Skip to main content

Showing 1–11 of 11 results for author: Gottesman, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.10979  [pdf, ps, other

    cs.CL

    How Well Can Reasoning Models Identify and Recover from Unhelpful Thoughts?

    Authors: Sohee Yang, Sang-Woo Lee, Nora Kassner, Daniela Gottesman, Sebastian Riedel, Mor Geva

    Abstract: Recent reasoning models show the ability to reflect, backtrack, and self-validate their reasoning, which is crucial in spotting mistakes and arriving at accurate solutions. A natural question that arises is how effectively models can perform such self-reevaluation. We tackle this question by investigating how well reasoning models identify and recover from four types of unhelpful thoughts: uninfor… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

  2. arXiv:2412.14133  [pdf, ps, other

    cs.CL

    Performance Gap in Entity Knowledge Extraction Across Modalities in Vision Language Models

    Authors: Ido Cohen, Daniela Gottesman, Mor Geva, Raja Giryes

    Abstract: Vision-language models (VLMs) excel at extracting and reasoning about information from images. Yet, their capacity to leverage internal knowledge about specific entities remains underexplored. This work investigates the disparity in model performance when answering factual questions about an entity described in text versus depicted in an image. Our results reveal a significant accuracy drop - reac… ▽ More

    Submitted 7 June, 2025; v1 submitted 18 December, 2024; originally announced December 2024.

    Comments: Accepted to ACL 2025 Main Conference

  3. arXiv:2411.02369  [pdf, ps, other

    quant-ph cs.CC

    A Criterion for Quantum Advantage

    Authors: Chaitanya Karamchedu, Matthew Fox, Daniel Gottesman

    Abstract: Assuming the polynomial hierarchy is infinite, we prove a sufficient condition for determining if uniform and polynomial size quantum circuits over a non-universal gate set are not efficiently classically simulable in the weak multiplicative sense. Our criterion exploits the fact that subgroups of $\mathrm{SL}(2;\mathbb{C})$ are essentially either discrete or dense in $\mathrm{SL}(2;\mathbb{C})$.… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

    Comments: 40 pages, submitted to QIP 2025

  4. arXiv:2410.11660  [pdf, other

    cs.CL

    Eliciting Textual Descriptions from Representations of Continuous Prompts

    Authors: Dana Ramati, Daniela Gottesman, Mor Geva

    Abstract: Continuous prompts, or "soft prompts", are a widely-adopted parameter-efficient tuning strategy for large language models, but are often less favorable due to their opaque nature. Prior attempts to interpret continuous prompts relied on projecting individual prompt tokens onto the vocabulary space. However, this approach is problematic as performant prompts can yield arbitrary or contradictory tex… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

  5. arXiv:2406.12775  [pdf, other

    cs.CL

    Hopping Too Late: Exploring the Limitations of Large Language Models on Multi-Hop Queries

    Authors: Eden Biran, Daniela Gottesman, Sohee Yang, Mor Geva, Amir Globerson

    Abstract: Large language models (LLMs) can solve complex multi-step problems, but little is known about how these computations are implemented internally. Motivated by this, we study how LLMs answer multi-hop queries such as "The spouse of the performer of Imagine is". These queries require two information extraction steps: a latent one for resolving the first hop ("the performer of Imagine") into the bridg… ▽ More

    Submitted 14 October, 2024; v1 submitted 18 June, 2024; originally announced June 2024.

    Comments: Accepted at EMNLP 2024

  6. arXiv:2406.12673  [pdf, other

    cs.CL

    Estimating Knowledge in Large Language Models Without Generating a Single Token

    Authors: Daniela Gottesman, Mor Geva

    Abstract: To evaluate knowledge in large language models (LLMs), current methods query the model and then evaluate its generated responses. In this work, we ask whether evaluation can be done before the model has generated any text. Concretely, is it possible to estimate how knowledgeable a model is about a certain entity, only from its internal computation? We study this question with two tasks: given a su… ▽ More

    Submitted 29 October, 2024; v1 submitted 18 June, 2024; originally announced June 2024.

    Comments: Accepted at EMNLP 2024 Main Conference

  7. arXiv:1802.03239  [pdf, other

    cs.LG cs.AI stat.ML

    Using Discretization for Extending the Set of Predictive Features

    Authors: Avi Rosenfeld, Ron Illuz, Dovid Gottesman, Mark Last

    Abstract: To date, attribute discretization is typically performed by replacing the original set of continuous features with a transposed set of discrete ones. This paper provides support for a new idea that discretized features should often be used in addition to existing features and as such, datasets should be extended, and not replaced, by discretization. We also claim that discretization algorithms sho… ▽ More

    Submitted 9 February, 2018; originally announced February 2018.

    Comments: 14 pages

    Journal ref: EURASIP Journal on Advances in Signal Processing 2018:7

  8. arXiv:0905.2419  [pdf, ps, other

    quant-ph cs.CC

    The Quantum and Classical Complexity of Translationally Invariant Tiling and Hamiltonian Problems

    Authors: Daniel Gottesman, Sandy Irani

    Abstract: We study the complexity of a class of problems involving satisfying constraints which remain the same under translations in one or more spatial directions. In this paper, we show hardness of a classical tiling problem on an N x N 2-dimensional grid and a quantum problem involving finding the ground state energy of a 1-dimensional quantum system of N particles. In both cases, the only input is N, p… ▽ More

    Submitted 23 August, 2010; v1 submitted 14 May, 2009; originally announced May 2009.

    Comments: 67 pages, approximately 6 gazillion figures. v2 has new results proving hardness for reflection-invariant quantum and classical systems and a discussion of the infinite quantum chain

  9. arXiv:quant-ph/0503139  [pdf, ps, other

    quant-ph cs.CR

    Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes

    Authors: Claude Crepeau, Daniel Gottesman, Adam Smith

    Abstract: It is a standard result in the theory of quantum error-correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding and encoded Hilbert spaces. However, this bound only applies to codes which recover the message exactly. Naively, one might expect that correcting errors to very high fidelity would only allow small violations of this b… ▽ More

    Submitted 15 March, 2005; originally announced March 2005.

    Comments: 14 pages, no figures

    Journal ref: Preliminary version in proceedings of "Advances in Cryptology -- EUROCRYPT 2005"

  10. Improved Simulation of Stabilizer Circuits

    Authors: Scott Aaronson, Daniel Gottesman

    Abstract: The Gottesman-Knill theorem says that a stabilizer circuit -- that is, a quantum circuit consisting solely of CNOT, Hadamard, and phase gates -- can be simulated efficiently on a classical computer. This paper improves that theorem in several directions. First, by removing the need for Gaussian elimination, we make the simulation algorithm much faster at the cost of a factor-2 increase in the nu… ▽ More

    Submitted 18 June, 2008; v1 submitted 25 June, 2004; originally announced June 2004.

    Comments: 15 pages. Final version with some minor updates and corrections. Software at http://www.scottaaronson.com/chp

    Journal ref: Phys. Rev. A 70, 052328 (2004) (14 pages)

  11. Authentication of Quantum Messages

    Authors: Howard Barnum, Claude Crepeau, Daniel Gottesman, Adam Smith, Alain Tapp

    Abstract: Authentication is a well-studied area of classical cryptography: a sender S and a receiver R sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified by any third party with control of the communication line. In this paper we define and investigate the authentication of messages composed of quantum states. Assuming S and R hav… ▽ More

    Submitted 20 May, 2002; originally announced May 2002.

    Comments: 22 pages, LaTeX, uses amssymb, latexsym, times

    Journal ref: Proc. 43rd Annual IEEE Symposium on the Foundations of Computer Science (FOCS '02), pp. 449-458. IEEE Press, 2002.