Feeds

Roses are #f00, violets are #00f. This witty code is a boffinry breakthrough

'I like my relationships like I like my kernel source... open'

Maximizing your infrastructure through virtualization

What do you call a computer program that uses big data to write jokes? Basic, judging by the list of groan-worthy gags generated by this new wisecracking software.

Eggheads at the University of Edinburgh have developed code dedicated to spitting out quips along the lines of: "I like my men like I like my monoxide - odourless" and "I like my women like I like my gas - natural".

The system was tested on a group of volunteers who claimed the witty algorithms made them chuckle a few times, although not as much as similar, human-penned jokes chosen from Twitter.

It uses 2,000,000 noun-adjective pairs of words to draw up jokes "with an element of surprise", something the creators claim is key to good comedy. The one-liners were produced by searching for connections between pairings of words using Google n-gram data and Wordnet's part-of-speech tags.

Other jokes calculated by the software include:

  • I like my relationships like I like my source code... open
  • I like my boys like I like my disk sectors... bad
  • I like my coffee like I like my war... cold

As snigger-worthy as they are, there's some way to go until computers are as funny as their human masters, said David Matthews of the university's School of Informatics, who wrote the program with Sasa Petrovic.

"Computers have an advantage over people in that they can process masses of information, so we fed computers a wealth of material from which they extracted creative and unusual word combinations to fit our joke template," he said.

"The holy grail for machine-generated comedy would be to include cultural references, but these are very hard to capture."

Speaking of cultural references, the academic paper describing the software is also amusing, in a nerdy way. Here's one extract as an example:

In the automatic evaluation we measure the effect of the different factors in the model … It is a local approximation to log-likelihood, and we therefore dub it LOcal Log-likelihood, or LOL-likelihood for short. Our second metric computes the rank of the human-generated jokes in the distribution of all possible jokes sorted decreasingly by their LOL-likelihood.

This Rank OF Likelihood (ROFL) is computed relative to the number of all possible jokes, and like LOL-likelihood is averaged over all the jokes in our development data.

For measuring LOL-likelihood and ROFL we use a set of 48 jokes randomly sampled from Twitter that fit the "I like my X like I like my Y, Z" pattern.

The e-comedian project [paper PDF] will be presented at the Association for Computational Linguistics annual meeting in Sofia, Bulgaria, next week. ®

(An SQL statement walks into a bar, wanders over to two tables and asks: “May I join you?” ...we're here all week. For some commentards, months.)

Reducing security risks from open source software

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.