metadata
base_model: Snowflake/snowflake-arctic-embed-m
library_name: sentence-transformers
metrics:
- cosine_accuracy@1
- cosine_accuracy@3
- cosine_accuracy@5
- cosine_accuracy@10
- cosine_precision@1
- cosine_precision@3
- cosine_precision@5
- cosine_precision@10
- cosine_recall@1
- cosine_recall@3
- cosine_recall@5
- cosine_recall@10
- cosine_ndcg@10
- cosine_mrr@10
- cosine_map@100
- dot_accuracy@1
- dot_accuracy@3
- dot_accuracy@5
- dot_accuracy@10
- dot_precision@1
- dot_precision@3
- dot_precision@5
- dot_precision@10
- dot_recall@1
- dot_recall@3
- dot_recall@5
- dot_recall@10
- dot_ndcg@10
- dot_mrr@10
- dot_map@100
pipeline_tag: sentence-similarity
tags:
- sentence-transformers
- sentence-similarity
- feature-extraction
- generated_from_trainer
- dataset_size:522
- loss:MatryoshkaLoss
- loss:MultipleNegativesRankingLoss
widget:
- source_sentence: >-
How did the hiring tool's design contribute to the rejection of women
applicants?
sentences:
- >-
legal protections. Throughout this framework the term “algorithmic
discrimination” takes this meaning (and
not a technical understanding of discrimination as distinguishing
between items).
AUTOMATED SYSTEM: An "automated system" is any system, software, or
process that uses computation as
whole or part of a system to determine outcomes, make or aid decisions,
inform policy implementation, collect
data or observations, or otherwise interact with individuals and/or
communities. Automated systems
include, but are not limited to, systems derived from machine learning,
statistics, or other data processing
or artificial intelligence techniques, and exclude passive computing
infrastructure. “Passive computing
- >-
communities.
• An automated system using nontraditional factors such as educational
attainment and employment history as
part of its loan underwriting and pricing model was found to be much
more likely to charge an applicant whoattended a Historically Black
College or University (HBCU) higher loan prices for refinancing a
student loanthan an applicant who did not attend an HBCU. This was found
to be true even when controlling for
other credit-related factors.32
•A hiring tool that learned the features of a company's employees
(predominantly men) rejected women appli -
cants for spurious and discriminatory reasons; resumes with the word
“women’s,” such as “women’s
chess club captain,” were penalized in the candidate ranking.33
- >-
dures before deploying the system, as well as responsibility of specific
individuals or entities to oversee ongoing assessment and mitigation.
Organizational stakeholders including those with oversight of the
business process or operation being automated, as well as other
organizational divisions that may be affected due to the use of the
system, should be involved in establishing governance procedures.
Responsibility should rest high enough in the organization that
decisions about resources, mitigation, incident response, and potential
rollback can be made promptly, with sufficient weight given to risk
mitigation objectives against competing concerns. Those holding this
responsibility should be made aware of any use cases with the
- source_sentence: >-
How are companies using individual profiles based on tracked behavior to
impact the American public?
sentences:
- >-
requests should be used so that users understand for what use contexts,
time span, and entities they are providing data and metadata consent.
User experience research should be performed to ensure these consent
requests meet performance standards for readability and comprehension.
This includes ensuring that consent requests are accessible to users
with disabilities and are available in the language(s) and reading level
appro
-
priate for the audience. User experience design choices that
intentionally obfuscate or manipulate user choice (i.e., “dark
patterns”) should be not be used.
34
DATA PRIVACY
WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS
- >-
with more and more companies tracking the behavior of the American
public, building individual profiles based on this data, and using this
granular-level information as input into automated systems that further
track, profile, and impact the American public. Government agencies,
particularly law enforcement agencies, also use and help develop a
variety of technologies that enhance and expand surveillance
capabilities, which similarly collect data used as input into other
automated systems that directly impact people’s lives. Federal law has
not grown to address the expanding scale of private data collection, or
of the ability of governments at all levels to access that data and
leverage the means of private collection.
- >-
ways that threaten the rights of the American public. Too often, these
tools are used to limit our opportunities and
prevent our access to critical resources or services. These problems are
well documented. In America and around
the world, systems supposed to help with patient care have proven
unsafe, ineffective, or biased. Algorithms used
in hiring and credit decisions have been found to reflect and reproduce
existing unwanted inequities or embed
new harmful bias and discrimination. Unchecked social media data
collection has been used to threaten people’s
opportunities, undermine their privac y, or pervasively track their
activity—often without their knowledge or
consent.
- source_sentence: >-
What should entities developing technologies related to sensitive data
regularly report on?
sentences:
- >-
concerns that may limit their effectiveness. The results of assessments
of the efficacy and potential bias of such human-based systems should be
overseen by governance structures that have the potential to update the
operation of the human-based system in order to mitigate these effects.
50
HUMAN ALTERNATIVES,
CONSIDERATION, AND
FALLBACK
WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS
The expectations for automated systems are meant to serve as a blueprint
for the development of additional
technical standards and practices that are tailored for particular
sectors and contexts.
Implement additional human oversight and safeguards for automated
systems related to
sensitive domains
- >-
performance testing including, but not limited to, accuracy,
differential demographic impact, resulting
error rates (overall and per demographic group), and comparisons to
previously deployed systems;
ongoing monitoring procedures and regular performance testing reports,
including monitoring frequency,
results, and actions taken; and the procedures for and results from
independent evaluations. Reporting
should be provided in a plain language and machine-readable manner.
20
SAFE AND EFFECTIVE
SYSTEMS
HOW THESE PRINCIPLES CAN MOVE INTO PRACTICE
Real-life examples of how these principles can become reality, through
laws, policies, and practical
- >-
those who are less proximate do not (e.g., a teacher has access to their
students’ daily progress data while a
superintendent does not).
Reporting. In addition to the reporting on data privacy (as listed
above for non-sensitive data), entities devel-
oping technologies related to a sensitive domain and those collecting,
using, storing, or sharing sensitive data
should, whenever appropriate, regularly provide public reports
describing: any data security lapses or breaches
that resulted in sensitive data leaks; the numbe r, type, and outcomes
of ethical pre-reviews undertaken; a
description of any data sold, shared, or made public, and how that data
was assessed to determine it did not pres-
- source_sentence: >-
What are the expectations for automated systems intended to serve as a
blueprint for?
sentences:
- >-
Clear organizational oversight. Entities responsible for the development
or use of automated systems should lay out clear governance structures
and procedures. This includes clearly-stated governance proce
-
- >-
critical resources or services. These rights, opportunities, and access
to critical resources of services should
be enjoyed equally and be fully protected, regardless of the changing
role that automated systems may play in
our lives.
This framework describes protections that should be applied with respect
to all automated systems that
have the potential to meaningfully impact individuals' or communities'
exercise of:
RIGHTS, OPPORTUNITIES, OR ACCESS
Civil rights, civil liberties, and privacy, including freedom of speech,
voting, and protections from discrimi -
nation, excessive punishment, unlawful surveillance, and violations of
privacy and other freedoms in both
public and private sector contexts;
- >-
19
SAFE AND EFFECTIVE
SYSTEMS
WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS
The expectations for automated systems are meant to serve as a blueprint
for the development of additional
technical standards and practices that are tailored for particular
sectors and contexts.
Derived data sources tracked and reviewed carefully. Data that is
derived from other data through
the use of algorithms, such as data derived or inferred from prior model
outputs, should be identified and tracked, e.g., via a specialized type
in a data schema. Derived data should be viewed as potentially high-risk
inputs that may lead to feedback loops, compounded harm, or inaccurate
results. Such sources should be care
-
- source_sentence: >-
What types of systems are considered time-critical according to the
context?
sentences:
- >-
Equity includes a commitment from the agencies that oversee mortgage
lending to include a
nondiscrimination standard in the proposed rules for Automated Valuation
Models.52
The Equal Employment Opportunity Commission and the Department of
Justice have clearly
laid out how employers’ use of AI and other automated systems can result
in discrimination
against job applicants and employees with disabilities.53 The documents
explain
how employers’ use of software that relies on algorithmic
decision-making may violate existing requirements
under Title I of the Americans with Disabilities Act (“ADA”). This
technical assistance also provides practical
- >-
Discrimination
Protections
WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS
The expectations for automated systems are meant to serve as a blueprint
for the development of additional
technical standards and practices that are tailored for particular
sectors and contexts.
Demonstrate that the system protects against algorithmic discrimination
Independent evaluation. As described in the section on Safe and
Effective Systems, entities should allow
independent evaluation of potential algorithmic discrimination caused by
automated systems they use or
- >-
where possible, available before the harm occurs. Time-critical systems
include, but are not limited to,
voting-related systems, automated building access and other access
systems, systems that form a critical
component of healthcare, and systems that have the ability to withhold
wages or otherwise cause
immediate financial penalties.
Effective. The organizational structure surrounding processes for
consideration and fallback should
be designed so that if the human decision-maker charged with reassessing
a decision determines that it
should be overruled, the new decision will be effectively enacted. This
includes ensuring that the new
model-index:
- name: SentenceTransformer based on Snowflake/snowflake-arctic-embed-m
results:
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: Unknown
type: unknown
metrics:
- type: cosine_accuracy@1
value: 0.8448275862068966
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.9482758620689655
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.9770114942528736
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.9942528735632183
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.8448275862068966
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.3160919540229885
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.19540229885057464
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.09942528735632182
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.8448275862068966
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.9482758620689655
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.9770114942528736
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.9942528735632183
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.924865695917767
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.901963601532567
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.9021617783062492
name: Cosine Map@100
- type: dot_accuracy@1
value: 0.8448275862068966
name: Dot Accuracy@1
- type: dot_accuracy@3
value: 0.9482758620689655
name: Dot Accuracy@3
- type: dot_accuracy@5
value: 0.9770114942528736
name: Dot Accuracy@5
- type: dot_accuracy@10
value: 0.9942528735632183
name: Dot Accuracy@10
- type: dot_precision@1
value: 0.8448275862068966
name: Dot Precision@1
- type: dot_precision@3
value: 0.3160919540229885
name: Dot Precision@3
- type: dot_precision@5
value: 0.19540229885057464
name: Dot Precision@5
- type: dot_precision@10
value: 0.09942528735632182
name: Dot Precision@10
- type: dot_recall@1
value: 0.8448275862068966
name: Dot Recall@1
- type: dot_recall@3
value: 0.9482758620689655
name: Dot Recall@3
- type: dot_recall@5
value: 0.9770114942528736
name: Dot Recall@5
- type: dot_recall@10
value: 0.9942528735632183
name: Dot Recall@10
- type: dot_ndcg@10
value: 0.924865695917767
name: Dot Ndcg@10
- type: dot_mrr@10
value: 0.901963601532567
name: Dot Mrr@10
- type: dot_map@100
value: 0.9021617783062492
name: Dot Map@100
SentenceTransformer based on Snowflake/snowflake-arctic-embed-m
This is a sentence-transformers model finetuned from Snowflake/snowflake-arctic-embed-m. It maps sentences & paragraphs to a 768-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.
Model Details
Model Description
- Model Type: Sentence Transformer
- Base model: Snowflake/snowflake-arctic-embed-m
- Maximum Sequence Length: 512 tokens
- Output Dimensionality: 768 tokens
- Similarity Function: Cosine Similarity
Model Sources
- Documentation: Sentence Transformers Documentation
- Repository: Sentence Transformers on GitHub
- Hugging Face: Sentence Transformers on Hugging Face
Full Model Architecture
SentenceTransformer(
(0): Transformer({'max_seq_length': 512, 'do_lower_case': False}) with Transformer model: BertModel
(1): Pooling({'word_embedding_dimension': 768, 'pooling_mode_cls_token': True, 'pooling_mode_mean_tokens': False, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
(2): Normalize()
)
Usage
Direct Usage (Sentence Transformers)
First install the Sentence Transformers library:
pip install -U sentence-transformers
Then you can load this model and run inference.
from sentence_transformers import SentenceTransformer
# Download from the 🤗 Hub
model = SentenceTransformer("sentence_transformers_model_id")
# Run inference
sentences = [
'What types of systems are considered time-critical according to the context?',
'where possible, available before the harm occurs. Time-critical systems include, but are not limited to, \nvoting-related systems, automated building access and other access systems, systems that form a critical \ncomponent of healthcare, and systems that have the ability to withhold wages or otherwise cause \nimmediate financial penalties. \nEffective. The organizational structure surrounding processes for consideration and fallback should \nbe designed so that if the human decision-maker charged with reassessing a decision determines that it \nshould be overruled, the new decision will be effectively enacted. This includes ensuring that the new',
'Discrimination \nProtections \n \n WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS\nThe expectations for automated systems are meant to serve as a blueprint for the development of additional \ntechnical standards and practices that are tailored for particular sectors and contexts. \nDemonstrate that the system protects against algorithmic discrimination \nIndependent evaluation. As described in the section on Safe and Effective Systems, entities should allow \nindependent evaluation of potential algorithmic discrimination caused by automated systems they use or',
]
embeddings = model.encode(sentences)
print(embeddings.shape)
# [3, 768]
# Get the similarity scores for the embeddings
similarities = model.similarity(embeddings, embeddings)
print(similarities.shape)
# [3, 3]
Evaluation
Metrics
Information Retrieval
- Evaluated with
InformationRetrievalEvaluator
Metric | Value |
---|---|
cosine_accuracy@1 | 0.8448 |
cosine_accuracy@3 | 0.9483 |
cosine_accuracy@5 | 0.977 |
cosine_accuracy@10 | 0.9943 |
cosine_precision@1 | 0.8448 |
cosine_precision@3 | 0.3161 |
cosine_precision@5 | 0.1954 |
cosine_precision@10 | 0.0994 |
cosine_recall@1 | 0.8448 |
cosine_recall@3 | 0.9483 |
cosine_recall@5 | 0.977 |
cosine_recall@10 | 0.9943 |
cosine_ndcg@10 | 0.9249 |
cosine_mrr@10 | 0.902 |
cosine_map@100 | 0.9022 |
dot_accuracy@1 | 0.8448 |
dot_accuracy@3 | 0.9483 |
dot_accuracy@5 | 0.977 |
dot_accuracy@10 | 0.9943 |
dot_precision@1 | 0.8448 |
dot_precision@3 | 0.3161 |
dot_precision@5 | 0.1954 |
dot_precision@10 | 0.0994 |
dot_recall@1 | 0.8448 |
dot_recall@3 | 0.9483 |
dot_recall@5 | 0.977 |
dot_recall@10 | 0.9943 |
dot_ndcg@10 | 0.9249 |
dot_mrr@10 | 0.902 |
dot_map@100 | 0.9022 |
Training Details
Training Dataset
Unnamed Dataset
- Size: 522 training samples
- Columns:
sentence_0
andsentence_1
- Approximate statistics based on the first 522 samples:
sentence_0 sentence_1 type string string details - min: 11 tokens
- mean: 19.05 tokens
- max: 35 tokens
- min: 10 tokens
- mean: 116.38 tokens
- max: 161 tokens
- Samples:
sentence_0 sentence_1 What is the purpose of the AI Bill of Rights mentioned in the context?
BLUEPRINT FOR AN
AI B ILL OF
RIGHTS
MAKING AUTOMATED
SYSTEMS WORK FOR
THE AMERICAN PEOPLE
OCTOBER 2022When was the Blueprint for an AI Bill of Rights published?
BLUEPRINT FOR AN
AI B ILL OF
RIGHTS
MAKING AUTOMATED
SYSTEMS WORK FOR
THE AMERICAN PEOPLE
OCTOBER 2022What is the purpose of the Blueprint for an AI Bill of Rights published by the White House Office of Science and Technology Policy?
About this Document
The Blueprint for an AI Bill of Rights: Making Automated Systems Work for the American People was
published by the White House Office of Science and Technology Policy in October 2022. This framework was
released one year after OSTP announced the launch of a process to develop “a bill of rights for an AI-powered
world.” Its release follows a year of public engagement to inform this initiative. The framework is available
online at: https://www.whitehouse.gov/ostp/ai-bill-of-rights
About the Office of Science and Technology Policy
The Office of Science and Technology Policy (OSTP) was established by the National Science and Technology - Loss:
MatryoshkaLoss
with these parameters:{ "loss": "MultipleNegativesRankingLoss", "matryoshka_dims": [ 768, 512, 256, 128, 64 ], "matryoshka_weights": [ 1, 1, 1, 1, 1 ], "n_dims_per_step": -1 }
Training Hyperparameters
Non-Default Hyperparameters
eval_strategy
: stepsper_device_train_batch_size
: 20per_device_eval_batch_size
: 20num_train_epochs
: 5multi_dataset_batch_sampler
: round_robin
All Hyperparameters
Click to expand
overwrite_output_dir
: Falsedo_predict
: Falseeval_strategy
: stepsprediction_loss_only
: Trueper_device_train_batch_size
: 20per_device_eval_batch_size
: 20per_gpu_train_batch_size
: Noneper_gpu_eval_batch_size
: Nonegradient_accumulation_steps
: 1eval_accumulation_steps
: Nonetorch_empty_cache_steps
: Nonelearning_rate
: 5e-05weight_decay
: 0.0adam_beta1
: 0.9adam_beta2
: 0.999adam_epsilon
: 1e-08max_grad_norm
: 1num_train_epochs
: 5max_steps
: -1lr_scheduler_type
: linearlr_scheduler_kwargs
: {}warmup_ratio
: 0.0warmup_steps
: 0log_level
: passivelog_level_replica
: warninglog_on_each_node
: Truelogging_nan_inf_filter
: Truesave_safetensors
: Truesave_on_each_node
: Falsesave_only_model
: Falserestore_callback_states_from_checkpoint
: Falseno_cuda
: Falseuse_cpu
: Falseuse_mps_device
: Falseseed
: 42data_seed
: Nonejit_mode_eval
: Falseuse_ipex
: Falsebf16
: Falsefp16
: Falsefp16_opt_level
: O1half_precision_backend
: autobf16_full_eval
: Falsefp16_full_eval
: Falsetf32
: Nonelocal_rank
: 0ddp_backend
: Nonetpu_num_cores
: Nonetpu_metrics_debug
: Falsedebug
: []dataloader_drop_last
: Falsedataloader_num_workers
: 0dataloader_prefetch_factor
: Nonepast_index
: -1disable_tqdm
: Falseremove_unused_columns
: Truelabel_names
: Noneload_best_model_at_end
: Falseignore_data_skip
: Falsefsdp
: []fsdp_min_num_params
: 0fsdp_config
: {'min_num_params': 0, 'xla': False, 'xla_fsdp_v2': False, 'xla_fsdp_grad_ckpt': False}fsdp_transformer_layer_cls_to_wrap
: Noneaccelerator_config
: {'split_batches': False, 'dispatch_batches': None, 'even_batches': True, 'use_seedable_sampler': True, 'non_blocking': False, 'gradient_accumulation_kwargs': None}deepspeed
: Nonelabel_smoothing_factor
: 0.0optim
: adamw_torchoptim_args
: Noneadafactor
: Falsegroup_by_length
: Falselength_column_name
: lengthddp_find_unused_parameters
: Noneddp_bucket_cap_mb
: Noneddp_broadcast_buffers
: Falsedataloader_pin_memory
: Truedataloader_persistent_workers
: Falseskip_memory_metrics
: Trueuse_legacy_prediction_loop
: Falsepush_to_hub
: Falseresume_from_checkpoint
: Nonehub_model_id
: Nonehub_strategy
: every_savehub_private_repo
: Falsehub_always_push
: Falsegradient_checkpointing
: Falsegradient_checkpointing_kwargs
: Noneinclude_inputs_for_metrics
: Falseeval_do_concat_batches
: Truefp16_backend
: autopush_to_hub_model_id
: Nonepush_to_hub_organization
: Nonemp_parameters
:auto_find_batch_size
: Falsefull_determinism
: Falsetorchdynamo
: Noneray_scope
: lastddp_timeout
: 1800torch_compile
: Falsetorch_compile_backend
: Nonetorch_compile_mode
: Nonedispatch_batches
: Nonesplit_batches
: Noneinclude_tokens_per_second
: Falseinclude_num_input_tokens_seen
: Falseneftune_noise_alpha
: Noneoptim_target_modules
: Nonebatch_eval_metrics
: Falseeval_on_start
: Falseeval_use_gather_object
: Falsebatch_sampler
: batch_samplermulti_dataset_batch_sampler
: round_robin
Training Logs
Epoch | Step | cosine_map@100 |
---|---|---|
1.0 | 27 | 0.8792 |
1.8519 | 50 | 0.8950 |
2.0 | 54 | 0.9011 |
3.0 | 81 | 0.9022 |
Framework Versions
- Python: 3.10.12
- Sentence Transformers: 3.1.1
- Transformers: 4.44.2
- PyTorch: 2.4.1+cu121
- Accelerate: 0.34.2
- Datasets: 2.19.2
- Tokenizers: 0.19.1
Citation
BibTeX
Sentence Transformers
@inproceedings{reimers-2019-sentence-bert,
title = "Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks",
author = "Reimers, Nils and Gurevych, Iryna",
booktitle = "Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing",
month = "11",
year = "2019",
publisher = "Association for Computational Linguistics",
url = "https://arxiv.org/abs/1908.10084",
}
MatryoshkaLoss
@misc{kusupati2024matryoshka,
title={Matryoshka Representation Learning},
author={Aditya Kusupati and Gantavya Bhatt and Aniket Rege and Matthew Wallingford and Aditya Sinha and Vivek Ramanujan and William Howard-Snyder and Kaifeng Chen and Sham Kakade and Prateek Jain and Ali Farhadi},
year={2024},
eprint={2205.13147},
archivePrefix={arXiv},
primaryClass={cs.LG}
}
MultipleNegativesRankingLoss
@misc{henderson2017efficient,
title={Efficient Natural Language Response Suggestion for Smart Reply},
author={Matthew Henderson and Rami Al-Rfou and Brian Strope and Yun-hsuan Sung and Laszlo Lukacs and Ruiqi Guo and Sanjiv Kumar and Balint Miklos and Ray Kurzweil},
year={2017},
eprint={1705.00652},
archivePrefix={arXiv},
primaryClass={cs.CL}
}