1. Introduction
Traditionally, enterprise email search engines were installed locally on the premises of the organization. In these installations, search ranking was generally predetermined by the vendor and kept fixed. In the last several years, cloudbased search engines (e.g., Microsoft Azure, Amazon CloudSearch, or Google Cloud Search) have been gaining traction as an effective tool for search. In these cloud solutions, the corpora, the ranking models, and the search logs are stored in the cloud. This enables the cloud search providers to optimize the quality of their search engines based on user click data, similarly to what was previously done in web search (Joachims, 2002).
The transition to the cloud and the abundance of available user interaction data provide a unique opportunity to significantly improve the quality of enterprise email search engines, which traditionally lagged behind web search (Hawking, 2010). In particular, in recent years, deep neural learningtorank models were shown to significantly improve the performance of search engines in the presence of largescale query logs, both in web search (Guo et al., 2016) and in email search (Shen et al., 2018; Zamani et al., 2017) settings.
However, directly applying these advances in neural learningtorank models to enterprise email search is not straightforward. An important difference between web and enterprise email search is that in the latter, the model can be applied to multiple, often very different domains, as described in Figure 1. For instance, the same enterprise email search engine can power enterprises from various industries: technology, education, manufacturing, etc. Therefore, using the same global learningtorank model across the different enterprises may lead to suboptimal search quality for each individual enterprise, due to the differences between their corpora and information needs.
On the other hand, training an individual ranking model for each industry or enterprise may not be feasible, especially for smaller enterprises with limited search traffic data. This is especially true for deep learningtorank models that typically require large amounts of training data. The reason for this requirement is that deep neural networks are susceptible to overfitting to the training data, and they need enough inputs to actually learn a model rather than simply memorizing the input examples.
As such, a natural question to ask is how to make use of the stateoftheart deep learningtorank models in the enterprise search setting. To this end, we propose the use of domain adaptation techniques (Ganin and Lempitsky, 2014; Long et al., 2015) to adapt a global model, trained on the entire data, to a particular enterprise domain. In this work, we specifically focus on the enterprise email search setting; however our findings easily generalize to other enterprise search scenarios as well.
Domain adaptation, at a high level, deals with the ability to adapt efficient, highperforming models trained on one domain to perform well on a different domain. Typically, the first domain, called the source domain (in our case the entire dataset – see Figure 1), contains a wealth of data, and so an effective prediction model can be trained. However, due to what is known as dataset bias or domain shift (Gretton et al., 2009), these models do not immediately generalize to new datasets, referred to as the target domains (in our case individual enterprises). The target domains are expected to be significantly smaller than the source domain, so that a model cannot simply be trained with only target training data due to overfitting. As a result, these fullytrained networks are typically finetuned to the new dataset. That is, the available labeled data from the target domain is used to slightly alter the parameters of the original model to fit new data. This is, of course, difficult and expensive to carry out.
Work in domain adaptation, then, attempts to reduce the harmful effects of this domain shift. The deep learning model maps both the source and target domain into some latent feature space. Reduction of the domain shift is then accomplished by either minimizing some measure of domain shift, such as maximum mean discrepancy (MMD) (Tzeng et al., 2014; Long et al., 2015), or with adversarial adaptation methods (Ganin and Lempitsky, 2014; Tzeng et al., 2015; Liu and Tuzel, 2016; Tzeng et al., 2017). In the latter case, the model is trained to make the two mappings of the source and target domain indistinguishable in feature space to a discriminator model.
While domain adaptation methods have been previously studied, we emphasize that the majority of the research done was in other areas such as image classification. Moreover, the typical focus was on an unsupervised setting with no labeled data from the target domain. We note, though, that there has been one related work by Cohen et al. (Cohen et al., 2018), studying the problem of domain adaptation in learningtorank models.
However, there are two major differences between these prior works, including (Cohen et al., 2018), and the problem we study. First, the enterprise email search problem deals with datasets that are several orders of magnitude larger than the previous work. The source domain, consisting of the combined inputs from all individual enterprise domains, contains inputs as compared to inputs in the image classification datasets (Tzeng et al., 2014; Long et al., 2015; Ganin and Lempitsky, 2014; Tzeng et al., 2015; Liu and Tuzel, 2016; Tzeng et al., 2017) and the prior learningtorank work (Cohen et al., 2018). Additionally, we deal with labeled enterprise domains in a weakly supervised setting (using user click data), whereas the aforementioned prior works all assumed unlabeled target domains.
These differences from prior work lead to a more realistic setting for exploring domain adaptation techniques in information retrieval. As we show through extensive experimentation, in this setting MMD outperforms all other domain adaptation techniques, including the stateoftheart adversarial methods (Cohen et al., 2018), a first such result in the information retrieval literature. In summary, our key contributions are:

We propose a general framework for learningtorank with domain adaptation, with a particular application to enterprise email search.

We experimentally demonstrate the shortcomings of simple transfer learning methods, such as retraining or batchbalancing, to individual enterprise domains.

We propose a novel use of the maximum mean discrepancy (MMD) method for learningtorank with domain adaptation, and demonstrate its effectiveness and robustness in the enterprise email search setting.

We perform a thorough comparative analysis of various domain adaptation methods on realistic, largescale enterprise email search data.
The rest of our paper is organized as follows. First, we discuss related work in Section 2. Next, in Section 3, we provide motivating evidence that using domain adaptation techniques is feasible for our setting. That is, we show that the distributions of representations of the source and target datasets have nontrivial overlap, and so it is reasonable to try and encourage the model to accurately predict clicks on both sets. In Section 4, we give a detailed explanation of our methodology. Then, we provide our extensive experimental study in Section 5. Finally, we conclude and discuss future work in Section 6.
2. Related Work
We split our discussion of related works into four distinct parts. First, we discuss work done in the learningtorank literature on which we base our learningtorank models. Next, we review research done in enterprise email search setting. Then, we mention work done in developing techniques for domain adaptation in image classification. Finally, we point out other works trying to utilize domain adaptation for information retrieval problems.
2.1. LearningtoRank
Generally, learningtorank refers to the application of machine learning tools and algorithms to rank models for information retrieval. There is a vast literature of learningtorank work
(Burges et al., 2005; Burges, 2010; Cao et al., 2007; Friedman, 2001; Joachims, 2002; Xia et al., 2008), differing in their model and loss function constructions. Recently, with the rise in popularity of deep neural networks, work has been done to use deep neural networks for learningtorank
(Dehghani et al., 2017; Borisov et al., 2016). For a complete literature review on neural ranking models for information retrieval, please refer to the survey by Mitra (Mitra and Craswell, 2017).2.2. Enterprise Search
Enterprise search can broadly be viewed as the application of information retrieval techniques towards the specific problem of searching within private organizations. The majority of prior work can be found in the recent surveys by Kruschwitz and Hull (Kruschwitz and Hull, 2017) and Hawking (Hawking, 2010). To the best of our knowledge, no previous research on enterprise search has studied the problem as an application of domain adaptation.
Enterprise search is also closely related to personal search (e.g., email search), as both deal with searching in private or access controlled corpora (Ai et al., 2017; Carmel et al., 2015; Dumais et al., 2016; Grevet et al., 2014; Wang et al., 2016; Shen et al., 2018; Kim et al., 2017). Even though some success has been found using timebased approaches for personal search (Dumais et al., 2016), relevancebased ranking arising from learningtorank deep neural network models has become increasingly popular (Zamani et al., 2017; Shen et al., 2018) as the sizes of private corpora increase (Grevet et al., 2014). However, to the best of our knowledge, our work is the first study on applying deep neural networks specifically in the enterprise search setting.
2.3. Domain Adaptation
Extensive prior work on domain adaptation has been done in image classification (Gretton et al., 2009). These works develop methods to transfer latent representations obtained from deep neural networks from a large, labeled source dataset to a smaller, unlabeled target dataset. The primary strategy focuses on guiding the learning process by encouraging the source and target feature representations to be indistinguishable in some way (Tzeng et al., 2014; Long et al., 2015; Sun and Saenko, 2016; Ghifary et al., 2016; Ganin and Lempitsky, 2014; Tzeng et al., 2015; Liu and Tuzel, 2016).
One focus of domain adaptation research in image classification aims on minimizing the differences of certain statistics between the source and target distributions. Several methods used the Maximum Mean Discrepancy (MMD) (Gretton et al., 2009) loss, in a variety of ways (Tzeng et al., 2014; Long et al., 2015; Sun and Saenko, 2016)
. The MMD computes the norm of the difference between two domain means. Another direction lies in choosing adversarial losses to minimize domain shift. The goal is to learn a representation from which a classifier can predict source dataset labels while a discriminator cannot distinguish whether a data point is from the source or target datasets. The work in this direction focuses on finding better adversarial losses
(Ghifary et al., 2016; Ganin and Lempitsky, 2014; Tzeng et al., 2015).2.4. Applications of Domain Adaptation to Information Retrieval
As deep learning models became more prevalent in ranking problems, and as more and more transfer learning techniques developed for image classification, work began to study the problem of domain adaptation in the information retrieval domain. The models in Cohen et al. (2018) are trained for domain adaptation in ranking with adversarial learning. Specifically, the models are trained using the gradient reversal layers of Ganin et al. (2016). We note that this work focused only on adversarial learning and did not consider maximum mean discrepancy. Moreover, it only compared their adversarial learning technique with very simple baselines: training on all data and training on target data. The work did not consider more interesting baselines such as balancing training batches with a certain number of target data inputs, or finetuning a previously trained model on all data with only target data. Additionally, while in the learningtorank setting, their datasets are significantly smaller and not as complex as those arising from enterprise search. Similarly, the work of Long et al. (2018) also utilizes adversarial learning to solve the problem of domain adaptation to a number of information retrieval tasks, including digit retrieval and image transfers. However, as with Cohen et al. (2018), they study only adversarial learning, and their data are also significantly different from enterprise search. Lastly, Mao et al. (2018) use a similar statisticsbased approach for transferring features from source to target domains. Their method also looks at a certain mean distance computed from the embedded data, but their percategory multilayer joint kernelized mean distances are quite distinct from an MMD regularization term.
3. Motivation
In this section, we provide motivation for using domain adaptation techniques in enterprise email search. First, we take our enterprise email search inputs and map them into a highdimensional space. As detailed in Section 4.2, we refer to the resulting subset of the highdimensional space obtained from this mapping as the embedding of our inputs. These embeddings are then passed as inputs into the prediction models, as discussed in Section 4.3. The highlevel goal of domain adaptation techniques is to make the embeddings arising from the source and target domains indistinguishable to the prediction models. That way, the model can leverage information from the source domain in order to make predictions on the target domain. However, these techniques crucially rely on the embeddings for the source and target datasets to take a certain form. First, the embeddings cannot be distributionally identical. If this were the case, simply training on all the data or even just the source data would yield a model that generalizes to the target data. Second, the embeddings must have nontrivial overlap. The model can, via gradient descent updates to the embedding weights, push the two distributions closer together. But if they are too far apart to begin with, one cannot hope for this to be successful.
To this end, we present some experimental results to show that our data does indeed take the required form. We take a network trained on all data to completion and study the embedding distributions of the source and target datasets. To reiterate what we said in Section 1, the source dataset here refers to the entire search log data, and the target dataset is a specific small enterprise domain. First, we compute the means of the two distributions and compare their norms (Mohri et al., 2018) to the norm of their difference. From Table 1
, we can see that the two mean vectors and the difference vector all have a norm that is of the same order. This suggests that the means of the two distributions are indeed quite different, providing evidence that indeed, the source and target domain embeddings are not distributionally identical.
Source Mean Norm:  1.0578 

Target Mean Norm:  1.3558 
Norm of Mean Difference:  0.8558 
Additionally, while we cannot visualize the distributions in multidimensional space, we can plot their projections onto a onedimensional space. To choose the vector on which we project the distributions, we use an idea from robust statistics (Diakonikolas et al., 2016; Lai et al., 2016)
. We form a matrix consisting of the embedding vector of each example from both the source and target datasets. From this matrix, we compute the vector corresponding to the largest singular value. The intuition is that this vector corresponds to the strongest signal coming from the combined embedding vectors. If the source and target embeddings indeed form two distinct populations, this signal will correlate more strongly with one distribution than the other. From Figure
2, we can see that this is the case. The green values represent the correlations of the target set embeddings onto the top singular vector, and the blue values are from the source data embeddings. While there is some overlap between the two distributions, they are quite clearly distinct.As we have now established that the embedding distributions are overlapping, but not identical, in the next section we discuss possible domain adaptation techniques to be used.
4. Methodology
In this section, we first formulate our problem and provide definitions of notation we will use. Then, we describe two different solutions to the problem, first using discriminatorbased techniques and then statisticsbased techniques.
4.1. Problem Formulation
The inputs for the enterprise email search problem are queries , where represents a user query string, represents the query’s list of documents, and represents the clickthrough data. For each document , we have a feature vector as its representation, and a boolean denoting whether the document was clicked. The set of queries from all data is labeled , the source dataset, while the set of queries from a specific domain is labeled , the target dataset, and we are trying to use to help train a model on .
Given the set of queries, our goal is to learn a model minimizing a loss defined as:
(1) 
where denotes the loss of the model on query , and we are taking expectation over queries from the target data. Before we define our loss function, we note that typical neural network models work by approximating the above loss with the training set. We establish notation here by letting the training sets for our deep network be and . Our goal is to learn a model that minimizes:
However, in the domain adaptation setting, we assume a scarcity of data in the target distribution. As such, training to minimize would result in either an overfitted model or one that cannot generalize to all of . Thus, we instead train using training data from both and .
In this paper, our model depends on deep neural networks (DNNs) (LeCun et al., 2015). We choose to use DNNs for a few reasons. First, the number of features from our queries and documents is quite large, and moreover, some features are sparse. While treebased models (Friedman, 2001) can model feature interactions, they are not scalable to a large number of features and cannot handle sparse features, such as those coming from document or query text. On the other hand, DNNs are a natural candidate model for dealing with sparse inputs. Also, DNNs were shown to be quite successful for ranking applications, especially when supplied with large amounts of supervised training data (Dehghani et al., 2017).
Over the next few sections, we provide an overview of our model . First, we map the query and document features together into a highdimensional embedding space (specifically, dimensional). Then, a prediction model, which we will call , consisting of a DNN is trained on this embedding space. Since the source and target datasets are different, we also expect their embeddings to be different within the embedding space. Thus, we use an additional correction model to make the embeddings indistinguishable to the prediction model, so that source data can be used to predict clicks on the target data.
Figure 3 provides an illustration of our problem. In the next section, we describe how to map enterprise email search inputs into a highdimensional embedding space.
4.2. Input Embeddings
The source and target datasets are mapped to an embedding space via an embedding function (part in Figure 3).
Due to the private nature of our data, our querydocument inputs are modeled as bags of frequent ngrams and can be represented in three parts:

the features for the query

the sparse features for a document

the dense features for (e.g., document static scores).
To preserve privacy, the inputs are kanonymized and only query and document ngrams that are frequent in the entire corpus are retained. For more details about the specific features and the anonymization process used in a similar setting see (Shen et al., 2018; Zamani et al., 2017). The query features and sparse document features are passed through a single embedding layer, whereas the dense features are left as they are. We denote the various parts of the input as , and , concatenate them together, and then pass them through one additional embedding layer to form the input embedding, . We denote the function taking an input and outputting its corresponding embedding as .
4.3. FeedForward DNN Model
The discussion of our feedforward DNN model corresponds to part of Figure 3, the prediction model, .
Feedforward DNNs have become increasingly prominent in research for learningtorank problems (Edizel et al., 2017; Huang et al., 2013; Zamani et al., 2017). Such models have proven to be effective in modeling sparse features naturally arising from inputs such as document text through the use of embeddings. Since they are the basis for our models, we review them in this section.
A deep neural network can be broken down into a series of layers, each applying a matrix multiplication, bias addition, and then activation function to its inputs. We refer to the output of layer
as . Letting be , the subsequent layers are explicitly obtained as:where denotes the weight matrix and
the bias vectors at layer
. We refer to the trainable parameters and together as the prediction model’s . The function is what is known as the activation function. We use a hyperbolic function:If is the last layer, then the prediction model output is simply:
The loss function we aim to minimize utilizes a softmax cross entropy term. Formally, for an input with documents and click data , the loss can be written as:
(2) 
where
The overall prediction model loss term is then the average of over all inputs :
(3) 
4.4. Domain Adaptation Methods
In this section, we describe our techniques for encouraging the neural network models to make the embeddings of the source and target datasets indistinguishable. This corresponds to part of Figure 3, the correction model. Our first class of methods in Section 4.4.1 is motivated by Generative Adversarial Networks (Goodfellow et al., 2014), relying on the deep neural networks called discriminators that arise in Generative Adversarial Networks. Then, in Section 4.4.2, we propose a second class of methods focusing on utilizing various statistics of the embedding distributions for domain adaptation.
4.4.1. DiscriminatorBased Techniques
Discriminatorbased domain adaptation techniques are closely related to adversarial learning methods where a twoplayer game is created between a discriminator and an adversary. In this setting, each training example is labeled as being from either the source or the target dataset. The discriminator is implemented as a neural network that works to classify an example with its corresponding dataset. At the same time, an adversary updates the embedding weights in such a way as to fool the discriminator.
The goal of discriminatorbased techniques is to reach an equilibrium in which the adversary has updated the embedding weights to fool any discriminator. In this case, the two embeddings will be indistinguishable, and a prediction model trained on the source dataset will generalize well to the target dataset.
We then define the total loss function for discriminatorbased techqniues on the model as follows:
(4) 
Here, refers to Equation 3, while and refer to the discriminator and adversarial losses which we will discuss next.. The and terms are multiplicative factors that control the effects of the discriminator and adversarial losses relative to .
The discriminator itself is an additional feedforward deep neural network, separate from the prediction model, taking the embedding of a query as input, which we will denote as a function . Similar to the parameters for the prediction model, we will denote the trainable parameters for this DNN with . The discriminator loss (i.e., ) is a standard crossentropy loss, defined as:
(5) 
For adversarial loss (i.e., ), there are different choices that can be made. One standard choice is known as the gradient reversal loss (Ganin et al., 2016). The idea with gradient reversal is to directly maximize the discriminator loss, i.e., . The gradient of the discriminator loss is, by definition, the direction of the largest change. While the discriminator will take a gradient step to decrease the loss, the adversary takes a backwards step along this direction. Formally, the adversarial loss is defined as follows:
(6) 
For completeness, we mention that there are two other oftenused adversarial losses. One uses a crossentropy term, but with inverted labels (Goodfellow et al., 2014)
, labeling each source example as coming from the target dataset, and vice versa. The other computes the crossentropy of the combined source and target datasets against a uniform distribution drawn from both
(Tzeng et al., 2015). In our experiments, we found that these different losses all yielded similar performance and so focus on gradient reversal, which was also used successfully in a related work in domain adaptation for information retrieval (Cohen et al., 2018).Since we will focus on gradient reversal, we provide an illustration of the technique in Figure 4 and will henceforth refer to our proposed training method from the class of discriminatorbased techniques as the gradient reversal method. The embedding parameters are (green), the prediction model parameters are (red), and the discriminator parameters are (blue). The gradient updates in each time step are given in the figure as a partial derivative of the loss functions with respect to the parameters.
4.4.2. StatisticsBased Techniques
The embeddings from the source and target data points are subsets in our embedding space, which we can think of as distributions. Consequently, we can extract various statistics from the distributions and encourage the model to match the statistics coming from the two datasets. We focus on using the mean of the distributions. While two distributions can have the same or similar means but still be very different, we found empirically that this statistic actually worked quite well in making the two distributions indistinguishable to the prediction model. Specifically, we add a term to the model loss function consisting of the difference in the means of the source and target embedding distributions. Since neural networks work by minimizing their loss functions, this allows the network to take steps to minimize the difference in the means, drawing the two distributions closer together. We provide a pictorial representation of this technique in Figure 5 which we refer to as maximum mean discrepancy (MMD). The two distributions are given in red and blue, and their means are represented by a bold point. Applying an MMD minimization does not change the shape of either distribution, but brings their means closer together.
The total loss for the model is then defined as:
(7) 
Where is the prediction model loss (i.e., Equation 3) and is the maximum mean discrepancy loss. The factor also controls the effect of the MMD on the overall loss relative to the prediction loss.
Formally, the MMD loss, i.e., is given by:
(8) 
Embedding before MMD Minimization 

Embedding after MMD Minimization 
Since we are attempting to make two distributions indistinguishable in latent space, it is natural to also include other statistics. Most notably, we could also add a variance term, and aim to minimize not only the mean, but also the variance. We note that since our representations exist in a high dimensional space, we are comparing two covariance matrices in this case. Nonetheless, a discrepancy term can be added to encourage these to be similar. In our experiments, though, we found that adding such a variance term did not alter the results in any significant way.
As a remark, we note that even if two distributions share the same mean and covariance matrix, they can still be quite different. However, if the distributions are close to Gaussian, then they would be characterized by their first two moments. Of course, we cannot prove that the neural network will find representations that map the inputs to a Gaussian subspace of embedding space. However, we did find experimentally that projecting the distributions of representations to random directions yielded onedimensional distributions that looked Gaussian. Thus, it is reasonable to believe that with a large enough training set, the representations would converge to something close to Gaussian.
5. Experiments
In this section, we begin with a description of the datasets we use as input in our experiments. Then, we evaluate each of our proposed techniques and baselines using a typical evaluation metric, which we will define. Finally, we discuss the sensitivity of each technique to changes in hyperparameters, as robustness to hyperparameter tuning hastens the training process.
5.1. Datasets
Due to the private and sensitive nature of the data, there is no publicly available largescale enterprise email search dataset. As a result, the data we use comes from the search click logs of Gmail, a commercial email service. For our source dataset, we use click data from the entire Gmail search log. We then study domain adaptation to data arising from logs of four individual enterprise domains. The search logs for the source data consist of hundreds of millions of queries, whereas the target domains are significantly smaller. We chose the four largest domains (selected based on the total number of examples) as our target datasets and label them as A, B, C, and D. Domain A has around 65,000 total examples, B and C have around 50,000 each, and D has 30,000 queries, all significantly smaller than the source dataset. The domains, including the source domain, are split into training and evaluation sets at approximately a ratio, and in such a way that all queries in the evaluation sets are performed on days after those in the training sets. Each example consists of a query with six candidate documents, one of which is clicked.
The goal of the model is to rank the six documents in such a way as to increase the likelihood of a higher ranked document being clicked. In this way, clicks are regarded as the ground truth from which our model learns.
5.2. Model Evaluation
Our neural network models are implemented in TFRanking (Pasumarthi et al., 2019)
, a scalable opensource learningtorank Tensorflow
(Abadi et al., 2016)library. Our baselines are optimized over a number of hyperparameters, including learning rate, number of hidden layers, dimensions of layers, and batch normalization. Specifically, we use a learning rate of
and three hidden layers with dimensions 256, 128, and 64. For each training procedure that takes as input both source and target training data, we also tried a number of different ratios of source to target training data. However, we found that none of the procedures were sensitive to this ratio, as long as it was larger than or . Anything lower would cause overfitting, since the target dataset was so much smaller than the source. Then, for the mean discrepancy (Eq. 7) and gradient reversal (Eq 4) losses, the multipliers are optimized over .Model performance is evaluated using weighted mean reciprocal rank (WMRR), as proposed in (Wang et al., 2016). The weighted MRR (WMRR) is calculated using the one clicked document of any query as:
(9) 
where denotes the evaluation set, denotes the position or rank of the clicked document for the th query, and denotes the bias correction weights. The
are inversely proportional to the probability of observing a click at the clicked position and are set using result randomization, as described in
(Wang et al., 2016). In addition to reporting the WMRR attained by each model, we also conduct statistical significance tests using the twotailed paired ttest with
confidence.5.3. Results and Discussion
In this section, we provide our main results, as well as accompanying discussion. We first describe the two standard baseline training methods.
Standard Baselines:

Train on all. This is the simplest baseline. We train a model on the entire source dataset, and then evaluate it on the specific domain test data.

Train on domain. We form a training set consisting of only domainspecific data. As expected, there is not enough data to train a neural network capable of generalizing to test data. Not only does the model have a low WMRR, but we also see severe overfitting.
Since our goal is a thorough analysis of possible ways to train a prediction model for a specific domain, we also tried additional baselines. Both the additional baselines typically outperformed the standard baselines, and we suggest that they should be used for comparison in any domain adaptation study.
Additional Baselines:

Retrain. This is typically known as vanilla transfer learning. We first load up a train on all model. Then, we retrain this model on only domain data with a lower learning rate. Specifically, we reduce the learning rate by a factor of .

Batchbalance. This model is similar to the train on all, in that the training set consists of the entire source dataset. The difference is that we enforce a certain proportion of target domain data in each training batch.
A  B  C  D  
Train on all  0.659  0.692  0.611  0.598 
Train on domain  0.639  0.694  0.573  0.579 
Retrain  0.675  0.713  0.608  0.618 
Batchbalance  0.682  0.715  0.608  0.621 
From Table 2, we can see that generally, train on domain performs the worst of all baselines. As noted before, this makes sense due to the fact that the domains do not provide enough training data for neural network models. Then, we have our standard training method train on all. Finally, retrain and batchbalance have roughly the same performance, with the latter performing slightly better for some domains. These are exactly the results we would expect, since these two methods are more involved than only training on domainspecific data or all the source data we have.
Now, we briefly describe our proposed training methods. While they are described in full detail in Section 4.4, we review them here for convenience.
Domain Adaptation Methods:

Gradient Reversal. As in the Batchbalance baseline, we enforce a certain proportion of domain data in each training batch. A discriminator is then added to try and distinguish, from the embeddings, whether data is from the specific domain. Gradient reversal is used on the embedding weights to fool the discriminator. The resulting loss is described in Equation 4.

Mean Discrepancy. Again, we enforce a certain proportion of domain data in each training batch. A regularization term is added to the standard cross entropy loss consisting of the difference in means of the source and target input embeddings. The resulting loss is described in Equation 7.
Our main table of results is provided in Table 3. Our numbers are recorded as relative improvement of our proposed domain adaptation methods to the corresponding baseline methods.
Domain A  Gradient Reversal  Mean Discrepancy  Domain B  Gradient Reversal  Mean Discrepancy 

Train on all  +4.16%*  +4.38%*  Train on all  +2.99%*  +4.00%* 
Train on domain  +7.30%*  +7.52%*  Train on domain  +2.77%*  +3.79%* 
Retrain  +1.60%*  +1.82%*  Retrain  +0.02%  +1.00%* 
Batchbalance  +0.44%*  +0.65%*  Batchbalance  0.24%*  +0.75%* 
Domain C  Gradient Reversal  Mean Discrepancy  Domain D  Gradient Reversal  Mean Discrepancy 
Train on all  +1.37%*  +1.49%*  Train on all  +2.45%*  +5.30%* 
Train on domain  +8.04%*  +8.17%*  Train on domain  +5.77%*  +8.71%* 
Retrain  +1.85%*  +1.97%*  Retrain  0.92%*  +1.83%* 
Batchbalance  +1.78%*  +1.91%*  Batchbalance  1.44%*  +1.30%* 
While the improvement changes from domain to domain, mean discrepancy is consistently the best performing proposed method. In every instance, mean discrepancy achieves a higher WMRR than any of the baselines. To give perspective, we note that improvements of are considered to be highly significant for our enterprise email search system. Compared to Retrain, mean discrepancy achieves at least achievement, although for Domains A and B, it does not quite outperform batchbalance by this much.
While not directly listed as a comparison in the table, we also note that mean discrepancy outperforms gradient reversal in a statistically significant way. In image classification, adversarial methods have shown to be better than those using maximum mean discrepancy (Ghifary et al., 2016; Ganin and Lempitsky, 2014; Tzeng et al., 2015) for domain adaptation to an unsupervised domain. But in our experiments, the opposite was shown to be true. While we cannot say for certain why this difference exists, we provide a few possible explanations. We first recall that the set of training examples aims to approximate the true distribution of inputs. Since maximum mean discrepancy aims to minimize the difference between source and target distribution means, the method is highly dependent on how well the mean is approximated by training examples. Since the typical size of datasets considered in prior work is quite small, often even smaller than a single target domain, the mean of the training example embeddings may not accurately represent the true mean. With a thousand times more inputs in our source dataset, the mean is more accurately approximated and more useful for maximum mean discrepancy.
But even with good approximation of the true mean, it is fairly common to find situations in which reducing the MMD would not suffice to make two distributions indistinguishable. One can easily imagine two distributions with identical mean that are still drastically different. But as we showed in Table 1, the source and target data embeddings in our problem do have significantly different means. Because of this, using MMD with the way we embed the querydocument inputs ends up working very well for our domain adaptation task.
5.4. Sensitivity Analysis
In this section, we discuss the sensitivity of the mean discrepancy and gradient reversal methods. In a regime with complicated inputs and long training times, a desired quality of any training method is robustness to hyperparameters. Therefore, we compare the sensitivity of our two proposed training methods, maximum mean discrepancy and gradient reversal, to the changes in their respective parameters. Recall that the set of parameters dictates the interactions of the distributionmatching correction terms – part (3) of Figure 3 – with the ranking model’s softmax crossentropy term (see Equations 4 and 7).
Careful parameter tuning is especially important when using methods based on twoplayer games, such as gradient reversal. In general, twoplayer games are sensitive to changes in parameters, making a good equilibrium difficult for gradient descent to find (Roth et al., 2017). As a result, we hypothesize that maximum mean discrepancy is the better training method for our enterprise email search setting, not only because of better overall WMRR, but also due to its robustness to changes in . In what follows, we provide some empirical evidence to back up this hypothesis.
First, in Figure 6, we plot the resulting WMRR from training using a range of values. For the mean discrepancy method, this corresponds to , and for gradient reversal, we fix two values of and vary on the xaxis. The WMRR curves for fixed values of are shown in order to give a direct comparison between the mean discrepancy and gradient reversal methods. Additionally, we plot the entire threedimensional surface of the WMRR metric as a function of both and in Figure 7.
From Figure 6, we can see that for a large range of values, the resulting WMRR is relatively stable. Specifically, in the range of values we consider, from to , the WMRR values remain within a range. Qualitatively, this robustness to tuning holds for all domains.
On the other hand, the plots for gradient reversal support our conjecture that it is not as robust as mean discrepancy. From Figure 6, we see a direct comparison showing the greater sensitivity gradient reversal has relative to mean discrepancy. Moreover, from Figure 7, we observe that the WMRR values are as far apart as from each other, nearly ten times as big a difference as we see for the mean discrepancy method. Again, similar trends could be observed for other domains.
6. Conclusions
In this paper, we studied the application of domain adaptation to learningtorank, specifically in the setting of enterprise email search. We developed a formal framework for integrating two techniques from the image classification literature for transfer learning, maximum mean discrepancy (MMD) and gradient reversal, in the learningtorank models. Our models were implemented in Tensorflow using a deep neural network that efficiently handles various features from querydocument inputs, and provides embeddings to which the domain adaptation methods are applied.
The results from our experiments on a largescale enterprise email search engine indicate that neither a single global model, nor simple transfer learning baselines are sufficient for achieving the optimal performance for individual domains. Overall, we show that maximum mean discrepancy (MMD) is the best technique for adapting the global learningtorank model to a small target domain in enterprise email search. MMD is not only the most effective method on all the tested domains, it also displays robustness to parameter changes.
One possible future direction of study is using regularization terms involving statistics other than the mean. Another is to find more stable equilibrium for disciminatorbased methods. While much work has been done (Salimans et al., 2016; Gulrajani et al., 2017; Arjovsky and Bottou, 2017; Roth et al., 2017) to improve the stability of models involving twoplayer games, thse are often very taskspecific. Finally, while in this paper we explored domain adaptation specifically in the enterprise email search setting, the proposed methods can easily generalize to other information retrieval tasks.
References
 (1)
 Abadi et al. (2016) Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. Tensorflow: a system for largescale machine learning.. In Operating Systems Design and Implementation, Vol. 16. 265–283.
 Ai et al. (2017) Qingyao Ai, Susan T Dumais, Nick Craswell, and Dan Liebling. 2017. Characterizing email search using largescale behavioral logs and surveys. In Proceedings of the 26th International Conference on World Wide Web. 1511–1520.
 Arjovsky and Bottou (2017) Martin Arjovsky and Léon Bottou. 2017. Towards principled methods for training generative adversarial networks. arXiv preprint arXiv:1701.04862 (2017).
 Borisov et al. (2016) Alexey Borisov, Ilya Markov, Maarten de Rijke, and Pavel Serdyukov. 2016. A neural click model for web search. In Proceedings of the 25th International Conference on World Wide Web. 531–541.
 Burges et al. (2005) Chris Burges, Tal Shaked, Erin Renshaw, Ari Lazier, Matt Deeds, Nicole Hamilton, and Greg Hullender. 2005. Learning to rank using gradient descent. In Proceedings of the 22nd International Conference on Machine Learning. 89–96.
 Burges (2010) Christopher JC Burges. 2010. From Ranknet to Lambdarank to Lambdamart: An overview. Learning 11, 23581 (2010), 81.
 Cao et al. (2007) Zhe Cao, Tao Qin, TieYan Liu, MingFeng Tsai, and Hang Li. 2007. Learning to rank: from pairwise approach to listwise approach. In Proceedings of the 24th International Conference on Machine Learning. 129–136.
 Carmel et al. (2015) David Carmel, Guy Halawi, Liane LewinEytan, Yoelle Maarek, and Ariel Raviv. 2015. Rank by time or by relevance?: Revisiting email search. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. 283–292.
 Cohen et al. (2018) Daniel Cohen, Bhaskar Mitra, Katja Hofmann, and W Bruce Croft. 2018. Cross domain regularization for neural ranking models using adversarial learning. arXiv preprint arXiv:1805.03403 (2018).
 Dehghani et al. (2017) Mostafa Dehghani, Hamed Zamani, Aliaksei Severyn, Jaap Kamps, and W Bruce Croft. 2017. Neural ranking models with weak supervision. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval. 65–74.

Diakonikolas et al. (2016)
Ilias Diakonikolas, Gautam
Kamath, Daniel M Kane, Jerry Li,
Ankur Moitra, and Alistair Stewart.
2016.
Robust estimators in high dimensions without the computational intractability. In
IEEE 57th Annual Symposium on Foundations of Computer Science. 655–664.  Dumais et al. (2016) Susan Dumais, Edward Cutrell, Jonathan J Cadiz, Gavin Jancke, Raman Sarin, and Daniel C Robbins. 2016. Stuff I’ve seen: a system for personal information retrieval and reuse. In ACM SIGIR Forum, Vol. 49. 28–35.
 Edizel et al. (2017) Bora Edizel, Amin Mantrach, and Xiao Bai. 2017. Deep CharacterLevel ClickThrough Rate Prediction for Sponsored Search. arXiv preprint arXiv:1707.02158 (2017).

Friedman (2001)
Jerome H Friedman.
2001.
Greedy function approximation: a gradient boosting machine.
Annals of Statistics (2001), 1189–1232.  Ganin and Lempitsky (2014) Yaroslav Ganin and Victor Lempitsky. 2014. Unsupervised domain adaptation by backpropagation. arXiv preprint arXiv:1409.7495 (2014).
 Ganin et al. (2016) Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, François Laviolette, Mario Marchand, and Victor Lempitsky. 2016. Domainadversarial training of neural networks. The Journal of Machine Learning Research 17, 1 (2016), 2096–2030.

Ghifary et al. (2016)
Muhammad Ghifary,
W Bastiaan Kleijn, Mengjie Zhang,
David Balduzzi, and Wen Li.
2016.
Deep reconstructionclassification networks for
unsupervised domain adaptation. In
European Conference on Computer Vision
. 597–613.  Goodfellow et al. (2014) Ian Goodfellow, Jean PougetAbadie, Mehdi Mirza, Bing Xu, David WardeFarley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems. 2672–2680.
 Gretton et al. (2009) A. Gretton, AJ. Smola, J. Huang, M. Schmittfull, KM. Borgwardt, and B. Schölkopf. 2009. Covariate shift and local learning by distribution matching. MIT Press, Cambridge, MA, USA, 131–160.
 Grevet et al. (2014) Catherine Grevet, David Choi, Debra Kumar, and Eric Gilbert. 2014. Overload is overloaded: Email in the age of Gmail. In Proceedings of the Sigchi Conference on Human Factors in Computing Systems. 793–802.
 Gulrajani et al. (2017) Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville. 2017. Improved training of Wasserstein Gans. In Advances in Neural Information Processing Systems. 5767–5777.
 Guo et al. (2016) Jiafeng Guo, Yixing Fan, Qingyao Ai, and W Bruce Croft. 2016. A deep relevance matching model for adhoc retrieval. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management. 55–64.
 Hawking (2010) David Hawking. 2010. Enterprise Search. In Modern Information Retrieval, 2nd Edition, Ricardo BaezaYates and Berthier RibeiroNeto (Eds.). AddisonWesley, 645–686. http://davidhawking.net/pubs/ModernIR2_Hawking_chapter.pdf
 Huang et al. (2013) PoSen Huang, Xiaodong He, Jianfeng Gao, Li Deng, Alex Acero, and Larry Heck. 2013. Learning deep structured semantic models for web search using clickthrough data. In Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management. 2333–2338.
 Joachims (2002) Thorsten Joachims. 2002. Optimizing search engines using clickthrough data. In Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 133–142.
 Kim et al. (2017) Jin Young Kim, Nick Craswell, Susan Dumais, Filip Radlinski, and Fang Liu. 2017. Understanding and Modeling Success in Email Search. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval. 265–274.
 Kruschwitz and Hull (2017) Udo Kruschwitz and Charlie Hull. 2017. Searching the Enterprise. Foundations and Trends® in Information Retrieval 11, 1 (2017), 1–142. https://doi.org/10.1561/1500000053
 Lai et al. (2016) Kevin A Lai, Anup B Rao, and Santosh Vempala. 2016. Agnostic estimation of mean and covariance. In IEEE 57th Annual Symposium on Foundations of Computer Science. 665–674.
 LeCun et al. (2015) Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep Learning. Nature 521, 7553 (2015), 436.
 Liu and Tuzel (2016) MingYu Liu and Oncel Tuzel. 2016. Coupled generative adversarial networks. In Advances in neural information processing systems. 469–477.
 Long et al. (2018) Fuchen Long, Ting Yao, Qi Dai, Xinmei Tian, Jiebo Luo, and Tao Mei. 2018. Deep Domain Adaptation Hashing with Adversarial Learning. In the 41st International ACM SIGIR Conference on Research; Development in Information Retrieval.
 Long et al. (2015) Mingsheng Long, Yue Cao, Jianmin Wang, and Michael I Jordan. 2015. Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791 (2015).
 Mao et al. (2018) Sitong Mao, Xiao Shen, and Fulai Chung. 2018. Deep Domain Adaptation Based on Multilayer Joint Kernelized Distance. In the 41st International ACM SIGIR Conference on Research; Development in Information Retrieval.
 Mitra and Craswell (2017) Bhaskar Mitra and Nick Craswell. 2017. Neural Models for Information Retrieval. arXiv preprint arXiv:1805.03403 (2017).
 Mohri et al. (2018) Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. 2018. Foundations of machine learning. MIT press.
 Pasumarthi et al. (2019) Rama Kumar Pasumarthi, Sebastian Bruch, Xuanhui Wang, Cheng Li, Michael Bendersky, Marc Najork, Jan Pfeifer, Nadav Golbandi, Rohan Anil, and Stephan Wolf. 2019. TFRanking: Scalable TensorFlow Library for LearningtoRank. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. (to appear).
 Roth et al. (2017) Kevin Roth, Aurelien Lucchi, Sebastian Nowozin, and Thomas Hofmann. 2017. Stabilizing training of generative adversarial networks through regularization. In Advances in Neural Information Processing Systems. 2018–2028.
 Salimans et al. (2016) Tim Salimans, Ian Goodfellow, Wojciech Zaremba, Vicki Cheung, Alec Radford, and Xi Chen. 2016. Improved techniques for training gans. In Advances in Neural Information Processing Systems. 2234–2242.
 Shen et al. (2018) Jiaming Shen, Maryam Karimzadehgan, Michael Bendersky, Zhen Qin, and Don Metzler. 2018. MultiTask Learning for Personal Search Ranking with Query Clustering. In Proceedings of ACM Conference on Information and Knowledge Management.
 Sun and Saenko (2016) Baochen Sun and Kate Saenko. 2016. Deep coral: Correlation alignment for deep domain adaptation. In European Conference on Computer Vision. 443–450.
 Tzeng et al. (2015) Eric Tzeng, Judy Hoffman, Trevor Darrell, and Kate Saenko. 2015. Simultaneous deep transfer across domains and tasks. In Proceedings of the IEEE International Conference on Computer Vision. 4068–4076.

Tzeng
et al. (2017)
Eric Tzeng, Judy Hoffman,
Kate Saenko, and Trevor Darrell.
2017.
Adversarial discriminative domain adaptation. In
Computer Vision and Pattern Recognition
. 4.  Tzeng et al. (2014) Eric Tzeng, Judy Hoffman, Ning Zhang, Kate Saenko, and Trevor Darrell. 2014. Deep domain confusion: Maximizing for domain invariance. arXiv preprint arXiv:1412.3474 (2014).
 Wang et al. (2016) Xuanhui Wang, Michael Bendersky, Donald Metzler, and Marc Najork. 2016. Learning to rank with selection bias in personal search. In Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. 115–124.
 Xia et al. (2008) Fen Xia, TieYan Liu, Jue Wang, Wensheng Zhang, and Hang Li. 2008. Listwise approach to learning to rank: theory and algorithm. In Proceedings of the 25th International Conference on Machine Learning. 1192–1199.
 Zamani et al. (2017) Hamed Zamani, Michael Bendersky, Xuanhui Wang, and Mingyang Zhang. 2017. Situational context for ranking in personal search. In Proceedings of the 26th International Conference on World Wide Web. 1531–1540.
Comments
There are no comments yet.