pszemraj commited on
Commit
8528f53
1 Parent(s): ac5bb68

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +186 -10
README.md CHANGED
@@ -1,18 +1,189 @@
1
  ---
2
- license: bsd-3-clause
3
- tags:
4
- - generated_from_trainer
5
- model-index:
6
- - name: model-checkpoints
7
- results: []
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8
  ---
9
 
10
- <!-- This model card has been generated automatically according to the information the Trainer had access to. You
11
- should probably proofread and complete it, then remove this comment. -->
12
 
13
- # model-checkpoints
14
 
15
- This model is a fine-tuned version of [pszemraj/pegasus-x-large-booksum-WIP2](https://huggingface.co/pszemraj/pegasus-x-large-booksum-WIP2) on the kmfoda/booksum dataset.
16
 
17
  ## Model description
18
 
@@ -30,6 +201,11 @@ More information needed
30
 
31
  ### Training hyperparameters
32
 
 
 
 
 
 
33
  The following hyperparameters were used during training:
34
  - learning_rate: 6e-05
35
  - train_batch_size: 4
 
1
  ---
2
+ languages: en
3
+ license:
4
+ - apache-2.0
5
+ - bsd-3-clause
6
+ datasets:
7
+ - kmfoda/booksum
8
+ metrics:
9
+ - rouge
10
+ widget:
11
+ - text: large earthquakes along a given fault segment do not occur at random intervals
12
+ because it takes time to accumulate the strain energy for the rupture. The rates
13
+ at which tectonic plates move and accumulate strain at their boundaries are approximately
14
+ uniform. Therefore, in first approximation, one may expect that large ruptures
15
+ of the same fault segment will occur at approximately constant time intervals.
16
+ If subsequent main shocks have different amounts of slip across the fault, then
17
+ the recurrence time may vary, and the basic idea of periodic mainshocks must be
18
+ modified. For great plate boundary ruptures the length and slip often vary by
19
+ a factor of 2. Along the southern segment of the San Andreas fault the recurrence
20
+ interval is 145 years with variations of several decades. The smaller the standard
21
+ deviation of the average recurrence interval, the more specific could be the long
22
+ term prediction of a future mainshock.
23
+ example_title: earthquakes
24
+ - text: " A typical feed-forward neural field algorithm. Spatiotemporal coordinates\
25
+ \ are fed into a neural network that predicts values in the reconstructed domain.\
26
+ \ Then, this domain is mapped to the sensor domain where sensor measurements are\
27
+ \ available as supervision. Class and Section Problems Addressed Generalization\
28
+ \ (Section 2) Inverse problems, ill-posed problems, editability; symmetries. Hybrid\
29
+ \ Representations (Section 3) Computation & memory efficiency, representation\
30
+ \ capacity, editability: Forward Maps (Section 4) Inverse problems Network Architecture\
31
+ \ (Section 5) Spectral bias, integration & derivatives. Manipulating Neural Fields\
32
+ \ (Section 6) Edit ability, constraints, regularization. Table 2: The five classes\
33
+ \ of techniques in the neural field toolbox each addresses problems that arise\
34
+ \ in learning, inference, and control. (Section 3). We can supervise reconstruction\
35
+ \ via differentiable forward maps that transform Or project our domain (e.g, 3D\
36
+ \ reconstruction via 2D images; Section 4) With appropriate network architecture\
37
+ \ choices, we can overcome neural network spectral biases (blurriness) and efficiently\
38
+ \ compute derivatives and integrals (Section 5). Finally, we can manipulate neural\
39
+ \ fields to add constraints and regularizations, and to achieve editable representations\
40
+ \ (Section 6). Collectively, these classes constitute a 'toolbox' of techniques\
41
+ \ to help solve problems with neural fields There are three components in a conditional\
42
+ \ neural field: (1) An encoder or inference function \u20AC that outputs the conditioning\
43
+ \ latent variable 2 given an observation 0 E(0) =2. 2 is typically a low-dimensional\
44
+ \ vector, and is often referred to aS a latent code Or feature code_ (2) A mapping\
45
+ \ function 4 between Z and neural field parameters O: Y(z) = O; (3) The neural\
46
+ \ field itself $. The encoder \u20AC finds the most probable z given the observations\
47
+ \ O: argmaxz P(2/0). The decoder maximizes the inverse conditional probability\
48
+ \ to find the most probable 0 given Z: arg- max P(Olz). We discuss different encoding\
49
+ \ schemes with different optimality guarantees (Section 2.1.1), both global and\
50
+ \ local conditioning (Section 2.1.2), and different mapping functions Y (Section\
51
+ \ 2.1.3) 2. Generalization Suppose we wish to estimate a plausible 3D surface\
52
+ \ shape given a partial or noisy point cloud. We need a suitable prior over the\
53
+ \ sur- face in its reconstruction domain to generalize to the partial observations.\
54
+ \ A neural network expresses a prior via the function space of its architecture\
55
+ \ and parameters 0, and generalization is influenced by the inductive bias of\
56
+ \ this function space (Section 5)."
57
+ example_title: scientific paper
58
+ - text: 'Is a else or outside the cob and tree written being of early client rope
59
+ and you have is for good reasons. On to the ocean in Orange for time. By''s the
60
+ aggregate we can bed it yet. Why this please pick up on a sort is do and also
61
+ M Getoi''s nerocos and do rain become you to let so is his brother is made in
62
+ use and Mjulia''s''s the lay major is aging Masastup coin present sea only of
63
+ Oosii rooms set to you We do er do we easy this private oliiishs lonthen might
64
+ be okay. Good afternoon everybody. Welcome to this lecture of Computational Statistics.
65
+ As you can see, I''m not socially my name is Michael Zelinger. I''m one of the
66
+ task for this class and you might have already seen me in the first lecture where
67
+ I made a quick appearance. I''m also going to give the tortillas in the last third
68
+ of this course. So to give you a little bit about me, I''m a old student here
69
+ with better Bulman and my research centres on casual inference applied to biomedical
70
+ disasters, so that could be genomics or that could be hospital data. If any of
71
+ you is interested in writing a bachelor thesis, a semester paper may be mastathesis
72
+ about this topic feel for reach out to me. you have my name on models and my email
73
+ address you can find in the directory I''d Be very happy to talk about it. you
74
+ do not need to be sure about it, we can just have a chat. So with that said, let''s
75
+ get on with the lecture. There''s an exciting topic today I''m going to start
76
+ by sharing some slides with you and later on during the lecture we''ll move to
77
+ the paper. So bear with me for a few seconds. Well, the projector is starting
78
+ up. Okay, so let''s get started. Today''s topic is a very important one. It''s
79
+ about a technique which really forms one of the fundamentals of data science,
80
+ machine learning, and any sort of modern statistics. It''s called cross validation.
81
+ I know you really want to understand this topic I Want you to understand this
82
+ and frankly, nobody''s gonna leave Professor Mineshousen''s class without understanding
83
+ cross validation. So to set the stage for this, I Want to introduce you to the
84
+ validation problem in computational statistics. So the problem is the following:
85
+ You trained a model on available data. You fitted your model, but you know the
86
+ training data you got could always have been different and some data from the
87
+ environment. Maybe it''s a random process. You do not really know what it is,
88
+ but you know that somebody else who gets a different batch of data from the same
89
+ environment they would get slightly different training data and you do not care
90
+ that your method performs as well. On this training data. you want to to perform
91
+ well on other data that you have not seen other data from the same environment.
92
+ So in other words, the validation problem is you want to quantify the performance
93
+ of your model on data that you have not seen. So how is this even possible? How
94
+ could you possibly measure the performance on data that you do not know The solution
95
+ to? This is the following realization is that given that you have a bunch of data,
96
+ you were in charge. You get to control how much that your model sees. It works
97
+ in the following way: You can hide data firms model. Let''s say you have a training
98
+ data set which is a bunch of doubtless so X eyes are the features those are typically
99
+ hide and national vector. It''s got more than one dimension for sure. And the
100
+ why why eyes. Those are the labels for supervised learning. As you''ve seen before,
101
+ it''s the same set up as we have in regression. And so you have this training
102
+ data and now you choose that you only use some of those data to fit your model.
103
+ You''re not going to use everything, you only use some of it the other part you
104
+ hide from your model. And then you can use this hidden data to do validation from
105
+ the point of you of your model. This hidden data is complete by unseen. In other
106
+ words, we solve our problem of validation.'
107
+ example_title: transcribed audio - lecture
108
+ - text: "Transformer-based models have shown to be very useful for many NLP tasks.\
109
+ \ However, a major limitation of transformers-based models is its O(n^2)O(n 2)\
110
+ \ time & memory complexity (where nn is sequence length). Hence, it's computationally\
111
+ \ very expensive to apply transformer-based models on long sequences n > 512n>512.\
112
+ \ Several recent papers, e.g. Longformer, Performer, Reformer, Clustered attention\
113
+ \ try to remedy this problem by approximating the full attention matrix. You can\
114
+ \ checkout \U0001F917's recent blog post in case you are unfamiliar with these\
115
+ \ models.\nBigBird (introduced in paper) is one of such recent models to address\
116
+ \ this issue. BigBird relies on block sparse attention instead of normal attention\
117
+ \ (i.e. BERT's attention) and can handle sequences up to a length of 4096 at a\
118
+ \ much lower computational cost compared to BERT. It has achieved SOTA on various\
119
+ \ tasks involving very long sequences such as long documents summarization, question-answering\
120
+ \ with long contexts.\nBigBird RoBERTa-like model is now available in \U0001F917\
121
+ Transformers. The goal of this post is to give the reader an in-depth understanding\
122
+ \ of big bird implementation & ease one's life in using BigBird with \U0001F917\
123
+ Transformers. But, before going into more depth, it is important to remember that\
124
+ \ the BigBird's attention is an approximation of BERT's full attention and therefore\
125
+ \ does not strive to be better than BERT's full attention, but rather to be more\
126
+ \ efficient. It simply allows to apply transformer-based models to much longer\
127
+ \ sequences since BERT's quadratic memory requirement quickly becomes unbearable.\
128
+ \ Simply put, if we would have \u221E compute & \u221E time, BERT's attention\
129
+ \ would be preferred over block sparse attention (which we are going to discuss\
130
+ \ in this post).\nIf you wonder why we need more compute when working with longer\
131
+ \ sequences, this blog post is just right for you!\nSome of the main questions\
132
+ \ one might have when working with standard BERT-like attention include:\nDo all\
133
+ \ tokens really have to attend to all other tokens? Why not compute attention\
134
+ \ only over important tokens? How to decide what tokens are important? How to\
135
+ \ attend to just a few tokens in a very efficient way? In this blog post, we will\
136
+ \ try to answer those questions.\nWhat tokens should be attended to? We will give\
137
+ \ a practical example of how attention works by considering the sentence 'BigBird\
138
+ \ is now available in HuggingFace for extractive question answering'. In BERT-like\
139
+ \ attention, every word would simply attend to all other tokens.\nLet's think\
140
+ \ about a sensible choice of key tokens that a queried token actually only should\
141
+ \ attend to by writing some pseudo-code. Will will assume that the token available\
142
+ \ is queried and build a sensible list of key tokens to attend to.\n>>> # let's\
143
+ \ consider following sentence as an example >>> example = ['BigBird', 'is', 'now',\
144
+ \ 'available', 'in', 'HuggingFace', 'for', 'extractive', 'question', 'answering']\n\
145
+ >>> # further let's assume, we're trying to understand the representation of 'available'\
146
+ \ i.e. >>> query_token = 'available' >>> # We will initialize an empty `set` and\
147
+ \ fill up the tokens of our interest as we proceed in this section. >>> key_tokens\
148
+ \ = [] # => currently 'available' token doesn't have anything to attend Nearby\
149
+ \ tokens should be important because, in a sentence (sequence of words), the current\
150
+ \ word is highly dependent on neighboring past & future tokens. This intuition\
151
+ \ is the idea behind the concept of sliding attention."
152
+ example_title: bigbird blog intro
153
+ - text: "To be fair, you have to have a very high IQ to understand Rick and Morty.\
154
+ \ The humour is extremely subtle, and without a solid grasp of theoretical physics\
155
+ \ most of the jokes will go over a typical viewer's head. There's also Rick's\
156
+ \ nihilistic outlook, which is deftly woven into his characterisation- his personal\
157
+ \ philosophy draws heavily from Narodnaya Volya literature, for instance. The\
158
+ \ fans understand this stuff; they have the intellectual capacity to truly appreciate\
159
+ \ the depths of these jokes, to realise that they're not just funny- they say\
160
+ \ something deep about LIFE. As a consequence people who dislike Rick & Morty\
161
+ \ truly ARE idiots- of course they wouldn't appreciate, for instance, the humour\
162
+ \ in Rick's existential catchphrase 'Wubba Lubba Dub Dub,' which itself is a cryptic\
163
+ \ reference to Turgenev's Russian epic Fathers and Sons. I'm smirking right now\
164
+ \ just imagining one of those addlepated simpletons scratching their heads in\
165
+ \ confusion as Dan Harmon's genius wit unfolds itself on their television screens.\
166
+ \ What fools.. how I pity them. \U0001F602\nAnd yes, by the way, i DO have a Rick\
167
+ \ & Morty tattoo. And no, you cannot see it. It's for the ladies' eyes only- and\
168
+ \ even then they have to demonstrate that they're within 5 IQ points of my own\
169
+ \ (preferably lower) beforehand. Nothin personnel kid \U0001F60E"
170
+ example_title: Richard & Mortimer
171
+ parameters:
172
+ max_length: 64
173
+ min_length: 8
174
+ no_repeat_ngram_size: 3
175
+ early_stopping: true
176
+ repetition_penalty: 3.5
177
+ length_penalty: 0.3
178
+ encoder_no_repeat_ngram_size: 3
179
+ num_beams: 4
180
  ---
181
 
182
+ # pszemraj/pegasus-x-large-book-summary
 
183
 
184
+ [![colab](https://colab.research.google.com/assets/colab-badge.svg)](https://colab.research.google.com/gist/pszemraj/fbc04a81a305b3f98ee0855835fef9aa/pegasus-x-large-booksum-demo.ipynb)
185
 
186
+ This model is a fine-tuned version of [google/pegasus-x-large](https://huggingface.co/google/pegasus-x-large) on the `kmfoda/booksum` dataset for approx six epochs.
187
 
188
  ## Model description
189
 
 
201
 
202
  ### Training hyperparameters
203
 
204
+ #### Epochs 1-4
205
+
206
+ TODO
207
+
208
+ #### Epochs 5 & 6
209
  The following hyperparameters were used during training:
210
  - learning_rate: 6e-05
211
  - train_batch_size: 4