1 Introduction
Learning models of transition systems has been a core concern within machine learning, with applications ranging from system identification of dynamical systems
(Schmidt & Lipson, 2009) and inference of human choice behaviour (Glimcher, 2011; Brendel & Todorovic, 2011) to reverse engineering the behaviour of a device or computer program from observations and traces (Vaandrager, 2017). With the increasing use of these learnt models in the inner loops of decision making systems, e.g., in robotics and humanmachine interfaces, it has become necessary to ensure not only that these models are accurate predictors of behaviour, but also that their causal mechanisms are exposed to the system designer in a more interpretable manner. There is also the need to explain the model in terms of counterfactual reasoning (Bottou et al., 2013), e.g., what would we expect the system to do if a certain variable were changed or removed, or model checking (Baier & Katoen, 2008) of longer term properties including safety and large deviations in performance. We address these needs through a program induction based framework.We propose to learn high level functional programs in order to represent abstract models which capture the invariant structure in the observed data. Recent works have demonstrated the usefulness of program representations in capturing humanlike concepts (Lake et al., 2015). Used in this way, programbased representations boost generalisation and enable oneshot learning. Also, and arguably more importantly, they are significantly more amenable to model checking and human interpretability.
In this paper, we introduce the machine (programinduction machine), an architecture which is able to induce LISPlike programs from observed transition system data traces in order to explain various phenomena. Inspired by differentiable neural computers (Graves et al., 2014, 2016), the machine, as shown in Figure 1
, is composed of a memory unit and a controller capable of learning programs from data by exploiting the scalability of stochastic gradient descent. However, the final program obtained after training is not an opaque object encoded in the weights of a controller neural network, but a LISPlike program which provides a rigorous and interpretable description of the observed phenomenon. A key feature of our approach is that we allow the user to provide a set of predicates of interest in order to specify the properties they are interested in understanding as well as the context in which the data is to be explained. By exploiting the equivalence between computational graphs and functional programs we describe a hybrid optimisation procedure based on backpropagation, gradient descent, and A* search which is used to induce programs from data traces.
We evaluate the performance of the machine on two different problems. Firstly, we apply it to data from physics experiments and show that it is able to induce programs which represent fundamental laws of physics. The learning procedure has access to relevant variables, but it does not have any other prior knowledge regarding physical laws which it has discovered in the same sense as in (Schmidt & Lipson, 2009)
although far more computationally tractably. Secondly, we study the use of the proposed procedure in explaining control policies learnt by a deep Qnetwork (DQN). Starting from behaviour traces of a reinforcement learning agent that has learnt to play the game of Pong, we demonstrate how the
machine learns a functional program to describe that policy.2 Related work
Explainability and interpretability.
The immense success of deep neural network based learning systems and their rapid adoption in numerous real world application domains has renewed interest in the interpretability and explainability of learnt models (Gunning, 2016). There is recognition that Bayesian rule lists (Letham et al., 2015; Yang et al., 2016)
, decision trees and probabilistic graphical models are interpretable to the extent that they impose strong structural constraints on models of the observed data and allow for various types of queries, including introspective and counterfactual ones. In contrast, deep learning models usually are trained ‘per query’ and have numerous parameters that could be hard to interpret.
Zeiler & Fergus (2014) introduced deconvolutional networks in order to visualise the layers of convolutional networks and provide a more intuitive understanding of why they perform well. Zahavy et al. (2016)describe SemiAggregated Markov Decision Process (SAMDP) in order to analyse and understand the behaviour of a DQN based agent. Methods for textual rationalisation of the predictions made by deep models have also been proposed
(Harrison et al., 2017; Hendricks et al., 2016; Lei et al., 2016). While all of these works provide useful direction, more generic methods are required which need not be handcrafted to explain specific aspects of individual models. In this sense, we follow the modelagnostic explanation approach of Ribeiro et al. (2016), who provide “textual or visual artefacts” explaining the prediction of any classifier by treating it as a blackbox. Similarly to the way in which
(Ribeiro et al., 2016) utilise local classifiers composed together to explain a more complex model, we present an approach to incrementally constructing functional programs that explain a complex transition system from more localised predicates of interest.The machine treats the process which has generated the observed data as a blackbox and attempts to induce LISPlike program which can be interpreted and used to explain the data. We show that the proposed method can be applied both to introspection of machine learning models and to the broader context of autonomous agents.
Program learning and synthesis.
Program learning and synthesis has a long history, with the longstanding challenge being the high complexity deriving from the immense search space. Following classic and pioneering work such as by Shapiro (1983)
who used inductive inference in a logic programming setting, others have developed methods based on a variety of approaches ranging from SAT solvers
(SolarLezama et al., 2006)(Schmidt & Lipson, 2009), which tend to scale poorly hence often become restricted to a narrow class of programs. Recently, deep neural networks have been augmented with a memory unit resulting in models similar to the original von Neumann architecture. These models can induce programs through stochastic gradient descent by optimising performance on input/output examples (Graves et al., 2014, 2016; Grefenstette et al., 2015) or synthetic execution traces (Reed & De Freitas, 2015; Cai et al., 2017; Ling et al., 2017). Programs induced with such neural architectures are encoded in the parameters of the controller network and are, in general, not easily interpretable (particularly from the point of view of being able to ask counterfactual questions or performing model checking). Another approach is to directly generate the source code of the output program which yields consistent high level programs. Usually, these types of approaches require large amounts of labelled data  either program input/output examples (Devlin et al., 2017; Balog et al., 2016) or input paired with the desired output program code (Yin & Neubig, 2017).Determining how many input/output examples or execution traces are required in order to generalise well is still an open research problem. However, in this paper, we focus attention more on the explanatory power afforded by programs rather than on the broader problems of generalisation in the space of programs. While these characteristics are of course related, we take a view similar to that of Ribeiro et al. (2016), arguing that it is possible to build from locally valid program fragments which provide useful insight into the blackbox processes generating the data. By combining gradient descent and A* search the machine is able to learn informative and interpretable highlevel LISPlike programs, even just from a single observation trace.
3 Problem definition
Consider the labelled transition system where is a nonempty set of states, is a nonempty set of actions, each parametrised by , and is the state transition function. We define an observation trace as a sequence of observed stateaction pairs generated by the recursive relationship for . We are interested in inducing a LISPlike functional program which when executed by an abstract machine is mapped to an execution trace such that and are equivalent according to an input specification.
We represent the abstract machine as another labelled transition system where is the set of possible memory state configurations, is the set of supported instructions and specifies the effect of each instruction. We consider two types of instructions – primitive actions which emulate the execution of or arithmetic functions such that . Furthermore, a set of observed state variables , which vary over time, are stored in memory together with a set of induced free parameters . The variables in form a context which the program will be built on. A custom detector , operating on the raw data stream, could be provided for each variable, thus enabling the user to make queries with respect to different contexts and property specifications.
The execution of a program containing primitive actions results in a sequence of actions. Therefore, we represent a program as a function which maps a set of input variables and a set of free parameters to a finite sequence of actions . We are interested in inducing a program which minimises the total error between the executed and the observed actions:
(1) 
The error function determines the difference between two actions, while compares the lengths of the generated and observed action traces. By providing the error functions and one can target different aspects of the observation trace to be explained as they specify when two action traces are equivalent.
4 Method
The proposed program induction procedure is based on two major steps. Firstly, we explain how a given functional program can be optimised such that the loss is minimised. Secondly, we explain how the space of possible program structures can be searched efficiently by utilising gradient information. An architectural overview of the machine is provided in Figure 1.
4.1 Program optimisation
Neural networks are naturally expressed as computational graphs which are the most fundamental abstraction in computational deep learning frameworks Tokui et al. (2015); Bergstra et al. (2010); Abadi et al. (2016). Optimisation within a computational graph is usually performed by pushing the input through the entire graph in order to calculate the output (forward pass) and then backpropagating the error signal to update each parameter (backward pass). A key observation for the development of the machine is that computational graphs and functional programs are equivalent as both describe arbitrary compositions of pure functions applied to input data. Therefore, similarly to a computational graph, a functional program can also be optimised by executing the program (forward pass), measuring the error signal and then performing backpropagation to update the program (backward pass).
Forward pass.
When a program is executed it is interpreted to a sequence of instructions which are executed by recursively calling . is the initial memory state initialised with the observed variables from and any induced parameters. The machine keeps a time counter which is initialised to 1 and is automatically incremented whenever a primitive action instruction is executed. If the instruction is a primitive action, , then the machine automatically sets and invokes the error function , where has been calculated by previous instructions. If the error is above a certain threshold the program execution is terminated and the backward pass is initiated. Otherwise, the time counter is incremented and the values of the variables in are automatically updated to the new observed state. Essentially, the machine simulates the execution of each action reflecting any changes it has caused in the observed state. Alternatively, if the currently executed instruction is a function, , then the resulting value is calculated and , together with its arguments, is added to a detailed call trace maintained by the machine. Importantly, each function argument is either a parameter or a variable read from memory at time or the result of another function. All this information is kept in which eventually contains the computational tree of the program.
Backward pass.
The gradients of the loss function
with respect to the program inputs and are required to perform a gradient descent step. Crucially, programs executed by the machine are automatically differentiated. The machine performs reversemode automatic differentiation, similarly to Autograd Maclaurin et al. (2015), by traversing the call trace , and postmultiplying Jacobian matrices. We assume that the Jacobian matrix with respect to every input argument of any function or any specified error function is known a priori. Let be a function whose output needs to be differentiated with respect to the input arguments. There are three types of derivatives, which need to be considered in order to traverse backwards the entire tree of computations:
Let , then is the Jacobian matrix of with respect to the output of and can be directly calculated.

Let , then the gradient is calculated by multiplying the corresponding Jacobian matrix of with the value of .

Let , then the gradient is calculated by multiplying the corresponding Jacobian of with the value of the variable at the time it was read from memory .
Gradient descent step.
Once the gradient of the loss function with respect to each input parameter is calculated we utilise AdaGrad Duchi et al. (2011) to update the values of all parameters after each program execution. The gradient with respect to each input variable
is also available. However, a variable cannot be simply updated in the direction of the gradient as it represents a symbol, not just a value. Variables can only take values from memory which is automatically updated according to the observation trace during execution. Nevertheless, the gradient provides important information about the direction of change which we utilise to find variables that minimise the loss. Whenever the memory state is automatically updated, a KDtree is built for each type of variable stored in memory. We assume that the variables in memory are real vectors with different length. So, we represent the KDtree which stores all
dimensional variables in memory at time as . If a dimensional variable is to be optimised it is replaced with a temporary parameter initialised with which is the value of read from memory at the respective time step . The temporary parameter is also updated with AdaGrad Duchi et al. (2011). After each descent step, the nearest neighbour of the updated value is determined by querying the KDtree with . If the result of the query is a different dimensional variable then the temporary parameter is immediately set to . As this often shifts the solution to a new region of the error space the gradient history for all parameters is reset. Eventually, when a solution is to be returned, the temporary parameters are substituted with their closest variables according to the respective . The forward and backward passes are repeated until the error is below the maximum error threshold or a maximum number of iterations is reached. After that the optimised program is scored according to its error and complexity, and pushed to a priority queue holding potential solutions.4.2 Structure search
We represent the space of possible program structures as a graph where each node is a valid program abstract syntax tree (AST). There is an edge from to if and only if can be obtained by replacing exactly one of the leaves in with a subtree of depth 1. The program induction procedure always starts with an empty program. So, we frame structure search as a path finding problem, solved through the use of A* search.
Score function.
The total cost function we use is , where is the loss function defined in equation (1) and is a function which measures the complexity of the program . can be viewed as the cost to reach and as the distance to the desired goal. The complexity function is the weighted sum of (i) maximum depth of the program AST; (ii) the number of free parameters; (iii) the number of variables used by the program; the weights of which we set to . These choices ensure that short programs, maximally exploiting structure of the observation trace, are preferred.
Neighbours expansion.
When the current best candidate solution is popped from the priority queue, we check if it matches the observation trace according to the input specification. If so, the candidate can be returned as the final solution, otherwise it is used as a seed to propose new candidate solutions. Typically in A* search, all neighbouring nodes are expanded and pushed to the priority queue, which is not feasible in our case, though. Therefore, we utilise the available gradients in order to perform a guided proposal selection. Each leaf in the abstract syntax tree of a seed candidate solution corresponds to a parameter or a variable. According to the definition of we need to select exactly leaf to be replaced with a subtree of depth 1. We select leaf according to:
(2) 
After that, all possible replacement subtrees are constructed. An AST subtree of depth 1 represents a function call. We prune the number of possible functions in by ensuring type consistency. Each leaf of
can be a parameter or a variable. So, all possible combinations are considered. New variable leaves are initialised to a random variable with suitable type from memory, while new parameter leaves are sampled from the multivariate normal distribution
. As a result, if functions are type compatible with and each function takes arguments at most, then there are replacement subtrees, resulting in that many new candidates. All newly proposed candidates are optimised in parallel, scored by and pushed to the priority queue.5 Experimental results
The machine is implemented in Clojure, which is a LISP dialect supporting powerful data structures and homoiconic syntax. All experiments are run on an Intel Core i74790 processor with 32GB RAM and use the following list of functions, : vector addition, subtraction and scaling.
Physical systems.
Firstly, we apply the machine to model learning for physical systems. The transition dynamics of a second order dynamical system is written as , where is the state of the system at time and are system coefficients. We have recreated an experiment described in Schmidt & Lipson (2009), where the authors show the learning of physical laws associated with classical mechanical systems including the simple pendulum and linear oscillator. A diagram of these two systems is shown in Figure 2 (left). We set where for both experiments. The observation trace for each system is generated by simulating the dynamics for 1s at 100Hz. We specify the action error function as and set . In both experiments and represent linear position and velocity.
The three best solutions found by the machine for each system are shown in Figure 2 (middle). The best solution for each system correctly represents the underlying laws of motion. The program describing the behaviour of the pendulum was induced in 18 iterations, while the linear oscillator program needed 146 iterations. The total number of possible programs with AST depth of 2, given the described experimental setup, is approximately . The average duration of an entire iteration (propose new programs, optimise and evaluate) was . Schmidt & Lipson (2009) achieve similar execution times, but distributed over 8 quad core computers (32 cores in total). The experimental results demonstrate that the machine can efficiently induce programs representing fundamental laws of physics.
Deep Qnetwork.
This experiment is based on our view that the core deep neural network based policy learner and the explanation layer play complementary roles. There are numerous advantages to performing endtoend policy learning, such as DQNlearning from raw video, however, there is also a need to explain the behaviour of the learnt policy with respect to userdefined properties of interest. We consider explaining the behaviour of a DQN agent playing the ATARI Pong game and are interested in the question: how does the network control the position of the paddle in order to hit the ball when it is in the right side of the screen. A diagram of the experimental setup is shown in figure 3 (left). The behaviour of the DQN is observed during a single game. Since the environment is deterministic, the state transition function, which generates the observation trace for this experiment, is the policy that the DQN has learnt. We would like to explain the behaviour of the DQN in terms of the position of the opponent, the ball and the DQN agent (so, not just in terms of RAM memory values, for instance). Therefore, the observation trace contains those positions which are extracted from each frame by a predefined detector. We set where and represent the discrete actions of the network left
, right
, nop
as , , respectively. We specify the action error function as and set .
The best 3 programs found by the machine are shown in Figure 3 (middle), where it took 38 iterations for the best one (average iteration duration 3.2s). By inspecting the second solution it becomes clear that the neural network behaviour can be explained as a proportional controller minimising the vertical distance between the agent and the ball. However, the best solution reveals even more structure in the behaviour of the DQN. The coefficient in front of the agent position is slightly larger than the one in front of the ball position which results in a small amount of damping in the motion of the paddle. Thus, it is evident that the DQN not only learns the value of each game state, but also the underlying dynamics of controlling the paddle. Furthermore, we have tested the performance of an agent following a greedy policy defined by the induced program. In our experiments over 100 games this agent achieved a score of . This is not quite the score of obtained by an optimised DQN, but it is better than human performance Mnih et al. (2015). This difference of course emanates from the predefined detector not capturing all aspects of what the perceptual layers in DQN have learnt, so improved detector choices should yield interpretable programs that also attain performance closer to the higher score of the blackbox policy.
6 Discussion
The machine can be viewed as a framework for automatic network architecture design (Zoph & Le, 2017; Negrinho & Gordon, 2017), as different models can be expressed as concise LISPlike programs. Deep learning methods for limiting the search space of possible programs, which poses the greatest challenge, have been proposed (Balog et al., 2016), but how they can be applied to more generic frameworks such as the machine is an open question. The specification of variable detectors not only addresses this issue, but enables the user to make targeted and well grounded queries about the observed data trace. Such detectors can also be learnt from raw data in an unsupervised fashion (Garnelo et al., 2016; Kim & Canny, 2017).
7 Conclusion
In conclusion, we propose a novel architecture, the machine, for inducing LISPlike functional programs from observed data traces by utilising backpropagation, stochastic gradient descent and A* search. The experimental results demonstrate that the machine can efficiently induce interpretable programs from short data traces.
References
 Abadi et al. (2016) Abadi, Martín, Agarwal, Ashish, Barham, Paul, Brevdo, Eugene, Chen, Zhifeng, Citro, Craig, Corrado, Greg S, Davis, Andy, Dean, Jeffrey, Devin, Matthieu, et al. Tensorflow: Largescale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467, 2016.
 Baier & Katoen (2008) Baier, Christel and Katoen, JoostPieter. Principles of Model Checking. The MIT Press, 2008.
 Balog et al. (2016) Balog, Matej, Gaunt, Alexander L, Brockschmidt, Marc, Nowozin, Sebastian, and Tarlow, Daniel. Deepcoder: Learning to write programs. arXiv preprint arXiv:1611.01989, 2016.
 Bergstra et al. (2010) Bergstra, James, Breuleux, Olivier, Bastien, Frédéric, Lamblin, Pascal, Pascanu, Razvan, Desjardins, Guillaume, Turian, Joseph, WardeFarley, David, and Bengio, Yoshua. Theano: A cpu and gpu math compiler in python. In Proc. 9th Python in Science Conf, pp. 1–7, 2010.
 Bottou et al. (2013) Bottou, Léon, Peters, Jonas, Candela, Joaquin Quinonero, Charles, Denis Xavier, Chickering, Max, Portugaly, Elon, Ray, Dipankar, Simard, Patrice Y, and Snelson, Ed. Counterfactual reasoning and learning systems: the example of computational advertising. Journal of Machine Learning Research, 14(1):3207–3260, 2013.
 Brendel & Todorovic (2011) Brendel, William and Todorovic, Sinisa. Learning spatiotemporal graphs of human activities. In Computer vision (ICCV), 2011 IEEE international conference on, pp. 778–785. IEEE, 2011.
 Cai et al. (2017) Cai, Jonathon, Shin, Richard, and Song, Dawn. Making neural programming architectures generalize via recursion. In International Conference on Learning Representations (ICLR), April 2017.
 Devlin et al. (2017) Devlin, Jacob, Uesato, Jonathan, Bhupatiraju, Surya, Singh, Rishabh, Mohamed, Abdelrahman, and Kohli, Pushmeet. Robustfill: Neural program learning under noisy i/o. arXiv preprint arXiv:1703.07469, 2017.
 Duchi et al. (2011) Duchi, John, Hazan, Elad, and Singer, Yoram. Adaptive subgradient methods for online learning and stochastic optimization. Journal of Machine Learning Research, 12(Jul):2121–2159, 2011.
 Garnelo et al. (2016) Garnelo, Marta, Arulkumaran, Kai, and Shanahan, Murray. Towards deep symbolic reinforcement learning. arXiv preprint arXiv:1609.05518, 2016.
 Glimcher (2011) Glimcher, Paul. Foundations of Neuroeconomic Analysis. Oxford University Press, 2011.
 Graves et al. (2014) Graves, Alex, Wayne, Greg, and Danihelka, Ivo. Neural turing machines. arXiv preprint arXiv:1410.5401, 2014.
 Graves et al. (2016) Graves, Alex, Wayne, Greg, Reynolds, Malcolm, Harley, Tim, Danihelka, Ivo, GrabskaBarwińska, Agnieszka, Colmenarejo, Sergio Gómez, Grefenstette, Edward, Ramalho, Tiago, Agapiou, John, et al. Hybrid computing using a neural network with dynamic external memory. Nature, 538(7626):471–476, 2016.
 Grefenstette et al. (2015) Grefenstette, Edward, Hermann, Karl Moritz, Suleyman, Mustafa, and Blunsom, Phil. Learning to transduce with unbounded memory. In Advances in Neural Information Processing Systems, pp. 1828–1836, 2015.

Gunning (2016)
Gunning, David.
DARPA Explainable Artificial Intelligence (XAI) Program.
http://www.darpa.mil/program/explainableartificialintelligence, 2016. [Online; accessed 14June2017].  Harrison et al. (2017) Harrison, Brent, Ehsan, Upol, and Riedl, Mark O. Rationalization: A neural machine translation approach to generating natural language explanations. arXiv preprint arXiv:1702.07826, 2017.
 Hendricks et al. (2016) Hendricks, Lisa Anne, Akata, Zeynep, Rohrbach, Marcus, Donahue, Jeff, Schiele, Bernt, and Darrell, Trevor. Generating visual explanations. In European Conference on Computer Vision, pp. 3–19. Springer, 2016.
 Kim & Canny (2017) Kim, Jinkyu and Canny, John. Interpretable learning for selfdriving cars by visualizing causal attention. arXiv preprint arXiv:1703.10631, 2017.
 Lake et al. (2015) Lake, Brenden M., Salakhutdinov, Ruslan, and Tenenbaum, Joshua B. Humanlevel concept learning through probabilistic program induction. Science, 350(6266):1332–1338, 2015.
 Lei et al. (2016) Lei, Tao, Barzilay, Regina, and Jaakkola, Tommi. Rationalizing neural predictions. arXiv preprint arXiv:1606.04155, 2016.
 Letham et al. (2015) Letham, Benjamin, Rudin, Cynthia, McCormick, Tyler H, Madigan, David, et al. Interpretable classifiers using rules and bayesian analysis: Building a better stroke prediction model. The Annals of Applied Statistics, 9(3):1350–1371, 2015.
 Ling et al. (2017) Ling, Wang, Yogatama, Dani, Dyer, Chris, and Blunsom, Phil. Program Induction by Rationale Generation:Learning to Solve and Explain Algebraic Word Problems. arXiv preprint arXiv:1705.04146, 2017.
 Maclaurin et al. (2015) Maclaurin, Dougal, Duvenaud, David, and Adams, Ryan P. Autograd: Effortless gradients in numpy. In ICML 2015 AutoML Workshop, 2015.
 Mnih et al. (2015) Mnih, Volodymyr, Kavukcuoglu, Koray, Silver, David, Rusu, Andrei A, Veness, Joel, Bellemare, Marc G, Graves, Alex, Riedmiller, Martin, Fidjeland, Andreas K, Ostrovski, Georg, et al. Humanlevel control through deep reinforcement learning. Nature, 518(7540):529–533, 2015.
 Negrinho & Gordon (2017) Negrinho, Renato and Gordon, Geoff. Deeparchitect: Automatically designing and training deep architectures. arXiv preprint arXiv:1704.08792, 2017.
 Reed & De Freitas (2015) Reed, Scott and De Freitas, Nando. Neural programmerinterpreters. arXiv preprint arXiv:1511.06279, 2015.
 Ribeiro et al. (2016) Ribeiro, Marco, Singh, Sameer, and Guestrin, Carlos. Why should I trust you?: Explaining the predictions of any classifier. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2016.
 Schmidt & Lipson (2009) Schmidt, Michael and Lipson, Hod. Distilling freeform natural laws from experimental data. Science, 324(5923):81–85, 2009.
 Shapiro (1983) Shapiro, Ehud Y. Algorithmic Program Debugging. MIT Press, Cambridge, MA, USA, 1983.
 SolarLezama et al. (2006) SolarLezama, Armando, Tancau, Liviu, Bodik, Rastislav, Seshia, Sanjit, and Saraswat, Vijay. Combinatorial sketching for finite programs. ACM SIGOPS Operating Systems Review, 40(5):404–415, 2006.
 Tokui et al. (2015) Tokui, Seiya, Oono, Kenta, Hido, Shohei, and Clayton, Justin. Chainer: a nextgeneration open source framework for deep learning. In Proceedings of workshop on machine learning systems (LearningSys) in the twentyninth annual conference on neural information processing systems (NIPS), 2015.
 Vaandrager (2017) Vaandrager, Frits. Model learning. Commun. ACM, 60(2):86–95, January 2017.
 Yang et al. (2016) Yang, Hongyu, Rudin, Cynthia, and Seltzer, Margo. Scalable bayesian rule lists. arXiv preprint arXiv:1602.08610, 2016.
 Yin & Neubig (2017) Yin, Pengcheng and Neubig, Graham. A syntactic neural model for generalpurpose code generation. arXiv preprint arXiv:1704.01696, 2017.
 Zahavy et al. (2016) Zahavy, Tom, BenZrihem, Nir, and Mannor, Shie. Visualizing Dynamics: from tSNE to SEMIMDPs. In Proc. 2016 ICML Workshop on Human Interpretability in Machine Learning, pp. 111–115, New York, NY, June 2016.
 Zeiler & Fergus (2014) Zeiler, Matthew D and Fergus, Rob. Visualizing and understanding convolutional networks. In European conference on computer vision, pp. 818–833. Springer, 2014.
 Zoph & Le (2017) Zoph, Barret and Le, Quoc. Neural architecture search with reinforcement learning. In International Conference on Learning Representations (ICLR), April 2017.
Comments
There are no comments yet.