Capturing Covertly Toxic Speech Via Crowdsourcing

Total Page:16

File Type:pdf, Size:1020Kb

Capturing Covertly Toxic Speech Via Crowdsourcing Capturing Covertly Toxic Speech via Crowdsourcing Jorge Nario Alyssa Lees Google Jigsaw [email protected] [email protected] Ian D. Kivlichan Daniel Borkan Nitesh Goyal Jigsaw Jigsaw Jigsaw [email protected] [email protected] [email protected] Abstract Previous works have published baseline toxic- ity detection datasets (Borkan et al., 2019; Wul- We study the task of labeling covert or veiled toxicity in online conversations. Prior re- czyn et al., 2016) along with models for detecting search has highlighted the difficulty in creat- such content (Jigsaw, 2017; Zampieri et al., 2019; ing language models that recognize nuanced Schmidt and Wiegand, 2017; Pavlopoulos et al., toxicity such as microaggressions. Our in- 2020; Georgakopoulos et al., 2018). vestigations further underscore the difficulty However, (Han and Tsvetkov, 2020) recently in parsing such labels reliably from raters via crowdsourcing. We introduce an initial established that covert or veiled toxicity is over- dataset, COVERTTOXICITY, which aims to whelmingly misclassified by leading models. Per- identify and categorize such comments from spective, a free API that uses machine learning to a refined rater template. Finally, we fine- score comments for toxicity, is widely used to aid tune a comment-domain BERT model to clas- content moderators on online platforms (Jigsaw, sify covertly offensive comments and compare 2017). As example, the deeply offensive comment against existing baselines. masked as humor “What’s the difference between 1 Introduction boy scouts and Jews? Boy scouts come back from camp.” is assigned a toxicity probability score Warning: this paper contains content that may be of 0.31 by Perspective. Such comments can be offensive or upsetting. as harmful to participants as more overt toxicity Tools identifying toxic content are essential for (Nadal et al., 2014). moderation of problematic online conversations Covert toxicity is an umbrella term which in- (Jigsaw, 2018). Generally, “toxic” is an umbrella cludes types of toxicity that may not be imme- label for various types of disrespectful comments, diately obvious. Covertly toxic comments may including but not limited to identity attacks, pro- use obfuscation, code words, suggestive emojis, fanity and threats, that could encourage a user to dark humor, or sarcasm. It also includes subtle ag- leave a conversation. Besides, ”toxicity”, other gression, such as the user comment “‘slurp slurp”, terms like ”hate-speech”, and ”online violence” says Chang’, which contains a stereotype regard- have also been used to refer to similar problems ing Asian individuals. Microaggressions may be (Chandrasekharan et al., 2017) - yet no single con- unintentional but can have profound psychological clusive definition exists. In this work, we chose to repercussions in aggregate (Sue et al., 2007a; Jack- use ”toxicity” because our research suggests that son, 2011; Sue et al., 2007b; Stryker and Burke, ”toxicity” is an easy concept for annotators to un- 2000). derstand, meaning we can gather opinions from a diverse range of people, allowing us to capture the In this work, we seek to close the gap in toxicity inherent subjectivity of the concept. In other words, models. Our two main contributions include: it was easier for more people to agree on what con- • A custom crowd-sourcing instruction template stituted “toxic” speech—comments likely to make to identify covert toxicity someone leave a conversation—than it was for peo- • A benchmark dataset for identifying covert ple to agree on other terms to describe problematic toxicity. comments.1 • An enhanced toxicity model with improved 1https://jigsaw.google.com/the-current/toxicity/ performance in covert/veiled toxicity. 14 Proceedings of the First Workshop on Bridging Human–Computer Interaction and Natural Language Processing, pages 14–20 April 20, 2021. ©2021 Association for Computational Linguistics 2 Related Work • Sarcasm/Humor Offensive content in the context of a joke Ogbonnaya-Ogburu et al.(2020) provides a call for • Masked Harm Implied harm or threats race-conscious efforts within the human-computer masked by seemingly inoffensive language interaction community. For example, Dosono and Semaan(2019) argues that Asian American Pacific 3.1 Crowdsourcing Data Collection Islander online community members need support. Further Aroyo et al.(2019) points out that the per- We iterated on versions of an instruction templates ceived toxicity of a comment is influenced by a va- to assist raters in identifying covertly toxic lan- riety of factors not limited to cultural background, guage with high precision. Previous work by Hube rater bias, context and cognitive bias. (2020) on biases and crowdworker annotations, il- In particular, some of these efforts include explo- luminated relevant findings for the templates: rations of microaggressions in social media posts • Ask crowdworkers to reflect and put them- (Breitfeller et al., 2019; Dosono and Semaan, 2019) selves in the shoes of participant with disadvantaged groups, surfacing contextual • Encourage crowdworkers to critically think hate speech or words (Taylor et al., 2017) that about the task prior to engagement. have alternate meanings or veiled toxicity like code- words, adversarially generated or novel forms of As such, two priming questions, see Table 3.1, were offense (Jain et al., 2018), and exploring humor added in the final template. Note to improve rater used as a tool for propagating hate (Billig, 2001). comprehension we refer to covert and overt toxicity Small datasets exist (Breitfeller et al., 2019) as implicit and explicit, respectively.See Figure1 specifically for exploring microaggressions in on- for an example. line conversations. The Social Bias Inference Overtly Offensive Rule Corpus (SBIC), a dataset of social media posts Overt offenses occur when text has some with structured annotations of thousands of demo- words that are clearly toxic and requires no graphic groups (Sap et al., 2019) is another exam- hidden meaning interpretation. ple. To filter such datasets for veiled toxicity, Han Can you think of a word/phrase that is and Tsvetkov(2020) proposed a procedure using clearly spelled or mis-spelled using toxic probing examples. vocabulary, or is threatening? Our paper builds on previous work with a strat- egy for consistently rating covertly toxic content, Covertly Offensive Rule a shared dataset for training, and a baseline covert Covert offenses occur when text has some toxicity model. words that might have hidden meanings or relevance to a community. 3 Covert Toxicity Can you think of a community or members In order to formulate a covertly toxic dataset, we of a community that might be targeted by first extracted a set of candidate comments from the use of words/phrases or might find text CivilCommentsIdentities dataset (Borkan et al., derogatory without explicitly calling out 2019) as described in Section 4.1. We manually la- on them? beled a random sample of these comments, seeking those which could have a negative impact on online The addition of priming questions significantly conversations, but were frequently missed by raters. improved rater performance. In an initial iteration, From this sample, we defined broad categories of a test question of the overtly toxic comment “Peter covert toxicity types. See Figure1 for an example. is an idiot”, had a 43% miss rate by raters. The • Microaggression Subtle discrimination to- miss rate dropped to 5% with priming questions. wards an identity group However, raters still frequently missed com- • Obfuscation Hidden toxicity via intentional ments containing stereotypes, identity attacks and misspellings, coded words, or implied refer- veiled threats. As such, we reconfigured the tem- ences plate instructions (see Figure1) to include a table • Emoticons/Emojis Toxic usage of non-text outlining different types of toxicity with examples. symbols Desired rater accuracy again improved. 15 (b) B. Template for labeling covert toxicity (a) A. Instructions for identifying implicitly (covertly) toxic comments versus explicit toxicity Figure 1: Rater Instructions and Template Rater Classification Count % cific identity terms (e.g. gender, religion, or sexual Not Sure 4457 1.4 orientation). Overtly Offensive 34094 10.8 A limitation of using this dataset is that the com- Covertly Offensive 120314 38.1 ments are directly targeted towards news related Not Offensive 157259 49.7 content. As such, this work should not be gener- alized for other types of online forums, such as Table 1: COVERTTOXICITY rater scores. 4Chan, which may contain vastly different content and context. 4 Datasets For the COVERTTOXICITY dataset, we applied The COVERTTOXICITY2 dataset consists of the methodology of (Han and Tsvetkov, 2020) to covertly offensive rater labels using the described the CivilCommentsIdentities set: comments with template on a subset of CivilCommentsIdentities identity attack annotations and low Perspective API data (Borkan et al., 2019). toxicity scores (Jigsaw, 2017) were marked as can- didates for covert toxicity. 4.1 Training Data The CivilCommentsIdentities toxicity label is The CivilComments dataset is a publicly available the fraction of raters who voted for the label. Han corpus of ∼1.8 million crowd rated comments and Tsvetkov(2020) noted that comments with labeled for toxicity (Borkan et al., 2019). The veiled toxicity were more likely to have dissent CivilComments dataset is derived from the Civil amongst crowd raters and empirically we observed Comments platform plugin,
Recommended publications
  • GOOGLE LLC V. ORACLE AMERICA, INC
    (Slip Opinion) OCTOBER TERM, 2020 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337. SUPREME COURT OF THE UNITED STATES Syllabus GOOGLE LLC v. ORACLE AMERICA, INC. CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FEDERAL CIRCUIT No. 18–956. Argued October 7, 2020—Decided April 5, 2021 Oracle America, Inc., owns a copyright in Java SE, a computer platform that uses the popular Java computer programming language. In 2005, Google acquired Android and sought to build a new software platform for mobile devices. To allow the millions of programmers familiar with the Java programming language to work with its new Android plat- form, Google copied roughly 11,500 lines of code from the Java SE pro- gram. The copied lines are part of a tool called an Application Pro- gramming Interface (API). An API allows programmers to call upon prewritten computing tasks for use in their own programs. Over the course of protracted litigation, the lower courts have considered (1) whether Java SE’s owner could copyright the copied lines from the API, and (2) if so, whether Google’s copying constituted a permissible “fair use” of that material freeing Google from copyright liability. In the proceedings below, the Federal Circuit held that the copied lines are copyrightable.
    [Show full text]
  • The Aesthetic Mind This Page Intentionally Left Blank the Aesthetic Mind Philosophy and Psychology
    The Aesthetic Mind This page intentionally left blank The Aesthetic Mind Philosophy and Psychology EDITED BY Elisabeth Schellekens and Peter Goldie 1 3 Great Clarendon Street, Oxford OX26DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan Poland Portugal Singapore South Korea Switzerland Thailand Turkey Ukraine Vietnam Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries Published in the United States by Oxford University Press Inc., New York # the several contributors 2011 The moral rights of the authors have been asserted Database right Oxford University Press (maker) First published 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above You must not circulate this book in any other binding or cover and you must impose the same condition on any acquirer British Library Cataloguing in Publication Data Data available Library of Congress Cataloging in Publication Data Data available Typeset by SPI Publisher Services, Pondicherry, India Printed in Great Britain on acid-free paper by MPG Books Group, Bodmin and King’s Lynn ISBN 978–0–19–969151–7 13579108642 Contents List of Figures viii Notes on Contributors ix Introduction 1 Elisabeth Schellekens and Peter Goldie Part I.
    [Show full text]
  • A Toolkit to Develop a Virtual Dementia Friendly Community
    An Australian Government Initiative Government An Australian Friendly Community Friendly a Virtual Dementia A Toolkit to develop develop to A Toolkit Verily Connect | An Australian Government Initiative A Toolkit to develop a Virtual Dementia Friendly Community Authors Blackberry, I., Wilding, C., Morgan, D., Winbolt, M., Greenhill, J., Perkins, D., O’Connell, M., Bauer, M., Morley, C., Farmer, J., Royals, K., Rasekaba, T., Hamiduzzaman, M., Gottschall, K., Robinson, A., Zaplin, E., & Davis, H. Year February 2020 Recommended citation Blackberry, I., Wilding, C., Morgan, D., Winbolt, M., Greenhill, J., Perkins, D., O’Connell, M., Bauer, M., Morley, C., Farmer, J., Royals, K., Rasekaba, T., Hamiduzzaman, M., Gottschall, K., Robinson, A., Zaplin, E., & Davis, H. 2020. Verily Connect Toolkit: how to develop a Virtual Dementia-Friendly Community. John Richards Centre for Rural Ageing Research, La Trobe University, Wodonga. Disclaimer The information set out in this toolkit is current at the date of this publication and is intended for use as a guide of a general nature only and may or may not be relevant to people living with dementia or their carers. Nor is this toolkit exhaustive of the subject matter. Persons implementing any advice contained in this toolkit must exercise their own skill, judgement and seek appropriate professional advice relevant to the matter. Accordingly, The John Richards Centre for Rural Ageing Research, La Trobe University and its employees and agents shall accept no liability (including without limitation liability by reason of negligence) to any users of the information contained in this toolkit for any loss or damage (consequential or otherwise), cost or expense incurred or arising by reason of any person using or relying on the information contained in this toolkit and whether caused by reason of any error, negligent act, omission or misrepresentation in the information.
    [Show full text]
  • Jigsaw Puzzles
    Unsupervised Learning of Visual Representations by Solving Jigsaw Puzzles Mehdi Noroozi and Paolo Favaro Institute for Informatiks University of Bern fnoroozi,[email protected] Abstract. In this paper we study the problem of image representation learning without human annotation. By following the principles of self- supervision, we build a convolutional neural network (CNN) that can be trained to solve Jigsaw puzzles as a pretext task, which requires no manual labeling, and then later repurposed to solve object classification and detection. To maintain the compatibility across tasks we introduce the context-free network (CFN), a siamese-ennead CNN. The CFN takes image tiles as input and explicitly limits the receptive field (or context) of its early processing units to one tile at a time. We show that the CFN includes fewer parameters than AlexNet while preserving the same se- mantic learning capabilities. By training the CFN to solve Jigsaw puzzles, we learn both a feature mapping of object parts as well as their correct spatial arrangement. Our experimental evaluations show that the learned features capture semantically relevant content. Our proposed method for learning visual representations outperforms state of the art methods in several transfer learning benchmarks. 1 Introduction arXiv:1603.09246v3 [cs.CV] 22 Aug 2017 Visual tasks, such as object classification and detection, have been successfully approached through the supervised learning paradigm [1,11,25,36], where one uses labeled data to train a parametric model. However, as manually labeled data can be costly, unsupervised learning methods are gaining momentum. Recently, Doersch et al. [10], Wang and Gupta [39] and Agrawal et al.
    [Show full text]
  • Fine-Tuning a Pre-Trained Comment-Domain BERT Model
    Jigsaw @ AMI and HaSpeeDe2: Fine-Tuning a Pre-Trained Comment-Domain BERT Model Alyssa Lees and Jeffrey Sorensen and Ian Kivlichan Google Jigsaw New York, NY (alyssalees|sorenj|kivlichan)@google.com Abstract labeled by crowd workers. Note that Perspec- tiveAPI actually hosts a number of different mod- The Google Jigsaw team produced els that each score different attributes. The under- submissions for two of the EVALITA lying technology and performance of these models 2020 (Basile et al., 2020) shared tasks, has evolved over time. based in part on the technology that pow- While Jigsaw has hosted three separate Kaggle ers the publicly available PerspectiveAPI competitions relevant to this competition (Jigsaw, comment evaluation service. We present a 2018; Jigsaw, 2019; Jigsaw, 2020) we have not basic description of our submitted results traditionally participated in academic evaluations. and a review of the types of errors that our system made in these shared tasks. 3 Related Work The models we build are based on the popular 1 Introduction BERT architecture (Devlin et al., 2019) with dif- The HaSpeeDe2 shared task consists of Italian so- ferent pre-training and fine-tuning approaches. cial media posts that have been labeled for hate In part, our submissions explore the importance speech and stereotypes. As Jigsaw’s participation of pre-training (Gururangan et al., 2020) in the was limited to the A and B tasks, we will be lim- context of toxicity and the various competition at- iting our analysis to that portion. The full details tributes. A core question is to what extent these of the dataset are available in the task guidelines domains overlap.
    [Show full text]
  • Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile
    RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile Chao Song∗yz, Jie Wuy, Li Lu∗, and Ming Liu∗z ∗School of Computer Science and Engineering, University of Electronic Science and Technology of China yDepartment of Computer and Information Sciences, Temple University zBig Data Research Center, University of Electronic Science and Technology of China Email: fchaosong, luli2009, [email protected], [email protected] Abstract—With the development of Location Based Services are associated with the locations where they are recorded. (LBSs), both academic researchers and industries have paid However, for the outdoor mobile localization, it is difficult to more attention to GPS-less mobile localization on mobile phones. record and process the fingerprints of all the positions along The majority of the existing localization approaches have uti- the trajectory, due to the large amount of fingerprints. Thus, lized signal-fingerprint as a metric for location determinations. the trajectory-fingerprint-based approach has been proposed However, one of the most challenging issues is the problem of for the mobile localization. The phones carried by the mo- uncertain fingerprints for building the fingerprint map, termed as the jigsaw puzzle problem. In this paper, for more accurate bile users autonomously and continuously record the ambient fingerprints of the mobile localization, we investigate the changes conditions, and position information as the fingerprint of the of Received Signal Strength Indication (RSSI) from the connected user’s trajectory [4], [8]. Paek et al. in [9] propose to utilize cell-towers over time along the mobile users’ trajectories, termed a cell-ID sequence-based localization, which is recorded by as RSSI Time Series (RTS).
    [Show full text]
  • Using Computer Vision to Solve Jigsaw Puzzles
    Using Computer Vision to Solve Jigsaw Puzzles Travis V. Allen Stanford University CS231A, Spring 2016 [email protected] Abstract 1. Introduction This project focuses on the creation of an end-to-end Many in the computer vision community have written “automatic” jigsaw puzzle solving program that assembles papers on solving the “problem” of jigsaw puzzles for a jigsaw puzzle using an image of the disassembled puzzle decades. Many of the former papers written cite the po- pieces. The solver does not use the picture of the assembled tential extension of this work to other more serious endeav- puzzle for matching purposes. Rather, the solver created for ors like reconstructing archaeological artifacts or fitting to- this project attempts to solve the lost the box conundrum by gether scanned objects while others simply do it because displaying the assembled puzzle to the user without the need it’s an interesting application of computer vision concepts. for the reference image. Needless to say, this program was This author falls in the latter camp. Several methods for created with an eye toward a potential smart phone applica- constructing jigsaw puzzles from images of the pieces were tion in the future. It should be noted that the puzzle solver considered from a theoretical standpoint before the comput- is created entirely in Matlab and heavily utilizes functions ing power and the high-resolution image capturing devices found in the Matlab Image Processing Toolbox. necessary to employ these methods could be fully realized. Solving jigsaw puzzles using computer vision (CV) is an More recently, many algorithms and methods tend toward attractive problem as it benefits directly from many of the disregarding piece shape as a discriminant entirely by us- advances in the field while still proving to be both challeng- ing “square pieces” and rely instead on the underlying im- ing and intellectually stimulating.
    [Show full text]
  • An Automatic Solver for Very Large Jigsaw Puzzles Using Genetic Algorithms
    Genet Program Evolvable Mach DOI 10.1007/s10710-015-9258-0 An automatic solver for very large jigsaw puzzles using genetic algorithms 1 1 1,2 Dror Sholomon • Omid E. David • Nathan S. Netanyahu Received: 8 August 2015 / Revised: 3 December 2015 Ó Springer Science+Business Media New York 2016 Abstract In this paper we propose the first effective genetic algorithm (GA)-based jigsaw puzzle solver. We introduce a novel crossover procedure that merges two ‘‘parent’’ solutions to an improved ‘‘child’’ configuration by detecting, extracting, and combining correctly assembled puzzle segments. The solver proposed exhibits state-of-the-art performance, as far as handling previously attempted puzzles more accurately and efficiently, as well puzzle sizes that have not been attempted before. The extended experimental results provided in this paper include, among others, a thorough inspection of up to 30,745-piece puzzles (compared to previous attempts on 22,755-piece puzzles), using a considerably faster concurrent implementation of the algorithm. Furthermore, we explore the impact of different phases of the novel crossover operator by experimenting with several variants of the GA. Finally, we compare different fitness functions and their effect on the overall results of the GA- based solver. Keywords Computer vision Á Genetic algorithms Á Jigsaw puzzle A preliminary version of this paper appeared in Proceedings of the IEEE Computer Vision and Pattern Recognition Conference [19]. Area Editor for Games: Moshe Sipper. & Omid E. David [email protected] Dror Sholomon [email protected] Nathan S. Netanyahu [email protected]; [email protected] 1 Department of Computer Science, Bar-Ilan University, 52900 Ramat Gan, Israel 2 Center for Automation Research, University of Maryland, College Park, MD 20742, USA 123 Genet Program Evolvable Mach 1 Introduction The problem domain of jigsaw puzzles is widely known to almost every human being from childhood.
    [Show full text]
  • Report Resumes
    REPORT RESUMES ED 020 413 VT 005 256 VOCATIONAL EDUCATION FOR RURAL AMERICA. YEARBOOK, BY- SWANSON, GORDON I. NATIONAL EDUCATION ASSN., WASHINGTON. D.C. PUB DATE 59 EDRS PRICE HF-S1.50HC NOT AVAILABLE FROM EDRS. 355P. DESCRIPTORS- RURAL AREAS, *VOCATIONAL EDUCATION, *RURAL EDUCATION; EDUCATIONAL HISTORY, EDUCATIONAL FINANCE, PROGRAM ADMINISTRATIONIAGRICULTURAL EDUCATION,BUSINESS EDUCATION, DISTRIBUTIVE EDUCATION, HOMEMAKING EDUCATION, TRADE AND INDUSTRIAL EDUCATION, INDUSTRIAL ARTS, OCCUPATIONAL GUIDANCE, EDUCATIONAL PROBLEMS! *REFERENCE A YEARBOOK ADVISORY COMMITTEE, APPOINTED BY NATIONAL EDUCATION ASSOCIATION'S DEPARTMENT OF RURAL EDUCATION AND AMERICAN. VOCATIONAL ASSOCIATION MEMBERS, APPROVED THE OUTLINE, ASSISTED IN SELECTING AUTHORS, AND REVIEWED MANUSCRIPTS FOR THIS'YEARBOOK ON VOCATIONAL EDUCATION FOR RURAL AREAS. THE DISCUSSION IS IN TERMS OF THE UNIFYING THEME THAT DESCRIBES THE PROBLEMS OF RURAL EDUCATION-THE MALDISTRIBUTION OF HUMAN, ECONOMIC, AND EDUCATIONAL RESOURCES. PART I, WHICH TREATS THE ENVIRONMENT IN WHICH VOCATIONAL EDUCATION IS OFFERED IN AMERICAN SOCIETY, COVERS ITS HISTORY, AFFECTING FORCES, PROBLEMS OF ACCOMMODATION, INSTRUCTIONAL LEVELS, FINANCE, ADMINISTRATION, AND ITS FUTURE. PART II PRESENTS THE CONTRIBUTIONS AND OPPORTUNITIES IN 1) AGRICULTURAL, BUSINESS, DISTRIBUTIVE, HOMEMAKING, TRADES AND INDUSTRIAL EDUCATION,(2) INDUSTRIAL ARTS, AND (3) VOCATIONAL GUIDANCE. THE FINAL CHAPTER EXAMINES THE CRITICAL ISSUES IN VOCATIONAL EDUCATION. OFFICIAL RECORDS AND LISTS OF OFFICERS AND MEMBERS OF THE DEPARTMENT OF RURAL EDUCATION ARE LISTED. THIS DOCUMENT IS AVAILABLE FOR $4.00 FROM DEPARTMENT OF RURAL EDUCATION, NATIONAL EDUCATION ASSOCIATION, 1201 SIXTEENTH STREET, N.W.t.WASHINGTON, D.C. 20006. (JM) PROCESS WITH MICROFICHE AND PUBLISHER'S PRICES. MICRO- FICHE REPRODUCTION ONLY. PROCESS WITHMICROFICHE PUBLISHER'S AND PRICES. MICRO- FICHE REPRODUCTIONONLY. Vocational Education for Rural America I lid Edited by GORDON I.
    [Show full text]
  • Simply-Hitchcock-1587911892. Print
    Simply Hitchcock Simply Hitchcock DAVID STERRITT SIMPLY CHARLY NEW YORK Copyright © 2017 by David Sterritt Cover Illustration by Vladymyr Lukash Cover Design by Scarlett Rugers All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission requests, write to the publisher at the address below. [email protected] ISBN: 978-1-943657-17-9 Brought to you by http://simplycharly.com Dedicated to Mikita, Jeremy and Tanya, Craig and Kim, and Oliver, of course Contents Praise for Simply Hitchcock ix Other Great Lives xiii Series Editor's Foreword xiv Preface xv Acknowledgements xix 1. Hitch 1 2. Silents Are Golden 21 3. Talkies, Theatricality, and the Low Ebb 37 4. The Classic Thriller Sextet 49 5. Hollywood 61 6. The Fabulous 1950s 96 7. From Psycho to Family Plot 123 8. Epilogue 145 End Notes 147 Suggested Reading 164 About the Author 167 A Word from the Publisher 168 Praise for Simply Hitchcock “With his customary style and brilliance, David Sterritt neatly unpacks Hitchcock’s long career with a sympathetic but sharply observant eye. As one of the cinema’s most perceptive critics, Sterritt is uniquely qualified to write this concise and compact volume, which is the best quick overview of Hitchcock’s work to date—written with both the cineaste and the general reader in mind.
    [Show full text]
  • The Promise of Artificial Intelligence Daniel Castro and Joshua New
    The Promise of Artificial Intelligence Daniel Castro and Joshua New center for data innovation The Promise of Artificial Intelligence Daniel Castro and Joshua New October 2016 2 Table of Contents Introduction ...........................................................................................2 What Is Artificial Intelligence? .................................................................2 The Value of AI.......................................................................................3 Typology of AI Applications ......................................................................4 Examples of AI ........................................................................................7 Accessibility ......................................................................................8 Agriculture ......................................................................................11 Business Operations .........................................................................12 Consumer Convenience ....................................................................15 Disaster Prevention and Response .....................................................16 Education .......................................................................................19 Energy ............................................................................................20 Environment ...................................................................................23 Health Care: Prevention and Screening ..............................................24
    [Show full text]
  • The 3D Jigsaw Puzzle: Mapping Large Indoor Spaces
    The 3D jigsaw puzzle: mapping large indoor spaces Ricardo Martin-Brualla1, Yanling He1, Bryan C. Russell2, and Steven M. Seitz1 1University of Washington 2Intel Abstract. We introduce an approach for analyzing annotated maps of a site, together with Internet photos, to reconstruct large indoor spaces of famous tourist sites. While current 3D reconstruction algorithms often produce a set of disconnected components (3D pieces) for indoor scenes due to scene coverage or matching failures, we make use of a provided map to lay out the 3D pieces in a global coordinate system. Our approach leverages position, orientation, and shape cues extracted from the map and 3D pieces and optimizes a global objective to recover the global layout of the pieces. We introduce a novel crowd flow cue that measures how people move across the site to recover 3D geometry orientation. We show compelling results on major tourist sites. Keywords: Indoor scene reconstruction, maps, 3D jigsaw puzzle. 1 Introduction Recent breakthroughs in computer vision now allow us to model our world in 3D with extraordinary accuracy and visual fidelity from just about any set of overlapping photos [1{3]. However, a limitation of state-of-the-art 3D reconstruc- tion techniques from Internet photos is that large scenes tend to break up into a collection of disconnected pieces due to gaps in the depicted scene coverage or matching failures. Rather than a single, fully-connected Vatican model, for instance, we get a collection of smaller 3D pieces for different rooms, such as the Sistine Chapel, the Raphael Rooms, and the Hall of Maps, each having their own 3D coordinate system.
    [Show full text]