id
large_string | submitter
large_string | authors
large_string | title
large_string | comments
large_string | journal-ref
large_string | doi
large_string | report-no
large_string | categories
large_string | license
large_string | abstract
large_string | versions
large list | update_date
timestamp[ms] | authors_parsed
large list | prompt
large_string | label
string | prob
float64 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1406.4173 | D\'ora Erd\H{o}s | Dora Erdos, Vatche Ishakian, Azer Bestavros, Evimaria Terzi | A Divide-and-Conquer Algorithm for Betweenness Centrality | Shorter version of this paper appeared in Siam Data Mining 2015 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of efficiently computing the betweenness centrality of nodes has
been researched extensively. To date, the best known exact and centralized
algorithm for this task is an algorithm proposed in 2001 by Brandes. The
contribution of our paper is Brandes++, an algorithm for exact efficient
computation of betweenness centrality. The crux of our algorithm is that we
create a sketch of the graph, that we call the skeleton, by replacing subgraphs
with simpler graph structures. Depending on the underlying graph structure,
using this skeleton and by keeping appropriate summaries Brandes++ we can
achieve significantly low running times in our computations. Extensive
experimental evaluation on real life datasets demonstrate the efficacy of our
algorithm for different types of graphs. We release our code for benefit of the
research community.
| [
{
"version": "v1",
"created": "Mon, 16 Jun 2014 21:18:51 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2015 19:58:34 GMT"
}
] | 2015-06-05T00:00:00 | [
[
"Erdos",
"Dora",
""
],
[
"Ishakian",
"Vatche",
""
],
[
"Bestavros",
"Azer",
""
],
[
"Terzi",
"Evimaria",
""
]
] | TITLE: A Divide-and-Conquer Algorithm for Betweenness Centrality
ABSTRACT: The problem of efficiently computing the betweenness centrality of nodes has
been researched extensively. To date, the best known exact and centralized
algorithm for this task is an algorithm proposed in 2001 by Brandes. The
contribution of our paper is Brandes++, an algorithm for exact efficient
computation of betweenness centrality. The crux of our algorithm is that we
create a sketch of the graph, that we call the skeleton, by replacing subgraphs
with simpler graph structures. Depending on the underlying graph structure,
using this skeleton and by keeping appropriate summaries Brandes++ we can
achieve significantly low running times in our computations. Extensive
experimental evaluation on real life datasets demonstrate the efficacy of our
algorithm for different types of graphs. We release our code for benefit of the
research community.
| no_new_dataset | 0.940626 |
1504.02824 | Yelong Shen | Yelong Shen, Ruoming Jin, Jianshu Chen, Xiaodong He, Jianfeng Gao, Li
Deng | A Deep Embedding Model for Co-occurrence Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Co-occurrence Data is a common and important information source in many
areas, such as the word co-occurrence in the sentences, friends co-occurrence
in social networks and products co-occurrence in commercial transaction data,
etc, which contains rich correlation and clustering information about the
items. In this paper, we study co-occurrence data using a general energy-based
probabilistic model, and we analyze three different categories of energy-based
model, namely, the $L_1$, $L_2$ and $L_k$ models, which are able to capture
different levels of dependency in the co-occurrence data. We also discuss how
several typical existing models are related to these three types of energy
models, including the Fully Visible Boltzmann Machine (FVBM) ($L_2$), Matrix
Factorization ($L_2$), Log-BiLinear (LBL) models ($L_2$), and the Restricted
Boltzmann Machine (RBM) model ($L_k$). Then, we propose a Deep Embedding Model
(DEM) (an $L_k$ model) from the energy model in a \emph{principled} manner.
Furthermore, motivated by the observation that the partition function in the
energy model is intractable and the fact that the major objective of modeling
the co-occurrence data is to predict using the conditional probability, we
apply the \emph{maximum pseudo-likelihood} method to learn DEM. In consequence,
the developed model and its learning method naturally avoid the above
difficulties and can be easily used to compute the conditional probability in
prediction. Interestingly, our method is equivalent to learning a special
structured deep neural network using back-propagation and a special sampling
strategy, which makes it scalable on large-scale datasets. Finally, in the
experiments, we show that the DEM can achieve comparable or better results than
state-of-the-art methods on datasets across several application domains.
| [
{
"version": "v1",
"created": "Sat, 11 Apr 2015 02:56:01 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2015 09:07:13 GMT"
}
] | 2015-06-05T00:00:00 | [
[
"Shen",
"Yelong",
""
],
[
"Jin",
"Ruoming",
""
],
[
"Chen",
"Jianshu",
""
],
[
"He",
"Xiaodong",
""
],
[
"Gao",
"Jianfeng",
""
],
[
"Deng",
"Li",
""
]
] | TITLE: A Deep Embedding Model for Co-occurrence Learning
ABSTRACT: Co-occurrence Data is a common and important information source in many
areas, such as the word co-occurrence in the sentences, friends co-occurrence
in social networks and products co-occurrence in commercial transaction data,
etc, which contains rich correlation and clustering information about the
items. In this paper, we study co-occurrence data using a general energy-based
probabilistic model, and we analyze three different categories of energy-based
model, namely, the $L_1$, $L_2$ and $L_k$ models, which are able to capture
different levels of dependency in the co-occurrence data. We also discuss how
several typical existing models are related to these three types of energy
models, including the Fully Visible Boltzmann Machine (FVBM) ($L_2$), Matrix
Factorization ($L_2$), Log-BiLinear (LBL) models ($L_2$), and the Restricted
Boltzmann Machine (RBM) model ($L_k$). Then, we propose a Deep Embedding Model
(DEM) (an $L_k$ model) from the energy model in a \emph{principled} manner.
Furthermore, motivated by the observation that the partition function in the
energy model is intractable and the fact that the major objective of modeling
the co-occurrence data is to predict using the conditional probability, we
apply the \emph{maximum pseudo-likelihood} method to learn DEM. In consequence,
the developed model and its learning method naturally avoid the above
difficulties and can be easily used to compute the conditional probability in
prediction. Interestingly, our method is equivalent to learning a special
structured deep neural network using back-propagation and a special sampling
strategy, which makes it scalable on large-scale datasets. Finally, in the
experiments, we show that the DEM can achieve comparable or better results than
state-of-the-art methods on datasets across several application domains.
| no_new_dataset | 0.951369 |
1505.01861 | Tao Mei | Yingwei Pan, Tao Mei, Ting Yao, Houqiang Li, Yong Rui | Jointly Modeling Embedding and Translation to Bridge Video and Language | null | null | null | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatically describing video content with natural language is a fundamental
challenge of multimedia. Recurrent Neural Networks (RNN), which models sequence
dynamics, has attracted increasing attention on visual interpretation. However,
most existing approaches generate a word locally with given previous words and
the visual content, while the relationship between sentence semantics and
visual content is not holistically exploited. As a result, the generated
sentences may be contextually correct but the semantics (e.g., subjects, verbs
or objects) are not true.
This paper presents a novel unified framework, named Long Short-Term Memory
with visual-semantic Embedding (LSTM-E), which can simultaneously explore the
learning of LSTM and visual-semantic embedding. The former aims to locally
maximize the probability of generating the next word given previous words and
visual content, while the latter is to create a visual-semantic embedding space
for enforcing the relationship between the semantics of the entire sentence and
visual content. Our proposed LSTM-E consists of three components: a 2-D and/or
3-D deep convolutional neural networks for learning powerful video
representation, a deep RNN for generating sentences, and a joint embedding
model for exploring the relationships between visual content and sentence
semantics. The experiments on YouTube2Text dataset show that our proposed
LSTM-E achieves to-date the best reported performance in generating natural
sentences: 45.3% and 31.0% in terms of BLEU@4 and METEOR, respectively. We also
demonstrate that LSTM-E is superior in predicting Subject-Verb-Object (SVO)
triplets to several state-of-the-art techniques.
| [
{
"version": "v1",
"created": "Thu, 7 May 2015 20:13:33 GMT"
},
{
"version": "v2",
"created": "Sat, 30 May 2015 10:05:50 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Jun 2015 07:17:06 GMT"
}
] | 2015-06-05T00:00:00 | [
[
"Pan",
"Yingwei",
""
],
[
"Mei",
"Tao",
""
],
[
"Yao",
"Ting",
""
],
[
"Li",
"Houqiang",
""
],
[
"Rui",
"Yong",
""
]
] | TITLE: Jointly Modeling Embedding and Translation to Bridge Video and Language
ABSTRACT: Automatically describing video content with natural language is a fundamental
challenge of multimedia. Recurrent Neural Networks (RNN), which models sequence
dynamics, has attracted increasing attention on visual interpretation. However,
most existing approaches generate a word locally with given previous words and
the visual content, while the relationship between sentence semantics and
visual content is not holistically exploited. As a result, the generated
sentences may be contextually correct but the semantics (e.g., subjects, verbs
or objects) are not true.
This paper presents a novel unified framework, named Long Short-Term Memory
with visual-semantic Embedding (LSTM-E), which can simultaneously explore the
learning of LSTM and visual-semantic embedding. The former aims to locally
maximize the probability of generating the next word given previous words and
visual content, while the latter is to create a visual-semantic embedding space
for enforcing the relationship between the semantics of the entire sentence and
visual content. Our proposed LSTM-E consists of three components: a 2-D and/or
3-D deep convolutional neural networks for learning powerful video
representation, a deep RNN for generating sentences, and a joint embedding
model for exploring the relationships between visual content and sentence
semantics. The experiments on YouTube2Text dataset show that our proposed
LSTM-E achieves to-date the best reported performance in generating natural
sentences: 45.3% and 31.0% in terms of BLEU@4 and METEOR, respectively. We also
demonstrate that LSTM-E is superior in predicting Subject-Verb-Object (SVO)
triplets to several state-of-the-art techniques.
| no_new_dataset | 0.94801 |
1506.01494 | Rui Han | Rui Han, Zhen Jia, Wanling Gao, Xinhui Tian, and Lei Wang | Benchmarking Big Data Systems: State-of-the-Art and Future Directions | 9 pages, 2 figures. arXiv admin note: substantial text overlap with
arXiv:1402.5194 | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The great prosperity of big data systems such as Hadoop in recent years makes
the benchmarking of these systems become crucial for both research and industry
communities. The complexity, diversity, and rapid evolution of big data systems
gives rise to various new challenges about how we design generators to produce
data with the 4V properties (i.e. volume, velocity, variety and veracity), as
well as implement application-specific but still comprehensive workloads.
However, most of the existing big data benchmarks can be described as attempts
to solve specific problems in benchmarking systems. This article investigates
the state-of-the-art in benchmarking big data systems along with the future
challenges to be addressed to realize a successful and efficient benchmark.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2015 07:48:37 GMT"
}
] | 2015-06-05T00:00:00 | [
[
"Han",
"Rui",
""
],
[
"Jia",
"Zhen",
""
],
[
"Gao",
"Wanling",
""
],
[
"Tian",
"Xinhui",
""
],
[
"Wang",
"Lei",
""
]
] | TITLE: Benchmarking Big Data Systems: State-of-the-Art and Future Directions
ABSTRACT: The great prosperity of big data systems such as Hadoop in recent years makes
the benchmarking of these systems become crucial for both research and industry
communities. The complexity, diversity, and rapid evolution of big data systems
gives rise to various new challenges about how we design generators to produce
data with the 4V properties (i.e. volume, velocity, variety and veracity), as
well as implement application-specific but still comprehensive workloads.
However, most of the existing big data benchmarks can be described as attempts
to solve specific problems in benchmarking systems. This article investigates
the state-of-the-art in benchmarking big data systems along with the future
challenges to be addressed to realize a successful and efficient benchmark.
| no_new_dataset | 0.948058 |
1506.01499 | Ashish Sureka | Ashish Sureka, Ambika Tripathi, Savita Dabral | Survey Results on Threats To External Validity, Generalizability
Concerns, Data Sharing and University-Industry Collaboration in Mining
Software Repository (MSR) Research | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mining Software Repositories (MSR) is an applied and practise-oriented field
aimed at solving real problems encountered by practitioners and bringing value
to Industry. Replication of results and findings, generalizability and external
validity, University-Industry collaboration, data sharing and creation dataset
repositories are important issues in MSR research. Research consisting of
bibliometric analysis of MSR paper shows lack of University-Industry
collaboration, deficiency of studies on closed or propriety source dataset and
lack of data as well as tool sharing by researchers. We conduct a survey of
authors of past three years of MSR conference (2012, 2013 and 2014) to collect
data on their views and suggestions to address the stated concerns. We asked 20
questions from more than 100 authors and received a response from 39 authors.
Our results shows that about one-third of the respondents always make their
dataset publicly available and about one-third believe that data sharing should
be a mandatory condition for publication in MSR conferences. Our survey reveals
that more than 50% authors used solely open-source software (OSS) dataset for
their research. More than 50% of the respondents mentioned that difficulty in
sharing Industrial dataset outside the company is one of the major impediments
in University-Industry collaboration.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2015 08:07:29 GMT"
}
] | 2015-06-05T00:00:00 | [
[
"Sureka",
"Ashish",
""
],
[
"Tripathi",
"Ambika",
""
],
[
"Dabral",
"Savita",
""
]
] | TITLE: Survey Results on Threats To External Validity, Generalizability
Concerns, Data Sharing and University-Industry Collaboration in Mining
Software Repository (MSR) Research
ABSTRACT: Mining Software Repositories (MSR) is an applied and practise-oriented field
aimed at solving real problems encountered by practitioners and bringing value
to Industry. Replication of results and findings, generalizability and external
validity, University-Industry collaboration, data sharing and creation dataset
repositories are important issues in MSR research. Research consisting of
bibliometric analysis of MSR paper shows lack of University-Industry
collaboration, deficiency of studies on closed or propriety source dataset and
lack of data as well as tool sharing by researchers. We conduct a survey of
authors of past three years of MSR conference (2012, 2013 and 2014) to collect
data on their views and suggestions to address the stated concerns. We asked 20
questions from more than 100 authors and received a response from 39 authors.
Our results shows that about one-third of the respondents always make their
dataset publicly available and about one-third believe that data sharing should
be a mandatory condition for publication in MSR conferences. Our survey reveals
that more than 50% authors used solely open-source software (OSS) dataset for
their research. More than 50% of the respondents mentioned that difficulty in
sharing Industrial dataset outside the company is one of the major impediments
in University-Industry collaboration.
| no_new_dataset | 0.933309 |
1506.01596 | Roozbeh Rajabi | Roozbeh Rajabi, Hassan Ghassemian | Multilayer Structured NMF for Spectral Unmixing of Hyperspectral Images | 4 pages, conference | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the challenges in hyperspectral data analysis is the presence of mixed
pixels. Mixed pixels are the result of low spatial resolution of hyperspectral
sensors. Spectral unmixing methods decompose a mixed pixel into a set of
endmembers and abundance fractions. Due to nonnegativity constraint on
abundance fraction values, NMF based methods are well suited to this problem.
In this paper multilayer NMF has been used to improve the results of NMF
methods for spectral unmixing of hyperspectral data under the linear mixing
framework. Sparseness constraint on both spectral signatures and abundance
fractions matrices are used in this paper. Evaluation of the proposed algorithm
is done using synthetic and real datasets in terms of spectral angle and
abundance angle distances. Results show that the proposed algorithm outperforms
other previously proposed methods.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2015 13:53:33 GMT"
}
] | 2015-06-05T00:00:00 | [
[
"Rajabi",
"Roozbeh",
""
],
[
"Ghassemian",
"Hassan",
""
]
] | TITLE: Multilayer Structured NMF for Spectral Unmixing of Hyperspectral Images
ABSTRACT: One of the challenges in hyperspectral data analysis is the presence of mixed
pixels. Mixed pixels are the result of low spatial resolution of hyperspectral
sensors. Spectral unmixing methods decompose a mixed pixel into a set of
endmembers and abundance fractions. Due to nonnegativity constraint on
abundance fraction values, NMF based methods are well suited to this problem.
In this paper multilayer NMF has been used to improve the results of NMF
methods for spectral unmixing of hyperspectral data under the linear mixing
framework. Sparseness constraint on both spectral signatures and abundance
fractions matrices are used in this paper. Evaluation of the proposed algorithm
is done using synthetic and real datasets in terms of spectral angle and
abundance angle distances. Results show that the proposed algorithm outperforms
other previously proposed methods.
| no_new_dataset | 0.951908 |
1506.01698 | Anna Rohrbach | Anna Rohrbach and Marcus Rohrbach and Bernt Schiele | The Long-Short Story of Movie Description | null | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generating descriptions for videos has many applications including assisting
blind people and human-robot interaction. The recent advances in image
captioning as well as the release of large-scale movie description datasets
such as MPII Movie Description allow to study this task in more depth. Many of
the proposed methods for image captioning rely on pre-trained object classifier
CNNs and Long-Short Term Memory recurrent networks (LSTMs) for generating
descriptions. While image description focuses on objects, we argue that it is
important to distinguish verbs, objects, and places in the challenging setting
of movie description. In this work we show how to learn robust visual
classifiers from the weak annotations of the sentence descriptions. Based on
these visual classifiers we learn how to generate a description using an LSTM.
We explore different design choices to build and train the LSTM and achieve the
best performance to date on the challenging MPII-MD dataset. We compare and
analyze our approach and prior work along various dimensions to better
understand the key challenges of the movie description task.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2015 19:45:36 GMT"
}
] | 2015-06-05T00:00:00 | [
[
"Rohrbach",
"Anna",
""
],
[
"Rohrbach",
"Marcus",
""
],
[
"Schiele",
"Bernt",
""
]
] | TITLE: The Long-Short Story of Movie Description
ABSTRACT: Generating descriptions for videos has many applications including assisting
blind people and human-robot interaction. The recent advances in image
captioning as well as the release of large-scale movie description datasets
such as MPII Movie Description allow to study this task in more depth. Many of
the proposed methods for image captioning rely on pre-trained object classifier
CNNs and Long-Short Term Memory recurrent networks (LSTMs) for generating
descriptions. While image description focuses on objects, we argue that it is
important to distinguish verbs, objects, and places in the challenging setting
of movie description. In this work we show how to learn robust visual
classifiers from the weak annotations of the sentence descriptions. Based on
these visual classifiers we learn how to generate a description using an LSTM.
We explore different design choices to build and train the LSTM and achieve the
best performance to date on the challenging MPII-MD dataset. We compare and
analyze our approach and prior work along various dimensions to better
understand the key challenges of the movie description task.
| no_new_dataset | 0.945197 |
1506.01709 | H\'ector P. Mart\'inez | Vincent E. Farrugia, H\'ector P. Mart\'inez, Georgios N. Yannakakis | The Preference Learning Toolbox | null | null | null | null | stat.ML cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Preference learning (PL) is a core area of machine learning that handles
datasets with ordinal relations. As the number of generated data of ordinal
nature is increasing, the importance and role of the PL field becomes central
within machine learning research and practice. This paper introduces an open
source, scalable, efficient and accessible preference learning toolbox that
supports the key phases of the data training process incorporating various
popular data preprocessing, feature selection and preference learning methods.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2015 19:58:56 GMT"
}
] | 2015-06-05T00:00:00 | [
[
"Farrugia",
"Vincent E.",
""
],
[
"Martínez",
"Héctor P.",
""
],
[
"Yannakakis",
"Georgios N.",
""
]
] | TITLE: The Preference Learning Toolbox
ABSTRACT: Preference learning (PL) is a core area of machine learning that handles
datasets with ordinal relations. As the number of generated data of ordinal
nature is increasing, the importance and role of the PL field becomes central
within machine learning research and practice. This paper introduces an open
source, scalable, efficient and accessible preference learning toolbox that
supports the key phases of the data training process incorporating various
popular data preprocessing, feature selection and preference learning methods.
| no_new_dataset | 0.949106 |
1204.3010 | Christian Schneider | Christian M. Schneider, Tobias A. Kesselring, Jose S. Andrade Jr. and
Hans J. Herrmann | Optimal box-covering algorithm for fractal dimension of complex networks | 5 pages, 6 figures | null | 10.1103/PhysRevE.86.016707 | null | physics.comp-ph cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The self-similarity of complex networks is typically investigated through
computational algorithms the primary task of which is to cover the structure
with a minimal number of boxes. Here we introduce a box-covering algorithm that
not only outperforms previous ones, but also finds optimal solutions. For the
two benchmark cases tested, namely, the E. Coli and the WWW networks, our
results show that the improvement can be rather substantial, reaching up to 15%
in the case of the WWW network.
| [
{
"version": "v1",
"created": "Fri, 13 Apr 2012 14:31:47 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Schneider",
"Christian M.",
""
],
[
"Kesselring",
"Tobias A.",
""
],
[
"Andrade",
"Jose S.",
"Jr."
],
[
"Herrmann",
"Hans J.",
""
]
] | TITLE: Optimal box-covering algorithm for fractal dimension of complex networks
ABSTRACT: The self-similarity of complex networks is typically investigated through
computational algorithms the primary task of which is to cover the structure
with a minimal number of boxes. Here we introduce a box-covering algorithm that
not only outperforms previous ones, but also finds optimal solutions. For the
two benchmark cases tested, namely, the E. Coli and the WWW networks, our
results show that the improvement can be rather substantial, reaching up to 15%
in the case of the WWW network.
| no_new_dataset | 0.954942 |
1406.4112 | Zhenyong Fu | Zhen-Yong Fu, Tao Xiang, Shaogang Gong | Semantic Graph for Zero-Shot Learning | 9 pages, 5 figures | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/3.0/ | Zero-shot learning aims to classify visual objects without any training data
via knowledge transfer between seen and unseen classes. This is typically
achieved by exploring a semantic embedding space where the seen and unseen
classes can be related. Previous works differ in what embedding space is used
and how different classes and a test image can be related. In this paper, we
utilize the annotation-free semantic word space for the former and focus on
solving the latter issue of modeling relatedness. Specifically, in contrast to
previous work which ignores the semantic relationships between seen classes and
focus merely on those between seen and unseen classes, in this paper a novel
approach based on a semantic graph is proposed to represent the relationships
between all the seen and unseen class in a semantic word space. Based on this
semantic graph, we design a special absorbing Markov chain process, in which
each unseen class is viewed as an absorbing state. After incorporating one test
image into the semantic graph, the absorbing probabilities from the test data
to each unseen class can be effectively computed; and zero-shot classification
can be achieved by finding the class label with the highest absorbing
probability. The proposed model has a closed-form solution which is linear with
respect to the number of test images. We demonstrate the effectiveness and
computational efficiency of the proposed method over the state-of-the-arts on
the AwA (animals with attributes) dataset.
| [
{
"version": "v1",
"created": "Mon, 16 Jun 2014 19:40:52 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2015 09:53:18 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Fu",
"Zhen-Yong",
""
],
[
"Xiang",
"Tao",
""
],
[
"Gong",
"Shaogang",
""
]
] | TITLE: Semantic Graph for Zero-Shot Learning
ABSTRACT: Zero-shot learning aims to classify visual objects without any training data
via knowledge transfer between seen and unseen classes. This is typically
achieved by exploring a semantic embedding space where the seen and unseen
classes can be related. Previous works differ in what embedding space is used
and how different classes and a test image can be related. In this paper, we
utilize the annotation-free semantic word space for the former and focus on
solving the latter issue of modeling relatedness. Specifically, in contrast to
previous work which ignores the semantic relationships between seen classes and
focus merely on those between seen and unseen classes, in this paper a novel
approach based on a semantic graph is proposed to represent the relationships
between all the seen and unseen class in a semantic word space. Based on this
semantic graph, we design a special absorbing Markov chain process, in which
each unseen class is viewed as an absorbing state. After incorporating one test
image into the semantic graph, the absorbing probabilities from the test data
to each unseen class can be effectively computed; and zero-shot classification
can be achieved by finding the class label with the highest absorbing
probability. The proposed model has a closed-form solution which is linear with
respect to the number of test images. We demonstrate the effectiveness and
computational efficiency of the proposed method over the state-of-the-arts on
the AwA (animals with attributes) dataset.
| no_new_dataset | 0.950411 |
1411.5726 | Ramakrishna Vedantam | Ramakrishna Vedantam, C. Lawrence Zitnick and Devi Parikh | CIDEr: Consensus-based Image Description Evaluation | To appear in CVPR 2015 | null | null | null | cs.CV cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatically describing an image with a sentence is a long-standing
challenge in computer vision and natural language processing. Due to recent
progress in object detection, attribute classification, action recognition,
etc., there is renewed interest in this area. However, evaluating the quality
of descriptions has proven to be challenging. We propose a novel paradigm for
evaluating image descriptions that uses human consensus. This paradigm consists
of three main parts: a new triplet-based method of collecting human annotations
to measure consensus, a new automated metric (CIDEr) that captures consensus,
and two new datasets: PASCAL-50S and ABSTRACT-50S that contain 50 sentences
describing each image. Our simple metric captures human judgment of consensus
better than existing metrics across sentences generated by various sources. We
also evaluate five state-of-the-art image description approaches using this new
protocol and provide a benchmark for future comparisons. A version of CIDEr
named CIDEr-D is available as a part of MS COCO evaluation server to enable
systematic evaluation and benchmarking.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2014 23:54:35 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2015 01:42:20 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Vedantam",
"Ramakrishna",
""
],
[
"Zitnick",
"C. Lawrence",
""
],
[
"Parikh",
"Devi",
""
]
] | TITLE: CIDEr: Consensus-based Image Description Evaluation
ABSTRACT: Automatically describing an image with a sentence is a long-standing
challenge in computer vision and natural language processing. Due to recent
progress in object detection, attribute classification, action recognition,
etc., there is renewed interest in this area. However, evaluating the quality
of descriptions has proven to be challenging. We propose a novel paradigm for
evaluating image descriptions that uses human consensus. This paradigm consists
of three main parts: a new triplet-based method of collecting human annotations
to measure consensus, a new automated metric (CIDEr) that captures consensus,
and two new datasets: PASCAL-50S and ABSTRACT-50S that contain 50 sentences
describing each image. Our simple metric captures human judgment of consensus
better than existing metrics across sentences generated by various sources. We
also evaluate five state-of-the-art image description approaches using this new
protocol and provide a benchmark for future comparisons. A version of CIDEr
named CIDEr-D is available as a part of MS COCO evaluation server to enable
systematic evaluation and benchmarking.
| new_dataset | 0.955361 |
1501.07430 | Seungjin Choi | Juho Lee and Seungjin Choi | Bayesian Hierarchical Clustering with Exponential Family: Small-Variance
Asymptotics and Reducibility | 10 pages, 2 figures, AISTATS-2015 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bayesian hierarchical clustering (BHC) is an agglomerative clustering method,
where a probabilistic model is defined and its marginal likelihoods are
evaluated to decide which clusters to merge. While BHC provides a few
advantages over traditional distance-based agglomerative clustering algorithms,
successive evaluation of marginal likelihoods and careful hyperparameter tuning
are cumbersome and limit the scalability. In this paper we relax BHC into a
non-probabilistic formulation, exploring small-variance asymptotics in
conjugate-exponential models. We develop a novel clustering algorithm, referred
to as relaxed BHC (RBHC), from the asymptotic limit of the BHC model that
exhibits the scalability of distance-based agglomerative clustering algorithms
as well as the flexibility of Bayesian nonparametric models. We also
investigate the reducibility of the dissimilarity measure emerged from the
asymptotic limit of the BHC model, allowing us to use scalable algorithms such
as the nearest neighbor chain algorithm. Numerical experiments on both
synthetic and real-world datasets demonstrate the validity and high performance
of our method.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2015 12:13:01 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2015 00:45:09 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Lee",
"Juho",
""
],
[
"Choi",
"Seungjin",
""
]
] | TITLE: Bayesian Hierarchical Clustering with Exponential Family: Small-Variance
Asymptotics and Reducibility
ABSTRACT: Bayesian hierarchical clustering (BHC) is an agglomerative clustering method,
where a probabilistic model is defined and its marginal likelihoods are
evaluated to decide which clusters to merge. While BHC provides a few
advantages over traditional distance-based agglomerative clustering algorithms,
successive evaluation of marginal likelihoods and careful hyperparameter tuning
are cumbersome and limit the scalability. In this paper we relax BHC into a
non-probabilistic formulation, exploring small-variance asymptotics in
conjugate-exponential models. We develop a novel clustering algorithm, referred
to as relaxed BHC (RBHC), from the asymptotic limit of the BHC model that
exhibits the scalability of distance-based agglomerative clustering algorithms
as well as the flexibility of Bayesian nonparametric models. We also
investigate the reducibility of the dissimilarity measure emerged from the
asymptotic limit of the BHC model, allowing us to use scalable algorithms such
as the nearest neighbor chain algorithm. Numerical experiments on both
synthetic and real-world datasets demonstrate the validity and high performance
of our method.
| no_new_dataset | 0.95018 |
1506.01077 | Saullo Haniell Galv\~ao De Oliveira | Saullo Haniell Galv\~ao de Oliveira, Rosana Veroneze, Fernando Jos\'e
Von Zuben | On bicluster aggregation and its benefits for enumerative solutions | 15 pages, will be published by Springer Verlag in the LNAI Series in
the book Advances in Data Mining | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Biclustering involves the simultaneous clustering of objects and their
attributes, thus defining local two-way clustering models. Recently, efficient
algorithms were conceived to enumerate all biclusters in real-valued datasets.
In this case, the solution composes a complete set of maximal and non-redundant
biclusters. However, the ability to enumerate biclusters revealed a challenging
scenario: in noisy datasets, each true bicluster may become highly fragmented
and with a high degree of overlapping. It prevents a direct analysis of the
obtained results. To revert the fragmentation, we propose here two approaches
for properly aggregating the whole set of enumerated biclusters: one based on
single linkage and the other directly exploring the rate of overlapping. Both
proposals were compared with each other and with the actual state-of-the-art in
several experiments, and they not only significantly reduced the number of
biclusters but also consistently increased the quality of the solution.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 22:26:42 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"de Oliveira",
"Saullo Haniell Galvão",
""
],
[
"Veroneze",
"Rosana",
""
],
[
"Von Zuben",
"Fernando José",
""
]
] | TITLE: On bicluster aggregation and its benefits for enumerative solutions
ABSTRACT: Biclustering involves the simultaneous clustering of objects and their
attributes, thus defining local two-way clustering models. Recently, efficient
algorithms were conceived to enumerate all biclusters in real-valued datasets.
In this case, the solution composes a complete set of maximal and non-redundant
biclusters. However, the ability to enumerate biclusters revealed a challenging
scenario: in noisy datasets, each true bicluster may become highly fragmented
and with a high degree of overlapping. It prevents a direct analysis of the
obtained results. To revert the fragmentation, we propose here two approaches
for properly aggregating the whole set of enumerated biclusters: one based on
single linkage and the other directly exploring the rate of overlapping. Both
proposals were compared with each other and with the actual state-of-the-art in
several experiments, and they not only significantly reduced the number of
biclusters but also consistently increased the quality of the solution.
| no_new_dataset | 0.950549 |
1506.01092 | Seungjin Choi | Saehoon Kim and Seungjin Choi | Bilinear Random Projections for Locality-Sensitive Binary Codes | 11 pages, 23 figures, CVPR-2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Locality-sensitive hashing (LSH) is a popular data-independent indexing
method for approximate similarity search, where random projections followed by
quantization hash the points from the database so as to ensure that the
probability of collision is much higher for objects that are close to each
other than for those that are far apart. Most of high-dimensional visual
descriptors for images exhibit a natural matrix structure. When visual
descriptors are represented by high-dimensional feature vectors and long binary
codes are assigned, a random projection matrix requires expensive complexities
in both space and time. In this paper we analyze a bilinear random projection
method where feature matrices are transformed to binary codes by two smaller
random projection matrices. We base our theoretical analysis on extending
Raginsky and Lazebnik's result where random Fourier features are composed with
random binary quantizers to form locality sensitive binary codes. To this end,
we answer the following two questions: (1) whether a bilinear random projection
also yields similarity-preserving binary codes; (2) whether a bilinear random
projection yields performance gain or loss, compared to a large linear
projection. Regarding the first question, we present upper and lower bounds on
the expected Hamming distance between binary codes produced by bilinear random
projections. In regards to the second question, we analyze the upper and lower
bounds on covariance between two bits of binary codes, showing that the
correlation between two bits is small. Numerical experiments on MNIST and
Flickr45K datasets confirm the validity of our method.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 00:30:26 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Kim",
"Saehoon",
""
],
[
"Choi",
"Seungjin",
""
]
] | TITLE: Bilinear Random Projections for Locality-Sensitive Binary Codes
ABSTRACT: Locality-sensitive hashing (LSH) is a popular data-independent indexing
method for approximate similarity search, where random projections followed by
quantization hash the points from the database so as to ensure that the
probability of collision is much higher for objects that are close to each
other than for those that are far apart. Most of high-dimensional visual
descriptors for images exhibit a natural matrix structure. When visual
descriptors are represented by high-dimensional feature vectors and long binary
codes are assigned, a random projection matrix requires expensive complexities
in both space and time. In this paper we analyze a bilinear random projection
method where feature matrices are transformed to binary codes by two smaller
random projection matrices. We base our theoretical analysis on extending
Raginsky and Lazebnik's result where random Fourier features are composed with
random binary quantizers to form locality sensitive binary codes. To this end,
we answer the following two questions: (1) whether a bilinear random projection
also yields similarity-preserving binary codes; (2) whether a bilinear random
projection yields performance gain or loss, compared to a large linear
projection. Regarding the first question, we present upper and lower bounds on
the expected Hamming distance between binary codes produced by bilinear random
projections. In regards to the second question, we analyze the upper and lower
bounds on covariance between two bits of binary codes, showing that the
correlation between two bits is small. Numerical experiments on MNIST and
Flickr45K datasets confirm the validity of our method.
| no_new_dataset | 0.954732 |
1506.01115 | Alexandros-Stavros Iliopoulos | Alexandros-Stavros Iliopoulos, Tiancheng Liu, Xiaobai Sun | Hyperspectral Image Classification and Clutter Detection via Multiple
Structural Embeddings and Dimension Reductions | 13 pages, 6 figures (30 images), submitted to International
Conference on Computer Vision (ICCV) 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new and effective approach for Hyperspectral Image (HSI)
classification and clutter detection, overcoming a few long-standing challenges
presented by HSI data characteristics. Residing in a high-dimensional spectral
attribute space, HSI data samples are known to be strongly correlated in their
spectral signatures, exhibit nonlinear structure due to several physical laws,
and contain uncertainty and noise from multiple sources. In the presented
approach, we generate an adaptive, structurally enriched representation
environment, and employ the locally linear embedding (LLE) in it. There are two
structure layers external to LLE. One is feature space embedding: the HSI data
attributes are embedded into a discriminatory feature space where
spatio-spectral coherence and distinctive structures are distilled and
exploited to mitigate various difficulties encountered in the native
hyperspectral attribute space. The other structure layer encloses the ranges of
algorithmic parameters for LLE and feature embedding, and supports a
multiplexing and integrating scheme for contending with multi-source
uncertainty. Experiments on two commonly used HSI datasets with a small number
of learning samples have rendered remarkably high-accuracy classification
results, as well as distinctive maps of detected clutter regions.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 04:04:43 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Iliopoulos",
"Alexandros-Stavros",
""
],
[
"Liu",
"Tiancheng",
""
],
[
"Sun",
"Xiaobai",
""
]
] | TITLE: Hyperspectral Image Classification and Clutter Detection via Multiple
Structural Embeddings and Dimension Reductions
ABSTRACT: We present a new and effective approach for Hyperspectral Image (HSI)
classification and clutter detection, overcoming a few long-standing challenges
presented by HSI data characteristics. Residing in a high-dimensional spectral
attribute space, HSI data samples are known to be strongly correlated in their
spectral signatures, exhibit nonlinear structure due to several physical laws,
and contain uncertainty and noise from multiple sources. In the presented
approach, we generate an adaptive, structurally enriched representation
environment, and employ the locally linear embedding (LLE) in it. There are two
structure layers external to LLE. One is feature space embedding: the HSI data
attributes are embedded into a discriminatory feature space where
spatio-spectral coherence and distinctive structures are distilled and
exploited to mitigate various difficulties encountered in the native
hyperspectral attribute space. The other structure layer encloses the ranges of
algorithmic parameters for LLE and feature embedding, and supports a
multiplexing and integrating scheme for contending with multi-source
uncertainty. Experiments on two commonly used HSI datasets with a small number
of learning samples have rendered remarkably high-accuracy classification
results, as well as distinctive maps of detected clutter regions.
| no_new_dataset | 0.947624 |
1506.01125 | Zhun Zhong | Zhun Zhong, Zongmin Li, Runlin Li, Xiaoxia Sun | Unsupervised domain adaption dictionary learning for visual recognition | 5 pages, 3 figures, ICIP 2015 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | Over the last years, dictionary learning method has been extensively applied
to deal with various computer vision recognition applications, and produced
state-of-the-art results. However, when the data instances of a target domain
have a different distribution than that of a source domain, the dictionary
learning method may fail to perform well. In this paper, we address the
cross-domain visual recognition problem and propose a simple but effective
unsupervised domain adaption approach, where labeled data are only from source
domain. In order to bring the original data in source and target domain into
the same distribution, the proposed method forcing nearest coupled data between
source and target domain to have identical sparse representations while jointly
learning dictionaries for each domain, where the learned dictionaries can
reconstruct original data in source and target domain respectively. So that
sparse representations of original data can be used to perform visual
recognition tasks. We demonstrate the effectiveness of our approach on standard
datasets. Our method performs on par or better than competitive
state-of-the-art methods.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 05:21:37 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Zhong",
"Zhun",
""
],
[
"Li",
"Zongmin",
""
],
[
"Li",
"Runlin",
""
],
[
"Sun",
"Xiaoxia",
""
]
] | TITLE: Unsupervised domain adaption dictionary learning for visual recognition
ABSTRACT: Over the last years, dictionary learning method has been extensively applied
to deal with various computer vision recognition applications, and produced
state-of-the-art results. However, when the data instances of a target domain
have a different distribution than that of a source domain, the dictionary
learning method may fail to perform well. In this paper, we address the
cross-domain visual recognition problem and propose a simple but effective
unsupervised domain adaption approach, where labeled data are only from source
domain. In order to bring the original data in source and target domain into
the same distribution, the proposed method forcing nearest coupled data between
source and target domain to have identical sparse representations while jointly
learning dictionaries for each domain, where the learned dictionaries can
reconstruct original data in source and target domain respectively. So that
sparse representations of original data can be used to perform visual
recognition tasks. We demonstrate the effectiveness of our approach on standard
datasets. Our method performs on par or better than competitive
state-of-the-art methods.
| no_new_dataset | 0.952086 |
1506.01151 | Mathieu Aubry | Mathieu Aubry and Bryan Russell | Understanding deep features with computer-generated imagery | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an approach for analyzing the variation of features generated by
convolutional neural networks (CNNs) with respect to scene factors that occur
in natural images. Such factors may include object style, 3D viewpoint, color,
and scene lighting configuration. Our approach analyzes CNN feature responses
corresponding to different scene factors by controlling for them via rendering
using a large database of 3D CAD models. The rendered images are presented to a
trained CNN and responses for different layers are studied with respect to the
input scene factors. We perform a decomposition of the responses based on
knowledge of the input scene factors and analyze the resulting components. In
particular, we quantify their relative importance in the CNN responses and
visualize them using principal component analysis. We show qualitative and
quantitative results of our study on three CNNs trained on large image
datasets: AlexNet, Places, and Oxford VGG. We observe important differences
across the networks and CNN layers for different scene factors and object
categories. Finally, we demonstrate that our analysis based on
computer-generated imagery translates to the network representation of natural
images.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 07:41:14 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Aubry",
"Mathieu",
""
],
[
"Russell",
"Bryan",
""
]
] | TITLE: Understanding deep features with computer-generated imagery
ABSTRACT: We introduce an approach for analyzing the variation of features generated by
convolutional neural networks (CNNs) with respect to scene factors that occur
in natural images. Such factors may include object style, 3D viewpoint, color,
and scene lighting configuration. Our approach analyzes CNN feature responses
corresponding to different scene factors by controlling for them via rendering
using a large database of 3D CAD models. The rendered images are presented to a
trained CNN and responses for different layers are studied with respect to the
input scene factors. We perform a decomposition of the responses based on
knowledge of the input scene factors and analyze the resulting components. In
particular, we quantify their relative importance in the CNN responses and
visualize them using principal component analysis. We show qualitative and
quantitative results of our study on three CNNs trained on large image
datasets: AlexNet, Places, and Oxford VGG. We observe important differences
across the networks and CNN layers for different scene factors and object
categories. Finally, we demonstrate that our analysis based on
computer-generated imagery translates to the network representation of natural
images.
| no_new_dataset | 0.948537 |
1506.01330 | Xiaojun Chang | Sen Wang, Feiping Nie, Xiaojun Chang, Lina Yao, Xue Li, Quan Z. Sheng | Unsupervised Feature Analysis with Class Margin Optimization | Accepted by European Conference on Machine Learning and Principles
and Practice of Knowledge Discovery in Databases, ECML/PKDD 2015 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unsupervised feature selection has been always attracting research attention
in the communities of machine learning and data mining for decades. In this
paper, we propose an unsupervised feature selection method seeking a feature
coefficient matrix to select the most distinctive features. Specifically, our
proposed algorithm integrates the Maximum Margin Criterion with a
sparsity-based model into a joint framework, where the class margin and feature
correlation are taken into account at the same time. To maximize the total data
separability while preserving minimized within-class scatter simultaneously, we
propose to embed Kmeans into the framework generating pseudo class label
information in a scenario of unsupervised feature selection. Meanwhile, a
sparsity-based model, ` 2 ,p-norm, is imposed to the regularization term to
effectively discover the sparse structures of the feature coefficient matrix.
In this way, noisy and irrelevant features are removed by ruling out those
features whose corresponding coefficients are zeros. To alleviate the local
optimum problem that is caused by random initializations of K-means, a
convergence guaranteed algorithm with an updating strategy for the clustering
indicator matrix, is proposed to iteractively chase the optimal solution.
Performance evaluation is extensively conducted over six benchmark data sets.
From plenty of experimental results, it is demonstrated that our method has
superior performance against all other compared approaches.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 17:49:52 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Wang",
"Sen",
""
],
[
"Nie",
"Feiping",
""
],
[
"Chang",
"Xiaojun",
""
],
[
"Yao",
"Lina",
""
],
[
"Li",
"Xue",
""
],
[
"Sheng",
"Quan Z.",
""
]
] | TITLE: Unsupervised Feature Analysis with Class Margin Optimization
ABSTRACT: Unsupervised feature selection has been always attracting research attention
in the communities of machine learning and data mining for decades. In this
paper, we propose an unsupervised feature selection method seeking a feature
coefficient matrix to select the most distinctive features. Specifically, our
proposed algorithm integrates the Maximum Margin Criterion with a
sparsity-based model into a joint framework, where the class margin and feature
correlation are taken into account at the same time. To maximize the total data
separability while preserving minimized within-class scatter simultaneously, we
propose to embed Kmeans into the framework generating pseudo class label
information in a scenario of unsupervised feature selection. Meanwhile, a
sparsity-based model, ` 2 ,p-norm, is imposed to the regularization term to
effectively discover the sparse structures of the feature coefficient matrix.
In this way, noisy and irrelevant features are removed by ruling out those
features whose corresponding coefficients are zeros. To alleviate the local
optimum problem that is caused by random initializations of K-means, a
convergence guaranteed algorithm with an updating strategy for the clustering
indicator matrix, is proposed to iteractively chase the optimal solution.
Performance evaluation is extensively conducted over six benchmark data sets.
From plenty of experimental results, it is demonstrated that our method has
superior performance against all other compared approaches.
| no_new_dataset | 0.947284 |
1111.5612 | Vijayaraghavan Thirumalai | Vijayaraghavan Thirumalai, and Pascal Frossard | Distributed Representation of Geometrically Correlated Images with
Compressed Linear Measurements | null | null | 10.1109/TIP.2012.2188035 | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of distributed coding of images whose
correlation is driven by the motion of objects or positioning of the vision
sensors. It concentrates on the problem where images are encoded with
compressed linear measurements. We propose a geometry-based correlation model
in order to describe the common information in pairs of images. We assume that
the constitutive components of natural images can be captured by visual
features that undergo local transformations (e.g., translation) in different
images. We first identify prominent visual features by computing a sparse
approximation of a reference image with a dictionary of geometric basis
functions. We then pose a regularized optimization problem to estimate the
corresponding features in correlated images given by quantized linear
measurements. The estimated features have to comply with the compressed
information and to represent consistent transformation between images. The
correlation model is given by the relative geometric transformations between
corresponding features. We then propose an efficient joint decoding algorithm
that estimates the compressed images such that they stay consistent with both
the quantized measurements and the correlation model. Experimental results show
that the proposed algorithm effectively estimates the correlation between
images in multi-view datasets. In addition, the proposed algorithm provides
effective decoding performance that compares advantageously to independent
coding solutions as well as state-of-the-art distributed coding schemes based
on disparity learning.
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2011 15:54:23 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Thirumalai",
"Vijayaraghavan",
""
],
[
"Frossard",
"Pascal",
""
]
] | TITLE: Distributed Representation of Geometrically Correlated Images with
Compressed Linear Measurements
ABSTRACT: This paper addresses the problem of distributed coding of images whose
correlation is driven by the motion of objects or positioning of the vision
sensors. It concentrates on the problem where images are encoded with
compressed linear measurements. We propose a geometry-based correlation model
in order to describe the common information in pairs of images. We assume that
the constitutive components of natural images can be captured by visual
features that undergo local transformations (e.g., translation) in different
images. We first identify prominent visual features by computing a sparse
approximation of a reference image with a dictionary of geometric basis
functions. We then pose a regularized optimization problem to estimate the
corresponding features in correlated images given by quantized linear
measurements. The estimated features have to comply with the compressed
information and to represent consistent transformation between images. The
correlation model is given by the relative geometric transformations between
corresponding features. We then propose an efficient joint decoding algorithm
that estimates the compressed images such that they stay consistent with both
the quantized measurements and the correlation model. Experimental results show
that the proposed algorithm effectively estimates the correlation between
images in multi-view datasets. In addition, the proposed algorithm provides
effective decoding performance that compares advantageously to independent
coding solutions as well as state-of-the-art distributed coding schemes based
on disparity learning.
| no_new_dataset | 0.945147 |
1112.1224 | Emanuele Massaro | E. Massaro, A. Guazzini, F. Bagnoli and P. Li\`o | Information dynamics algorithm for detecting communities in networks | Submitted to "Communication in Nonlinear Science and Numerical
Simulation" | null | 10.1016/j.cnsns.2012.03.023 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of community detection is relevant in many scientific
disciplines, from social science to statistical physics. Given the impact of
community detection in many areas, such as psychology and social sciences, we
have addressed the issue of modifying existing well performing algorithms by
incorporating elements of the domain application fields, i.e. domain-inspired.
We have focused on a psychology and social network - inspired approach which
may be useful for further strengthening the link between social network studies
and mathematics of community detection. Here we introduce a community-detection
algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method
by considering networks' nodes as agents capable to take decisions. In this
framework we have introduced a memory factor to mimic a typical human behavior
such as the oblivion effect. The method is based on information diffusion and
it includes a non-linear processing phase. We test our method on two classical
community benchmark and on computer generated networks with known community
structure. Our approach has three important features: the capacity of detecting
overlapping communities, the capability of identifying communities from an
individual point of view and the fine tuning the community detectability with
respect to prior knowledge of the data. Finally we discuss how to use a Shannon
entropy measure for parameter estimation in complex networks.
| [
{
"version": "v1",
"created": "Tue, 6 Dec 2011 10:45:27 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Massaro",
"E.",
""
],
[
"Guazzini",
"A.",
""
],
[
"Bagnoli",
"F.",
""
],
[
"Liò",
"P.",
""
]
] | TITLE: Information dynamics algorithm for detecting communities in networks
ABSTRACT: The problem of community detection is relevant in many scientific
disciplines, from social science to statistical physics. Given the impact of
community detection in many areas, such as psychology and social sciences, we
have addressed the issue of modifying existing well performing algorithms by
incorporating elements of the domain application fields, i.e. domain-inspired.
We have focused on a psychology and social network - inspired approach which
may be useful for further strengthening the link between social network studies
and mathematics of community detection. Here we introduce a community-detection
algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method
by considering networks' nodes as agents capable to take decisions. In this
framework we have introduced a memory factor to mimic a typical human behavior
such as the oblivion effect. The method is based on information diffusion and
it includes a non-linear processing phase. We test our method on two classical
community benchmark and on computer generated networks with known community
structure. Our approach has three important features: the capacity of detecting
overlapping communities, the capability of identifying communities from an
individual point of view and the fine tuning the community detectability with
respect to prior knowledge of the data. Finally we discuss how to use a Shannon
entropy measure for parameter estimation in complex networks.
| no_new_dataset | 0.944536 |
1112.2392 | Jianguo Liu | Jian-Guo Liu, Tao Zhou, Qiang Guo | Information filtering via biased heat conduction | 4 pages, 3 figures | Phys. Rev. E 87 (2011) 037101 | 10.1103/PhysRevE.84.037101 | null | physics.data-an cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heat conduction process has recently found its application in personalized
recommendation [T. Zhou \emph{et al.}, PNAS 107, 4511 (2010)], which is of high
diversity but low accuracy. By decreasing the temperatures of small-degree
objects, we present an improved algorithm, called biased heat conduction (BHC),
which could simultaneously enhance the accuracy and diversity. Extensive
experimental analyses demonstrate that the accuracy on MovieLens, Netflix and
Delicious datasets could be improved by 43.5%, 55.4% and 19.2% compared with
the standard heat conduction algorithm, and the diversity is also increased or
approximately unchanged. Further statistical analyses suggest that the present
algorithm could simultaneously identify users' mainstream and special tastes,
resulting in better performance than the standard heat conduction algorithm.
This work provides a creditable way for highly efficient information filtering.
| [
{
"version": "v1",
"created": "Sun, 11 Dec 2011 20:18:22 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Liu",
"Jian-Guo",
""
],
[
"Zhou",
"Tao",
""
],
[
"Guo",
"Qiang",
""
]
] | TITLE: Information filtering via biased heat conduction
ABSTRACT: Heat conduction process has recently found its application in personalized
recommendation [T. Zhou \emph{et al.}, PNAS 107, 4511 (2010)], which is of high
diversity but low accuracy. By decreasing the temperatures of small-degree
objects, we present an improved algorithm, called biased heat conduction (BHC),
which could simultaneously enhance the accuracy and diversity. Extensive
experimental analyses demonstrate that the accuracy on MovieLens, Netflix and
Delicious datasets could be improved by 43.5%, 55.4% and 19.2% compared with
the standard heat conduction algorithm, and the diversity is also increased or
approximately unchanged. Further statistical analyses suggest that the present
algorithm could simultaneously identify users' mainstream and special tastes,
resulting in better performance than the standard heat conduction algorithm.
This work provides a creditable way for highly efficient information filtering.
| no_new_dataset | 0.951188 |
1407.7443 | Saurabh Joshi | Saurabh Joshi and Daniel Kroening | Property-Driven Fence Insertion using Reorder Bounded Model Checking | 18 pages, 3 figures, 4 algorithms. Version change reason : new set of
results and publication ready version of FM 2015 | null | 10.1007/978-3-319-19249-9_19 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern architectures provide weaker memory consistency guarantees than
sequential consistency. These weaker guarantees allow programs to exhibit
behaviours where the program statements appear to have executed out of program
order. Fortunately, modern architectures provide memory barriers (fences) to
enforce the program order between a pair of statements if needed. Due to the
intricate semantics of weak memory models, the placement of fences is
challenging even for experienced programmers. Too few fences lead to bugs
whereas overuse of fences results in performance degradation. This motivates
automated placement of fences. Tools that restore sequential consistency in the
program may insert more fences than necessary for the program to be correct.
Therefore, we propose a property-driven technique that introduces
"reorder-bounded exploration" to identify the smallest number of program
locations for fence placement. We implemented our technique on top of CBMC;
however, in principle, our technique is generic enough to be used with any
model checker. Our experimental results show that our technique is faster and
solves more instances of relevant benchmarks as compared to earlier approaches.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2014 15:27:10 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2014 18:21:28 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Jun 2015 20:39:01 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Joshi",
"Saurabh",
""
],
[
"Kroening",
"Daniel",
""
]
] | TITLE: Property-Driven Fence Insertion using Reorder Bounded Model Checking
ABSTRACT: Modern architectures provide weaker memory consistency guarantees than
sequential consistency. These weaker guarantees allow programs to exhibit
behaviours where the program statements appear to have executed out of program
order. Fortunately, modern architectures provide memory barriers (fences) to
enforce the program order between a pair of statements if needed. Due to the
intricate semantics of weak memory models, the placement of fences is
challenging even for experienced programmers. Too few fences lead to bugs
whereas overuse of fences results in performance degradation. This motivates
automated placement of fences. Tools that restore sequential consistency in the
program may insert more fences than necessary for the program to be correct.
Therefore, we propose a property-driven technique that introduces
"reorder-bounded exploration" to identify the smallest number of program
locations for fence placement. We implemented our technique on top of CBMC;
however, in principle, our technique is generic enough to be used with any
model checker. Our experimental results show that our technique is faster and
solves more instances of relevant benchmarks as compared to earlier approaches.
| no_new_dataset | 0.949295 |
1506.00765 | Rongrong Ji Rongrong Ji | Zheng Cai, Donglin Cao, Rongrong Ji | Video (GIF) Sentiment Analysis using Large-Scale Mid-Level Ontology | null | null | null | null | cs.MM cs.CL cs.IR | http://creativecommons.org/licenses/by/3.0/ | With faster connection speed, Internet users are now making social network a
huge reservoir of texts, images and video clips (GIF). Sentiment analysis for
such online platform can be used to predict political elections, evaluates
economic indicators and so on. However, GIF sentiment analysis is quite
challenging, not only because it hinges on spatio-temporal visual
contentabstraction, but also for the relationship between such abstraction and
final sentiment remains unknown.In this paper, we dedicated to find out such
relationship.We proposed a SentiPairSequence basedspatiotemporal visual
sentiment ontology, which forms the midlevel representations for GIFsentiment.
The establishment process of SentiPair contains two steps. First, we construct
the Synset Forest to define the semantic tree structure of visual sentiment
label elements. Then, through theSynset Forest, we organically select and
combine sentiment label elements to form a mid-level visual sentiment
representation. Our experiments indicate that SentiPair outperforms other
competing mid-level attributes. Using SentiPair, our analysis frameworkcan
achieve satisfying prediction accuracy (72.6%). We also opened ourdataset
(GSO-2015) to the research community. GSO-2015 contains more than 6,000
manually annotated GIFs out of more than 40,000 candidates. Each is labeled
with both sentiment and SentiPair Sequence.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 06:31:57 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Cai",
"Zheng",
""
],
[
"Cao",
"Donglin",
""
],
[
"Ji",
"Rongrong",
""
]
] | TITLE: Video (GIF) Sentiment Analysis using Large-Scale Mid-Level Ontology
ABSTRACT: With faster connection speed, Internet users are now making social network a
huge reservoir of texts, images and video clips (GIF). Sentiment analysis for
such online platform can be used to predict political elections, evaluates
economic indicators and so on. However, GIF sentiment analysis is quite
challenging, not only because it hinges on spatio-temporal visual
contentabstraction, but also for the relationship between such abstraction and
final sentiment remains unknown.In this paper, we dedicated to find out such
relationship.We proposed a SentiPairSequence basedspatiotemporal visual
sentiment ontology, which forms the midlevel representations for GIFsentiment.
The establishment process of SentiPair contains two steps. First, we construct
the Synset Forest to define the semantic tree structure of visual sentiment
label elements. Then, through theSynset Forest, we organically select and
combine sentiment label elements to form a mid-level visual sentiment
representation. Our experiments indicate that SentiPair outperforms other
competing mid-level attributes. Using SentiPair, our analysis frameworkcan
achieve satisfying prediction accuracy (72.6%). We also opened ourdataset
(GSO-2015) to the research community. GSO-2015 contains more than 6,000
manually annotated GIFs out of more than 40,000 candidates. Each is labeled
with both sentiment and SentiPair Sequence.
| new_dataset | 0.952706 |
1506.00770 | Carlos Herrera-Yag\"ue | C. Herrera-Yag\"ue, C.M. Schneider, T. Couronn\'e, Z. Smoreda, R.M.
Benito, P.J. Zufiria and M.C. Gonz\'alez | The anatomy of urban social networks and its implications in the
searchability problem | null | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The appearance of large geolocated communication datasets has recently
increased our understanding of how social networks relate to their physical
space. However, many recurrently reported properties, such as the spatial
clustering of network communities, have not yet been systematically tested at
different scales. In this work we analyze the social network structure of over
25 million phone users from three countries at three different scales: country,
provinces and cities. We consistently find that this last urban scenario
presents significant differences to common knowledge about social networks.
First, the emergence of a giant component in the network seems to be controlled
by whether or not the network spans over the entire urban border, almost
independently of the population or geographic extension of the city. Second,
urban communities are much less geographically clustered than expected. These
two findings shed new light on the widely-studied searchability in
self-organized networks. By exhaustive simulation of decentralized search
strategies we conclude that urban networks are searchable not through
geographical proximity as their country-wide counterparts, but through an
homophily-driven community structure.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 06:48:16 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Herrera-Yagüe",
"C.",
""
],
[
"Schneider",
"C. M.",
""
],
[
"Couronné",
"T.",
""
],
[
"Smoreda",
"Z.",
""
],
[
"Benito",
"R. M.",
""
],
[
"Zufiria",
"P. J.",
""
],
[
"González",
"M. C.",
""
]
] | TITLE: The anatomy of urban social networks and its implications in the
searchability problem
ABSTRACT: The appearance of large geolocated communication datasets has recently
increased our understanding of how social networks relate to their physical
space. However, many recurrently reported properties, such as the spatial
clustering of network communities, have not yet been systematically tested at
different scales. In this work we analyze the social network structure of over
25 million phone users from three countries at three different scales: country,
provinces and cities. We consistently find that this last urban scenario
presents significant differences to common knowledge about social networks.
First, the emergence of a giant component in the network seems to be controlled
by whether or not the network spans over the entire urban border, almost
independently of the population or geographic extension of the city. Second,
urban communities are much less geographically clustered than expected. These
two findings shed new light on the widely-studied searchability in
self-organized networks. By exhaustive simulation of decentralized search
strategies we conclude that urban networks are searchable not through
geographical proximity as their country-wide counterparts, but through an
homophily-driven community structure.
| no_new_dataset | 0.942612 |
1506.00893 | Joana C\^orte-Real | Joana C\^orte-Real and Theofrastos Mantadelis and In\^es Dutra and
Ricardo Rocha | SkILL - a Stochastic Inductive Logic Learner | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Probabilistic Inductive Logic Programming (PILP) is a rel- atively unexplored
area of Statistical Relational Learning which extends classic Inductive Logic
Programming (ILP). This work introduces SkILL, a Stochastic Inductive Logic
Learner, which takes probabilistic annotated data and produces First Order
Logic theories. Data in several domains such as medicine and bioinformatics
have an inherent degree of uncer- tainty, that can be used to produce models
closer to reality. SkILL can not only use this type of probabilistic data to
extract non-trivial knowl- edge from databases, but it also addresses
efficiency issues by introducing a novel, efficient and effective search
strategy to guide the search in PILP environments. The capabilities of SkILL
are demonstrated in three dif- ferent datasets: (i) a synthetic toy example
used to validate the system, (ii) a probabilistic adaptation of a well-known
biological metabolism ap- plication, and (iii) a real world medical dataset in
the breast cancer domain. Results show that SkILL can perform as well as a
deterministic ILP learner, while also being able to incorporate probabilistic
knowledge that would otherwise not be considered.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 14:10:02 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Côrte-Real",
"Joana",
""
],
[
"Mantadelis",
"Theofrastos",
""
],
[
"Dutra",
"Inês",
""
],
[
"Rocha",
"Ricardo",
""
]
] | TITLE: SkILL - a Stochastic Inductive Logic Learner
ABSTRACT: Probabilistic Inductive Logic Programming (PILP) is a rel- atively unexplored
area of Statistical Relational Learning which extends classic Inductive Logic
Programming (ILP). This work introduces SkILL, a Stochastic Inductive Logic
Learner, which takes probabilistic annotated data and produces First Order
Logic theories. Data in several domains such as medicine and bioinformatics
have an inherent degree of uncer- tainty, that can be used to produce models
closer to reality. SkILL can not only use this type of probabilistic data to
extract non-trivial knowl- edge from databases, but it also addresses
efficiency issues by introducing a novel, efficient and effective search
strategy to guide the search in PILP environments. The capabilities of SkILL
are demonstrated in three dif- ferent datasets: (i) a synthetic toy example
used to validate the system, (ii) a probabilistic adaptation of a well-known
biological metabolism ap- plication, and (iii) a real world medical dataset in
the breast cancer domain. Results show that SkILL can perform as well as a
deterministic ILP learner, while also being able to incorporate probabilistic
knowledge that would otherwise not be considered.
| no_new_dataset | 0.69766 |
1506.00999 | Antoine Bordes | Alberto Garcia-Duran, Antoine Bordes, Nicolas Usunier, Yves Grandvalet | Combining Two And Three-Way Embeddings Models for Link Prediction in
Knowledge Bases | 26 pages | null | null | null | cs.AI cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper tackles the problem of endogenous link prediction for Knowledge
Base completion. Knowledge Bases can be represented as directed graphs whose
nodes correspond to entities and edges to relationships. Previous attempts
either consist of powerful systems with high capacity to model complex
connectivity patterns, which unfortunately usually end up overfitting on rare
relationships, or in approaches that trade capacity for simplicity in order to
fairly model all relationships, frequent or not. In this paper, we propose
Tatec a happy medium obtained by complementing a high-capacity model with a
simpler one, both pre-trained separately and then combined. We present several
variants of this model with different kinds of regularization and combination
strategies and show that this approach outperforms existing methods on
different types of relationships by achieving state-of-the-art results on four
benchmarks of the literature.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 19:34:19 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Garcia-Duran",
"Alberto",
""
],
[
"Bordes",
"Antoine",
""
],
[
"Usunier",
"Nicolas",
""
],
[
"Grandvalet",
"Yves",
""
]
] | TITLE: Combining Two And Three-Way Embeddings Models for Link Prediction in
Knowledge Bases
ABSTRACT: This paper tackles the problem of endogenous link prediction for Knowledge
Base completion. Knowledge Bases can be represented as directed graphs whose
nodes correspond to entities and edges to relationships. Previous attempts
either consist of powerful systems with high capacity to model complex
connectivity patterns, which unfortunately usually end up overfitting on rare
relationships, or in approaches that trade capacity for simplicity in order to
fairly model all relationships, frequent or not. In this paper, we propose
Tatec a happy medium obtained by complementing a high-capacity model with a
simpler one, both pre-trained separately and then combined. We present several
variants of this model with different kinds of regularization and combination
strategies and show that this approach outperforms existing methods on
different types of relationships by achieving state-of-the-art results on four
benchmarks of the literature.
| no_new_dataset | 0.945096 |
1401.8269 | Peter Turney | Peter D. Turney and Saif M. Mohammad | Experiments with Three Approaches to Recognizing Lexical Entailment | to appear in Natural Language Engineering | Natural Language Engineering, 21 (3), (2015), 437-476 | 10.1017/S1351324913000387 | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inference in natural language often involves recognizing lexical entailment
(RLE); that is, identifying whether one word entails another. For example,
"buy" entails "own". Two general strategies for RLE have been proposed: One
strategy is to manually construct an asymmetric similarity measure for context
vectors (directional similarity) and another is to treat RLE as a problem of
learning to recognize semantic relations using supervised machine learning
techniques (relation classification). In this paper, we experiment with two
recent state-of-the-art representatives of the two general strategies. The
first approach is an asymmetric similarity measure (an instance of the
directional similarity strategy), designed to capture the degree to which the
contexts of a word, a, form a subset of the contexts of another word, b. The
second approach (an instance of the relation classification strategy)
represents a word pair, a:b, with a feature vector that is the concatenation of
the context vectors of a and b, and then applies supervised learning to a
training set of labeled feature vectors. Additionally, we introduce a third
approach that is a new instance of the relation classification strategy. The
third approach represents a word pair, a:b, with a feature vector in which the
features are the differences in the similarities of a and b to a set of
reference words. All three approaches use vector space models (VSMs) of
semantics, based on word-context matrices. We perform an extensive evaluation
of the three approaches using three different datasets. The proposed new
approach (similarity differences) performs significantly better than the other
two approaches on some datasets and there is no dataset for which it is
significantly worse. Our results suggest it is beneficial to make connections
between the research in lexical entailment and the research in semantic
relation classification.
| [
{
"version": "v1",
"created": "Fri, 31 Jan 2014 19:42:19 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Turney",
"Peter D.",
""
],
[
"Mohammad",
"Saif M.",
""
]
] | TITLE: Experiments with Three Approaches to Recognizing Lexical Entailment
ABSTRACT: Inference in natural language often involves recognizing lexical entailment
(RLE); that is, identifying whether one word entails another. For example,
"buy" entails "own". Two general strategies for RLE have been proposed: One
strategy is to manually construct an asymmetric similarity measure for context
vectors (directional similarity) and another is to treat RLE as a problem of
learning to recognize semantic relations using supervised machine learning
techniques (relation classification). In this paper, we experiment with two
recent state-of-the-art representatives of the two general strategies. The
first approach is an asymmetric similarity measure (an instance of the
directional similarity strategy), designed to capture the degree to which the
contexts of a word, a, form a subset of the contexts of another word, b. The
second approach (an instance of the relation classification strategy)
represents a word pair, a:b, with a feature vector that is the concatenation of
the context vectors of a and b, and then applies supervised learning to a
training set of labeled feature vectors. Additionally, we introduce a third
approach that is a new instance of the relation classification strategy. The
third approach represents a word pair, a:b, with a feature vector in which the
features are the differences in the similarities of a and b to a set of
reference words. All three approaches use vector space models (VSMs) of
semantics, based on word-context matrices. We perform an extensive evaluation
of the three approaches using three different datasets. The proposed new
approach (similarity differences) performs significantly better than the other
two approaches on some datasets and there is no dataset for which it is
significantly worse. Our results suggest it is beneficial to make connections
between the research in lexical entailment and the research in semantic
relation classification.
| no_new_dataset | 0.949389 |
1409.7480 | Mohamed Elhoseiny Mohamed Elhoseiny | Mohamed Elhoseiny, Ahmed Elgammal | Generalized Twin Gaussian Processes using Sharma-Mittal Divergence | This work got accepted for Publication in the Machine Learning
Journal 2015. The work is scheduled for presentation at ECML-PKDD 2015
journal track papers | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There has been a growing interest in mutual information measures due to their
wide range of applications in Machine Learning and Computer Vision. In this
paper, we present a generalized structured regression framework based on
Shama-Mittal divergence, a relative entropy measure, which is introduced to the
Machine Learning community in this work. Sharma-Mittal (SM) divergence is a
generalized mutual information measure for the widely used R\'enyi, Tsallis,
Bhattacharyya, and Kullback-Leibler (KL) relative entropies. Specifically, we
study Sharma-Mittal divergence as a cost function in the context of the Twin
Gaussian Processes (TGP)~\citep{Bo:2010}, which generalizes over the
KL-divergence without computational penalty. We show interesting properties of
Sharma-Mittal TGP (SMTGP) through a theoretical analysis, which covers missing
insights in the traditional TGP formulation. However, we generalize this theory
based on SM-divergence instead of KL-divergence which is a special case.
Experimentally, we evaluated the proposed SMTGP framework on several datasets.
The results show that SMTGP reaches better predictions than KL-based TGP, since
it offers a bigger class of models through its parameters that we learn from
the data.
| [
{
"version": "v1",
"created": "Fri, 26 Sep 2014 06:46:38 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Oct 2014 13:32:50 GMT"
},
{
"version": "v3",
"created": "Fri, 3 Oct 2014 03:54:41 GMT"
},
{
"version": "v4",
"created": "Mon, 6 Oct 2014 03:47:51 GMT"
},
{
"version": "v5",
"created": "Mon, 1 Jun 2015 06:30:29 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Elhoseiny",
"Mohamed",
""
],
[
"Elgammal",
"Ahmed",
""
]
] | TITLE: Generalized Twin Gaussian Processes using Sharma-Mittal Divergence
ABSTRACT: There has been a growing interest in mutual information measures due to their
wide range of applications in Machine Learning and Computer Vision. In this
paper, we present a generalized structured regression framework based on
Shama-Mittal divergence, a relative entropy measure, which is introduced to the
Machine Learning community in this work. Sharma-Mittal (SM) divergence is a
generalized mutual information measure for the widely used R\'enyi, Tsallis,
Bhattacharyya, and Kullback-Leibler (KL) relative entropies. Specifically, we
study Sharma-Mittal divergence as a cost function in the context of the Twin
Gaussian Processes (TGP)~\citep{Bo:2010}, which generalizes over the
KL-divergence without computational penalty. We show interesting properties of
Sharma-Mittal TGP (SMTGP) through a theoretical analysis, which covers missing
insights in the traditional TGP formulation. However, we generalize this theory
based on SM-divergence instead of KL-divergence which is a special case.
Experimentally, we evaluated the proposed SMTGP framework on several datasets.
The results show that SMTGP reaches better predictions than KL-based TGP, since
it offers a bigger class of models through its parameters that we learn from
the data.
| no_new_dataset | 0.948537 |
1412.2197 | Liangliang Cao | Liangliang Cao and Chang Wang | Practice in Synonym Extraction at Large Scale | This paper has been withdrawn by the author since the experimental
results are not good enough | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Synonym extraction is an important task in natural language processing and
often used as a submodule in query expansion, question answering and other
applications. Automatic synonym extractor is highly preferred for large scale
applications. Previous studies in synonym extraction are most limited to small
scale datasets. In this paper, we build a large dataset with 3.4 million
synonym/non-synonym pairs to capture the challenges in real world scenarios. We
proposed (1) a new cost function to accommodate the unbalanced learning
problem, and (2) a feature learning based deep neural network to model the
complicated relationships in synonym pairs. We compare several different
approaches based on SVMs and neural networks, and find out a novel feature
learning based neural network outperforms the methods with hand-assigned
features. Specifically, the best performance of our model surpasses the SVM
baseline with a significant 97\% relative improvement.
| [
{
"version": "v1",
"created": "Sat, 6 Dec 2014 04:40:18 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 16:49:44 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Jun 2015 19:55:17 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Cao",
"Liangliang",
""
],
[
"Wang",
"Chang",
""
]
] | TITLE: Practice in Synonym Extraction at Large Scale
ABSTRACT: Synonym extraction is an important task in natural language processing and
often used as a submodule in query expansion, question answering and other
applications. Automatic synonym extractor is highly preferred for large scale
applications. Previous studies in synonym extraction are most limited to small
scale datasets. In this paper, we build a large dataset with 3.4 million
synonym/non-synonym pairs to capture the challenges in real world scenarios. We
proposed (1) a new cost function to accommodate the unbalanced learning
problem, and (2) a feature learning based deep neural network to model the
complicated relationships in synonym pairs. We compare several different
approaches based on SVMs and neural networks, and find out a novel feature
learning based neural network outperforms the methods with hand-assigned
features. Specifically, the best performance of our model surpasses the SVM
baseline with a significant 97\% relative improvement.
| new_dataset | 0.961244 |
1503.06772 | Abigail Jacobs | Abigail Z. Jacobs, Samuel F. Way, Johan Ugander and Aaron Clauset | Assembling thefacebook: Using heterogeneity to understand online social
network assembly | 13 pages, 11 figures, Proceedings of the 7th Annual ACM Web Science
Conference (WebSci), 2015 | null | 10.1145/2786451.2786477 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online social networks represent a popular and diverse class of social media
systems. Despite this variety, each of these systems undergoes a general
process of online social network assembly, which represents the complicated and
heterogeneous changes that transform newly born systems into mature platforms.
However, little is known about this process. For example, how much of a
network's assembly is driven by simple growth? How does a network's structure
change as it matures? How does network structure vary with adoption rates and
user heterogeneity, and do these properties play different roles at different
points in the assembly? We investigate these and other questions using a unique
dataset of online connections among the roughly one million users at the first
100 colleges admitted to Facebook, captured just 20 months after its launch. We
first show that different vintages and adoption rates across this population of
networks reveal temporal dynamics of the assembly process, and that assembly is
only loosely related to network growth. We then exploit natural experiments
embedded in this dataset and complementary data obtained via Internet
archaeology to show that different subnetworks matured at different rates
toward similar end states. These results shed light on the processes and
patterns of online social network assembly, and may facilitate more effective
design for online social systems.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 19:13:27 GMT"
},
{
"version": "v2",
"created": "Sun, 31 May 2015 20:24:02 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Jacobs",
"Abigail Z.",
""
],
[
"Way",
"Samuel F.",
""
],
[
"Ugander",
"Johan",
""
],
[
"Clauset",
"Aaron",
""
]
] | TITLE: Assembling thefacebook: Using heterogeneity to understand online social
network assembly
ABSTRACT: Online social networks represent a popular and diverse class of social media
systems. Despite this variety, each of these systems undergoes a general
process of online social network assembly, which represents the complicated and
heterogeneous changes that transform newly born systems into mature platforms.
However, little is known about this process. For example, how much of a
network's assembly is driven by simple growth? How does a network's structure
change as it matures? How does network structure vary with adoption rates and
user heterogeneity, and do these properties play different roles at different
points in the assembly? We investigate these and other questions using a unique
dataset of online connections among the roughly one million users at the first
100 colleges admitted to Facebook, captured just 20 months after its launch. We
first show that different vintages and adoption rates across this population of
networks reveal temporal dynamics of the assembly process, and that assembly is
only loosely related to network growth. We then exploit natural experiments
embedded in this dataset and complementary data obtained via Internet
archaeology to show that different subnetworks matured at different rates
toward similar end states. These results shed light on the processes and
patterns of online social network assembly, and may facilitate more effective
design for online social systems.
| new_dataset | 0.747386 |
1504.00905 | Jose Lopez | Jose A. Lopez, Octavia Camps, Mario Sznaier | Robust Anomaly Detection Using Semidefinite Programming | 13 pages, 11 figures | null | null | null | math.OC cs.CV cs.LG cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new approach, based on polynomial optimization and the
method of moments, to the problem of anomaly detection. The proposed technique
only requires information about the statistical moments of the normal-state
distribution of the features of interest and compares favorably with existing
approaches (such as Parzen windows and 1-class SVM). In addition, it provides a
succinct description of the normal state. Thus, it leads to a substantial
simplification of the the anomaly detection problem when working with higher
dimensional datasets.
| [
{
"version": "v1",
"created": "Fri, 3 Apr 2015 18:20:36 GMT"
},
{
"version": "v2",
"created": "Sat, 30 May 2015 15:58:36 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Lopez",
"Jose A.",
""
],
[
"Camps",
"Octavia",
""
],
[
"Sznaier",
"Mario",
""
]
] | TITLE: Robust Anomaly Detection Using Semidefinite Programming
ABSTRACT: This paper presents a new approach, based on polynomial optimization and the
method of moments, to the problem of anomaly detection. The proposed technique
only requires information about the statistical moments of the normal-state
distribution of the features of interest and compares favorably with existing
approaches (such as Parzen windows and 1-class SVM). In addition, it provides a
succinct description of the normal state. Thus, it leads to a substantial
simplification of the the anomaly detection problem when working with higher
dimensional datasets.
| no_new_dataset | 0.950686 |
1506.00022 | Xiaohan Zhao | Xiaohan Zhao, Qingyun Liu, Lin Zhou, Haitao Zheng and Ben Y. Zhao | Graph Watermarks | 16 pages, 14 figures, full version | null | null | null | cs.CR cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | From network topologies to online social networks, many of today's most
sensitive datasets are captured in large graphs. A significant challenge facing
owners of these datasets is how to share sensitive graphs with collaborators
and authorized users, e.g. network topologies with network equipment vendors or
Facebook's social graphs with academic collaborators. Current tools can provide
limited node or edge privacy, but require modifications to the graph that
significantly reduce its utility.
In this work, we propose a new alternative in the form of graph watermarks.
Graph watermarks are small graphs tailor-made for a given graph dataset, a
secure graph key, and a secure user key. To share a sensitive graph G with a
collaborator C, the owner generates a watermark graph W using G, the graph key,
and C's key as input, and embeds W into G to form G'. If G' is leaked by C,its
owner can reliably determine if the watermark W generated for C does in fact
reside inside G', thereby proving C is responsible for the leak. Graph
watermarks serve both as a deterrent against data leakage and a method of
recourse after a leak. We provide robust schemes for creating, embedding and
extracting watermarks, and use analysis and experiments on large, real graphs
to show that they are unique and difficult to forge. We study the robustness of
graph watermarks against both single and powerful colluding attacker models,
then propose and empirically evaluate mechanisms to dramatically improve
resilience.
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 20:29:04 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Zhao",
"Xiaohan",
""
],
[
"Liu",
"Qingyun",
""
],
[
"Zhou",
"Lin",
""
],
[
"Zheng",
"Haitao",
""
],
[
"Zhao",
"Ben Y.",
""
]
] | TITLE: Graph Watermarks
ABSTRACT: From network topologies to online social networks, many of today's most
sensitive datasets are captured in large graphs. A significant challenge facing
owners of these datasets is how to share sensitive graphs with collaborators
and authorized users, e.g. network topologies with network equipment vendors or
Facebook's social graphs with academic collaborators. Current tools can provide
limited node or edge privacy, but require modifications to the graph that
significantly reduce its utility.
In this work, we propose a new alternative in the form of graph watermarks.
Graph watermarks are small graphs tailor-made for a given graph dataset, a
secure graph key, and a secure user key. To share a sensitive graph G with a
collaborator C, the owner generates a watermark graph W using G, the graph key,
and C's key as input, and embeds W into G to form G'. If G' is leaked by C,its
owner can reliably determine if the watermark W generated for C does in fact
reside inside G', thereby proving C is responsible for the leak. Graph
watermarks serve both as a deterrent against data leakage and a method of
recourse after a leak. We provide robust schemes for creating, embedding and
extracting watermarks, and use analysis and experiments on large, real graphs
to show that they are unique and difficult to forge. We study the robustness of
graph watermarks against both single and powerful colluding attacker models,
then propose and empirically evaluate mechanisms to dramatically improve
resilience.
| no_new_dataset | 0.934873 |
1506.00102 | Pau Bellot | Pau Bellot, Patrick E. Meyer | Efficient combination of pairswise feature networks | JMLR: Workshop and Conference Proceedings, 2014 Connectomics (ECML
2014) | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel method for the reconstruction of a neural network
connectivity using calcium fluorescence data. We introduce a fast unsupervised
method to integrate different networks that reconstructs structural
connectivity from neuron activity. Our method improves the state-of-the-art
reconstruction method General Transfer Entropy (GTE). We are able to better
eliminate indirect links, improving therefore the quality of the network via a
normalization and ensemble process of GTE and three new informative features.
The approach is based on a simple combination of networks, which is remarkably
fast. The performance of our approach is benchmarked on simulated time series
provided at the connectomics challenge and also submitted at the public
competition.
| [
{
"version": "v1",
"created": "Sat, 30 May 2015 10:31:31 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Bellot",
"Pau",
""
],
[
"Meyer",
"Patrick E.",
""
]
] | TITLE: Efficient combination of pairswise feature networks
ABSTRACT: This paper presents a novel method for the reconstruction of a neural network
connectivity using calcium fluorescence data. We introduce a fast unsupervised
method to integrate different networks that reconstructs structural
connectivity from neuron activity. Our method improves the state-of-the-art
reconstruction method General Transfer Entropy (GTE). We are able to better
eliminate indirect links, improving therefore the quality of the network via a
normalization and ensemble process of GTE and three new informative features.
The approach is based on a simple combination of networks, which is remarkably
fast. The performance of our approach is benchmarked on simulated time series
provided at the connectomics challenge and also submitted at the public
competition.
| no_new_dataset | 0.949342 |
1506.00176 | Lianwen Jin | Liquan Qiu, Lianwen Jin, Ruifen Dai, Yuxiang Zhang, Lei Li | An Open Source Testing Tool for Evaluating Handwriting Input Methods | 5 pages, 3 figures, 11 tables. Accepted to appear at ICDAR 2015 | null | null | null | cs.HC cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an open source tool for testing the recognition accuracy
of Chinese handwriting input methods. The tool consists of two modules, namely
the PC and Android mobile client. The PC client reads handwritten samples in
the computer, and transfers them individually to the Android client in
accordance with the socket communication protocol. After the Android client
receives the data, it simulates the handwriting on screen of client device, and
triggers the corresponding handwriting recognition method. The recognition
accuracy is recorded by the Android client. We present the design principles
and describe the implementation of the test platform. We construct several test
datasets for evaluating different handwriting recognition systems, and conduct
an objective and comprehensive test using six Chinese handwriting input methods
with five datasets. The test results for the recognition accuracy are then
compared and analyzed.
| [
{
"version": "v1",
"created": "Sat, 30 May 2015 22:35:55 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Qiu",
"Liquan",
""
],
[
"Jin",
"Lianwen",
""
],
[
"Dai",
"Ruifen",
""
],
[
"Zhang",
"Yuxiang",
""
],
[
"Li",
"Lei",
""
]
] | TITLE: An Open Source Testing Tool for Evaluating Handwriting Input Methods
ABSTRACT: This paper presents an open source tool for testing the recognition accuracy
of Chinese handwriting input methods. The tool consists of two modules, namely
the PC and Android mobile client. The PC client reads handwritten samples in
the computer, and transfers them individually to the Android client in
accordance with the socket communication protocol. After the Android client
receives the data, it simulates the handwriting on screen of client device, and
triggers the corresponding handwriting recognition method. The recognition
accuracy is recorded by the Android client. We present the design principles
and describe the implementation of the test platform. We construct several test
datasets for evaluating different handwriting recognition systems, and conduct
an objective and comprehensive test using six Chinese handwriting input methods
with five datasets. The test results for the recognition accuracy are then
compared and analyzed.
| new_dataset | 0.953275 |
1506.00195 | Kaisheng Yao | Baolin Peng and Kaisheng Yao | Recurrent Neural Networks with External Memory for Language
Understanding | submitted to Interspeech 2015 | null | null | null | cs.CL cs.AI cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recurrent Neural Networks (RNNs) have become increasingly popular for the
task of language understanding. In this task, a semantic tagger is deployed to
associate a semantic label to each word in an input sequence. The success of
RNN may be attributed to its ability to memorize long-term dependence that
relates the current-time semantic label prediction to the observations many
time instances away. However, the memory capacity of simple RNNs is limited
because of the gradient vanishing and exploding problem. We propose to use an
external memory to improve memorization capability of RNNs. We conducted
experiments on the ATIS dataset, and observed that the proposed model was able
to achieve the state-of-the-art results. We compare our proposed model with
alternative models and report analysis results that may provide insights for
future research.
| [
{
"version": "v1",
"created": "Sun, 31 May 2015 05:10:03 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Peng",
"Baolin",
""
],
[
"Yao",
"Kaisheng",
""
]
] | TITLE: Recurrent Neural Networks with External Memory for Language
Understanding
ABSTRACT: Recurrent Neural Networks (RNNs) have become increasingly popular for the
task of language understanding. In this task, a semantic tagger is deployed to
associate a semantic label to each word in an input sequence. The success of
RNN may be attributed to its ability to memorize long-term dependence that
relates the current-time semantic label prediction to the observations many
time instances away. However, the memory capacity of simple RNNs is limited
because of the gradient vanishing and exploding problem. We propose to use an
external memory to improve memorization capability of RNNs. We conducted
experiments on the ATIS dataset, and observed that the proposed model was able
to achieve the state-of-the-art results. We compare our proposed model with
alternative models and report analysis results that may provide insights for
future research.
| no_new_dataset | 0.944689 |
1506.00242 | Zhiwei Steven Wu | Michael Kearns, Aaron Roth, Zhiwei Steven Wu, Grigory Yaroslavtsev | Privacy for the Protected (Only) | null | null | null | null | cs.DS cs.CR cs.CY cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by tensions between data privacy for individual citizens, and
societal priorities such as counterterrorism and the containment of infectious
disease, we introduce a computational model that distinguishes between parties
for whom privacy is explicitly protected, and those for whom it is not (the
targeted subpopulation). The goal is the development of algorithms that can
effectively identify and take action upon members of the targeted subpopulation
in a way that minimally compromises the privacy of the protected, while
simultaneously limiting the expense of distinguishing members of the two groups
via costly mechanisms such as surveillance, background checks, or medical
testing. Within this framework, we provide provably privacy-preserving
algorithms for targeted search in social networks. These algorithms are natural
variants of common graph search methods, and ensure privacy for the protected
by the careful injection of noise in the prioritization of potential targets.
We validate the utility of our algorithms with extensive computational
experiments on two large-scale social network datasets.
| [
{
"version": "v1",
"created": "Sun, 31 May 2015 14:47:27 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Kearns",
"Michael",
""
],
[
"Roth",
"Aaron",
""
],
[
"Wu",
"Zhiwei Steven",
""
],
[
"Yaroslavtsev",
"Grigory",
""
]
] | TITLE: Privacy for the Protected (Only)
ABSTRACT: Motivated by tensions between data privacy for individual citizens, and
societal priorities such as counterterrorism and the containment of infectious
disease, we introduce a computational model that distinguishes between parties
for whom privacy is explicitly protected, and those for whom it is not (the
targeted subpopulation). The goal is the development of algorithms that can
effectively identify and take action upon members of the targeted subpopulation
in a way that minimally compromises the privacy of the protected, while
simultaneously limiting the expense of distinguishing members of the two groups
via costly mechanisms such as surveillance, background checks, or medical
testing. Within this framework, we provide provably privacy-preserving
algorithms for targeted search in social networks. These algorithms are natural
variants of common graph search methods, and ensure privacy for the protected
by the careful injection of noise in the prioritization of potential targets.
We validate the utility of our algorithms with extensive computational
experiments on two large-scale social network datasets.
| no_new_dataset | 0.949295 |
1506.00278 | Licheng Yu | Licheng Yu, Eunbyung Park, Alexander C. Berg, and Tamara L. Berg | Visual Madlibs: Fill in the blank Image Generation and Question
Answering | 10 pages; 8 figures; 4 tables | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we introduce a new dataset consisting of 360,001 focused
natural language descriptions for 10,738 images. This dataset, the Visual
Madlibs dataset, is collected using automatically produced fill-in-the-blank
templates designed to gather targeted descriptions about: people and objects,
their appearances, activities, and interactions, as well as inferences about
the general scene or its broader context. We provide several analyses of the
Visual Madlibs dataset and demonstrate its applicability to two new description
generation tasks: focused description generation, and multiple-choice
question-answering for images. Experiments using joint-embedding and deep
learning methods show promising results on these tasks.
| [
{
"version": "v1",
"created": "Sun, 31 May 2015 19:39:44 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Yu",
"Licheng",
""
],
[
"Park",
"Eunbyung",
""
],
[
"Berg",
"Alexander C.",
""
],
[
"Berg",
"Tamara L.",
""
]
] | TITLE: Visual Madlibs: Fill in the blank Image Generation and Question
Answering
ABSTRACT: In this paper, we introduce a new dataset consisting of 360,001 focused
natural language descriptions for 10,738 images. This dataset, the Visual
Madlibs dataset, is collected using automatically produced fill-in-the-blank
templates designed to gather targeted descriptions about: people and objects,
their appearances, activities, and interactions, as well as inferences about
the general scene or its broader context. We provide several analyses of the
Visual Madlibs dataset and demonstrate its applicability to two new description
generation tasks: focused description generation, and multiple-choice
question-answering for images. Experiments using joint-embedding and deep
learning methods show promising results on these tasks.
| new_dataset | 0.957873 |
1506.00323 | Anastasia Podosinnikova | Anastasia Podosinnikova, Simon Setzer, and Matthias Hein | Robust PCA: Optimization of the Robust Reconstruction Error over the
Stiefel Manifold | long version of GCPR 2014 paper | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known that Principal Component Analysis (PCA) is strongly affected
by outliers and a lot of effort has been put into robustification of PCA. In
this paper we present a new algorithm for robust PCA minimizing the trimmed
reconstruction error. By directly minimizing over the Stiefel manifold, we
avoid deflation as often used by projection pursuit methods. In distinction to
other methods for robust PCA, our method has no free parameter and is
computationally very efficient. We illustrate the performance on various
datasets including an application to background modeling and subtraction. Our
method performs better or similar to current state-of-the-art methods while
being faster.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 01:57:15 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Podosinnikova",
"Anastasia",
""
],
[
"Setzer",
"Simon",
""
],
[
"Hein",
"Matthias",
""
]
] | TITLE: Robust PCA: Optimization of the Robust Reconstruction Error over the
Stiefel Manifold
ABSTRACT: It is well known that Principal Component Analysis (PCA) is strongly affected
by outliers and a lot of effort has been put into robustification of PCA. In
this paper we present a new algorithm for robust PCA minimizing the trimmed
reconstruction error. By directly minimizing over the Stiefel manifold, we
avoid deflation as often used by projection pursuit methods. In distinction to
other methods for robust PCA, our method has no free parameter and is
computationally very efficient. We illustrate the performance on various
datasets including an application to background modeling and subtraction. Our
method performs better or similar to current state-of-the-art methods while
being faster.
| no_new_dataset | 0.951594 |
1506.00327 | Zhiguang Wang | Zhiguang Wang and Tim Oates | Imaging Time-Series to Improve Classification and Imputation | Accepted by IJCAI-2015 ML track | null | null | null | cs.LG cs.NE stat.ML | http://creativecommons.org/licenses/by/3.0/ | Inspired by recent successes of deep learning in computer vision, we propose
a novel framework for encoding time series as different types of images,
namely, Gramian Angular Summation/Difference Fields (GASF/GADF) and Markov
Transition Fields (MTF). This enables the use of techniques from computer
vision for time series classification and imputation. We used Tiled
Convolutional Neural Networks (tiled CNNs) on 20 standard datasets to learn
high-level features from the individual and compound GASF-GADF-MTF images. Our
approaches achieve highly competitive results when compared to nine of the
current best time series classification approaches. Inspired by the bijection
property of GASF on 0/1 rescaled data, we train Denoised Auto-encoders (DA) on
the GASF images of four standard and one synthesized compound dataset. The
imputation MSE on test data is reduced by 12.18%-48.02% when compared to using
the raw data. An analysis of the features and weights learned via tiled CNNs
and DAs explains why the approaches work.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 02:17:06 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Wang",
"Zhiguang",
""
],
[
"Oates",
"Tim",
""
]
] | TITLE: Imaging Time-Series to Improve Classification and Imputation
ABSTRACT: Inspired by recent successes of deep learning in computer vision, we propose
a novel framework for encoding time series as different types of images,
namely, Gramian Angular Summation/Difference Fields (GASF/GADF) and Markov
Transition Fields (MTF). This enables the use of techniques from computer
vision for time series classification and imputation. We used Tiled
Convolutional Neural Networks (tiled CNNs) on 20 standard datasets to learn
high-level features from the individual and compound GASF-GADF-MTF images. Our
approaches achieve highly competitive results when compared to nine of the
current best time series classification approaches. Inspired by the bijection
property of GASF on 0/1 rescaled data, we train Denoised Auto-encoders (DA) on
the GASF images of four standard and one synthesized compound dataset. The
imputation MSE on test data is reduced by 12.18%-48.02% when compared to using
the raw data. An analysis of the features and weights learned via tiled CNNs
and DAs explains why the approaches work.
| no_new_dataset | 0.940626 |
1506.00481 | Weilin Huang | Weilin Huang and Hujun Yin | Robust Face Recognition with Structural Binary Gradient Patterns | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a computationally efficient yet powerful binary framework
for robust facial representation based on image gradients. It is termed as
structural binary gradient patterns (SBGP). To discover underlying local
structures in the gradient domain, we compute image gradients from multiple
directions and simplify them into a set of binary strings. The SBGP is derived
from certain types of these binary strings that have meaningful local
structures and are capable of resembling fundamental textural information. They
detect micro orientational edges and possess strong orientation and locality
capabilities, thus enabling great discrimination. The SBGP also benefits from
the advantages of the gradient domain and exhibits profound robustness against
illumination variations. The binary strategy realized by pixel correlations in
a small neighborhood substantially simplifies the computational complexity and
achieves extremely efficient processing with only 0.0032s in Matlab for a
typical face image. Furthermore, the discrimination power of the SBGP can be
enhanced on a set of defined orientational image gradient magnitudes, further
enforcing locality and orientation. Results of extensive experiments on various
benchmark databases illustrate significant improvements of the SBGP based
representations over the existing state-of-the-art local descriptors in the
terms of discrimination, robustness and complexity. Codes for the SBGP methods
will be available at
http://www.eee.manchester.ac.uk/research/groups/sisp/software/.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 12:57:07 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Huang",
"Weilin",
""
],
[
"Yin",
"Hujun",
""
]
] | TITLE: Robust Face Recognition with Structural Binary Gradient Patterns
ABSTRACT: This paper presents a computationally efficient yet powerful binary framework
for robust facial representation based on image gradients. It is termed as
structural binary gradient patterns (SBGP). To discover underlying local
structures in the gradient domain, we compute image gradients from multiple
directions and simplify them into a set of binary strings. The SBGP is derived
from certain types of these binary strings that have meaningful local
structures and are capable of resembling fundamental textural information. They
detect micro orientational edges and possess strong orientation and locality
capabilities, thus enabling great discrimination. The SBGP also benefits from
the advantages of the gradient domain and exhibits profound robustness against
illumination variations. The binary strategy realized by pixel correlations in
a small neighborhood substantially simplifies the computational complexity and
achieves extremely efficient processing with only 0.0032s in Matlab for a
typical face image. Furthermore, the discrimination power of the SBGP can be
enhanced on a set of defined orientational image gradient magnitudes, further
enforcing locality and orientation. Results of extensive experiments on various
benchmark databases illustrate significant improvements of the SBGP based
representations over the existing state-of-the-art local descriptors in the
terms of discrimination, robustness and complexity. Codes for the SBGP methods
will be available at
http://www.eee.manchester.ac.uk/research/groups/sisp/software/.
| no_new_dataset | 0.943764 |
1506.00527 | Gianluigi Ciocca | Simone Bianco, Gianluigi Ciocca | User Preferences Modeling and Learning for Pleasing Photo Collage
Generation | To be published in ACM Transactions on Multimedia Computing,
Communications, and Applications (TOMM) | null | null | null | cs.MM cs.CV cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider how to automatically create pleasing photo collages
created by placing a set of images on a limited canvas area. The task is
formulated as an optimization problem. Differently from existing
state-of-the-art approaches, we here exploit subjective experiments to model
and learn pleasantness from user preferences. To this end, we design an
experimental framework for the identification of the criteria that need to be
taken into account to generate a pleasing photo collage. Five different
thematic photo datasets are used to create collages using state-of-the-art
criteria. A first subjective experiment where several subjects evaluated the
collages, emphasizes that different criteria are involved in the subjective
definition of pleasantness. We then identify new global and local criteria and
design algorithms to quantify them. The relative importance of these criteria
are automatically learned by exploiting the user preferences, and new collages
are generated. To validate our framework, we performed several psycho-visual
experiments involving different users. The results shows that the proposed
framework allows to learn a novel computational model which effectively encodes
an inter-user definition of pleasantness. The learned definition of
pleasantness generalizes well to new photo datasets of different themes and
sizes not used in the learning. Moreover, compared with two state of the art
approaches, the collages created using our framework are preferred by the
majority of the users.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 15:20:29 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Bianco",
"Simone",
""
],
[
"Ciocca",
"Gianluigi",
""
]
] | TITLE: User Preferences Modeling and Learning for Pleasing Photo Collage
Generation
ABSTRACT: In this paper we consider how to automatically create pleasing photo collages
created by placing a set of images on a limited canvas area. The task is
formulated as an optimization problem. Differently from existing
state-of-the-art approaches, we here exploit subjective experiments to model
and learn pleasantness from user preferences. To this end, we design an
experimental framework for the identification of the criteria that need to be
taken into account to generate a pleasing photo collage. Five different
thematic photo datasets are used to create collages using state-of-the-art
criteria. A first subjective experiment where several subjects evaluated the
collages, emphasizes that different criteria are involved in the subjective
definition of pleasantness. We then identify new global and local criteria and
design algorithms to quantify them. The relative importance of these criteria
are automatically learned by exploiting the user preferences, and new collages
are generated. To validate our framework, we performed several psycho-visual
experiments involving different users. The results shows that the proposed
framework allows to learn a novel computational model which effectively encodes
an inter-user definition of pleasantness. The learned definition of
pleasantness generalizes well to new photo datasets of different themes and
sizes not used in the learning. Moreover, compared with two state of the art
approaches, the collages created using our framework are preferred by the
majority of the users.
| no_new_dataset | 0.942029 |
1506.00528 | Liangliang Cao | Chang Wang, Liangliang Cao, Bowen Zhou | Medical Synonym Extraction with Concept Space Models | 7 pages, to appear in IJCAI 2015 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a novel approach for medical synonym extraction. We
aim to integrate the term embedding with the medical domain knowledge for
healthcare applications. One advantage of our method is that it is very
scalable. Experiments on a dataset with more than 1M term pairs show that the
proposed approach outperforms the baseline approaches by a large margin.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 15:21:00 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Wang",
"Chang",
""
],
[
"Cao",
"Liangliang",
""
],
[
"Zhou",
"Bowen",
""
]
] | TITLE: Medical Synonym Extraction with Concept Space Models
ABSTRACT: In this paper, we present a novel approach for medical synonym extraction. We
aim to integrate the term embedding with the medical domain knowledge for
healthcare applications. One advantage of our method is that it is very
scalable. Experiments on a dataset with more than 1M term pairs show that the
proposed approach outperforms the baseline approaches by a large margin.
| no_new_dataset | 0.940898 |
1506.00619 | Bart van Merri\"enboer | Bart van Merri\"enboer, Dzmitry Bahdanau, Vincent Dumoulin, Dmitriy
Serdyuk, David Warde-Farley, Jan Chorowski, Yoshua Bengio | Blocks and Fuel: Frameworks for deep learning | null | null | null | null | cs.LG cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce two Python frameworks to train neural networks on large
datasets: Blocks and Fuel. Blocks is based on Theano, a linear algebra compiler
with CUDA-support. It facilitates the training of complex neural network models
by providing parametrized Theano operations, attaching metadata to Theano's
symbolic computational graph, and providing an extensive set of utilities to
assist training the networks, e.g. training algorithms, logging, monitoring,
visualization, and serialization. Fuel provides a standard format for machine
learning datasets. It allows the user to easily iterate over large datasets,
performing many types of pre-processing on the fly.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 19:28:27 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"van Merriënboer",
"Bart",
""
],
[
"Bahdanau",
"Dzmitry",
""
],
[
"Dumoulin",
"Vincent",
""
],
[
"Serdyuk",
"Dmitriy",
""
],
[
"Warde-Farley",
"David",
""
],
[
"Chorowski",
"Jan",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Blocks and Fuel: Frameworks for deep learning
ABSTRACT: We introduce two Python frameworks to train neural networks on large
datasets: Blocks and Fuel. Blocks is based on Theano, a linear algebra compiler
with CUDA-support. It facilitates the training of complex neural network models
by providing parametrized Theano operations, attaching metadata to Theano's
symbolic computational graph, and providing an extensive set of utilities to
assist training the networks, e.g. training algorithms, logging, monitoring,
visualization, and serialization. Fuel provides a standard format for machine
learning datasets. It allows the user to easily iterate over large datasets,
performing many types of pre-processing on the fly.
| no_new_dataset | 0.94256 |
1411.0352 | Maxime Chevalier-Boisvert | Maxime Chevalier-Boisvert, Marc Feeley | Simple and Effective Type Check Removal through Lazy Basic Block
Versioning | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamically typed programming languages such as JavaScript and Python defer
type checking to run time. In order to maximize performance, dynamic language
VM implementations must attempt to eliminate redundant dynamic type checks.
However, type inference analyses are often costly and involve tradeoffs between
compilation time and resulting precision. This has lead to the creation of
increasingly complex multi-tiered VM architectures.
This paper introduces lazy basic block versioning, a simple JIT compilation
technique which effectively removes redundant type checks from critical code
paths. This novel approach lazily generates type-specialized versions of basic
blocks on-the-fly while propagating context-dependent type information. This
does not require the use of costly program analyses, is not restricted by the
precision limitations of traditional type analyses and avoids the
implementation complexity of speculative optimization techniques.
We have implemented intraprocedural lazy basic block versioning in a
JavaScript JIT compiler. This approach is compared with a classical flow-based
type analysis. Lazy basic block versioning performs as well or better on all
benchmarks. On average, 71% of type tests are eliminated, yielding speedups of
up to 50%. We also show that our implementation generates more efficient
machine code than TraceMonkey, a tracing JIT compiler for JavaScript, on
several benchmarks. The combination of implementation simplicity, low
algorithmic complexity and good run time performance makes basic block
versioning attractive for baseline JIT compilers.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2014 03:46:18 GMT"
},
{
"version": "v2",
"created": "Fri, 29 May 2015 18:06:07 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Chevalier-Boisvert",
"Maxime",
""
],
[
"Feeley",
"Marc",
""
]
] | TITLE: Simple and Effective Type Check Removal through Lazy Basic Block
Versioning
ABSTRACT: Dynamically typed programming languages such as JavaScript and Python defer
type checking to run time. In order to maximize performance, dynamic language
VM implementations must attempt to eliminate redundant dynamic type checks.
However, type inference analyses are often costly and involve tradeoffs between
compilation time and resulting precision. This has lead to the creation of
increasingly complex multi-tiered VM architectures.
This paper introduces lazy basic block versioning, a simple JIT compilation
technique which effectively removes redundant type checks from critical code
paths. This novel approach lazily generates type-specialized versions of basic
blocks on-the-fly while propagating context-dependent type information. This
does not require the use of costly program analyses, is not restricted by the
precision limitations of traditional type analyses and avoids the
implementation complexity of speculative optimization techniques.
We have implemented intraprocedural lazy basic block versioning in a
JavaScript JIT compiler. This approach is compared with a classical flow-based
type analysis. Lazy basic block versioning performs as well or better on all
benchmarks. On average, 71% of type tests are eliminated, yielding speedups of
up to 50%. We also show that our implementation generates more efficient
machine code than TraceMonkey, a tracing JIT compiler for JavaScript, on
several benchmarks. The combination of implementation simplicity, low
algorithmic complexity and good run time performance makes basic block
versioning attractive for baseline JIT compilers.
| no_new_dataset | 0.941868 |
1412.7259 | Dong Wang | Dong Wang and Xiaoyang Tan | Unsupervised Feature Learning with C-SVDDNet | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate the problem of learning feature representation
from unlabeled data using a single-layer K-means network. A K-means network
maps the input data into a feature representation by finding the nearest
centroid for each input point, which has attracted researchers' great attention
recently due to its simplicity, effectiveness, and scalability. However, one
drawback of this feature mapping is that it tends to be unreliable when the
training data contains noise. To address this issue, we propose a SVDD based
feature learning algorithm that describes the density and distribution of each
cluster from K-means with an SVDD ball for more robust feature representation.
For this purpose, we present a new SVDD algorithm called C-SVDD that centers
the SVDD ball towards the mode of local density of each cluster, and we show
that the objective of C-SVDD can be solved very efficiently as a linear
programming problem. Additionally, traditional unsupervised feature learning
methods usually take an average or sum of local representations to obtain
global representation which ignore spatial relationship among them. To use
spatial information we propose a global representation with a variant of SIFT
descriptor. The architecture is also extended with multiple receptive field
scales and multiple pooling sizes. Extensive experiments on several popular
object recognition benchmarks, such as STL-10, MINST, Holiday and Copydays
shows that the proposed C-SVDDNet method yields comparable or better
performance than that of the previous state of the art methods.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2014 05:56:50 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jan 2015 05:31:03 GMT"
},
{
"version": "v3",
"created": "Fri, 29 May 2015 09:50:54 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Wang",
"Dong",
""
],
[
"Tan",
"Xiaoyang",
""
]
] | TITLE: Unsupervised Feature Learning with C-SVDDNet
ABSTRACT: In this paper, we investigate the problem of learning feature representation
from unlabeled data using a single-layer K-means network. A K-means network
maps the input data into a feature representation by finding the nearest
centroid for each input point, which has attracted researchers' great attention
recently due to its simplicity, effectiveness, and scalability. However, one
drawback of this feature mapping is that it tends to be unreliable when the
training data contains noise. To address this issue, we propose a SVDD based
feature learning algorithm that describes the density and distribution of each
cluster from K-means with an SVDD ball for more robust feature representation.
For this purpose, we present a new SVDD algorithm called C-SVDD that centers
the SVDD ball towards the mode of local density of each cluster, and we show
that the objective of C-SVDD can be solved very efficiently as a linear
programming problem. Additionally, traditional unsupervised feature learning
methods usually take an average or sum of local representations to obtain
global representation which ignore spatial relationship among them. To use
spatial information we propose a global representation with a variant of SIFT
descriptor. The architecture is also extended with multiple receptive field
scales and multiple pooling sizes. Extensive experiments on several popular
object recognition benchmarks, such as STL-10, MINST, Holiday and Copydays
shows that the proposed C-SVDDNet method yields comparable or better
performance than that of the previous state of the art methods.
| no_new_dataset | 0.943608 |
1501.04870 | Luca Martino | J. Read, L. Martino, P. Olmos, D. Luengo | Scalable Multi-Output Label Prediction: From Classifier Chains to
Classifier Trellises | (accepted in Pattern Recognition) | Pattern Recognition, Volume 48, Issue 6, 2015, Pages 2096-2109 | 10.1016/j.patcog.2015.01.004 | null | stat.ML cs.CV cs.DS cs.LG stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-output inference tasks, such as multi-label classification, have become
increasingly important in recent years. A popular method for multi-label
classification is classifier chains, in which the predictions of individual
classifiers are cascaded along a chain, thus taking into account inter-label
dependencies and improving the overall performance. Several varieties of
classifier chain methods have been introduced, and many of them perform very
competitively across a wide range of benchmark datasets. However, scalability
limitations become apparent on larger datasets when modeling a fully-cascaded
chain. In particular, the methods' strategies for discovering and modeling a
good chain structure constitutes a mayor computational bottleneck. In this
paper, we present the classifier trellis (CT) method for scalable multi-label
classification. We compare CT with several recently proposed classifier chain
methods to show that it occupies an important niche: it is highly competitive
on standard multi-label problems, yet it can also scale up to thousands or even
tens of thousands of labels.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2015 16:33:40 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Read",
"J.",
""
],
[
"Martino",
"L.",
""
],
[
"Olmos",
"P.",
""
],
[
"Luengo",
"D.",
""
]
] | TITLE: Scalable Multi-Output Label Prediction: From Classifier Chains to
Classifier Trellises
ABSTRACT: Multi-output inference tasks, such as multi-label classification, have become
increasingly important in recent years. A popular method for multi-label
classification is classifier chains, in which the predictions of individual
classifiers are cascaded along a chain, thus taking into account inter-label
dependencies and improving the overall performance. Several varieties of
classifier chain methods have been introduced, and many of them perform very
competitively across a wide range of benchmark datasets. However, scalability
limitations become apparent on larger datasets when modeling a fully-cascaded
chain. In particular, the methods' strategies for discovering and modeling a
good chain structure constitutes a mayor computational bottleneck. In this
paper, we present the classifier trellis (CT) method for scalable multi-label
classification. We compare CT with several recently proposed classifier chain
methods to show that it occupies an important niche: it is highly competitive
on standard multi-label problems, yet it can also scale up to thousands or even
tens of thousands of labels.
| no_new_dataset | 0.946101 |
1505.07922 | Junshi Huang | Junshi Huang, Rogerio S. Feris, Qiang Chen, Shuicheng Yan | Cross-domain Image Retrieval with a Dual Attribute-aware Ranking Network | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of cross-domain image retrieval, considering the
following practical application: given a user photo depicting a clothing image,
our goal is to retrieve the same or attribute-similar clothing items from
online shopping stores. This is a challenging problem due to the large
discrepancy between online shopping images, usually taken in ideal
lighting/pose/background conditions, and user photos captured in uncontrolled
conditions. To address this problem, we propose a Dual Attribute-aware Ranking
Network (DARN) for retrieval feature learning. More specifically, DARN consists
of two sub-networks, one for each domain, whose retrieval feature
representations are driven by semantic attribute learning. We show that this
attribute-guided learning is a key factor for retrieval accuracy improvement.
In addition, to further align with the nature of the retrieval problem, we
impose a triplet visual similarity constraint for learning to rank across the
two sub-networks. Another contribution of our work is a large-scale dataset
which makes the network learning feasible. We exploit customer review websites
to crawl a large set of online shopping images and corresponding offline user
photos with fine-grained clothing attributes, i.e., around 450,000 online
shopping images and about 90,000 exact offline counterpart images of those
online ones. All these images are collected from real-world consumer websites
reflecting the diversity of the data modality, which makes this dataset unique
and rare in the academic community. We extensively evaluate the retrieval
performance of networks in different configurations. The top-20 retrieval
accuracy is doubled when using the proposed DARN other than the current popular
solution using pre-trained CNN features only (0.570 vs. 0.268).
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 04:46:37 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Huang",
"Junshi",
""
],
[
"Feris",
"Rogerio S.",
""
],
[
"Chen",
"Qiang",
""
],
[
"Yan",
"Shuicheng",
""
]
] | TITLE: Cross-domain Image Retrieval with a Dual Attribute-aware Ranking Network
ABSTRACT: We address the problem of cross-domain image retrieval, considering the
following practical application: given a user photo depicting a clothing image,
our goal is to retrieve the same or attribute-similar clothing items from
online shopping stores. This is a challenging problem due to the large
discrepancy between online shopping images, usually taken in ideal
lighting/pose/background conditions, and user photos captured in uncontrolled
conditions. To address this problem, we propose a Dual Attribute-aware Ranking
Network (DARN) for retrieval feature learning. More specifically, DARN consists
of two sub-networks, one for each domain, whose retrieval feature
representations are driven by semantic attribute learning. We show that this
attribute-guided learning is a key factor for retrieval accuracy improvement.
In addition, to further align with the nature of the retrieval problem, we
impose a triplet visual similarity constraint for learning to rank across the
two sub-networks. Another contribution of our work is a large-scale dataset
which makes the network learning feasible. We exploit customer review websites
to crawl a large set of online shopping images and corresponding offline user
photos with fine-grained clothing attributes, i.e., around 450,000 online
shopping images and about 90,000 exact offline counterpart images of those
online ones. All these images are collected from real-world consumer websites
reflecting the diversity of the data modality, which makes this dataset unique
and rare in the academic community. We extensively evaluate the retrieval
performance of networks in different configurations. The top-20 retrieval
accuracy is doubled when using the proposed DARN other than the current popular
solution using pre-trained CNN features only (0.570 vs. 0.268).
| no_new_dataset | 0.93784 |
1505.07930 | Tam Nguyen | Tam V. Nguyen, Jose Sepulveda | Salient Object Detection via Augmented Hypotheses | IJCAI 2015 paper | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | In this paper, we propose using \textit{augmented hypotheses} which consider
objectness, foreground and compactness for salient object detection. Our
algorithm consists of four basic steps. First, our method generates the
objectness map via objectness hypotheses. Based on the objectness map, we
estimate the foreground margin and compute the corresponding foreground map
which prefers the foreground objects. From the objectness map and the
foreground map, the compactness map is formed to favor the compact objects. We
then derive a saliency measure that produces a pixel-accurate saliency map
which uniformly covers the objects of interest and consistently separates fore-
and background. We finally evaluate the proposed framework on two challenging
datasets, MSRA-1000 and iCoSeg. Our extensive experimental results show that
our method outperforms state-of-the-art approaches.
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 06:03:57 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Nguyen",
"Tam V.",
""
],
[
"Sepulveda",
"Jose",
""
]
] | TITLE: Salient Object Detection via Augmented Hypotheses
ABSTRACT: In this paper, we propose using \textit{augmented hypotheses} which consider
objectness, foreground and compactness for salient object detection. Our
algorithm consists of four basic steps. First, our method generates the
objectness map via objectness hypotheses. Based on the objectness map, we
estimate the foreground margin and compute the corresponding foreground map
which prefers the foreground objects. From the objectness map and the
foreground map, the compactness map is formed to favor the compact objects. We
then derive a saliency measure that produces a pixel-accurate saliency map
which uniformly covers the objects of interest and consistently separates fore-
and background. We finally evaluate the proposed framework on two challenging
datasets, MSRA-1000 and iCoSeg. Our extensive experimental results show that
our method outperforms state-of-the-art approaches.
| no_new_dataset | 0.951997 |
1505.07931 | Xuefeng Yang | Xuefeng Yang, Kezhi Mao | Supervised Fine Tuning for Word Embedding with Integrated Knowledge | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning vector representation for words is an important research field which
may benefit many natural language processing tasks. Two limitations exist in
nearly all available models, which are the bias caused by the context
definition and the lack of knowledge utilization. They are difficult to tackle
because these algorithms are essentially unsupervised learning approaches.
Inspired by deep learning, the authors propose a supervised framework for
learning vector representation of words to provide additional supervised fine
tuning after unsupervised learning. The framework is knowledge rich approacher
and compatible with any numerical vectors word representation. The authors
perform both intrinsic evaluation like attributional and relational similarity
prediction and extrinsic evaluations like the sentence completion and sentiment
analysis. Experiments results on 6 embeddings and 4 tasks with 10 datasets show
that the proposed fine tuning framework may significantly improve the quality
of the vector representation of words.
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 06:11:00 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Yang",
"Xuefeng",
""
],
[
"Mao",
"Kezhi",
""
]
] | TITLE: Supervised Fine Tuning for Word Embedding with Integrated Knowledge
ABSTRACT: Learning vector representation for words is an important research field which
may benefit many natural language processing tasks. Two limitations exist in
nearly all available models, which are the bias caused by the context
definition and the lack of knowledge utilization. They are difficult to tackle
because these algorithms are essentially unsupervised learning approaches.
Inspired by deep learning, the authors propose a supervised framework for
learning vector representation of words to provide additional supervised fine
tuning after unsupervised learning. The framework is knowledge rich approacher
and compatible with any numerical vectors word representation. The authors
perform both intrinsic evaluation like attributional and relational similarity
prediction and extrinsic evaluations like the sentence completion and sentiment
analysis. Experiments results on 6 embeddings and 4 tasks with 10 datasets show
that the proposed fine tuning framework may significantly improve the quality
of the vector representation of words.
| no_new_dataset | 0.948822 |
1505.07987 | Thomas Gransden | Thomas Gransden and Neil Walkinshaw and Rajeev Raman | SEPIA: Search for Proofs Using Inferred Automata | To appear at 25th International Conference on Automated Deduction | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes SEPIA, a tool for automated proof generation in Coq.
SEPIA combines model inference with interactive theorem proving. Existing proof
corpora are modelled using state-based models inferred from tactic sequences.
These can then be traversed automatically to identify proofs. The SEPIA system
is described and its performance evaluated on three Coq datasets. Our results
show that SEPIA provides a useful complement to existing automated tactics in
Coq.
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 10:39:44 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Gransden",
"Thomas",
""
],
[
"Walkinshaw",
"Neil",
""
],
[
"Raman",
"Rajeev",
""
]
] | TITLE: SEPIA: Search for Proofs Using Inferred Automata
ABSTRACT: This paper describes SEPIA, a tool for automated proof generation in Coq.
SEPIA combines model inference with interactive theorem proving. Existing proof
corpora are modelled using state-based models inferred from tactic sequences.
These can then be traversed automatically to identify proofs. The SEPIA system
is described and its performance evaluated on three Coq datasets. Our results
show that SEPIA provides a useful complement to existing automated tactics in
Coq.
| no_new_dataset | 0.94474 |
1110.3649 | Yaron Lipman | D. Boyer and Y. Lipman and E. St. Clair and J. Puente and T.
Funkhouser and B. Patel and J. Jernvall and I. Daubechies | Algorithms to automatically quantify the geometric similarity of
anatomical surfaces | Changes with respect to v1, v2: an Erratum was added, correcting the
references for one of the three datasets. Note that the datasets and code for
this paper can be obtained from the Data Conservancy (see Download column on
v1, v2) | PNAS 2011 108 (45) 18221-18226 | 10.1073/pnas.1112822108 | null | math.NA cs.CV cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe new approaches for distances between pairs of 2-dimensional
surfaces (embedded in 3-dimensional space) that use local structures and global
information contained in inter-structure geometric relationships. We present
algorithms to automatically determine these distances as well as geometric
correspondences. This is motivated by the aspiration of students of natural
science to understand the continuity of form that unites the diversity of life.
At present, scientists using physical traits to study evolutionary
relationships among living and extinct animals analyze data extracted from
carefully defined anatomical correspondence points (landmarks). Identifying and
recording these landmarks is time consuming and can be done accurately only by
trained morphologists. This renders these studies inaccessible to
non-morphologists, and causes phenomics to lag behind genomics in elucidating
evolutionary patterns. Unlike other algorithms presented for morphological
correspondences our approach does not require any preliminary marking of
special features or landmarks by the user. It also differs from other seminal
work in computational geometry in that our algorithms are polynomial in nature
and thus faster, making pairwise comparisons feasible for significantly larger
numbers of digitized surfaces. We illustrate our approach using three datasets
representing teeth and different bones of primates and humans, and show that it
leads to highly accurate results.
| [
{
"version": "v1",
"created": "Mon, 17 Oct 2011 12:23:30 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Oct 2011 09:16:12 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Mar 2012 13:36:16 GMT"
}
] | 2015-05-30T00:00:00 | [
[
"Boyer",
"D.",
""
],
[
"Lipman",
"Y.",
""
],
[
"Clair",
"E. St.",
""
],
[
"Puente",
"J.",
""
],
[
"Funkhouser",
"T.",
""
],
[
"Patel",
"B.",
""
],
[
"Jernvall",
"J.",
""
],
[
"Daubechies",
"I.",
""
]
] | TITLE: Algorithms to automatically quantify the geometric similarity of
anatomical surfaces
ABSTRACT: We describe new approaches for distances between pairs of 2-dimensional
surfaces (embedded in 3-dimensional space) that use local structures and global
information contained in inter-structure geometric relationships. We present
algorithms to automatically determine these distances as well as geometric
correspondences. This is motivated by the aspiration of students of natural
science to understand the continuity of form that unites the diversity of life.
At present, scientists using physical traits to study evolutionary
relationships among living and extinct animals analyze data extracted from
carefully defined anatomical correspondence points (landmarks). Identifying and
recording these landmarks is time consuming and can be done accurately only by
trained morphologists. This renders these studies inaccessible to
non-morphologists, and causes phenomics to lag behind genomics in elucidating
evolutionary patterns. Unlike other algorithms presented for morphological
correspondences our approach does not require any preliminary marking of
special features or landmarks by the user. It also differs from other seminal
work in computational geometry in that our algorithms are polynomial in nature
and thus faster, making pairwise comparisons feasible for significantly larger
numbers of digitized surfaces. We illustrate our approach using three datasets
representing teeth and different bones of primates and humans, and show that it
leads to highly accurate results.
| no_new_dataset | 0.950824 |
1110.4784 | Matthieu Cristelli | Ilaria Bordino, Stefano Battiston, Guido Caldarelli, Matthieu
Cristelli, Antti Ukkonen, Ingmar Weber | Web search queries can predict stock market volumes | 29 pages, 11 figures, 11 tables + Supporting Information | null | 10.1371/journal.pone.0040014 | null | q-fin.ST cs.LG physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We live in a computerized and networked society where many of our actions
leave a digital trace and affect other people's actions. This has lead to the
emergence of a new data-driven research field: mathematical methods of computer
science, statistical physics and sociometry provide insights on a wide range of
disciplines ranging from social science to human mobility. A recent important
discovery is that query volumes (i.e., the number of requests submitted by
users to search engines on the www) can be used to track and, in some cases, to
anticipate the dynamics of social phenomena. Successful exemples include
unemployment levels, car and home sales, and epidemics spreading. Few recent
works applied this approach to stock prices and market sentiment. However, it
remains unclear if trends in financial markets can be anticipated by the
collective wisdom of on-line users on the web. Here we show that trading
volumes of stocks traded in NASDAQ-100 are correlated with the volumes of
queries related to the same stocks. In particular, query volumes anticipate in
many cases peaks of trading by one day or more. Our analysis is carried out on
a unique dataset of queries, submitted to an important web search engine, which
enable us to investigate also the user behavior. We show that the query volume
dynamics emerges from the collective but seemingly uncoordinated activity of
many users. These findings contribute to the debate on the identification of
early warnings of financial systemic risk, based on the activity of users of
the www.
| [
{
"version": "v1",
"created": "Fri, 21 Oct 2011 13:15:59 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Mar 2012 14:07:49 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Jun 2012 15:42:35 GMT"
}
] | 2015-05-30T00:00:00 | [
[
"Bordino",
"Ilaria",
""
],
[
"Battiston",
"Stefano",
""
],
[
"Caldarelli",
"Guido",
""
],
[
"Cristelli",
"Matthieu",
""
],
[
"Ukkonen",
"Antti",
""
],
[
"Weber",
"Ingmar",
""
]
] | TITLE: Web search queries can predict stock market volumes
ABSTRACT: We live in a computerized and networked society where many of our actions
leave a digital trace and affect other people's actions. This has lead to the
emergence of a new data-driven research field: mathematical methods of computer
science, statistical physics and sociometry provide insights on a wide range of
disciplines ranging from social science to human mobility. A recent important
discovery is that query volumes (i.e., the number of requests submitted by
users to search engines on the www) can be used to track and, in some cases, to
anticipate the dynamics of social phenomena. Successful exemples include
unemployment levels, car and home sales, and epidemics spreading. Few recent
works applied this approach to stock prices and market sentiment. However, it
remains unclear if trends in financial markets can be anticipated by the
collective wisdom of on-line users on the web. Here we show that trading
volumes of stocks traded in NASDAQ-100 are correlated with the volumes of
queries related to the same stocks. In particular, query volumes anticipate in
many cases peaks of trading by one day or more. Our analysis is carried out on
a unique dataset of queries, submitted to an important web search engine, which
enable us to investigate also the user behavior. We show that the query volume
dynamics emerges from the collective but seemingly uncoordinated activity of
many users. These findings contribute to the debate on the identification of
early warnings of financial systemic risk, based on the activity of users of
the www.
| new_dataset | 0.789071 |
1404.4888 | Isadora Nun Ms | Isadora Nun, Karim Pichara, Pavlos Protopapas, Dae-Won Kim | Supervised detection of anomalous light-curves in massive astronomical
catalogs | 16 pages, 18 figures, published in The Astrophysical Journal | 2014, ApJ, 793, 23 | 10.1088/0004-637X/793/1/23 | null | cs.CE astro-ph.IM cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The development of synoptic sky surveys has led to a massive amount of data
for which resources needed for analysis are beyond human capabilities. To
process this information and to extract all possible knowledge, machine
learning techniques become necessary. Here we present a new method to
automatically discover unknown variable objects in large astronomical catalogs.
With the aim of taking full advantage of all the information we have about
known objects, our method is based on a supervised algorithm. In particular, we
train a random forest classifier using known variability classes of objects and
obtain votes for each of the objects in the training set. We then model this
voting distribution with a Bayesian network and obtain the joint voting
distribution among the training objects. Consequently, an unknown object is
considered as an outlier insofar it has a low joint probability. Our method is
suitable for exploring massive datasets given that the training process is
performed offline. We tested our algorithm on 20 millions light-curves from the
MACHO catalog and generated a list of anomalous candidates. We divided the
candidates into two main classes of outliers: artifacts and intrinsic outliers.
Artifacts were principally due to air mass variation, seasonal variation, bad
calibration or instrumental errors and were consequently removed from our
outlier list and added to the training set. After retraining, we selected about
4000 objects, which we passed to a post analysis stage by perfoming a
cross-match with all publicly available catalogs. Within these candidates we
identified certain known but rare objects such as eclipsing Cepheids, blue
variables, cataclysmic variables and X-ray sources. For some outliers there
were no additional information. Among them we identified three unknown
variability types and few individual outliers that will be followed up for a
deeper analysis.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2014 21:12:13 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Sep 2014 15:50:49 GMT"
},
{
"version": "v3",
"created": "Wed, 27 May 2015 21:27:11 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Nun",
"Isadora",
""
],
[
"Pichara",
"Karim",
""
],
[
"Protopapas",
"Pavlos",
""
],
[
"Kim",
"Dae-Won",
""
]
] | TITLE: Supervised detection of anomalous light-curves in massive astronomical
catalogs
ABSTRACT: The development of synoptic sky surveys has led to a massive amount of data
for which resources needed for analysis are beyond human capabilities. To
process this information and to extract all possible knowledge, machine
learning techniques become necessary. Here we present a new method to
automatically discover unknown variable objects in large astronomical catalogs.
With the aim of taking full advantage of all the information we have about
known objects, our method is based on a supervised algorithm. In particular, we
train a random forest classifier using known variability classes of objects and
obtain votes for each of the objects in the training set. We then model this
voting distribution with a Bayesian network and obtain the joint voting
distribution among the training objects. Consequently, an unknown object is
considered as an outlier insofar it has a low joint probability. Our method is
suitable for exploring massive datasets given that the training process is
performed offline. We tested our algorithm on 20 millions light-curves from the
MACHO catalog and generated a list of anomalous candidates. We divided the
candidates into two main classes of outliers: artifacts and intrinsic outliers.
Artifacts were principally due to air mass variation, seasonal variation, bad
calibration or instrumental errors and were consequently removed from our
outlier list and added to the training set. After retraining, we selected about
4000 objects, which we passed to a post analysis stage by perfoming a
cross-match with all publicly available catalogs. Within these candidates we
identified certain known but rare objects such as eclipsing Cepheids, blue
variables, cataclysmic variables and X-ray sources. For some outliers there
were no additional information. Among them we identified three unknown
variability types and few individual outliers that will be followed up for a
deeper analysis.
| no_new_dataset | 0.942981 |
1410.3560 | Ryan Rossi | Ryan A. Rossi and Nesreen K. Ahmed | NetworkRepository: An Interactive Data Repository with Multi-scale
Visual Analytics | AAAI 2015 DT | null | null | null | cs.DL cs.HC cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network Repository (NR) is the first interactive data repository with a
web-based platform for visual interactive analytics. Unlike other data
repositories (e.g., UCI ML Data Repository, and SNAP), the network data
repository (networkrepository.com) allows users to not only download, but to
interactively analyze and visualize such data using our web-based interactive
graph analytics platform. Users can in real-time analyze, visualize, compare,
and explore data along many different dimensions. The aim of NR is to make it
easy to discover key insights into the data extremely fast with little effort
while also providing a medium for users to share data, visualizations, and
insights. Other key factors that differentiate NR from the current data
repositories is the number of graph datasets, their size, and variety. While
other data repositories are static, they also lack a means for users to
collaboratively discuss a particular dataset, corrections, or challenges with
using the data for certain applications. In contrast, we have incorporated many
social and collaborative aspects into NR in hopes of further facilitating
scientific research (e.g., users can discuss each graph, post observations,
visualizations, etc.).
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 03:35:37 GMT"
},
{
"version": "v2",
"created": "Thu, 28 May 2015 19:58:23 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Rossi",
"Ryan A.",
""
],
[
"Ahmed",
"Nesreen K.",
""
]
] | TITLE: NetworkRepository: An Interactive Data Repository with Multi-scale
Visual Analytics
ABSTRACT: Network Repository (NR) is the first interactive data repository with a
web-based platform for visual interactive analytics. Unlike other data
repositories (e.g., UCI ML Data Repository, and SNAP), the network data
repository (networkrepository.com) allows users to not only download, but to
interactively analyze and visualize such data using our web-based interactive
graph analytics platform. Users can in real-time analyze, visualize, compare,
and explore data along many different dimensions. The aim of NR is to make it
easy to discover key insights into the data extremely fast with little effort
while also providing a medium for users to share data, visualizations, and
insights. Other key factors that differentiate NR from the current data
repositories is the number of graph datasets, their size, and variety. While
other data repositories are static, they also lack a means for users to
collaboratively discuss a particular dataset, corrections, or challenges with
using the data for certain applications. In contrast, we have incorporated many
social and collaborative aspects into NR in hopes of further facilitating
scientific research (e.g., users can discuss each graph, post observations,
visualizations, etc.).
| no_new_dataset | 0.948394 |
1504.06662 | Arvind Neelakantan | Arvind Neelakantan, Benjamin Roth and Andrew McCallum | Compositional Vector Space Models for Knowledge Base Completion | The 53rd Annual Meeting of the Association for Computational
Linguistics and The 7th International Joint Conference of the Asian
Federation of Natural Language Processing, 2015 | null | null | null | cs.CL stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge base (KB) completion adds new facts to a KB by making inferences
from existing facts, for example by inferring with high likelihood
nationality(X,Y) from bornIn(X,Y). Most previous methods infer simple one-hop
relational synonyms like this, or use as evidence a multi-hop relational path
treated as an atomic feature, like bornIn(X,Z) -> containedIn(Z,Y). This paper
presents an approach that reasons about conjunctions of multi-hop relations
non-atomically, composing the implications of a path using a recursive neural
network (RNN) that takes as inputs vector embeddings of the binary relation in
the path. Not only does this allow us to generalize to paths unseen at training
time, but also, with a single high-capacity RNN, to predict new relation types
not seen when the compositional model was trained (zero-shot learning). We
assemble a new dataset of over 52M relational triples, and show that our method
improves over a traditional classifier by 11%, and a method leveraging
pre-trained embeddings by 7%.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 23:06:10 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2015 21:23:45 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Neelakantan",
"Arvind",
""
],
[
"Roth",
"Benjamin",
""
],
[
"McCallum",
"Andrew",
""
]
] | TITLE: Compositional Vector Space Models for Knowledge Base Completion
ABSTRACT: Knowledge base (KB) completion adds new facts to a KB by making inferences
from existing facts, for example by inferring with high likelihood
nationality(X,Y) from bornIn(X,Y). Most previous methods infer simple one-hop
relational synonyms like this, or use as evidence a multi-hop relational path
treated as an atomic feature, like bornIn(X,Z) -> containedIn(Z,Y). This paper
presents an approach that reasons about conjunctions of multi-hop relations
non-atomically, composing the implications of a path using a recursive neural
network (RNN) that takes as inputs vector embeddings of the binary relation in
the path. Not only does this allow us to generalize to paths unseen at training
time, but also, with a single high-capacity RNN, to predict new relation types
not seen when the compositional model was trained (zero-shot learning). We
assemble a new dataset of over 52M relational triples, and show that our method
improves over a traditional classifier by 11%, and a method leveraging
pre-trained embeddings by 7%.
| new_dataset | 0.950457 |
1505.02137 | Mohamed Amer | Mohamed R. Amer, Behjat Siddiquie, Amir Tamrakar, David A. Salter,
Brian Lande, Darius Mehri and Ajay Divakaran | Human Social Interaction Modeling Using Temporal Deep Networks | null | null | null | null | cs.CY cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We present a novel approach to computational modeling of social interactions
based on modeling of essential social interaction predicates (ESIPs) such as
joint attention and entrainment. Based on sound social psychological theory and
methodology, we collect a new "Tower Game" dataset consisting of audio-visual
capture of dyadic interactions labeled with the ESIPs. We expect this dataset
to provide a new avenue for research in computational social interaction
modeling. We propose a novel joint Discriminative Conditional Restricted
Boltzmann Machine (DCRBM) model that combines a discriminative component with
the generative power of CRBMs. Such a combination enables us to uncover
actionable constituents of the ESIPs in two steps. First, we train the DCRBM
model on the labeled data and get accurate (76\%-49\% across various ESIPs)
detection of the predicates. Second, we exploit the generative capability of
DCRBMs to activate the trained model so as to generate the lower-level data
corresponding to the specific ESIP that closely matches the actual training
data (with mean square error 0.01-0.1 for generating 100 frames). We are thus
able to decompose the ESIPs into their constituent actionable behaviors. Such a
purely computational determination of how to establish an ESIP such as
engagement is unprecedented.
| [
{
"version": "v1",
"created": "Wed, 6 May 2015 18:17:56 GMT"
},
{
"version": "v2",
"created": "Thu, 28 May 2015 16:05:07 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Amer",
"Mohamed R.",
""
],
[
"Siddiquie",
"Behjat",
""
],
[
"Tamrakar",
"Amir",
""
],
[
"Salter",
"David A.",
""
],
[
"Lande",
"Brian",
""
],
[
"Mehri",
"Darius",
""
],
[
"Divakaran",
"Ajay",
""
]
] | TITLE: Human Social Interaction Modeling Using Temporal Deep Networks
ABSTRACT: We present a novel approach to computational modeling of social interactions
based on modeling of essential social interaction predicates (ESIPs) such as
joint attention and entrainment. Based on sound social psychological theory and
methodology, we collect a new "Tower Game" dataset consisting of audio-visual
capture of dyadic interactions labeled with the ESIPs. We expect this dataset
to provide a new avenue for research in computational social interaction
modeling. We propose a novel joint Discriminative Conditional Restricted
Boltzmann Machine (DCRBM) model that combines a discriminative component with
the generative power of CRBMs. Such a combination enables us to uncover
actionable constituents of the ESIPs in two steps. First, we train the DCRBM
model on the labeled data and get accurate (76\%-49\% across various ESIPs)
detection of the predicates. Second, we exploit the generative capability of
DCRBMs to activate the trained model so as to generate the lower-level data
corresponding to the specific ESIP that closely matches the actual training
data (with mean square error 0.01-0.1 for generating 100 frames). We are thus
able to decompose the ESIPs into their constituent actionable behaviors. Such a
purely computational determination of how to establish an ESIP such as
engagement is unprecedented.
| new_dataset | 0.959913 |
1505.07499 | Reza Shokri | Vincent Bindschaedler and Reza Shokri | Privacy through Fake yet Semantically Real Traces | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Camouflaging data by generating fake information is a well-known obfuscation
technique for protecting data privacy. In this paper, we focus on a very
sensitive and increasingly exposed type of data: location data. There are two
main scenarios in which fake traces are of extreme value to preserve location
privacy: publishing datasets of location trajectories, and using location-based
services. Despite advances in protecting (location) data privacy, there is no
quantitative method to evaluate how realistic a synthetic trace is, and how
much utility and privacy it provides in each scenario. Also, the lack of a
methodology to generate privacy-preserving fake traces is evident. In this
paper, we fill this gap and propose the first statistical metric and model to
generate fake location traces such that both the utility of data and the
privacy of users are preserved. We build upon the fact that, although
geographically they visit distinct locations, people have strongly semantically
similar mobility patterns, for example, their transition pattern across
activities (e.g., working, driving, staying at home) is similar. We define a
statistical metric and propose an algorithm that automatically discovers the
hidden semantic similarities between locations from a bag of real location
traces as seeds, without requiring any initial semantic annotations. We
guarantee that fake traces are geographically dissimilar to their seeds, so
they do not leak sensitive location information. We also protect contributors
to seed traces against membership attacks. Interleaving fake traces with mobile
users' traces is a prominent location privacy defense mechanism. We
quantitatively show the effectiveness of our methodology in protecting against
localization inference attacks while preserving utility of sharing/publishing
traces.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 21:48:59 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Bindschaedler",
"Vincent",
""
],
[
"Shokri",
"Reza",
""
]
] | TITLE: Privacy through Fake yet Semantically Real Traces
ABSTRACT: Camouflaging data by generating fake information is a well-known obfuscation
technique for protecting data privacy. In this paper, we focus on a very
sensitive and increasingly exposed type of data: location data. There are two
main scenarios in which fake traces are of extreme value to preserve location
privacy: publishing datasets of location trajectories, and using location-based
services. Despite advances in protecting (location) data privacy, there is no
quantitative method to evaluate how realistic a synthetic trace is, and how
much utility and privacy it provides in each scenario. Also, the lack of a
methodology to generate privacy-preserving fake traces is evident. In this
paper, we fill this gap and propose the first statistical metric and model to
generate fake location traces such that both the utility of data and the
privacy of users are preserved. We build upon the fact that, although
geographically they visit distinct locations, people have strongly semantically
similar mobility patterns, for example, their transition pattern across
activities (e.g., working, driving, staying at home) is similar. We define a
statistical metric and propose an algorithm that automatically discovers the
hidden semantic similarities between locations from a bag of real location
traces as seeds, without requiring any initial semantic annotations. We
guarantee that fake traces are geographically dissimilar to their seeds, so
they do not leak sensitive location information. We also protect contributors
to seed traces against membership attacks. Interleaving fake traces with mobile
users' traces is a prominent location privacy defense mechanism. We
quantitatively show the effectiveness of our methodology in protecting against
localization inference attacks while preserving utility of sharing/publishing
traces.
| no_new_dataset | 0.951459 |
1505.07690 | Remco Duits | Michiel Janssen, Remco Duits, Marcel Breeuwer | Invertible Orientation Scores of 3D Images | ssvm 2015 published version in LNCS contains a mistake (a switch
notation spherical angles) that is corrected in this arxiv version | null | null | null | math.NA cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The enhancement and detection of elongated structures in noisy image data is
relevant for many biomedical applications. To handle complex crossing
structures in 2D images, 2D orientation scores were introduced, which already
showed their use in a variety of applications. Here we extend this work to 3D
orientation scores. First, we construct the orientation score from a given
dataset, which is achieved by an invertible coherent state type of transform.
For this transformation we introduce 3D versions of the 2D cake-wavelets, which
are complex wavelets that can simultaneously detect oriented structures and
oriented edges. For efficient implementation of the different steps in the
wavelet creation we use a spherical harmonic transform. Finally, we show some
first results of practical applications of 3D orientation scores.
| [
{
"version": "v1",
"created": "Thu, 28 May 2015 13:52:41 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Janssen",
"Michiel",
""
],
[
"Duits",
"Remco",
""
],
[
"Breeuwer",
"Marcel",
""
]
] | TITLE: Invertible Orientation Scores of 3D Images
ABSTRACT: The enhancement and detection of elongated structures in noisy image data is
relevant for many biomedical applications. To handle complex crossing
structures in 2D images, 2D orientation scores were introduced, which already
showed their use in a variety of applications. Here we extend this work to 3D
orientation scores. First, we construct the orientation score from a given
dataset, which is achieved by an invertible coherent state type of transform.
For this transformation we introduce 3D versions of the 2D cake-wavelets, which
are complex wavelets that can simultaneously detect oriented structures and
oriented edges. For efficient implementation of the different steps in the
wavelet creation we use a spherical harmonic transform. Finally, we show some
first results of practical applications of 3D orientation scores.
| no_new_dataset | 0.946597 |
1505.07716 | Johannes Doerfert | Johannes Doerfert, Kevin Streit, Sebastian Hack and Zino Benaissa | Polly's Polyhedral Scheduling in the Presence of Reductions | Presented at the IMPACT15 workshop | null | null | null | cs.PL cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The polyhedral model provides a powerful mathematical abstraction to enable
effective optimization of loop nests with respect to a given optimization goal,
e.g., exploiting parallelism. Unexploited reduction properties are a frequent
reason for polyhedral optimizers to assume parallelism prohibiting dependences.
To our knowledge, no polyhedral loop optimizer available in any production
compiler provides support for reductions. In this paper, we show that
leveraging the parallelism of reductions can lead to a significant performance
increase. We give a precise, dependence based, definition of reductions and
discuss ways to extend polyhedral optimization to exploit the associativity and
commutativity of reduction computations. We have implemented a
reduction-enabled scheduling approach in the Polly polyhedral optimizer and
evaluate it on the standard Polybench 3.2 benchmark suite. We were able to
detect and model all 52 arithmetic reductions and achieve speedups up to
2.21$\times$ on a quad core machine by exploiting the multidimensional
reduction in the BiCG benchmark.
| [
{
"version": "v1",
"created": "Thu, 28 May 2015 15:05:46 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Doerfert",
"Johannes",
""
],
[
"Streit",
"Kevin",
""
],
[
"Hack",
"Sebastian",
""
],
[
"Benaissa",
"Zino",
""
]
] | TITLE: Polly's Polyhedral Scheduling in the Presence of Reductions
ABSTRACT: The polyhedral model provides a powerful mathematical abstraction to enable
effective optimization of loop nests with respect to a given optimization goal,
e.g., exploiting parallelism. Unexploited reduction properties are a frequent
reason for polyhedral optimizers to assume parallelism prohibiting dependences.
To our knowledge, no polyhedral loop optimizer available in any production
compiler provides support for reductions. In this paper, we show that
leveraging the parallelism of reductions can lead to a significant performance
increase. We give a precise, dependence based, definition of reductions and
discuss ways to extend polyhedral optimization to exploit the associativity and
commutativity of reduction computations. We have implemented a
reduction-enabled scheduling approach in the Polly polyhedral optimizer and
evaluate it on the standard Polybench 3.2 benchmark suite. We were able to
detect and model all 52 arithmetic reductions and achieve speedups up to
2.21$\times$ on a quad core machine by exploiting the multidimensional
reduction in the BiCG benchmark.
| no_new_dataset | 0.942348 |
1104.5578 | Conrad Lee | Conrad Lee, Fergal Reid, Aaron McDaid, Neil Hurley | Seeding for pervasively overlapping communities | 8 Pages | null | 10.1103/PhysRevE.83.066107 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In some social and biological networks, the majority of nodes belong to
multiple communities. It has recently been shown that a number of the
algorithms that are designed to detect overlapping communities do not perform
well in such highly overlapping settings. Here, we consider one class of these
algorithms, those which optimize a local fitness measure, typically by using a
greedy heuristic to expand a seed into a community. We perform synthetic
benchmarks which indicate that an appropriate seeding strategy becomes
increasingly important as the extent of community overlap increases. We find
that distinct cliques provide the best seeds. We find further support for this
seeding strategy with benchmarks on a Facebook network and the yeast
interactome.
| [
{
"version": "v1",
"created": "Fri, 29 Apr 2011 09:21:33 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Lee",
"Conrad",
""
],
[
"Reid",
"Fergal",
""
],
[
"McDaid",
"Aaron",
""
],
[
"Hurley",
"Neil",
""
]
] | TITLE: Seeding for pervasively overlapping communities
ABSTRACT: In some social and biological networks, the majority of nodes belong to
multiple communities. It has recently been shown that a number of the
algorithms that are designed to detect overlapping communities do not perform
well in such highly overlapping settings. Here, we consider one class of these
algorithms, those which optimize a local fitness measure, typically by using a
greedy heuristic to expand a seed into a community. We perform synthetic
benchmarks which indicate that an appropriate seeding strategy becomes
increasingly important as the extent of community overlap increases. We find
that distinct cliques provide the best seeds. We find further support for this
seeding strategy with benchmarks on a Facebook network and the yeast
interactome.
| no_new_dataset | 0.950549 |
1105.0819 | Pierpaolo Vivo | Simone Pigolotti, Sebastian Bernhardsson, Jeppe Juul, Gorm Galster,
Pierpaolo Vivo | Equilibrium strategy and population-size effects in lowest unique bid
auctions | 6 pag. - 7 figs - added Supplementary Material. Changed affiliations.
Published version | Phys. Rev. Lett. 108, 088701 (2012) | 10.1103/PhysRevLett.108.088701 | null | cs.GT physics.soc-ph q-fin.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In lowest unique bid auctions, $N$ players bid for an item. The winner is
whoever places the \emph{lowest} bid, provided that it is also unique. We use a
grand canonical approach to derive an analytical expression for the equilibrium
distribution of strategies. We then study the properties of the solution as a
function of the mean number of players, and compare them with a large dataset
of internet auctions. The theory agrees with the data with striking accuracy
for small population size $N$, while for larger $N$ a qualitatively different
distribution is observed. We interpret this result as the emergence of two
different regimes, one in which adaptation is feasible and one in which it is
not. Our results question the actual possibility of a large population to adapt
and find the optimal strategy when participating in a collective game.
| [
{
"version": "v1",
"created": "Sat, 30 Apr 2011 10:09:03 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Dec 2011 12:15:39 GMT"
},
{
"version": "v3",
"created": "Sat, 25 Feb 2012 15:03:56 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Pigolotti",
"Simone",
""
],
[
"Bernhardsson",
"Sebastian",
""
],
[
"Juul",
"Jeppe",
""
],
[
"Galster",
"Gorm",
""
],
[
"Vivo",
"Pierpaolo",
""
]
] | TITLE: Equilibrium strategy and population-size effects in lowest unique bid
auctions
ABSTRACT: In lowest unique bid auctions, $N$ players bid for an item. The winner is
whoever places the \emph{lowest} bid, provided that it is also unique. We use a
grand canonical approach to derive an analytical expression for the equilibrium
distribution of strategies. We then study the properties of the solution as a
function of the mean number of players, and compare them with a large dataset
of internet auctions. The theory agrees with the data with striking accuracy
for small population size $N$, while for larger $N$ a qualitatively different
distribution is observed. We interpret this result as the emergence of two
different regimes, one in which adaptation is feasible and one in which it is
not. Our results question the actual possibility of a large population to adapt
and find the optimal strategy when participating in a collective game.
| no_new_dataset | 0.945951 |
1107.4218 | Maurizio Serva | Maurizio Serva | The settlement of Madagascar: what dialects and languages can tell | We find out the area and the modalities of the settlement of
Madagascar by Indonesian colonizers around 650 CE. Results are obtained
comparing 23 Malagasy dialects with Malay and Maanyan languages | null | 10.1371/journal.pone.0030666 | null | cs.CL q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dialects of Madagascar belong to the Greater Barito East group of the
Austronesian family and it is widely accepted that the Island was colonized by
Indonesian sailors after a maritime trek which probably took place around 650
CE. The language most closely related to Malagasy dialects is Maanyan but also
Malay is strongly related especially for what concerns navigation terms. Since
the Maanyan Dayaks live along the Barito river in Kalimantan (Borneo) and they
do not possess the necessary skill for long maritime navigation, probably they
were brought as subordinates by Malay sailors.
In a recent paper we compared 23 different Malagasy dialects in order to
determine the time and the landing area of the first colonization. In this
research we use new data and new methods to confirm that the landing took place
on the south-east coast of the Island. Furthermore, we are able to state here
that it is unlikely that there were multiple settlements and, therefore,
colonization consisted in a single founding event.
To reach our goal we find out the internal kinship relations among all the 23
Malagasy dialects and we also find out the different kinship degrees of the 23
dialects versus Malay and Maanyan. The method used is an automated version of
the lexicostatistic approach. The data concerning Madagascar were collected by
the author at the beginning of 2010 and consist of Swadesh lists of 200 items
for 23 dialects covering all areas of the Island. The lists for Maanyan and
Malay were obtained from published datasets integrated by author's interviews.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2011 10:02:31 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Serva",
"Maurizio",
""
]
] | TITLE: The settlement of Madagascar: what dialects and languages can tell
ABSTRACT: The dialects of Madagascar belong to the Greater Barito East group of the
Austronesian family and it is widely accepted that the Island was colonized by
Indonesian sailors after a maritime trek which probably took place around 650
CE. The language most closely related to Malagasy dialects is Maanyan but also
Malay is strongly related especially for what concerns navigation terms. Since
the Maanyan Dayaks live along the Barito river in Kalimantan (Borneo) and they
do not possess the necessary skill for long maritime navigation, probably they
were brought as subordinates by Malay sailors.
In a recent paper we compared 23 different Malagasy dialects in order to
determine the time and the landing area of the first colonization. In this
research we use new data and new methods to confirm that the landing took place
on the south-east coast of the Island. Furthermore, we are able to state here
that it is unlikely that there were multiple settlements and, therefore,
colonization consisted in a single founding event.
To reach our goal we find out the internal kinship relations among all the 23
Malagasy dialects and we also find out the different kinship degrees of the 23
dialects versus Malay and Maanyan. The method used is an automated version of
the lexicostatistic approach. The data concerning Madagascar were collected by
the author at the beginning of 2010 and consist of Swadesh lists of 200 items
for 23 dialects covering all areas of the Island. The lists for Maanyan and
Malay were obtained from published datasets integrated by author's interviews.
| no_new_dataset | 0.883437 |
1412.5335 | Gr\'egoire Mesnil | Gr\'egoire Mesnil, Tomas Mikolov, Marc'Aurelio Ranzato, Yoshua Bengio | Ensemble of Generative and Discriminative Techniques for Sentiment
Analysis of Movie Reviews | null | null | null | null | cs.CL cs.IR cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sentiment analysis is a common task in natural language processing that aims
to detect polarity of a text document (typically a consumer review). In the
simplest settings, we discriminate only between positive and negative
sentiment, turning the task into a standard binary classification problem. We
compare several ma- chine learning approaches to this problem, and combine them
to achieve the best possible results. We show how to use for this task the
standard generative lan- guage models, which are slightly complementary to the
state of the art techniques. We achieve strong results on a well-known dataset
of IMDB movie reviews. Our results are easily reproducible, as we publish also
the code needed to repeat the experiments. This should simplify further advance
of the state of the art, as other researchers can combine their techniques with
ours with little effort.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2014 11:02:04 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 14:17:16 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Dec 2014 11:36:14 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Feb 2015 20:03:35 GMT"
},
{
"version": "v5",
"created": "Wed, 4 Feb 2015 05:17:55 GMT"
},
{
"version": "v6",
"created": "Thu, 16 Apr 2015 14:26:14 GMT"
},
{
"version": "v7",
"created": "Wed, 27 May 2015 06:40:09 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Mesnil",
"Grégoire",
""
],
[
"Mikolov",
"Tomas",
""
],
[
"Ranzato",
"Marc'Aurelio",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Ensemble of Generative and Discriminative Techniques for Sentiment
Analysis of Movie Reviews
ABSTRACT: Sentiment analysis is a common task in natural language processing that aims
to detect polarity of a text document (typically a consumer review). In the
simplest settings, we discriminate only between positive and negative
sentiment, turning the task into a standard binary classification problem. We
compare several ma- chine learning approaches to this problem, and combine them
to achieve the best possible results. We show how to use for this task the
standard generative lan- guage models, which are slightly complementary to the
state of the art techniques. We achieve strong results on a well-known dataset
of IMDB movie reviews. Our results are easily reproducible, as we publish also
the code needed to repeat the experiments. This should simplify further advance
of the state of the art, as other researchers can combine their techniques with
ours with little effort.
| no_new_dataset | 0.948585 |
1502.02791 | Mingsheng Long | Mingsheng Long, Yue Cao, Jianmin Wang, Michael I. Jordan | Learning Transferable Features with Deep Adaptation Networks | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent studies reveal that a deep neural network can learn transferable
features which generalize well to novel tasks for domain adaptation. However,
as deep features eventually transition from general to specific along the
network, the feature transferability drops significantly in higher layers with
increasing domain discrepancy. Hence, it is important to formally reduce the
dataset bias and enhance the transferability in task-specific layers. In this
paper, we propose a new Deep Adaptation Network (DAN) architecture, which
generalizes deep convolutional neural network to the domain adaptation
scenario. In DAN, hidden representations of all task-specific layers are
embedded in a reproducing kernel Hilbert space where the mean embeddings of
different domain distributions can be explicitly matched. The domain
discrepancy is further reduced using an optimal multi-kernel selection method
for mean embedding matching. DAN can learn transferable features with
statistical guarantees, and can scale linearly by unbiased estimate of kernel
embedding. Extensive empirical evidence shows that the proposed architecture
yields state-of-the-art image classification error rates on standard domain
adaptation benchmarks.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 06:01:30 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2015 05:28:35 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Long",
"Mingsheng",
""
],
[
"Cao",
"Yue",
""
],
[
"Wang",
"Jianmin",
""
],
[
"Jordan",
"Michael I.",
""
]
] | TITLE: Learning Transferable Features with Deep Adaptation Networks
ABSTRACT: Recent studies reveal that a deep neural network can learn transferable
features which generalize well to novel tasks for domain adaptation. However,
as deep features eventually transition from general to specific along the
network, the feature transferability drops significantly in higher layers with
increasing domain discrepancy. Hence, it is important to formally reduce the
dataset bias and enhance the transferability in task-specific layers. In this
paper, we propose a new Deep Adaptation Network (DAN) architecture, which
generalizes deep convolutional neural network to the domain adaptation
scenario. In DAN, hidden representations of all task-specific layers are
embedded in a reproducing kernel Hilbert space where the mean embeddings of
different domain distributions can be explicitly matched. The domain
discrepancy is further reduced using an optimal multi-kernel selection method
for mean embedding matching. DAN can learn transferable features with
statistical guarantees, and can scale linearly by unbiased estimate of kernel
embedding. Extensive empirical evidence shows that the proposed architecture
yields state-of-the-art image classification error rates on standard domain
adaptation benchmarks.
| no_new_dataset | 0.94699 |
1505.07130 | Kemele M. Endris | Kemele M. Endris, Sidra Faisal, Fabrizio Orlandi, S\"oren Auer, Simon
Scerri | Interest-based RDF Update Propagation | 16 pages, Keywords: Change Propagation, Dataset Dynamics, Linked
Data, Replication | null | null | null | cs.DC cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many LOD datasets, such as DBpedia and LinkedGeoData, are voluminous and
process large amounts of requests from diverse applications. Many data products
and services rely on full or partial local LOD replications to ensure faster
querying and processing. While such replicas enhance the flexibility of
information sharing and integration infrastructures, they also introduce data
duplication with all the associated undesirable consequences. Given the
evolving nature of the original and authoritative datasets, to ensure
consistent and up-to-date replicas frequent replacements are required at a
great cost. In this paper, we introduce an approach for interest-based RDF
update propagation, which propagates only interesting parts of updates from the
source to the target dataset. Effectively, this enables remote applications to
`subscribe' to relevant datasets and consistently reflect the necessary changes
locally without the need to frequently replace the entire dataset (or a
relevant subset). Our approach is based on a formal definition for
graph-pattern-based interest expressions that is used to filter interesting
parts of updates from the source. We implement the approach in the iRap
framework and perform a comprehensive evaluation based on DBpedia Live updates,
to confirm the validity and value of our approach.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 20:36:42 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Endris",
"Kemele M.",
""
],
[
"Faisal",
"Sidra",
""
],
[
"Orlandi",
"Fabrizio",
""
],
[
"Auer",
"Sören",
""
],
[
"Scerri",
"Simon",
""
]
] | TITLE: Interest-based RDF Update Propagation
ABSTRACT: Many LOD datasets, such as DBpedia and LinkedGeoData, are voluminous and
process large amounts of requests from diverse applications. Many data products
and services rely on full or partial local LOD replications to ensure faster
querying and processing. While such replicas enhance the flexibility of
information sharing and integration infrastructures, they also introduce data
duplication with all the associated undesirable consequences. Given the
evolving nature of the original and authoritative datasets, to ensure
consistent and up-to-date replicas frequent replacements are required at a
great cost. In this paper, we introduce an approach for interest-based RDF
update propagation, which propagates only interesting parts of updates from the
source to the target dataset. Effectively, this enables remote applications to
`subscribe' to relevant datasets and consistently reflect the necessary changes
locally without the need to frequently replace the entire dataset (or a
relevant subset). Our approach is based on a formal definition for
graph-pattern-based interest expressions that is used to filter interesting
parts of updates from the source. We implement the approach in the iRap
framework and perform a comprehensive evaluation based on DBpedia Live updates,
to confirm the validity and value of our approach.
| no_new_dataset | 0.951323 |
1505.07184 | Danushka Bollegala | Danushka Bollegala and Takanori Maehara and Ken-ichi Kawarabayashi | Unsupervised Cross-Domain Word Representation Learning | 53rd Annual Meeting of the Association for Computational Linguistics
and the 7th International Joint Conferences on Natural Language Processing of
the Asian Federation of Natural Language Processing | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Meaning of a word varies from one domain to another. Despite this important
domain dependence in word semantics, existing word representation learning
methods are bound to a single domain. Given a pair of
\emph{source}-\emph{target} domains, we propose an unsupervised method for
learning domain-specific word representations that accurately capture the
domain-specific aspects of word semantics. First, we select a subset of
frequent words that occur in both domains as \emph{pivots}. Next, we optimize
an objective function that enforces two constraints: (a) for both source and
target domain documents, pivots that appear in a document must accurately
predict the co-occurring non-pivots, and (b) word representations learnt for
pivots must be similar in the two domains. Moreover, we propose a method to
perform domain adaptation using the learnt word representations. Our proposed
method significantly outperforms competitive baselines including the
state-of-the-art domain-insensitive word representations, and reports best
sentiment classification accuracies for all domain-pairs in a benchmark
dataset.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 04:02:56 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Bollegala",
"Danushka",
""
],
[
"Maehara",
"Takanori",
""
],
[
"Kawarabayashi",
"Ken-ichi",
""
]
] | TITLE: Unsupervised Cross-Domain Word Representation Learning
ABSTRACT: Meaning of a word varies from one domain to another. Despite this important
domain dependence in word semantics, existing word representation learning
methods are bound to a single domain. Given a pair of
\emph{source}-\emph{target} domains, we propose an unsupervised method for
learning domain-specific word representations that accurately capture the
domain-specific aspects of word semantics. First, we select a subset of
frequent words that occur in both domains as \emph{pivots}. Next, we optimize
an objective function that enforces two constraints: (a) for both source and
target domain documents, pivots that appear in a document must accurately
predict the co-occurring non-pivots, and (b) word representations learnt for
pivots must be similar in the two domains. Moreover, we propose a method to
perform domain adaptation using the learnt word representations. Our proposed
method significantly outperforms competitive baselines including the
state-of-the-art domain-insensitive word representations, and reports best
sentiment classification accuracies for all domain-pairs in a benchmark
dataset.
| no_new_dataset | 0.945751 |
1505.07188 | Peng Liu | Peng Liu and Saeed Gazor and Il-Min Kim and Dong In Kim | Energy Harvesting Noncoherent Cooperative Communications | null | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper investigates simultaneous wireless information and power transfer
(SWIPT) in energy harvesting (EH) relay systems. Unlike existing SWIPT schemes
requiring the channel state information (CSI) for coherent information
delivery, we propose a noncoherent SWIPT framework for decode-and-forward (DF)
relay systems bypassing the need for CSI and consequently saving energy in the
network. The proposed SWIPT framework embraces power-splitting noncoherent DF
(PS-NcDF) and time-switching noncoherent DF (TS-NcDF) in a unified form, and
supports arbitrary M-ary noncoherent frequency-shift keying (FSK) and
differential phase-shift keying (DPSK). Exact (noncoherent) maximum-likelihood
detectors (MLDs) for PS-NcDF and TS-NcDF are developed in a unified form, which
involves integral evaluations yet serves as the optimum performance benchmark
for noncoherent SWIPT. To reduce the computational cost of the exact MLDs, we
also propose closed-form approximate MLDs achieving near-optimum performance,
thus serving as a practical solution for noncoherent SWIPT. Numerical results
demonstrate a performance tradeoff between the first and second hops through
the adjustment of time switching or power splitting parameters, whose optimal
values minimizing the symbol-error rate (SER) are strictly between 0 and 1. We
demonstrate that M-FSK results in a significant energy saving over M-DPSK for M
>= 8; thus M-FSK may be more suitable for EH relay systems.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 04:59:11 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Liu",
"Peng",
""
],
[
"Gazor",
"Saeed",
""
],
[
"Kim",
"Il-Min",
""
],
[
"Kim",
"Dong In",
""
]
] | TITLE: Energy Harvesting Noncoherent Cooperative Communications
ABSTRACT: This paper investigates simultaneous wireless information and power transfer
(SWIPT) in energy harvesting (EH) relay systems. Unlike existing SWIPT schemes
requiring the channel state information (CSI) for coherent information
delivery, we propose a noncoherent SWIPT framework for decode-and-forward (DF)
relay systems bypassing the need for CSI and consequently saving energy in the
network. The proposed SWIPT framework embraces power-splitting noncoherent DF
(PS-NcDF) and time-switching noncoherent DF (TS-NcDF) in a unified form, and
supports arbitrary M-ary noncoherent frequency-shift keying (FSK) and
differential phase-shift keying (DPSK). Exact (noncoherent) maximum-likelihood
detectors (MLDs) for PS-NcDF and TS-NcDF are developed in a unified form, which
involves integral evaluations yet serves as the optimum performance benchmark
for noncoherent SWIPT. To reduce the computational cost of the exact MLDs, we
also propose closed-form approximate MLDs achieving near-optimum performance,
thus serving as a practical solution for noncoherent SWIPT. Numerical results
demonstrate a performance tradeoff between the first and second hops through
the adjustment of time switching or power splitting parameters, whose optimal
values minimizing the symbol-error rate (SER) are strictly between 0 and 1. We
demonstrate that M-FSK results in a significant energy saving over M-DPSK for M
>= 8; thus M-FSK may be more suitable for EH relay systems.
| no_new_dataset | 0.947624 |
1505.07193 | Linyun Yu | Linyun Yu, Peng Cui, Fei Wang, Chaoming Song, Shiqiang Yang | From Micro to Macro: Uncovering and Predicting Information Cascading
Process with Behavioral Dynamics | 10 pages, 11 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cascades are ubiquitous in various network environments. How to predict these
cascades is highly nontrivial in several vital applications, such as viral
marketing, epidemic prevention and traffic management. Most previous works
mainly focus on predicting the final cascade sizes. As cascades are typical
dynamic processes, it is always interesting and important to predict the
cascade size at any time, or predict the time when a cascade will reach a
certain size (e.g. an threshold for outbreak). In this paper, we unify all
these tasks into a fundamental problem: cascading process prediction. That is,
given the early stage of a cascade, how to predict its cumulative cascade size
of any later time? For such a challenging problem, how to understand the micro
mechanism that drives and generates the macro phenomenons (i.e. cascading
proceese) is essential. Here we introduce behavioral dynamics as the micro
mechanism to describe the dynamic process of a node's neighbors get infected by
a cascade after this node get infected (i.e. one-hop subcascades). Through
data-driven analysis, we find out the common principles and patterns lying in
behavioral dynamics and propose a novel Networked Weibull Regression model for
behavioral dynamics modeling. After that we propose a novel method for
predicting cascading processes by effectively aggregating behavioral dynamics,
and propose a scalable solution to approximate the cascading process with a
theoretical guarantee. We extensively evaluate the proposed method on a large
scale social network dataset. The results demonstrate that the proposed method
can significantly outperform other state-of-the-art baselines in multiple tasks
including cascade size prediction, outbreak time prediction and cascading
process prediction.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 05:30:33 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Yu",
"Linyun",
""
],
[
"Cui",
"Peng",
""
],
[
"Wang",
"Fei",
""
],
[
"Song",
"Chaoming",
""
],
[
"Yang",
"Shiqiang",
""
]
] | TITLE: From Micro to Macro: Uncovering and Predicting Information Cascading
Process with Behavioral Dynamics
ABSTRACT: Cascades are ubiquitous in various network environments. How to predict these
cascades is highly nontrivial in several vital applications, such as viral
marketing, epidemic prevention and traffic management. Most previous works
mainly focus on predicting the final cascade sizes. As cascades are typical
dynamic processes, it is always interesting and important to predict the
cascade size at any time, or predict the time when a cascade will reach a
certain size (e.g. an threshold for outbreak). In this paper, we unify all
these tasks into a fundamental problem: cascading process prediction. That is,
given the early stage of a cascade, how to predict its cumulative cascade size
of any later time? For such a challenging problem, how to understand the micro
mechanism that drives and generates the macro phenomenons (i.e. cascading
proceese) is essential. Here we introduce behavioral dynamics as the micro
mechanism to describe the dynamic process of a node's neighbors get infected by
a cascade after this node get infected (i.e. one-hop subcascades). Through
data-driven analysis, we find out the common principles and patterns lying in
behavioral dynamics and propose a novel Networked Weibull Regression model for
behavioral dynamics modeling. After that we propose a novel method for
predicting cascading processes by effectively aggregating behavioral dynamics,
and propose a scalable solution to approximate the cascading process with a
theoretical guarantee. We extensively evaluate the proposed method on a large
scale social network dataset. The results demonstrate that the proposed method
can significantly outperform other state-of-the-art baselines in multiple tasks
including cascade size prediction, outbreak time prediction and cascading
process prediction.
| no_new_dataset | 0.947137 |
1505.07254 | Oliver Mason | Naoise Holohan, Doug Leith and Oliver Mason | Differentially Private Response Mechanisms on Categorical Data | null | null | null | null | cs.DM cs.CR math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study mechanisms for differential privacy on finite datasets. By deriving
\emph{sufficient sets} for differential privacy we obtain necessary and
sufficient conditions for differential privacy, a tight lower bound on the
maximal expected error of a discrete mechanism and a characterisation of the
optimal mechanism which minimises the maximal expected error within the class
of mechanisms considered.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 10:16:57 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Holohan",
"Naoise",
""
],
[
"Leith",
"Doug",
""
],
[
"Mason",
"Oliver",
""
]
] | TITLE: Differentially Private Response Mechanisms on Categorical Data
ABSTRACT: We study mechanisms for differential privacy on finite datasets. By deriving
\emph{sufficient sets} for differential privacy we obtain necessary and
sufficient conditions for differential privacy, a tight lower bound on the
maximal expected error of a discrete mechanism and a characterisation of the
optimal mechanism which minimises the maximal expected error within the class
of mechanisms considered.
| no_new_dataset | 0.940898 |
1505.07293 | Vijay Badrinarayanan | Vijay Badrinarayanan, Ankur Handa, Roberto Cipolla | SegNet: A Deep Convolutional Encoder-Decoder Architecture for Robust
Semantic Pixel-Wise Labelling | This version was first submitted to CVPR' 15 on November 14, 2014
with paper Id 1468. A similar architecture was proposed more recently on May
17, 2015, see http://arxiv.org/pdf/1505.04366.pdf | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel deep architecture, SegNet, for semantic pixel wise image
labelling. SegNet has several attractive properties; (i) it only requires
forward evaluation of a fully learnt function to obtain smooth label
predictions, (ii) with increasing depth, a larger context is considered for
pixel labelling which improves accuracy, and (iii) it is easy to visualise the
effect of feature activation(s) in the pixel label space at any depth. SegNet
is composed of a stack of encoders followed by a corresponding decoder stack
which feeds into a soft-max classification layer. The decoders help map low
resolution feature maps at the output of the encoder stack to full input image
size feature maps. This addresses an important drawback of recent deep learning
approaches which have adopted networks designed for object categorization for
pixel wise labelling. These methods lack a mechanism to map deep layer feature
maps to input dimensions. They resort to ad hoc methods to upsample features,
e.g. by replication. This results in noisy predictions and also restricts the
number of pooling layers in order to avoid too much upsampling and thus reduces
spatial context. SegNet overcomes these problems by learning to map encoder
outputs to image pixel labels. We test the performance of SegNet on outdoor RGB
scenes from CamVid, KITTI and indoor scenes from the NYU dataset. Our results
show that SegNet achieves state-of-the-art performance even without use of
additional cues such as depth, video frames or post-processing with CRF models.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 12:54:17 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Badrinarayanan",
"Vijay",
""
],
[
"Handa",
"Ankur",
""
],
[
"Cipolla",
"Roberto",
""
]
] | TITLE: SegNet: A Deep Convolutional Encoder-Decoder Architecture for Robust
Semantic Pixel-Wise Labelling
ABSTRACT: We propose a novel deep architecture, SegNet, for semantic pixel wise image
labelling. SegNet has several attractive properties; (i) it only requires
forward evaluation of a fully learnt function to obtain smooth label
predictions, (ii) with increasing depth, a larger context is considered for
pixel labelling which improves accuracy, and (iii) it is easy to visualise the
effect of feature activation(s) in the pixel label space at any depth. SegNet
is composed of a stack of encoders followed by a corresponding decoder stack
which feeds into a soft-max classification layer. The decoders help map low
resolution feature maps at the output of the encoder stack to full input image
size feature maps. This addresses an important drawback of recent deep learning
approaches which have adopted networks designed for object categorization for
pixel wise labelling. These methods lack a mechanism to map deep layer feature
maps to input dimensions. They resort to ad hoc methods to upsample features,
e.g. by replication. This results in noisy predictions and also restricts the
number of pooling layers in order to avoid too much upsampling and thus reduces
spatial context. SegNet overcomes these problems by learning to map encoder
outputs to image pixel labels. We test the performance of SegNet on outdoor RGB
scenes from CamVid, KITTI and indoor scenes from the NYU dataset. Our results
show that SegNet achieves state-of-the-art performance even without use of
additional cues such as depth, video frames or post-processing with CRF models.
| no_new_dataset | 0.945349 |
1505.07310 | Md. Iftekhar Tanveer | M. Iftekhar Tanveer | Use of Laplacian Projection Technique for Summarizing Likert Scale
Annotations | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Summarizing Likert scale ratings from human annotators is an important step
for collecting human judgments. In this project we study a novel, graph
theoretic method for this purpose. We also analyze a few interesting properties
for this approach using real annotation datasets.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 15:45:00 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Tanveer",
"M. Iftekhar",
""
]
] | TITLE: Use of Laplacian Projection Technique for Summarizing Likert Scale
Annotations
ABSTRACT: Summarizing Likert scale ratings from human annotators is an important step
for collecting human judgments. In this project we study a novel, graph
theoretic method for this purpose. We also analyze a few interesting properties
for this approach using real annotation datasets.
| no_new_dataset | 0.953013 |
1505.07428 | Manuel L\'opez-Antequera | Ruben Gomez-Ojeda, Manuel Lopez-Antequera, Nicolai Petkov, Javier
Gonzalez-Jimenez | Training a Convolutional Neural Network for Appearance-Invariant Place
Recognition | null | null | null | null | cs.CV cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Place recognition is one of the most challenging problems in computer vision,
and has become a key part in mobile robotics and autonomous driving
applications for performing loop closure in visual SLAM systems. Moreover, the
difficulty of recognizing a revisited location increases with appearance
changes caused, for instance, by weather or illumination variations, which
hinders the long-term application of such algorithms in real environments. In
this paper we present a convolutional neural network (CNN), trained for the
first time with the purpose of recognizing revisited locations under severe
appearance changes, which maps images to a low dimensional space where
Euclidean distances represent place dissimilarity. In order for the network to
learn the desired invariances, we train it with triplets of images selected
from datasets which present a challenging variability in visual appearance. The
triplets are selected in such way that two samples are from the same location
and the third one is taken from a different place. We validate our system
through extensive experimentation, where we demonstrate better performance than
state-of-art algorithms in a number of popular datasets.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 18:21:54 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Gomez-Ojeda",
"Ruben",
""
],
[
"Lopez-Antequera",
"Manuel",
""
],
[
"Petkov",
"Nicolai",
""
],
[
"Gonzalez-Jimenez",
"Javier",
""
]
] | TITLE: Training a Convolutional Neural Network for Appearance-Invariant Place
Recognition
ABSTRACT: Place recognition is one of the most challenging problems in computer vision,
and has become a key part in mobile robotics and autonomous driving
applications for performing loop closure in visual SLAM systems. Moreover, the
difficulty of recognizing a revisited location increases with appearance
changes caused, for instance, by weather or illumination variations, which
hinders the long-term application of such algorithms in real environments. In
this paper we present a convolutional neural network (CNN), trained for the
first time with the purpose of recognizing revisited locations under severe
appearance changes, which maps images to a low dimensional space where
Euclidean distances represent place dissimilarity. In order for the network to
learn the desired invariances, we train it with triplets of images selected
from datasets which present a challenging variability in visual appearance. The
triplets are selected in such way that two samples are from the same location
and the third one is taken from a different place. We validate our system
through extensive experimentation, where we demonstrate better performance than
state-of-art algorithms in a number of popular datasets.
| no_new_dataset | 0.954308 |
1101.4749 | Osman G\"unay | Osman Gunay and Behcet Ugur Toreyin and Kivanc Kose and A. Enis Cetin | Online Adaptive Decision Fusion Framework Based on Entropic Projections
onto Convex Sets with Application to Wildfire Detection in Video | 10 pages, 7 figures | null | 10.1117/1.3595426 | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, an Entropy functional based online Adaptive Decision Fusion
(EADF) framework is developed for image analysis and computer vision
applications. In this framework, it is assumed that the compound algorithm
consists of several sub-algorithms each of which yielding its own decision as a
real number centered around zero, representing the confidence level of that
particular sub-algorithm. Decision values are linearly combined with weights
which are updated online according to an active fusion method based on
performing entropic projections onto convex sets describing sub-algorithms. It
is assumed that there is an oracle, who is usually a human operator, providing
feedback to the decision fusion method. A video based wildfire detection system
is developed to evaluate the performance of the algorithm in handling the
problems where data arrives sequentially. In this case, the oracle is the
security guard of the forest lookout tower verifying the decision of the
combined algorithm. Simulation results are presented. The EADF framework is
also tested with a standard dataset.
| [
{
"version": "v1",
"created": "Tue, 25 Jan 2011 09:11:49 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Gunay",
"Osman",
""
],
[
"Toreyin",
"Behcet Ugur",
""
],
[
"Kose",
"Kivanc",
""
],
[
"Cetin",
"A. Enis",
""
]
] | TITLE: Online Adaptive Decision Fusion Framework Based on Entropic Projections
onto Convex Sets with Application to Wildfire Detection in Video
ABSTRACT: In this paper, an Entropy functional based online Adaptive Decision Fusion
(EADF) framework is developed for image analysis and computer vision
applications. In this framework, it is assumed that the compound algorithm
consists of several sub-algorithms each of which yielding its own decision as a
real number centered around zero, representing the confidence level of that
particular sub-algorithm. Decision values are linearly combined with weights
which are updated online according to an active fusion method based on
performing entropic projections onto convex sets describing sub-algorithms. It
is assumed that there is an oracle, who is usually a human operator, providing
feedback to the decision fusion method. A video based wildfire detection system
is developed to evaluate the performance of the algorithm in handling the
problems where data arrives sequentially. In this case, the oracle is the
security guard of the forest lookout tower verifying the decision of the
combined algorithm. Simulation results are presented. The EADF framework is
also tested with a standard dataset.
| no_new_dataset | 0.946646 |
1102.3260 | Simona Cocco | Simona Cocco (LPS), R\'emi Monasson (LPTENS) | Adaptive Cluster Expansion for Inferring Boltzmann Machines with Noisy
Data | Accepted for publication in Physical Review Letters (2011) | null | 10.1103/PhysRevLett.106.090601 | null | physics.data-an cond-mat.stat-mech cs.LG q-bio.NC q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a procedure to infer the interactions among a set of binary
variables, based on their sampled frequencies and pairwise correlations. The
algorithm builds the clusters of variables contributing most to the entropy of
the inferred Ising model, and rejects the small contributions due to the
sampling noise. Our procedure successfully recovers benchmark Ising models even
at criticality and in the low temperature phase, and is applied to
neurobiological data.
| [
{
"version": "v1",
"created": "Wed, 16 Feb 2011 08:15:42 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Cocco",
"Simona",
"",
"LPS"
],
[
"Monasson",
"Rémi",
"",
"LPTENS"
]
] | TITLE: Adaptive Cluster Expansion for Inferring Boltzmann Machines with Noisy
Data
ABSTRACT: We introduce a procedure to infer the interactions among a set of binary
variables, based on their sampled frequencies and pairwise correlations. The
algorithm builds the clusters of variables contributing most to the entropy of
the inferred Ising model, and rejects the small contributions due to the
sampling noise. Our procedure successfully recovers benchmark Ising models even
at criticality and in the low temperature phase, and is applied to
neurobiological data.
| no_new_dataset | 0.950411 |
1103.3397 | Gergely Tib\'ely | Gergely Tib\'ely | Criterions for locally dense subgraphs | Revised version. 26 pages, 8 figures, 1 table | null | 10.1016/j.physa.2011.09.040 | null | physics.soc-ph cs.SI physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Community detection is one of the most investigated problems in the field of
complex networks. Although several methods were proposed, there is still no
precise definition of communities. As a step towards a definition, I highlight
two necessary properties of communities, separation and internal cohesion, the
latter being a new concept. I propose a local method of community detection
based on two-dimensional local optimization, which I tested on common
benchmarks and on the word association database.
| [
{
"version": "v1",
"created": "Thu, 17 Mar 2011 12:48:40 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Aug 2011 22:08:22 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Aug 2011 09:35:30 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Tibély",
"Gergely",
""
]
] | TITLE: Criterions for locally dense subgraphs
ABSTRACT: Community detection is one of the most investigated problems in the field of
complex networks. Although several methods were proposed, there is still no
precise definition of communities. As a step towards a definition, I highlight
two necessary properties of communities, separation and internal cohesion, the
latter being a new concept. I propose a local method of community detection
based on two-dimensional local optimization, which I tested on common
benchmarks and on the word association database.
| no_new_dataset | 0.949482 |
1103.5479 | Deanna Needell | Yonina C. Eldar, Deanna Needell, Yaniv Plan | Unicity conditions for low-rank matrix recovery | null | null | 10.1117/12.891933 | null | math.NA cs.IT cs.SY math.IT math.OC math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low-rank matrix recovery addresses the problem of recovering an unknown
low-rank matrix from few linear measurements. Nuclear-norm minimization is a
tractible approach with a recent surge of strong theoretical backing. Analagous
to the theory of compressed sensing, these results have required random
measurements. For example, m >= Cnr Gaussian measurements are sufficient to
recover any rank-r n x n matrix with high probability. In this paper we address
the theoretical question of how many measurements are needed via any method
whatsoever --- tractible or not. We show that for a family of random
measurement ensembles, m >= 4nr - 4r^2 measurements are sufficient to guarantee
that no rank-2r matrix lies in the null space of the measurement operator with
probability one. This is a necessary and sufficient condition to ensure uniform
recovery of all rank-r matrices by rank minimization. Furthermore, this value
of $m$ precisely matches the dimension of the manifold of all rank-2r matrices.
We also prove that for a fixed rank-r matrix, m >= 2nr - r^2 + 1 random
measurements are enough to guarantee recovery using rank minimization. These
results give a benchmark to which we may compare the efficacy of nuclear-norm
minimization.
| [
{
"version": "v1",
"created": "Mon, 28 Mar 2011 20:36:03 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Eldar",
"Yonina C.",
""
],
[
"Needell",
"Deanna",
""
],
[
"Plan",
"Yaniv",
""
]
] | TITLE: Unicity conditions for low-rank matrix recovery
ABSTRACT: Low-rank matrix recovery addresses the problem of recovering an unknown
low-rank matrix from few linear measurements. Nuclear-norm minimization is a
tractible approach with a recent surge of strong theoretical backing. Analagous
to the theory of compressed sensing, these results have required random
measurements. For example, m >= Cnr Gaussian measurements are sufficient to
recover any rank-r n x n matrix with high probability. In this paper we address
the theoretical question of how many measurements are needed via any method
whatsoever --- tractible or not. We show that for a family of random
measurement ensembles, m >= 4nr - 4r^2 measurements are sufficient to guarantee
that no rank-2r matrix lies in the null space of the measurement operator with
probability one. This is a necessary and sufficient condition to ensure uniform
recovery of all rank-r matrices by rank minimization. Furthermore, this value
of $m$ precisely matches the dimension of the manifold of all rank-2r matrices.
We also prove that for a fixed rank-r matrix, m >= 2nr - r^2 + 1 random
measurements are enough to guarantee recovery using rank minimization. These
results give a benchmark to which we may compare the efficacy of nuclear-norm
minimization.
| no_new_dataset | 0.951818 |
1104.4512 | Vassilis Kekatos | Pedro A. Forero, Vassilis Kekatos, Georgios B. Giannakis | Robust Clustering Using Outlier-Sparsity Regularization | Submitted to IEEE Trans. on PAMI | null | 10.1109/TSP.2012.2196696 | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Notwithstanding the popularity of conventional clustering algorithms such as
K-means and probabilistic clustering, their clustering results are sensitive to
the presence of outliers in the data. Even a few outliers can compromise the
ability of these algorithms to identify meaningful hidden structures rendering
their outcome unreliable. This paper develops robust clustering algorithms that
not only aim to cluster the data, but also to identify the outliers. The novel
approaches rely on the infrequent presence of outliers in the data which
translates to sparsity in a judiciously chosen domain. Capitalizing on the
sparsity in the outlier domain, outlier-aware robust K-means and probabilistic
clustering approaches are proposed. Their novelty lies on identifying outliers
while effecting sparsity in the outlier domain through carefully chosen
regularization. A block coordinate descent approach is developed to obtain
iterative algorithms with convergence guarantees and small excess computational
complexity with respect to their non-robust counterparts. Kernelized versions
of the robust clustering algorithms are also developed to efficiently handle
high-dimensional data, identify nonlinearly separable clusters, or even cluster
objects that are not represented by vectors. Numerical tests on both synthetic
and real datasets validate the performance and applicability of the novel
algorithms.
| [
{
"version": "v1",
"created": "Fri, 22 Apr 2011 22:01:14 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Forero",
"Pedro A.",
""
],
[
"Kekatos",
"Vassilis",
""
],
[
"Giannakis",
"Georgios B.",
""
]
] | TITLE: Robust Clustering Using Outlier-Sparsity Regularization
ABSTRACT: Notwithstanding the popularity of conventional clustering algorithms such as
K-means and probabilistic clustering, their clustering results are sensitive to
the presence of outliers in the data. Even a few outliers can compromise the
ability of these algorithms to identify meaningful hidden structures rendering
their outcome unreliable. This paper develops robust clustering algorithms that
not only aim to cluster the data, but also to identify the outliers. The novel
approaches rely on the infrequent presence of outliers in the data which
translates to sparsity in a judiciously chosen domain. Capitalizing on the
sparsity in the outlier domain, outlier-aware robust K-means and probabilistic
clustering approaches are proposed. Their novelty lies on identifying outliers
while effecting sparsity in the outlier domain through carefully chosen
regularization. A block coordinate descent approach is developed to obtain
iterative algorithms with convergence guarantees and small excess computational
complexity with respect to their non-robust counterparts. Kernelized versions
of the robust clustering algorithms are also developed to efficiently handle
high-dimensional data, identify nonlinearly separable clusters, or even cluster
objects that are not represented by vectors. Numerical tests on both synthetic
and real datasets validate the performance and applicability of the novel
algorithms.
| no_new_dataset | 0.951729 |
1410.4871 | Herwig Wendt | S\'ebastien Combrexelle, Herwig Wendt, Nicolas Dobigeon, Jean-Yves
Tourneret, Steve McLaughlin and Patrice Abry | Bayesian estimation of the multifractality parameter for image texture
using a Whittle approximation | null | IEEE T. Image Proces., vol. 24, no. 8, pp. 2540-2551, Aug. 2015 | 10.1109/TIP.2015.2426021 | null | physics.data-an cs.CV stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Texture characterization is a central element in many image processing
applications. Multifractal analysis is a useful signal and image processing
tool, yet, the accurate estimation of multifractal parameters for image texture
remains a challenge. This is due in the main to the fact that current
estimation procedures consist of performing linear regressions across frequency
scales of the two-dimensional (2D) dyadic wavelet transform, for which only a
few such scales are computable for images. The strongly non-Gaussian nature of
multifractal processes, combined with their complicated dependence structure,
makes it difficult to develop suitable models for parameter estimation. Here,
we propose a Bayesian procedure that addresses the difficulties in the
estimation of the multifractality parameter. The originality of the procedure
is threefold: The construction of a generic semi-parametric statistical model
for the logarithm of wavelet leaders; the formulation of Bayesian estimators
that are associated with this model and the set of parameter values admitted by
multifractal theory; the exploitation of a suitable Whittle approximation
within the Bayesian model which enables the otherwise infeasible evaluation of
the posterior distribution associated with the model. Performance is assessed
numerically for several 2D multifractal processes, for several image sizes and
a large range of process parameters. The procedure yields significant benefits
over current benchmark estimators in terms of estimation performance and
ability to discriminate between the two most commonly used classes of
multifractal process models. The gains in performance are particularly
pronounced for small image sizes, notably enabling for the first time the
analysis of image patches as small as 64x64 pixels.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2014 21:32:28 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Apr 2015 09:13:28 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Combrexelle",
"Sébastien",
""
],
[
"Wendt",
"Herwig",
""
],
[
"Dobigeon",
"Nicolas",
""
],
[
"Tourneret",
"Jean-Yves",
""
],
[
"McLaughlin",
"Steve",
""
],
[
"Abry",
"Patrice",
""
]
] | TITLE: Bayesian estimation of the multifractality parameter for image texture
using a Whittle approximation
ABSTRACT: Texture characterization is a central element in many image processing
applications. Multifractal analysis is a useful signal and image processing
tool, yet, the accurate estimation of multifractal parameters for image texture
remains a challenge. This is due in the main to the fact that current
estimation procedures consist of performing linear regressions across frequency
scales of the two-dimensional (2D) dyadic wavelet transform, for which only a
few such scales are computable for images. The strongly non-Gaussian nature of
multifractal processes, combined with their complicated dependence structure,
makes it difficult to develop suitable models for parameter estimation. Here,
we propose a Bayesian procedure that addresses the difficulties in the
estimation of the multifractality parameter. The originality of the procedure
is threefold: The construction of a generic semi-parametric statistical model
for the logarithm of wavelet leaders; the formulation of Bayesian estimators
that are associated with this model and the set of parameter values admitted by
multifractal theory; the exploitation of a suitable Whittle approximation
within the Bayesian model which enables the otherwise infeasible evaluation of
the posterior distribution associated with the model. Performance is assessed
numerically for several 2D multifractal processes, for several image sizes and
a large range of process parameters. The procedure yields significant benefits
over current benchmark estimators in terms of estimation performance and
ability to discriminate between the two most commonly used classes of
multifractal process models. The gains in performance are particularly
pronounced for small image sizes, notably enabling for the first time the
analysis of image patches as small as 64x64 pixels.
| no_new_dataset | 0.950503 |
1505.06751 | Ayad Ghany Ismaeel | Ayad Ghany Ismaeel, Raghad Zuhair Yousif | Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick
Propagation Network | 6 Pages, 9 figures, 2 Table | International Journal of Computer Science and Electronics
Engineering IJCSEE, Volume 3, Issue 2, 2015 | null | null | cs.CE | http://creativecommons.org/licenses/by/3.0/ | There is multiple databases contain datasets of TP53 gene and its tumor
protein P53 which believed to be involved in over 50% of human cancers cases,
these databases are rich as datasets covered all mutations caused diseases
(cancers), but they haven't efficient mining method can classify and diagnosis
mutations patient's then predict the cancer of that patient. This paper
proposed a novel mining of cancer via mutations because there is no mining
method before offers friendly, effective and flexible predict or diagnosis of
cancers via using whole common database of TP53 gene (tumor protein P53) as
dataset and selecting a minimum number of fields in training and testing quick
propagation algorithm which supporting this miming method. Simulating quick
propagation network for the train dataset shows results the Correlation
(0.9999), R-squared (0.9998) and mean of Absolute Relative Error (0.0029),
while the training for the ALL datasets (train, test and validation dataset)
have results the Correlation (0.9993), R-squared (0.9987) and mean of Absolute
Relative Error (0.0057).
| [
{
"version": "v1",
"created": "Wed, 20 May 2015 15:46:45 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Ismaeel",
"Ayad Ghany",
""
],
[
"Yousif",
"Raghad Zuhair",
""
]
] | TITLE: Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick
Propagation Network
ABSTRACT: There is multiple databases contain datasets of TP53 gene and its tumor
protein P53 which believed to be involved in over 50% of human cancers cases,
these databases are rich as datasets covered all mutations caused diseases
(cancers), but they haven't efficient mining method can classify and diagnosis
mutations patient's then predict the cancer of that patient. This paper
proposed a novel mining of cancer via mutations because there is no mining
method before offers friendly, effective and flexible predict or diagnosis of
cancers via using whole common database of TP53 gene (tumor protein P53) as
dataset and selecting a minimum number of fields in training and testing quick
propagation algorithm which supporting this miming method. Simulating quick
propagation network for the train dataset shows results the Correlation
(0.9999), R-squared (0.9998) and mean of Absolute Relative Error (0.0029),
while the training for the ALL datasets (train, test and validation dataset)
have results the Correlation (0.9993), R-squared (0.9987) and mean of Absolute
Relative Error (0.0057).
| no_new_dataset | 0.946051 |
1505.06800 | Baochang Zhang | Lei Wang, Baochang Zhang | Boosting-like Deep Learning For Pedestrian Detection | 9 pages,7 figures | null | null | null | cs.CV cs.LG cs.NE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper proposes boosting-like deep learning (BDL) framework for
pedestrian detection. Due to overtraining on the limited training samples,
overfitting is a major problem of deep learning. We incorporate a boosting-like
technique into deep learning to weigh the training samples, and thus prevent
overtraining in the iterative process. We theoretically give the details of
derivation of our algorithm, and report the experimental results on open data
sets showing that BDL achieves a better stable performance than the
state-of-the-arts. Our approach achieves 15.85% and 3.81% reduction in the
average miss rate compared with ACF and JointDeep on the largest Caltech
benchmark dataset, respectively.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 03:52:52 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Wang",
"Lei",
""
],
[
"Zhang",
"Baochang",
""
]
] | TITLE: Boosting-like Deep Learning For Pedestrian Detection
ABSTRACT: This paper proposes boosting-like deep learning (BDL) framework for
pedestrian detection. Due to overtraining on the limited training samples,
overfitting is a major problem of deep learning. We incorporate a boosting-like
technique into deep learning to weigh the training samples, and thus prevent
overtraining in the iterative process. We theoretically give the details of
derivation of our algorithm, and report the experimental results on open data
sets showing that BDL achieves a better stable performance than the
state-of-the-arts. Our approach achieves 15.85% and 3.81% reduction in the
average miss rate compared with ACF and JointDeep on the largest Caltech
benchmark dataset, respectively.
| no_new_dataset | 0.948917 |
1505.06812 | Purushottam Kar | Harikrishna Narasimhan and Purushottam Kar and Prateek Jain | Optimizing Non-decomposable Performance Measures: A Tale of Two Classes | To appear in proceedings of the 32nd International Conference on
Machine Learning (ICML 2015) | Journal of Machine Learning Research, W&CP 37 (2015) | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern classification problems frequently present mild to severe label
imbalance as well as specific requirements on classification characteristics,
and require optimizing performance measures that are non-decomposable over the
dataset, such as F-measure. Such measures have spurred much interest and pose
specific challenges to learning algorithms since their non-additive nature
precludes a direct application of well-studied large scale optimization methods
such as stochastic gradient descent.
In this paper we reveal that for two large families of performance measures
that can be expressed as functions of true positive/negative rates, it is
indeed possible to implement point stochastic updates. The families we consider
are concave and pseudo-linear functions of TPR, TNR which cover several
popularly used performance measures such as F-measure, G-mean and H-mean.
Our core contribution is an adaptive linearization scheme for these families,
using which we develop optimization techniques that enable truly point-based
stochastic updates. For concave performance measures we propose SPADE, a
stochastic primal dual solver; for pseudo-linear measures we propose STAMP, a
stochastic alternate maximization procedure. Both methods have crisp
convergence guarantees, demonstrate significant speedups over existing methods
- often by an order of magnitude or more, and give similar or more accurate
predictions on test data.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 05:59:33 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Narasimhan",
"Harikrishna",
""
],
[
"Kar",
"Purushottam",
""
],
[
"Jain",
"Prateek",
""
]
] | TITLE: Optimizing Non-decomposable Performance Measures: A Tale of Two Classes
ABSTRACT: Modern classification problems frequently present mild to severe label
imbalance as well as specific requirements on classification characteristics,
and require optimizing performance measures that are non-decomposable over the
dataset, such as F-measure. Such measures have spurred much interest and pose
specific challenges to learning algorithms since their non-additive nature
precludes a direct application of well-studied large scale optimization methods
such as stochastic gradient descent.
In this paper we reveal that for two large families of performance measures
that can be expressed as functions of true positive/negative rates, it is
indeed possible to implement point stochastic updates. The families we consider
are concave and pseudo-linear functions of TPR, TNR which cover several
popularly used performance measures such as F-measure, G-mean and H-mean.
Our core contribution is an adaptive linearization scheme for these families,
using which we develop optimization techniques that enable truly point-based
stochastic updates. For concave performance measures we propose SPADE, a
stochastic primal dual solver; for pseudo-linear measures we propose STAMP, a
stochastic alternate maximization procedure. Both methods have crisp
convergence guarantees, demonstrate significant speedups over existing methods
- often by an order of magnitude or more, and give similar or more accurate
predictions on test data.
| no_new_dataset | 0.941115 |
1505.06814 | Francesco Palmieri A. N. | Francesco A. N. Palmieri and Amedeo Buonanno | Discrete Independent Component Analysis (DICA) with Belief Propagation | Sumbitted for publication (May 2015) | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We apply belief propagation to a Bayesian bipartite graph composed of
discrete independent hidden variables and discrete visible variables. The
network is the Discrete counterpart of Independent Component Analysis (DICA)
and it is manipulated in a factor graph form for inference and learning. A full
set of simulations is reported for character images from the MNIST dataset. The
results show that the factorial code implemented by the sources contributes to
build a good generative model for the data that can be used in various
inference modes.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 06:02:05 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Palmieri",
"Francesco A. N.",
""
],
[
"Buonanno",
"Amedeo",
""
]
] | TITLE: Discrete Independent Component Analysis (DICA) with Belief Propagation
ABSTRACT: We apply belief propagation to a Bayesian bipartite graph composed of
discrete independent hidden variables and discrete visible variables. The
network is the Discrete counterpart of Independent Component Analysis (DICA)
and it is manipulated in a factor graph form for inference and learning. A full
set of simulations is reported for character images from the MNIST dataset. The
results show that the factorial code implemented by the sources contributes to
build a good generative model for the data that can be used in various
inference modes.
| no_new_dataset | 0.947381 |
1505.06872 | Wanling Gao | Wanling Gao, Chunjie Luo, Jianfeng Zhan, Hainan Ye, Xiwen He, Lei
Wang, Yuqing Zhu and Xinhui Tian | Identifying Dwarfs Workloads in Big Data Analytics | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Big data benchmarking is particularly important and provides applicable
yardsticks for evaluating booming big data systems. However, wide coverage and
great complexity of big data computing impose big challenges on big data
benchmarking. How can we construct a benchmark suite using a minimum set of
units of computation to represent diversity of big data analytics workloads?
Big data dwarfs are abstractions of extracting frequently appearing operations
in big data computing. One dwarf represents one unit of computation, and big
data workloads are decomposed into one or more dwarfs. Furthermore, dwarfs
workloads rather than vast real workloads are more cost-efficient and
representative to evaluate big data systems. In this paper, we extensively
investigate six most important or emerging application domains i.e. search
engine, social network, e-commerce, multimedia, bioinformatics and astronomy.
After analyzing forty representative algorithms, we single out eight dwarfs
workloads in big data analytics other than OLAP, which are linear algebra,
sampling, logic operations, transform operations, set operations, graph
operations, statistic operations and sort.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 09:38:08 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Gao",
"Wanling",
""
],
[
"Luo",
"Chunjie",
""
],
[
"Zhan",
"Jianfeng",
""
],
[
"Ye",
"Hainan",
""
],
[
"He",
"Xiwen",
""
],
[
"Wang",
"Lei",
""
],
[
"Zhu",
"Yuqing",
""
],
[
"Tian",
"Xinhui",
""
]
] | TITLE: Identifying Dwarfs Workloads in Big Data Analytics
ABSTRACT: Big data benchmarking is particularly important and provides applicable
yardsticks for evaluating booming big data systems. However, wide coverage and
great complexity of big data computing impose big challenges on big data
benchmarking. How can we construct a benchmark suite using a minimum set of
units of computation to represent diversity of big data analytics workloads?
Big data dwarfs are abstractions of extracting frequently appearing operations
in big data computing. One dwarf represents one unit of computation, and big
data workloads are decomposed into one or more dwarfs. Furthermore, dwarfs
workloads rather than vast real workloads are more cost-efficient and
representative to evaluate big data systems. In this paper, we extensively
investigate six most important or emerging application domains i.e. search
engine, social network, e-commerce, multimedia, bioinformatics and astronomy.
After analyzing forty representative algorithms, we single out eight dwarfs
workloads in big data analytics other than OLAP, which are linear algebra,
sampling, logic operations, transform operations, set operations, graph
operations, statistic operations and sort.
| no_new_dataset | 0.942929 |
1505.06907 | Andreas Gr\"unauer | Andreas Gr\"unauer and Markus Vincze | Using Dimension Reduction to Improve the Classification of
High-dimensional Data | Presented at OAGM Workshop, 2015 (arXiv:1505.01065) | null | null | OAGM/2015/09 | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we show that the classification performance of high-dimensional
structural MRI data with only a small set of training examples is improved by
the usage of dimension reduction methods. We assessed two different dimension
reduction variants: feature selection by ANOVA F-test and feature
transformation by PCA. On the reduced datasets, we applied common learning
algorithms using 5-fold cross-validation. Training, tuning of the
hyperparameters, as well as the performance evaluation of the classifiers was
conducted using two different performance measures: Accuracy, and Receiver
Operating Characteristic curve (AUC). Our hypothesis is supported by
experimental results.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 11:33:04 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Grünauer",
"Andreas",
""
],
[
"Vincze",
"Markus",
""
]
] | TITLE: Using Dimension Reduction to Improve the Classification of
High-dimensional Data
ABSTRACT: In this work we show that the classification performance of high-dimensional
structural MRI data with only a small set of training examples is improved by
the usage of dimension reduction methods. We assessed two different dimension
reduction variants: feature selection by ANOVA F-test and feature
transformation by PCA. On the reduced datasets, we applied common learning
algorithms using 5-fold cross-validation. Training, tuning of the
hyperparameters, as well as the performance evaluation of the classifiers was
conducted using two different performance measures: Accuracy, and Receiver
Operating Characteristic curve (AUC). Our hypothesis is supported by
experimental results.
| no_new_dataset | 0.953013 |
1505.06915 | Jean-Philippe Vert | K\'evin Vervier (CBIO), Pierre Mah\'e, Maud Tournoud, Jean-Baptiste
Veyrieras, Jean-Philippe Vert (CBIO) | Large-scale Machine Learning for Metagenomics Sequence Classification | null | null | null | null | q-bio.QM cs.CE cs.LG q-bio.GN stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metagenomics characterizes the taxonomic diversity of microbial communities
by sequencing DNA directly from an environmental sample. One of the main
challenges in metagenomics data analysis is the binning step, where each
sequenced read is assigned to a taxonomic clade. Due to the large volume of
metagenomics datasets, binning methods need fast and accurate algorithms that
can operate with reasonable computing requirements. While standard
alignment-based methods provide state-of-the-art performance, compositional
approaches that assign a taxonomic class to a DNA read based on the k-mers it
contains have the potential to provide faster solutions. In this work, we
investigate the potential of modern, large-scale machine learning
implementations for taxonomic affectation of next-generation sequencing reads
based on their k-mers profile. We show that machine learning-based
compositional approaches benefit from increasing the number of fragments
sampled from reference genome to tune their parameters, up to a coverage of
about 10, and from increasing the k-mer size to about 12. Tuning these models
involves training a machine learning model on about 10 8 samples in 10 7
dimensions, which is out of reach of standard soft-wares but can be done
efficiently with modern implementations for large-scale machine learning. The
resulting models are competitive in terms of accuracy with well-established
alignment tools for problems involving a small to moderate number of candidate
species, and for reasonable amounts of sequencing errors. We show, however,
that compositional approaches are still limited in their ability to deal with
problems involving a greater number of species, and more sensitive to
sequencing errors. We finally confirm that compositional approach achieve
faster prediction times, with a gain of 3 to 15 times with respect to the
BWA-MEM short read mapper, depending on the number of candidate species and the
level of sequencing noise.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 12:02:04 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Vervier",
"Kévin",
"",
"CBIO"
],
[
"Mahé",
"Pierre",
"",
"CBIO"
],
[
"Tournoud",
"Maud",
"",
"CBIO"
],
[
"Veyrieras",
"Jean-Baptiste",
"",
"CBIO"
],
[
"Vert",
"Jean-Philippe",
"",
"CBIO"
]
] | TITLE: Large-scale Machine Learning for Metagenomics Sequence Classification
ABSTRACT: Metagenomics characterizes the taxonomic diversity of microbial communities
by sequencing DNA directly from an environmental sample. One of the main
challenges in metagenomics data analysis is the binning step, where each
sequenced read is assigned to a taxonomic clade. Due to the large volume of
metagenomics datasets, binning methods need fast and accurate algorithms that
can operate with reasonable computing requirements. While standard
alignment-based methods provide state-of-the-art performance, compositional
approaches that assign a taxonomic class to a DNA read based on the k-mers it
contains have the potential to provide faster solutions. In this work, we
investigate the potential of modern, large-scale machine learning
implementations for taxonomic affectation of next-generation sequencing reads
based on their k-mers profile. We show that machine learning-based
compositional approaches benefit from increasing the number of fragments
sampled from reference genome to tune their parameters, up to a coverage of
about 10, and from increasing the k-mer size to about 12. Tuning these models
involves training a machine learning model on about 10 8 samples in 10 7
dimensions, which is out of reach of standard soft-wares but can be done
efficiently with modern implementations for large-scale machine learning. The
resulting models are competitive in terms of accuracy with well-established
alignment tools for problems involving a small to moderate number of candidate
species, and for reasonable amounts of sequencing errors. We show, however,
that compositional approaches are still limited in their ability to deal with
problems involving a greater number of species, and more sensitive to
sequencing errors. We finally confirm that compositional approach achieve
faster prediction times, with a gain of 3 to 15 times with respect to the
BWA-MEM short read mapper, depending on the number of candidate species and the
level of sequencing noise.
| no_new_dataset | 0.948394 |
1505.06918 | Roman Lutz | Roman Lutz | Fantasy Football Prediction | class project, 7 pages (1 sources, 1 appendix) | null | null | null | cs.LG | http://creativecommons.org/licenses/by/3.0/ | The ubiquity of professional sports and specifically the NFL have lead to an
increase in popularity for Fantasy Football. Users have many tools at their
disposal: statistics, predictions, rankings of experts and even recommendations
of peers. There are issues with all of these, though. Especially since many
people pay money to play, the prediction tools should be enhanced as they
provide unbiased and easy-to-use assistance for users. This paper provides and
discusses approaches to predict Fantasy Football scores of Quarterbacks with
relatively limited data. In addition to that, it includes several suggestions
on how the data could be enhanced to achieve better results. The dataset
consists only of game data from the last six NFL seasons. I used two different
methods to predict the Fantasy Football scores of NFL players: Support Vector
Regression (SVR) and Neural Networks. The results of both are promising given
the limited data that was used.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 12:14:56 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Lutz",
"Roman",
""
]
] | TITLE: Fantasy Football Prediction
ABSTRACT: The ubiquity of professional sports and specifically the NFL have lead to an
increase in popularity for Fantasy Football. Users have many tools at their
disposal: statistics, predictions, rankings of experts and even recommendations
of peers. There are issues with all of these, though. Especially since many
people pay money to play, the prediction tools should be enhanced as they
provide unbiased and easy-to-use assistance for users. This paper provides and
discusses approaches to predict Fantasy Football scores of Quarterbacks with
relatively limited data. In addition to that, it includes several suggestions
on how the data could be enhanced to achieve better results. The dataset
consists only of game data from the last six NFL seasons. I used two different
methods to predict the Fantasy Football scores of NFL players: Support Vector
Regression (SVR) and Neural Networks. The results of both are promising given
the limited data that was used.
| no_new_dataset | 0.950503 |
1505.06999 | Luis Ortiz | Joshua Belanich and Luis E. Ortiz | Some Open Problems in Optimal AdaBoost and Decision Stumps | 4 pages, rejected from COLT15 Open Problems May 19, 2015 (submitted
April 21, 2015; original 3 pages in COLT-conference format) | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The significance of the study of the theoretical and practical properties of
AdaBoost is unquestionable, given its simplicity, wide practical use, and
effectiveness on real-world datasets. Here we present a few open problems
regarding the behavior of "Optimal AdaBoost," a term coined by Rudin,
Daubechies, and Schapire in 2004 to label the simple version of the standard
AdaBoost algorithm in which the weak learner that AdaBoost uses always outputs
the weak classifier with lowest weighted error among the respective hypothesis
class of weak classifiers implicit in the weak learner. We concentrate on the
standard, "vanilla" version of Optimal AdaBoost for binary classification that
results from using an exponential-loss upper bound on the misclassification
training error. We present two types of open problems. One deals with general
weak hypotheses. The other deals with the particular case of decision stumps,
as often and commonly used in practice. Answers to the open problems can have
immediate significant impact to (1) cementing previously established results on
asymptotic convergence properties of Optimal AdaBoost, for finite datasets,
which in turn can be the start to any convergence-rate analysis; (2)
understanding the weak-hypotheses class of effective decision stumps generated
from data, which we have empirically observed to be significantly smaller than
the typically obtained class, as well as the effect on the weak learner's
running time and previously established improved bounds on the generalization
performance of Optimal AdaBoost classifiers; and (3) shedding some light on the
"self control" that AdaBoost tends to exhibit in practice.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 15:18:33 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Belanich",
"Joshua",
""
],
[
"Ortiz",
"Luis E.",
""
]
] | TITLE: Some Open Problems in Optimal AdaBoost and Decision Stumps
ABSTRACT: The significance of the study of the theoretical and practical properties of
AdaBoost is unquestionable, given its simplicity, wide practical use, and
effectiveness on real-world datasets. Here we present a few open problems
regarding the behavior of "Optimal AdaBoost," a term coined by Rudin,
Daubechies, and Schapire in 2004 to label the simple version of the standard
AdaBoost algorithm in which the weak learner that AdaBoost uses always outputs
the weak classifier with lowest weighted error among the respective hypothesis
class of weak classifiers implicit in the weak learner. We concentrate on the
standard, "vanilla" version of Optimal AdaBoost for binary classification that
results from using an exponential-loss upper bound on the misclassification
training error. We present two types of open problems. One deals with general
weak hypotheses. The other deals with the particular case of decision stumps,
as often and commonly used in practice. Answers to the open problems can have
immediate significant impact to (1) cementing previously established results on
asymptotic convergence properties of Optimal AdaBoost, for finite datasets,
which in turn can be the start to any convergence-rate analysis; (2)
understanding the weak-hypotheses class of effective decision stumps generated
from data, which we have empirically observed to be significantly smaller than
the typically obtained class, as well as the effect on the weak learner's
running time and previously established improved bounds on the generalization
performance of Optimal AdaBoost classifiers; and (3) shedding some light on the
"self control" that AdaBoost tends to exhibit in practice.
| no_new_dataset | 0.94366 |
1406.4923 | Jeremy Kepner | Jeremy Kepner, William Arcand, David Bestor, Bill Bergeron, Chansup
Byun, Vijay Gadepally, Matthew Hubbell, Peter Michaleas, Julie Mullen, Andrew
Prout, Albert Reuther, Antonio Rosa, Charles Yee (MIT) | Achieving 100,000,000 database inserts per second using Accumulo and D4M | 6 pages; to appear in IEEE High Performance Extreme Computing (HPEC)
2014 | null | 10.1109/HPEC.2014.7040945 | null | cs.DB astro-ph.IM cs.CE cs.DC cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Apache Accumulo database is an open source relaxed consistency database
that is widely used for government applications. Accumulo is designed to
deliver high performance on unstructured data such as graphs of network data.
This paper tests the performance of Accumulo using data from the Graph500
benchmark. The Dynamic Distributed Dimensional Data Model (D4M) software is
used to implement the benchmark on a 216-node cluster running the MIT
SuperCloud software stack. A peak performance of over 100,000,000 database
inserts per second was achieved which is 100x larger than the highest
previously published value for any other database. The performance scales
linearly with the number of ingest clients, number of database servers, and
data size. The performance was achieved by adapting several supercomputing
techniques to this application: distributed arrays, domain decomposition,
adaptive load balancing, and single-program-multiple-data programming.
| [
{
"version": "v1",
"created": "Thu, 19 Jun 2014 00:44:12 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Kepner",
"Jeremy",
"",
"MIT"
],
[
"Arcand",
"William",
"",
"MIT"
],
[
"Bestor",
"David",
"",
"MIT"
],
[
"Bergeron",
"Bill",
"",
"MIT"
],
[
"Byun",
"Chansup",
"",
"MIT"
],
[
"Gadepally",
"Vijay",
"",
"MIT"
],
[
"Hubbell",
"Matthew",
"",
"MIT"
],
[
"Michaleas",
"Peter",
"",
"MIT"
],
[
"Mullen",
"Julie",
"",
"MIT"
],
[
"Prout",
"Andrew",
"",
"MIT"
],
[
"Reuther",
"Albert",
"",
"MIT"
],
[
"Rosa",
"Antonio",
"",
"MIT"
],
[
"Yee",
"Charles",
"",
"MIT"
]
] | TITLE: Achieving 100,000,000 database inserts per second using Accumulo and D4M
ABSTRACT: The Apache Accumulo database is an open source relaxed consistency database
that is widely used for government applications. Accumulo is designed to
deliver high performance on unstructured data such as graphs of network data.
This paper tests the performance of Accumulo using data from the Graph500
benchmark. The Dynamic Distributed Dimensional Data Model (D4M) software is
used to implement the benchmark on a 216-node cluster running the MIT
SuperCloud software stack. A peak performance of over 100,000,000 database
inserts per second was achieved which is 100x larger than the highest
previously published value for any other database. The performance scales
linearly with the number of ingest clients, number of database servers, and
data size. The performance was achieved by adapting several supercomputing
techniques to this application: distributed arrays, domain decomposition,
adaptive load balancing, and single-program-multiple-data programming.
| no_new_dataset | 0.946843 |
1407.3859 | Jeremy Kepner | Jeremy Kepner, Christian Anderson, William Arcand, David Bestor, Bill
Bergeron, Chansup Byun, Matthew Hubbell, Peter Michaleas, Julie Mullen, David
O'Gwynn, Andrew Prout, Albert Reuther, Antonio Rosa, Charles Yee (MIT) | D4M 2.0 Schema: A General Purpose High Performance Schema for the
Accumulo Database | 6 pages; IEEE HPEC 2013 | null | 10.1109/HPEC.2013.6670318 | null | cs.DB astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-traditional, relaxed consistency, triple store databases are the backbone
of many web companies (e.g., Google Big Table, Amazon Dynamo, and Facebook
Cassandra). The Apache Accumulo database is a high performance open source
relaxed consistency database that is widely used for government applications.
Obtaining the full benefits of Accumulo requires using novel schemas. The
Dynamic Distributed Dimensional Data Model (D4M)[http://d4m.mit.edu] provides a
uniform mathematical framework based on associative arrays that encompasses
both traditional (i.e., SQL) and non-traditional databases. For non-traditional
databases D4M naturally leads to a general purpose schema that can be used to
fully index and rapidly query every unique string in a dataset. The D4M 2.0
Schema has been applied with little or no customization to cyber,
bioinformatics, scientific citation, free text, and social media data. The D4M
2.0 Schema is simple, requires minimal parsing, and achieves the highest
published Accumulo ingest rates. The benefits of the D4M 2.0 Schema are
independent of the D4M interface. Any interface to Accumulo can achieve these
benefits by using the D4M 2.0 Schema
| [
{
"version": "v1",
"created": "Tue, 15 Jul 2014 01:54:45 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Kepner",
"Jeremy",
"",
"MIT"
],
[
"Anderson",
"Christian",
"",
"MIT"
],
[
"Arcand",
"William",
"",
"MIT"
],
[
"Bestor",
"David",
"",
"MIT"
],
[
"Bergeron",
"Bill",
"",
"MIT"
],
[
"Byun",
"Chansup",
"",
"MIT"
],
[
"Hubbell",
"Matthew",
"",
"MIT"
],
[
"Michaleas",
"Peter",
"",
"MIT"
],
[
"Mullen",
"Julie",
"",
"MIT"
],
[
"O'Gwynn",
"David",
"",
"MIT"
],
[
"Prout",
"Andrew",
"",
"MIT"
],
[
"Reuther",
"Albert",
"",
"MIT"
],
[
"Rosa",
"Antonio",
"",
"MIT"
],
[
"Yee",
"Charles",
"",
"MIT"
]
] | TITLE: D4M 2.0 Schema: A General Purpose High Performance Schema for the
Accumulo Database
ABSTRACT: Non-traditional, relaxed consistency, triple store databases are the backbone
of many web companies (e.g., Google Big Table, Amazon Dynamo, and Facebook
Cassandra). The Apache Accumulo database is a high performance open source
relaxed consistency database that is widely used for government applications.
Obtaining the full benefits of Accumulo requires using novel schemas. The
Dynamic Distributed Dimensional Data Model (D4M)[http://d4m.mit.edu] provides a
uniform mathematical framework based on associative arrays that encompasses
both traditional (i.e., SQL) and non-traditional databases. For non-traditional
databases D4M naturally leads to a general purpose schema that can be used to
fully index and rapidly query every unique string in a dataset. The D4M 2.0
Schema has been applied with little or no customization to cyber,
bioinformatics, scientific citation, free text, and social media data. The D4M
2.0 Schema is simple, requires minimal parsing, and achieves the highest
published Accumulo ingest rates. The benefits of the D4M 2.0 Schema are
independent of the D4M interface. Any interface to Accumulo can achieve these
benefits by using the D4M 2.0 Schema
| no_new_dataset | 0.949153 |
1412.1740 | Matthew Kusner | Matt J. Kusner, Nicholas I. Kolkin, Stephen Tyree, Kilian Q.
Weinberger | Image Data Compression for Covariance and Histogram Descriptors | null | null | null | null | stat.ML cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Covariance and histogram image descriptors provide an effective way to
capture information about images. Both excel when used in combination with
special purpose distance metrics. For covariance descriptors these metrics
measure the distance along the non-Euclidean Riemannian manifold of symmetric
positive definite matrices. For histogram descriptors the Earth Mover's
distance measures the optimal transport between two histograms. Although more
precise, these distance metrics are very expensive to compute, making them
impractical in many applications, even for data sets of only a few thousand
examples. In this paper we present two methods to compress the size of
covariance and histogram datasets with only marginal increases in test error
for k-nearest neighbor classification. Specifically, we show that we can reduce
data sets to 16% and in some cases as little as 2% of their original size,
while approximately matching the test error of kNN classification on the full
training set. In fact, because the compressed set is learned in a supervised
fashion, it sometimes even outperforms the full data set, while requiring only
a fraction of the space and drastically reducing test-time computation.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2014 17:22:22 GMT"
},
{
"version": "v2",
"created": "Sat, 23 May 2015 17:07:59 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Kusner",
"Matt J.",
""
],
[
"Kolkin",
"Nicholas I.",
""
],
[
"Tyree",
"Stephen",
""
],
[
"Weinberger",
"Kilian Q.",
""
]
] | TITLE: Image Data Compression for Covariance and Histogram Descriptors
ABSTRACT: Covariance and histogram image descriptors provide an effective way to
capture information about images. Both excel when used in combination with
special purpose distance metrics. For covariance descriptors these metrics
measure the distance along the non-Euclidean Riemannian manifold of symmetric
positive definite matrices. For histogram descriptors the Earth Mover's
distance measures the optimal transport between two histograms. Although more
precise, these distance metrics are very expensive to compute, making them
impractical in many applications, even for data sets of only a few thousand
examples. In this paper we present two methods to compress the size of
covariance and histogram datasets with only marginal increases in test error
for k-nearest neighbor classification. Specifically, we show that we can reduce
data sets to 16% and in some cases as little as 2% of their original size,
while approximately matching the test error of kNN classification on the full
training set. In fact, because the compressed set is learned in a supervised
fashion, it sometimes even outperforms the full data set, while requiring only
a fraction of the space and drastically reducing test-time computation.
| no_new_dataset | 0.950227 |
1502.01911 | Mehdi Mortazawi Molu | Mehdi M. Molu and Alister Burr and Norbert Goertz | Statistical Analysis of Multi-Antenna Relay Systems and Power Allocation
Algorithms in a Relay with Partial Channel State Information | null | null | 10.1109/TWC.2015.2432768 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The performance of a dual-hop MIMO relay network is studied in this paper.
The relay is assumed to have access to the statistical channel state
information of its preceding and following channels and it is assumed that
fading at the antennas of the relay is correlated. The cumulative density
function (cdf) of the received SNR at the destination is first studied and
closed-form expressions are derived for the asymptotic cases of the
fully-correlated and non-correlated scenarios; moreover, the statistical
characteristics of the SNR are further studied and an approximate cdf of the
SNR is derived for arbitrary correlation. The cdf is a multipartite function
which does not easily lend itself to further mathematical calculations, e.g.,
rate optimization. However, we use it to propose a simple power allocation
algorithm which we call "proportional power allocation". The algorithm is
explained in detail for the case of two antennas and three antennas at the
relay and the extension of the algorithm to a relay with an arbitrary number of
the antennas is discussed. Although the proposed method is not claimed to be
optimal, the result is indistinguishable from the benchmark obtained using
exhaustive search. The simplicity of the algorithm combined with its precision
is indeed attractive from the practical point of view.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 15:03:10 GMT"
},
{
"version": "v2",
"created": "Sat, 2 May 2015 13:03:06 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Molu",
"Mehdi M.",
""
],
[
"Burr",
"Alister",
""
],
[
"Goertz",
"Norbert",
""
]
] | TITLE: Statistical Analysis of Multi-Antenna Relay Systems and Power Allocation
Algorithms in a Relay with Partial Channel State Information
ABSTRACT: The performance of a dual-hop MIMO relay network is studied in this paper.
The relay is assumed to have access to the statistical channel state
information of its preceding and following channels and it is assumed that
fading at the antennas of the relay is correlated. The cumulative density
function (cdf) of the received SNR at the destination is first studied and
closed-form expressions are derived for the asymptotic cases of the
fully-correlated and non-correlated scenarios; moreover, the statistical
characteristics of the SNR are further studied and an approximate cdf of the
SNR is derived for arbitrary correlation. The cdf is a multipartite function
which does not easily lend itself to further mathematical calculations, e.g.,
rate optimization. However, we use it to propose a simple power allocation
algorithm which we call "proportional power allocation". The algorithm is
explained in detail for the case of two antennas and three antennas at the
relay and the extension of the algorithm to a relay with an arbitrary number of
the antennas is discussed. Although the proposed method is not claimed to be
optimal, the result is indistinguishable from the benchmark obtained using
exhaustive search. The simplicity of the algorithm combined with its precision
is indeed attractive from the practical point of view.
| no_new_dataset | 0.95018 |
1504.06580 | Cicero dos Santos | Cicero Nogueira dos Santos, Bing Xiang, Bowen Zhou | Classifying Relations by Ranking with Convolutional Neural Networks | Accepted as a long paper in the 53rd Annual Meeting of the
Association for Computational Linguistics (ACL 2015) | null | null | null | cs.CL cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Relation classification is an important semantic processing task for which
state-ofthe-art systems still rely on costly handcrafted features. In this work
we tackle the relation classification task using a convolutional neural network
that performs classification by ranking (CR-CNN). We propose a new pairwise
ranking loss function that makes it easy to reduce the impact of artificial
classes. We perform experiments using the the SemEval-2010 Task 8 dataset,
which is designed for the task of classifying the relationship between two
nominals marked in a sentence. Using CRCNN, we outperform the state-of-the-art
for this dataset and achieve a F1 of 84.1 without using any costly handcrafted
features. Additionally, our experimental results show that: (1) our approach is
more effective than CNN followed by a softmax classifier; (2) omitting the
representation of the artificial class Other improves both precision and
recall; and (3) using only word embeddings as input features is enough to
achieve state-of-the-art results if we consider only the text between the two
target nominals.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 17:50:33 GMT"
},
{
"version": "v2",
"created": "Sun, 24 May 2015 13:58:05 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Santos",
"Cicero Nogueira dos",
""
],
[
"Xiang",
"Bing",
""
],
[
"Zhou",
"Bowen",
""
]
] | TITLE: Classifying Relations by Ranking with Convolutional Neural Networks
ABSTRACT: Relation classification is an important semantic processing task for which
state-ofthe-art systems still rely on costly handcrafted features. In this work
we tackle the relation classification task using a convolutional neural network
that performs classification by ranking (CR-CNN). We propose a new pairwise
ranking loss function that makes it easy to reduce the impact of artificial
classes. We perform experiments using the the SemEval-2010 Task 8 dataset,
which is designed for the task of classifying the relationship between two
nominals marked in a sentence. Using CRCNN, we outperform the state-of-the-art
for this dataset and achieve a F1 of 84.1 without using any costly handcrafted
features. Additionally, our experimental results show that: (1) our approach is
more effective than CNN followed by a softmax classifier; (2) omitting the
representation of the artificial class Other improves both precision and
recall; and (3) using only word embeddings as input features is enough to
achieve state-of-the-art results if we consider only the text between the two
target nominals.
| no_new_dataset | 0.946646 |
1505.06249 | Alexandre Drouin | Alexandre Drouin, S\'ebastien Gigu\`ere, Maxime D\'eraspe,
Fran\c{c}ois Laviolette, Mario Marchand, Jacques Corbeil | Greedy Biomarker Discovery in the Genome with Applications to
Antimicrobial Resistance | Peer-reviewed and accepted for an oral presentation in the Greed is
Great workshop at the International Conference on Machine Learning, Lille,
France, 2015 | null | null | null | q-bio.GN cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Set Covering Machine (SCM) is a greedy learning algorithm that produces
sparse classifiers. We extend the SCM for datasets that contain a huge number
of features. The whole genetic material of living organisms is an example of
such a case, where the number of feature exceeds 10^7. Three human pathogens
were used to evaluate the performance of the SCM at predicting antimicrobial
resistance. Our results show that the SCM compares favorably in terms of
sparsity and accuracy against L1 and L2 regularized Support Vector Machines and
CART decision trees. Moreover, the SCM was the only algorithm that could
consider the full feature space. For all other algorithms, the latter had to be
filtered as a preprocessing step.
| [
{
"version": "v1",
"created": "Fri, 22 May 2015 23:29:40 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Drouin",
"Alexandre",
""
],
[
"Giguère",
"Sébastien",
""
],
[
"Déraspe",
"Maxime",
""
],
[
"Laviolette",
"François",
""
],
[
"Marchand",
"Mario",
""
],
[
"Corbeil",
"Jacques",
""
]
] | TITLE: Greedy Biomarker Discovery in the Genome with Applications to
Antimicrobial Resistance
ABSTRACT: The Set Covering Machine (SCM) is a greedy learning algorithm that produces
sparse classifiers. We extend the SCM for datasets that contain a huge number
of features. The whole genetic material of living organisms is an example of
such a case, where the number of feature exceeds 10^7. Three human pathogens
were used to evaluate the performance of the SCM at predicting antimicrobial
resistance. Our results show that the SCM compares favorably in terms of
sparsity and accuracy against L1 and L2 regularized Support Vector Machines and
CART decision trees. Moreover, the SCM was the only algorithm that could
consider the full feature space. For all other algorithms, the latter had to be
filtered as a preprocessing step.
| no_new_dataset | 0.952309 |
1505.06250 | George Toderici | Balakrishnan Varadarajan and George Toderici and Sudheendra
Vijayanarasimhan and Apostol Natsev | Efficient Large Scale Video Classification | null | null | null | null | cs.CV cs.MM cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Video classification has advanced tremendously over the recent years. A large
part of the improvements in video classification had to do with the work done
by the image classification community and the use of deep convolutional
networks (CNNs) which produce competitive results with hand- crafted motion
features. These networks were adapted to use video frames in various ways and
have yielded state of the art classification results. We present two methods
that build on this work, and scale it up to work with millions of videos and
hundreds of thousands of classes while maintaining a low computational cost. In
the context of large scale video processing, training CNNs on video frames is
extremely time consuming, due to the large number of frames involved. We
propose to avoid this problem by training CNNs on either YouTube thumbnails or
Flickr images, and then using these networks' outputs as features for other
higher level classifiers. We discuss the challenges of achieving this and
propose two models for frame-level and video-level classification. The first is
a highly efficient mixture of experts while the latter is based on long short
term memory neural networks. We present results on the Sports-1M video dataset
(1 million videos, 487 classes) and on a new dataset which has 12 million
videos and 150,000 labels.
| [
{
"version": "v1",
"created": "Fri, 22 May 2015 23:45:32 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Varadarajan",
"Balakrishnan",
""
],
[
"Toderici",
"George",
""
],
[
"Vijayanarasimhan",
"Sudheendra",
""
],
[
"Natsev",
"Apostol",
""
]
] | TITLE: Efficient Large Scale Video Classification
ABSTRACT: Video classification has advanced tremendously over the recent years. A large
part of the improvements in video classification had to do with the work done
by the image classification community and the use of deep convolutional
networks (CNNs) which produce competitive results with hand- crafted motion
features. These networks were adapted to use video frames in various ways and
have yielded state of the art classification results. We present two methods
that build on this work, and scale it up to work with millions of videos and
hundreds of thousands of classes while maintaining a low computational cost. In
the context of large scale video processing, training CNNs on video frames is
extremely time consuming, due to the large number of frames involved. We
propose to avoid this problem by training CNNs on either YouTube thumbnails or
Flickr images, and then using these networks' outputs as features for other
higher level classifiers. We discuss the challenges of achieving this and
propose two models for frame-level and video-level classification. The first is
a highly efficient mixture of experts while the latter is based on long short
term memory neural networks. We present results on the Sports-1M video dataset
(1 million videos, 487 classes) and on a new dataset which has 12 million
videos and 150,000 labels.
| new_dataset | 0.962427 |
1505.06485 | Syama Sundar Rangapuram | Syama Sundar Rangapuram and Matthias Hein | Constrained 1-Spectral Clustering | Long version of paper accepted at AISTATS 2012 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important form of prior information in clustering comes in form of
cannot-link and must-link constraints. We present a generalization of the
popular spectral clustering technique which integrates such constraints.
Motivated by the recently proposed $1$-spectral clustering for the
unconstrained problem, our method is based on a tight relaxation of the
constrained normalized cut into a continuous optimization problem. Opposite to
all other methods which have been suggested for constrained spectral
clustering, we can always guarantee to satisfy all constraints. Moreover, our
soft formulation allows to optimize a trade-off between normalized cut and the
number of violated constraints. An efficient implementation is provided which
scales to large datasets. We outperform consistently all other proposed methods
in the experiments.
| [
{
"version": "v1",
"created": "Sun, 24 May 2015 21:25:44 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Rangapuram",
"Syama Sundar",
""
],
[
"Hein",
"Matthias",
""
]
] | TITLE: Constrained 1-Spectral Clustering
ABSTRACT: An important form of prior information in clustering comes in form of
cannot-link and must-link constraints. We present a generalization of the
popular spectral clustering technique which integrates such constraints.
Motivated by the recently proposed $1$-spectral clustering for the
unconstrained problem, our method is based on a tight relaxation of the
constrained normalized cut into a continuous optimization problem. Opposite to
all other methods which have been suggested for constrained spectral
clustering, we can always guarantee to satisfy all constraints. Moreover, our
soft formulation allows to optimize a trade-off between normalized cut and the
number of violated constraints. An efficient implementation is provided which
scales to large datasets. We outperform consistently all other proposed methods
in the experiments.
| no_new_dataset | 0.944689 |
1505.06531 | Tsu-Wei Chen | Tsu-Wei Chen, Meena Abdelmaseeh, Daniel Stashuk | Affine and Regional Dynamic Time Warpng | null | null | null | null | cs.CV cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pointwise matches between two time series are of great importance in time
series analysis, and dynamic time warping (DTW) is known to provide generally
reasonable matches. There are situations where time series alignment should be
invariant to scaling and offset in amplitude or where local regions of the
considered time series should be strongly reflected in pointwise matches. Two
different variants of DTW, affine DTW (ADTW) and regional DTW (RDTW), are
proposed to handle scaling and offset in amplitude and provide regional
emphasis respectively. Furthermore, ADTW and RDTW can be combined in two
different ways to generate alignments that incorporate advantages from both
methods, where the affine model can be applied either globally to the entire
time series or locally to each region. The proposed alignment methods
outperform DTW on specific simulated datasets, and one-nearest-neighbor
classifiers using their associated difference measures are competitive with the
difference measures associated with state-of-the-art alignment methods on real
datasets.
| [
{
"version": "v1",
"created": "Mon, 25 May 2015 03:23:31 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Chen",
"Tsu-Wei",
""
],
[
"Abdelmaseeh",
"Meena",
""
],
[
"Stashuk",
"Daniel",
""
]
] | TITLE: Affine and Regional Dynamic Time Warpng
ABSTRACT: Pointwise matches between two time series are of great importance in time
series analysis, and dynamic time warping (DTW) is known to provide generally
reasonable matches. There are situations where time series alignment should be
invariant to scaling and offset in amplitude or where local regions of the
considered time series should be strongly reflected in pointwise matches. Two
different variants of DTW, affine DTW (ADTW) and regional DTW (RDTW), are
proposed to handle scaling and offset in amplitude and provide regional
emphasis respectively. Furthermore, ADTW and RDTW can be combined in two
different ways to generate alignments that incorporate advantages from both
methods, where the affine model can be applied either globally to the entire
time series or locally to each region. The proposed alignment methods
outperform DTW on specific simulated datasets, and one-nearest-neighbor
classifiers using their associated difference measures are competitive with the
difference measures associated with state-of-the-art alignment methods on real
datasets.
| no_new_dataset | 0.953188 |
1505.06532 | Ali Jahanian | Ali Jahanian, S. V. N. Vishwanathan, Jan P. Allebach | Colors $-$Messengers of Concepts: Visual Design Mining for Learning
Color Semantics | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the concept of color semantics by modeling a dataset of
magazine cover designs, evaluating the model via crowdsourcing, and
demonstrating several prototypes that facilitate color-related design tasks. We
investigate a probabilistic generative modeling framework that expresses
semantic concepts as a combination of color and word distributions
$-$color-word topics. We adopt an extension to Latent Dirichlet Allocation
(LDA) topic modeling called LDA-dual to infer a set of color-word topics over a
corpus of 2,654 magazine covers spanning 71 distinct titles and 12 genres.
While LDA models text documents as distributions over word topics, we model
magazine covers as distributions over color-word topics. The results of our
crowdsourced experiments confirm that the model is able to successfully
discover the associations between colors and linguistic concepts. Finally, we
demonstrate several simple prototypes that apply the learned model to color
palette recommendation, design example retrieval, image retrieval, image color
selection, and image recoloring.
| [
{
"version": "v1",
"created": "Mon, 25 May 2015 03:34:46 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Jahanian",
"Ali",
""
],
[
"Vishwanathan",
"S. V. N.",
""
],
[
"Allebach",
"Jan P.",
""
]
] | TITLE: Colors $-$Messengers of Concepts: Visual Design Mining for Learning
Color Semantics
ABSTRACT: This paper studies the concept of color semantics by modeling a dataset of
magazine cover designs, evaluating the model via crowdsourcing, and
demonstrating several prototypes that facilitate color-related design tasks. We
investigate a probabilistic generative modeling framework that expresses
semantic concepts as a combination of color and word distributions
$-$color-word topics. We adopt an extension to Latent Dirichlet Allocation
(LDA) topic modeling called LDA-dual to infer a set of color-word topics over a
corpus of 2,654 magazine covers spanning 71 distinct titles and 12 genres.
While LDA models text documents as distributions over word topics, we model
magazine covers as distributions over color-word topics. The results of our
crowdsourced experiments confirm that the model is able to successfully
discover the associations between colors and linguistic concepts. Finally, we
demonstrate several simple prototypes that apply the learned model to color
palette recommendation, design example retrieval, image retrieval, image color
selection, and image recoloring.
| no_new_dataset | 0.943138 |
1505.06538 | J Massey Cashore | J. Massey Cashore, Xiaoting Zhao, Alexander A. Alemi, Yujia Liu, Peter
I. Frazier | Clustering via Content-Augmented Stochastic Blockmodels | null | null | null | null | stat.ML cs.LG cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Much of the data being created on the web contains interactions between users
and items. Stochastic blockmodels, and other methods for community detection
and clustering of bipartite graphs, can infer latent user communities and
latent item clusters from this interaction data. These methods, however,
typically ignore the items' contents and the information they provide about
item clusters, despite the tendency of items in the same latent cluster to
share commonalities in content. We introduce content-augmented stochastic
blockmodels (CASB), which use item content together with user-item interaction
data to enhance the user communities and item clusters learned. Comparisons to
several state-of-the-art benchmark methods, on datasets arising from scientists
interacting with scientific articles, show that content-augmented stochastic
blockmodels provide highly accurate clusters with respect to metrics
representative of the underlying community structure.
| [
{
"version": "v1",
"created": "Mon, 25 May 2015 04:19:12 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Cashore",
"J. Massey",
""
],
[
"Zhao",
"Xiaoting",
""
],
[
"Alemi",
"Alexander A.",
""
],
[
"Liu",
"Yujia",
""
],
[
"Frazier",
"Peter I.",
""
]
] | TITLE: Clustering via Content-Augmented Stochastic Blockmodels
ABSTRACT: Much of the data being created on the web contains interactions between users
and items. Stochastic blockmodels, and other methods for community detection
and clustering of bipartite graphs, can infer latent user communities and
latent item clusters from this interaction data. These methods, however,
typically ignore the items' contents and the information they provide about
item clusters, despite the tendency of items in the same latent cluster to
share commonalities in content. We introduce content-augmented stochastic
blockmodels (CASB), which use item content together with user-item interaction
data to enhance the user communities and item clusters learned. Comparisons to
several state-of-the-art benchmark methods, on datasets arising from scientists
interacting with scientific articles, show that content-augmented stochastic
blockmodels provide highly accurate clusters with respect to metrics
representative of the underlying community structure.
| no_new_dataset | 0.946794 |
1505.05921 | Katherine Driggs-Campbell | Katherine Driggs-Campbell and Ruzena Bajcsy | Identifying Modes of Intent from Driver Behaviors in Dynamic
Environments | Submitted to ITSC 2015 | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In light of growing attention of intelligent vehicle systems, we propose
developing a driver model that uses a hybrid system formulation to capture the
intent of the driver. This model hopes to capture human driving behavior in a
way that can be utilized by semi- and fully autonomous systems in heterogeneous
environments. We consider a discrete set of high level goals or intent modes,
that is designed to encompass the decision making process of the human. A
driver model is derived using a dataset of lane changes collected in a
realistic driving simulator, in which the driver actively labels data to give
us insight into her intent. By building the labeled dataset, we are able to
utilize classification tools to build the driver model using features of based
on her perception of the environment, and achieve high accuracy in identifying
driver intent. Multiple algorithms are presented and compared on the dataset,
and a comparison of the varying behaviors between drivers is drawn. Using this
modeling methodology, we present a model that can be used to assess driver
behaviors and to develop human-inspired safety metrics that can be utilized in
intelligent vehicular systems.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 23:19:09 GMT"
}
] | 2015-05-25T00:00:00 | [
[
"Driggs-Campbell",
"Katherine",
""
],
[
"Bajcsy",
"Ruzena",
""
]
] | TITLE: Identifying Modes of Intent from Driver Behaviors in Dynamic
Environments
ABSTRACT: In light of growing attention of intelligent vehicle systems, we propose
developing a driver model that uses a hybrid system formulation to capture the
intent of the driver. This model hopes to capture human driving behavior in a
way that can be utilized by semi- and fully autonomous systems in heterogeneous
environments. We consider a discrete set of high level goals or intent modes,
that is designed to encompass the decision making process of the human. A
driver model is derived using a dataset of lane changes collected in a
realistic driving simulator, in which the driver actively labels data to give
us insight into her intent. By building the labeled dataset, we are able to
utilize classification tools to build the driver model using features of based
on her perception of the environment, and achieve high accuracy in identifying
driver intent. Multiple algorithms are presented and compared on the dataset,
and a comparison of the varying behaviors between drivers is drawn. Using this
modeling methodology, we present a model that can be used to assess driver
behaviors and to develop human-inspired safety metrics that can be utilized in
intelligent vehicular systems.
| new_dataset | 0.9598 |
1505.05957 | Tianmin Shu | Tianmin Shu, Dan Xie, Brandon Rothrock, Sinisa Todorovic, Song-Chun
Zhu | Joint Inference of Groups, Events and Human Roles in Aerial Videos | CVPR 2015 Oral Presentation | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the advent of drones, aerial video analysis becomes increasingly
important; yet, it has received scant attention in the literature. This paper
addresses a new problem of parsing low-resolution aerial videos of large
spatial areas, in terms of 1) grouping, 2) recognizing events and 3) assigning
roles to people engaged in events. We propose a novel framework aimed at
conducting joint inference of the above tasks, as reasoning about each in
isolation typically fails in our setting. Given noisy tracklets of people and
detections of large objects and scene surfaces (e.g., building, grass), we use
a spatiotemporal AND-OR graph to drive our joint inference, using Markov Chain
Monte Carlo and dynamic programming. We also introduce a new formalism of
spatiotemporal templates characterizing latent sub-events. For evaluation, we
have collected and released a new aerial videos dataset using a hex-rotor
flying over picnic areas rich with group events. Our results demonstrate that
we successfully address above inference tasks under challenging conditions.
| [
{
"version": "v1",
"created": "Fri, 22 May 2015 05:59:18 GMT"
}
] | 2015-05-25T00:00:00 | [
[
"Shu",
"Tianmin",
""
],
[
"Xie",
"Dan",
""
],
[
"Rothrock",
"Brandon",
""
],
[
"Todorovic",
"Sinisa",
""
],
[
"Zhu",
"Song-Chun",
""
]
] | TITLE: Joint Inference of Groups, Events and Human Roles in Aerial Videos
ABSTRACT: With the advent of drones, aerial video analysis becomes increasingly
important; yet, it has received scant attention in the literature. This paper
addresses a new problem of parsing low-resolution aerial videos of large
spatial areas, in terms of 1) grouping, 2) recognizing events and 3) assigning
roles to people engaged in events. We propose a novel framework aimed at
conducting joint inference of the above tasks, as reasoning about each in
isolation typically fails in our setting. Given noisy tracklets of people and
detections of large objects and scene surfaces (e.g., building, grass), we use
a spatiotemporal AND-OR graph to drive our joint inference, using Markov Chain
Monte Carlo and dynamic programming. We also introduce a new formalism of
spatiotemporal templates characterizing latent sub-events. For evaluation, we
have collected and released a new aerial videos dataset using a hex-rotor
flying over picnic areas rich with group events. Our results demonstrate that
we successfully address above inference tasks under challenging conditions.
| new_dataset | 0.954942 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.