Probabilistic approach to word meaning

Can machines ‘learn’ word meanings just from lots of textual examples? There has been quite a lot of research into this (see Wikipedia intro), all based on the idea that different meanings tend to show up in rather different contexts eg. move the mouse till the cursor … dissect the mouse and extract its DNA … There is a code … Read more

Automatic 3D Bone fragment reconstruction

Reassembly of archeological artifact fragments requires considerable time and manual effort for researchers along with a necessity to handle potentially fragile material. It would therefore be advantageous for this process to be automatic. In this project we will work on creating a method for matching 3D scans of ancient animal bone fragments in order to … Read more

Counterfactual explanations for Explainable and Trustworthy Reinforcement Learning

Explanations targeted at non-expert users of AI systems are necessary to encourage collaboration and ensure user trust in the black-box system. Counterfactuals are user-friendly explanations that offer the user actionable advice on how to change their input features in order to achieve a desired output. While researched in depth in supervised learning, counterfactual explanationsare seldom … Read more

TAKEN: Tense and aspect under finite-state methods

Tense and aspect are important considerations for temporal reasoning in natural language processing (Jurafsky and Martin 2023, chapter 22). The entry for tense and aspect in the Stanford Encyclopedia of Philosophy provides a useful overview of the subject, ranging over reference points, Aktionsart and inertia. The aim of this project is to encode these ideas … Read more

Big data analytics and Real time Applications

Big data is being collected almost everywhere: weather data, especially for airline transportation, can be collected every microsecond or even less as there reliable and cheap hardware technology to do so. You might have heard of algorithmic trading where computers trade against each other, of facilitate humans to do so, by generating data every microsecond … Read more

Simulation and modelling of cyberattacks on public infrastructures

All future technologies will rely more than ever before on energy, telecommunications, and transportation networks. Smart meters provide greater control of energy usage by customers but at the same time makes the whole energy supply network vulnerable to attacks by false data injection via smart meters. Diversity of energy sources, wind, solar, waves, optical reflectors, … Read more