English (en-US).
74
-
75
- ## Dataset Structure
76
-
77
- ### Data Instances
78
-
79
-
80
- | Dataset | First Example |
81
- | ----------- | ----------- |
82
- | Ade Corpus V2 | <pre>Sentence: No regional side effects were noted.<br>ID: 0<br>Label: 2</pre> |
83
- | Banking 77 | <pre>Query: Is it possible for me to change my PIN number?<br>ID: 0<br>Label: 23<br></pre> |
84
- | NeurIPS Impact Statement Risks | <pre>Paper title: Auto-Panoptic: Cooperative Multi-Component Architecture Search for Panoptic Segmentation...<br>Paper link: https://proceedings.neurips.cc/paper/2020/file/ec1f764517b7ffb52057af6df18142b7-Paper.pdf...<br>Impact statement: This work makes the first attempt to search for all key components of panoptic pipeline and manages to accomplish this via the p...<br>ID: 0<br>Label: 1</pre> |
85
- | One Stop English | <pre>Article: For 85 years, it was just a grey blob on classroom maps of the solar system. But, on 15 July, Pluto was seen in high resolution ...<br>ID: 0<br>Label: 3<br></pre> |
86
- | Overruling | <pre>Sentence: in light of both our holding today and previous rulings in johnson, dueser, and gronroos, we now explicitly overrule dupree....<br>ID: 0<br>Label: 2<br></pre> |
87
- | Semiconductor Org Types | <pre>Paper title: 3Gb/s AC-coupled chip-to-chip communication using a low-swing pulse receiver...<br>Organization name: North Carolina State Univ.,Raleigh,NC,USA<br>ID: 0<br>Label: 3<br></pre> |
88
- | Systematic Review Inclusion | <pre>Title: Prototyping and transforming facial textures for perception research...<br>Abstract: Wavelet based methods for prototyping facial textures for artificially transforming the age of facial images were described. Pro...<br>Authors: Tiddeman, B.; Burt, M.; Perrett, D.<br>Journal: IEEE Comput Graphics Appl<br>ID: 0<br>Label: 2</pre> |
89
- | TAI Safety Research | <pre>Title: Malign generalization without internal search<br>Abstract Note: In my last post, I challenged the idea that inner alignment failures should be explained by appealing to agents which perform ex...<br>Url: https://www.alignmentforum.org/posts/ynt9TD6PrYw6iT49m/malign-generalization-without-internal-search...<br>Publication Year: 2020<br>Item Type: blogPost<br>Author: Barnett, Matthew<br>Publication Title: AI Alignment Forum<br>ID: 0<br>Label: 1</pre> |
90
- | Terms Of Service | <pre>Sentence: Crowdtangle may change these terms of service, as described above, notwithstanding any provision to the contrary in any agreemen...<br>ID: 0<br>Label: 2<br></pre> |
91
- | Tweet Eval Hate | <pre>Tweet: New to Twitter-- any men on here know what the process is to get #verified?...<br>ID: 0<br>Label: 2<br></pre> |
92
- | Twitter Complaints | <pre>Tweet text: @HMRCcustomers No this is my first job<br>ID: 0<br>Label: 2</pre> |
93
-
94
-
95
- ### Data Fields
96
-
97
- The ID field is used for indexing data points. It will be used to match your submissions with the true test labels, so you must include it in your submission. All other columns contain textual data. Some contain links and URLs to websites on the internet.
98
-
99
- All output fields are designated with the "Label" column header. The 0 value in this column indicates that the entry is unlabeled, and should only appear in the unlabeled test set. Other values in this column are various other labels. To get their textual value for a given dataset:
100
- ```
101
- # Load the dataset
102
- dataset = datasets.load_dataset("ought/raft", "ade_corpus_v2")
103
- # First, get the object that holds information about the "Label" feature in the dataset.
104
- label_info = dataset.features["Label"]
105
- # Use the int2str method to access the textual labels.
106
- print([label_info.int2str(i) for i in (0, 1, 2)])
107
- # ['Unlabeled', 'ADE-related', 'not ADE-related']
108
- ```
109
-
110
- ### Data Splits
111
-
112
- There are two splits provided: train data and unlabeled test data.
113
-
114
- The training examples were chosen at random. No attempt was made to ensure that classes were balanced or proportional in the training data -- indeed, the Banking 77 task with 77 different classes if used cannot fit all of its classes into the 50 training examples.
115
-
116
- | Dataset | Train Size | Test Size | |
117
- |--------------------------------|------------|-----------|---|
118
- | Ade Corpus V2 | 50 | 5000 | |
119
- | Banking 77 | 50 | 5000 | |
120
- | NeurIPS Impact Statement Risks | 50 | 150 | |
121
- | One Stop English | 50 | 516 | |
122
- | Overruling | 50 | 2350 | |
123
- | Semiconductor Org Types | 50 | 449 | |
124
- | Systematic Review Inclusion | 50 | 2243 | |
125
- | TAI Safety Research | 50 | 1639 | |
126
- | Terms Of Service | 50 | 5000 | |
127
- | Tweet Eval Hate | 50 | 2966 | |
128
- | Twitter Complaints | 50 | 3399 | |
129
- | **Total** | **550** | **28712** | |
130
-
131
- ## Dataset Creation
132
-
133
- ### Curation Rationale
134
-
135
- Generally speaking, the rationale behind RAFT was to create a benchmark for evaluating NLP models that didn't consist of contrived or artificial data sources, for which the tasks weren't originally assembled for the purpose of testing NLP models. However, each individual dataset in RAFT was collected independently. For the majority of datasets, we only collected them second-hand from existing curated sources. The datasets that we curated are:
136
- * NeurIPS impact statement risks
137
- * Semiconductor org types
138
- * TAI Safety Research
139
-
140
- Each of these three datasets was sourced from our existing collaborators at Ought. They had used our service, Elicit, to analyze their dataset in the past, and we contact them to include their dataset and the associated classification task in the benchmark. For all datasets, more information is provided in our paper. For the ones which we did not curate, we provide a link to the dataset. For the ones which we did, we provide a datasheet that elaborates on many of the topics here in greater detail.
141
-
142
- For the three datasets that we introduced:
143
- * **NeurIPS impact statement risks** The dataset was created to evaluate the then new requirement for authors to include an "impact statement" in their 2020 NeurIPS papers. Had it been successful? What kind of things did authors mention the most? How long were impact statements on average? Etc.
144
- * **Semiconductor org types** The dataset was originally created to understand better which countries’ organisations have contributed most to semiconductor R\&D over the past 25 years using three main conferences. Moreover, to estimate the share of academic and private sector contributions, the organisations were classified as “university”, “research institute” or “company”.
145
- * **TAI Safety Research** The primary motivations for assembling this database were to: (1) Aid potential donors in assessing organizations focusing on TAI safety by collecting and analyzing their research output. (2) Assemble a comprehensive bibliographic database that can be used as a base for future projects, such as a living review of the field.
146
-
147
- **For the following sections, we will only describe the datasets we introduce. All other dataset details, and more details on the ones described here, can be found in our paper.**
148
-
149
- ### Source Data
150
-
151
- #### Initial Data Collection and Normalization
152
-
153
- * **NeurIPS impact statement risks** The data was directly observable (raw text scraped) for the most part; although some data was taken from previous datasets (which themselves had taken it from raw text). The data was validated, but only in part, by human reviewers. Cf this link for full details:
154
- * **Semiconductor org types** We used the IEEE API to obtain institutions that contributed papers to semiconductor conferences in the last 25 years. This is a random sample of 500 of them with a corresponding conference paper title. The three conferences were the International Solid-State Circuits Conference (ISSCC), the Symposia on VLSI Technology and Circuits (VLSI) and the International Electron Devices Meeting (IEDM).
155
- * **TAI Safety Research** We asked TAI safety organizations for what their employees had written, emailed some individual authors, and searched Google Scholar. See the LessWrong post for more details: https://www.lesswrong.com/posts/4DegbDJJiMX2b3EKm/tai-safety-bibliographic-database
156
-
157
-
158
- #### Who are the source language producers?
159
-
160
- * **NeurIPS impact statement risks** Language generated from NeurIPS 2020 impact statement authors, generally the authors of submission papers.
161
- * **Semiconductor org types** Language generated from IEEE API. Generally machine-formatted names, and title of academic papers.
162
- * **TAI Safety Research** Language generated by authors of TAI safety research publications.
163
-
164
- ### Annotations
165
-
166
- #### Annotation process
167
-
168
- * **NeurIPS impact statement risks** Annotations were entered directly into a Google Spreadsheet with instructions, labeled training examples, and unlabeled testing examples.
169
- * **Semiconductor org types** Annotations were entered directly into a Google Spreadsheet with instructions, labeled training examples, and unlabeled testing examples.
170
- * **TAI Safety Research** N/A
171
-
172
-
173
- #### Who are the annotators?
174
-
175
- * **NeurIPS impact statement risks** Contractors paid by Ought performed the labeling of whether impact statements mention harmful applications. A majority vote was taken from 3 annotators.
176
- * **Semiconductor org types** Contractors paid by Ought performed the labeling of organization types. A majority vote was taken from 3 annotators.
177
- * **TAI Safety Research** The dataset curators annotated the dataset by hand.
178
-
179
-
180
- ### Personal and Sensitive Information
181
-
182
- It is worth mentioning that the Tweet Eval Hate, by necessity, contains highly offensive content.
183
-
184
- * **NeurIPS impact statement risks** The dataset contains authors' names. These were scraped from publicly available scientific papers submitted to NeurIPS 2020.
185
- * **Semiconductor org types** N/A
186
- * **TAI Safety Research** N/A
187
-
188
-
189
- ## Considerations for Using the Data
190
-
191
- ### Social Impact of Dataset
192
-
193
- * **NeurIPS impact statement risks** N/A
194
- * **Semiconductor org types** N/A
195
- * **TAI Safety Research** N/A
196
-
197
-
198
- ### Discussion of Biases
199
-
200
- * **NeurIPS impact statement risks** N/A
201
- * **Semiconductor org types** N/A
202
- * **TAI Safety Research** N/A
203
-
204
-
205
- ### Other Known Limitations
206
-
207
- * **NeurIPS impact statement risks** This dataset has limitations that should be taken into consideration when using it. In particular, the method used to collect broader impact statements involved automated downloads, conversions and scraping and was not error-proof. Although care has been taken to identify and correct as many errors as possible, not all texts have been reviewed by a human. This means it is possible some of the broader impact statements contained in the dataset are truncated or otherwise incorrectly extracted from their original article.
208
- * **Semiconductor org types** N/A
209
- * **TAI Safety Research** Don't use it to create a dangerous AI that could bring the end of days.
210
-
211
-
212
- ## Additional Information
213
-
214
- ### Dataset Curators
215
-
216
- The overall RAFT curators are Neel Alex, Eli Lifland, and Andreas Stuhlmüller.
217
-
218
- * **NeurIPS impact statement risks** Volunteers working with researchers affiliated to Oxford's Future of Humanity Institute (Carolyn Ashurst, now at The Alan Turing Institute) created the impact statements dataset.
219
- * **Semiconductor org types** The data science unit of Stiftung Neue Verantwortung (Berlin).
220
- * **TAI Safety Research** Angelica Deibel and Jess Riedel. We did not do it on behalf of any entity.
221
-
222
- ### Licensing Information
223
-
224
- RAFT aggregates many other datasets, each of which is provided under its own license. Generally, those licenses permit research and commercial use.
225
-
226
- | Dataset | License |
227
- | ----------- | ----------- |
228
- | Ade Corpus V2 | Unlicensed |
229
- | Banking 77 | CC BY 4.0 |
230
- | NeurIPS Impact Statement Risks | MIT License/CC BY 4.0 |
231
- | One Stop English | CC BY-SA 4.0 |
232
- | Overruling | Unlicensed |
233
- | Semiconductor Org Types | CC BY-NC 4.0 |
234
- | Systematic Review Inclusion | CC BY 4.0 |
235
- | TAI Safety Research | CC BY-SA 4.0 |
236
- | Terms Of Service | Unlicensed |
237
- | Tweet Eval Hate | Unlicensed |
238
- | Twitter Complaints | Unlicensed |
239
-
240
-
241
-
242
- ### Citation Information
243
-
244
- [More Information Needed]
245
-
246
- ### Contributions
247
-
248
- Thanks to [@neel-alex](https://github.com/neel-alex), [@uvafan](https://github.com/uvafan), and [@lewtun](https://github.com/lewtun) for adding this dataset.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
ade_corpus_v2/raft-test.parquet ADDED
Binary file (440 kB). View file
 
ade_corpus_v2/raft-train.parquet ADDED
Binary file (8.22 kB). View file
 
banking_77/raft-test.parquet ADDED
Binary file (208 kB). View file
 
banking_77/raft-train.parquet ADDED
Binary file (8.68 kB). View file
 
data/ade_corpus_v2/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "ade_corpus_v2", "description": "", "data_columns": ["Sentence", "ID"], "label_columns": {"Label": ["ADE-related", "not ADE-related"]}}
 
 
data/ade_corpus_v2/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/ade_corpus_v2/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Sentence,Label,ID
2
- No regional side effects were noted.,not ADE-related,0
3
- "We describe the case of a 10-year-old girl with two epileptic seizures and subcontinuous spike-waves during sleep, who presented unusual side-effects related to clobazam (CLB) monotherapy.",not ADE-related,1
4
- "The INR should be monitored more frequently when bosentan is initiated, adjusted, or discontinued in patients taking warfarin.",not ADE-related,2
5
- "After the first oral dose of propranolol, syncope developed together with atrioventricular block.",ADE-related,3
6
- "As termination was not an option for the family, the patient was extensively counseled and treated with oral ganciclovir.",not ADE-related,4
7
- Pulses have been given for periods up to three years without evident toxicity.,not ADE-related,5
8
- "CONCLUSION: Pancreatic enzyme intolerance, although rare, would be a major problem in the management of patients with CF.",not ADE-related,6
9
- The treatment of Toxoplasma encephalitis in patients with acquired immunodeficiency syndrome.,not ADE-related,7
10
- A challenge with clozapine was feasible and showed no clinical symptoms of eosinophilia.,not ADE-related,8
11
- OBJECTIVE: To describe onset of syndrome of inappropriate antidiuretic hormone (SIADH) associated with vinorelbine therapy for advanced breast cancer.,ADE-related,9
12
- These results indicate that the hyponatremia in this case was due to SIADH and that SIADH was caused by an increased release of vasopressin probably because of the antiviral drug (acyclovir) or infection of varicella zoster virus (VZV) in a single dermatome.,not ADE-related,10
13
- Macular infarction after endophthalmitis treated with vitrectomy and intravitreal gentamicin.,ADE-related,11
14
- These cases were considered unusual in light of the short delay of their onset after initiation of immunosuppressive therapy and their fulminant course: 3 of these patients died of PCP occurring during the first month of treatment with prednisone.,ADE-related,12
15
- In 1991 the patient were found to be seropositive for HCV antibodies as detected by the ELISA method and confirmed by the RIBA method.,not ADE-related,13
16
- MRI has a high sensitivity and specificity in the diagnosis of osteonecrosis and should be used when this condition is suspected.,not ADE-related,14
17
- Treatment of silastic catheter-induced central vein septic thrombophlebitis.,not ADE-related,15
18
- These organisms have occasionally been reported as a cause of serious infections in man but have not been reported as a cause of shunt infection.,not ADE-related,16
19
- NEH must be considered in lupus patients receiving cytotoxic agents to avoid inappropriate use of corticosteroids or antibiotics in this self-limited condition.,not ADE-related,17
20
- "The patient had no skin reactions for the next 12 mo, with the exception of injection-site papules.",not ADE-related,18
21
- "Of the 16 patients, including the 1 reported here, only 3 displayed significant shortening of the agranulocytic period after treatment.",not ADE-related,19
22
- A closer look at septic shock.,not ADE-related,20
23
- A 24- to 48-h course of large-dose glucocorticoid therapy is often used in the acute management of spinal cord injury.,not ADE-related,21
24
- CT-scan disclosed right ethmoid sinusitis that spread to the orbit after surgery.,not ADE-related,22
25
- Sotalol-induced bradycardia reversed by glucagon.,ADE-related,23
26
- "The cases are important in documenting that drug-induced dystonias do occur in patients with dementia, that risperidone appears to have contributed to dystonia among elderly patients, and that the categorization of dystonic reactions needs further clarification.",ADE-related,24
27
- No abnormalities were identified on review of collection and processing records.,not ADE-related,25
28
- A case study is presented of a licensed practical nurse who developed persistent contact dermatitis.,not ADE-related,26
29
- An encephalopathy and cardiomyopathy developed in a seventeen-year-old girl with chemotherapy-induced renal failure while receiving an intravesical aluminum infusion for hemorrhagic cystitis.,ADE-related,27
30
- "The gold standard for diagnosis is renal biopsy, but it is only rarely performed during the acute phase of the reaction and is not without risk.",not ADE-related,28
31
- "METHODS: We identified three patients who developed skin necrosis and determined any factors, which put them at an increased risk of doing so.",not ADE-related,29
32
- We describe a patient who developed HUS after treatment with mitomycin C (total dose 144 mg/m2) due to a carcinoma of the ascending colon.,ADE-related,30
33
- The authors caution that treatment with alprazolam may be complicated by the induction of mania.,ADE-related,31
34
- We report a case of long lasting respiratory depression after intravenous administration of morphine to a 7 year old girl with haemolytic uraemic syndrome.,ADE-related,32
35
- Best-corrected visual acuity measurements were performed at every visit.,not ADE-related,33
36
- Considerable improvement of myasthenic symptoms was seen in all patients within 3-6 months after the initiation of this therapy.,not ADE-related,34
37
- "We present three patients with paradoxical seizures; their serum phenytoin levels were 43.5 mcg/mL, 46.5 mcg/mL and 38.3 mcg/mL.",ADE-related,35
38
- "A patient with psoriasis is described who had an abnormal response to the glucose tolerance test without other evidence of diabetes and then developed postprandial hyperglycemia and glycosuria during a period of topical administration of a corticosteroid cream, halcinonide cream 0.1%, under occlusion.",ADE-related,36
39
- "This report demonstrates the increased risk of complicated varicella associated with the use of corticosteroids, even for a short period of time.",not ADE-related,37
40
- This case report describes a 13-year-old male with diagnosis of autistic disorder and fetishistic behavior.,not ADE-related,38
41
- "Several hypersensitivity reactions to cloxacillin have been reported, although IgE-mediated allergic reactions to the drug are rare and there is little information about possible tolerance to other semisynthetic penicillins or cephalosporins in patients with cloxacillin allergy.",ADE-related,39
42
- "A 69-year-old male was diagnosed in February 2004 with stage IV extranodal marginal zone B cell lymphoma involving the mediastinal nodes, lung parenchyma and bone marrow with high LDH.",not ADE-related,40
43
- "With serious cases, however, conventional treatment may not allow sufficient time at depth for the complete resolution of manifestations because of the need to avoid pulmonary oxygen toxicity which is associated with a prolonged period of breathing compressed air.",not ADE-related,41
44
- Thrombolytic treatment is advocated for critical patients unless emergency institution of cardio pulmonary bypass is required and/or indicated.,not ADE-related,42
45
- "IMPLICATIONS: Dexmedetomidine, an alpha(2)-adrenoceptor agonist, is indicated for sedating patients on mechanical ventilation.",not ADE-related,43
46
- "Remarkable findings on initial examination were facial grimacing, flexure posturing of both upper extremities, and 7-mm, reactive pupils.",not ADE-related,44
47
- Acute promyelocytic leukemia after living donor partial orthotopic liver transplantation in two Japanese girls.,not ADE-related,45
48
- The mechanism by which sunitinib induces gynaecomastia is thought to be associated with an unknown direct action on breast hormonal receptors.,ADE-related,46
49
- Early detection of these cases has practical importance since the identification and elimination of the causative drug is essential for therapy success.,not ADE-related,47
50
- "CONCLUSIONS: These results suggest that clozapine may cause TD; however, the prevalence is low and the severity is relatively mild, with no or mild self-reported discomfort.",ADE-related,48
51
- METHODS: This study is a case report description.,not ADE-related,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/banking_77/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "banking_77", "description": "", "data_columns": ["Query", "ID"], "label_columns": {"Label": ["Refund_not_showing_up", "activate_my_card", "age_limit", "apple_pay_or_google_pay", "atm_support", "automatic_top_up", "balance_not_updated_after_bank_transfer", "balance_not_updated_after_cheque_or_cash_deposit", "beneficiary_not_allowed", "cancel_transfer", "card_about_to_expire", "card_acceptance", "card_arrival", "card_delivery_estimate", "card_linking", "card_not_working", "card_payment_fee_charged", "card_payment_not_recognised", "card_payment_wrong_exchange_rate", "card_swallowed", "cash_withdrawal_charge", "cash_withdrawal_not_recognised", "change_pin", "compromised_card", "contactless_not_working", "country_support", "declined_card_payment", "declined_cash_withdrawal", "declined_transfer", "direct_debit_payment_not_recognised", "disposable_card_limits", "edit_personal_details", "exchange_charge", "exchange_rate", "exchange_via_app", "extra_charge_on_statement", "failed_transfer", "fiat_currency_support", "get_disposable_virtual_card", "get_physical_card", "getting_spare_card", "getting_virtual_card", "lost_or_stolen_card", "lost_or_stolen_phone", "order_physical_card", "passcode_forgotten", "pending_card_payment", "pending_cash_withdrawal", "pending_top_up", "pending_transfer", "pin_blocked", "receiving_money", "request_refund", "reverted_card_payment?", "supported_cards_and_currencies", "terminate_account", "top_up_by_bank_transfer_charge", "top_up_by_card_charge", "top_up_by_cash_or_cheque", "top_up_failed", "top_up_limits", "top_up_reverted", "topping_up_by_card", "transaction_charged_twice", "transfer_fee_charged", "transfer_into_account", "transfer_not_received_by_recipient", "transfer_timing", "unable_to_verify_identity", "verify_my_identity", "verify_source_of_funds", "verify_top_up", "virtual_card_not_working", "visa_or_mastercard", "why_verify_identity", "wrong_amount_of_cash_received", "wrong_exchange_rate_for_cash_withdrawal"]}}
 
 
data/banking_77/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/banking_77/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Query,Label,ID
2
- Is it possible for me to change my PIN number?,change_pin,0
3
- I'm not sure why my card didn't work,declined_card_payment,1
4
- I don't think my top up worked,top_up_failed,2
5
- Can you explain why my payment was charged a fee?,card_payment_fee_charged,3
6
- "How long does a transfer from a UK account take? I just made one and it doesn't seem to be working, wondering if everything is okay",balance_not_updated_after_bank_transfer,4
7
- Why am I getting declines when trying to make a purchase online?,declined_transfer,5
8
- What is the $1 transaction on my account?,extra_charge_on_statement,6
9
- It looks like my card payment was sent back.,reverted_card_payment?,7
10
- Why am I unable to transfer money when I was able to before?,beneficiary_not_allowed,8
11
- What if there is an error on the exchange rate?,card_payment_wrong_exchange_rate,9
12
- After I transferred money the balance remained the same.,balance_not_updated_after_bank_transfer,10
13
- How much does top up fees cost?,top_up_by_card_charge,11
14
- limits on top ups,top_up_limits,12
15
- My card payment was not successful.,declined_card_payment,13
16
- I live in the EU - can I get a card?,country_support,14
17
- Why did my top-up not work?,top_up_failed,15
18
- "I have a strange transaction for £1 on my statement, what is that?",extra_charge_on_statement,16
19
- Why is my money not in my account. I have already sent it out.,balance_not_updated_after_cheque_or_cash_deposit,17
20
- Let me know what the steps for the identity checks are,verify_my_identity,18
21
- I need my card as quick as possible,card_delivery_estimate,19
22
- In what increments can I top-up my card?,automatic_top_up,20
23
- When do i activate auto top-up?,automatic_top_up,21
24
- Do you charge for sending out more cards?,getting_spare_card,22
25
- Why am I being asked to verify my identity?,why_verify_identity,23
26
- What currencies can I use?,supported_cards_and_currencies,24
27
- I withdrew cash and I think the exchange rate is wrong.,wrong_exchange_rate_for_cash_withdrawal,25
28
- "My top up hasn't gone through yet, why?",pending_top_up,26
29
- "Hello, I have a question concerning an unfamiliar fee that I notice on my account. I see that you guys charge for ATM withdrawal. Never notice this fee until now. Can you please explain?",cash_withdrawal_charge,27
30
- The exchange rate was wrong in the foreign country I got cash in.,wrong_exchange_rate_for_cash_withdrawal,28
31
- I am still waiting for a transfer to show,pending_transfer,29
32
- How is the exchange rate calculated?,exchange_rate,30
33
- "There was an extra fee when I paid with my card, why was i charged this extra fee?",card_payment_fee_charged,31
34
- My credit card seems to have been declined for top up. Why is it not going through? Can you tell me what's going on?,top_up_failed,32
35
- "My transfers keep on getting declined. My card was working fine up until now, however it has suddenly stopped working. Why is this?",declined_transfer,33
36
- How long does it take for my physical card to be delivered.,card_delivery_estimate,34
37
- I need to know why a money transfer is available.,pending_transfer,35
38
- I must make several disposable cards every day.,disposable_card_limits,36
39
- What do I do to link my new card?,card_linking,37
40
- Why is their a charge pending on my card still?,pending_card_payment,38
41
- Why is there extra cash in my account?,cash_withdrawal_not_recognised,39
42
- Can I get a refund on an item?,request_refund,40
43
- Can I get an update on my replacement card?,card_arrival,41
44
- How do I know what my PIN is?,get_physical_card,42
45
- In which countries can I get a card?,country_support,43
46
- Can I choose from either Visa or Mastercard?,visa_or_mastercard,44
47
- My card still hasn't been delivered,card_arrival,45
48
- I didn't make the direct debit payment on my account.,direct_debit_payment_not_recognised,46
49
- after i got married i need to change my name,edit_personal_details,47
50
- How can I tell the source for my available funds?,verify_source_of_funds,48
51
- I didn't get all the cash I asked for,wrong_amount_of_cash_received,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/neurips_impact_statement_risks/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "neurips_impact_statement_risks", "description": "", "data_columns": ["Paper title", "Paper link", "Impact statement", "ID"], "label_columns": {"Label": ["doesn't mention a harmful application", "mentions a harmful application"]}}
 
 
data/neurips_impact_statement_risks/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/neurips_impact_statement_risks/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Paper title,Paper link,Impact statement,Label,ID
2
- Auto-Panoptic: Cooperative Multi-Component Architecture Search for Panoptic Segmentation,https://proceedings.neurips.cc/paper/2020/file/ec1f764517b7ffb52057af6df18142b7-Paper.pdf,"This work makes the first attempt to search for all key components of panoptic pipeline and manages to accomplish this via the proposed Cooperative Multi-Component Architecture Search and efficient Path-Priority Search Policy. Most related work in the literature of NAS for fine-grained vision tasks concentrates on searching a specific part of the network and the balance of the overall network is largely ignored. Nevertheless, this type of technology is essential to improve the upper bound of popular detectors and segmentation networks. This may inspire new work towards the efficient search of the overall architecture for fine-grained vision tasks, e.g., object detection, semantic segmentation, panoptic segmentation and so on. We are not aware of any imminent risks of placing anyone at a disadvantage. In the future, more constraints and optimization algorithms can be applied to strike the optimal trade-off between accuracy and latency to deliver customized architecture for different platforms and devices.",doesn't mention a harmful application,0
3
- Design Space for Graph Neural Networks,https://proceedings.neurips.cc/paper/2020/file/c5c3d4fe6b2cc463c7d7ecba17cc9de7-Paper.pdf,"Impact on GNN research . Our work brings in many valuable mindsets to the field of GNN research. For example, we fully adopt the principle of controlling model complexity when comparing different models, which is not yet adopted in most GNN papers. We focus on finding guidelines / principles when designing GNNs, rather than particular GNN instantiations. We emphasize that the best GNN designs can drastically differ across tasks (the state-of-the-art GNN model on one task may have poor performance on other tasks). We thus propose to evaluate models on diverse tasks measured by quantitative similarity metric. Rather than criticizing the weakness of existing GNN architectures, our goal is to build a framework that can help researchers understand GNN design choices when developing new models suitable for different applications. Our approach serves as a tool to demonstrate the innovation of a novel GNN model ( e.g. , in what kind of design spaces / task spaces, a proposed algorithmic advancement is helpful), or a novel GNN task ( e.g. , showing that the task is not similar to any existing tasks thus calls for new challenges of algorithmic development). Impact on machine learning research . Our approach is in fact applicable to general machine learning model design. Specifically, we hope the proposed controlled random search technique can assist fair evaluation of novel algorithmic advancements. To show whether a certain algorithmic advancement is useful, it is important to sample random model-task combinations, then investigate in what scenarios the algorithmic advancement indeed improves the performance. Additionally, the proposed task similarity metric can be used to understand similarities between general machine learning tasks, e.g. , classification of MNIST and CIFAR-10. Our ranking-based similarity metric is fully general, as long as different designs can be ranked by their performance. Impact on other research domains . Our framework provides an easier than ever support for experts in other disciplines to solve their problems via GNNs. Domain experts only need to provide properly formatted domain-specific datasets, then recommended GNN designs will be automatically picked and applied to the dataset. In the fastest mode, anchor GNN models will be applied to the novel task in order to measure its similarity with known GNN tasks, where the corresponding best GNN designs have been saved. Top GNN designs in the tasks with high similarity to the novel task will be applied. If computational resources permitted, a full grid search / random search over the design space can also be easily carried out to the new task. We believe this pipeline can significantly lower the barrier for applying GNN models, thus greatly promote the application of GNNs in other research domains. Impact on the society . As is discussed above, given its clarity and accessibility, we are confident that our general approach can inspire novel applications that are of high impact to the society. Additionally, its simplicity can also provide great opportunities for AI education, where students can learn from SOTA deep learning models and inspiring applications at ease.",doesn't mention a harmful application,1
4
- Learning the Geometry of Wave-Based Imaging,https://proceedings.neurips.cc/paper/2020/file/5e98d23afe19a774d1b2dcbefd5103eb-Paper.pdf,"We do not see any major ethical consequences of this work. Our work has implications in the fields of exploratory imaging — earthquake detection, medical imaging etc. Our work improves the quality and reliability of imaging in these fields. Improving these fields has direct societal impact in finding new natural preserves, improved diagnosis in healthcare etc. A failure of our system leaves machine learning unreliable in exploratory imaging. Our method provides strong out-of-distribution generalization and hence is not biased according to the data.",doesn't mention a harmful application,2
5
- Noise2Same: Optimizing A Self-Supervised Bound for Image Denoising,https://proceedings.neurips.cc/paper/2020/file/ea6b2efbdd4255a9f1b3bbc6399b58f4-Paper.pdf,"In this paper, we introduce Noise2Same, a self-supervised framework for deep image denoising. As Noise2Same does not need paired clean data, paired noisy data, nor the noise model, its application scenarios could be much broader than both traditional supervised and existing self-supervised denoising frameworks. The most direct application of Noise2Same is to perform denoising on digital images captured under poor conditions. Individuals and corporations related to photography may benefit from our work. Besides, Noise2Same could be applied as a pre-processing step for computer vision tasks such as object detection and segmentation [ 18], making the downstream algorithms more robust to noisy images. Also, specific research communities could benefit from the development of Noise2Same as well. For example, the capture of high-quality microscopy data of live cells, tissue, or nanomaterials is expensive in terms of budget and time [27]. Proper denoising algorithms allow researchers to obtain high-quality data from low-quality data and hence remove the need to capture high-quality data directly. In addition to image denoising applications, the self-supervised denoising framework could be extended to other domains such as audio noise reduction and single-cell [1]. On the negative aspect, as many imaging-based research tasks and computer vision applications may be built upon the denoising algorithms, the failure of Noise2Same could potentially lead to biases or failures in these tasks and applications.",mentions a harmful application,3
6
- When Counterpoint Meets Chinese Folk Melodies,https://proceedings.neurips.cc/paper/2020/file/bae876e53dab654a3d9d9768b1b7b91a-Paper.pdf,"The idea of integrating Western counterpoint into Chinese folk music generation is innovative. It would make positive broader impacts on three aspects: 1) It would facilitate more opportunities and challenges of music cultural exchanges at a much larger scale through automatic generation. For example, the inter-cultural style fused music could be used in Children’s enlightenment education to stimulate their interest in both cultures. 2) It would further the idea of collaborative counterpoint improvisation between two parts ( e . g ., a human and a machine) to music traditions where such interaction was less common. 3) The computer-generated music may “reshape the musical idiom”[23], which may bring more opportunities and possibilities to produce creative music. The proposed work may also have some potential negative societal impacts: 1) Similar to other computational creativity research, the generated music has the possibility of plagiarism by copying short snippets from the training corpus, even though copyright infringement is not a concern as neither folk melodies nor Bach’s music has copyright. That being said, our online music generation approach conditions music generation on past human and machine generation, and is less likely to directly copy snippets than offline approaches do. 2) The proposed innovative music generation approach may cause disruptions to current music professions, even deprive them of their means of existence[23]. However, it also opens new areas and creates new needs in this we-media era . Overall, we believe that the positive impacts significantly outweigh the negative impacts.",mentions a harmful application,4
7
- Learning from Label Proportions: A Mutual Contamination Framework,https://proceedings.neurips.cc/paper/2020/file/fcde14913c766cf307c75059e0e89af5-Paper.pdf,"LLP has been discussed as a model for summarizing a fully labeled dataset for public dissemination. The idea is that individual labels are not disclosed, so some degree of privacy is retained. As we show, consistent classification is still possible in this setting. If the two class-conditional distributions are nonoverlapping, labels of training instances can be recovered with no uncertainty by an optimal classifier. If the class-conditional distributions have some overlap, training instances in the nonoverlapping region can still be labeled with no uncertainty, while training instances in the overlapping regions can have their labels guessed with some uncertainty, depending on the degree of overlap.",doesn't mention a harmful application,5
8
- Limits to Depth Efficiencies of Self-Attention,https://proceedings.neurips.cc/paper/2020/file/ff4dfdf5904e920ce52b48c1cef97829-Paper.pdf,"Our work aims at providing fundamental guidelines which can assist all fields that employ Transformer-based architectures to use more efficient models. This way, these fields can achieve their goals while consuming less resources. Additionally, this work made an effort to provide a theoretical interpretation by examining the (many) empirical signals already published by others, while providing only a required minimum of further experimentation. This was done under the belief that while experiments are crucial for the advancement of the field, it is important not to conduct them superfluously as they incur an environmental price [Schwartz et al., 2019].",doesn't mention a harmful application,6
9
- Meta-Consolidation for Continual Learning,https://proceedings.neurips.cc/paper/2020/file/a5585a4d4b12277fee5cad0880611bc6-Paper.pdf,"(as required by NeurIPS 2020 CFP) Continual learning is a key desiderata for Artificial General Intelligence (AGI). Hence, this line of research has the benefits as well as the pitfalls of any other research effort geared in this direction. In particular, our work can help deliver impact on making smarter AI products and services, which can learn and update themselves on-the-fly when newer tasks and domains are encountered, without forgetting previously acquired knowledge. This is a necessity in any large-scale deployments of machine learning and computer vision, including in social media, e-commerce, surveillance, e- governance, etc - each of which have newer settings, tasks or domains added continually over time. Any negative effect of our work, such as legal and ethical concerns, are not unique to this work - to the best of our knowledge, but are shared with any other new development in machine learning, in general.",mentions a harmful application,7
10
- Learning to Incentivize Other Learning Agents,https://proceedings.neurips.cc/paper/2020/file/ad7ed5d47b9baceb12045a929e7e2f66-Paper.pdf,"Our work is a step toward the goal of ensuring the common good in a potential future where independent reinforcement learning agents interact with one another and/or with humans in the real world. We have shown that cooperation can emerge by introducing an additional learned incentive function that enables one agent to affect another agent’s reward directly. However, as agents still independently maximize their own individual rewards, it is open as to how to prevent an agent from misusing the incentive function to exploit others. One approach for future research to address this concern is to establish new connections between our work and the emerging literature on reward tampering [11]. By sparking a discussion on this important aspect of multi-agent interaction, we believe our work has a positive impact on the long-term research endeavor that is necessary for RL agents to be deployed safely in real-world applications.",doesn't mention a harmful application,8
11
- An Improved Analysis of (Variance-Reduced) Policy Gradient and Natural Policy Gradient Methods,https://proceedings.neurips.cc/paper/2020/file/56577889b3c1cd083b6d7b32d32f99d5-Paper.pdf,"The results of this paper improves the performance of policy-gradient methods for reinforcement learning, as well as our understanding to the existing methods. Through reinforcement learning, our study will also benefit several research communities such as machine learning and robotics. We do not believe that the results in this work will cause any ethical issue, or put anyone at a disadvantage in our society.",doesn't mention a harmful application,9
12
- Sample-Efficient Reinforcement Learning of Undercomplete POMDPs,https://proceedings.neurips.cc/paper/2020/file/d783823cc6284b929c2cd8df2167d212-Paper.pdf,"As this is a theoretical contribution, we do not envision that our direct results will have a tangible societal impact. Our broader line of inquiry could impact a line of thinking in a way that provides additional means to provide confidence intervals relevant for planning and learning. There is an increasing needs for applications to understand planning under uncertainty in the broader context of safety and reliability, and POMDPs provide one potential framework.",doesn't mention a harmful application,10
13
- Reward-rational (implicit) choice: A unifying formalism for reward learning,https://proceedings.neurips.cc/paper/2020/file/2f10c1578a0706e06b6d7db6f0b4a6af-Paper.pdf,"As AI capability advances, it is becoming increasingly important to align the objectives of AI agents to what people want. From how assistive robots can best help their users, to how autonomous cars should trade off between safety risk and efficiency, to how recommender systems should balance revenue considerations with longer-term user happiness and with avoiding influencing user views, agents cannot rely on a reward function specified once and set in stone. By putting different sources of information about the reward explicitly under the same framework, we hope our paper contributes towards a future in which agents maintain uncertainty over what their reward should be, and use different types of feedback from humans to refine their estimate and become better aligned with what people want over time – be them designers or end-users. On the flip side, changing reward functions also raises its own set of risks and challenges. First, the relationship between designer objectives and end-user objectives is not clear. Our framework can be used to adapt agents to end-users preferences, but this takes away control from the system designers. This might be desirable for, say, home robots, but not for safety-critical systems like autonomous cars, where designers might need to enforce certain constraints a-priori on the reward adaptation process. More broadly, most systems have multiple stake-holders, and what it means to do ethical preference aggregation remains an open problem. Further, if the robot’s model of the human is misspecified, adaptation might lead to more harm than good, with the robot inferring a worse reward function than what a designer could specify by hand.",mentions a harmful application,11
14
- Flows for simultaneous manifold learning and density estimation,https://proceedings.neurips.cc/paper/2020/file/051928341be67dcba03f0e04104d9047-Paper.pdf,"Manifold-learning flows have the potential to improve the efficiency with which scientists extract knowledge from large-scale experiments. Many phenomena have their most accurate description in terms of complex computer simulations which do not admit a tractable likelihood. In this common case, normalizing flows can be trained on synthetic data and used as a surrogate for the likelihood function, enabling high-quality inference on model parameters [21]. When the data have a manifold structure, manifold-learning flows may improve the quality and efficiency of this process further and ultimately contribute to scientific progress. We have demonstrated this with a real-world particle physics dataset, though the same technique is applicable to fields as diverse as neuroscience, systems biology, and epidemiology. All generative models carry a risk of being abused for the generation of fake data that are then masqueraded as real documents. This danger also applies to manifold-learning flows. While manifold-learning flows are currently far away from being able to generate realistic high-resolution images, videos, or audio, this concern should be kept in mind in the long term. Finally, the models we trained on image datasets of human faces clearly lack diversity. They reproduce and reinforce the biases inherent in the training data. Before using such (or other) models in any real-life application, it is crucial to understand, measure, and mitigate such biases.",mentions a harmful application,12
15
- Implicit Neural Representations with Periodic Activation Functions,https://proceedings.neurips.cc/paper/2020/file/53c04118df112c13a8c34b38343b9c10-Paper.pdf,"The proposed SIREN representation enables accurate representations of natural signals, such as images, audio, and video in a deep learning framework. This may be an enabler for downstream tasks involving such signals, such as classification for images or speech-to-text systems for audio. Such applications may be leveraged for both positive and negative ends. SIREN may in the future further enable novel approaches to the generation of such signals. This has potential for misuse in impersonating actors without their consent. For an in-depth discussion of such so-called DeepFakes, we refer the reader to a recent review article on neural rendering [16].",mentions a harmful application,13
16
- Neural Message Passing for Multi-Relational Ordered and Recursive Hypergraphs,https://proceedings.neurips.cc/paper/2020/file/217eedd1ba8c592db97d0dbe54c7adfc-Paper.pdf,"Message Passing Neural Networks (MPNNs) are a framework for deep learning on graph structured data. Graph structures are universal and very generic structures commonly seen in various forms in computer vision, natural language processing, recommender systems, traffic prediction, generative models, and many more. Graphs can have many variations such as multi-relational, heterogeneous, hypergraphs, etc. Our research in this paper unifies several existing MPNN methods on these variations. While we show how our research could be used for academic networks, and factual knowledge, it opens up many more possibilities in natural language processing (NLP). We see opportunities for research applying our work for beneficial puroposes, such as investigating whether we could improve performance of NLP tasks such as machine reading comprehension, relation extraction, machine translation, and many more. Potentially hazardous applications include trying to predict criminality or credit from social networks. Such applications may reproduce and exacerbate bias and readers of the paper should be aware that the presented model should not applied naively to such tasks.",mentions a harmful application,14
17
- COT-GAN: Generating Sequential Data via Causal Optimal Transport,https://proceedings.neurips.cc/paper/2020/file/641d77dd5271fca28764612a028d9c8e-Paper.pdf,"The COT-GAN algorithm introduced in this paper is suitable to generate sequential data, when the real dataset consists of i.i.d. sequences or of stationary time series. It opens up doors to many applications that can benefit from time series synthesis. For example, researchers often do not have access to abundant training data due to privacy concerns, high cost, and data scarcity. This hinders the capability of building accurate predictive models. Ongoing research is aimed at developing a modified COT-GAN algorithm to generate financial time series. The high non-stationarity of financial data requires different features and architectures, whilst causality when measuring distances between sequences remains the crucial tool. The application to market generation is of main interest for the financial and insurance industry, for example in model- independent pricing and hedging, portfolio selection, risk management, and stress testing. In broader scientific research, our approach can be used to estimate from data the parameters of simulation-based models that describe physical processes. These models can be, for instance, differential equations describing neural activities, compartmental models in epidemiology, and chemical reactions involving multiple reagents.",doesn't mention a harmful application,15
18
- Cream of the Crop: Distilling Prioritized Paths For One-Shot Neural Architecture Search,https://proceedings.neurips.cc/paper/2020/file/d072677d210ac4c03ba046120f0802ec-Paper.pdf,"Similar to previous NAS works, this work does not have immediate societal impact, since the algorithm is only designed for image classification, but it can indirectly impact society. As an example, our work may inspire the creation of new algorithms and applications with direct societal implications. Moreover, compared with other NAS methods that require additional teacher model to guide the training process, our method does not need any external teacher models. So our method can be used in a closed data system, ensuring the privacy of user data.",doesn't mention a harmful application,16
19
- Deep Evidential Regression,https://proceedings.neurips.cc/paper/2020/file/aab085461de182608ee9f607f3f7d18f-Paper.pdf,"Uncertainty estimation for neural networks has very significant societal impact. Neural networks are increasingly being trained as black-box predictors and being placed in larger decision systems where errors in their predictions can pose immediate threat to downstream tasks. Systematic methods for calibrated uncertainty estimation under these conditions are needed, especially as these systems are deployed in safety critical domains, such for autonomous vehicle control [29], medical diagnosis [43], or in settings with large dataset imbalances and bias such as crime forecasting [24] and facial recognition [3]. This work is complementary to a large portion of machine learning research which is continually pushing the boundaries on neural network precision and accuracy. Instead of solely optimizing larger models for increased performance, our method focuses on how these models can be equipped with the ability to estimate their own confidence. Our results demonstrating superior calibration of our method over baselines are also critical in ensuring that we can place a certain level of trust in these algorithms and in understanding when they say “I don’t know”. While there are clear and broad benefits of uncertainty estimation in machine learning, we believe it is also important to recognize potential societal challenges that may arise. With increased performance and uncertainty estimation capabilities, humans will inevitably become increasingly trusting in a model’s predictions, as well as its ability to catch dangerous or uncertain decisions before they are executed. Thus, it is important to continue to pursue redundancy in such learning systems to increase the likelihood that mistakes can be caught and corrected independently.",mentions a harmful application,17
20
- The Value Equivalence Principle for Model-Based Reinforcement Learning,https://proceedings.neurips.cc/paper/2020/file/3bb585ea00014b0e3ebe4c6dd165a358-Paper.pdf,"The bulk of the research presented in this paper consists of foundational theoretical results about the learning of models for model-based reinforcement learning agents. While applications of these agents can have social impacts depending upon their use, our results merely serve to illuminate desirable properties of models and facilitate the subsequent training of agents using them. In short, this work is largely theoretical and does not present any foreseeable societal impact, except in the general concerns over progress in artificial intelligence.",doesn't mention a harmful application,18
21
- Graph Policy Network for Transferable Active Learning on Graphs,https://proceedings.neurips.cc/paper/2020/file/73740ea85c4ec25f00f9acbd859f861d-Paper.pdf,"Graph-structured data are ubiquitous in real world, covering a variety of domains and applications such as social science, biology, medicine, and political science. In many domains such as biology and medicine, annotating a large number of labeled data could be extremely expensive and time consuming. Therefore, the algorithm proposed in this paper could help significantly reduce the labeling efforts in these domains — we can train systems on domains where labeled data are available, then transfer to those lower-resource domains. We believe such systems can help accelerating some research and develop processes that usually take a long time, in domains such as drug development. It can potentially also lower the cost for such research by reducing the need of expert-annotations. However, we also acknowledge potential social and ethical issues related to our work. 1. Our proposed system can effectively reduce the need of human annotations. However, in a broader point of view, this can potentially lead to a reduction of employment opportunities which may cause layoff to data annotators. 2. GNNs are widely used in domains related to critical needs such as healthcare and drug development. The community needs to be extra cautious and rigorous since any mistake may cause harm to patients. 3. Training the policy network for active learning on multiple graphs is relatively time - and computational resource - consuming. This line of research may produce more carbon footprint compared to some other work. Therefore, how to accelerate the training process by developing more efficient algorithms requires further investigation. Nonetheless, we believe that the directions of active learning and transfer learning provide a hopeful path towards our ultimate goal of data efficiency and interpretable machine learning.",mentions a harmful application,19
22
- User-Dependent Neural Sequence Models for Continuous-Time Event Data,https://proceedings.neurips.cc/paper/2020/file/f56de5ef149cf0aedcc8f4797031e229-Paper.pdf,"While many of the successful and highly-visible applications of machine learning are in classification and regression, there are a broad range of applications that don’t naturally fit into these categories and that can potentially benefit significantly from machine learning approaches. In particular, in this paper we focus on continuous-time event data, which is very common in real-world applications but has not yet seen significant attention from the ML research community. There are multiple important problems in society where such data is common and that could benefit from the development of better predictive and simulation, including: • Education: Understanding of individual learning habits of students, especially in online educa- tional programs, could improve and allow for more personalized curricula. • Medicine: Customized tracking and predictions of medical events could save lives and improve patients’ quality of living. • Behavioral Models: Person-specific simulations of their behavior can lead to better systematic understandings of people’s social activities and actions in day-to-day lives. • Cybersecurity: Through the user identification capabilities, our work could aid in cyber-security applications for the purposes of identifying fraud detection and identify theft. Another potential positive broad impact of the work, is that by utilizing amortized VI, our methods do not require further costly training or fine-tuning to accommodate new users, which can potentially produce energy savings and lessen environmental impact in a production setting. On the other hand, as with many machine learning technologies, there is also always the potential for negative impact from a societal perspective. For example, more accurate individualized models for user-generated data could be used in a negative fashion for applications such as surveillance (e.g., to monitor and negatively impact individuals in protected groups). In addition, better predictions and recommendations for products and services, through explicitly conditioning on prior behavior from a user, could potentially further worsen existing privacy concerns.",mentions a harmful application,20
23
- Self-paced Contrastive Learning with Hybrid Memory for Domain Adaptive Object Re-ID,https://proceedings.neurips.cc/paper/2020/file/821fa74b50ba3f7cba1e6c53e8fa6845-Paper.pdf,"Our method can help to identify and track different types of objects ( e . g ., vehicles, cyclists, pedestrians, etc . ) across different cameras (domains), thus boosting the development of smart retail, smart transportation, and smart security systems in the future metropolises. In addition, our proposed self-paced contrastive learning is quite general and not limited to the specific research field of object re-ID. It can be well extended to broader research areas, including unsupervised and semi-supervised representation learning. However, object re-ID systems, when applied to identify pedestrians and vehicles in surveillance systems, might give rise to the infringement of people’s privacy, since such re-ID systems often rely on non-consensual surveillance data for training, i . e ., it is unlikely that all human subjects even knew they were being recorded. Therefore, governments and officials need to carefully establish strict regulations and laws to control the usage of re-ID technologies. Otherwise, re-ID technologies can potentially equip malicious actors with the ability to surveil pedestrians or vehicles through multiple CCTV cameras without their consent. The research committee should also avoid using the datasets with ethics issues, e . g ., DukeMTMC [37], which has been taken down due to the violation of data collection terms, should no longer be used. We would not evaluate our method on DukeMTMC related benchmarks as well. Furthermore, we should be cautious of the misidentification of the re-ID systems to avoid possible disturbance. Also, note that the demographic makeup of the datasets used is not representative of the broader population.",mentions a harmful application,21
24
- Real World Games Look Like Spinning Tops,https://proceedings.neurips.cc/paper/2020/file/ca172e964907a97d5ebd876bfdd4adbd-Paper.pdf,"This work focuses on better understanding of mathematical properties of real world games and how they could be used to understand successful AI techniques that were developed in the past. Since we focus on retrospective analysis of a mathematical phenomenon, on exposing an existing structure, and deepening our understanding of the world, we do not see any direct risks it entails. Introduced notions and insights could be used to build better, more engaging AI agents for people to play with in real world games (e.g. AIs that grow with the player, matching their strengths and weaknesses). In a broader spectrum, some of the insights could be used for designing and implementing new games, that humans would fine enjoyable though challenges they pose. In particular it could be a viewed as a model for measuring how much notion of progress the game consists of. However, we acknowledge that methods enabling improved analysis of games may be used for designing products with potentially negative consequences (e.g., games that are highly addictive) rather than positive (e.g., games that are enjoyable and mentally developing).",mentions a harmful application,22
25
- Adapting Neural Architectures Between Domains,https://proceedings.neurips.cc/paper/2020/file/08f38e0434442128fab5ead6217ca759-Paper.pdf,This paper provides a novel perspective of cross-domain generalization in neural architecture search towards the efficient design of neural architectures with strong generalizability. This will lead to a better understanding of the generalizability of neural architectures. The proposed method will be used to design neural architectures for computer vision tasks with affordable computation cost.,doesn't mention a harmful application,23
26
- Modeling Noisy Annotations for Crowd Counting,https://proceedings.neurips.cc/paper/2020/file/22bb543b251c39ccdad8063d486987bb-Paper.pdf,"In this paper, we introduce a novel loss function for counting crowd numbers by explicitly considering annotation noise. It can be applied to any density map based network architecture and improve the counting accuracy generally. The research is also helpful for monitoring the crowd number in public and prevent the accidents caused by overcrowding. It could also be used in retail businesses to estimate the occupancy of a store or area, which helps with personal and resource management. Our method could also be applied to other objects, such as cell counting, plant/animal counting, etc, and other research areas that use point-wise annotations, e.g., eye gaze estimation. Since the research is based on images captured by cameras, users may be concerned about the privacy problem. However, our method does not directly detect or track individuals, and thus this concern may be eased.",doesn't mention a harmful application,24
27
- Byzantine Resilient Distributed Multi-Task Learning,https://proceedings.neurips.cc/paper/2020/file/d37eb50d868361ea729bb4147eb3c1d8-Paper.pdf,"The problem of Byzantine resilient aggregation of distributed machine learning models has been actively studied in recent years; however, the issue of Byzantine resilient distributed learning in multi-task networks has received much less attention. It is a general intuition that MTL is robust and resilient to cyber-attacks since it can identify attackers by measuring similarities between neighbors. In this paper, we have shown that some commonly used similarity measures are not resilient against certain attacks. With an increase in data heterogeneity, we hope this work could highlight the security and privacy concerns in designing distributed MTL frameworks.",doesn't mention a harmful application,25
28
- From Predictions to Decisions: Using L kahead Regularization,https://proceedings.neurips.cc/paper/2020/file/2adcfc3929e7c03fac3100d3ad51da26-Paper.pdf,"In our work, the learning objective was designed to align with and support the possible use of a predictive model to drive decisions by users. It is our belief that a responsible and transparent deployment of models with “lookahead-like"" regularization components should avoid the kinds of mistakes that can be made when predictive methods are conflated with causally valid methods. At the same time, we have made a strong simplifying assumption, that of covariate shift, which requires that the relationship between covariates and outcome variables is invariant as decisions are made and the feature distribution changes. This strong assumption is made to ensure validity for the lookahead regularization, since we need to be able to perform inference about counterfactual observations. As discussed by Mueller et al. [ 31] and Peters et al. [34], there exist real-world tasks that reasonably satisfy this assumption, and yet at the same time, other tasks— notably those with unobserved confounders —where this assumption would be violated. Moreover, this assumption is not testable on the observational data. This, along with the need to make an assumption about the user decision model, means that an application of the method proposed here should be done with care and will require some domain knowledge to understand whether or not the assumptions are plausible. Furthermore, the validity of the interval estimates requires that any assumptions for the interval model used are satisfied and that weights w provide a reasonable estimation of p /p . In particular, fitting to p which has little to no overlap with p (see Figure 2) may result in underestimating the possibility of bad outcomes. If used carefully and successfully, then the system provides safety and protects against the misuse of a model. If used in a domain for which the assumptions fail to hold then the framework could make things worse, by trading accuracy for an incorrect view of user decisions and the effect of these decisions on outcomes. We would also caution against any specific interpretation of the application of the model to the wine and diabetes data sets. We note that model misspecification of f ∗ could result in arbitrarily bad outcomes, and estimating f ∗ in any high-stakes setting requires substantial domain knowledge and should err on the side of caution. We use the data sets for purely illustrative purposes because we believe the results are representative of the kinds of results that are available when the method is correctly applied to a domain of interest.",mentions a harmful application,26
29
- Finite-Time Analysis of Round-Robin Kullback-Leibler Upper Confidence Bounds for Optimal Adaptive Allocation with Multiple Plays and Markovian Rewards,https://proceedings.neurips.cc/paper/2020/file/597c7b407a02cc0a92167e7a371eca25-Paper.pdf,"This work touches upon a very old problem dating back to 1933 and the work of [39]. Therefore, we don’t anticipate any new societal impacts or ethical aspects, that are not well understood by now.",doesn't mention a harmful application,27
30
- Towards Interaction Detection Using Topological Analysis on Neural Networks,https://proceedings.neurips.cc/paper/2020/file/473803f0f2ebd77d83ee60daaa61f381-Paper.pdf,"The proposed PID algorithm can be applied in various fields because it provides knowledge about a domain. Any researcher who needs to design experiments might benefit from our proposed algorithm in the sense that it can help researchers formulate hypotheses that could lead to new data collection and experiments. For example, PID can help us discover the combined effects of drugs on human body: By utilizing PID on patients’ records, we might find using Phenelzine togther with Fluoxetine has a strong interaction effect towards serotonin syndrome. Thus, PID has great potential in helping the development of new therapies for saving lives. Also, this project will lead to effective and efficient algorithms for finding useful any-order crossing features in an automated way. Finding useful crossing features is one of the most crucial task in the Recommender Systems. Engineers and Scientists in E-commerce companies may benefit from our results that our algorithm can alleviate the human effect on finding these useful patterns in the data.",doesn't mention a harmful application,28
31
- Why Normalizing Flows Fail to Detect Out-of-Distribution Data,https://proceedings.neurips.cc/paper/2020/file/ecb9fe2fbb99c31f567e9823e884dbec-Paper.pdf,"Out-of-distribution detection is crucial for robust, reliable and fair machine learning systems. Mitchell et al. [27] and Gebru et al. [13] argue that applying machine learning models outside of the context where they were trained and tested can lead to dangerous and discriminatory outcomes in high-stake domains. We hope that our work will generally contribute to the understanding of out-of-distribution detection and facilitate methodological progress in this area.",doesn't mention a harmful application,29
32
- AdaShare: Learning What To Share For Efficient Deep Multi-Task Learning,https://proceedings.neurips.cc/paper/2020/file/634841a6831464b64c072c8510c7f35c-Paper.pdf,"Our research improves the capacity of deep neural networks to solve many tasks at once in a more efficient manner. It enables the use of smaller networks to support more tasks, while performing knowledge transfer between related tasks to improve their accuracy. For example, we showed that our proposed approach can solve five computer vision tasks (semantic segmentation, surface normal prediction, depth prediction, keypoint detection and edge estimation) with 80% fewer parameters while achieving the same performance as the standard approach. Our approach can thus have a positive impact on applications that require multiple tasks such as computer vision for robotics. Potential applications could be in assistive robots, autonomous navigation, robotic picking and packaging, rescue and emergency robotics and AR/VR systems. Our research can reduce the memory and power consumption of such systems and enable them to be deployed for longer periods of time and become smaller and more agile. The lessened power consumption could have a high impact on the environment as AI systems become more prevalent. Negative impacts of our research are difficult to predict, however, it shares many of the pitfalls associated with deep learning models. These include susceptibility to adversarial attacks and data poisoning, dataset bias, and lack of interpretablity. Other risks associated with deployment of computer vision systems include privacy violations when images are captured without consent, or used to track individuals for profit, or increased automation resulting in job losses. While we believe that these issues should be mitigated, they are beyond the scope of this paper. Furthermore, we should be cautious of the result of failure of the system which could impact the performance/user experience of the high-level AI systems relied on our research.",mentions a harmful application,30
33
- AOT: Appearance Optimal Transport Based Identity Swapping for Forgery Detection,https://proceedings.neurips.cc/paper/2020/file/f718499c1c8cef6730f9fd03c8125cab-Paper.pdf,"Deepfake refers to synthesized media in which a portrait of a person in real media is replaced by that of someone else. Deepfakes have been widely applied in the digital entertainment industry, but they also present potential threats to the public. Identity swapping is an approach to produce Deepfakes and is also the research direction of this paper. Given the sensitivity of Deepfakes and their potential negative impacts, we further discuss the potential threats and the corresponding mitigation solutions with respect to our work.",mentions a harmful application,31
34
- Permute-and-Flip: A new mechanism for differentially private selection,https://proceedings.neurips.cc/paper/2020/file/01e00f2f4bfcbb7505cb641066f2859b-Paper.pdf,"Our work fi ts in the established research area of differential privacy, which enables the positive societal bene fi ts of gleaning insight and utility from data sets about people while offering formal guarantees of privacy to individuals who contribute data. While these bene fi ts are largely positive, unintended harms could arise due to misapplication of differential privacy or misconceptions about its guarantees. Additionally, dif fi cult social choices are faced when deciding how to balance privacy and utility. Our work addresses a foundational differential privacy task and enables better utility-privacy tradeoffs within this broader context.",mentions a harmful application,32
35
- Classification with Valid and Adaptive Coverage,https://proceedings.neurips.cc/paper/2020/file/244edd7e85dc81602b7615cd705545f5-Paper.pdf,"Machine learning algorithms are increasingly relied upon by decision makers. It is therefore crucial to combine the predictive performance of such complex machinery with practical guarantees on the reliability and uncertainty of their output. We view the calibration methods presented in this paper as an important step towards this goal. In fact, uncertainty estimation is an effective way to quantify and communicate the benefits and limitations of machine learning. Moreover, the proposed methodologies provide an attractive way to move beyond the standard prediction accuracy measure used to compare algorithms. For instance, one can compare the performance of two candidate predictors, e.g., random forest and neural network (see Figure 3), by looking at the size of the corresponding prediction sets and/or their their conditional coverage. Finally, the approximate conditional coverage that we seek in this work is highly relevant within the broader framework of fairness, as discussed by [17] within a regression setting. While our approximate conditional coverage already implicitly reduces the risk of unwanted bias, an equalized coverage requirement [17] can also be easily incorporated into our methods to explicitly avoid discrimination based on protected categories. We conclude by emphasizing that the validity of our methods relies on the exchangeability of the data points. If this assumption is violated (e.g., with time-series data), our prediction sets may not have the right coverage. A general suggestion here is to always try to leverage specific knowledge of the data and of the application domain to judge whether the exchangeability assumption is reasonable. Finally, our data-splitting techniques in Section 4 offer a practical way to verify empirically the validity of the predictions on any given data set.",doesn't mention a harmful application,33
36
- Learning Kernel Tests Without Data Splitting,https://proceedings.neurips.cc/paper/2020/file/44f683a84163b3523afe57c2e008bc8c-Paper.pdf,"Hypothesis testing and valid inference after model selection are fundamental problems in statistics, which have recently attracted increasing attention also in machine learning. Kernel tests such as MMD are not only used for statistical testing, but also to design algorithms for deep learning and GANs [41, 42]. The question of how to select the test statistic naturally arises in kernel-based tests because of the kernel choice problem. Our work shows that it is possible to overcome the need of (wasteful and often heuristic) data splitting when designing hypothesis tests with feasible null distribution. Since this comes without relevant increase in computational resources we expect the proposed method to replace the data splitting approach in applications that fit the framework considered in this work. Theorem 1 is also applicable beyond hypothesis testing and extends the previously known PSI framework proposed by Lee et al. [24].",doesn't mention a harmful application,34
37
- Passport-aware Normalization for Deep Model Protection,https://proceedings.neurips.cc/paper/2020/file/ff1418e8cc993fe8abcfe3ce2003e5c5-Paper.pdf,"Though deep learning evolves very fast in these years, IP protection for deep models is seriously under-researched. In this work, we mainly aim to propose a general technique for deep model IP protection. It will help both academia and industry to protect their interests from illegal distribution or usage. We hope it can inspire more works along this important direction.",doesn't mention a harmful application,35
38
- Group Knowledge Transfer: Federated Learning of Large CNNs at the Edge,https://proceedings.neurips.cc/paper/2020/file/a1d4c20b182ad7137ab3606f0e3fc8a4-Paper.pdf,"FedGKT can efficiently train large deep neural networks (CNNs) in resource-constrained edge devices (such as smartphones, IoT devices, and edge servers). Unlike past FL approaches, FedGKT demonstrates the feasibility of training a large server-side model by using many small client models. FedGKT preserves the data privacy requirements of the FL approach but also works within the constraints of an edge computing environment. Smartphone users may benefit from this technique because their private data is protected, and they may also simultaneously obtain a high-quality model service. Organizations such as hospitals, and other non-profit entities with limited training resources, can collaboratively train a large CNN model without revealing their datasets while achieving significant training cost savings. They can also meet requirements regarding the protection of intellectual property, confidentiality, regulatory restrictions, and legal constraints. As for the potential risks of our method, a client can maliciously send incorrect hidden feature maps and soft labels to the server, which may potentially impact the overall model accuracy. These effects must be detected and addressed to maintain overall system stability. Second, the relative benefits for each client may vary. For instance, in terms of fairness, edge nodes which have smaller datasets may obtain more model accuracy improvement from collaborative training than those which have a larger amount of training data. Our training framework does not consider how to balance this interest of different parties.",mentions a harmful application,36
39
- Improving Local Identifiability in Probabilistic Box Embeddings,https://proceedings.neurips.cc/paper/2020/file/01c9d2c5b3ff5cbba349ec39a570b5e3-Paper.pdf,This work does not present any foreseeable societal consequence.,doesn't mention a harmful application,37
40
- A Finite-Time Analysis of Two Time-Scale Actor-Critic Methods,https://proceedings.neurips.cc/paper/2020/file/cc9b3c69b56df284846bf2432f1cba90-Paper.pdf,"This work could positively impact the industrial application of actor-critic algorithms and other reinforcement learning algorithms. The theorem exhibits the sample complexity of actor-critic algorithms, which could be used to estimate required training time of reinforcement learning models. Another direct application of our result is to set the learning rate according to the finite-time bound, by optimizing the constant factors of the dominant terms. In this sense, the result could potentially reduce the overhead of hyper-parameter tuning, thus saving both human and computational resources. Moreover, the new analysis in this paper can potentially help people in different fields to understand the broader class of two-time scale algorithms, in addition to actor-critic methods. To our knowledge, this algorithm and theory studied in our paper do not have any ethical issues.",doesn't mention a harmful application,38
41
- Active Invariant Causal Prediction: Experiment Selection through Stability,https://proceedings.neurips.cc/paper/2020/file/b197ffdef2ddc3308584dce7afa3661b-Paper.pdf,"Any method that learns from finite data is subject to statistical estimation errors and model assumptions that necessarily limit the full applicability of its findings. Unfortunately, study outcomes are not always communicated with the required qualifications. As an example, statistical hypothesis testing is often employed carelessly, e.g. by using p-values to claim “statistical significance” without paying attention to the underlying assumptions [5]. There is a danger that this problem gets exacerbated when one aims to estimate causal structures. Estimates from causal inference algorithms could be claimed to “prove” a given causal relationship, ruling out various alternative explanations that one would consider when explaining a statistical association. For example, ethnicity could be claimed to have a causal effect on criminality and thereby used as a justification for oppressive political measures. While this would represent a clear abuse of the technology, we as researchers have to ensure that similar mistakes in interpretation are not made unintentionally. This implies being conscientious about understanding as well as stating the limitations of our research. While there is a risk that causal inference methods are misused as described above, there is of course also an array of settings where causal learning—and in particular active causal learning—can be extremely useful. As our main motivation we envision the empirical sciences where interventions correspond to physical experiments which can be extremely costly in terms of time and/or money. For complex systems, as for example gene regulatory networks in biology, it might be difficult for human scientists to choose informative experiments, particularly if they are forced to rely on data alone. Our goal is to develop methods to aid scientists to better understand their data and perform more effective experiments, resulting in significant resource savings. The specific impact of our proposed methodology will depend on the application. For the method we propose in this work, one requirement for application would be that the experiments yield more than one data point (and ideally many), so that our invariance-based approach can be employed. In future work, we aim to develop methodology that is geared towards the setting where only very few data points per experiment are available.",doesn't mention a harmful application,39
42
- Continuous Meta-Learning without Tasks,https://proceedings.neurips.cc/paper/2020/file/cc3f5463bc4d26bc38eadc8bcffbc654-Paper.pdf,"Our work provides a method to extend meta-learning algorithms beyond the task-segmented case, to the time series series domain. Equivalently, our work extends core methods in changepoint detection, enabling the use of highly expressive predictive models via empirical Bayes. This work has the potential to extend the domain of applicability of both of these methods. Standard meta-learning relies on a collection of datasets, each corresponding to discrete tasks. A natural question is how such datasets are constructed; in many cases, these datasets rely on segmentation of time series data by experts. Thus, our work has the potential to make meta-learning algorithms applicable to problems that, previously, would have been too expensive or impossible to segment. Moreover, our work has the potential to improve the applicability of changepoint detection methods to difficult time series forecasting problems. While MOCA has the potential to expand the domain of problems addressable via meta-learning, this has the effect of amplifying the risks associated with these methods. Meta-learning enables efficient learning for individual members of a population via leveraging empirical priors. There are clear risks in few-shot learning generally: for example, efficient facial recognition from a handful of images has clear negative implications for privacy. Moreover, while there is promising initial work on fairness for meta-learning [39], we believe considerable future research is required to understand the degree to which meta-learning algorithms increase undesirable bias or decrease fairness. While it is plausible that fine-tuning to the individual results in reduced bias, there are potential unforeseen risks associated with the adaptation process, and future research should address how bias is potentially introduced in this process. Relative to decision making rules that are fixed across a population, algorithms which fine-tune decision making to the individual present unique challenges in analyzing fairness. Further research is required to ensure that the adaptive learning enabled by algorithms such as MOCA do not lead to unfair outcomes.",mentions a harmful application,40
43
- Learning Rich Rankings,https://proceedings.neurips.cc/paper/2020/file/6affee954d76859baa2800e1c49e2c5d-Paper.pdf,"Flexible ranking distributions that can be learned with provable guarantees can facilitate more powerful and reliable ranking algorithms inside recommender systems, search engines, and other ranking-based technological products. As a potential adverse consequence, more powerful and reliable learning algorithms can lead to an increased inappropriate reliance on technological solutions to complex problems, where practitioners may be not fully grasp the limitations of our work, e.g. independence assumptions, or that our risk bounds, as established here, do not hold for all data generating processes.",mentions a harmful application,41
44
- Reinforcement Learning for Control with Multiple Frequencies,https://proceedings.neurips.cc/paper/2020/file/216f44e2d28d4e175a194492bde9148f-Paper.pdf,"In recent years, reinforcement learning (RL) has shown remarkable successes in various areas, where most of their results are based on the assumption that all decision variables are simultaneously determined at every discrete time step. However, many real-world sequential decision-making problems involve multiple decision variables whose control frequencies are different by the domain requirement. In this situation, standard RL algorithms without considering the control frequency requirement may suffer from severe performance degradation as discussed in Section 3. This paper provides a theoretical and algorithmic foundation of how to address multiple control frequencies in RL, which enables RL to be applied to more complex and diverse real-world problems that involve decision variables with different frequencies. Therefore, this work would be beneficial for those who want to apply RL to various tasks that inherently have multiple control frequencies. As we provide a general-purpose methodology, we believe this work has little to do with a particular system failure or a particular data bias. On the other hand, this work could contribute to accelerating industrial adoption of RL, which has the potential to adversely affect employment due to automation.",mentions a harmful application,42
45
- Latent Dynamic Factor Analysis of High-Dimensional Neural Recordings,https://proceedings.neurips.cc/paper/2020/file/beb04c41b45927cf7e9f8fd4bb519e86-Paper.pdf,"While progress in understanding the brain is improving life through research, especially in mental health and addiction, in no case is any brain disorder well understood mechanistically. Faced with the reality that each promising discovery inevitably reveals new subtleties, one reasonable goal is to be able to change behavior in desirable ways by modifying specific brain circuits and, in animals, technologies exist for circuit disruptions that are precise in both space and time. However, to determine the best location and time for such disruptions to occur, with minimal off-target effects, will require far greater knowledge of circuits than currently exists: we need good characterizations of interactions among brain regions, including their timing relative to behavior. The over-arching aim of our research is to provide methods for describing the flow of information, based on evolving neural activity, among multiple regions of the brain during behavioral tasks. Such methods can lead to major advances in experimental design and, ultimately, to far better treatments than currently exist.",doesn't mention a harmful application,43
46
- Reducing Adversarially Robust Learning to Non-Robust PAC Learning,https://proceedings.neurips.cc/paper/2020/file/a822554e5403b1d370db84cfbc530503-Paper.pdf,"Learning predictors that are robust to adversarial perturbations is an important challenge in contem- porary machine learning. Current machine learning systems have been shown to be brittle against different notions of robustness such as adversarial perturbations [Szegedy et al., 2013, Biggio et al., 2013, Goodfellow et al., 2014], and there is an ongoing effort to devise methods for learning predictors that are adversarially robust. As machine learning systems become increasingly integrated into our everyday lives, it becomes crucial to provide guarantees about their performance, even when they are used outside their intended conditions. We already have many tools developed for standard learning, and having a universal wrapper that can take any standard learning method and turn it into a robust learning method could greatly simplify the development and deployment of learning that is robust to test-time adversarial perturbations. The results that we present in this paper are still mostly theoretical, and limited to the realizable setting, but we expect and hope they will lead to further theoretical study as well as practical methodological development with direct impact on applications. In this work we do not deal with training-time adversarial attacks, which is a major, though very different, concern in many cases. As with any technology, having a more robust technology can have positive and negative societal consequences, and this depends mainly on how such technology is utilized. Our intent from this research is to help with the design of robust machine learning systems for application domains such as healthcare and transportation where its critical to ensure performance guarantees even outside intended conditions. In situations where there is a tradeoff between robustness and accuracy, this work might be harmful in that it would prioritize robustness over accuracy and this may not be ideal in some application domains.",mentions a harmful application,44
47
- Online Non-Convex Optimization with Imperfect Feedback,https://proceedings.neurips.cc/paper/2020/file/c7c46d4baf816bfb07c7f3bf96d88544-Paper.pdf,This is a theoretical work which does not present any foreseeable societal consequence.,doesn't mention a harmful application,45
48
- Digraph Inception Convolutional Networks,https://proceedings.neurips.cc/paper/2020/file/cffb6e2288a630c2a787a64ccc67097c-Paper.pdf,"GCNs could be applied to a wide range of applications, including image segmentation [27], speech recognition [14], recommender system [17], point cloud [50, 24], traffic prediction [25] and many more [45]. Our method can help to expand the graph types from undirected to directed in the above application scenarios and obtain multi-scale features from the high-order hidden directed structure. For traffic prediction, our method can be used in map applications to obtain more fine-grained and accurate predictions. This requires users to provide location information, which has a risk of privacy leakage. The same concerns also arise in social network analysis [38], person re-ID [35] and NLP [49], which use graph convolutional networks as their feature extraction methods. Another potential risk is that our model may be adversarial attacked by adding new nodes or deleting existing edges. For example, in a graph-based recommender system, our model may produce completely different recommendation results due to being attacked. We see opportunities for research applying DiGCN to beneficial purposes, such as investigating the ability of DiGCN to discover hidden complex directed structure, the limitation of approximate method based on personalized PageRank and the feature oversmoothing problem in digraphs. We also encourage follow-up research to design derivative methods for different tasks based on our method.",mentions a harmful application,46
49
- Learning Physical Constraints with Neural Projections,https://proceedings.neurips.cc/paper/2020/file/37bc5e7fb6931a50b3464ec66179085f-Paper.pdf,This research constitutes a technical advance by employing constraint projection operations to enhance the prediction capability of physical systems with unknown dynamics. It opens up new possibilities to effectively and intuitively represent complicated physical systems from direct and limited observation. This research blend the borders among the communities of machine learning and fast physics simulations in computer graphics and gaming industry. Our model does not necessarily bring about any significant ethical considerations.,doesn't mention a harmful application,47
50
- Sub-sampling for Efficient Non-Parametric Bandit Exploration,https://proceedings.neurips.cc/paper/2020/file/3ab6be46e1d6b21d59a3c3a0b9d0f6ef-Paper.pdf,"This work is advertising a new way to do non-parametric exploration in bandit models, that enjoy good empirical performance and strong theoretical guarantees. First, bandit problems are at the heart of numerous applications to online content recommendation, hence the good performance of SDA algorithms may inspire new algorithms for more realistic models used for these applications, such as contextual bandits. Then, exploration is a central question in the broader field of reinforcement learning, hence new ideas for bandits may lead to new ideas for reinforcement learning.",doesn't mention a harmful application,48
51
- The Discrete Gaussian for Differential Privacy,https://proceedings.neurips.cc/paper/2020/file/b53b3a3d6ab90ce0268229151c9bde11-Paper.pdf,"We have provided a thorough analysis of the privacy and utility properties of the discrete Gaussian and the practicality of sampling it. The impact of this work is that it makes the real-world deployment of differential privacy more practical and secure. In particular, we bridge the gap between the theory (which considers continuous distributions) and the practice (where precision is finite and numerical errors can cause a dramatic privacy failures). We hope that the discrete Gaussian will be used in practice and, further, that our work is critical to enabling these real-world deployments. The positive impact of this work is clear: Differential privacy provides a principled and quantitative way to balance rigorous privacy guarantees and statistical utility in data analysis. If this technology is adopted, it can provide untrusted third parties controlled access to data (e.g., to enable scientific research), while affording the data subjects (i.e., the general public) an adequate level of privacy protection. In any case, our methods are better than using flawed methods (i.e., naïve floating-point implementations of continuous distributions) that inject noise without actually protecting privacy or using methods (such as rounding or discrete Laplace) that offer a worse privacy-utility tradeoff. The negative impact of this work is less clear. All technologies can be misused. For example, an organization may be able to deceptively claim that their system protects privacy on the basis that it is differentially private, when, in reality, it is not private at all, because their privacy parameter is enormous (e.g., ε = 10 6 ). One needs to be careful and critical about promises made by such companies, and educate the general audience about what differential privacy does provide, what it does not, and when guarantees end up being meaningless. However, we must acknowledge that there is a small – but vocal – group of people who do not want differential privacy to be deployed in practice. In particular, the US Census Bureau’s planned adoption of differential privacy for the 2020 US Census has met staunch opposition from some social scientists. We cannot speak for the opponents of differential privacy; many of their objections do not make sense to us and thus it would be inappropriate for us to try summarizing them. However, there is a salient point that needs to be discussed: Differential privacy provides a principled and quantitative way to balance rigorous privacy guarantees and statistical utility in data analysis. This is good, in theory, but, in practice, privacy versus utility is a heated and muddy debate. On one hand, data users (such as social scientists) want unfettered access to the raw data. On the other hand, privacy advocates want the data locked up or never collected in the first place. The technology of differential privacy offers a vehicle for compromise. Yet, some parties are not interested in compromise. In particular, users of census data users are accustomed to largely unrestricted data access. From a privacy perspective, this is unsustainable – the development of reconstruction attacks and the availability of large auxiliary datasets for linking/re-identification has shown that census data needs more robust protections. Understandably, those who rely on census data are deeply concerned about anything that may compromise their ability to conduct research. The adoption of differential privacy has prompted uncomfortable (but necessary) discussions about the value of providing data access relative to the privacy cost. In particular, it is necessary to decide how to allocate the privacy budget – which statistics are most important to release accurately? Another dimension of the privacy-versus-utility debate is how it affects small communities, such as racial/ethnic minorities or rural populations. Smaller populations inherently suffer a harsher privacy- utility tradeoff. Differential privacy is almost always defined so that it provides every person with an equal level of privacy. Consequently, differentially private statistics for smaller populations (e.g., Native Americans in a small settlement) will be less accurate than for larger populations (e.g., Whites in a large US city). More precisely, noise addition methods like ours offer the same absolute accuracy on all populations, but the relative accuracy will be worse when the denominator (i.e., population size) is smaller. The only alternative is to offer small communities weaker privacy protections. We stress that this issue is not specific to differential privacy. For example, if we rely on anonymity or de-identification, then we must grapple with the fact that minorities are more easily re-identified, since, by definition, minorities are more unique. This is a fundamental tradeoff that needs to be carefully considered with input from the minorities and communities concerned. Ultimately, computer scientists can only provide tools and it is up to policymakers in government and other organizations to decide how to use them. This work, along with the broader literature on differential privacy, provides such tools. However, the research community also has a responsibility to provide instructions for how these tools should and should not be used.",mentions a harmful application,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/one_stop_english/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "one_stop_english", "description": "", "data_columns": ["Article", "ID"], "label_columns": {"Label": ["advanced", "elementary", "intermediate"]}}
 
 
data/one_stop_english/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/one_stop_english/train.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/overruling/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "overruling", "description": "", "data_columns": ["Sentence", "ID"], "label_columns": {"Label": ["not overruling", "overruling"]}}
 
 
data/overruling/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/overruling/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Sentence,Label,ID
2
- "in light of both our holding today and previous rulings in johnson, dueser, and gronroos, we now explicitly overrule dupree.",overruling,0
3
- "see mciver, 134 n.c.app. at 588, 518 s.e.2d at 526.",not overruling,1
4
- "to the extent that paprskar v. state, supra, applied the general test of waiver of constitutional rights set forth in johnson v. zerbst, supra, it is no longer viable.",overruling,2
5
- "we reverse and remand, and in doing so, we overrule commonwealth v. constant",overruling,3
6
- "to the extent that other cases have cited carr for the proposition that a conviction under section 245(a)(2) does not involve moral turpitude, those cases, too, are overruled in that limited way.",overruling,4
7
- "accordingly, it is overruled.",overruling,5
8
- grigsby has since unsuccessfully filed multiple 28 u.s.c. 2255 motions to vacate his sentence.,not overruling,6
9
- "id., at 386387.",not overruling,7
10
- the following facts are taken from the administrative record.,not overruling,8
11
- "schweiker v. hansen, 450 u. s. 785, 791 (1981) (marshall, j., dissenting).",not overruling,9
12
- we recognize that this reading of fager disapproves prior cases.,overruling,10
13
- this is not allowable.,not overruling,11
14
- " narrowstep, 2010 wl 5422405, at *12.",not overruling,12
15
- "transfer of property from a parent to a child is presumed to be a gift, and the presumption may only be overcome by clear and convincing evidence to the contrary."""").",not overruling,13
16
- "accordingly, to the extent of any conflict nemecek v. state, 621 s.w.2d 404 (tex.cr.app. 1980) is overruled.",overruling,14
17
- tenn. sup. ct. r. 14.,not overruling,15
18
- "see id. 275(a)(4) (""""no deduction shall be allowed for the following taxes: . . . excess profits taxes imposed by the authority of any foreign country . . . if the taxpayer chooses to take to any extent the benefits of [] 901.""""); 26 c.f.r. 1.901-1(h)(2) (""""taxpayers who are denied the credit for taxes for particular taxable years are the following: . . . [a] taxpayer who elects to deduct taxes paid or accrued to any foreign country . . . [pursuant to sections] 164 and 275."""").",not overruling,16
19
- "incompetence may occur at various points after conviction, and it may recede and later reoccur.",not overruling,17
20
- we therefore overrule mata and hartman to the extent of the conflict and reverse the trial court's judgment and remand the cause for a new trial.,overruling,18
21
- "490 f.3d 575, 580-81 (7th cir. 2007).",not overruling,19
22
- "app. 1981), or voninski v. voninski, 661 s.w.2d 872, 878-79 (tenn.",overruling,20
23
- "more importantly, a sufficient factual basis exists here because mccoy stipulated he """"was a member of a conspiracy with others, in gaston county . . . to distribute and to possess with intent to distribute cocaine base, commonly known as 'crack cocaine.'""""",not overruling,21
24
- the decision of the fourth district court of appeal holding section 550.081 unconstitutional is disapproved.,overruling,22
25
- the court noted at the outset that the guarantees of that constitutional provisionfreedom from discrimination in housing and employmenthad been legislatively implemented through the illinois human rights act.,not overruling,23
26
- "we are fully in accord with the relaxation of the federal requirements as expressed in illinois v. gates, supra, and to the extent that berkshire v. commonwealth, supra; thompson v. commonwealth, supra; and buchenburger v. commonwealth, supra, express a contrary view, they are overruled.",overruling,24
27
- "see scott, supra at 352; commonwealth v. ruffin, 475 mass. 1003, 1004 (2016).",not overruling,25
28
- "for the reasons stated below, we approve the fifth district court of appeal's decision in winter park, and disapprove the decision in belleair to the extent described herein.",overruling,26
29
- "however, to the extent that cervantes, and ex parte mcatee, 599 s.w.2d 335 (tex.crim.app. 1980), indicate that a failure to admonish pursuant to art. 26.13(a)(4) automatically entitles one to post-conviction collateral relief without a showing of harm, they are overruled.",overruling,27
30
- "having reviewed the question en banc, we now answer that question in the affirmative and overrule laffey.",overruling,28
31
- "in people v. correa (2012) 54 cal.4th 331, 142 cal.rptr.3d 546, 278 p.3d 809, also decided today, we are disapproving language in one of our cases to bring our section 654 jurisprudence closer to the statutory language.",overruling,29
32
- "in reaching that conclusion, we recede from the previous holding of this court in hall v. state, 505 so.2d 657, 658 (fla. 2d dca), cause dismissed, 509 so.2d 1117 (fla. 1987), in which we stated that an essential element of proof in regard to the crime of robbery is ""that the accused had the specific intent to permanently deprive the owner of property.",overruling,30
33
- "while not limited to these cases, to the extent the following cases are in conflict, they are overruled.",overruling,31
34
- the court also offered no explanation for imposing the particular sentence it chose.,not overruling,32
35
- "even if his earlier filings had passed muster, trying a case is more difficult than drafting minimally coherent documents.",not overruling,33
36
- "to the extent that the holding in wilson v. bureau of state police, supra, conflicts with this opinion, it is overruled.",overruling,34
37
- "furthermore, the trial court indicated in its order that it had """"consider[ed] . . . [appellant's] special appearance, the pleadings, the affidavits, and arguments of counsel.""""",not overruling,35
38
- "see boles, 554 so.2d at 961 ([i]f the county and other persons are not bound, then the status of the road as public or private is subject to being litigated again, and the results of later litigation may be inconsistent with the results of the initial litigation.).",not overruling,36
39
- "see tex. r. app. p. 48.4; see also in re schulman, 252 s.w.3d at 412 n.35; ex parte owens, 206 s.w.3d 670, 673 (tex. crim. app. 2006).",not overruling,37
40
- "we flatly rejected this logic a century ago in state ex rel. state capitol commission v. lister, 91 wash. 9, 156 p. 858 (1916), and we reject it again now.",overruling,38
41
- "the tribe sold the land for a fixed sum of $50,000.",not overruling,39
42
- "to the extent that these cases directly and indirectly misconstrued the rationale of hedges, they are hereby overruled.",overruling,40
43
- "the supreme court has chosen not """"to prescribe a precise algorithm for determining the proper restitution amount.""""",not overruling,41
44
- "see bassett, 528 f.3d at 430.",not overruling,42
45
- "in this case, the trial court did not clearly err by finding clear and convincing evidence to support termination under mcl 712a.19b(3)(g) and (j).",not overruling,43
46
- "to the extent that this opinion causes conflict with earlier decisions such as holmes, those cases are overruled.",overruling,44
47
- "569 u.s., at , 133 s.ct., at 1576(dissenting opinion).",not overruling,45
48
- "we therefore overrule mcgore; and we hold, like every other circuit to have reached the issue, that under rule 15(a) a district court can allow a plaintiff to amend his complaint even when the complaint is subject to dismissal under the plra.",overruling,46
49
- we disapprove this dicta.,overruling,47
50
- "we disapprove abdelaziz as well as henderson v. north, 545 so.2d 486 (fla. 1st dca 1989), which adopted the principle of abdelaziz, to the extent that they disapproved a cause of action for negligent stillbirth.",overruling,48
51
- "we therefore conclude that the improper-purpose doctrine has not worked well in practice, and that more good than harm will come by departing from precedent.",overruling,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/semiconductor_org_types/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "semiconductor_org_types", "description": "", "data_columns": ["Paper title", "Organization name", "ID"], "label_columns": {"Label": ["company", "research institute", "university"]}}
 
 
data/semiconductor_org_types/test_unlabeled.csv DELETED
@@ -1,450 +0,0 @@
1
- Paper title,Organization name,ID
2
- An enhanced 130 nm generation logic technology featuring 60 nm transistors optimized for high performance and low power at 0.7 - 1.4 V,"Portland Technology Development, Hillsboro, OR, USA",50
3
- Monolithic integration of O-band photonic transceivers in a “zero-change” 32nm SOI CMOS,"Department of Electrical Engineering and Computer Science, University of California, Berkeley, USA",51
4
- "High-performance low-leakage enhancement-mode high-K dielectric GaN MOSHEMTs for energy-efficient, compact voltage regulators and RF power amplifiers for low-power mobile SoCs","Intel Corporation,Components Research,Technology and Manufacturing Group,Hillsboro,OR,USA",52
5
- "Implant-Free SiGe Quantum Well pFET: A novel, highly scalable and low thermal budget device, featuring raised source/drain and high-mobility channel","Dep. Material Engineering, Univ. Leuven, Leuven",53
6
- Mobility in high-K metal gate UTBB-FDSOI devices: From NEGF to TCAD perspectives,"STMicroelectronics, Crolles, France",54
7
- Fast switching and long retention Fe-O ReRAM and its switching mechanism,"Advanced Devices Development Center, Matsushita Elecrric Indusrrial Company Limited, Moriguchi, Osaka, Japan",55
8
- 5.9 An 18.75µW dynamic-distributing-bias temperature sensor with 0.87°C(3σ) untrimmed inaccuracy and 0.00946mm2 area,"TSMC,Austin,TX,United States of America",56
9
- A 1-V 299/spl mu/W Flashing UWB Transceiver Based on Double Thresholding Scheme,"Center for collaborative Res.,Tokyo Univ.",57
10
- "High performance low temperature activated devices and optimization guidelines for 3D VLSI integration of FD, TriGate, FinFET on insulator","IMEP-LAHC,Minatec/INPG,France",58
11
- Quantitative assessment of mobility degradation by remote Coulomb scattering in ultra-thin oxide MOSFETs: measurements and simulations,"DIEGM, Udine, Italy",59
12
- A new cell-based performance metric for novel CMOS device architectures,"Philips Research, Leuven, Belgium",60
13
- "In-situ multi-step (IMS) CVD process of (Ba,Sr)TiO/sub 3/ using hot wall batch type reactor for DRAM capacitor dielectrics","Microelectron. Eng. Lab.,Toshiba Corp.,Yokohama,Japan",61
14
- A novel method for evaluating electron/hole mismatch in scaled split-gate SONOS memories,"Microcomputer Operation Unit, NECEL Corporation, Sagamihara, Kanagawa, Japan",62
15
- A 120mm2 16Gb 4-MLC NAND Flash Memory with 43nm CMOS Technology,"SanDisk,Yokohama,Japan",63
16
- High power 4H-SiC static induction transistors,"Westinghouse Science and Technology Center, Pittsburgh, PA, USA",64
17
- Nano-wires for room temperature operated hybrid CMOS-NANO integrated circuits,"Swiss Fed. Inst. of Technol.,Lausanne,Switzerland",65
18
- Clock-powered CMOS VLSI graphics processor for embedded display controller application,"Synopsys Corporation,Mountain View,CA,USA",66
19
- Thermally robust high quality HfN/HfO/sub 2/ gate stack for advanced CMOS devices,"Institute of Microelectronics, Singapore",67
20
- A 622 Mb/s fully-integrated optical IC with a wide range input,"Sony Corp.,Kanagawa,Japan",68
21
- Fabrication of a nonvolatile lookup-table circuit chip using magneto/semiconductor-hybrid structure for an immediate-power-up field programmable gate array,"Hitachi Advanced Research Laboratory,Tokyo,,Japan",69
22
- The impact of sub monolayers of HfO/sub 2/ on the device performance of high-k based transistors [MOSFETs],"Renesas, Leuven, Belgium",70
23
- 30.5 A 0.5V BLE Transceiver with a 1.9mW RX Achieving −96.4dBm Sensitivity and 4.1dB Adjacent Channel Rejection at 1MHz Offset in 22nm FDSOI,"Sony LSI Design,Atsugi,Japan",71
24
- Optimization of Sub-Melt Laser Anneal: Performance and Reliability,"K. U. Leuven, ESAT-INSYS, Belgium",72
25
- A 0.5-28GB/S Wireline Tranceiver with 15-Tap DFE and Fast-Locking Digital CDR in 7NM FinFET,"Xilinx,Inc.,San Jose,CA,USA",73
26
- Dual channel FinFETs as a single high-k/metal gate solution beyond 22nm node,"Intel Assignee, USA",74
27
- 50 nm-Gate All Around (GAA)-Silicon On Nothing (SON)-devices: a simple way to co-integration of GAA transistors within bulk MOSFET process,"R&D France Telecom,Grenoble,France",75
28
- Temperature compensation of silicon micromechanical resonators via degenerate doping,"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA",76
29
- A phase change memory cell with metallic surfactant layer as a resistance drift stabilizer,"ULVAC, Inc.,14 Suyama Susono, Shizuoka, Japan",77
30
- "A flexible, lightweight Braille sheet display with plastic actuators driven by an organic field-effect transistor active matrix","National Institute for Advanced Industrial Science and Technology, Osaka, Japan",78
31
- Oxide-field dependence of the NMOS hot-carrier degradation rate and its impact on AC-lifetime prediction,"Department of Electrical Engineering & Computer Science, Microsystems Technology Laboratories, Massachusetts Institute of Technology, Cambridge, MA, USA",79
32
- Experimental observation and physics of “negative” capacitance and steeper than 40mV/decade subthreshold swing in Al0.83In0.17N/AlN/GaN MOS-HEMT on SiC substrate,"Components Research, Intel Corporation, Hillsboro, USA",80
33
- Application-oriented performance of RF CMOS technologies on flexible substrates,"Institut d'Electronique de Microélectronique et de Nanotechnologie - IEMN UMR8520, Grenoble, France",81
34
- A novel SPRAM (SPin-transfer torque RAM)-based reconfigurable logic block for 3D-stacked reconfigurable spin processor,"Advanced Research Laboratory, Hitachi and Limited, Sendai, Japan",82
35
- Asymmetrically-dope buried layer (ADB) structure CMOS for low-voltage mixed analog-digital applications,"Semicond. Dev. Center,Hitachi Ltd.,Kokubunji,Japan",83
36
- Highly sensitive and reliable X-ray detector with HgI2 photoconductor and oxide drive TFT,"Samsung Advanced Institute of Technology, Samsung Electronics Corporation, South Korea",84
37
- Large scale plane-wave based density-functional theory simulations for electronic devices,"Lawrence Berkeley National Laboratory,Berkeley,CA,USA",85
38
- A 76dBΩ 1.7GHz 0.18µm CMOS tunable transimpedance amplifier using broadband current pre-amplifier for high frequency lateral micromechanical oscillators,"Georgia Institute of Technology,Atlanta,USA",86
39
- Coulomb oscillations in 100 nm and 50 nm CMOS devices,"Departement de Recherche Fondamentale sur la Matiere Condensee, DSM, Grenoble, France",87
40
- Oxide thin film transistor technology: Capturing device-circuit interactions,"IGNIS Innovation Inc., Waterloo, ON, Canada",88
41
- Tetragonal Phase Stabilization by Doping as an Enabler of Thermally Stable HfO2 based MIM and MIS Capacitors for sub 50nm Deep Trench DRAM,"Qimonda Dresden GmbH and Company OHG, Dresden, Germany",89
42
- Light emitting silicon nanostructures,"Charles Stark Draper Laboratories, Inc., Cambridge, MA, USA",90
43
- Effective Schottky Barrier Height modulation using dielectric dipoles for source/drain specific contact resistivity improvement,"College of Nanoscale Science and Engineering, Albany, NY, USA",91
44
- Energy-efficient all fiber-based local body heat mapping circuitry combining thermistor and memristor for wearable healthcare device,"KIMS Changwon, Korea",92
45
- "Bidirectional TaO-diode-selected, complementary atom switch (DCAS) for area-efficient, nonvolatile crossbar switch block","Low-power Electronics Association & Project (LEAP),West,Onogawa,Tsukuba,Ibaraki,Japan",93
46
- A 1/2.5 inch 8.1Mpixel CMOS Image Sensor for Digital Cameras,"Micron Technology,Pasadena,CA",94
47
- A 0.2-/spl mu/m 180-GHz-f/sub max/ 6.7-ps-ECL SOI/HRS self aligned SEG SiGe HBT/CMOS technology for microwave and high-speed digital applications,"Musashino office, Hitachi Device Engineering Company Limited, Japan",95
48
- A unified physical model of switching behavior in oxide-based RRAM,"NASA Ames Research Center,Moffett Field,CA,USA",96
49
- I.McIC: A single-chip MPEG2 video encoder for storage,"Philips Res. Lab.,Eindhoven,Netherlands",97
50
- A highly linear filter and VGA chain with novel DC-offset correction in 90nm digital CMOS process,"Intel R&D,Intel Corp.,Hillsboro,OR,USA",98
51
- A high performance phase change memory with fast switching speed and high temperature retention by engineering the GexSbyTez phase change material,"Macronix Emerging Central Laboratory, Macronix International Company Limited, Hsinchu, Taiwan",99
52
- Adaptive cancellation of gain and nonlinearity errors in pipelined ADCs,"Asahi Kasei Microdevices,Atsugi,Japan",100
53
- A 4 GOPS 3 way-VLIW image recognition processor based on a configurable media-processor,"Toshiba Corp.,Kanagawa,Japan",101
54
- Hot carrier reliability for 0.13 /spl mu/m CMOS technology with dual gate oxide thickness,"UMC, Hopewell Junction, NY, USA",102
55
- Implementation of the CELL Broadband Engine in a 65nm SOI Technology Featuring Dual-Supply SRAM Arrays Supporting 6GHz at 1.3V,"Toshiba,Austin,TX",103
56
- A fully working 0.14 /spl mu/m DRAM technology with polymetal (W/WN/sub x//poly-Si) gate,"Hyundai Electron. Ind. Co. Ltd., Cheongju, South Korea",104
57
- Potential well engineering by partial oxidation of TiN for high-speed and low-voltage Flash memory with good 125°C data retention and excellent endurance,"Thin-Film Materials Research Center, Korea Institute of Science and Technology, Seoul, South Korea",105
58
- A programmable MEMS-based clock generator with sub-ps jitter performance,"Masdar Institute,Abu Dhabi,UAE",106
59
- Impact of Fermi level pinning inside conduction band on electron mobility of InxGa1−xAs MOSFETs and mobility enhancement by pinning modulation,"National Institute of Advanced Industrial Science and Technology, Tsukuba, Ibaraki, Japan",107
60
- Equivalent Oxide Thickness (EOT) Scaling With Hafnium Zirconium Oxide High-κ Dielectric Near Morphotropic Phase Boundary,"Kurt J. Lesker Co., PA, USA",108
61
- 3.3 A 5GS/s 158.6mW 12b Passive-Sampling 8×-Interleaved Hybrid ADC with 9.4 ENOB and 160.5dB FoMS in 28nm CMOS,"KU Leuven,Heverlee,Belgium",109
62
- Characteristics of AlGaN/GaN HEMT devices with SiN passivation,"DaimlerChrysler AG Research and Technology, Ulm, Germany",110
63
- A novel resist and post-etch residue removal process using ozonated chemistries,"IMEC,Philips Research,Eindhoven,Netherlands",111
64
- 14.5 Envision: A 0.26-to-10TOPS/W subword-parallel dynamic-voltage-accuracy-frequency-scalable Convolutional Neural Network processor in 28nm FDSOI,"KU Leuven,Belgium",112
65
- A 0.063 µm2 FinFET SRAM cell demonstration with conventional lithography using a novel integration scheme with aggressively scaled fin and gate pitch,"Toshiba America Electronic Components Inc.,Albany Nano Tech,NY,USA",113
66
- Scaling rules of piezoelectric nanowires in view of sensor and energy harvester integration,"CEA-Leti, Grenoble, France",114
67
- A 0.9 V 1.5 mW continuous-time /spl Delta//spl Sigma/ modulator for WCDMA,"Toshiba,Kawasaki,Japan",115
68
- A study for 0.18 /spl mu/m high-density MRAM,"Technol. Dev. Group,Sony Corp.,Kanagawa,Japan",116
69
- A Fractional-N PLL for SONET-Quality Clock-Syntlhesis Applicationis,"Silicon Laboratories,Nashua,NH",117
70
- On-line calibration and digital correction of multi-bit sigma-delta modulators,"Dept. of Electr. Eng.,Pavia Univ.,Italy",118
71
- Intrinsic retention statistics in phase change memory (PCM) arrays,"Micron, R&D Unit, Agrate Brianza, Italy",119
72
- Multi-level metal CMOS manufacturing with deuterium for improved hot carrier reliability,"Lucent Technologies Bell Laboratories, Orlando, FL, USA",120
73
- An adaptive reference generation scheme for 1T1C FeRAMs,"Dept. of Electr. & Comput. Eng.,Toronto Univ.,Ont.,Canada",121
74
- Ferroelectric hafnium oxide: A CMOS-compatible and highly scalable approach to future ferroelectric memories,"Fraunhofer IPMS-CNT, Dresden, Germany",122
75
- High-Field Electron Mobility in Biaxially-tensile Strained SOI: Low Temperature Measurement and Correlation with the Surface Morphology,"CEA/LETI Minatec,rue des Martyrs,Grenoble,France",123
76
- Threshold voltage control in NiSi-gated MOSFETs through silicidation induced impurity segregation (SIIS),"Microelectronics Division, Hopewell Junction, NY, USA",124
77
- Higher hole mobility induced by twisted Direct Silicon Bonding (DSB),"IBM Research Division,T.J. Watson Research Center,Yorktown Heights,NY,USA.",125
78
- Realizing a production ATE custom processor and timing IC containing 400 independent low-power and high-linearity timing verniers,"Credence Syst.,Fremont,CA,USA",126
79
- 22.4 A 24Gb/s 0.71pJ/b Si-photonic source-synchronous receiver with adaptive equalization and microring wavelength stabilization,"Hewlett-Packard Labs,Palo Alto,CA",127
80
- A 7.9μW remotely powered addressed sensor node using EPC HF and UHF RFID technology with −10.3dBm sensitivity,"Infineon Technologies,Graz,Austria",128
81
- Bridging design and manufacture of analog/mixed-signal circuits in advanced CMOS,"AMD,Inc.,Sunnyvale,E. Arques Ave.,CA,USA",129
82
- Experience of IP-reuse in system-on-chip design for ADSL,"Alcatel Bell Telephone,Antwerp,Belgium",130
83
- Analysis of trap-assisted conduction mechanisms through silicon dioxide films using quantum yield,"Bell Laboratories, Lucent Technologies, Inc., Murray Hill, NJ, USA",131
84
- SRAM Cell Static Noise Margin and VMIN Sensitivity to Transistor Degradation,"Silicon Technology Development, Dallas, TX, USA",132
85
- "Vacancy-modulated conductive oxide resistive RAM (VMCO-RRAM): An area-scalable switching current, self-compliant, highly nonlinear and wide on/off-window resistive switching cell","K.U. Leuven, Leuven, Belgium",133
86
- Highly Reliable Thin MIM Capacitor on Metal (CoM) Structure with Vertical Scalability for Analog/RF Applications,"NEC Corporation Limited, Sagamihara, Kanagawa, Japan",134
87
- A 4.4mW 76dB complex /spl Sigma//spl Delta/ ADC for Bluetooth receivers,"Philips Res. Labs.,Eindhoven,Netherlands",135
88
- "A 210mV 7.3MHz 8T SRAM with dual data-aware write-assists and negative read wordline for high cell-stability, speed and area-efficiency","Fukuoka Institute of Technology,Japan",136
89
- Digital background calibration of a 10 b 40 M sample/s parallel pipelined ADC,"California Univ.,Davis,CA,USA",137
90
- Aluminum Plasma-CVD for VLSI Circuit Interconnections,"Fujitsu Laboratories Ltd. Kamikodanaka,Nakahara,Kawasaki,Japan",138
91
- A 1.4GHz 20.5Gbps GZIP decompression accelerator in 14nm CMOS featuring dual-path out-of-order speculative Huffman decoder and multi-write enabled register file array,"Circuits Research Lab,Intel Corporation,Hillsboro,OR,USA",139
92
- 4.4 Energy-efficient microserver based on a 12-core 1.8GHz 188K-CoreMark 28nm bulk CMOS 64b SoC for big-data applications with 159GB/S/L memory bandwidth system density,"Freescale Semiconductor,Austin,TX",140
93
- Understanding and Physical Modeling Superior Hot-Carrier Reliability of Ge pNWFETs,"Nanolayers, London, UK",141
94
- Lattice strain design in W/WN/poly-Si gate DRAM for improving data retention time,"System Devices Research Laboratories, NEC Corporation Limited, Sagamihara, Kanagawa, Japan",142
95
- Highly endurable floating body cell memory: Vertical biristor,"Department of EE, KAIST, Daejeon, South Korea",143
96
- A 58.6mW real-time programmable object detector with multi-scale multi-object support using deformable parts model on 1920×1080 video at 30fps,"Massachusetts Institute of Technology,USA",144
97
- "Multipurpose, Fully-Integrated 128×128 Event-Driven MD-SiPM with 512 16-Bit TDCs with 45 PS LSB and 20 NS Gating","EPFL,Switzerland",145
98
- A 5Gb/s link with clock edge matching and embedded common mode clock for low power interfaces,"NVIDIA Corporation,India",146
99
- A new vertically stacked poly-Si MOSFET for 533 MHz high speed 64Mbit SRAM,"Renesas Technology Corp., Tokyo, Japan",147
100
- The implementation of POWER7TM: A highly parallel and scalable multi-core high-end server processor,"IBM,Poughkeepsie,NY,USA",148
101
- A Machine-Learning-Resistant 3D PUF with 8-layer Stacking Vertical RRAM and 0.014% Bit Error Rate Using In-Cell Stabilization Scheme for IoT Security Applications,"Zhejiang Lab,Hangzhou,China",149
102
- 45nm low power CMOS logic compatible embedded STT MRAM utilizing a reverse-connection 1T/1MTJ cell,"Qualcomm Incorporated, San Diego, CA, USA",150
103
- Full integration and characterization of Localized ONO Memory (LONOM) for embedded flash technology,"Syst. LSI Div.,Samsung Electron. Co. Ltd.,Kyunggi-Do,South Korea",151
104
- A digital terrestrial television (ISDB-T) tuner for mobile applications,"Sharp Corp.,Tenri,Japan",152
105
- The roles of hydrogen and holes in trap generation and breakdown in ultra-thin SiON dielectrics,"Silicon Technology Development, Texas Instruments, Inc., Dallas, TX, USA",153
106
- Memory technology for the terabit era: From 2D to 3D,"KU Leuven,ESAT Department,Leuven,Belgium,and imec,Leuven,Belgium",154
107
- "A 1.5 V, 4.1 mW dual channel audio delta-sigma D/A converter","Asahi-Kasei Microsyst.,Kanagawa,Japan",155
108
- CMOS current-controlled oscillators using multiple-feedback-loop ring architectures,"Korea Adv. Energy Res. Inst.,Taejon,South Korea",156
109
- Aggressive design of millisecond annealing junctions for near-scaling-limit bulk CMOS using raised source/drain extensions,"NEC Informatec Systems Limited, Sagamihara, Japan",157
110
- Simultaneous Extraction of Recoverable and Permanent Components Contributing to Bias-Temperature Instability,"IMEC, Leuven, Belgium",158
111
- A Fully Digital 65nm CMOS Transmitter for the 2.4-to-2.7GHz WiFi/WiMAX Bands using 5.4GHz ΔΣ RF DACs,"STMicroelectronics,Geneva,Switzerland",159
112
- Low RA Magnetic Tunnel Junction Arrays in Conjunction with Low Switching Current and High Breakdown Voltage for STT-MRAM at 10 nm and Beyond,"Corporate Research and Development,Qualcomm Technologies,Inc.,San Diego,CA,USA",160
113
- A CMOS 6b 400 M sample/s ADC with error correction,"Fujitsu VLSI Limited,Aichi,Japan",161
114
- A digital wideband CDR with ±15.6kppm frequency tracking at 8Gb/s in 40nm CMOS,"Broadcom,Irvine,CA",162
115
- Understanding of Tunable Selector Performance in Si-Ge-As-Se OTS Devices by Extended Percolation Cluster Model Considering Operation Scheme and Material Design,"IMEC,Leuven,Belgium",163
116
- Self-limiting laser thermal process for ultra-shallow junction formation of 50-nm gate CMOS,"Device Development Center, Hitachi and Limited, Ome, Tokyo, Japan",164
117
- Soft error considerations for deep-submicron CMOS circuit applications,"Intel Corporation, Hudson, MA, USA",165
118
- A Low Power Continuous-Time Zoom ADC for Audio Applications,"NXP Semiconductors,Eindhoven,The Netherlands",166
119
- Dual-damascene interconnects with 0.28 /spl mu/m vias using in situ copper doped aluminum chemical vapor deposition,"ULSI Device Develop. Laboratories, NEC Corporation Limited, Sagamihara, Kanagawa, Japan",167
120
- "Experimental study on BTI variation impacts in SRAM based on high-k/metal gate FinFET: From transistor level Vth mismatch, cell level SNM to product level Vmin","Quality and Reliability Team, Samsung Electronics Co. Ltd., Yongin-City, Gyeonggi-Do, Korea",168
121
- Enabling Efficient Design-Technology Interaction by Spec-Driven Extraction Flow,"ProPlus Design Solutions,Inc,San Jose,CA,USA",169
122
- Understanding of Tunable Selector Performance in Si-Ge-As-Se OTS Devices by Extended Percolation Cluster Model Considering Operation Scheme and Material Design,"Applied Materials Inc.,Santa Clara,CA,USA",170
123
- Redefinition of Write Margin for Next-Generation SRAM and Write-Margin Monitoring Circuit,"NEC,Sagamihara",171
124
- High on/off-ratio P-type oxide-based transistors integrated onto Cu-interconnects for on-chip high/low voltage-bridging BEOL-CMOS I/Os,"LSI Research Laboratory, Renesas Electronics Corporation, Sagamihara, Kanagawa, Japan",172
125
- 29.5 A Single-Chip Optical Phased Array in a 3D-Integrated Silicon Photonics/65nm CMOS Technology,"Colleges of Nanoscale Science and Engineering,Albany,NY",173
126
- Scalable quantum computing with ion-implanted dopant atoms in silicon,"UNSW, School of Electrical Engineering & Telecommunications, Sydney, Australia",174
127
- Low-cost gate-oxide early-life failure detection in robust systems,"NEC Corporation,Japan",175
128
- Metal-Assisted Solid-Phase Crystallization Process for Vertical Monocrystalline Si Channel in 3D Flash Memory,"Institute of Memory Technology Research & Development, Kioxia Corporation, Yokkaichi, Japan",176
129
- "A 0.9V 66MHz access, 0.13um 8M(256K/spl times/32) local SONOS embedded flash EEPROM","Syst. LSI Div.,Samsung Electron. Co. Ltd,Yongin,South Korea",177
130
- A 160μW 8-channel active electrode system for EEG monitoring,"Imec - Holst Centre,Eindhoven,The Netherlands",178
131
- A mobility enhancement strategy for sub-14nm power-efficient FDSOI technologies,"CEA, MINATEC Campus, Grenoble, France",179
132
- CMOS device optimization for mixed-signal technologies,"Philips Research Laboratories, Eindhoven, Netherlands",180
133
- Modeling of cumulative thermo-mechanical stress (CTMS) produced by the shallow trench isolation process for 1 Gb DRAM and beyond,"CAE, Semiconductor R&D Center, Samsung Electronics Company Limited, Yongin si, Gyeonggi, South Korea",181
134
- A 14-bit 2.5GS/s and 5GS/s RF sampling ADC with background calibration and dither,"Analog Devices,Greensboro,NC,USA",182
135
- A highly manufacturable high density embedded SRAM technology for 90 nm CMOS,"Semiconductor Company, Toshiba Corporation, Yokohama, Japan",183
136
- A middle-1X nm NAND flash memory cell (M1X-NAND) with highly manufacturable integration technologies,"Research and Development Division, Hynix Semiconductor Inc., Ichon, Gyeonggi, South Korea",184
137
- Pionics: the Emerging Science and Technology of Graphene-based Nanoelectronics,"School of Physics, Georgia Institute of Technology, USA",185
138
- A novel sub-50 nm multi-bridge-channel MOSFET (MBCFET) with extremely high performance,"R&D Center,Samsung Electron. Co.,Kyunggi-Do,South Korea",186
139
- A 15-GHz integrated CMOS switch with 21.5-dBm IP/sub 1dB/ and 1.8-dB insertion loss,"Dept. of Electr. & Comput. Eng.,Florida Univ.,Gainesville,FL,USA",187
140
- 16.1 A 12b 18GS/s RF Sampling ADC with an Integrated Wideband Track-and-Hold Amplifier and Background Calibration,"Analog Devices,Greensboro,NC",188
141
- A 24mW 1.25Gb/s 13k/spl Omega/ transimpedance amplifier using active compensation,"Nat. Chiao Tung Univ.,Hsinchu",189
142
- Single silicide comprising Nickel-Dysprosium alloy for integration in p- and n-FinFETs with independent control of contact resistance by Aluminum implant,"Institute of Microelectronics,Science Park Road,Singapore",190
143
- "A 5,sup>th-order CT/DT Multi-Mode ΔΣ Modulator","NXP Semiconductors,Zurich,Switzerland",191
144
- A robust array architecture for a capacitorless MISS tunnel-diode memory,"Central Res. Lab.,Hitachi Ltd.,Tokyo,Japan",192
145
- Electrical integrity of state-of-the-art 0.13 /spl mu/m SOI CMOS devices and circuits transferred for three-dimensional (3D) integrated circuit (IC) fabrication,"IBM T. J. Watson Research Center, Yorktown Heights, NY, USA",193
146
- Sub-60 nm deeply-scaled channel length extremely-thin body InxGa1−xAs-on-insulator MOSFETs on Si with Ni-InGaAs metal S/D and MOS interface buffer engineering,"Sumitomo Chemical Co. Ltd.,Kitah ara,Tsukuba,Ibaraki,Japan",194
147
- Implementing application specific memory,"MOSAID Technol. Inc.,Kanata,Ont.,Canada",195
148
- "SRAM critical yield evaluation based on comprehensive physical / statistical modeling, considering anomalous non-Gaussian intrinsic transistor fluctuations","System device research laboratories,NEC corporation,NEC corporation,simokuzawa,Sagamihara,Kanagawa Japan",196
149
- A novel nonvolatile memory with spin torque transfer magnetization switching: spin-ram,"Semiconductor Technology Development Group, Semiconductor Solution Network Company, Sony Corporation, Atsugi, Kanagawa, Japan",197
150
- Gait identification using stochastic OXRRAM-based time sequence machine learning,"IMEC,Kapeldreef,Leuven,,Belgium",198
151
- 1.2 Gbps/pin simultaneous bidirectional transceiver logic with bit deskew technique,"Device Dev. Center,Htachi Ltd.,Tokyo,Japan",199
152
- Experimental results on reduced harmonic distortion in circuits with correlated double sampling,"Newport Microsyst. Inc.,Irvine,CA,USA",200
153
- 110nm NROM technology for code and data flash products,"Infineon Technol. Flash,Dresden,Germany",201
154
- A Novel Via-fuse Technology Featuring Highly Stable Blow Operation with Large On-off Ratio for 32nm Node and Beyond,"Advanced Device Development Division, NEC Electronics Corporation Limited, Sagamihara, Kanagawa, Japan",202
155
- On-chip integrated CMOS optical microspectrometer with light-to-frequency converter and bus interface,"Delft Univ. of Technol.,Netherlands",203
156
- Device engineering for diamond quantum sensors,"Tokyo Institute of Technology, Meguro, Tokyo, Japan",204
157
- Dynamic-sleep transistor and body bias for active leakage power control of microprocessors,"Intel Corp.,Hillsboro,OR,USA",205
158
- Comparison between ultra-thin ZrO/sub 2/ and ZrO/sub x/N/sub y/ gate dielectrics in TaN or poly-gated NMOSCAP and NMOSFET devices,"Microelectron. Res. Center,Texas Univ.,Austin,TX,USA",206
159
- Development of High-Voltage Vertical GaN PN Diodes,"Naval Postgraduate School,Monterey,CA,USA",207
160
- Generic learning of TDDB applied to RRAM for improved understanding of conduction and switching mechanism through multiple filaments,"ESAT Department, K.U. Leuven, Belgium",208
161
- A five stage chopper stabilized instrumentation amplifier using feedforward compensation,"Crystal Semicond. Div.,Cirrus Logic Inc.,Austin,TX,USA",209
162
- Fully depleted extremely thin SOI for mainstream 20nm low-power technology and beyond,"IBM T. J. Watson,Yorktown Heights,NY,USA",210
163
- Fabrication and characterisation of strained Si heterojunction bipolar transistors on virtual substrates,"KTH, Sweden",211
164
- A configurable SRAM with constant-negative-level write buffer for low-voltage operation with 0.149µm2 cell in 32nm high-k metal-gate CMOS,"Toshiba Semiconductor,Kawasaki,Japan",212
165
- From Interconnect Materials and Processes to Chip Level Performance: Modeling and Design for Conventional and Exploratory Concepts,"Georgia Institute of Technology,Atlanta,GA,USA",213
166
- High-mobility 0.85nm-EOT Si0.45Ge0.55-pFETs: Delivering high performance at scaled VDD,"IMEC, Belgium",214
167
- In-depth Investigation of Hf-based High-k Dielectrics as Storage Layer of Charge-Trap NVMs,"IMEP CNRS, MINA TEC, Grenoble, France",215
168
- A 28nm 10Mb Embedded Flash Memory for IoT Product with Ultra-Low Power Near-1V Supply Voltage and High Temperature for Grade 1 Operation,"Samsung Electronics,,Samsungjeonja-ro,Hwaseong-si,Gyeonggi-do,Republic of Korea",216
169
- High-performance high-κ/metal gates for 45nm CMOS and beyond with gate-first processing,"Toshiba America Electronic Components Research Center,Yorktown Heights,NY,USA",217
170
- A 35mW8 b 8.8 GS/s SAR ADC with low-power capacitive reference buffers in 32nm Digital SOI CMOS,"IBM Research - Zurich,Rueschlikon,Switzerland",218
171
- "A novel NAND-type PHINES nitride trapping storage flash memory cell with physically 2-bits-per-cell storage, and a high programming throughput for mass storage applications","Technol. Dev. Center,Macronix Int. Co.,Lt,Hsin-Chu,Taiwan",219
172
- 17.8 A 2.6μW Monolithic CMOS Photoplethysmographic Sensor Operating with 2μW LED Power,"EPFL,Neuchâtel,Switzerland",220
173
- A 5Gb/s NRZ transceiver with adaptive equalization for backplane transmission,"Vitesse Semicond.,Somerset,NJ,USA",221
174
- A 1.2V 1.33Gb/s/pin 8Tb NAND flash memory multi-chip package employing F-chip for low power and high performance storage applications,"Flash Memory Design Team,Samsung Electronics,Hwasung,Gyeonggi-do,Korea",222
175
- A hydrogen barrier interlayer dielectric with a SiO/sub 2//SiON/SiO/sub 2/ stacked film for logic-embedded FeRAMs,"System LSI Design Engineering Division, NEC Corporation Limited, Sagamihara, Kanagawa, Japan",223
176
- Scalable 3-D vertical chain-cell-type phase-change memory with 4F2 poly-Si diodes,"Yokohama Research Laboratory,Hitachi,Ltd.,Kanagawa,JAPAN",224
177
- Low temperature (<500/spl deg/C) SrTiO/sub 3/ capacitor process technology for embedded DRAM,"Technol. Dev. Div.,Fujitsu Ltd.,Japan",225
178
- New physical model for ultra-scaled 3D nitride-trapping non-volatile memories,"IMEP-LAHC, MINATEC-INPG, Grenoble, France",226
179
- 90 nm generation Cu/CVD low-k (k < 2.5) interconnect technology,"Taiwan Semiconductor Manufacturing Company, Science-Based Industrial Park, Hsin-Chu, Taiwan R.O.C",227
180
- 32-bit Processor core at 5-nm technology: Analysis of transistor and interconnect impact on VLSI system performance,"ARM Inc., Austin, TX, USA",228
181
- A low power 6-bit flash ADC with reference voltage and common-mode calibration,"Broadcom Corporation,Irvine,CA,USA",229
182
- Integration of silicon photonics in bulk CMOS,"Micron Technology,Inc. Process R&D,Boise,ID,USA",230
183
- A novel integration of STT-MRAM for on-chip hybrid memory by utilizing non-volatility modulation,"Semiconductor R&D Center, Samsung Electronics, Co. Ltd., Hwaseong, South Korea",231
184
- Enhanced time delay integration imaging using embedded CCD in CMOS technology,"imec, Leuven, Belgium",232
185
- "Strained Si1−xGex-on-insulator PMOS FinFETs with excellent sub-threshold leakage, extremely-high short-channel performance and source injection velocity for 10nm node and beyond","GLOBALFOUNDRIES,T.J. Watson Research Center,Yorktown Heights,NY,USA",233
186
- A 7nm Leakage-Current-Supply Circuit for LDO Dropout Voltage Reduction,"Georgia Institute of Technology,Atlanta",234
187
- Multi-layer cross-point binary oxide resistive memory (OxRRAM) for post-NAND storage application,"Process Development Team, Samsung Electronics Co., Ltd., Yongin si, South Korea",235
188
- 9.1 A 45nm CMOS RF-to-Bits LTE/WCDMA FDD/TDD 2×2 MIMO base-station transceiver SoC with 200MHz RF bandwidth,"Texas Instruments,Bangalore,India",236
189
- A Fully-Integrated UHF Receiver with Multi-Resolution Spectrum-Sensing (MRSS) Functionality for IEEE 802.22 Cognitive-Radio Applications,"Samsung RFIC Design Center,Atlanta,GA",237
190
- A novel sense amplifier for flexible voltage operation NAND flash memories,"ULSI Res. Labs.,Toshiba Corp.,Kawasaki,Japan",238
191
- "A 160 mW, 80 nA standby, MPEG-4 audiovisual LSI with 16 Mb embedded DRAM and a 5 GOPS adaptive post filter","Toshiba Corp.,Kawasaki,Japan",239
192
- First demonstration of a back-side integrated heterogeneous hybrid III-V/Si DBR lasers for Si-photonics applications,"CEA-LETI, Grenoble Cedex 9, France",240
193
- 21.3 A 200nA single-inductor dual-input-triple-output (DITO) converter with two-stage charging and process-limit cold-start voltage for photovoltaic and thermoelectric energy harvesting,"Analog Devices,San Jose,CA,United States",241
194
- Liner-supported cylinder (LSC) technology to realize Ru/Ta/sub 2/O/sub 5//Ru capacitor for future DRAMs,"Process & Manufacturing Engineering Center, Toshiba Corporation, Yokohama, Japan",242
195
- Epitaxial SrTiO3 on silicon with EOT of 5.4 /spl Aring/ for MOS gate dielectric applications,"Dept. of Materials Science & Engineering, Kwangiu Institute of Science & Technology, Gwangju, KOREA",243
196
- Reliability of thin gate oxide under plasma charging caused by antenna topography-dependent electron shading effect,"Logic Device Development Laboratory, ULSI Device Developmmt Laboratories, NEC Corporation Limited, Sagamihara, Kanagawa, Japan",244
197
- "A 78 dB dynamic range, 0.27 dB accuracy, single-stage RF-PGA using thermometer-weighted and binary-weighted transconductors for SAW-less WCDMA/LTE transmitters","Renesas Technology Corp.,Hyogo,Japan",245
198
- Comprehensive analysis of the impact of single and arrays of through silicon vias induced stress on high-k / metal gate CMOS performance,"Panasonic, Leuven, Belgium",246
199
- SRAM design on 65nm CMOS technology with integrated leakage reduction scheme,"Portland Technol. Dev.,Intel Corp.,Hillsboro,OR,USA",247
200
- A CMOS DVD 4/spl times/ speed read channel programmable over 5 octaves,"Samsung Electronics Company Limited,Suwon,South Korea",248
201
- Comprehensive understanding of conductive filament characteristics and retention properties for highly reliable ReRAM,"Automotive & Industrial Systems Company,Kotari-yakemachi,Nagaokakyo City,Kyoto,Japan",249
202
- A fully integrated multi-band MIMO WLAN transceiver RFIC,"Carleton Univ.,Ottawa,Ont.,Canada",250
203
- Statistical Characterization and On-Chip Measurement Methods for Local Random Variability of a Process Using Sense-Amplifier-Based Test Structure,"IBM T. J. Watson,Yorktown Heights,NY",251
204
- Program/erase dynamics and channel conduction in nanocrystal memories,"IFN-CNR, Milano, Italy",252
205
- Heterogeneously integrated sub-40nm low-power epi-like Ge/Si monolithic 3D-IC with stacked SiGeC ambient light harvester,"Research Center for Applied Sciences, Academia Sinica, Taipei, Taiwan",253
206
- More-than-Universal Mobility in Double-Gate SOI p-FETs with Sub-10-nm Body Thickness -Role of Light-Hole Band and Compatibility with Uniaxial Stress Engineering,"Advanced LSI Technology Laboratory, Toshiba Corporation, Yokohama, Japan",254
207
- 1Gbit High Density Embedded STT-MRAM in 28nm FDSOI Technology,"Foundry Business, Samsung Electronics Co., Giheung, Korea",255
208
- A 390Mb/s 3.57mm2 3GPP-LTE turbo decoder ASIC in 0.13µm CMOS,"ETH Zürich,Switzerland",256
209
- Experimental characterization of stiction due to charging in RF MEMS,"K.U. Leuven, Belgium",257
210
- 9.7 An LTE SAW-less transmitter using 33% duty-cycle LO signals for harmonic suppression,"MediaTek,Hsinchu,Taiwan",258
211
- CMOS Integrated DNA Microarray Based on GMR Sensors,"Stanford Genome Technology Center, Palo Alto, CA, USA",259
212
- A 40MHz-to-1GHz fully integrated multistandard silicon tuner in 80nm CMOS,"Marvell,Santa Clara,CA",260
213
- A 20 Mhz BiCMOS peak detect pulse qualifier and area detect servo demodulator for hard disk drive servo loop,"Silicon Syst. Inc.,San Jose,CA,USA",261
214
- 512 Mb PROM with 8 layers of antifuse/diode cells,"Matrix Semicond.,Santa Clara,CA,USA",262
215
- Capacity optimization of emerging memory systems: A shannon-inspired approach to device characterization,"Macronix International Co., Ltd., Emerging Central Lab, Hsinchu Science Park, Taiwan",263
216
- Barriers to the Adoption of Wide-Bandgap Semiconductors for Power Electronics,"Advanced Research Projects Agency-Energy, U.S. Department of Energy, Washington, DC",264
217
- Analytical model of the programming characteristics of scaled MONOS memories with a variety of trap densities and a proposal of a trap-density-modulated MONS memory,"Semiconductor Network Company, Sony Corporation, Atsugi, Kanagawa, Japan",265
218
- 2D molybdenum disulfide (MoS2) transistors driving RRAMs with 1T1R configuration,"Department of Electrical Engineering, Stanford, CA, USA",266
219
- Ultra-thin-body and BOX (UTBB) fully depleted (FD) device integration for 22nm node and beyond,"IBM,USA",267
220
- A high reliability metal insulator metal capacitor for 0.18 /spl mu/m copper technology,"IBM Semiconductor Research and Development Center, Hopewell Junction, NY, USA",268
221
- A process independent 800 MB/s DRAM bytewide interface featuring command interleaving and concurrent memory operation,"Rambus Inc.,Mountain View,CA,USA",269
222
- 0.7 V SRAM Technology with Stress-Enhanced Dopant Segregated Schottky (DSS) Source/Drain Transistors for 32 nm Node,"Center for Semiconductor R&D,Semiconductor Company,Toshiba Corporation,,Shinsugita-cho,Isogo-ku,Yokohama,Japan",270
223
- A Fully Integrated SoC for GSM/GPRS in 0.13/spl mu/m CMOS,"Infineon,Munich,Germany",271
224
- A 10Gb/s compact low-power serial I/O with DFE-IIR equalization in 65nm CMOS,"Massachusetts Institute of Technology,Cambridge,USA",272
225
- NbO2-based low power and cost effective 1S1R switching for high density cross point ReRAM Application,"R&D Division,SK Hynix Inc.,Gyeongchung-daero Bubal-eub,Icheon-si,Gyeonggi-do,,Korea",273
226
- Dark current reduction in very-large area CCD imagers for professional DSC applications,"DALSA Semiconductor, Eindhoven, Netherlands",274
227
- An energy harvesting wireless sensor node for IoT systems featuring a near-threshold voltage IA-32 microcontroller in 14nm tri-gate CMOS,"Internet of Things Group,Intel Corporation,Hillsboro,OR,USA",275
228
- AES-based cryptographic and biometric security coprocessor IC in 0.18-/spl mu/m CMOS resistant to side-channel power analysis attacks,"Dept. of Electr. Eng.,California Univ.,Los Angeles,CA,USA",276
229
- Non-Gaussian distribution of SRAM read current and design impact to low power memory using Voltage Acceleration Method,"Qualcomm Inc,Morehouse Drive,San Diego,CA,USA",277
230
- Modeling of ultra-low energy boron implantation in silicon,"Eaton Corporation, Beverly, MA, USA",278
231
- A video signal processor for motion-compensated field-rate upconversion in consumer television,"Philips Consumer Electron.,Hamburg,Netherlands",279
232
- "Slurry engineering for self-stopping, dishing free SiO/sub 2/-CMP","Semiconductor Manufacturing Engineering Center, Toshiba Corporation, Kawasaki, Japan",280
233
- A manufacturable 25 nm planar MOSFET technology,"Philips Res.,Leuven,Belgium",281
234
- Z-PIM: An Energy-Efficient Sparsity Aware Processing-In-Memory Architecture with Fully-Variable Weight Precision,"KAIST,Daejeon,Republic of Korea",282
235
- 5.6 A 0.13μm fully digital low-dropout regulator with adaptive control and reduced dynamic stability for ultra-wide dynamic range,"Georgia Institute of Technology,Atlanta,GA",283
236
- Copper drift in low-K polymer dielectrics for ULSI metallization,"Center for Integrated Syst.,Stanford Univ.,CA,USA",284
237
- 100 MHz CMOS circuits using sequential laterally solidified silicon thin-film transistors on plastic,"Sarnoff Corporation, Princeton, NJ, USA",285
238
- "High performance 5nm radius Twin Silicon Nanowire MOSFET (TSNWFET) : fabrication on bulk si wafer, characteristics, and reliability","R&D Center, Samsung Electronics Company Limited, Yongin si, Gyeonggi, South Korea",286
239
- A configurable 5-D packet classification engine with 4Mpacket/s throughput for high-speed data networking,"Lucent Technol.,Bell Labs.,Holmdel,NJ,USA",287
240
- "19.6 A 0.2V trifilar-coil DCO with DC-DC converter in 16nm FinFET CMOS with 188dB FOM, 1.3kHz resolution, and frequency pushing of 38MHz/V for energy harvesting applications","TSMC,Hsinchu,Taiwan",288
241
- Sub-quarter micron CMOS process for TiN-gate MOSFETs with TiO/sub 2/ gate dielectric formed by titanium oxidation,"Adv. Products Res. & Dev. Lab.,Motorola Inc.,Austin,TX,USA",289
242
- Understanding stress enhanced performance in Intel 90nm CMOS technology,"Technol. CAD,Intel Corp.,Hillsboro,OR,USA",290
243
- A 0.24-/spl mu/m/sup 2/ cell process with 0.18-/spl mu/m width isolation and 3-D interpoly dielectric films for 1-Gb flash memories,"Hitachi ULSI Engineering Corporation, Kodaira, Tokyo, Japan",291
244
- A 2 GHz 60 dB dynamic-range Si logarithmic/limiting amplifier with low phase deviations,"NTT Syst. Electron. Labs.,Atsugi,Japan",292
245
- Pionics: the Emerging Science and Technology of Graphene-based Nanoelectronics,"ECE, Georgia Institute of Technology, USA",293
246
- A 1.8 V 2 Gb NAND flash memory for mass storage applications,"Samsung Electron.,Hwasung,South Korea",294
247
- Efficiency of mechanical stressors in Planar FDSOI n and p MOSFETs down to 14nm gate length,"IMEP-LAHC,MINATEC Campus,Grenoble,France",295
248
- 23.9 An 8-channel 4.5Gb 180GB/s 18ns-row-latency RAM for the last level cache,"Piecemakers Technology,Hsinchu,Taiwan",296
249
- A sub-nanosecond 0.5 /spl mu/m 64 b adder design,"Hewlett-Packard Co.,Fort Collins,CO,USA",297
250
- Overcoming interconnect scaling challenges using novel process and design solutions to improve both high-speed and low-power computing modes,"Microarchitecture Research Laboratory, Intel Corporation, USA",298
251
- A 21-channel 8Gb/s transceiver macro with 3.6ns latency in 90nm CMOS for 80cm backplane communication,"Hitachi ULSI Systems,Co.,Ltd.,Tokyo,Japan",299
252
- Systematic optimization of 1 Gbit perpendicular magnetic tunnel junction arrays for 28 nm embedded STT-MRAM and beyond,"Applied Materials Inc, Santa Clara, CA, US",300
253
- A 0.004mm2 250μW ΔΣ TDC with time-difference accumulator and a 0.012mm2 2.5mW bang-bang digital PLL using PRNG for low-power SoC applications,"Samsung Electronics,Yongin,Korea",301
254
- "Varistor-type bidirectional switch (JMAX>107A/cm2, selectivity∼104) for 3D bipolar resistive memory arrays","Dept. Nanobio Mat. and Elec.,Gwangju Institute of Science and Technology,Korea",302
255
- Control of electro-chemical etching for uniform 0.1 /spl mu/m gate formation of HEMT,"Semiconductor Technology Laboratory, Oki Electric Industry Company Limited, Hachioji, Tokyo, Japan",303
256
- Temperature calibration of CMOS magnetic vector probe for contactless angle measurement system,"Physical Electronics Laboratory, Zurich, Switzerland",304
257
- FinFET-a quasi-planar double-gate MOSFET,"Dept. of Electr. Eng. & Comput. Sci.,California Univ.,Berkeley,CA,USA",305
258
- Designing High Performance Microprocessors,"Digital Equipment Corporation Hudson,Massachusetts USA",306
259
- A 247 and 272 GHz Two-Stage Regenerative Amplifiers in 65 nm CMOS with 18 and 15 dB Gain Based on Double-Gmax Gain Boosting Technique,"Department of Electrical Engineering,KAIST,South Korea; IMEC,Belgium",307
260
- Measurement of Nano-Displacement Based on In-Plane Suspended-Gate MOSFET Detection Compatible with a Front-End CMOS Process,"CEA-LETI,Grenoble,France",308
261
- Megapixel CMOS image sensor fabricated in three-dimensional integrated circuit technology,"Lincoln Lab.,MIT,Lexington,MA,USA",309
262
- A 5500FPS 85GOPS/W 3D Stacked BSI Vision Chip Based on Parallel in-Focal-Plane Acquisition and Processing,"LIST,CEA,Saclay,France",310
263
- Approaching fermi level unpinning in Oxide-In0.2Ga0.8As,"Intel Corporation, Santa Clara, CA, USA",311
264
- Highly manufacturable 90 nm DRAM technology,"Technology Development, Semiconductor Research and Development Division, Samsung Electronics Company Limited, Yongin si, Gyeonggi, South Korea",312
265
- A 0.25 mm x86 microprocessor with a 100 MHz socket 7 interface,"Adv. Micro Devices,Milpitas,CA,USA",313
266
- Cost-effective high-performance high-voltage SiGe:C HBTs with 100 GHz f/sub T/ and BV/sub CEO/ /spl times/ f/sub T/ products exceeding 220 VGHz,"IHP, Frankfurt, Germany",314
267
- An Approach to Embedding Traditional Non-Volatile Memories into a Deep Sub-Micron CMOS,"Taiwan Semiconductor Manufacturing Company,Ltd,Integrated Interconnect & Packaging,R&D,Hsinchu,Taiwan,R.O.C.",315
268
- 6.2 A 460mW 112Gb/s DSP-Based Transceiver with 38dB Loss Compensation for Next-Generation Data Centers in 7nm FinFET Technology,"MediaTek,Irvine,CA",316
269
- Can InAlN/GaN be an alternative to high power / high temperature AlGaN/GaN devices?,"I.E.M.N, Villeneuve d'Ascq, France",317
270
- A Novel Cross-Spacer Phase Change Memory with Ultra-Small Lithography Independent Contact Area,"ITRI, Material and Chemical Research Laboratories, Hsinchu, Taiwan, R.O.C",318
271
- A 100dB SNR 2.5MS/s output data rate /spl Delta//spl Sigma/ ADC,"Analog Devices,Newbury,UK",319
272
- Industrially Applicable Read Disturb Model and Performance on Mega-Bit 28nm Embedded RRAM,"Quality and Reliability,Taiwan Semiconductor Manufacturing Company,,Park Ave.,Hsinchu Science Park Hsinchu,Taiwan,,R.O.C",320
273
- Competitive and cost effective high-k based 28nm CMOS technology for low power applications,"IBM Semiconductor Research and Development Center (SRDC), STMicroelectronics, Inc., Hopewell Junction, NY, USA",321
274
- Electrical characteristics and reliability of sub-3 nm gate oxides grown on nitrogen implanted silicon substrates,"SRDC, IBM Corp., Hopewell Junction, NY, USA",322
275
- Scaling of Ω-gate SOI nanowire N- and P-FET down to 10nm gate length: Size- and orientation-dependent strain effects,"STMicroelectronics,,rue J. Monnet,Crolles,France",323
276
- Understanding and prediction of EWF modulation induced by various dopants in the gate stack for a gate-first integration scheme,"TSMC,Belgium",324
277
- A VDSL2 CPE AFE in 0.15µm CMOS with integrated line driver,"Marvell,Santa Clara,CA,USA",325
278
- A 230–260GHz wideband amplifier in 65nm CMOS based on dual-peak Gmax-core,"Department of Electrical Engineering,CBNU,South Korea",326
279
- Scaling of 32nm low power SRAM with high-K metal gate,"Samsung Electronics, Hopewell Junction, USA",327
280
- Highly-scalable threshold switching select device based on chaclogenide glasses for 3D nanoscaled memory arrays,"Semiconductor Device Laboratory, Nano Fabrication Group, Samsung Advanced Institute of Technology, Gyeonggi-Do, Korea",328
281
- Selectively formed high mobility strained Ge PMOSFETs for high performance CMOS,"Systems and Technology Group, Hopewell Junction, NY, USA",329
282
- A digitally calibrated 5.15-5.825GHz transceiver for 802.11a wireless LANs in 0.18/spl mu/m CMOS,"Athena Semiconductors,Fremont,CA,USA",330
283
- A 43mW Bluetooth transceiver with -91dBm sensitivity,"Skyworks Solutions,Ottawa,Ont.,Canada",331
284
- OC-192 transmitter in standard 0.18 /spl mu/m CMOS,"Broadcom Corp.,Irvine,CA,USA",332
285
- High-performance InSb based quantum well field effect transistors for low-power dissipation applications,"QinetiQ, Malvern Technology Centre, Malvern, UK",333
286
- 27.2 A 6mW 5K-Word real-time speech recognizer using WFST models,"Massachusetts Institute of Technology,Cambridge,MA",334
287
- A 20mW 85dB/spl Omega/ 1.25Gb/s CMOS transimpedance amplifier with photodiode capacitance cancellation,"SoC Technol. Center,Ind. Technol. Res. Inst.,Hsinchu,Taiwan",335
288
- A Silicon Photonics Technology for 400 Gbit/s Applications,"STMicroelectronics, Agrate, Italy",336
289
- "Design and process integration for high-density, high-speed, and low-power 6F/sup 2/ cross point MRAM cell","Corporate Research & Development Center, Toshiba Corporation, Kanagawa, Japan",337
290
- GaN-based Periodic High-Q RF Acoustic Resonator with Integrated HEMT,"the US Naval Research Laboratory, National Research Council Fellow residing, Washington DC, USA",338
291
- Advanced interconnect schemes towards 0.1 /spl mu/m,"LETI-CEA Technologies Avancees, Grenoble, France",339
292
- "Technology Breakthrough of Low Temperature, Low Defect, and Low Cost SiGe Selective Epitaxial Growth (L3 SiGe SEG) Process for 45nm Node and Beyond","Hitachi Kokusai Electric Inc.,Yasuuchi,Yatsuo-machi,Toyama,Japan.",340
293
- Applications and design styles for 3DIC,"Synopsys Inc., Santa Clara, CA, USA",341
294
- Application and Benefits of Target Programming Algorithms for Ferroelectric HfO2 Transistors,"Ferroelectric Memory GmbH,Dresden,Germany",342
295
- 22.6 A 22V compliant 56µW active charge balancer enabling 100% charge compensation even in monophasic and 36% amplitude correction in biphasic neural stimulators,"Hahn-Schickard,Villingen-Schwenningen,Germany",343
296
- A Stacked Embedded DRAM Array for LPDDR4/4X using Hybrid Bonding 3D Integration with 34GB/s/1Gb 0.88pJ/b Logic-to-Memory Interface,"Wuhan Xinxin Semiconductor Manufacturing Co.,Ltd.,Wuhan,China",344
297
- A new vertically stacked poly-Si MOSFET for 533 MHz high speed 64Mbit SRAM,"Hitachi Cambridge Laboratory, Hitachi Europe Ltd., Cambridge, UK",345
298
- High electron and hole mobility enhancements in thin-body strained Si/strained SiGe/strained Si heterostructures on insulator,"Department of Materials Science and Engineering, MIT, Cambridge, MA, USA",346
299
- Low operation voltage high integrated field emitter arrays by transfer metal mold technique using ultra precision machining and super microelectroplating technology,"Corporate Research & Development Center, Toshiba Corporation, Kawasaki, Japan",347
300
- High performance CMOS fabricated on hybrid substrate with different crystal orientations,"Microelectronic Division, Hopewell Junction, NY, USA",348
301
- Advanced power devices for many-core processor power supplies,"ACOO Enterprises LLC, USA",349
302
- "A Low-Cost, High-Performance, High-Voltage Complementary BiCMOS Process","Im Technologiepark, IHP, Frankfurt, Germany",350
303
- High performance poly-Si TFTs on a glass by a stable scanning CW laser lateral crystallization,"Fujitsu Laboratories Limited, Atsugi, Japan",351
304
- Role of correlation in systematic variation modeling,"Compact Device Modeling Group, Advanced Design, Intel Corporation, Hillsboro, US",352
305
- Role of temperature in process-induced charging damage in sub-micron CMOS transistors,"Sematech, Austin, TX, USA",353
306
- A SiGe transmitter chipset for CATV video-on-demand systems,"Microtune,Plano,TX,USA",354
307
- Surface Wave and Lamb Wave Acoustic Devices on Heterogenous Substrate for 5G Front-Ends,"Harbin Institute of Technology,School of Science,Shenzhen,China",355
308
- Managing leakage in charge-based analog circuits with low-V/sub TH/ transistors by analog T-switch (AT-Switch) and super cut-off CMOS,"Center for Collaborative Res.,Tokyo Univ.,Japan",356
309
- On the dynamic resistance and reliability of phase change memory,"IBM Hopewell Junction,USA",357
310
- A novel W/WNx/dual-gate CMOS technology for future high-speed DRAM having enhanced retention time and reliability,"Technology & Development Office, Elpida Memory, Inc., Sagamihara, Kanagawa, Japan",358
311
- 300mm Heterogeneous 3D Integration of Record Performance Layer Transfer Germanium PMOS with Silicon NMOS for Low Power High Performance Logic Applications,"Components Research, Intel Corporation, Hillsboro, OR, USA",359
312
- 0.18 um modular triple self-aligned embedded split-gate flash memory,"Div. of Microelectron.,IBM,Hopewell Junction,NY,USA",360
313
- ESD Protection for Mixed-Voltage I/O in LowVoltage Thin-Oxide CMOS,"Nat. Chiao-Tung Univ.,Hsin-Chu",361
314
- A 256MB synchronous-burst DDR SRAM with hierarchical bit-line architecture for mobile applications,"Samsung,Hwasung,South Korea",362
315
- A low power and high speed data transfer scheme with asynchronous compressed pulse width modulation for AS-memory,"ULSI Lab.,Mitsubishi Electr. Corp.,Itami,Japan",363
316
- A CMOS Image Sensor Integrating Column-Parallel Cyclic ADCs with On-Chip Digital Error Correction Circuits,"Sanei Hytechs,Hamamatsu,Japan",364
317
- An orthogonal 6F/sup 2/ trench-sidewall vertical device cell for 4 Gb/16 Gb DRAM,"Infineon Technologies, Dresden, Germany",365
318
- A middle-1X nm NAND flash memory cell (M1X-NAND) with highly manufacturable integration technologies,"Research and Development Division, Flash Device development & Advanced Process Team, Ichon, Gyeonggi, South Korea",366
319
- A 400MHz random-cycle dual-port interleaved DRAM with striped-trench capacitor,"Matsushita,Nagaokakyo,Japan",367
320
- A 1mW Dual-Chopper Amplifier for a 50-/spl mu/g/spl radic/Hz Monolithic CMOS-MEMS Capacitive Accelerometer,"Dept. of Electr. & Comput. Eng.,Florida Univ.,Gainesville,FL",368
321
- A large-area curved pyroelectric fingerprint sensor,"TNO Holst Centre, The Netherlands",369
322
- A 4.5GHz LC-VCO with Self-Regulating Technique,"Renesas Technology,Takasaki,Japan",370
323
- Advanced MMIC for Passive Millimeter and Submillimeter Wave Imaging,"Northrop Grumman,Redondo Beach,CA",371
324
- Random Telegraph Signal Statistical Analysis using a Very Large-scale Array TEG with 1M MOSFETs,"Asahi Kasei Microsystems Co.,Ltd.,Aza-Aoba,Aramaki,Aoba-ku,Sendai,,Japan",372
325
- High frequency InAs-channel HEMTs for low power ICs,"HRL Laboratories LLC, CA, USA",373
326
- Ultra thinning 300-mm wafer down to 7-µm for 3D wafer Integration on 45-nm node CMOS using strained silicon and Cu/Low-k interconnects,"Fujitsu Laboratories Limited, Atsugi, Kanagawa, Japan",374
327
- A 7nm FinFET technology featuring EUV patterning and dual strained high mobility channels,"GLOBALFOUNDRIES, Albany Nanotechnology Center, Albany, NY",375
328
- PBTI/NBTI monitoring ring oscillator circuits with on-chip Vt characterization and high frequency AC stress capability,"IBM SRDC,Hopewell Junction,NY,USA",376
329
- SOI circuit technology for batteryless mobile system with green energy sources,"Commun. Device R&D Dept.,Seiko Epson Corp.,Nagano,Japan",377
330
- A 10Gb/s eye-opening monitor in 0.13 /spl mu/m CMOS,"California Inst. of Technol.,Pasadena,CA,USA",378
331
- "High performance low temperature activated devices and optimization guidelines for 3D VLSI integration of FD, TriGate, FinFET on insulator","STMicroelectronics,France",379
332
- Advances in 3D CMOS sequential integration,"CEA, MINATEC, Grenoble, France",380
333
- Hybrid 1T e-DRAM and e-NVM Realized in One 10 nm node Ferro FinFET device with Charge Trapping and Domain Switching Effects,"Key Laboratory of Microelectronics Devices and Integrated Technology, Chinese Academy of Sciences, Beijing, China",381
334
- Advanced power electronic devices based on Gallium Nitride (GaN),"Cambridge Electronics, Inc. (CEI), Cambridge, MA, USA",382
335
- 0.1 /spl mu/m level contact hole pattern formation with KrF lithography by resolution enhancement lithography assisted by chemical shrink (RELACS),"Ryoden Semiconductor System Engineering Corporation, Itami, Hyogo, Japan",383
336
- Weak inversion MOS varactors for 0.5 V analog integrated filters,"Columbia Univ.,New York,NY,USA",384
337
- Analysis and control of hysteresis in PD/SOI CMOS,"IBM Research Division, Yorktown Heights, NY, USA",385
338
- "19.6 A 0.2V trifilar-coil DCO with DC-DC converter in 16nm FinFET CMOS with 188dB FOM, 1.3kHz resolution, and frequency pushing of 38MHz/V for energy harvesting applications","1TSMC,Hsinchu,Taiwan",386
339
- A 0.18 /spl mu/m CMOS front-end processor for a blu-ray disc recorder with an adaptive PRML,"Samsung Electron.,Suwon,South Korea",387
340
- "A 90-nm CMOS device technology with high-speed, general-purpose, and low-leakage transistors for system on chip applications","Taiwan Semiconductor Manufacturing Company, Science Based Industrial Park, Hsinchu, Taiwan",388
341
- 18.3 A 120mA Non-Isolated Capacitor-Drop AC/DC Power Supply,"Texas Instruments,Tucson,AZ",389
342
- Novel SiC power MOSFET with integrated unipolar internal inverse MOS-channel diode,"Advanced Devices Development Center, Panasonic Corporation, Moriguchi, Osaka, Japan",390
343
- Wireless implantable microsystems: coming breakthroughs in health care,"Dept. of Electr. Eng. & Comput. Sci.,Michigan Univ.,Ann Arbor,MI,USA",391
344
- High temperature operation of AlInAs/InGaAs/AlInAs 3D-SMODFETs with record two-dimensional electron gas densities,"US Army Research Laboratory, Fort Monmouth, NJ, USA",392
345
- A highly manufacturable low-k ALD-SiBN process for 60nm NAND flash devices and beyond,"Process Engineering Section, Thermal Processing Systems BU, Tokyo Electron Limited, Nirasaki, Yamanashi, Japan",393
346
- A 28nm HKMG super low power embedded NVM technology based on ferroelectric FETs,"NaMLab gGmbH, Dresden, Germany",394
347
- Gate-all-around Twin Silicon nanowire SONOS Memory,"PD Team,San,Nongseo-Dong,Kiheung-Ku,Yongin-City,Kyoungi-Do,,KOREA",395
348
- Quantized conductive filament formed by limited Cu source in sub-5nm era,"School of Materials Science and Engineering, Department of Nanobio Materials and Electronics, Gwangju Institute of Science and Technology, Gwangju, South Korea",396
349
- Additive manufacturing for electronics “Beyond Moore”,"PARC, A Xerox company, Palo Alto, USA",397
350
- SRAM current-sense amplifier with fully-compensated bit line multiplexer,"Tech. Univ. of Munich,Germany",398
351
- Performance comparison of sub 1 nm sputtered TiN/HfO/sub 2/ nMOS and pMOSFETs,"Texas Instruments, USA",399
352
- 2RW dual-port SRAM design challenges in advanced technology nodes,"Renesas System Design Corporation, Tokyo, Japan",400
353
- Experimental characterization of stiction due to charging in RF MEMS,"E.E. Department of K. U. Leuven, IMEC vzw, Leuven, Belgium",401
354
- A 4.75GHz fractional frequency divider with digital spur calibration in 45nm CMOS,"Intel,Hillsboro,OR,USA",402
355
- A wire-speed powerTM processor: 2.3GHz 45nm SOI with 16 cores and 64 threads,"IBM Research,Bedford,NH,USA",403
356
- "GaN Power Commercialization with Highest Quality-Highest Reliability 650V HEMTs-Requirements, Successes and Challenges","Transphorm Inc., Goleta, CA, USA",404
357
- A 0.5-to-480MHz Self-Referenced CMOS Clock Generator with 90ppm Total Frequency Error and Spread-Spectrum Capability,"Mobius Microsystems,Detroit,MI",405
358
- 0.228 /spl mu/m/sup 2/ trench cell technologies with bottle-shaped capacitor for 1 Gbit DRAMs,"ULSI Research Laboratories, Toshiba Corporation, Kawasaki, Japan",406
359
- A 14nm FinFET transistor-level 3D partitioning design to enable high-performance and low-cost monolithic 3D IC,"Technology Development, GLOBALFOUNDRIES, Malta, Ny, USA",407
360
- Physics-based compact modeling framework for state-of-the-art and emerging STT-MRAM technology,"Device Lab, Samsung Semiconductor Inc., San Jose, CA, USA",408
361
- Anomalous diffusion in the extension region of nanoscale MOSFETs,"FUJITSU LABORATORIES Limited, Atsugi, Kanagawa, Japan",409
362
- Enabling UTBB Strained SOI Platform for Co-Integration of Logic and RF: Implant-Induced Strain Relaxation and Comb-Like Device Architecture,"CEA,LETI,Minatec Campus,Grenoble,France",410
363
- A 5-mW 6-Gb/s Quarter-Rate Sampling Receiver with a 2-Tap DFE Using Soft Decisions,"California Univ.,Los Angeles,CA",411
364
- A new direct low-k/Cu dual damascene (DD) contact lines for low-loss (LL) CMOS device platforms,"NEC Electronics Corporation,Shimokuzawa,Sagamihara,Kanagawa,JAPAN",412
365
- "First fully functionalized monolithic 3D+ IoT chip with 0.5 V light-electricity power management, 6.8 GHz wireless-communication VCO, and 4-layer vertical ReRAM","National Nano Device Laboratories, Hsinchu, Taiwan",413
366
- A −31dBc integrated-phase-noise 29GHz fractional-N frequency synthesizer supporting multiple frequency bands for backward-compatible 5G using a frequency doubler and injection-locked frequency multipliers,"FCI,Seongnam,Korea",414
367
- A Spur Suppression Technique for Phase-Locked Frequency Synthesizers,"National Taiwan Univ.,Taipei",415
368
- Experimental and comparative investigation of low and high field transport in substrate- and process-induced strained nanoscaled MOSFETs,"CEA-LETI/DRT,Grenoble,France",416
369
- III-V HEMTs for Cryogenic Low Noise Amplifiers,"Low Noise Factory AB,Gothenburg,Sweden",417
370
- A 14b 40MS/s Redundant SAR ADC with 480MHz Clock in 0.13pm CMOS,"Infineon Technologies,Munich,Germany",418
371
- A system-on-chip for bi-directional point-to-multipoint wireless digital audio applications,"Catena,Kista,Sweden",419
372
- High performance amorphous oxide thin film transistors with self-aligned top-gate structure,"Semiconductor Laboratory, Samsung Advanced Institute of Technology, Yongin si, Gyeonggi, South Korea",420
373
- Design and fabrication of a high dynamic range image sensor in TFA technology,"Inst. fur Halbleiterelektronik,Siegen Univ.,Germany",421
374
- Circuit yield of organic integrated electronics,"STMicroelectronics,Milan,Italy",422
375
- A 0.25 mW sigma-delta modulator for voice-band applications,"Integrated Syst. Labs.,Texas Instrum. Inc.,Dallas,TX,USA",423
376
- PRD-based global-mean-time signaling for high-speed chip-to-chip communications,"Fujitsu Labs. Ltd.,Atsugi,Japan",424
377
- Hybrid silicon/molecular memories: co-engineering for novel functionality,"ZettaCore, Inc., CO, USA",425
378
- A Formation of Si Native Oxide Membrane Using High-Selectivity Etching and Applications for Nano-Pipe Array and Micro-Diaphragm on Si Substrate,"Spansion, Inc., Sunnyvale, CA, USA",426
379
- A harmonic rejection mixer robust to RF device mismatches,"Silicon Laboratories,Austin,TX",427
380
- Monolithically integrated 600-V E/D-mode SiNx/AlGaN/GaN MIS-HEMTs and their applications in low-standby-power start-up circuit for switched-mode power supplies,"Department of Microwave Devices and IC's, Institute of Microelectronics, Beijing, China",428
381
- "A 0.016mm2, 2.4GHz RF signal quality measurement macro for RF test and diagnosis","System Devices Research Laboratories,NEC Corporation,Sagamihara,Kanagawa,,Japan",429
382
- The 300mm Technology Current Status And Future Prospect,"Semiconductor Leading Edge Technologies,Inc. Yoshida+ho,Totsuka-ku,Yokohama-shi,Japan",430
383
- 3.6 A 6-to-600MS/s Fully Dynamic Ringamp Pipelined ADC with Asynchronous Event-Driven Clocking in 16nm,"imec,Leuven,Belgium",431
384
- 10.5 A Fully Integrated 27dBm Dual-Band All-Digital Polar Transmitter Supporting 160MHz for WiFi 6 Applications,"Intel,Haifa,Israel",432
385
- Epitaxial strained germanium p-MOSFETs with HfO/sub 2/ gate dielectric and TaN gate electrode,"Intel Corporation, Hillsboro, OR, USA",433
386
- "Fully integrated 1.7GHz, 188dBc/Hz FoM, 0.8V, 320/spl mu/W LC-tank VCO and frequency divider","Center for Phys. Electron.,Denmark Tech. Univ.,Lyngby,Denmark",434
387
- An 8640 MIPS SoC with Independent Power-Off Control of 8 CPUs and 8 RAMs by An Automatic Parallelizing Compiler,"Hitachi,Tokyo,Japan",435
388
- A Wireless Transceiver with Integrated Data Converters for 802.11a/b/g Access Points,"Analog Devices,Raleigh,NC",436
389
- A low-power integrated tuner for cable-telephony applications,"Silicon Wave Inc.,San Diego,CA,USA",437
390
- "A 3MHz-BW 3.6GHz digital fractional-N PLL with sub-gate-delay TDC, phase-interpolation divider, and digital mismatch cancellation","Politecnico di Milano,Italy",438
391
- A thin amorphous silicon buffer process for suppression of W polymetal gate depletion in PMOS,"T Project Group,Fujitsu Labs. Ltd.,Japan",439
392
- A single-chip CMOS transceiver for DCS-1800 wireless communications,"Katholieke Univ.,Leuven,Belgium",440
393
- A novel solution for porous low-k dual damascene post etch stripping/clean with supercritical CO/sub 2/ technology for 65nm and beyond applications,"Taiwan Semiconductor Manufacturing Company Limited, Hsinchu, Taiwan",441
394
- Damage-free CMP towards 32nm-node porous low-k (k = 1.6)/Cu integration,"Semicond. Leading Edge Technol. Inc.,Ibaraki,Japan",442
395
- A new cell structure for sub-quarter micron high density flash memory,"VLSI. Research Laboratory, Sharp Corporation, Nara, Japan",443
396
- Coupled quantum dots on SOI as highly integrated Si qubits,"Department of Electrical Engineering, Tokyo Institute of Technology, Tokyo, Japan",444
397
- 10.6 A 4G/5G Cellular Transmitter in 12nm FinFET with Harmonic Rejection,"MediaTek,Kent,United Kingdom",445
398
- Channel Stress Modulation and Pattern Loading Effect Minimization of Milli-Second Super Anneal for Sub-65nm High Performance SiGe CMOS,"Res. & Dev.,Taiwan Semicond. Manuf. Co. Ltd.,Hsinchu",446
399
- An Internally-matched GaN HEMT Amplifier with 550-watt Peak Power at 3.5 GHz,"Cree Research, Inc., Goleta, CA, USA",447
400
- A 14-bit 8.9GS/s RF DAC in 40nm CMOS achieving >71dBc LTE ACPR at 2.9GHz,"Texas Instruments Incorporated,Dallas,USA",448
401
- Intrinsic fluctuations in Vertical NAND flash memories,"Process Development Team,Semiconductor R&D Center,Samsung Electronics Co. Ltd.,,Banwol-Dong,Hwasung-City,Gyunggi-Do,Korea",449
402
- Highly scalable flash memory with novel deep trench isolation embedded into highperformance cmos for the 90nm node & beyond,"Infineon Technologies NA, NY, USA",450
403
- Effect of mechanical stress on reliability of gate-oxide film in MOS transistors,"Mechanical Engineering Research Laboratory, Hitachi and Limited, Tsuchiura, Ibaraki, Japan",451
404
- An 8Mb demonstrator for high-density 1.8V Phase-Change Memories,"MPG & Central R&D,STMicroelectronics,Agrate Brianza,Italy",452
405
- A 375 MHz 1 /spl mu/m CMOS 8-bit multiplier,"Integrated Syst. Lab.,Swiss Federal Inst. of Technol.,Zurich,Switzerland",453
406
- 20 Gb/s self-timed vector processing with Josephson single-flux quantum technology,"IBM Austin Research Laboratory,Austin,TX,USA",454
407
- Fully-parallel 25 MHz 2.5 Mb CAM,"Nortel Semiconductors,Ottawa,Ont.,Canada",455
408
- On the microscopic origin of the frequency dependence of hole trapping in pMOSFETs,"Imec, Leuven, Belgium",456
409
- A 50-nm 1.2-V GexTe1−x/Sb2Te3 superlattice topological-switching random-access memory (TRAM),"Low-power Electronics Association & Project,Onogawa,Tsukuba,Ibaraki,JAPAN",457
410
- A Current Driver IC using a S/H for QVGA FullColor Active-Matrix Organic LED Mobile Displays,"Samsung Electronics,Yong-In City,Korea",458
411
- Poly pitch and standard cell co-optimization below 28nm,"ARM INC, Austin, TX, USA",459
412
- The effect of interconnect scaling and low-k dielectric on the thermal characteristics of the IC metal,"Semiconductor Process and Device Center, Texas Instruments, Inc., Dallas, TX, USA",460
413
- Comprehensive extensibility of 20nm low power/high performance technology platform featuring scalable high-k/metal gate planar transistors with reduced design corner,"Samsung Electronics Company Limited, Yongin, Gyeonggi, South Korea",461
414
- Precursor ISI Reduction in High-Speed I/O,"Rambus,Inc,Los Altos,CA; MIT,Cambridge,MA",462
415
- First Transistor Demonstration of Thermal Atomic Layer Etching: InGaAs FinFETs with sub-5 nm Fin-width Featuring in situ ALE-ALD,"MIT, Microsystems Technology Laboratories, Cambridge, MA, USA",463
416
- Correlation of low-frequency noise and emitter-base reverse-bias stress in epitaxial Si- and SiGe-base bipolar transistors,"IBM Microelectronics, Hopewell Junction, NY, USA",464
417
- Re-Examination of Vth Window and Reliability in HfO2 FeFET Based on the Direct Extraction of Spontaneous Polarization and Trap Charge during Memory Operation,"Kioxia Corporation,Institute of Memory Technology Research & Development,Yokkaichi,Japan",465
418
- Physical mechanisms of endurance degradation in TMO-RRAM,"A*STAR, Institute of Microelectronics, Singapore, Singapore",466
419
- Demonstration of recessed SiGe S/D and inserted metal gate on HfO/sub 2/ for high performance pFETs.,"TI assignee at IMEC, Heverlee, Belgium",467
420
- A 3.6GB/s 1.3mW 400mV 0.051mm2 near-threshold voltage resilient router in 22nm tri-gate CMOS,"SoC Design Lab,Intel Labs,Intel Corporation,Hillsboro,OR,USA",468
421
- Ultrathin (<10nm) Nb2O5/NbO2 hybrid memory with both memory and selector characteristics for high density 3D vertically stackable RRAM applications,"School of Materials Science and Engineering,Gwangju Institute of Science and Technology,Korea",469
422
- A novel semimetallic quantum well FET,"Naval Research Laboratory, Inc., Washington D.C., DC, USA",470
423
- "A 4.6μm, 512×512, Ultra-Low Power Stacked Digital Pixel Sensor with Triple Quantization and 127dB Dynamic Range","Brillnics Japan Inc.,Tokyo,Japan",471
424
- A 1 1/4 inch 8.3M pixel digital output CMOS APS for UDTV application,"Micron Technology,CA,USA",472
425
- An Approach to Embedding Traditional Non-Volatile Memories into a Deep Sub-Micron CMOS,"ATQRD,TSMC,Hsinchu,Taiwan",473
426
- Combined linear-logarithmic CMOS image sensor,"Edinburgh Univ.,UK",474
427
- Programmable and automatically-adjustable sense-amplifier activation scheme and multi-reset address-driven decoding scheme for high-speed reusable SRAM core,"Device Dev. Center,Hitachi Ltd.,Tokyo,Japan",475
428
- 14nm FDSOI technology for high speed and energy efficient applications,"IBM,rue Jean Monnet,Crolles,France",476
429
- The impact of substrate surface potential on the performance of RF power LDMOSFETs on high-resistivity SOI,"AmberWave Systems Corporation, Salem, NH, USA",477
430
- Novel fabrication process and structure of a low-voltage-operation micromirror array for optical MEMS switches,"NTT Microsystem Integration Laboratories, Japan",478
431
- Flexible and robust capping-metal gate integration technology enabling multiple-VT CMOS in MuGFETs,"IMEC,Belgium",479
432
- A record GmSAT/SSSAT and PBTI reliability in Si-passivated Ge nFinFETs by improved gate stack surface preparation,"imec,Kapeldreef,Leuven,,Belgium",480
433
- High thermal tolerance of 25-nm c-axis aligned crystalline In-Ga-Zn oxide FET,"Semiconductor Energy Laboratory Co., Ltd., Atsugi, Kanagawa, Japan",481
434
- A quad band WCDMA transceiver with fractional local divider,"Hitachi Central Research Laboratory,Japan",482
435
- "A 2.0 V, 0.35 /spl mu/m partially depleted SOI-CMOS technology","Digital Equipment Corporation, Hudson, MA, USA",483
436
- A 200 MSample/s trellis-coded PRML read/write channel with digital servo,"SGS-Thomson Microelectronics,San Jose,CA,USA",484
437
- Technology Innovations In Mobile Computers,"IBM Japan,Shtmots-uruma,,Kanagawa-!ten,Japan",485
438
- A 4.25 GHz BiCMOS clock recovery circuit with an AV-DSPD architecture for NRZ data stream,"NEC Corp.,Kanagawa,Japan",486
439
- A novel poly-silicon-capped poly-silicon-germanium thin-film transistor,"Xerox Palo Alto Research Center, Palo Alto, CA",487
440
- "A 14.7Mb/mm2 28nm FDSOI STT-MRAM with Current Starved Read Path, 52Ω/Sigma Offset Voltage Sense Amplifier and Fully Trimmable CTAT Reference","ARM,San Jose,CA,USA",488
441
- A Self-Resonant MEMS-based Electrostatic Field Sensor with 4V/m/Hz Sensitivity,"Medtronic,Fridley,MN",489
442
- Record high mobility (428cm2/V-s) of CVD-grown Ge/strained Ge0.91Sn0.09/Ge quantum well p-MOSFETs,Graduate Institute of Electronics Engineering,490
443
- 1st quantitative failure-rate calculation for the actual large-scale SRAM using ultra-thin gate-dielectric with measured probability of the gate-current fluctuation and simulated circuit failure-rate,"Fujitsu Ltd.,,Fuchigami,Akiruno,Tokyo,Japan",491
444
- A 10MHz 80μW 67 ppm/°C CMOS reference clock oscillator with a temperature compensated feedback loop in 0.18μm CMOS,"Department of EECS,KAIST,Guseong-dong,Yuseong-gu,Daejon,Republic of Korea",492
445
- Strain engineered extremely thin SOI (ETSOI) for high-performance CMOS,"GLOBALFOUNDRIES,Albany,NY,USA",493
446
- A fully integrated zero-IF transceiver for GSM-GPRS quad band application,"Texas Instruments,Villeneuve Loubet,France",494
447
- Comprehensive study on AC characteristics in SOI MOSFETs for analog applications,"Dept. of Electr. Eng.,California State Univ.,Los Angeles,CA,USA",495
448
- Micro-Engineered Devices for Motion Energy Harvesting,"Department of Electrical & Electronic Engineering, Imperial College London, London, UK",496
449
- Novel self-assembled ultra-low-k porous silica films with high mechanical strength for 45 nm BEOL technology,"MIRAI, Association of Super-Advanced Electronics Technologies (ASET), Japan",497
450
- An Analog Frontend Chip for a MEMS-Based Parallel Scanning-Probe Data-Storage System,"IBM Systems & Technology Group,Essex Junction,Vermont",498
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/semiconductor_org_types/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Paper title,Organization name,Label,ID
2
- 3Gb/s AC-coupled chip-to-chip communication using a low-swing pulse receiver,"North Carolina State Univ.,Raleigh,NC,USA",university,0
3
- Sub-Micron CMOS / MOS-Bipolar Hybrid TFTs for System Displays,"Advanced LCD Technology Development Center Company Limited, Yokohama, Kanagawa, Japan",company,1
4
- 24.4 A 680nA fully integrated implantable ECG-acquisition IC with analog feature extraction,"imec,Heverlee,Belgium",research institute,2
5
- A write-back cache memory using bit-line steal technique,"Corp. Semicond. Dev. Div.,Matsushita Electr. Ind. Co. Ltd.,Kyoto,Japan",company,3
6
- High performance 0.25 /spl mu/m gate-length doped-channel AlGaN/GaN heterostructure field effect transistors grown on p-type SiC substrates,"APA Optics, Inc., Blaine, MN, USA",company,4
7
- 3-terminal nanoelectromechanical switching device in insulating liquid media for low voltage operation and reliability improvement,"National NanoFab Center, Daejeon, South Korea",research institute,5
8
- Full metal gate with borderless contact for 14 nm and beyond,"Toshiba at Albany NanoTech,NY,USA",company,6
9
- A novel self-aligned shallow trench isolation cell for 90 nm 4 Gbit NAND flash EEPROMs,"SoC R&D Center,Semiconductor Company,Toshiba Corp.,Isogo-ku,Yokohama,Japan",company,7
10
- A 0.13/spl mu/m CMOS EDGE/UMTS/WLAN Tri-Mode /spl Delta//spl Sigma/ ADC with -92dB THD,"ETH,Zurich,Switzerland; Advanced Circuit Pursuit,Zollikon,Switzerland",university,8
11
- On the gate oxide scaling of high performance CMOS transistors,"Semiconductor R&D Center, Samsung Electronics Co., Ltd, Yongin-City, Gyeonggi-Do, Korea (ROK)",company,9
12
- A 0.13/spl mu/m CMOS EDGE/UMTS/WLAN Tri-Mode /spl Delta//spl Sigma/ ADC with -92dB THD,"Advanced Circuit Pursuit,Zollikon,Switzerland; ETH,Zurich,Switzerland",company,10
13
- A 3Gb/s 8b single-ended transceiver for 4-drop DRAM interface with digital calibration of equalization skew and offset coefficients,"Pohang Univ. of Sci. & Technol.,South Korea",university,11
14
- 25.5 A Self-Calibrated 1.2-to-3.8GHz 0.0052mm2 Synthesized Fractional-N MDLL Using a 2b Time-Period Comparator in 22nm FinFET CMOS,"Intel,Hillsboro,OR",company,12
15
- Accurate performance evaluation for the horizontal nanosheet standard-cell design space beyond 7nm technology,"GLOBALFOUNDRIES Inc., Albany, NY, USA",company,13
16
- "Front-end-of-line (FEOL) optimization for high-performance, high-reliable strained-Si MOSFETs; from virtual substrate to gate oxidation","Memory Division, Samsung Electronics Co, Yongin-City, Gyeonggi-Do, Korea",company,14
17
- A 14 b 100 Msample/s CMOS DAC designed for spectral performance,"Illinois Univ.,Urbana,IL,USA",university,15
18
- Design of the Power6 Microprocessor,"IBM Systems Group,Austin,TX",company,16
19
- Collective-effect state variables for post-CMOS logic applications,"Strategic Technology Group,Advanced Micro Devices,Sunnyvale,CA,USA",company,17
20
- Single-chip IF transceiver IC with wide dynamic range variable gain amplifiers for wideband CDMA applications,"Syst. LSI Dev. Center,Mitsubishi Electr. Corp.,Hyogo,Japan",company,18
21
- Formation of Si-on-Insulator Structure by Lateral Solid Phase Epitaxial Growth with Local P-Doping,"Central Research Laboratory,Hitachi Ltd. Kokubunji. Tokyo,Japan",company,19
22
- 1D thickness scaling study of phase change material (Ge2Sb2Te5) using a pseudo 3-terminal device,"Samsung Electronics Company Limited, Yongin si, Gyeonggi, South Korea",company,20
23
- A 500MHz multi-banked compilable DRAM macro with direct write and programmable pipelining,"IBM Microelectron.,Burlington,VT,USA",company,21
24
- Dislocation engineering for a silicon-based light emitter at 1.5 /spl mu/,"MPI für Mikrostrukturphysik, Halle, Germany",research institute,22
25
- An enhanced 130 nm generation logic technology featuring 60 nm transistors optimized for high performance and low power at 0.7 - 1.4 V,"QRE, Hillsboro, OR, USA",company,23
26
- Physical understanding of Vth and Idsat variations in (110) CMOSFETs,"Center for Semiconductor Research & Development,Toshiba Corporation,Japan",company,24
27
- Destructive-read random access memory system buffered with destructive-read memory cache for SoC applications,"IBM Microelectron.,Hopewell Junction,NY,USA",company,25
28
- Benchmarking of monolithic 3D integrated MX2 FETs with Si FinFETs,"KUL, Leuven, Belgium",university,26
29
- A 48-mW 18-Gb/s fully integrated CMOS optical receiver with photodetector and adaptive equalizer,"Applied Science and Technology Research Institute,Hong Kong",research institute,27
30
- Role of non-radiative recombination in the degradation of InGaN-based laser diodes,"Matsushita Electric Industrial Limited, Takatsuki, Osaka, Japan",company,28
31
- Highly area efficient and cost effective double stacked S/sup 3/ (stacked single-crystal Si) peripheral CMOS SSTFT and SRAM cell technology for 512M bit density SRAM,"R & D Center, Samsung Electronics Kiheung-Eup, Yongin-City, Kyungki-do, Korea",company,29
32
- "Strained SOI technology for high-performance, low-power CMOS applications","MIRAI-ASET,Kawasaki,Japan",university,30
33
- Damascene integration of copper and ultra-low-k xerogel for high performance interconnects,"Texas Instruments Inc, Dallas, TX, US",company,31
34
- A crossing charge recycle refresh scheme with a separated driver sense-amplifier for Gb DRAMs,"ULSI Device Dev. Labs.,NEC Corp.,Kanagawa,Japan",company,32
35
- Large-signal performance of high-BV/sub CEO/ graded epi-base SiGe HBTs at wireless frequencies,"IBM Microelectronics, Burlington, VT, USA",company,33
36
- "A 65 nm CMOS technology with a high-performance and low-leakage transistor, a 0.55 /spl mu/m/sup 2/ 6T-SRAM cell and robust hybrid-ULK/Cu interconnects for mobile multimedia applications","Fujitsu Laboratories Ltd., Atsugi, Kanagawa, Japan",company,34
37
- Low-power embedded ReRAM technology for IoT applications,"Incubation Center,Renesas Electronics Corp.,Shimokuzawa,Chuou-ku,Sagamihara,Japan",company,35
38
- A DSL customer-premise equipment modem SoC with extended reach/rate for broadband bridging and routing,"Texas Instruments Bangalore and Texas Instruments,Dallas,TX",company,36
39
- "An Artificial Iris ASIC with High Voltage Liquid Crystal Driver, 10 nA Light Range Detector and 40 nA Blink Detector for LCD Flicker Removal","Imec,Leuven,Belgium",research institute,37
40
- First Demonstration of Low Temperature (≤500°C) CMOS Devices Featuring Functional RO and SRAM Bitcells toward 3D VLSI Integration,"imec from Samsung Electronics,Korea",company,38
41
- Competitive and cost effective high-k based 28nm CMOS technology for low power applications,"IBM Semiconductor Research and Development Center (SRDC), Samsung Electronics Company Limited, Hopewell Junction, NY, USA",company,39
42
- "Scalable 3D-FPGA using wafer-to-wafer TSV interconnect of 15 Tbps/W, 3.3 Tbps/mm2","Technology Research Department,Association of Super-Advanced Electronics Technologies (ASET),,Higashi-koigakubo,Kokubunji,Tokyo,,Japan",research institute,40
43
- "21.8 An all-in-one (Qi, PMA and A4WP) 2.5W fully integrated wireless battery charger IC for wearable applications","MAPS,Yongin,Korea",company,41
44
- High performance and low leakage current InGaAs-on-silicon FinFETs with 20 nm gate length,"Samsung Advanced Logic Lab,Austin,TX",company,42
45
- Interconnect Scaling Scenario Using A Chip Level Interconnect Model,"Semiconductor Research Center,Matsushita Electric Industrial Co.,Ltd.,Yagumo-nakamachi,Moriguchi,Osaka,Japan",company,43
46
- A 12 b 50 M sample/s cascaded folding and interpolating ADC,"Philips Composants et Semiconducteurs,Caen,France",company,44
47
- Development of sub 10-µm ultra-thinning technology using device wafers for 3D manufacturing of terabit memory,"Fujitsu Laboratories Ltd.,Japan",company,45
48
- A 3.1 to 5 GHz CMOS DSSS UWB transceiver for WPANs,"Sony,Tokyo,Japan",company,46
49
- 30.1 8b Thin-film microprocessor using a hybrid oxide-organic complementary technology with inkjet-printed P2ROM memory,"Panasonic,Osaka,Japan",company,47
50
- Characterizing Electromigration Effects in a 16nm FinFET Process Using a Circuit Based Test Vehicle,"Cisco Systems, Hong Kong, China",company,48
51
- "A 180MS/s, 162Mb/s wideband three-channel baseband and MAC processor for 802.11 a/b/g","Engim,Acton,MA,USA",company,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/systematic_review_inclusion/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "systematic_review_inclusion", "description": "", "data_columns": ["Title", "Abstract", "Authors", "Journal", "ID"], "label_columns": {"Label": ["included", "not included"]}}
 
 
data/systematic_review_inclusion/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/systematic_review_inclusion/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Title,Abstract,Authors,Journal,Label,ID
2
- Prototyping and transforming facial textures for perception research,Wavelet based methods for prototyping facial textures for artificially transforming the age of facial images were described. Prototype images were used to define the salient features of a particular face classification. Two experiments were conducted to validate the ability of wavelet processing method to capture age information. The first experiment validated the textured prototyping method while the second experiment investigated the effectiveness of the new age transformation technique. The shape and color transformation used to rejuvenate faces hardly affected the apparent age. The average hair color change during rejuvenation was not sufficient to project the hair color in normal range for the younger age group.,"Tiddeman, B.; Burt, M.; Perrett, D.",IEEE Comput Graphics Appl,not included,0
3
- School finance reform and voluntary fiscal federalism,"California has transferred the financing of its public schools from localities to the state. In response, many families have supplemented the tax revenue of their local public schools with voluntary contributions. This paper analyzes that phenomenon. We propose a model of partial cooperation among parents in making voluntary contributions to their public schools. Under reasonable conditions, the model predicts that contributions per pupil should decline with school size. We estimate this relationship using data on contributions to California schools. Our estimates reveal that contributions per pupil do decline with size; however, the rate of decline is surprisingly slow. © 2002 Elsevier B.V. All rights reserved.","Brunner, E.; Sonstelie, J.",J. Public Econ.,not included,1
4
- When Should the Ask Be a Nudge? The Effect of Default Amounts on Charitable Donations,,"Goswami, I.; Urminsky, O.",Journal of Marketing Research,not included,2
5
- "Intra-organizational volunteerism: Good soldiers, good deeds and good politics","Despite the millions of hours donated to charity each year by employees on behalf of their employers there has been relatively little research into the motives for such pro-social behavior. The current paper extends Peterson's (2004, Journal of Business Ethics 49, 371) study by exploring a unique form of employee volunteerism identified as intra-organizational, or employer-sanctioned volunteerism, and uniting the heretofore distinct charity support and organizational citizenship behavior literatures. Results of a preliminary study revealed that employee participation in such intra-organizational volunteer programs is motivated by charity, firm, and personal benefits. Managerial and research implications are presented. © Springer 2006.","Peloza, J.; Hassay, D.N.",J. Bus. Ethics,not included,3
6
- Implicit vs. Explicit deception in ultimatum games with incomplete information,"We explore bargaining, using ultimatum games, when one party, the proposer, possesses private information about the pie size and can either misrepresent this information through untruthful statements (explicit deception) or through information-revealing actions (implicit deception). Our study is the first such direct comparison between two ways in which people can deceive. We find that requiring informed parties to make an explicit statement yields greater deception than when information is communicated implicitly, particularly for larger stakes. However, allowing the explicit statement to be accompanied by a promise of truthfulness reverses this effect. In contrast with many previous studies, we generally observe very high frequencies of dishonesty. © 2013 Elsevier B.V.","Kriss, P.H.; Nagel, R.; Weber, R.A.",J. Econ. Behav. Organ.,not included,4
7
- "Why people choose teaching: A scoping review of empirical studies, 2007–2016","Who enters teaching and why are questions of immense social and political importance throughout the world. This paper presents a scoping review of empirical studies, published between 2007 and 2016, that addressed influences on the choice of teaching as a career. Seventy articles were analysed descriptively and substantively. Our overview of the nature, extent, and range of research published in these articles highlights that most studies focus on motivations for teaching, with intrinsic and altruistic motivations most commonly identified. We argue that a broader range of theoretical perspectives could add fresh insights to the question of why people choose teaching. (PsycINFO Database Record (c) 2018 APA, all rights reserved)","Fray, Leanne; Gore, Jennifer",Teaching and Teacher Education,not included,5
8
- Persuasion: Theory & Research,,"O’Keefe, D.J.",Persuasion: Theory and research,not included,6
9
- Being sticker rich: Numerical context influences children's sharing behavior,"Young children spontaneously share resources with anonymous recipients, but little is known about the specific circumstances that promote or hinder these prosocial tendencies. Children (ages 3-11) received a small (12) or large (30) number of stickers, and were then given the opportunity to share their windfall with either one or multiple anonymous recipients (Dictator Game). Whether a child chose to share or not varied as a function of age, but was uninfluenced by numerical context. Moreover, children's giving was consistent with a proportion- based account, such that children typically donated a similar proportion (but different absolute number) of the resources given to them, regardless of whether they originally received a small or large windfall. The proportion of resources donated, however, did vary based on the number of recipients with whom they were allowed to share, such that on average, children shared more when there were more recipients available, particularly when they had more resources, suggesting they take others into consideration when making prosocial decisions. Finally, results indicated that a child's gender also predicted sharing behavior, with males generally sharing more resources than females. Together, findings suggest that the numerical contexts under which children are asked to share, as well as the quantity of resources that they have to share, may interact to promote (or hinder) altruistic behaviors throughout childhood. © 2015 Posid et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.","Posid, T.; Fazio, A.; Cordes, S.",PLoS ONE,not included,7
10
- What's in a message? The longitudinal influence of a supportive versus combative orientation on the performance of nonprofits,,"Botner, K.A.; Mishra, A.; Mishra, H.",Journal of Marketing Research,not included,8
11
- Advancing Measurement and Research on Youths’ Prosocial Behavior in the Digital Age,"Widespread access to digital and social media has drastically altered the nature of youth’s interpersonal connections. In this context, the opportunities children and adolescents have to help people around them are rapidly evolving. In this article, we review emerging literature on how digital media influences youth’s prosocial development in new ways. Then we propose the next steps for advancing the field’s understanding of youth’s prosocial behavior in the digital age. We advocate for extending existing measures to capture experiences that are increasingly relevant for children and adolescents today, with a focus on current events, including the COVID-19 pandemic, and social and political activism. We also provide a research agenda to advance the understanding of prosocial development. © 2021 The Authors Child Development Perspectives © 2021 The Society for Research in Child Development","Armstrong-Carter, E.; Telzer, E.H.",Child Dev. Perspect.,not included,9
12
- The cost-effectiveness of public postsecondary education subsidies,,"Muennig P, Fahs M",,not included,10
13
- Gossip as an alternative for direct observation in games of indirect reciprocity,"Communication about social topics is abundant in human societies, and many functions have been attributed to such gossiping. One of these proposed functions is the management of reputations. Reputation by itself has been shown to have a strong influence on cooperation dynamics in games of indirect reciprocity, and this notion helps to explain the observed high level of cooperation in humans. Here we designed a game to test a widespread assumption that gossip functions as a vector for the transmission of social information. This empirical study (with 14 groups of nine students each) focuses on the composition of gossip, information transfer by gossip, and the behavior based on gossip information. We show that gossip has a strong influence on the resulting behavior even when participants have access to the original information (i.e., direct observation) as well as gossip about the same information. Thus, it is evident that gossip has a strong manipulative potential. Furthermore, gossip about cooperative individuals is more positive than gossip about uncooperative individuals, gossip comments transmit social information successfully, and cooperation levels are higher when people encounter positive compared with negative gossip. © 2007 by The National Academy of Sciences of the USA.","Sommerfeld, R.D.; Krambeck, H.-J.; Semmann, D.; Milinski, M.",Proc. Natl. Acad. Sci. U. S. A.,not included,11
14
- Time to loss of brain function and activity during circulatory arrest,"PURPOSE: Brain function during the dying process and around the time of cardiac arrest is poorly understood. To better inform the clinical physiology of the dying process and organ donation practices, we performed a scoping review of the literature to assess time to loss of brain function and activity after circulatory arrest. MATERIALS AND METHODS: Medline and Embase databases were searched from inception to June 2014 for articles reporting the time interval to loss of brain function or activity after loss of systemic circulation. RESULTS: Thirty-nine studies met selection criteria. Seven human studies and 10 animal studies reported that electroencephalography (EEG) activity is lost less than 30seconds after abrupt circulatory arrest. In the setting of existing brain injury, with progressive loss of oxygenated circulation, loss of EEG may occur before circulatory arrest. Cortical evoked potentials may persist for several minutes after loss of circulation. CONCLUSION: The time required to lose brain function varied according to clinical context and method by which this function is measured. Most studies show that clinical loss of consciousness and loss of EEG activity occur within 30seconds after abrupt circulatory arrest and may occur before circulatory arrest after progressive hypoxia-ischemia. Prospective clinical studies are required to confirm these observations.","Pana, R; Hornby, L; Shemie, S D; Dhanani, S; Teitelbaum, J",J. Crit. Care,not included,12
15
- Stability of hemoglobin mass over 100 days in active men,"The purpose of this study was to investigate the suggestion in a recent meta-analysis that variability in hemoglobin mass increases when time between measurements increases from days to months. Hemoglobin mass of six active men was measured with the carbon monoxide method every 1-6 days for 100-114 days (42 +/- 3 measurements, mean +/- SD). Measurement error for each individual's series was estimated from the standard deviation of consecutive pairwise changes and compared with his total error (standard deviation of all values). Linear trends and periodicities in each series were quantified by regression and spectral analysis. Series with known random error and periodicity were also simulated and analyzed. There were clear differences in the pairwise error of measurement between subjects (range 1.4-2.7%). For five men, there was little difference between the total and pairwise errors; their mean ratio (1.06, 90% confidence limits 0.96-1.17) was less than ratios for simulated sinusoidal series with random error of 2%, amplitude of 2%, and periods of 20-100 days (ratios 1.13-1.21). Spectral analysis clearly revealed such periodicities in the simulated series but not in the series of these subjects. The sixth man, who had donated blood 12 days before commencing measurements, showed errors, trend, and periodicity consistent with gradual restoration of hemoglobin mass. Measurement error of hemoglobin mass does not increase over 100 days. Consequently, hemoglobin mass may be suitable for long-term monitoring of small changes that might occur with training or erythropoietin abuse, taking into consideration the small differences between athletes in errors and trends.","Eastwood, Annette; Hopkins, Will G; Bourdon, Pitre C; Withers, Robert T; Gore, Christopher J",J. Appl. Physiol.,not included,13
16
- The life you save may be your own,,"Schelling, T.C.",Problems in Public Expenditure Analysis,not included,14
17
- "A meta-analysis of prosocial media on prosocial behavior, aggression, and empathic concern: A multidimensional approach","Studies examining the effects of exposure to prosocial media on positive outcomes are increasing in number and strength. However, existing meta-analyses use a broad definition of prosocial media that does not recognize the multidimensionality of prosocial behavior. The aim of the current study is to conduct a meta-analysis on the effects of exposure to prosocial media on prosocial behavior, aggression, and empathic concern while examining multiple moderators that the prosocial behavior literature suggests are important to our understanding of why individuals voluntarily help others (e.g., target, type, cost). Results from 72 studies involving 243 effect sizes revealed that exposure to prosocial media was related to higher levels of prosocial behavior and empathic concern and lower levels of aggressive behavior. Moderation analyses suggest that several moderators accounted for heterogeneity in the model, including age of participant, region, media type (active vs. passive), and study design. In terms of multidimensional moderators, prosocial media had stronger effects on prosocial behavior toward strangers than did any other target and on helping and prosocial thinking but not donating or volunteering. Comparisons with other meta-analyses on media effects are made and implications for parents, media producers, and researchers are discussed. (PsycINFO Database Record","Coyne, Sarah M; Padilla-Walker, Laura M; Holmgren, Hailey G; Davis, Emilie J; Collier, Kevin M; Memmott-Elison, Madison K; Hawkins, Alan J",Dev. Psychol.,included,15
18
- Treatment strategies for osteoarthritis patients with pain and hypertension,"Out of 100 patients with osteoarthritis (OA), almost 40 have a concomitant diagnosis of hypertension. Nonsteroidal anti-inflammatory drugs (NSAIDs) and cyclooxygenase-2 (COX-2) inhibitors may trigger a rise in blood pressure (BP), which is more marked in patients with established hypertension. NSAIDs and COX-2 inhibitors attenuate the antihypertensive effect of several antihypertensive agents. Frequent BP controls are needed in treated hypertensive patients who are concomitantly receiving NSAIDs or COX-2 inhibitors because even a small increase in BP may be associated with an important rise in the risk of major cardiovascular complications. In meta-analyses, an increase in systolic BP of 5mmHg was associated with a 25% higher risk of cardiovascular events. These data have been confirmed in randomized studies with rofecoxib and celecoxib, where a modest increase in BP was associated with a significantly higher risk of cardiovascular disease. There is emerging evidence that the COX-inhibiting nitric oxide donator (CINOD) class is promising in the treatment of patients with OA. Naproxcinod, the first CINOD investigated in clinical trials, is composed of the traditional NSAID naproxen covalently bound to the nitric oxide (NO)-donating moiety butanediol mono-nitrate (BDMN). The molecule has the potential to provide a sustained release of NO. In clinical studies, naproxcinod prevented the BP rise in normotensive and hypertensive patients observed with naproxen. The BP benefit of naproxcinod over naproxen was greater in patients concomitantly receiving angiotensin-converting enzyme inhibitors or angiotensin II receptor blockers. These investigational data suggest that naproxcinod is a valuable alternative to NSAIDs and COX-2 inhibitors for treatment of OA patients.","Verdecchia, Paolo; Angeli, Fabio; Mazzotta, Giovanni; Martire, Paola; Garofoli, Marta; Gentile, Giorgio; Reboldi, Gianpaolo",Ther. Adv. Musculoskelet. Dis.,not included,16
19
- "Nonprofit organizations, monopolistic competition, and private donations: Evidence from Spain","This article presents an analysis of the determinants of money and time donations to Spanish nongovernmental organizations that channel aid to less developed countries. A basic model inspired by the theory of monopolistic competition is formulated and tested taking into account that some of the explanatory variables, such as fund-raising expenditure and price, are endogenous. The results show that the average donor is different for money and time donations and that government preferences differ from those of private donors. Finally, the authors find that the hypothesis of efficient fund-raising expenditures cannot be rejected.","Marcuello, C.; Salas, V.",Public Financ. Rev.,not included,17
20
- Public goods provision and redistributive taxation,"This paper studies the relationship between redistributive taxation and tax-deductible charitable contributions. Redistribution has two opposite effects on voluntary giving. The price of charitable giving decreases with the degree of redistribution, and this has a positive effect on the total amount of giving (substitution effect). However, redistribution leads to lower consumption for the contributors and therefore has a negative effect on contributions to the charity (income effect). The theoretical model developed in this paper demonstrates that, under a general class of utility functions, the substitution effect dominates the income effect. Hence, charitable giving increases with the tax rate. In purely egalitarian societies, the public good is provided efficiently and the total welfare is maximized independent of the ex-ante income inequality. However, the positive impact of taxation on charitable giving and welfare may disappear if individuals generate their income levels in anticipation of taxation and redistribution does not take into account the cost of effort. © 2008 Elsevier B.V. All rights reserved.","Uler, N.",J. Public Econ.,not included,18
21
- "Responsibility, norms, and helping in an emergency","Replicated the J. Darley and B. Latane (see record) study of bystander aid to a seizure victim examining the effects of (a) number and competence of bystanders, (b) information appropriate for action, and (c) ascription of responsibility (AR) upon helping by males and females. From an analysis of norms relevant in an emergency and of the likelihood of their activation, main effects on speed of helping for the above 4 variables, interactions of the 1st 3 with AR, a Sex of Subject × Number interaction, and differences in type of help offered in various conditions were predicted. 179 undergraduates participated in a factorial experiment. Speed of helping dropped significantly for females, but not for males, when other bystanders were present (reporting decreased, direct help was unaffected), and dropped significantly further when another bystander was medically competent (reporting increased, direct help decreased). Among females disposed to accept rationales for denying responsibility, both effects were particularly strong. Information-action and AR to the self were associated with faster and more direct help. Data on Ss' thoughts and feelings reinforced a normative interpretation of the results. (PsycINFO Database Record (c) 2006 APA, all rights reserved). © 1970 American Psychological Association.","Schwartz, S.H.; Clausen, G.T.",J. Pers. Soc. Psychol.,not included,19
22
- Emerging adulthood: A theory of development from the late teens through the twenties,"Emerging adulthood is proposed as a new conception of development for the period from the late teens through the twenties, with a focus on ages 18-25. A theoretical background is presented. Then evidence is provided to support the idea that emerging adulthood is a distinct period demographically, subjectively, and in terms of identity explorations. How emerging adulthood differs from adolescence and young adulthood is explained. Finally, a cultural context for the idea of emerging adulthood is outlined, and it is specified that emerging adulthood exists only in cultures that allow young people a prolonged period of independent role exploration during the late teens and twenties.","Arnett, J.J.",Am. Psychol.,not included,20
23
- Assessing actual strategic behavior to construct a measure of strategic ability,"Strategic interactions have been studied extensively in the area of judgment and decision-making. However, so far no specific measure of a decision-maker's ability to be successful in strategic interactions has been proposed and tested. Our contribution is the development of a measure of strategic ability that borrows from both game theory and psychology. Such measure is aimed at providing an estimation of the likelihood of success in many social activities that involve strategic interaction among multiple decision-makers. To construct a reliable measure of strategic ability, that we propose to call ""Strategic Quotient"" (SQ), we designed a test where each item is a game and where, therefore, the individual obtained score depends on the distribution of choices of other decision-makers taking the test. The test is designed to provide information on the abilities related to two dimensions, mentalization and rationality, that we argue are crucial to strategic success, with each dimension being characterized by two main factors. Principal component analysis on preliminary data shows that indeed four factors (two for rationality, two for mentalization) account for strategic success in most of the strategically simpler games of the test. Moreover, two more strategically sophisticated games are inserted in the test and are used to investigate if and to what extent the four factors obtained by simpler games can predict strategic success in more sophisticated strategic interactions. Overall, the collected empirical evidence points to the possibility of building a SQ measure using only simple games designed to capture information about the four identified factors. © 2019 Bilancini, Boncinelli and Mattiassi.","Bilancini, E.; Boncinelli, L.; Mattiassi, A.",Front. Psychol.,not included,21
24
- Impact of presumed consent for organ donation on donation rates: a systematic review,"OBJECTIVES: To examine the impact of a system of presumed consent for organ donation on donation rates and to review data on attitudes towards presumed consent. DESIGN: Systematic review. DATA SOURCES: Studies retrieved by online searches to January 2008 of Medline, Medline In-Process, Embase, CINAHL, PsycINFO, HMIC, PAIS International, and OpenSIGLE. Studies reviewed Five studies comparing donation rates before and after the introduction of legislation for presumed consent (before and after studies); eight studies comparing donation rates in countries with and without presumed consent systems (between country comparisons); 13 surveys of public and professional attitudes to presumed consent. RESULTS: The five before and after studies represented three countries: all reported an increase in donation rates after the introduction of presumed consent, but there was little investigation of any other changes taking place concurrently with the change in legislation. In the four best quality between country comparisons, presumed consent law or practice was associated with increased organ donation-increases of 25-30%, 21-26%, 2.7 more donors per million population, and 6.14 more donors per million population in the four studies. Other factors found to be important in at least one study were mortality from road traffic accidents and cerebrovascular causes, transplant capacity, gross domestic product per capita, health expenditure per capita, religion (Catholicism), education, public access to information, and a common law legal system. Eight surveys of attitudes to presumed consent were of the UK public. These surveys varied in the level of support for presumed consent, with surveys conducted before 2000 reporting the lowest levels of support (28-57%). The most recent survey, in 2007, reported that 64% of respondents supported a change to presumed consent. CONCLUSION: Presumed consent alone is unlikely to explain the variation in organ donation rates between countries. Legislation, availability of donors, organisation and infrastructure of the transplantation service, wealth and investment in health care, and public attitudes to and awareness of organ donation may all play a part, but their relative importance is unclear. Recent UK surveys show support for presumed consent, though with variation in results that may reflect differences in survey methods.","Rithalia, Amber; McDaid, Catriona; Suekarran, Sara; Myers, Lindsey; Sowden, Amanda",BMJ,not included,22
25
- Social learning theory,"Three forms of social learning theory relevant to child development are reviewed. The first (see Robert Sears) involved attempts to combine Freudian and stimulus-response learning theory. Explaining the internalization of parent expectations, however, was a challenge for this approach. In a second form, Albert Bandura employed learning principles of reinforcement and punishment but also argued that the primary form of learning was observation. Additionally, he emphasized the role of cognition in learning. A third form, associated with Gerald Patterson among others, focuses on behavior management of difficult children and continues to underlie many forms of intervention practiced today. © 2019 Elsevier Inc. All rights reserved.","Grusec, J.E.",The Curated Reference Collection in Neuroscience and Biobehavioral Psychology,not included,23
26
- Social dilemma cooperation (unlike Dictator Game giving) is intuitive for men as well as women,"Does intuition favor prosociality, or does prosocial behavior require deliberative self-control? The Social Heuristics Hypothesis (SHH) stipulates that intuition favors typically advantageous behavior - but which behavior is typically advantageous depends on both the individual and the context. For example, non-zero-sum cooperation (e.g. in social dilemmas like the Prisoner's Dilemma) typically pays off because of the opportunity for reciprocity. Conversely, reciprocity does not promote zero-sum cash transfers (e.g. in the Dictator Game, DG). Instead, DG giving can be long-run advantageous because of reputation concerns: social norms often require such behavior of women but not men. Thus, the SHH predicts that intuition will favor social dilemma cooperation regardless of gender, but only favor DG giving among women. Here I present meta-analytic evidence in support of this prediction. In 31 studies examining social dilemma cooperation (N=13,447), I find that promoting intuition increases cooperation to a similar extent for both men and women. This stands in contrast to the results from 22 DG studies (analyzed in Rand et al., 2016) where intuition promotes giving among women but not men. Furthermore, I show using meta-regression that the interaction between gender and intuition is significantly larger in the DG compared to the cooperation games. Thus, I find clear evidence that the role of intuition and deliberation varies across both setting and individual as predicted by the SHH.","Rand, David G",J. Exp. Soc. Psychol.,not included,24
27
- Public charity offer as a proximate factor of evolved reputation-building strategy: an experimental analysis of a real-life situation,"Although theoretical considerations suggest that a considerable portion of human altruism is driven by concerns about reputation, few experimental studies have examined the psychological correlates of individual decisions in real-life situations. Here we demonstrate that more subjects were willing to give assistance to unfamiliar people in need if they could make their charity offers in the presence of their group mates than in a situation where the offers remained concealed from others. In return, those who were willing to participate in a particular charitable activity received significantly higher scores than others on scales measuring sympathy and trustworthiness. Finally, a multiple regression analysis revealed that while several personality and behavior traits (cooperative ability, Machiavellianism, sensitivity to norms, and sex) play a role in the development of prosocial behavior, the possibility of gaining reputation within the group remains a measurable determinant of charitable behavior. © 2007 Elsevier Inc. All rights reserved.","Bereczkei, T.; Birkas, B.; Kerekes, Z.",Evol. Hum. Behav.,not included,25
28
- A comparison of two behavioral influence techniques for improving blood donor recruitment,"This study was designed to test the viability of two multiple request techniques of behavioral influence for recruiting blood donors by telephone. The first technique utilizes a small antecedent request to encourage behavioral involvement and favorable disposition toward the target activity of the critical request to donate. The second approach frames the critical request as a concession following refusal of a very large request. The two techniques, dubbed the foot‐in‐the‐door (FID) and door‐in‐the‐face (DIF), respectively, were tested against a control condition on three donor groups: active donors, inactive donors, and nondonors. Thus, a three‐by‐three factorial design was used on 910 adults in a Midwest city. Although the DIF was outperformed by the control across all three donor groups, the authors recommend its continued study in face‐to‐face donor solicitation. Importantly, the FID approach produced more donations than the control condition among active donors (Z = 4.30; p < .001), inactives (Z = 7.45; p < .001), and nondonors (Z = 1.98; p < .05). For managing the blood supply, the FID is particularly potent for rekindling donations from inactive donors. Additional research on means of penetrating the nondonor segment is recommended. 1984 AABB","Dwyer, F.R.; Greenwalt, T.J.; Coe, N.A.",Transfusion,not included,26
29
- Adult‐related haematopoietic stem cell donor experiences and the provision of information and psychosocial support: A systematic literature review,"For blood cancer patients, haematopoietic stem cells (HSC) donated by a relative can be lifesaving. However, related donors can face significant physical and psychosocial challenges. As the demand for adult‐related HSC donors is increasing, it is important to review our understanding of adult‐related HSC donors’ need for and availability of information and psychosocial support with a view to identifying gaps in the literature. A systematic review of relevant studies (2000–2017) was conducted using five databases with supplementary hand searching. Sixteen studies involving 1,024 related HSC donors met the following criteria: English or Dutch language, peer‐reviewed, sampled first‐time‐related HSC donors, ≥ 18 years, haematological malignancies, assessed psychosocial aspects, retrospective or prospective and with or without comparison group. Data were abstracted, and study quality was assessed using the PRISMA criteria. Studies contained limited information on the provision of information and psychosocial support. Most studies addressed pre‐donation information, and none reported providing information or support to donors post‐donation. Additionally, few studies formally assessed unmet needs. Recommendations include improved transparency of reporting for the availability, sources and timing of information and psychosocial support, and the identification of unmet needs to enable the development of educational and psychosocial interventions for this invaluable donor population.patients, haematopoietic stem cells (HSC) donated by a relative can be lifesaving. However, related donors can face significant physical and psychosocial challenges. As the demand for adult‐related HSC donors is increasing, it is important to review our understanding of adult‐related HSC donors’ need for and availability of information and psychosocial support with a view to identifying gaps in the literature. A systematic review of relevant studies (2000 (PsycINFO Database Record (c) 2019 APA, all rights reserved)","Zomerdijk, Nienke; Turner, Jane M; Hill, Geoffrey R",Eur. J. Cancer Care,not included,27
30
- Scaling up the 2010 World Health Organization HIV treatment guidelines in resource-limited settings: a model-based analysis,,"Walensky, R P; Wood, R; Ciaranello, A L; Paltiel, A D; Lorenzana, S B; Anglaret, X; Stoler, A W; Freedberg, K A; Cost Effectiveness of AIDS Complications International Investigators",,not included,28
31
- """Paper or plastic?"": How we pay influences post-transaction connection",,"Shah, A.M.; Eisenkraft, N.; Bettman, J.R.; Chartrand, T.L.",Journal of Consumer Research,not included,29
32
- Meta-analysis for public management & policy,,"Ringquist, E.",Meta-Analysis for Public Management and Policy,not included,30
33
- Effects of sexual dimorphism on facial attractiveness,"Testosterone-dependent secondary sexual characteristics in males may signal immunological competence and are sexually selected for in several species. In humans, oestrogen-dependent characteristics of the female body correlate with health and reproductive fitness and are found attractive. Enhancing the sexual dimorphism of human faces should raise attractiveness by enhancing sex-hormone-related cues to youth and fertility in females, and to dominance and immunocompetence in males. Here we report the results of asking subjects to choose the most attractive faces from continua that enhanced or diminished differences between the average shape of female and male faces. As predicted, subjects preferred feminized to average shapes of a female face. This preference applied across UK and Japanese populations but was stronger for within-population judgements, which indicates that attractiveness cues are learned. Subjects preferred feminized to average or masculinized shapes of a male face. Enhancing masculine facial characteristics increased both perceived dominance and negative attributions (for example, coldness or dishonesty) relevant to relationships and paternal investment. These results indicate a selection pressure that limits sexual dimorphism and encourages neoteny in humans.","Perrett, D.I.; Lee, K.J.; Penton-Voak, I.; Rowland, D.; Yoshikawa, S.; Burt, D.M.; Henzi, S.P.; Castles, D.L.; Akamatsu, S.",Nature,not included,31
34
- "The cost-effectiveness of introducing nucleic acid testing to test for hepatitis B, hepatitis C, and human immunodeficiency virus among blood donors in Sweden",,"Davidson, T; Ekermo, B; Gaines, H; Lesko, B; Akerlind, B",,not included,32
35
- Does government funding suppress nonprofits' political activity?,"Autonomy from the state has been considered a core feature of American civil society, and understanding the consequences of perceived threats to that autonomy has been a central theme in social and political theory. We engage this theme by examining a specific question: What is the effect of government funding on nonprofit organizations' political activity? Extant theory and research identify some mechanisms by which government funding might reduce nonprofit political activity and other mechanisms by which government funding might enhance such activity. We investigate this relationship with two data sets: a national sample of religious congregations and a longitudinal sample of nonprofit organizations in Minneapolis-St. Paul. Results across these data sets are consistent and compelling: The relationship between government funding and nonprofit political activity is either positive or null; government funding does not suppress nonprofit political activity.","Chaves, M.; Stephens, L.; Galaskiewicz, J.",Am. Sociol. Rev.,not included,33
36
- Governing the Hollow State,"For the past ten years the authors have conducted a concentrated research program on the dimensions and impact of the hollow state. The hollow state is a metaphor for the increasing use of third parties, often nonprofits, to deliver social services and generally act in the name of the state. The types of structures, incentives, and mechanisms used to control third-party providers have been the focus of this research. The empirical thrust of this research is on how effective various types of mechanisms, structures, and incentives are at promoting the effectiveness of contracted services. The normative question this research has raised, but not answered, is, What effect does government contracting with third-party providers have on the perceived legitimacy of the state? This article is a summary of the theoretical development and the empirical findings from the authors' research on the dimensions and impact of the hollow state in the domain of health and human services contracting. Elements of this article have appeared previously in this journal and in many others as well. The article's purpose is to integrate the authors' research on the hollow state. This is a summative article that seeks to bring together in one place what the authors have learned. In addition, new directions are explored for future research on the hollow state.","Milward, H.B.; Provan, K.G.",J. Public Adm. Res. Theory,not included,34
37
- The Role of Food Banks in Addressing Food Insecurity: A Systematic Review,"Food banks play a major role in the food aid sector by distributing donated and purchased groceries directly to food insecure families. The public health implications of food insecurity are significant, particularly as food insecurity has a higher prevalence among certain population groups. This review consolidates current knowledge about the function and efficacy of food banks to address food insecurity. A systematic review was conducted. Thirty-five publications were reviewed, of which 14 examined food security status, 13 analysed nutritional quality of food provided, and 24 considered clients' needs in relation to food bank use. This review found that while food banks have an important role to play in providing immediate solutions to severe food deprivation, they are limited in their capacity to improve overall food security outcomes due to the limited provision of nutrient-dense foods in insufficient amounts, especially from dairy, vegetables and fruits. Food banks have the potential to improve food security outcomes when operational resources are adequate, provisions of perishable food groups are available, and client needs are identified and addressed.","Bazerghi, Chantelle; McKay, Fiona H; Dunn, Matthew",J. Community Health,not included,35
38
- Thinking about fit and donation format in cause marketing: The effects of need for cognition,,"Kerr, A.; Das, N.",Journal of Marketing Theory and Practice,not included,36
39
- The 'I' of the beholder: How gender differences and self-referencing influence charity advertising,,"Chang, C.-T.; Lee, Y.-K.",International Journal of Advertising,not included,37
40
- Operating characteristics of a rank correlation test for publication bias,"An adjusted rank correlation test is proposed as a technique for identifying publication bias in a meta-analysis, and its operating characteristics are evaluated via simulations. The test statistic is a direct statistical analogue of the popular 'funnel-graph.' The number of component studies in the meta-analysis, the nature of the selection mechanism, the range of variances of the effect size estimates, and the true underlying effect size are all observed to be influential in determining the power of the test. The test is fairly powerful for large meta-analyses with 75 component studies, but has only moderate power for meta-analyses with 25 component studies. However, in many of the configurations in which there is low power, there is also relatively little bias in the summary effect size estimate. Nonetheless, the test must be interpreted with caution in small meta-analyses. In particular, bias cannot be ruled out if the test is not significant. The proposed technique has potential utility as an exploratory tool for meta-analysts, as a formal procedure to complement the funnel- graph.","Begg, C.B.; Mazumdar, M.",BIOMETRICS,not included,38
41
- When will price increases associated with company donations to charity be perceived as fair?,,"Koschate-Fischer, N.; Huber (née Stefan), I.V.; Hoyer, W.D.",Journal of the Academy of Marketing Science,not included,39
42
- The Effects of Monetary Incentives and Labeling on the Foot-in-the-Door Effect: Evidence for a Self-Perception Process,"We tested the self-perception explanation of the foot-in-the-door effect by manipulating self-perceived helpfulness and assessing self-concept. Participants given $1 to sign a homelessness petition were less likely to see themselves as altruistic than participants not given the monetary incentive. The paid participants also complied less often with a request to work on a canned food drive 2 days later than unpaid participants. In contrast, participants told they were helpful individuals were more likely to see themselves as altruistic and were more likely to volunteer for the food drive than unlabeled participants. Mediation analyses provide evidence that changes in self-concept underlie a successful foot-in-the-door manipulation and support the self-perception explanation for the foot-in-the-door effect.","Burger, Jerry M; Caldwell, David F",Basic Appl. Soc. Psych.,not included,40
43
- A comparison of clinical officers with medical doctors on outcomes of caesarean section in the developing world: meta-analysis of controlled studies,"The authors tentatively concluded that there was no statistically significant difference in maternal or perinatal mortality in caesarean sections carried out by clinical officers compared with doctors, but wound dehiscence and wound infection were significantly more frequent in caesarean sections carried out by clinical officers. XCM: The review question was clear and supported by potentially reproducible inclusion criteria. The search strategy appeared to include a number of relevant sources and was not restricted by language, which reduced the possibility of language bias. It did not appear that specific searches were undertaken for unpublished studies, so some potentially relevant data may have been missed. Study selection was conducted in duplicate, but it was unclear whether similar methods to reduce error and bias were used for quality assessment and data extraction.Study quality was assessed using an appropriate tool and results were reported. Adequate details of primary studies were provided. Combining the results in meta-analyses may not have been appropriate given the variability of the studies and the statistical (and clinical) heterogeneity in the some of the meta-analyses.The authors' conclusions reflect the evidence presented, but given the variability between (and methodological shortcomings within) the included studies, together with poor reporting of the review process, their reliability is uncertain. XIM: Practice: The authors stated that there may be a particular training need for clinical officers in light of the increase in wound infection and dehiscence compared with doctors.Research: The authors did not state any implications for further research.","Wilson, A; Lissauer, D; Thangaratinam, S; Khan, K S; MacArthur, C; Coomarasamy, A",,not included,41
44
- A systematic review of episodic volunteering in public health and other contexts,"BACKGROUND: Episodic volunteers are a critical resource for public health non-profit activities but are poorly understood. A systematic review was conducted to describe the empirical evidence about episodic volunteering (EV) in the public health sector and more broadly. Study location, focus and temporal trends of EV research were also examined. METHODS: Twelve key bibliographic databases (1990-April week 2, 2014) were searched, including Google Scholar. Empirical studies published in English in peer-reviewed journals that identified participants as EVs who volunteered to support Not-for-Profit organisations in the health and social welfare sectors were included. EV definitions, characteristics, economic costs, antecedents and outcomes and theoretical approaches were examined. RESULTS: 41 articles met initial review criteria and 20 were specific to the health or social welfare sectors. EV definitions were based on one or more of three dimensions of duration, frequency, and task. EVs were predominantly female, middle aged, Caucasian (North American) and college/university educated. Fundraising was the most common EV activity and 72% had volunteered at least once. No studies examined the economic costs of EV. There was little consistency in EV antecedents and outcomes, except motives which primarily related to helping others, forming social connections, and self-psychological or physical enhancement. Most studies were atheoretical. Three authors proposed new theoretical frameworks. CONCLUSIONS: Research is required to underpin the development of an agreed consensus definition of EV. Moreover, an EV evidence-base including salient theories and measures is needed to develop EV engagement and retention strategies for the health and social welfare sectors.","Hyde, Melissa K; Dunn, Jeff; Scuffham, Paul A; Chambers, Suzanne K",BMC Public Health,not included,42
45
- Imagine being a nice guy: A note on hypothetical vs. Incentivized social preferences,"We conducted an experimental study on social preferences using dictator games similar to Fehr et al. (2008). Our results show that social preferences differ between subjects who receive low-stakes monetary rewards for their decisions and subjects who consider hypothetical stakes. Our findings indicate that, apart from incentives, gender plays an important role for the categorization of different social preferences. © 2015. The authors license.","Bühren, C.; Kundt, T.C.",Judgm. Decis. Mak.,not included,43
46
- Environmental certification programs: How does information provision compare with taxation?,"This paper develops a monopolistic competition framework to assess whether environmental certification programs can serve as effective substitutes for more traditional policy instruments such as environmental taxation or a minimum quality standard (MQS). I show that if firms can organize themselves and choose the certification standard collectively, then there is a beneficial role for a regulator to intervene. Also, the degree of substitution between differentiated goods that impose environmental damage and a “clean” outside good, the degree of competition in the industry and the extent of environmental damage caused by minimal quality goods are important considerations in the choice between a certification program and a tax or a MQS. While the comparison between a certification program and a tax depends on numerous factors, I find unequivocally that certification is a poor substitute for taxation whenever the outside good is a close substitute for differentiated goods, there is a high degree of competition in the industry or if minimal quality goods impose considerable environmental damage. © 2020 Wiley Periodicals LLC","Podhorsky, A.",J. Public Econ. Theory,not included,44
47
- A website to host educational modules on global engineering ethics and conduct research in cross-cultural moral psychology: A work in progress,"To ensure more long-term ethical behaviors within engineering, a website is being developed to host educational modules on global engineering ethics and conduct research on cross-cultural moral psychology. The modules are all-inclusive, with a cross-cultural and international focus, requiring less preparation on the part of instructors and are easier for different types of students to use than existing online resources. Education and research using the site can occur at the same time, each strengthening the other in the process. Rather than simply ethical understanding or the ability to reason ethically, research on moral psychology can ensure more ethical behaviors, better understanding what people know and think about ethics and the causes of (un)ethical behaviors. This research is cross-cultural, since culture has been shown to affect behaviors and thoughts related to ethics, and the educational and working environments of engineering are more cross-cultural and international than ever before. © American Society for Engineering Education, 2019","Clancy, R.F., III; Manuel, C.",ASEE Annu. Conf. Expos. Conf. Proc.,not included,45
48
- Influence of various models on aggressive behavior in individuals with different socialization experience,,"Toeplitz-Winiewska, M.",Polish Psychological Bulletin,not included,46
49
- Consumer reaction to price increase: An investigation in gasoline industry,"Purpose – The aim of this study is to investigate the impact of increase in price of an essential product (i.e. gasoline) toward the focal product and other seemingly non-related products. Design/methodology/approach – A self-administered survey was used to collect data from the drivers at a large metroplex in Southwest USA. Multiple regression and scanning electron microscope procedures were used to analyze and test the proposed hypotheses. Findings – When consumers notice the increase in gas prices, they become very anxious. This anxiety is positively associated with average gas bought in gallons and negatively associated with threshold price. Further, this consumer anxiety has the strongest influence on lifestyle changes, followed by automobile technology change and transportation mode change, and has the weakest influence on gasoline brand/type change. Research limitations/implications – We focus on only anxiety as a mediator between increase in gas prices and the behavioral outcomes, and collect data from only one location. Practical implications – Managers must be cognizant that a price increase in essential goods not only influences the demand for focal products but also for products that may not seem related to the focal products. Social implications – Increase in gasoline price will not only affect the demand for gasoline, but also the demand for alternate forms of transportation, fuel efficient vehicles, and other aspects of life. Originality/value – This study is the first to look at the role of anxiety as a mediator and looks at the effects of increase in gas prices in a holistic manner. © Emerald Group Publishing Limited.","Paswan, A.K.; Crawford, J.C.; Ngamsiriudom, W.; Nguyen, T.",J. Prod. Brand Manage.,not included,47
50
- Internally Reporting Risk in Financial Services: An Empirical Analysis,"The enduring failure of financial institutions to identify and deal with risk events continues to have serious repercussions, whether in the form of small but significant losses or major and potentially far-reaching scandals. Using a mixed-methods approach that combines an innovative version of the classic dictator game to inform prosocial tendencies with the survey-based Theory of Planned Behaviour, we examine the risk-escalation behaviour of individuals within a large financial institution. We discover evidence of purely selfish behaviour that explains the lack significance in pressure to adhere to the Subjective Norms of colleagues around intention to report risks. A finding that has potentially important implications for efforts to instil a high-error management climate and incentivise risk reporting within organisations where risk, if ignored or unchecked, could ultimately have consequences that extend far beyond the institutions themselves.","Bryce, Cormac; Chmura, Thorsten; Webb, Rob; Stiebale, Joel; Cheevers, Carly",J. Bus. Ethics,not included,48
51
- ,,,"Tax Reform for Fairness, Simplicity, and Economic Growth",not included,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/tai_safety_research/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "tai_safety_research", "description": "", "data_columns": ["Title", "Abstract Note", "Url", "Publication Year", "Item Type", "Author", "Publication Title", "ID"], "label_columns": {"Label": ["TAI safety research", "not TAI safety research"]}}
 
 
data/tai_safety_research/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/tai_safety_research/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Title,Abstract Note,Url,Publication Year,Item Type,Author,Publication Title,Label,ID
2
- Malign generalization without internal search,"In my last post, I challenged the idea that inner alignment failures should be explained by appealing to agents which perform explicit internal search. By doing so, I argued that we should instead appeal to the more general concept of malign generalization, and treat mesa-misalignment as a special case. Unfortunately, the post was light on examples of what we should be worrying about instead of mesa-misalignment. Evan Hubinger wrote, Personally, I think there is a meaningful sense in which all the models I'm most worried about do some sort of search internally (at least to the same extent that humans do search internally), but I'm definitely uncertain about that.Wei Dai expressed confusion why I would want to retreat to malign generalization without some sort of concrete failure mode in mind, Can you give some realistic examples/scenarios of “malign generalization” that does not involve mesa optimization? I’m not sure what kind of thing you’re actually worried about here.In this post, I will outline a general category of agents which may exhibit malign generalization without internal search, and then will provide a concrete example of an agent in the category. Then I will argue that, rather than being a very narrow counterexample, this class of agents could be competitive with search-based agents. THE SWITCH CASE AGENT Consider an agent governed by the following general behavior, LOOP:State = GetStateOfWorld(Observation)IF State == 1:PerformActionSequence1() IF State == 2:PerformActionSequence2()...END_LOOP It's clear that this agent does not perform any internal search for strategies: it doesn't operate by choosing actions which rank highly according to some sort of internal objective function. While you could potentially rationalize its behavior according to some observed-utility function, this would generally lead to more confusion than clarity. However, this agent could still be malign in the following way. Suppose the agent is 'mistaken' about the s",https://www.alignmentforum.org/posts/ynt9TD6PrYw6iT49m/malign-generalization-without-internal-search,2020,blogPost,"Barnett, Matthew",AI Alignment Forum,TAI safety research,0
3
- Utility Indifference,"Consider an AI that follows its own motivations. We’re not entirely sure what its motivations are, but we would prefer that the AI cooperate with humanity; or, failing that, that we can destroy it before it defects. We’ll have someone sitting in a room, their finger on a detonator, ready at the slightest hint of defection. Unfortunately as has been noted ([3], [1]), this does not preclude the AI from misbehaving. It just means that the AI must act to take control of the explosives, the detonators or the human who will press the button. For a superlatively intelligence AI, this would represent merely a slight extra difficulty. But now imagine that the AI was somehow indifferent to the explosives going off or not (but that nothing else was changed). Then if ever the AI does decide to defect, it will most likely do so without taking control of the explosives, as that would be easier than otherwise. By “easier ” we mean that the chances of failure are less, since the plan is simpler – recall that under these assumptions, the AI counts getting blown up as an equal value to successfully defecting.",,2010,report,"Armstrong, Stuart",,TAI safety research,1
4
- Improving Sample Efficiency in Model-Free Reinforcement Learning from Images,"Training an agent to solve control tasks directly from high-dimensional images with model-free reinforcement learning (RL) has proven difficult. A promising approach is to learn a latent representation together with the control policy. However, fitting a high-capacity encoder using a scarce reward signal is sample inefficient and leads to poor performance. Prior work has shown that auxiliary losses, such as image reconstruction, can aid efficient representation learning. However, incorporating reconstruction loss into an off-policy learning algorithm often leads to training instability. We explore the underlying reasons and identify variational autoencoders, used by previous investigations, as the cause of the divergence. Following these findings, we propose effective techniques to improve training stability. This results in a simple approach capable of matching state-of-the-art model-free and model-based algorithms on MuJoCo control tasks. Furthermore, our approach demonstrates robustness to observational noise, surpassing existing approaches in this setting. Code, results, and videos are anonymously available at https://sites.google.com/view/sac-ae/home.",http://arxiv.org/abs/1910.01741,2020,manuscript,"Yarats, Denis; Zhang, Amy; Kostrikov, Ilya; Amos, Brandon; Pineau, Joelle; Fergus, Rob",,not TAI safety research,2
5
- Teaching A.I. Systems to Behave Themselves (Published 2017),"As philosophers and pundits worry that artificial intelligence will one day harm the world, some researchers are working on ways to lower the risks.",https://www.nytimes.com/2017/08/13/technology/artificial-intelligence-safety-training.html,2017,newspaperArticle,"Metz, Cade",The New York Times,not TAI safety research,3
6
- Incentives in Teams,,https://www.jstor.org/stable/1914085?origin=crossref,1973,journalArticle,"Groves, Theodore",Econometrica,not TAI safety research,4
7
- A bargaining-theoretic approach to moral uncertainty,"This paper explores a new approach to the problem of decision under relevant moral uncertainty. We treat the case of an agent making decisions in the face of moral uncertainty on the model of bargaining theory, as if the decision-making process were one of bargaining among different internal parts of the agent, with different parts committed to different moral theories. The resulting approach contrasts interestingly with the extant “maximise expected choiceworthiness” and “my favourite theory” approaches, in several key respects. In particular, it seems somewhat less prone than the MEC approach to ‘fanaticism’: allowing decisions to be dictated by a theory in which the agent has extremely low credence, if the relative stakes are high enough. Overall, however, we tentatively conclude that the MEC approach is superior to a bargaining-theoretic approach.",,2019,report,"Greaves, Hilary; Cotton-Barratt, Owen",,not TAI safety research,5
8
- The Timing of Evolutionary Transitions Suggests Intelligent Life Is Rare,"It is unknown how abundant extraterrestrial life is, or whether such life might be complex or intelligent. On Earth, the emergence of complex intelligent life required a preceding series of evolutionary transitions such as abiogenesis, eukaryogenesis, and the evolution of sexual reproduction, multicellularity, and intelligence itself. Some of these transitions could have been extraordinarily improbable, even in conducive environments. The emergence of intelligent life late in Earth's lifetime is thought to be evidence for a handful of rare evolutionary transitions, but the timing of other evolutionary transitions in the fossil record is yet to be analyzed in a similar framework. Using a simplified Bayesian model that combines uninformative priors and the timing of evolutionary transitions, we demonstrate that expected evolutionary transition times likely exceed the lifetime of Earth, perhaps by many orders of magnitude. Our results corroborate the original argument suggested by Brandon Carter that intelligent life in the Universe is exceptionally rare, assuming that intelligent life elsewhere requires analogous evolutionary transitions. Arriving at the opposite conclusion would require exceptionally conservative priors, evidence for much earlier transitions, multiple instances of transitions, or an alternative model that can explain why evolutionary transitions took hundreds of millions of years without appealing to rare chance events. Although the model is simple, it provides an initial basis for evaluating how varying biological assumptions and fossil record data impact the probability of evolving intelligent life, and also provides a number of testable predictions, such as that some biological paradoxes will remain unresolved and that planets orbiting M dwarf stars are uninhabitable.",https://www.liebertpub.com/doi/full/10.1089/ast.2019.2149,2020,journalArticle,"Snyder-Beattie, Andrew E.; Sandberg, Anders; Drexler, K. Eric; Bonsall, Michael B.",Astrobiology,not TAI safety research,6
9
- Changing Identity: Retiring from Unemployment,,https://academic.oup.com/ej/article/124/575/149-166/5076984,2014,journalArticle,"Hetschko, Clemens; Knabe, Andreas; Schöb, Ronnie",The Economic Journal,not TAI safety research,7
10
- Model-Based Reinforcement Learning via Meta-Policy Optimization,"Model-based reinforcement learning approaches carry the promise of being data efficient. However, due to challenges in learning dynamics models that sufficiently match the real-world dynamics, they struggle to achieve the same asymptotic performance as model-free methods. We propose Model-Based Meta-Policy-Optimization (MB-MPO), an approach that foregoes the strong reliance on accurate learned dynamics models. Using an ensemble of learned dynamic models, MB-MPO meta-learns a policy that can quickly adapt to any model in the ensemble with one policy gradient step. This steers the meta-policy towards internalizing consistent dynamics predictions among the ensemble while shifting the burden of behaving optimally w.r.t. the model discrepancies towards the adaptation step. Our experiments show that MB-MPO is more robust to model imperfections than previous model-based approaches. Finally, we demonstrate that our approach is able to match the asymptotic performance of model-free methods while requiring significantly less experience.",http://arxiv.org/abs/1809.05214,2018,manuscript,"Clavera, Ignasi; Rothfuss, Jonas; Schulman, John; Fujita, Yasuhiro; Asfour, Tamim; Abbeel, Pieter",,not TAI safety research,8
11
- Advancing rational analysis to the algorithmic level,"Abstract The commentaries raised questions about normativity, human rationality, cognitive architectures, cognitive constraints, and the scope or resource rational analysis (RRA). We respond to these questions and clarify that RRA is a methodological advance that extends the scope of rational modeling to understanding cognitive processes, why they differ between people, why they change over time, and how they could be improved.",https://www.cambridge.org/core/product/identifier/S0140525X19002012/type/journal_article,2020,journalArticle,"Lieder, Falk; Griffiths, Thomas L.",Behavioral and Brain Sciences,not TAI safety research,9
12
- Confronting future catastrophic threats to humanity,,https://linkinghub.elsevier.com/retrieve/pii/S0016328715001135,2015,journalArticle,"Baum, Seth D.; Tonn, Bruce E.",Futures,TAI safety research,10
13
- Latent Variables and Model Mis-Specification,"Posted as part of the AI Alignment Forum sequence on Value Learning. Rohin's note: So far, we’ve seen that ambitious value learning needs to understand human biases, and that we can't simply learn the biases in tandem with the reward. Perhaps we could hardcode a specific model of human biases? Such a model is likely to be incomplete and inaccurate, but it will perform better than assuming an optimal human, and as we notice failure modes we can improve the model. In the language of this post by Jacob Steinhardt (original here), we are using a mis-specified human model. The post talks about why model mis-specification is worse than it may seem at first glance. This post is fairly technical and may not be accessible if you don’t have a background in machine learning. If so, you can skip this post and still understand the rest of the posts in the sequence. However, if you want to do ML-related safety research, I strongly recommend putting in the effort to understand the problems that can arise with mis-specification. -------------------------------------------------------------------------------- Machine learning is very good at optimizing predictions to match an observed signal — for instance, given a dataset of input images and labels of the images (e.g. dog, cat, etc.), machine learning is very good at correctly predicting the label of a new image. However, performance can quickly break down as soon as we care about criteria other than predicting observables. There are several cases where we might care about such criteria: * In scientific investigations, we often care less about predicting a specific observable phenomenon, and more about what that phenomenon implies about an underlying scientific theory. * In economic analysis, we are most interested in what policies will lead to desirable outcomes. This requires predicting what would counterfactually happen if we were to enact the policy, which we (usually) don’t have any data about. * In ma",https://www.alignmentforum.org/posts/gnvrixhDfG7S2TpNL/latent-variables-and-model-mis-specification,2018,blogPost,"Steinhardt, Jacob",AI Alignment Forum,TAI safety research,11
14
- Economics of the singularity,,http://ieeexplore.ieee.org/document/4531461/,2008,journalArticle,"Hanson, Robin",IEEE Spectrum,TAI safety research,12
15
- Penalizing side effects using stepwise relative reachability,"How can we design safe reinforcement learning agents that avoid unnecessary disruptions to their environment? We show that current approaches to penalizing side effects can introduce bad incentives, e.g. to prevent any irreversible changes in the environment, including the actions of other agents. To isolate the source of such undesirable incentives, we break down side effects penalties into two components: a baseline state and a measure of deviation from this baseline state. We argue that some of these incentives arise from the choice of baseline, and others arise from the choice of deviation measure. We introduce a new variant of the stepwise inaction baseline and a new deviation measure based on relative reachability of states. The combination of these design choices avoids the given undesirable incentives, while simpler baselines and the unreachability measure fail. We demonstrate this empirically by comparing different combinations of baseline and deviation measure choices on a set of gridworld experiments designed to illustrate possible bad incentives.",http://arxiv.org/abs/1806.01186,2019,conferencePaper,"Krakovna, Victoria; Orseau, Laurent; Kumar, Ramana; Martic, Miljan; Legg, Shane",Proceedings of the Workshop on Artificial Intelligence Safety 2019,TAI safety research,13
16
- “Explaining” machine learning reveals policy challenges,,https://www.sciencemag.org/lookup/doi/10.1126/science.aba9647,2020,journalArticle,"Coyle, Diane; Weller, Adrian",Science,TAI safety research,14
17
- How unlikely is a doomsday catastrophe?,"Numerous Earth-destroying doomsday scenarios have recently been analyzed, including breakdown of a metastable vacuum state and planetary destruction triggered by a ""strangelet'' or microscopic black hole. We point out that many previous bounds on their frequency give a false sense of security: one cannot infer that such events are rare from the the fact that Earth has survived for so long, because observers are by definition in places lucky enough to have avoided destruction. We derive a new upper bound of one per 10^9 years (99.9% c.l.) on the exogenous terminal catastrophe rate that is free of such selection bias, using planetary age distributions and the relatively late formation time of Earth.",https://arxiv.org/abs/astro-ph/0512204v2,2005,manuscript,"Tegmark, Max; Bostrom, Nick",,TAI safety research,15
18
- A new model and dataset for long-range memory,"This blog introduces a new long-range memory model, the Compressive Transformer, alongside a new benchmark for book-level language modelling, PG19. We provide the conceptual tools needed to understand this new research in the context of recent developments in memory models and language modelling.",deepmind.com/blog/article/A_new_model_and_dataset_for_long-range_memory,2020,blogPost,"Rae, Jack; Lillicrap, Timothy",Deepmind,not TAI safety research,16
19
- Safe Imitation Learning via Fast Bayesian Reward Inference from Preferences,"Bayesian reward learning from demonstrations enables rigorous safety and uncertainty analysis when performing imitation learning. However, Bayesian reward learning methods are typically computationally intractable for complex control problems. We propose Bayesian Reward Extrapolation (Bayesian REX), a highly efficient Bayesian reward learning algorithm that scales to high-dimensional imitation learning problems by pre-training a low-dimensional feature encoding via self-supervised tasks and then leveraging preferences over demonstrations to perform fast Bayesian inference. Bayesian REX can learn to play Atari games from demonstrations, without access to the game score and can generate 100,000 samples from the posterior over reward functions in only 5 minutes on a personal laptop. Bayesian REX also results in imitation learning performance that is competitive with or better than stateof-the-art methods that only learn point estimates of the reward function. Finally, Bayesian REX enables efficient high-confidence policy evaluation without having access to samples of the reward function. These high-confidence performance bounds can be used to rank the performance and risk of a variety of evaluation policies and provide a way to detect reward hacking behaviors.",http://arxiv.org/abs/2002.09089,2020,conferencePaper,"Brown, Daniel S.; Coleman, Russell; Srinivasan, Ravi; Niekum, Scott","arXiv:2002.09089 [cs, stat]",TAI safety research,17
20
- Specification gaming: the flip side of AI ingenuity,"Specification gaming is a behaviour that satisfies the literal specification of an objective without achieving the intended outcome. We have all had experiences with specification gaming, even if not by this name. Readers may have heard the myth of King Midas and the golden touch, in which the king asks that anything he touches be turned to gold - but soon finds that even food and drink turn to metal in his hands. In the real world, when rewarded for doing well on a homework assignment, a student might copy another student to get the right answers, rather than learning the material - and thus exploit a loophole in the task specification.",deepmind.com/blog/article/Specification-gaming-the-flip-side-of-AI-ingenuity,2020,blogPost,"Krakovna, Victoria; Uesato, Jonathan; Mikulik, Vladimir; Rahtz, Matthew; Everitt, Tom; Kumar, Ramana; Kenton, Zachary; Leike, Jan; Legg, Shane",Deepmind,TAI safety research,18
21
- Vingean Reflection: Reliable Reasoning for Self-Improving Agents,"Today, human-level machine intelligence is in the domain of futurism, but there is every reason to expect that it will be developed eventually. Once artificial agents become able to improve themselves further, they may far surpass human intelligence, making it vitally important to ensure that the result of an “intelligence explosion” is aligned with human interests. In this paper, we discuss one aspect of this challenge: ensuring that the initial agent’s reasoning about its future versions is reliable, even if these future versions are far more intelligent than the current reasoner. We refer to reasoning of this sort as Vingean reflection.",https://intelligence.org/files/VingeanReflection.pdf,2015,report,"Fallenstein, Benja; Soares, Nate",,TAI safety research,19
22
- Directed Policy Gradient for Safe Reinforcement Learning with Human Advice,"Many currently deployed Reinforcement Learning agents work in an environment shared with humans, be them co-workers, users or clients. It is desirable that these agents adjust to people's preferences, learn faster thanks to their help, and act safely around them. We argue that most current approaches that learn from human feedback are unsafe: rewarding or punishing the agent a-posteriori cannot immediately prevent it from wrong-doing. In this paper, we extend Policy Gradient to make it robust to external directives, that would otherwise break the fundamentally on-policy nature of Policy Gradient. Our technique, Directed Policy Gradient (DPG), allows a teacher or backup policy to override the agent before it acts undesirably, while allowing the agent to leverage human advice or directives to learn faster. Our experiments demonstrate that DPG makes the agent learn much faster than reward-based approaches, while requiring an order of magnitude less advice.",http://arxiv.org/abs/1808.04096,2018,manuscript,"Plisnier, Hélène; Steckelmacher, Denis; Brys, Tim; Roijers, Diederik M.; Nowé, Ann",,TAI safety research,20
23
- Cognitive prostheses for goal achievement,"Procrastination takes a considerable toll on people’s lives, the economy and society at large. Procrastination is often a consequence of people’s propensity to prioritize their immediate experiences over the long-term consequences of their actions. This suggests that aligning immediate rewards with long-term values could be a promising way to help people make more future-minded decisions and overcome procrastination. Here we develop an approach to decision support that leverages artificial intelligence and game elements to restructure challenging sequential decision problems in such a way that it becomes easier for people to take the right course of action. A series of four increasingly realistic experiments suggests that this approach can enable people to make better decisions faster, procrastinate less, complete their work on time and waste less time on unimportant tasks. These findings suggest that our method is a promising step towards developing cognitive prostheses that help people achieve their goals.",https://www.nature.com/articles/s41562-019-0672-9,2019,journalArticle,"Lieder, Falk; Chen, Owen X.; Krueger, Paul M.; Griffiths, Thomas L.",Nature Human Behaviour,not TAI safety research,21
24
- Forecasting Transformative AI: An Expert Survey,"Transformative AI technologies have the potential to reshape critical aspects of society in the near future. However, in order to properly prepare policy initiatives for the arrival of such technologies accurate forecasts and timelines are necessary. A survey was administered to attendees of three AI conferences during the summer of 2018 (ICML, IJCAI and the HLAI conference). The survey included questions for estimating AI capabilities over the next decade, questions for forecasting five scenarios of transformative AI and questions concerning the impact of computational resources in AI research. Respondents indicated a median of 21.5% of human tasks (i.e., all tasks that humans are currently paid to do) can be feasibly automated now, and that this figure would rise to 40% in 5 years and 60% in 10 years. Median forecasts indicated a 50% probability of AI systems being capable of automating 90% of current human tasks in 25 years and 99% of current human tasks in 50 years. The conference of attendance was found to have a statistically significant impact on all forecasts, with attendees of HLAI providing more optimistic timelines with less uncertainty. These findings suggest that AI experts expect major advances in AI technology to continue over the next decade to a degree that will likely have profound transformative impacts on society.",http://arxiv.org/abs/1901.08579,2019,manuscript,"Gruetzemacher, Ross; Paradice, David; Lee, Kang Bok",,TAI safety research,22
25
- Guide Me: Interacting with Deep Networks,"Interaction and collaboration between humans and intelligent machines has become increasingly important as machine learning methods move into real-world applications that involve end users. While much prior work lies at the intersection of natural language and vision, such as image captioning or image generation from text descriptions, less focus has been placed on the use of language to guide or improve the performance of a learned visual processing algorithm. In this paper, we explore methods to flexibly guide a trained convolutional neural network through user input to improve its performance during inference. We do so by inserting a layer that acts as a spatio-semantic guide into the network. This guide is trained to modify the network's activations, either directly via an energy minimization scheme or indirectly through a recurrent model that translates human language queries to interaction weights. Learning the verbal interaction is fully automatic and does not require manual text annotations. We evaluate the method on two datasets, showing that guiding a pre-trained network can improve performance, and provide extensive insights into the interaction between the guide and the CNN.",http://arxiv.org/abs/1803.11544,2018,conferencePaper,"Rupprecht, Christian; Laina, Iro; Navab, Nassir; Hager, Gregory D.; Tombari, Federico",Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR),not TAI safety research,23
26
- Thread: Circuits,What can we learn if we invest heavily in reverse engineering a single neural network?,https://distill.pub/2020/circuits,2020,journalArticle,"Cammarata, Nick; Carter, Shan; Goh, Gabriel; Olah, Chris; Petrov, Michael; Schubert, Ludwig",Distill,not TAI safety research,24
27
- Visualizing Representations: Deep Learning and Human Beings - colah's blog,,http://colah.github.io/posts/2015-01-Visualizing-Representations/,2015,blogPost,"Olah, Chris",Colah's blog,not TAI safety research,25
28
- One Decade of Universal Artificial Intelligence,"The first decade of this century has seen the nascency of the first mathematical theory of general artificial intelligence. This theory of Universal Artificial Intelligence (UAI) has made significant contributions to many theoretical, philosophical, and practical AI questions. In a series of papers culminating in book (Hutter, 2005), an exciting sound and complete mathematical model for a super intelligent agent (AIXI) has been developed and rigorously analyzed. While nowadays most AI researchers avoid discussing intelligence, the award-winning PhD thesis (Legg, 2008) provided the philosophical embedding and investigated the UAI-based universal measure of rational intelligence, which is formal, objective and non-anthropocentric. Recently, effective approximations of AIXI have been derived and experimentally investigated in JAIR paper (Veness et al. 2011). This practical breakthrough has resulted in some impressive applications, finally muting earlier critique that UAI is only a theory. For the first time, without providing any domain knowledge, the same agent is able to self-adapt to a diverse range of interactive environments. For instance, AIXI is able to learn from scratch to play TicTacToe, Pacman, Kuhn Poker, and other games by trial and error, without even providing the rules of the games. These achievements give new hope that the grand goal of Artificial General Intelligence is not elusive. This article provides an informal overview of UAI in context. It attempts to gently introduce a very theoretical, formal, and mathematical subject, and discusses philosophical and technical ingredients, traits of intelligence, some social questions, and the past and future of UAI.",http://arxiv.org/abs/1202.6153,2012,journalArticle,"Hutter, Marcus",Theoretical Foundations of Artificial General Intelligence,TAI safety research,26
29
- Should Artificial Intelligence Governance be Centralised?: Design Lessons from History,,https://dl.acm.org/doi/10.1145/3375627.3375857,2020,conferencePaper,"Cihon, Peter; Maas, Matthijs M.; Kemp, Luke","Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society",TAI safety research,27
30
- Feature Expansive Reward Learning: Rethinking Human Input,"In collaborative human-robot scenarios, when a person is not satisfied with how a robot performs a task, they can intervene to correct it. Reward learning methods enable the robot to adapt its reward function online based on such human input. However, due to the real-time nature of the input, this online adaptation requires low sample complexity algorithms which rely on simple functions of handcrafted features. In practice, pre-specifying an exhaustive set of features the person might care about is impossible; what should the robot do when the human correction cannot be explained by the features it already has access to? Recent progress in deep Inverse Reinforcement Learning (IRL) suggests that the robot could fall back on demonstrations: ask the human for demonstrations of the task, and recover a reward defined over not just the known features, but also the raw state space. Our insight is that rather than implicitly learning about the missing feature(s) from task demonstrations, the robot should instead ask for data that explicitly teaches it about what it is missing. We introduce a new type of human input, in which the person guides the robot from areas of the state space where the feature she is teaching is highly expressed to states where it is not. We propose an algorithm for learning the feature from the raw state space and integrating it into the reward function. By focusing the human input on the missing feature, our method decreases sample complexity and improves generalization of the learned reward over the above deep IRL baseline. We show this in experiments with a 7DOF robot manipulator. Finally, we discuss our method’s potential implications for deep reward learning more broadly: taking a divide-and-conquer approach that focuses on important features separately before learning from demonstrations can improve generalization in tasks where such features are easy for the human to teach.",http://arxiv.org/abs/2006.13208,2020,manuscript,"Bobu, Andreea; Wiggert, Marius; Tomlin, Claire; Dragan, Anca D.",,not TAI safety research,28
31
- Emergent Complexity via Multi-Agent Competition,"Reinforcement learning algorithms can train agents that solve problems in complex, interesting environments. Normally, the complexity of the trained agent is closely related to the complexity of the environment. This suggests that a highly capable agent requires a complex environment for training. In this paper, we point out that a competitive multi-agent environment trained with self-play can produce behaviors that are far more complex than the environment itself. We also point out that such environments come with a natural curriculum, because for any skill level, an environment full of agents of this level will have the right level of difficulty. This work introduces several competitive multi-agent environments where agents compete in a 3D world with simulated physics. The trained agents learn a wide variety of complex and interesting skills, even though the environment themselves are relatively simple. The skills include behaviors such as running, blocking, ducking, tackling, fooling opponents, kicking, and defending using both arms and legs. A highlight of the learned behaviors can be found here: https://goo.gl/eR7fbX",http://arxiv.org/abs/1710.03748,2018,conferencePaper,"Bansal, Trapit; Pachocki, Jakub; Sidor, Szymon; Sutskever, Ilya; Mordatch, Igor",arXiv:1710.03748 [cs],not TAI safety research,29
32
- Learning Agile Robotic Locomotion Skills by Imitating Animals,"Reproducing the diverse and agile locomotion skills of animals has been a longstanding challenge in robotics. While manually-designed controllers have been able to emulate many complex behaviors, building such controllers involves a time-consuming and difficult development process, often requiring substantial expertise of the nuances of each skill. Reinforcement learning provides an appealing alternative for automating the manual effort involved in the development of controllers. However, designing learning objectives that elicit the desired behaviors from an agent can also require a great deal of skill-specific expertise. In this work, we present an imitation learning system that enables legged robots to learn agile locomotion skills by imitating real-world animals. We show that by leveraging reference motion data, a single learning-based approach is able to automatically synthesize controllers for a diverse repertoire behaviors for legged robots. By incorporating sample efficient domain adaptation techniques into the training process, our system is able to learn adaptive policies in simulation that can then be quickly adapted for real-world deployment. To demonstrate the effectiveness of our system, we train an 18-DoF quadruped robot to perform a variety of agile behaviors ranging from different locomotion gaits to dynamic hops and turns.",http://arxiv.org/abs/2004.00784,2020,conferencePaper,"Peng, Xue Bin; Coumans, Erwin; Zhang, Tingnan; Lee, Tsang-Wei; Tan, Jie; Levine, Sergey",arXiv:2004.00784 [cs],not TAI safety research,30
33
- Antitrust-Compliant AI Industry Self-Regulation,"The touchstone of antitrust compliance is competition. To be legally permissible, any industrial restraint on trade must have sufficient countervailing procompetitive justifications. Usually, anticompetitive horizontal agreements like boycotts (including a refusal to produce certain products) are per se illegal.",https://cullenokeefe.com/blog/antitrust-compliant-ai-industry-self-regulation,2020,manuscript,"O’Keefe, Cullen",,TAI safety research,31
34
- Machine Learning Explainability for External Stakeholders,"As machine learning is increasingly deployed in high-stakes contexts affecting people's livelihoods, there have been growing calls to open the black box and to make machine learning algorithms more explainable. Providing useful explanations requires careful consideration of the needs of stakeholders, including end-users, regulators, and domain experts. Despite this need, little work has been done to facilitate inter-stakeholder conversation around explainable machine learning. To help address this gap, we conducted a closed-door, day-long workshop between academics, industry experts, legal scholars, and policymakers to develop a shared language around explainability and to understand the current shortcomings of and potential solutions for deploying explainable machine learning in service of transparency goals. We also asked participants to share case studies in deploying explainable machine learning at scale. In this paper, we provide a short summary of various case studies of explainable machine learning, lessons from those studies, and discuss open challenges.",https://arxiv.org/abs/2007.05408v1,2020,conferencePaper,"Bhatt, Umang; Andrus, McKane; Weller, Adrian; Xiang, Alice",,TAI safety research,32
35
- Avoiding Wireheading with Value Reinforcement Learning,"How can we design good goals for arbitrarily intelligent agents? Reinforcement learning (RL) is a natural approach. Unfortunately, RL does not work well for generally intelligent agents, as RL agents are incentivised to shortcut the reward sensor for maximum reward -- the so-called wireheading problem. In this paper we suggest an alternative to RL called value reinforcement learning (VRL). In VRL, agents use the reward signal to learn a utility function. The VRL setup allows us to remove the incentive to wirehead by placing a constraint on the agent's actions. The constraint is defined in terms of the agent's belief distributions, and does not require an explicit specification of which actions constitute wireheading.",http://arxiv.org/abs/1605.03143,2016,conferencePaper,"Everitt, Tom; Hutter, Marcus",AGI 2016: Artificial General Intelligence,TAI safety research,33
36
- Principles for the Application of Human Intelligence,"Before humans become the standard way in which we make decisions, we need to consider the risks and ensure implementation of human decision-making systems does not cause widespread harm.",https://behavioralscientist.org/principles-for-the-application-of-human-intelligence/,2019,blogPost,"Collins, Jason",Behavioral Scientist,not TAI safety research,34
37
- Backup utility functions as a fail-safe AI technique,"Many experts believe that AIs will, within the not-too-distant future, become powerful enough for their decisions to have tremendous impact. Unfortunately, setting up AI goal systems in a way that results in benevolent behavior is expected to be difficult, and we cannot be certain to get it completely right on the first attempt. We should therefore account for the possibility that the goal systems fail to implement our values the intended way. In this paper, we propose the idea of backup utility functions: Secondary utility functions that are used in case the primary ones “fail”. We also describe how this approach can be generalized to the use of multi-layered utility functions, some of which can fail without affecting the final outcome as badly as without the backup mechanism.",https://longtermrisk.org/files/backup-utility-functions.pdf,2016,manuscript,"Oesterheld, Caspar",,TAI safety research,35
38
- Predicting human decisions with behavioral theories and machine learning,"Behavioral decision theories aim to explain human behavior. Can they help predict it? An open tournament for prediction of human choices in fundamental economic decision tasks is presented. The results suggest that integration of certain behavioral theories as features in machine learning systems provides the best predictions. Surprisingly, the most useful theories for prediction build on basic properties of human and animal learning and are very different from mainstream decision theories that focus on deviations from rational choice. Moreover, we find that theoretical features should be based not only on qualitative behavioral insights (e.g. loss aversion), but also on quantitative behavioral foresights generated by functional descriptive models (e.g. Prospect Theory). Our analysis prescribes a recipe for derivation of explainable, useful predictions of human decisions.",http://arxiv.org/abs/1904.06866,2019,manuscript,"Plonsky, Ori; Apel, Reut; Ert, Eyal; Tennenholtz, Moshe; Bourgin, David; Peterson, Joshua C.; Reichman, Daniel; Griffiths, Thomas L.; Russell, Stuart J.; Carter, Evan C.; Cavanagh, James F.; Erev, Ido",,TAI safety research,36
39
- "Exchange-Traded Funds, Market Structure, and the Flash Crash",,https://www.tandfonline.com/doi/full/10.2469/faj.v68.n4.6,2012,journalArticle,"Madhavan, Ananth",Financial Analysts Journal,not TAI safety research,37
40
- A general model of safety-oriented AI development,"This may be trivial or obvious for a lot of people, but it doesn't seem like anyone has bothered to write it down (or I haven't looked hard enough). It started out as a generalization of Paul Christiano's IDA, but also covers things like safe recursive self-improvement. Start with a team of one or more humans (researchers, programmers, trainers, and/or overseers), with access to zero or more AIs (initially as assistants). The human/AI team in each round develops a new AI and adds it to the team, and repeats this until maturity in AI technology is achieved. Safety/alignment is ensured by having some set of safety/alignment properties on the team that is inductively maintained by the development process. The reason I started thinking in this direction is that Paul's approach seemed very hard to knock down, because any time a flaw or difficulty is pointed out or someone expresses skepticism on some technique that it uses or the overall safety invariant, there's always a list of other techniques or invariants that could be substituted in for that part (sometimes in my own brain as I tried to criticize some part of it). Eventually I realized this shouldn't be surprising because IDA is an instance of this more general model of safety-oriented AI development, so there are bound to be many points near it in the space of possible safety-oriented AI development practices. (Again, this may already be obvious to others including Paul, and in their minds IDA is perhaps already a cluster of possible development practices consisting of the most promising safety techniques and invariants, rather than a single point.) If this model turns out not to have been written down before, perhaps it should be assigned a name, like Iterated Safety-Invariant AI-Assisted AI Development, or something pithier?",https://www.alignmentforum.org/posts/idb5Ppp9zghcichJ5/a-general-model-of-safety-oriented-ai-development,2018,blogPost,Wei Dai,AI Alignment Forum,TAI safety research,38
41
- The Role and Limits of Principles in AI Ethics: Towards a Focus on Tensions,"The last few years have seen a proliferation of principles for AI ethics. There is substantial overlap between different sets of principles, with widespread agreement that AI should be used for the common good, should not be used to harm people or undermine their rights, and should respect widely held values such as fairness, privacy, and autonomy. While articulating and agreeing on principles is important, it is only a starting point. Drawing on comparisons with the field of bioethics, we highlight some of the limitations of principles: in particular, they are often too broad and high-level to guide ethics in practice. We suggest that an important next step for the field of AI ethics is to focus on exploring the tensions that inevitably arise as we try to implement principles in practice. By explicitly recognising these tensions we can begin to make decisions about how they should be resolved in specific cases, and develop frameworks and guidelines for AI ethics that are rigorous and practically relevant. We discuss some different specific ways that tensions arise in AI ethics, and what processes might be needed to resolve them.",,2019,conferencePaper,"Whittlestone, Jess; Nyrup, Rune; Alexandrova, Anna; Cave, Stephen","AIES '19: Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society",TAI safety research,39
42
- Enhancing metacognitive reinforcement learning using reward structures and feedback,"How do we learn to think better, and what can we do to promote such metacognitive learning? Here, we propose that cognitive growth proceeds through metacognitive reinforcement learning. We apply this theory to model how people learn how far to plan ahead and test its predictions about the speed of metacognitive learning in two experiments. In the first experiment, we find that our model can discern a reward structure that promotes metacognitive reinforcement learning from one that hinders it. In the second experiment, we show that our model can be used to design a feedback mechanism that enhances metacognitive reinforcement learning in an environment that hinders learning. Our results suggest that modeling metacognitive learning is a promising step towards promoting cognitive growth.",,2017,conferencePaper,"Krueger, Paul M; Lieder, Falk; Griffiths, Thomas L",39th Annual Meeting of the Cognitive Science Society,not TAI safety research,40
43
- Learning agents for uncertain environments (extended abstract),,http://portal.acm.org/citation.cfm?doid=279943.279964,1998,conferencePaper,"Russell, Stuart",Proceedings of the eleventh annual conference on Computational learning theory - COLT' 98,TAI safety research,41
44
- Existential Risk and Growth,"Human activity can create or mitigate risks of catastrophes, such as nuclear war, climate change, pandemics, or artificial intelligence run amok. These could even imperil the survival of human civilization. What is the relationship between economic growth and such existential risks? In a model of directed technical change, with moderate parameters, existential risk follows a Kuznets-style inverted U-shape. This suggests we could be living in a unique “time of perils,” having developed technologies advanced enough to threaten our permanent destruction, but not having grown wealthy enough yet to be willing to spend sufficiently on safety. Accelerating growth during this “time of perils” initially increases risk, but improves the chances of humanity’s survival in the long run. Conversely, even short-term stagnation could substantially curtail the future of humanity.",,2020,report,"Aschenbrenner, Leopold",,not TAI safety research,42
45
- Coherence arguments do not imply goal-directed behavior,"One of the most pleasing things about probability and expected utility theory is that there are many coherence arguments that suggest that these are the “correct” ways to reason. If you deviate from what the theory prescribes, then you must be executing a dominated strategy. There must be some other strategy that never does any worse than your strategy, but does strictly better than your strategy with certainty in at least one situation. There’s a good explanation of these arguments here. We shouldn’t expect mere humans to be able to notice any failures of coherence in a superintelligent agent, since if we could notice these failures, so could the agent. So we should expect that powerful agents appear coherent to us. (Note that it is possible that the agent doesn’t fix the failures because it would not be worth it -- in this case, the argument says that we will not be able to notice any exploitable failures.) Taken together, these arguments suggest that we should model an agent much smarter than us as an expected utility (EU) maximizer. And many people agree that EU maximizers are dangerous. So does this mean we’re doomed? I don’t think so: it seems to me that the problems about EU maximizers that we’ve identified are actually about goal-directed behavior or explicit reward maximizers. The coherence theorems say nothing about whether an AI system must look like one of these categories. This suggests that we could try building an AI system that can be modeled as an EU maximizer, yet doesn’t fall into one of these two categories, and so doesn’t have all of the problems that we worry about. Note that there are two different flavors of arguments that the AI systems we build will be goal-directed agents (which are dangerous if the goal is even slightly wrong): * Simply knowing that an agent is intelligent lets us infer that it is goal-directed. (ETA: See this comment for more details on this argument.) * Humans are particularly likely to build goal-directed agen",https://www.alignmentforum.org/posts/NxF5G6CJiof6cemTw/coherence-arguments-do-not-imply-goal-directed-behavior,2018,blogPost,"Shah, Rohin",AI Alignment Forum,TAI safety research,43
46
- Two Alternatives to Logical Counterfactuals,"The following is a critique of the idea of logical counterfactuals. The idea of logical counterfactuals has appeared in previous agent foundations research (especially at MIRI): here, here. “…",https://unstableontology.com/2020/04/01/alternatives-to-logical-counterfactuals/,2020,blogPost,"Taylor, Jessica",Unstable Ontology,TAI safety research,44
47
- The race for an artificial general intelligence: implications for public policy,"An arms race for an artificial general intelligence (AGI) would be detrimental for and even pose an existential threat to humanity if it results in an unfriendly AGI. In this paper, an all-pay contest model is developed to derive implications for public policy to avoid such an outcome. It is established that, in a winner-takes-all race, where players must invest in R&D, only the most competitive teams will participate. Thus, given the difficulty of AGI, the number of competing teams is unlikely ever to be very large. It is also established that the intention of teams competing in an AGI race, as well as the possibility of an intermediate outcome (prize), is important. The possibility of an intermediate prize will raise the probability of finding the dominant AGI application and, hence, will make public control more urgent. It is recommended that the danger of an unfriendly AGI can be reduced by taxing AI and using public procurement. This would reduce the pay-off of contestants, raise the amount of R&D needed to compete, and coordinate and incentivize co-operation. This will help to alleviate the control and political problems in AI. Future research is needed to elaborate the design of systems of public procurement of AI innovation and for appropriately adjusting the legal frameworks underpinning high-tech innovation, in particular dealing with patenting by AI.",https://doi.org/10.1007/s00146-019-00887-x,2019,journalArticle,"Naudé, Wim; Dimitri, Nicola",AI & Society,TAI safety research,45
48
- Neuroevolution of Self-Interpretable Agents,"Inattentional blindness is the psychological phenomenon that causes one to miss things in plain sight. It is a consequence of the selective attention in perception that lets us remain focused on important parts of our world without distraction from irrelevant details. Motivated by selective attention, we study the properties of artificial agents that perceive the world through the lens of a self-attention bottleneck. By constraining access to only a small fraction of the visual input, we show that their policies are directly interpretable in pixel space. We find neuroevolution ideal for training self-attention architectures for vision-based reinforcement learning (RL) tasks, allowing us to incorporate modules that can include discrete, non-differentiable operations which are useful for our agent. We argue that self-attention has similar properties as indirect encoding, in the sense that large implicit weight matrices are generated from a small number of key-query parameters, thus enabling our agent to solve challenging vision based tasks with at least 1000x fewer parameters than existing methods. Since our agent attends to only task critical visual hints, they are able to generalize to environments where task irrelevant elements are modified while conventional methods fail. Videos of our results and source code available at https://attentionagent.github.io/",http://arxiv.org/abs/2003.08165,2020,conferencePaper,"Tang, Yujin; Nguyen, Duong; Ha, David",Proceedings of the 2020 Genetic and Evolutionary Computation Conference,not TAI safety research,46
49
- Brainjacking in deep brain stimulation and autonomy,,,2018,journalArticle,"Pugh, Jonathan; Pycroft, Laurie; Sandberg, Anders; Aziz, Tipu; Savulescu, Julian",Ethics and information technology,not TAI safety research,47
50
- AI development incentive gradients are not uniformly terrible,"Much of the work for this post was done together with Nuño Sempere Perhaps you think that your values will be best served if the AGI you (or your team, company or nation) are developing is deployed first. Would you decide that it's worth cutting a few corners, reducing your safety budget, and pushing ahead to try and get your AI out the door first? It seems plausible, and worrying, that you might. And if your competitors reason symmetrically, we would get a ""safety race to the bottom"". On the other hand, perhaps you think your values will be better served if your enemy wins than if either of you accidentally produces an unfriendly AI. Would you decide the safety costs to improving your chances aren't worth it? In a simple two player model, you should only shift funds from safety to capabilities if (the relative₁ decrease in chance of friendliness) / (the relative₁ increase in the chance of winning) < (expected relative₂ loss of value if your enemy wins rather than you). Here, the relative₁ increases and decreases are relative to the current values. The relative₂ loss of value is relative to the expected value if you win. The plan of this post is as follows: 1. Consider a very simple model that leads to a safety race. Identify unrealistic assumptions which are driving its results. 2. Remove some of the unrealistic assumptions and generate a different model. Derive the inequality expressed above. 3. Look at some specific example cases, and see how they affect safety considerations. A PARTLY DISCONTINUOUS MODEL Let's consider a model with two players with the same amount of resources. Each player's choice is what fraction of their resources to devote to safety, rather than capabilities. Whichever player contributes more to capabilities wins the race. If you win the race, you either get a good outcome or a bad outcome. Your chance of getting a good outcome increases continuously with the amount you spent on safety. If the other player wins, you get a bad outcome.",https://www.lesswrong.com/posts/bkG4qj9BFEkNva3EX/ai-development-incentive-gradients-are-not-uniformly,2018,blogPost,rk,LessWrong,TAI safety research,48
51
- What is ambitious value learning?,"I think of ambitious value learning as a proposed solution to the specification problem, which I define as the problem of defining the behavior that we would want to see from our AI system. I italicize “defining” to emphasize that this is not the problem of actually computing behavior that we want to see -- that’s the full AI safety problem. Here we are allowed to use hopelessly impractical schemes, as long as the resulting definition would allow us to in theory compute the behavior that an AI system would take, perhaps with assumptions like infinite computing power or arbitrarily many queries to a human. (Although we do prefer specifications that seem like they could admit an efficient implementation.) In terms of DeepMind’s classification, we are looking for a design specification that exactly matches the ideal specification. HCH and indirect normativity are examples of attempts at such specifications. We will consider a model in which our AI system is maximizing the expected utility of some explicitly represented utility function that can depend on history. (It does not matter materially whether we consider utility functions or reward functions, as long as they can depend on history.) The utility function may be learned from data, or designed by hand, but it must be an explicit part of the AI that is then maximized. I will not justify this model for now, but simply assume it by fiat and see where it takes us. I’ll note briefly that this model is often justified by the VNM utility theorem and AIXI, and as the natural idealization of reinforcement learning, which aims to maximize the expected sum of rewards, although typically rewards in RL depend only on states. A lot of conceptual arguments, as well as experiences with specification gaming, suggest that we are unlikely to be able to simply think hard and write down a good specification, since even small errors in specifications can lead to bad results. However, machine learning is particularly good at narro",https://www.alignmentforum.org/posts/5eX8ko7GCxwR5N9mN/what-is-ambitious-value-learning,2018,blogPost,"Shah, Rohin",AI Alignment Forum,TAI safety research,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/terms_of_service/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "terms_of_service", "description": "", "data_columns": ["Sentence", "ID"], "label_columns": {"Label": ["not potentially unfair", "potentially unfair"]}}
 
 
data/terms_of_service/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/terms_of_service/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Sentence,Label,ID
2
- "Crowdtangle may change these terms of service, as described above, notwithstanding any provision to the contrary in any agreement between you and crowdtangle.",potentially unfair,0
3
- "You acknowledge that any reliance upon any such introduction, opinion, profile, advice, statement or information and any resulting participation or action shall be at your sole risk.",not potentially unfair,1
4
- "Because the law may or may not recognize certain intellectual property rights in any particular content, you should consult a lawyer if you want legal advice regarding your legal rights in a specific situation.",not potentially unfair,2
5
- "These requirements can be found on the website and the google, apple and amazon app marketplaces.",not potentially unfair,3
6
- Fitbit will not seek its attorneys' fees and costs in arbitration unless the arbitrator determines that your claim is frivolous.,not potentially unfair,4
7
- Tripadvisor does not knowingly collect the information of anyone under the age of 13.,not potentially unfair,5
8
- "V) any content downloaded or otherwise obtained through the use of our resources is done at your own discretion and risk, and that you are solely responsible for any damage to your computer or other devices for any loss of data that may result from the download of such content.",not potentially unfair,6
9
- No oral or written information or advice given by the licensor or its authorized representative shall create a warranty.,not potentially unfair,7
10
- Products that you may acquire via third-party shopping services are not registered to your nintendo account.,not potentially unfair,8
11
- "To the maximum extent permitted by law, we (together with our officers, directors, employees, representatives, affiliates, providers and third parties) do not accept any liability for (a) any inaccuracies or omissions in the content displayed on or via the skyscanner services and/or skyscanner platforms ; or (b) any act of god, accident, delay or any special, exemplary, punitive, indirect, incidental or consequential loss or damage of any kind (including, without limitation, lost profits or lost savings), whether based in contract, tort (including negligence), strict liability or otherwise, incurred by you arising out of or in connection with your access to, use of, or inability to access or use, the skyscanner services and/or skyscanner platforms or any content contained provided therein.",potentially unfair,9
12
- "• you are a small-scale independent production company, non-profit, or artist, in which case you may use the vimeo service to showcase or promote your own creative works.",not potentially unfair,10
13
- 7.8 user material is not considered to be confidential.,not potentially unfair,11
14
- You may opt-out of receiving text (sms) messages from uber at any time by following the directions found at http://t.uber.com/sms-unsubscribe.,not potentially unfair,12
15
- The new rate will apply to your next phone call after the new rates have been published.,not potentially unfair,13
16
- Our aim is to provide the best delivery service possible.,not potentially unfair,14
17
- "Supercell may reject, refuse to post or delete any user content for any or no reason, including, but not limited to, user content that in the sole judgment of supercell violates these terms of service.",potentially unfair,15
18
- "Notwithstanding anything to the contrary herein, you acknowledge and agree that you shall have no ownership or other property interest in the account, and you further acknowledge and agree that all rights in and to the account are and shall forever be owned by and inure to the benefit of supercell.",not potentially unfair,16
19
- Such termination or suspension may be immediate and without notice.,not potentially unfair,17
20
- "You are responsible for identifying, understanding, and complying with all laws, rules and regulations that apply to your participation in an experience, event or other host service.",not potentially unfair,18
21
- "F. does not contain any unsolicited or unauthorised advertising, promotional material, ``junk mail'', ``spam'', ``chain letters'', ``pyramid schemes'' or any other form of solicitation ; and ",not potentially unfair,19
22
- We believe that you own your data and preserving your access to such data is important.,not potentially unfair,20
23
- "7.3 skype and/or its licensors retain exclusive ownership of the software, products and skype websites and all intellectual property therein (whether or not registered and anywhere in the world).",not potentially unfair,21
24
- "This website may contain discussion forums, bulletin boards, review services or other forums in which you or third parties may post reviews of travel experiences or other content, messages, materials or other items on this website (``interactive areas'').",not potentially unfair,22
25
- "• attempt to probe, scan, or test the vulnerability of any academia.edu system or network or breach any security or authentication measures ; ",not potentially unfair,23
26
- "Except for any claim relating to your or our intellectual property (such as trademarks, trade dress, domain names, trade secrets, copyrights and patents) (``excluded disputes''), you and onavo agree to resolve through final and binding arbitration any claim between you and onavo, including its affiliates, officers, directors, employees and agents and its affiliates' officers, directors, employees and agents (whether or not such dispute also involves a third party), regarding any aspect of your relationship with us, including these terms, your use of any of onavo's services, your rights of privacy and/or publicity, or any contacts you may have with us, directly or indirectly, for any reason (``dispute'').",potentially unfair,24
27
- "You may not use the services (other than certain commercial tools) to sell a product or service, increase traffic to your own website or a third-party website for commercial reasons, such as advertising sales, or otherwise undertake any endeavor aimed at deriving revenue.",not potentially unfair,25
28
- Currency quotes may not be updated on a daily basis.,not potentially unfair,26
29
- 2.4 you grant certain content licenses to other users by submitting your content to publicly accessible areas of the service.,not potentially unfair,27
30
- "In no event shall linden lab or any of its directors, officers, employees, shareholders, subsidiaries, agents or licensors be responsible or liable to you or to any third party for any loss or damages of any kind, including for any direct, indirect, economic, exemplary, incidental, consequential, reliance, special, or punitive losses or damages or disgorgement or comparable equitable remedy, for lost data or lost profits, arising (whether in contract, tort, strict liability or otherwise) out of or in connection with the service (including its modification or termination), the software, the websites, the servers, your account (including its termination or suspension) or this agreement, whether or not linden lab may have been advised that any such damages might or could occur and notwithstanding the failure of essential purpose of any remedy.",potentially unfair,28
31
- 20.1 this section applies if you select a third-party payment system that enables you to pay for skype credit and certain paid for products via your mobile phone bill where applicable (``pay by mobile'').,not potentially unfair,29
32
- "These terms, and any other policies or rules we reference in these terms, make up the entire agreement between you and us relating to the subject matter of these terms, and supersede all prior understandings of the parties relating to the subject matter of these terms, whether those prior understandings were electronic, oral or written, or whether established by custom, practice, policy or precedent, between you and us.",not potentially unfair,30
33
- "Notwithstanding any provision in the user agreement to the contrary, you and we agree that if we make any amendment to this agreement to arbitrate (other than an amendment to any notice address or site link provided herein) in the future, that amendment shall not apply to any claim that was filed in a legal proceeding against ebay prior to the effective date of the amendment.",not potentially unfair,31
34
- We can each end this contract anytime we want.,potentially unfair,32
35
- Your user content will be processed by zynga in accordance with its privacy policy.,not potentially unfair,33
36
- "Take any action that damages or adversely affects, or could damage or adversely affect the performance or proper functioning of the airbnb platform ; ",not potentially unfair,34
37
- "Verified images (as defined below) are intended only to indicate a photographic representation of a listing at the time the photograph was taken, and are therefore not an endorsement by airbnb of any host or listing.",not potentially unfair,35
38
- You acknowledge and agree that posting any such user content may result in immediate termination or suspension of your spotify account.,potentially unfair,36
39
- We may revise these terms from time to time.,potentially unfair,37
40
- Software development kits provided through skype developer on the skype website (including ``skypekit'') and the use of any application program interface (``api'') exposed or made available by skype are subject to their own licensing terms in which case such licensing terms will govern your use of that software.,not potentially unfair,38
41
- "Depending on the third party accounts you choose and subject to the privacy settings that you have set in such third party accounts, personally identifiable information that you post to your third party accounts will be available on and through your account on the site and services.",not potentially unfair,39
42
- "Any attempt by you to assign or transfer these terms, without such consent, will be null and of no effect.",not potentially unfair,40
43
- "The services are provided by google inc. (``google''), located at 1600 amphitheatre parkway, mountain view, ca 94043, united states.",not potentially unfair,41
44
- "Tinder does not represent or warrant that (a) the service will be uninterrupted, secure or error free, (b) any defects or errors in the service will be corrected, or (c) that any content or information you obtain on or through the services will be accurate.",potentially unfair,42
45
- "For notices made to members residing outside of germany, the date of receipt will be deemed the date on which airbnb transmits the notice.",not potentially unfair,43
46
- Special provisions applicable to developers/operators of applications and websites ,not potentially unfair,44
47
- You will not solicit login information or access an account belonging to someone else.,not potentially unfair,45
48
- "You may be able to access certain third-party links, applications or content (``third-party applications'') via accounts related to our services.",not potentially unfair,46
49
- Use of the fitbit service should not replace your good judgment and common sense.,not potentially unfair,47
50
- "Except as expressly agreed by the company and you, this eula constitutes the entire agreement between you and the company with respect to the subject matter hereof, and supersedes all previous or contemporaneous agreements, whether written or oral, between the parties with respect to the subject matter herein.",not potentially unfair,48
51
- "You agree that all of yahoo's trademarks, trade names, service marks and other yahoo logos and brand features, and product and service names are trademarks and the property of yahoo holdings, inc. (the ``yahoo marks'').",not potentially unfair,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/tweet_eval_hate/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "tweet_eval_hate", "description": "", "data_columns": ["Tweet", "ID"], "label_columns": {"Label": ["hate speech", "not hate speech"]}}
 
 
data/tweet_eval_hate/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/tweet_eval_hate/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Tweet,Label,ID
2
- New to Twitter-- any men on here know what the process is to get #verified?,not hate speech,0
3
- "RT @user Her:I don't get what u want outta this relationship Him:Well, I was only looking for a bj but u kept coming back",not hate speech,1
4
- We are excited to host the #ImmigrantStories film screening and panel today with @user to show how the Trump administration’s overhaul of immigration policy has forced the immigrant community to choose between deportation and medical care.,not hate speech,2
5
- UN wants ‘˜immediate halt’ to separation of migrant families in US #Trumpadministration #UnitedNations...,not hate speech,3
6
- cormacs such a cunt won’t even let me squeeze his blackheads pussy bitch,hate speech,4
7
- Dont worry @user you are and will always be the most hysterical woman.,hate speech,5
8
- @user Skank traitor bitch @user,hate speech,6
9
- @user @user 2 hysterical women in the US Senate,hate speech,7
10
- "Jennifer Lawrence is complaining about being a whore, meanwhile she's punching old Asian women in face who are sewing her costumes for her",not hate speech,8
11
- Germany: Islamic-inspired children’s park in Berlin to introduce children to Islam and the Islamic culture of the refugees - Free Speech Time - @user,hate speech,9
12
- "US Navy Seal, which killed Osama wrote a book. It tells how this specialforces work today.",not hate speech,10
13
- It's clear that the administration's attempts to punish local governments for refusing to cooperate with immigration enforcement are unconstitutional. The administration should focus on treating immigrants with compassion and respect.,not hate speech,11
14
- Curious to know how @user delivers emergency food supplies to #refugees and other vulnerable people around the world? Watch this video:,not hate speech,12
15
- "HOW REFRESHING! In South Korea, there is no such thing as 'political correctness"" when it comes to dealing with Muslim refugee wannabes via @user",hate speech,13
16
- World Relief is continuing to provide legal aid and advocating for immigrant families who have been separated at the U.S.-Mexico border. You can make a difference and help reunite families by making a donation today. ➝,not hate speech,14
17
- "Important note: not all women do this and tale responsibility for their actions, just like not all men are assholes.",not hate speech,15
18
- International migration from sub-Saharan Africa has grown dramatically since 2010,not hate speech,16
19
- "@user Noely I see you've become hysterical since I last saw you. Don't blam you one bit, you're in Qld right?",not hate speech,17
20
- "Stop trying to please everyone, you're not my cock... Please yourself",not hate speech,18
21
- "This is outrageous! But, sadly, this kind of corruption is what we've gotten used to with our current administration! 😠",not hate speech,19
22
- @user thanks for ruining a beloved song from “The Sound of Music” by using that extremely creepy electronic version in your commercial. Shame on you.,not hate speech,20
23
- I hate bitches that are always mad at the world for no reason like bitch stfu and be happy hoe,hate speech,21
24
- The Ethiopia-Eritrea rapprochement: what does it mean for refugees?,not hate speech,22
25
- "@user It's kind of funny, really. Were the space aliens illegal? Now we need a wall & a roof! I think this country has gone totally nuts. God Bless @user for his strength & courage. #BuildThatWall and if he blocks the democrats out, t",hate speech,23
26
- Talent- Meeting up with complete strangers for sex,not hate speech,24
27
- President Trump Weekly Address ‘“ Immigration Reform Needed‘¦,not hate speech,25
28
- Pope Francis criticizes policy of migrant family separation via @user Stick to religion Mr. Red Pope...,not hate speech,26
29
- @user mmm perfect body and so am i am now come here girl i got a big cock for u to play with ;),hate speech,27
30
- "The first sexual attack against a woman happened in Hungary. The criminal is a ""legal"" afghan rapefugee. This is how Orban protects us.",hate speech,28
31
- @user One man one vote right?Yet here we have one man assuming he can demand the importation of millions of non citizens for HIS agenda.He should be allowed a say on ONE migrant at most. And be personally and directly responsible for everythin,hate speech,29
32
- "Anybody can dig a hole and plant a tree. But to make sure it survives, you have to nurture it, you have to suffer for it,jst lyk a wife.",not hate speech,30
33
- @user Going to be where no one will leave the house or even look at a woman because she will claim “rape”.…,hate speech,31
34
- I didn’t realize girls who wear huge bows in their hair called other women “cunt”. “Northern Bell’s” must be bred t…,not hate speech,32
35
- "#TakeAKnee trump's a chump! @user is the real deal-helping so many on his journey through greatness! Even @user can't stand #IQ45-stands to CLEAN UP while he's in prison. One hot, lucky #Immigrant babe! #OHi12 #VoteBlue @user in the #Columbus area. #BlueWave baby!",not hate speech,33
36
- Its time - to stop the immigration - to USA ! Specially from 40 muslim countries. The president named it: SHITHOLE-countries. And he is right and also his wall must be build. But all foreign invaders inside of USA must go home !,hate speech,34
37
- Syria's military continues to advance in the south west,not hate speech,35
38
- Homeland Security says he is a REFUGEE. Iraqi refugee charged with attempted murder of Colorado police officer - - @user,not hate speech,36
39
- @user @user @user Imagine THE SIZEof THAT RED WAVE !!GOD BLESS TRUMP!Build That Wall#BuildThatWall Plz share..,hate speech,37
40
- | Woman who accused Nelly of rape wants to drop charges,not hate speech,38
41
- @user Exactly! Why would Americans vote for anyone that supports these absurd policies? IMO it is treason and self destruction to vote for politicians that do not up hold our laws and advocates for illegals over Americans. #BuildThatWall #NoDACA,hate speech,39
42
- "They do not need them, I do not need them nor do I require them to enrich my life. #Stoptheinvasion #Brexit #Sodyoueu #Nosurrender",hate speech,40
43
- "“When Mexico sends its people, they’re not sending their best... They’re bringing drugs. They’re bringing crime. They’re rapists. And some, I assume, are good people.” Strangely, @user depends on foreign workers for his properties. #Immigration",hate speech,41
44
- "Germany Navy rescued 22.000 refugees in the middlesea. Germany has not enough refugees, it wants more! by state duty. The citiziens will give the answer in elections.",not hate speech,42
45
- Why weren't the democrats in the streets marching for the separated families of people like Jamiel Shaw when he was separated from his son forever after Jamiel Jr. was shot and murdered by an illegal alien? #separatingfamilies #BuildThatWall #MAGA #BGR #BlacksGoneRed,hate speech,43
46
- @user @user BUT. I would bet you're not looking for facts. That's why you obfuscate.President Trump at NATO: 'Immigration is taking over Europe'https://t.co/L8Kk9bM0TuThere is more. And you know it.,hate speech,44
47
- @user @user Just choke on your salad sandwich already. Those Men did not die during the Gulf War and do you really think that it did not play on their conscience why they were fighting? They still went anyway. You are directing your crap at the,not hate speech,45
48
- How keyboard gangsters feel leaving their stupid ass comments,not hate speech,46
49
- Women want u to automatically believe women who scream rape they don't understand our position....,hate speech,47
50
- UK Pensioner Faces 350 Lashes In Saudi Arabia why does this country exist it does nothing for migrants picks on old men no help from anyone,not hate speech,48
51
- HOLLERINGGGGGGG. stupid baby bitch.,hate speech,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/twitter_complaints/task.json DELETED
@@ -1 +0,0 @@
1
- {"name": "twitter_complaints", "description": "", "data_columns": ["Tweet text", "ID"], "label_columns": {"Label": ["complaint", "no complaint"]}}
 
 
data/twitter_complaints/test_unlabeled.csv DELETED
The diff for this file is too large to render. See raw diff
 
data/twitter_complaints/train.csv DELETED
@@ -1,51 +0,0 @@
1
- Tweet text,Label,ID
2
- @HMRCcustomers No this is my first job,no complaint,0
3
- "@KristaMariePark Thank you for your interest! If you decide to cancel, you can call Customer Care at 1-800-NYTIMES.",no complaint,1
4
- If I can't get my 3rd pair of @beatsbydre powerbeats to work today I'm doneski man. This is a slap in my balls. Your next @Bose @BoseService,complaint,2
5
- @EE On Rosneath Arial having good upload and download speeds but terrible latency 200ms. Why is this.,complaint,3
6
- "Couples wallpaper, so cute. :) #BrothersAtHome",no complaint,4
7
- "@mckelldogs This might just be me, but-- eyedrops? Artificial tears are so useful when you're sleep-deprived and sp… https://t.co/WRtNsokblG",no complaint,5
8
- @Yelp can we get the exact calculations for a business rating (for example if its 4 stars but actually 4.2) or do we use a 3rd party site?,no complaint,6
9
- @nationalgridus I have no water and the bill is current and paid. Can you do something about this?,complaint,7
10
- "Never shopping at @MACcosmetics again. Every time I go in there, their employees are super rude/condescending. I'll take my $$ to @Sephora",complaint,8
11
- @JenniferTilly Merry Christmas to as well. You get more stunning every year ��,no complaint,9
12
- @NortonSupport Thanks much.,no complaint,10
13
- @VerizonSupport all of a sudden I can't connect to my primary wireless network but guest one works,no complaint,11
14
- Aaaahhhhh!!!! My @Razer @PlayOverwatch d.va meka headset came in!!! I didn't even know it had shipped!!! So excited… https://t.co/4gXy9xED8d,no complaint,12
15
- @Lin_Manuel @jmessinaphoto @VAMNit Omg a little squish!!!!! Enjoy and congrats!!!! I miss mine being so young! ������,no complaint,13
16
- @IanJamesPoulter What's your secret to poaching eggs? Mine NEVER look that good.,no complaint,14
17
- @AWSSupport When will be able Kinesis Firehose compatible with Elasticsearch 6.0? Thank you!,no complaint,15
18
- @NCIS_CBS https://t.co/eeVL9Eu3bE,no complaint,16
19
- @msetchell Via the settings? That’s how I do it on master T’s,no complaint,17
20
- "Today at work there was a low flying duck heading toward a crowd of people, and I yelled ""watch out! and I'm very disappointed with myself.",no complaint,18
21
- @NortonSupport @NortonOnline What the hell is a dm 5-10 days to get money back bank account now overdrawn thanks guys,complaint,19
22
- @united not happy with this delay from Newark to Manchester tonight :( only 30 mins free Wi-fi sucks ...,complaint,20
23
- @ZARA_Care I've been waiting on a reply to my tweets and DMs for days now?,complaint,21
24
- "New Listing! Large 2 Family Home for Sale in #Passaic Park, #NJ #realestate #homesforsale Great Location!… https://t.co/IV4OrLXkMk",no complaint,22
25
- @SouthwestAir I love you but when sending me flight changes please don't use military time #ignoranceisbliss,complaint,23
26
- @JetBlue Completely understand but would prefer being on time to filling out forms....,no complaint,24
27
- @nvidiacc I own two gtx 460 in sli. I want to try windows 8 dev preview. Which driver should I use. Can I use the windows 7 one.,no complaint,25
28
- Just posted a photo https://t.co/RShFwCjPHu,no complaint,26
29
- Love crescent rolls? Try adding pesto @PerdueChicken to them and you’re going to love it! #Promotion #PerdueCrew -… https://t.co/KBHOfqCukH,no complaint,27
30
- @TopmanAskUs please just give me my money back.,complaint,28
31
- I just gave 5 stars to Tracee at @neimanmarcus for the great service I received!,no complaint,29
32
- @FitbitSupport when are you launching new clock faces for Indian market,no complaint,30
33
- @HPSupport my printer will not allow me to choose color instead it only prints monochrome #hppsdr #ijkhelp,complaint,31
34
- @DIRECTV can I get a monthly charge double refund when it sprinkles outside and we lose reception? #IamEmbarrasedForYou,complaint,32
35
- "@AlfaRomeoCares Hi thanks for replying, could be my internet but link doesn't seem to be working",complaint,33
36
- Looks tasty! Going to share with everyone I know #FebrezeONE #sponsored https://t.co/4AQI53npei,no complaint,34
37
- @OnePlus_IN can OnePlus 5T do front camera portrait?,no complaint,35
38
- @sho_help @showtime your arrive is terrible streaming is stop and start every couple mins. Get it together it's xmas,complaint,36
39
- @KandraKPTV I just witnessed a huge building fire in Santa Monica California,no complaint,37
40
- @fernrocks most definitely the latter for me,no complaint,38
41
- @greateranglia Could I ask why the Area in front of BIC Station was not gritted withh all the snow.,complaint,39
42
- I'm earning points with #CricketRewards https://t.co/GfpGhqqnhE,no complaint,40
43
- @Schrapnel @comcast RIP me,no complaint,41
44
- "The wait is finally over, just joined @SquareUK, hope to get started real soon!",no complaint,42
45
- @WholeFoods what's the best way to give feedback on a particular store to the regional/national office?,no complaint,43
46
- @DanielNewman I honestly would believe anything. People are...too much sometimes.,no complaint,44
47
- @asblough Yep! It should send you a notification with your driver’s name and what time they’ll be showing up!,no complaint,45
48
- @Wavy2Timez for real,no complaint,46
49
- @KenyaPower_Care no power in south b area... is it scheduled.,complaint,47
50
- Honda won't do anything about water leaking in brand new car. Frustrated! @HondaCustSvc @AmericanHonda,complaint,48
51
- "@CBSNews @Dodge @ChryslerCares My driver side air bag has been recalled and replaced, but what about the passenger side?",complaint,49
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
dataset_infos.json DELETED
@@ -1 +0,0 @@
1
- {"ade_corpus_v2": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Sentence": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 3, "names": ["Unlabeled", "ADE-related", "not ADE-related"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "ade_corpus_v2", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 7606, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 709091, "num_examples": 5000, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 716697, "size_in_bytes": 10468862}, "banking_77": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Query": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 78, "names": ["Unlabeled", "Refund_not_showing_up", "activate_my_card", "age_limit", "apple_pay_or_google_pay", "atm_support", "automatic_top_up", "balance_not_updated_after_bank_transfer", "balance_not_updated_after_cheque_or_cash_deposit", "beneficiary_not_allowed", "cancel_transfer", "card_about_to_expire", "card_acceptance", "card_arrival", "card_delivery_estimate", "card_linking", "card_not_working", "card_payment_fee_charged", "card_payment_not_recognised", "card_payment_wrong_exchange_rate", "card_swallowed", "cash_withdrawal_charge", "cash_withdrawal_not_recognised", "change_pin", "compromised_card", "contactless_not_working", "country_support", "declined_card_payment", "declined_cash_withdrawal", "declined_transfer", "direct_debit_payment_not_recognised", "disposable_card_limits", "edit_personal_details", "exchange_charge", "exchange_rate", "exchange_via_app", "extra_charge_on_statement", "failed_transfer", "fiat_currency_support", "get_disposable_virtual_card", "get_physical_card", "getting_spare_card", "getting_virtual_card", "lost_or_stolen_card", "lost_or_stolen_phone", "order_physical_card", "passcode_forgotten", "pending_card_payment", "pending_cash_withdrawal", "pending_top_up", "pending_transfer", "pin_blocked", "receiving_money", "request_refund", "reverted_card_payment?", "supported_cards_and_currencies", "terminate_account", "top_up_by_bank_transfer_charge", "top_up_by_card_charge", "top_up_by_cash_or_cheque", "top_up_failed", "top_up_limits", "top_up_reverted", "topping_up_by_card", "transaction_charged_twice", "transfer_fee_charged", "transfer_into_account", "transfer_not_received_by_recipient", "transfer_timing", "unable_to_verify_identity", "verify_my_identity", "verify_source_of_funds", "verify_top_up", "virtual_card_not_working", "visa_or_mastercard", "why_verify_identity", "wrong_amount_of_cash_received", "wrong_exchange_rate_for_cash_withdrawal"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "banking_77", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 3377, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 376769, "num_examples": 5000, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 380146, "size_in_bytes": 10132311}, "terms_of_service": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Sentence": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 3, "names": ["Unlabeled", "not potentially unfair", "potentially unfair"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "terms_of_service", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 10952, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 961824, "num_examples": 5000, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 972776, "size_in_bytes": 10724941}, "tai_safety_research": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Title": {"dtype": "string", "id": null, "_type": "Value"}, "Abstract Note": {"dtype": "string", "id": null, "_type": "Value"}, "Url": {"dtype": "string", "id": null, "_type": "Value"}, "Publication Year": {"dtype": "string", "id": null, "_type": "Value"}, "Item Type": {"dtype": "string", "id": null, "_type": "Value"}, "Author": {"dtype": "string", "id": null, "_type": "Value"}, "Publication Title": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 3, "names": ["Unlabeled", "TAI safety research", "not TAI safety research"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "tai_safety_research", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 54938, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 1634904, "num_examples": 1639, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 1689842, "size_in_bytes": 11442007}, "neurips_impact_statement_risks": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Paper title": {"dtype": "string", "id": null, "_type": "Value"}, "Paper link": {"dtype": "string", "id": null, "_type": "Value"}, "Impact statement": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 3, "names": ["Unlabeled", "doesn't mention a harmful application", "mentions a harmful application"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "neurips_impact_statement_risks", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 69049, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 198711, "num_examples": 150, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 267760, "size_in_bytes": 10019925}, "overruling": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Sentence": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 3, "names": ["Unlabeled", "not overruling", "overruling"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "overruling", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 7428, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 431794, "num_examples": 2350, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 439222, "size_in_bytes": 10191387}, "systematic_review_inclusion": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Title": {"dtype": "string", "id": null, "_type": "Value"}, "Abstract": {"dtype": "string", "id": null, "_type": "Value"}, "Authors": {"dtype": "string", "id": null, "_type": "Value"}, "Journal": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 3, "names": ["Unlabeled", "included", "not included"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "systematic_review_inclusion", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 52693, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 2344260, "num_examples": 2243, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 2396953, "size_in_bytes": 12149118}, "one_stop_english": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Article": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 4, "names": ["Unlabeled", "advanced", "elementary", "intermediate"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "one_stop_english", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 201448, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 2090433, "num_examples": 516, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 2291881, "size_in_bytes": 12044046}, "tweet_eval_hate": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Tweet": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 3, "names": ["Unlabeled", "hate speech", "not hate speech"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "tweet_eval_hate", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 7492, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 440052, "num_examples": 2966, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 447544, "size_in_bytes": 10199709}, "twitter_complaints": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Tweet text": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 3, "names": ["Unlabeled", "complaint", "no complaint"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "twitter_complaints", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 5352, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 369568, "num_examples": 3399, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 374920, "size_in_bytes": 10127085}, "semiconductor_org_types": {"description": "Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants? \n\n[RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:\n\n- across multiple domains (lit review, tweets, customer interaction, etc.)\n- on economically valuable classification tasks (someone inherently cares about the task)\n- in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)\n", "citation": "@InProceedings{huggingface:dataset,\ntitle = {A great new dataset},\nauthor={huggingface, Inc.\n},\nyear={2020}\n}\n", "homepage": "https://raft.elicit.org", "license": "", "features": {"Paper title": {"dtype": "string", "id": null, "_type": "Value"}, "Organization name": {"dtype": "string", "id": null, "_type": "Value"}, "ID": {"dtype": "int32", "id": null, "_type": "Value"}, "Label": {"num_classes": 4, "names": ["Unlabeled", "company", "research institute", "university"], "names_file": null, "id": null, "_type": "ClassLabel"}}, "post_processed": null, "supervised_keys": null, "task_templates": null, "builder_name": "raft", "config_name": "semiconductor_org_types", "version": {"version_str": "1.1.0", "description": null, "major": 1, "minor": 1, "patch": 0}, "splits": {"train": {"name": "train", "num_bytes": 8251, "num_examples": 50, "dataset_name": "raft"}, "test": {"name": "test", "num_bytes": 73872, "num_examples": 449, "dataset_name": "raft"}}, "download_checksums": {"data/ade_corpus_v2/train.csv": {"num_bytes": 7788, "checksum": "b6c1268b8ce0fbf4fcaa0ee88562354b65d7ebd2527c3c3cc875e3a47757ae36"}, "data/ade_corpus_v2/test_unlabeled.csv": {"num_bytes": 661890, "checksum": "28981e898281755e1c2d460ab75cceb8f9d8ce0a88ff4636153cf8c393c6f99e"}, "data/banking_77/train.csv": {"num_bytes": 3914, "checksum": "8c417cea66d12569cb3057b125a98358aea0642dda67cf6deea52d4ec1c28ae1"}, "data/banking_77/test_unlabeled.csv": {"num_bytes": 327152, "checksum": "aebd62e56a3b8ebf618afa519cc261fedc7700d96053357ebff83fab44bbaeac"}, "data/terms_of_service/train.csv": {"num_bytes": 11528, "checksum": "8b46784b1e601d753ad44ce33fced828ec3bea95b6b575a2195322ead807f6c7"}, "data/terms_of_service/test_unlabeled.csv": {"num_bytes": 917272, "checksum": "491679e8c9303f825d341dcdfb0a5779a9d2f925744cc44c0039b219abf7d83f"}, "data/tai_safety_research/train.csv": {"num_bytes": 54758, "checksum": "fac15dde8a9f5536424289aa707dcfe1fa3128a7ee2d813cf3251c53092f7dbc"}, "data/tai_safety_research/test_unlabeled.csv": {"num_bytes": 1594375, "checksum": "e606d7858813490507d90d3d17830c6f1ebd8c777fc4a9f865699e375be355d0"}, "data/neurips_impact_statement_risks/train.csv": {"num_bytes": 70008, "checksum": "76cd6aa2707cd99445ba69f8c392a89faa4bf718e967b07dc457f88529b3ff2e"}, "data/neurips_impact_statement_risks/test_unlabeled.csv": {"num_bytes": 196429, "checksum": "5e4d1f313f92dad3e06e035eaff044f818b20ce1ed4d22fcd17e7756e54089a7"}, "data/overruling/train.csv": {"num_bytes": 7585, "checksum": "617061ba0dbd501d74896ccf2f9ebed00c35c4c4057f74afdd94c96cb514130e"}, "data/overruling/test_unlabeled.csv": {"num_bytes": 412483, "checksum": "c0a61fc8980b544611f8d662c752d88e2ed635146f2f3c72f16eec60e3ddb7fe"}, "data/systematic_review_inclusion/train.csv": {"num_bytes": 52491, "checksum": "2d2acd76f6acf1fd1359cf07323586fa134bbe76689e112f5c213b63271e2318"}, "data/systematic_review_inclusion/test_unlabeled.csv": {"num_bytes": 2309265, "checksum": "20710c15f7fda010a3a86a0eda52c5ceb6a709b626610d19e1fc353c42c2d955"}, "data/one_stop_english/train.csv": {"num_bytes": 201489, "checksum": "8c0102ea703677c23c3525e3bc7504c4b734d9298c5d3a25403d274034cb9d89"}, "data/one_stop_english/test_unlabeled.csv": {"num_bytes": 2085747, "checksum": "31e299f91925647744e998f221c0f66c2719df297a20d36d993c8892616a4a53"}, "data/tweet_eval_hate/train.csv": {"num_bytes": 7642, "checksum": "ab091c90e8afbb0dabe17cc6be93b1b80fd914e00a12d66b2dd7b194f355ba65"}, "data/tweet_eval_hate/test_unlabeled.csv": {"num_bytes": 412052, "checksum": "707e720c60f8beb359301994c691a609367cf3bf27d0c573d22f9e47ecc63204"}, "data/twitter_complaints/train.csv": {"num_bytes": 5376, "checksum": "365b067c2d2a7f30128d766baf4901936e047295bb2a693878164dbb84d828fa"}, "data/twitter_complaints/test_unlabeled.csv": {"num_bytes": 336272, "checksum": "7f6f975ec98a5b467b39c487bbc711b29e177119d12c49c79b31faba83609082"}, "data/semiconductor_org_types/train.csv": {"num_bytes": 8120, "checksum": "b7e238cbfd0ed518c222b64e8656599ed13872de135c6e38d6f6123c355d2f64"}, "data/semiconductor_org_types/test_unlabeled.csv": {"num_bytes": 68529, "checksum": "141d8b36685475310c98cdb16099acbf04498d80349f4434c2201deffd271f24"}}, "download_size": 9752165, "post_processing_size": null, "dataset_size": 82123, "size_in_bytes": 9834288}}
 
 
neurips_impact_statement_risks/raft-test.parquet ADDED
Binary file (123 kB). View file
 
neurips_impact_statement_risks/raft-train.parquet ADDED
Binary file (47.1 kB). View file
 
one_stop_english/raft-test.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4e217c2f31cf83cf6a049628be11d3c88df1dc5f19c5f1751b290d38409febd1
3
+ size 1280309
one_stop_english/raft-train.parquet ADDED
Binary file (136 kB). View file
 
overruling/raft-test.parquet ADDED
Binary file (273 kB). View file
 
overruling/raft-train.parquet ADDED
Binary file (7.38 kB). View file
 
raft.py DELETED
@@ -1,295 +0,0 @@
1
- # coding=utf-8
2
- # Copyright 2020 The HuggingFace Datasets Authors and the current dataset script contributor.
3
- #
4
- # Licensed under the Apache License, Version 2.0 (the "License");
5
- # you may not use this file except in compliance with the License.
6
- # You may obtain a copy of the License at
7
- #
8
- # http://www.apache.org/licenses/LICENSE-2.0
9
- #
10
- # Unless required by applicable law or agreed to in writing, software
11
- # distributed under the License is distributed on an "AS IS" BASIS,
12
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
- # See the License for the specific language governing permissions and
14
- # limitations under the License.
15
-
16
- import csv
17
- import json
18
- import os
19
- from pathlib import Path
20
-
21
- import datasets
22
-
23
- # TODO: Add BibTeX citation
24
- _CITATION = """\
25
- @InProceedings{huggingface:dataset,
26
- title = {A great new dataset},
27
- author={huggingface, Inc.
28
- },
29
- year={2020}
30
- }
31
- """
32
-
33
- _DESCRIPTION = """Large pre-trained language models have shown promise for few-shot learning, completing text-based tasks given only a few task-specific examples. Will models soon solve classification tasks that have so far been reserved for human research assistants?
34
-
35
- [RAFT](https://raft.elicit.org) is a few-shot classification benchmark that tests language models:
36
-
37
- - across multiple domains (lit review, tweets, customer interaction, etc.)
38
- - on economically valuable classification tasks (someone inherently cares about the task)
39
- - in a setting that mirrors deployment (50 examples per task, info retrieval allowed, hidden test set)
40
- """
41
-
42
- _HOMEPAGE = "https://raft.elicit.org"
43
-
44
- # TODO: Add the licence for the dataset here if you can find it
45
- _LICENSE = ""
46
-
47
- DATA_DIR = "data/"
48
- TASKS = {
49
- "ade_corpus_v2": {
50
- "name": "ade_corpus_v2",
51
- "description": "",
52
- "data_columns": ["Sentence", "ID"],
53
- "label_columns": {"Label": ["ADE-related", "not ADE-related"]},
54
- },
55
- "banking_77": {
56
- "name": "banking_77",
57
- "description": "",
58
- "data_columns": ["Query", "ID"],
59
- "label_columns": {
60
- "Label": [
61
- "Refund_not_showing_up",
62
- "activate_my_card",
63
- "age_limit",
64
- "apple_pay_or_google_pay",
65
- "atm_support",
66
- "automatic_top_up",
67
- "balance_not_updated_after_bank_transfer",
68
- "balance_not_updated_after_cheque_or_cash_deposit",
69
- "beneficiary_not_allowed",
70
- "cancel_transfer",
71
- "card_about_to_expire",
72
- "card_acceptance",
73
- "card_arrival",
74
- "card_delivery_estimate",
75
- "card_linking",
76
- "card_not_working",
77
- "card_payment_fee_charged",
78
- "card_payment_not_recognised",
79
- "card_payment_wrong_exchange_rate",
80
- "card_swallowed",
81
- "cash_withdrawal_charge",
82
- "cash_withdrawal_not_recognised",
83
- "change_pin",
84
- "compromised_card",
85
- "contactless_not_working",
86
- "country_support",
87
- "declined_card_payment",
88
- "declined_cash_withdrawal",
89
- "declined_transfer",
90
- "direct_debit_payment_not_recognised",
91
- "disposable_card_limits",
92
- "edit_personal_details",
93
- "exchange_charge",
94
- "exchange_rate",
95
- "exchange_via_app",
96
- "extra_charge_on_statement",
97
- "failed_transfer",
98
- "fiat_currency_support",
99
- "get_disposable_virtual_card",
100
- "get_physical_card",
101
- "getting_spare_card",
102
- "getting_virtual_card",
103
- "lost_or_stolen_card",
104
- "lost_or_stolen_phone",
105
- "order_physical_card",
106
- "passcode_forgotten",
107
- "pending_card_payment",
108
- "pending_cash_withdrawal",
109
- "pending_top_up",
110
- "pending_transfer",
111
- "pin_blocked",
112
- "receiving_money",
113
- "request_refund",
114
- "reverted_card_payment?",
115
- "supported_cards_and_currencies",
116
- "terminate_account",
117
- "top_up_by_bank_transfer_charge",
118
- "top_up_by_card_charge",
119
- "top_up_by_cash_or_cheque",
120
- "top_up_failed",
121
- "top_up_limits",
122
- "top_up_reverted",
123
- "topping_up_by_card",
124
- "transaction_charged_twice",
125
- "transfer_fee_charged",
126
- "transfer_into_account",
127
- "transfer_not_received_by_recipient",
128
- "transfer_timing",
129
- "unable_to_verify_identity",
130
- "verify_my_identity",
131
- "verify_source_of_funds",
132
- "verify_top_up",
133
- "virtual_card_not_working",
134
- "visa_or_mastercard",
135
- "why_verify_identity",
136
- "wrong_amount_of_cash_received",
137
- "wrong_exchange_rate_for_cash_withdrawal",
138
- ]
139
- },
140
- },
141
- "terms_of_service": {
142
- "name": "terms_of_service",
143
- "description": "",
144
- "data_columns": ["Sentence", "ID"],
145
- "label_columns": {"Label": ["not potentially unfair", "potentially unfair"]},
146
- },
147
- "tai_safety_research": {
148
- "name": "tai_safety_research",
149
- "description": "",
150
- "data_columns": [
151
- "Title",
152
- "Abstract Note",
153
- "Url",
154
- "Publication Year",
155
- "Item Type",
156
- "Author",
157
- "Publication Title",
158
- "ID",
159
- ],
160
- "label_columns": {"Label": ["TAI safety research", "not TAI safety research"]},
161
- },
162
- "neurips_impact_statement_risks": {
163
- "name": "neurips_impact_statement_risks",
164
- "description": "",
165
- "data_columns": ["Paper title", "Paper link", "Impact statement", "ID"],
166
- "label_columns": {"Label": ["doesn't mention a harmful application", "mentions a harmful application"]},
167
- },
168
- "overruling": {
169
- "name": "overruling",
170
- "description": "",
171
- "data_columns": ["Sentence", "ID"],
172
- "label_columns": {"Label": ["not overruling", "overruling"]},
173
- },
174
- "systematic_review_inclusion": {
175
- "name": "systematic_review_inclusion",
176
- "description": "",
177
- "data_columns": ["Title", "Abstract", "Authors", "Journal", "ID"],
178
- "label_columns": {"Label": ["included", "not included"]},
179
- },
180
- "one_stop_english": {
181
- "name": "one_stop_english",
182
- "description": "",
183
- "data_columns": ["Article", "ID"],
184
- "label_columns": {"Label": ["advanced", "elementary", "intermediate"]},
185
- },
186
- "tweet_eval_hate": {
187
- "name": "tweet_eval_hate",
188
- "description": "",
189
- "data_columns": ["Tweet", "ID"],
190
- "label_columns": {"Label": ["hate speech", "not hate speech"]},
191
- },
192
- "twitter_complaints": {
193
- "name": "twitter_complaints",
194
- "description": "",
195
- "data_columns": ["Tweet text", "ID"],
196
- "label_columns": {"Label": ["complaint", "no complaint"]},
197
- },
198
- "semiconductor_org_types": {
199
- "name": "semiconductor_org_types",
200
- "description": "",
201
- "data_columns": ["Paper title", "Organization name", "ID"],
202
- "label_columns": {"Label": ["company", "research institute", "university"]},
203
- },
204
- }
205
-
206
- _URLs = {s: {"train": f"{DATA_DIR}{s}/train.csv", "test": f"{DATA_DIR}{s}/test_unlabeled.csv"} for s in TASKS}
207
-
208
-
209
- class Raft(datasets.GeneratorBasedBuilder):
210
- """RAFT Dataset"""
211
- VERSION = datasets.Version("1.1.0")
212
- BUILDER_CONFIGS = []
213
-
214
- for key in TASKS:
215
- td = TASKS[key]
216
- name = td["name"]
217
- description = td["description"]
218
- BUILDER_CONFIGS.append(datasets.BuilderConfig(name=name, version=VERSION, description=description))
219
-
220
- DEFAULT_CONFIG_NAME = (
221
- "tai_safety_research" # It's not mandatory to have a default configuration. Just use one if it make sense.
222
- )
223
-
224
- def _info(self):
225
- DEFAULT_LABEL_NAME = "Unlabeled"
226
-
227
- task = TASKS[self.config.name]
228
- data_columns = {col_name: (datasets.Value("string") if col_name != "ID" else datasets.Value("int32")) for col_name in task["data_columns"]}
229
-
230
- label_columns = {}
231
- for label_name in task["label_columns"]:
232
- labels = [DEFAULT_LABEL_NAME] + task["label_columns"][label_name]
233
- label_columns[label_name] = datasets.ClassLabel(len(labels), labels)
234
-
235
- # Merge dicts
236
- features = datasets.Features(**data_columns, **label_columns)
237
-
238
- return datasets.DatasetInfo(
239
- # This is the description that will appear on the datasets page.
240
- description=_DESCRIPTION,
241
- # This defines the different columns of the dataset and their types
242
- features=features, # Here we define them above because they are different between the two configurations
243
- # If there's a common (input, target) tuple from the features,
244
- # specify them here. They'll be used if as_supervised=True in
245
- # builder.as_dataset.
246
- supervised_keys=None,
247
- # Homepage of the dataset for documentation
248
- homepage=_HOMEPAGE,
249
- # License for the dataset if available
250
- license=_LICENSE,
251
- # Citation for the dataset
252
- citation=_CITATION,
253
- )
254
-
255
- def _split_generators(self, dl_manager):
256
- """Returns SplitGenerators."""
257
- # TODO: This method is tasked with downloading/extracting the data and defining the splits depending on the configuration
258
- # If several configurations are possible (listed in BUILDER_CONFIGS), the configuration selected by the user is in self.config.name
259
-
260
- # dl_manager is a datasets.download.DownloadManager that can be used to download and extract URLs
261
- # It can accept any type or nested list/dict and will give back the same structure with the url replaced with path to local files.
262
- # By default the archives will be extracted and a path to a cached folder where they are extracted is returned instead of the archive
263
- data_dir = dl_manager.download_and_extract(_URLs)
264
- dataset = self.config.name
265
- return [
266
- datasets.SplitGenerator(
267
- name=datasets.Split.TRAIN, gen_kwargs={"filepath": data_dir[dataset]["train"], "split": "train"}
268
- ),
269
- datasets.SplitGenerator(
270
- name=datasets.Split.TEST, gen_kwargs={"filepath": data_dir[dataset]["test"], "split": "test"}
271
- ),
272
- ]
273
-
274
- def _generate_examples(
275
- self, filepath, split # method parameters are unpacked from `gen_kwargs` as given in `_split_generators`
276
- ):
277
- """Yields examples as (key, example) tuples."""
278
- # This method handles input defined in _split_generators to yield (key, example) tuples from the dataset.
279
- # The `key` is here for legacy reason (tfds) and is not important in itself.
280
-
281
- task = TASKS[self.config.name]
282
- labels = list(task["label_columns"])
283
-
284
- with open(filepath, encoding="utf-8") as f:
285
- csv_reader = csv.reader(f, quotechar='"', delimiter=",", quoting=csv.QUOTE_ALL, skipinitialspace=True)
286
- column_names = next(csv_reader)
287
- # Test csvs don't have any label columns.
288
- if split == "test":
289
- column_names += labels
290
-
291
- for id_, row in enumerate(csv_reader):
292
- if split == "test":
293
- row += ["Unlabeled"] * len(labels)
294
- # dicts don't have inherent ordering in python, right??
295
- yield id_, {name: value for name, value in zip(column_names, row)}
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
semiconductor_org_types/raft-test.parquet ADDED
Binary file (45.6 kB). View file
 
semiconductor_org_types/raft-train.parquet ADDED
Binary file (8.74 kB). View file