【摘 要】
:
Dialogue state tracking(DST)leverages dialogue information to predict dialogues states which are generally represented as slot-value pairs.However,previous work usually has limitations to efficiently predict values due to the lack of a powerful strategy f
【机 构】
:
National Laboratory of Pattern Recognition,Institute of Automation,Chinese Academy of Sciences,Beiji
论文部分内容阅读
Dialogue state tracking(DST)leverages dialogue information to predict dialogues states which are generally represented as slot-value pairs.However,previous work usually has limitations to efficiently predict values due to the lack of a powerful strategy for generating values from both the dialogue history and the predefined values.By predicting values from the predefined value set,previous discriminative DST methods are difficult to handle unknown values.Previous generative DST methods determine values based on mentions in the dialogue history,which makes it difficult for them to handle uncovered and non-pointable mentions.Besides,existing generative DST methods usually ignore the unlabeled instances and suffer from the label noise problem,which limits the generation of mentions and eventually hurts performance.In this paper,we propose a unified shared-private network(USPN) to generate values from both the dialogue history and the predefined values through a unified strategy.Specifically,USPN uses an encoder to construct a complete generative space for each slot and to discern shared information between slots through a shared-private architecture.Then,our model predicts values from the generative space through a shared-private decoder.We further utilize reinforcement learning to alleviate the label noise problem by learning indirect supervision from semantic relations between conversational words and predefined slot-value pairs.Experimental results on three public datasets show the effectiveness of USPN by outperforming state-of-the-art baselines in both supervised and unsupervised DST tasks.
其他文献
Modern multiprocessors deploy a variety of weak memory models(WMMs).Total Store Order(TSO) is a widely-used weak memory model in SPARC implementations and x86 architecture.It omits the store-load constraint by allowing each core to employ a write buffer.I
利用关系数据进行股价预测的方法最近已经被提出,但目前还没有找到一种有效的方法可以有选择地聚合不同类型的关系数据去预测股价.提出一种改进的多层节点图注意力网络(FHAN)模型,该方法融合Fraudar算法,提供了一种对多个对象关系之间看问题的视角.模型把公司看做节点,把交互看成边,选择性地聚合不同关系类型的信息,并将这些信息添加到每个公司的节点表示中,添加了信息的节点表示被输入到特定任务层自动选择信息,实验结果表明,该方法比目前流行的神经网络算法在股价预测的效果上更准确,实验选取不同神经网络算法做对比,在最
As a continuation of previous years\'special section on software systems,this special section encourages and promotes research to address challenges from the perspective of software systems.The goal of this special section is to present state-of-the-art
Many applications need to meet diverse requirements of a large-scale distributed user group.That challenges the current requirements engineering techniques.Crowd-based requirements engineering was proposed as an umbrella term for dealing with the requirem
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face in-creasingly serious cyber threats.In this paper,we propose a novel PLC-compatible software-based defense mechanism,called Heterogeneous Redundant Proact
Allocation,dereferencing,and freeing of memory data in kernels are coherently linked.There widely exist real cases where the correctness of memory is compromised.This incorrectness in kernel memory brings about significant security issues,e.g.,information
A quantum circuit is a computational unit that transforms an input quantum state to an output state.A natural way to reason about its behavior is to compute explicitly the unitary matrix implemented by it.However,when the number of qubits increases,the ma
Contextual refinement is a compositional approach to compositional verification of concurrent objects.There has been much work designing program logics to prove the contextual refinement between the object implementation and its abstract specification.How
The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe conditions.If a security-sensitive operation is unchecked,a missing-check issue arises.Missing check is a class of severe b
Graph neural networks(GNNs) have shown great power in learning on graphs.However,it is still a challenge for GNNs to model information faraway from the source node.The ability to preserve global information can enhance graph representation and hence impro