id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1405.6879 | M\'arton Karsai | M\'arton Karsai, Gerardo I\~niguez, Kimmo Kaski, J\'anos Kert\'esz | Complex contagion process in spreading of online innovation | 27 pages, 11 figures, 2 tables | J. R. Soc. Interface 11, 101 (2014) | 10.1098/rsif.2014.0694 | null | physics.soc-ph cs.SI nlin.AO physics.comp-ph physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion of innovation can be interpreted as a social spreading phenomena
governed by the impact of media and social interactions. Although these
mechanisms have been identified by quantitative theories, their role and
relative importance are not entirely understood, since empirical verification
has so far been hindered by the lack of appropriate data. Here we analyse a
dataset recording the spreading dynamics of the world's largest Voice over
Internet Protocol service to empirically support the assumptions behind models
of social contagion. We show that the rate of spontaneous service adoption is
constant, the probability of adoption via social influence is linearly
proportional to the fraction of adopting neighbours, and the rate of service
termination is time-invariant and independent of the behaviour of peers. By
implementing the detected diffusion mechanisms into a dynamical agent-based
model, we are able to emulate the adoption dynamics of the service in several
countries worldwide. This approach enables us to make medium-term predictions
of service adoption and disclose dependencies between the dynamics of
innovation spreading and the socioeconomic development of a country.
| [
{
"version": "v1",
"created": "Tue, 27 May 2014 12:03:31 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Oct 2014 10:10:21 GMT"
}
] | 2014-10-24T00:00:00 | [
[
"Karsai",
"Márton",
""
],
[
"Iñiguez",
"Gerardo",
""
],
[
"Kaski",
"Kimmo",
""
],
[
"Kertész",
"János",
""
]
] | TITLE: Complex contagion process in spreading of online innovation
ABSTRACT: Diffusion of innovation can be interpreted as a social spreading phenomena
governed by the impact of media and social interactions. Although these
mechanisms have been identified by quantitative theories, their role and
relative importance are not entirely understood, since empirical verification
has so far been hindered by the lack of appropriate data. Here we analyse a
dataset recording the spreading dynamics of the world's largest Voice over
Internet Protocol service to empirically support the assumptions behind models
of social contagion. We show that the rate of spontaneous service adoption is
constant, the probability of adoption via social influence is linearly
proportional to the fraction of adopting neighbours, and the rate of service
termination is time-invariant and independent of the behaviour of peers. By
implementing the detected diffusion mechanisms into a dynamical agent-based
model, we are able to emulate the adoption dynamics of the service in several
countries worldwide. This approach enables us to make medium-term predictions
of service adoption and disclose dependencies between the dynamics of
innovation spreading and the socioeconomic development of a country.
|
1409.5241 | Basura Fernando | Basura Fernando, Amaury Habrard, Marc Sebban and Tinne Tuytelaars | Subspace Alignment For Domain Adaptation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we introduce a new domain adaptation (DA) algorithm where the
source and target domains are represented by subspaces spanned by eigenvectors.
Our method seeks a domain invariant feature space by learning a mapping
function which aligns the source subspace with the target one. We show that the
solution of the corresponding optimization problem can be obtained in a simple
closed form, leading to an extremely fast algorithm. We present two approaches
to determine the only hyper-parameter in our method corresponding to the size
of the subspaces. In the first approach we tune the size of subspaces using a
theoretical bound on the stability of the obtained result. In the second
approach, we use maximum likelihood estimation to determine the subspace size,
which is particularly useful for high dimensional data. Apart from PCA, we
propose a subspace creation method that outperform partial least squares (PLS)
and linear discriminant analysis (LDA) in domain adaptation. We test our method
on various datasets and show that, despite its intrinsic simplicity, it
outperforms state of the art DA methods.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2014 09:57:41 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Oct 2014 08:40:06 GMT"
}
] | 2014-10-24T00:00:00 | [
[
"Fernando",
"Basura",
""
],
[
"Habrard",
"Amaury",
""
],
[
"Sebban",
"Marc",
""
],
[
"Tuytelaars",
"Tinne",
""
]
] | TITLE: Subspace Alignment For Domain Adaptation
ABSTRACT: In this paper, we introduce a new domain adaptation (DA) algorithm where the
source and target domains are represented by subspaces spanned by eigenvectors.
Our method seeks a domain invariant feature space by learning a mapping
function which aligns the source subspace with the target one. We show that the
solution of the corresponding optimization problem can be obtained in a simple
closed form, leading to an extremely fast algorithm. We present two approaches
to determine the only hyper-parameter in our method corresponding to the size
of the subspaces. In the first approach we tune the size of subspaces using a
theoretical bound on the stability of the obtained result. In the second
approach, we use maximum likelihood estimation to determine the subspace size,
which is particularly useful for high dimensional data. Apart from PCA, we
propose a subspace creation method that outperform partial least squares (PLS)
and linear discriminant analysis (LDA) in domain adaptation. We test our method
on various datasets and show that, despite its intrinsic simplicity, it
outperforms state of the art DA methods.
|
1410.4343 | Chiranjib Saha | Anupam Trivedi, Kunal Pal, Chiranjib Saha, Dipti Srinivasan | Enhanced Multiobjective Evolutionary Algorithm based on Decomposition
for Solving the Unit Commitment Problem | This paper has been withdrawn by the author due to 1. inconsistency
of vector representation in equation (12) and 2. algorithm 3 has not been
included in this text which makes the description incomplete | null | null | IEEE Transactions on Industrial Informatics - Manuscript ID
TII-14-0921 | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The unit commitment (UC) problem is a nonlinear, high-dimensional, highly
constrained, mixed-integer power system optimization problem and is generally
solved in the literature considering minimizing the system operation cost as
the only objective. However, due to increasing environmental concerns, the
recent attention has shifted to incorporating emission in the problem
formulation. In this paper, a multi-objective evolutionary algorithm based on
decomposition (MOEA/D) is proposed to solve the UC problem as a multi-objective
optimization problem considering minimizing cost and emission as the multiple
objec- tives. Since, UC problem is a mixed-integer optimization problem
consisting of binary UC variables and continuous power dispatch variables, a
novel hybridization strategy is proposed within the framework of MOEA/D such
that genetic algorithm (GA) evolves the binary variables while differential
evolution (DE) evolves the continuous variables. Further, a novel non-uniform
weight vector distribution strategy is proposed and a parallel island model
based on combination of MOEA/D with uniform and non-uniform weight vector
distribution strategy is implemented to enhance the performance of the
presented algorithm. Extensive case studies are presented on different test
systems and the effectiveness of the proposed hybridization strategy, the
non-uniform weight vector distribution strategy and parallel island model is
verified through stringent simulated results. Further, exhaustive benchmarking
against the algorithms proposed in the literature is presented to demonstrate
the superiority of the proposed algorithm in obtaining significantly better
converged and uniformly distributed trade-off solutions.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2014 09:17:51 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Oct 2014 18:10:19 GMT"
}
] | 2014-10-24T00:00:00 | [
[
"Trivedi",
"Anupam",
""
],
[
"Pal",
"Kunal",
""
],
[
"Saha",
"Chiranjib",
""
],
[
"Srinivasan",
"Dipti",
""
]
] | TITLE: Enhanced Multiobjective Evolutionary Algorithm based on Decomposition
for Solving the Unit Commitment Problem
ABSTRACT: The unit commitment (UC) problem is a nonlinear, high-dimensional, highly
constrained, mixed-integer power system optimization problem and is generally
solved in the literature considering minimizing the system operation cost as
the only objective. However, due to increasing environmental concerns, the
recent attention has shifted to incorporating emission in the problem
formulation. In this paper, a multi-objective evolutionary algorithm based on
decomposition (MOEA/D) is proposed to solve the UC problem as a multi-objective
optimization problem considering minimizing cost and emission as the multiple
objec- tives. Since, UC problem is a mixed-integer optimization problem
consisting of binary UC variables and continuous power dispatch variables, a
novel hybridization strategy is proposed within the framework of MOEA/D such
that genetic algorithm (GA) evolves the binary variables while differential
evolution (DE) evolves the continuous variables. Further, a novel non-uniform
weight vector distribution strategy is proposed and a parallel island model
based on combination of MOEA/D with uniform and non-uniform weight vector
distribution strategy is implemented to enhance the performance of the
presented algorithm. Extensive case studies are presented on different test
systems and the effectiveness of the proposed hybridization strategy, the
non-uniform weight vector distribution strategy and parallel island model is
verified through stringent simulated results. Further, exhaustive benchmarking
against the algorithms proposed in the literature is presented to demonstrate
the superiority of the proposed algorithm in obtaining significantly better
converged and uniformly distributed trade-off solutions.
|
1311.2524 | Ross Girshick | Ross Girshick, Jeff Donahue, Trevor Darrell, Jitendra Malik | Rich feature hierarchies for accurate object detection and semantic
segmentation | Extended version of our CVPR 2014 paper; latest update (v5) includes
results using deeper networks (see Appendix G. Changelog) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object detection performance, as measured on the canonical PASCAL VOC
dataset, has plateaued in the last few years. The best-performing methods are
complex ensemble systems that typically combine multiple low-level image
features with high-level context. In this paper, we propose a simple and
scalable detection algorithm that improves mean average precision (mAP) by more
than 30% relative to the previous best result on VOC 2012---achieving a mAP of
53.3%. Our approach combines two key insights: (1) one can apply high-capacity
convolutional neural networks (CNNs) to bottom-up region proposals in order to
localize and segment objects and (2) when labeled training data is scarce,
supervised pre-training for an auxiliary task, followed by domain-specific
fine-tuning, yields a significant performance boost. Since we combine region
proposals with CNNs, we call our method R-CNN: Regions with CNN features. We
also compare R-CNN to OverFeat, a recently proposed sliding-window detector
based on a similar CNN architecture. We find that R-CNN outperforms OverFeat by
a large margin on the 200-class ILSVRC2013 detection dataset. Source code for
the complete system is available at http://www.cs.berkeley.edu/~rbg/rcnn.
| [
{
"version": "v1",
"created": "Mon, 11 Nov 2013 18:43:49 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Apr 2014 01:44:31 GMT"
},
{
"version": "v3",
"created": "Wed, 7 May 2014 17:09:23 GMT"
},
{
"version": "v4",
"created": "Mon, 9 Jun 2014 22:07:33 GMT"
},
{
"version": "v5",
"created": "Wed, 22 Oct 2014 17:23:20 GMT"
}
] | 2014-10-23T00:00:00 | [
[
"Girshick",
"Ross",
""
],
[
"Donahue",
"Jeff",
""
],
[
"Darrell",
"Trevor",
""
],
[
"Malik",
"Jitendra",
""
]
] | TITLE: Rich feature hierarchies for accurate object detection and semantic
segmentation
ABSTRACT: Object detection performance, as measured on the canonical PASCAL VOC
dataset, has plateaued in the last few years. The best-performing methods are
complex ensemble systems that typically combine multiple low-level image
features with high-level context. In this paper, we propose a simple and
scalable detection algorithm that improves mean average precision (mAP) by more
than 30% relative to the previous best result on VOC 2012---achieving a mAP of
53.3%. Our approach combines two key insights: (1) one can apply high-capacity
convolutional neural networks (CNNs) to bottom-up region proposals in order to
localize and segment objects and (2) when labeled training data is scarce,
supervised pre-training for an auxiliary task, followed by domain-specific
fine-tuning, yields a significant performance boost. Since we combine region
proposals with CNNs, we call our method R-CNN: Regions with CNN features. We
also compare R-CNN to OverFeat, a recently proposed sliding-window detector
based on a similar CNN architecture. We find that R-CNN outperforms OverFeat by
a large margin on the 200-class ILSVRC2013 detection dataset. Source code for
the complete system is available at http://www.cs.berkeley.edu/~rbg/rcnn.
|
1408.5389 | Zhensong Qian | Zhensong Qian, Oliver Schulte and Yan Sun | Computing Multi-Relational Sufficient Statistics for Large Databases | 11pages, 8 figures, 8 tables, CIKM'14,November 3--7, 2014, Shanghai,
China | null | 10.1145/2661829.2662010 | null | cs.LG cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Databases contain information about which relationships do and do not hold
among entities. To make this information accessible for statistical analysis
requires computing sufficient statistics that combine information from
different database tables. Such statistics may involve any number of {\em
positive and negative} relationships. With a naive enumeration approach,
computing sufficient statistics for negative relationships is feasible only for
small databases. We solve this problem with a new dynamic programming algorithm
that performs a virtual join, where the requisite counts are computed without
materializing join tables. Contingency table algebra is a new extension of
relational algebra, that facilitates the efficient implementation of this
M\"obius virtual join operation. The M\"obius Join scales to large datasets
(over 1M tuples) with complex schemas. Empirical evaluation with seven
benchmark datasets showed that information about the presence and absence of
links can be exploited in feature selection, association rule mining, and
Bayesian network learning.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2014 19:12:19 GMT"
}
] | 2014-10-23T00:00:00 | [
[
"Qian",
"Zhensong",
""
],
[
"Schulte",
"Oliver",
""
],
[
"Sun",
"Yan",
""
]
] | TITLE: Computing Multi-Relational Sufficient Statistics for Large Databases
ABSTRACT: Databases contain information about which relationships do and do not hold
among entities. To make this information accessible for statistical analysis
requires computing sufficient statistics that combine information from
different database tables. Such statistics may involve any number of {\em
positive and negative} relationships. With a naive enumeration approach,
computing sufficient statistics for negative relationships is feasible only for
small databases. We solve this problem with a new dynamic programming algorithm
that performs a virtual join, where the requisite counts are computed without
materializing join tables. Contingency table algebra is a new extension of
relational algebra, that facilitates the efficient implementation of this
M\"obius virtual join operation. The M\"obius Join scales to large datasets
(over 1M tuples) with complex schemas. Empirical evaluation with seven
benchmark datasets showed that information about the presence and absence of
links can be exploited in feature selection, association rule mining, and
Bayesian network learning.
|
1410.6039 | Roberto Sebastiani | Roberto Sebastiani and Silvia Tomasi | Optimization Modulo Theories with Linear Rational Costs | Submitted on january 2014 to ACM Transactions on Computational Logic,
currently under revision. arXiv admin note: text overlap with arXiv:1202.1409 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the contexts of automated reasoning (AR) and formal verification (FV),
important decision problems are effectively encoded into Satisfiability Modulo
Theories (SMT). In the last decade efficient SMT solvers have been developed
for several theories of practical interest (e.g., linear arithmetic, arrays,
bit-vectors). Surprisingly, little work has been done to extend SMT to deal
with optimization problems; in particular, we are not aware of any previous
work on SMT solvers able to produce solutions which minimize cost functions
over arithmetical variables. This is unfortunate, since some problems of
interest require this functionality.
In the work described in this paper we start filling this gap. We present and
discuss two general procedures for leveraging SMT to handle the minimization of
linear rational cost functions, combining SMT with standard minimization
techniques. We have implemented the procedures within the MathSAT SMT solver.
Due to the absence of competitors in the AR, FV and SMT domains, we have
experimentally evaluated our implementation against state-of-the-art tools for
the domain of linear generalized disjunctive programming (LGDP), which is
closest in spirit to our domain, on sets of problems which have been previously
proposed as benchmarks for the latter tools. The results show that our tool is
very competitive with, and often outperforms, these tools on these problems,
clearly demonstrating the potential of the approach.
| [
{
"version": "v1",
"created": "Wed, 22 Oct 2014 13:39:31 GMT"
}
] | 2014-10-23T00:00:00 | [
[
"Sebastiani",
"Roberto",
""
],
[
"Tomasi",
"Silvia",
""
]
] | TITLE: Optimization Modulo Theories with Linear Rational Costs
ABSTRACT: In the contexts of automated reasoning (AR) and formal verification (FV),
important decision problems are effectively encoded into Satisfiability Modulo
Theories (SMT). In the last decade efficient SMT solvers have been developed
for several theories of practical interest (e.g., linear arithmetic, arrays,
bit-vectors). Surprisingly, little work has been done to extend SMT to deal
with optimization problems; in particular, we are not aware of any previous
work on SMT solvers able to produce solutions which minimize cost functions
over arithmetical variables. This is unfortunate, since some problems of
interest require this functionality.
In the work described in this paper we start filling this gap. We present and
discuss two general procedures for leveraging SMT to handle the minimization of
linear rational cost functions, combining SMT with standard minimization
techniques. We have implemented the procedures within the MathSAT SMT solver.
Due to the absence of competitors in the AR, FV and SMT domains, we have
experimentally evaluated our implementation against state-of-the-art tools for
the domain of linear generalized disjunctive programming (LGDP), which is
closest in spirit to our domain, on sets of problems which have been previously
proposed as benchmarks for the latter tools. The results show that our tool is
very competitive with, and often outperforms, these tools on these problems,
clearly demonstrating the potential of the approach.
|
1410.6126 | German Ros | German Ros and Jose Alvarez and Julio Guerrero | Motion Estimation via Robust Decomposition with Constrained Rank | Submitted to IEEE TIP | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we address the problem of outlier detection for robust motion
estimation by using modern sparse-low-rank decompositions, i.e., Robust
PCA-like methods, to impose global rank constraints. Robust decompositions have
shown to be good at splitting a corrupted matrix into an uncorrupted low-rank
matrix and a sparse matrix, containing outliers. However, this process only
works when matrices have relatively low rank with respect to their ambient
space, a property not met in motion estimation problems. As a solution, we
propose to exploit the partial information present in the decomposition to
decide which matches are outliers. We provide evidences showing that even when
it is not possible to recover an uncorrupted low-rank matrix, the resulting
information can be exploited for outlier detection. To this end we propose the
Robust Decomposition with Constrained Rank (RD-CR), a proximal gradient based
method that enforces the rank constraints inherent to motion estimation. We
also present a general framework to perform robust estimation for stereo Visual
Odometry, based on our RD-CR and a simple but effective compressed optimization
method that achieves high performance. Our evaluation on synthetic data and on
the KITTI dataset demonstrates the applicability of our approach in complex
scenarios and it yields state-of-the-art performance.
| [
{
"version": "v1",
"created": "Wed, 22 Oct 2014 18:15:27 GMT"
}
] | 2014-10-23T00:00:00 | [
[
"Ros",
"German",
""
],
[
"Alvarez",
"Jose",
""
],
[
"Guerrero",
"Julio",
""
]
] | TITLE: Motion Estimation via Robust Decomposition with Constrained Rank
ABSTRACT: In this work, we address the problem of outlier detection for robust motion
estimation by using modern sparse-low-rank decompositions, i.e., Robust
PCA-like methods, to impose global rank constraints. Robust decompositions have
shown to be good at splitting a corrupted matrix into an uncorrupted low-rank
matrix and a sparse matrix, containing outliers. However, this process only
works when matrices have relatively low rank with respect to their ambient
space, a property not met in motion estimation problems. As a solution, we
propose to exploit the partial information present in the decomposition to
decide which matches are outliers. We provide evidences showing that even when
it is not possible to recover an uncorrupted low-rank matrix, the resulting
information can be exploited for outlier detection. To this end we propose the
Robust Decomposition with Constrained Rank (RD-CR), a proximal gradient based
method that enforces the rank constraints inherent to motion estimation. We
also present a general framework to perform robust estimation for stereo Visual
Odometry, based on our RD-CR and a simple but effective compressed optimization
method that achieves high performance. Our evaluation on synthetic data and on
the KITTI dataset demonstrates the applicability of our approach in complex
scenarios and it yields state-of-the-art performance.
|
1406.6597 | Vincent Labatut | G\"unce Keziban Orman, Vincent Labatut, Marc Plantevit (LIRIS),
Jean-Fran\c{c}ois Boulicaut (LIRIS) | A Method for Characterizing Communities in Dynamic Attributed Complex
Networks | IEEE/ACM International Conference on Advances in Social Network
Analysis and Mining (ASONAM), P\'ekin : China (2014) | null | 10.1109/ASONAM.2014.6921629 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many methods have been proposed to detect communities, not only in plain, but
also in attributed, directed or even dynamic complex networks. In its simplest
form, a community structure takes the form of a partition of the node set. From
the modeling point of view, to be of some utility, this partition must then be
characterized relatively to the properties of the studied system. However, if
most of the existing works focus on defining methods for the detection of
communities, only very few try to tackle this interpretation problem. Moreover,
the existing approaches are limited either in the type of data they handle, or
by the nature of the results they output. In this work, we propose a method to
efficiently support such a characterization task. We first define a
sequence-based representation of networks, combining temporal information,
topological measures, and nodal attributes. We then describe how to identify
the most emerging sequential patterns of this dataset, and use them to
characterize the communities. We also show how to detect unusual behavior in a
community, and highlight outliers. Finally, as an illustration, we apply our
method to a network of scientific collaborations.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2014 14:54:52 GMT"
}
] | 2014-10-22T00:00:00 | [
[
"Orman",
"Günce Keziban",
"",
"LIRIS"
],
[
"Labatut",
"Vincent",
"",
"LIRIS"
],
[
"Plantevit",
"Marc",
"",
"LIRIS"
],
[
"Boulicaut",
"Jean-François",
"",
"LIRIS"
]
] | TITLE: A Method for Characterizing Communities in Dynamic Attributed Complex
Networks
ABSTRACT: Many methods have been proposed to detect communities, not only in plain, but
also in attributed, directed or even dynamic complex networks. In its simplest
form, a community structure takes the form of a partition of the node set. From
the modeling point of view, to be of some utility, this partition must then be
characterized relatively to the properties of the studied system. However, if
most of the existing works focus on defining methods for the detection of
communities, only very few try to tackle this interpretation problem. Moreover,
the existing approaches are limited either in the type of data they handle, or
by the nature of the results they output. In this work, we propose a method to
efficiently support such a characterization task. We first define a
sequence-based representation of networks, combining temporal information,
topological measures, and nodal attributes. We then describe how to identify
the most emerging sequential patterns of this dataset, and use them to
characterize the communities. We also show how to detect unusual behavior in a
community, and highlight outliers. Finally, as an illustration, we apply our
method to a network of scientific collaborations.
|
1410.5467 | Josef Urban | Cezary Kaliszyk, Lionel Mamane, Josef Urban | Machine Learning of Coq Proof Guidance: First Experiments | null | null | null | null | cs.LO cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We report the results of the first experiments with learning proof
dependencies from the formalizations done with the Coq system. We explain the
process of obtaining the dependencies from the Coq proofs, the characterization
of formulas that is used for the learning, and the evaluation method. Various
machine learning methods are compared on a dataset of 5021 toplevel Coq proofs
coming from the CoRN repository. The best resulting method covers on average
75% of the needed proof dependencies among the first 100 predictions, which is
a comparable performance of such initial experiments on other large-theory
corpora.
| [
{
"version": "v1",
"created": "Mon, 20 Oct 2014 21:16:52 GMT"
}
] | 2014-10-22T00:00:00 | [
[
"Kaliszyk",
"Cezary",
""
],
[
"Mamane",
"Lionel",
""
],
[
"Urban",
"Josef",
""
]
] | TITLE: Machine Learning of Coq Proof Guidance: First Experiments
ABSTRACT: We report the results of the first experiments with learning proof
dependencies from the formalizations done with the Coq system. We explain the
process of obtaining the dependencies from the Coq proofs, the characterization
of formulas that is used for the learning, and the evaluation method. Various
machine learning methods are compared on a dataset of 5021 toplevel Coq proofs
coming from the CoRN repository. The best resulting method covers on average
75% of the needed proof dependencies among the first 100 predictions, which is
a comparable performance of such initial experiments on other large-theory
corpora.
|
1410.5476 | Josef Urban | Cezary Kaliszyk, Josef Urban, Jiri Vyskocil | Certified Connection Tableaux Proofs for HOL Light and TPTP | null | null | null | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the recent years, the Metis prover based on ordered paramodulation and
model elimination has replaced the earlier built-in methods for general-purpose
proof automation in HOL4 and Isabelle/HOL. In the annual CASC competition, the
leanCoP system based on connection tableaux has however performed better than
Metis. In this paper we show how the leanCoP's core algorithm can be
implemented inside HOLLight. leanCoP's flagship feature, namely its
minimalistic core, results in a very simple proof system. This plays a crucial
role in extending the MESON proof reconstruction mechanism to connection
tableaux proofs, providing an implementation of leanCoP that certifies its
proofs. We discuss the differences between our direct implementation using an
explicit Prolog stack, to the continuation passing implementation of MESON
present in HOLLight and compare their performance on all core HOLLight goals.
The resulting prover can be also used as a general purpose TPTP prover. We
compare its performance against the resolution based Metis on TPTP and other
interesting datasets.
| [
{
"version": "v1",
"created": "Mon, 20 Oct 2014 21:36:47 GMT"
}
] | 2014-10-22T00:00:00 | [
[
"Kaliszyk",
"Cezary",
""
],
[
"Urban",
"Josef",
""
],
[
"Vyskocil",
"Jiri",
""
]
] | TITLE: Certified Connection Tableaux Proofs for HOL Light and TPTP
ABSTRACT: In the recent years, the Metis prover based on ordered paramodulation and
model elimination has replaced the earlier built-in methods for general-purpose
proof automation in HOL4 and Isabelle/HOL. In the annual CASC competition, the
leanCoP system based on connection tableaux has however performed better than
Metis. In this paper we show how the leanCoP's core algorithm can be
implemented inside HOLLight. leanCoP's flagship feature, namely its
minimalistic core, results in a very simple proof system. This plays a crucial
role in extending the MESON proof reconstruction mechanism to connection
tableaux proofs, providing an implementation of leanCoP that certifies its
proofs. We discuss the differences between our direct implementation using an
explicit Prolog stack, to the continuation passing implementation of MESON
present in HOLLight and compare their performance on all core HOLLight goals.
The resulting prover can be also used as a general purpose TPTP prover. We
compare its performance against the resolution based Metis on TPTP and other
interesting datasets.
|
1410.5652 | Andr\'as Kir\'aly Ph.D. | Tam\'as Varga, Andr\'as Kir\'aly, J\'anos Abonyi | Improvement of PSO algorithm by memory based gradient search -
application in inventory management | book chapter, 20 pages, 7 figures, 2 tables | Swarm Intelligence and Bio-Inspired Computation: Theory and
Applications, 1st Edition, pages 403-422. Elsevier, Oxford, 2013 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advanced inventory management in complex supply chains requires effective and
robust nonlinear optimization due to the stochastic nature of supply and demand
variations. Application of estimated gradients can boost up the convergence of
Particle Swarm Optimization (PSO) algorithm but classical gradient calculation
cannot be applied to stochastic and uncertain systems. In these situations
Monte-Carlo (MC) simulation can be applied to determine the gradient. We
developed a memory based algorithm where instead of generating and evaluating
new simulated samples the stored and shared former function evaluations of the
particles are sampled to estimate the gradients by local weighted least squares
regression. The performance of the resulted regional gradient-based PSO is
verified by several benchmark problems and in a complex application example
where optimal reorder points of a supply chain are determined.
| [
{
"version": "v1",
"created": "Tue, 21 Oct 2014 13:40:23 GMT"
}
] | 2014-10-22T00:00:00 | [
[
"Varga",
"Tamás",
""
],
[
"Király",
"András",
""
],
[
"Abonyi",
"János",
""
]
] | TITLE: Improvement of PSO algorithm by memory based gradient search -
application in inventory management
ABSTRACT: Advanced inventory management in complex supply chains requires effective and
robust nonlinear optimization due to the stochastic nature of supply and demand
variations. Application of estimated gradients can boost up the convergence of
Particle Swarm Optimization (PSO) algorithm but classical gradient calculation
cannot be applied to stochastic and uncertain systems. In these situations
Monte-Carlo (MC) simulation can be applied to determine the gradient. We
developed a memory based algorithm where instead of generating and evaluating
new simulated samples the stored and shared former function evaluations of the
particles are sampled to estimate the gradients by local weighted least squares
regression. The performance of the resulted regional gradient-based PSO is
verified by several benchmark problems and in a complex application example
where optimal reorder points of a supply chain are determined.
|
1410.5684 | Saahil Ognawala | Saahil Ognawala and Justin Bayer | Regularizing Recurrent Networks - On Injected Noise and Norm-based
Methods | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advancements in parallel processing have lead to a surge in multilayer
perceptrons' (MLP) applications and deep learning in the past decades.
Recurrent Neural Networks (RNNs) give additional representational power to
feedforward MLPs by providing a way to treat sequential data. However, RNNs are
hard to train using conventional error backpropagation methods because of the
difficulty in relating inputs over many time-steps. Regularization approaches
from MLP sphere, like dropout and noisy weight training, have been
insufficiently applied and tested on simple RNNs. Moreover, solutions have been
proposed to improve convergence in RNNs but not enough to improve the long term
dependency remembering capabilities thereof.
In this study, we aim to empirically evaluate the remembering and
generalization ability of RNNs on polyphonic musical datasets. The models are
trained with injected noise, random dropout, norm-based regularizers and their
respective performances compared to well-initialized plain RNNs and advanced
regularization methods like fast-dropout. We conclude with evidence that
training with noise does not improve performance as conjectured by a few works
in RNN optimization before ours.
| [
{
"version": "v1",
"created": "Tue, 21 Oct 2014 14:36:26 GMT"
}
] | 2014-10-22T00:00:00 | [
[
"Ognawala",
"Saahil",
""
],
[
"Bayer",
"Justin",
""
]
] | TITLE: Regularizing Recurrent Networks - On Injected Noise and Norm-based
Methods
ABSTRACT: Advancements in parallel processing have lead to a surge in multilayer
perceptrons' (MLP) applications and deep learning in the past decades.
Recurrent Neural Networks (RNNs) give additional representational power to
feedforward MLPs by providing a way to treat sequential data. However, RNNs are
hard to train using conventional error backpropagation methods because of the
difficulty in relating inputs over many time-steps. Regularization approaches
from MLP sphere, like dropout and noisy weight training, have been
insufficiently applied and tested on simple RNNs. Moreover, solutions have been
proposed to improve convergence in RNNs but not enough to improve the long term
dependency remembering capabilities thereof.
In this study, we aim to empirically evaluate the remembering and
generalization ability of RNNs on polyphonic musical datasets. The models are
trained with injected noise, random dropout, norm-based regularizers and their
respective performances compared to well-initialized plain RNNs and advanced
regularization methods like fast-dropout. We conclude with evidence that
training with noise does not improve performance as conjectured by a few works
in RNN optimization before ours.
|
1302.6636 | Tamara Kolda | Tamara G. Kolda and Ali Pinar and Todd Plantenga and C. Seshadhri | A Scalable Generative Graph Model with Community Structure | null | SIAM Journal on Scientific Computing, Vol. 36, No. 5, pp.
C424-C452, September 2014 | 10.1137/130914218 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network data is ubiquitous and growing, yet we lack realistic generative
network models that can be calibrated to match real-world data. The recently
proposed Block Two-Level Erdss-Renyi (BTER) model can be tuned to capture two
fundamental properties: degree distribution and clustering coefficients. The
latter is particularly important for reproducing graphs with community
structure, such as social networks. In this paper, we compare BTER to other
scalable models and show that it gives a better fit to real data. We provide a
scalable implementation that requires only O(d_max) storage where d_max is the
maximum number of neighbors for a single node. The generator is trivially
parallelizable, and we show results for a Hadoop MapReduce implementation for a
modeling a real-world web graph with over 4.6 billion edges. We propose that
the BTER model can be used as a graph generator for benchmarking purposes and
provide idealized degree distributions and clustering coefficient profiles that
can be tuned for user specifications.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2013 00:53:12 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Mar 2013 21:11:37 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Dec 2013 01:22:52 GMT"
}
] | 2014-10-21T00:00:00 | [
[
"Kolda",
"Tamara G.",
""
],
[
"Pinar",
"Ali",
""
],
[
"Plantenga",
"Todd",
""
],
[
"Seshadhri",
"C.",
""
]
] | TITLE: A Scalable Generative Graph Model with Community Structure
ABSTRACT: Network data is ubiquitous and growing, yet we lack realistic generative
network models that can be calibrated to match real-world data. The recently
proposed Block Two-Level Erdss-Renyi (BTER) model can be tuned to capture two
fundamental properties: degree distribution and clustering coefficients. The
latter is particularly important for reproducing graphs with community
structure, such as social networks. In this paper, we compare BTER to other
scalable models and show that it gives a better fit to real data. We provide a
scalable implementation that requires only O(d_max) storage where d_max is the
maximum number of neighbors for a single node. The generator is trivially
parallelizable, and we show results for a Hadoop MapReduce implementation for a
modeling a real-world web graph with over 4.6 billion edges. We propose that
the BTER model can be used as a graph generator for benchmarking purposes and
provide idealized degree distributions and clustering coefficient profiles that
can be tuned for user specifications.
|
1312.3968 | Philip Schniter | Mark Borgerding, Philip Schniter, and Sundeep Rangan | Generalized Approximate Message Passing for Cosparse Analysis
Compressive Sensing | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In cosparse analysis compressive sensing (CS), one seeks to estimate a
non-sparse signal vector from noisy sub-Nyquist linear measurements by
exploiting the knowledge that a given linear transform of the signal is
cosparse, i.e., has sufficiently many zeros. We propose a novel approach to
cosparse analysis CS based on the generalized approximate message passing
(GAMP) algorithm. Unlike other AMP-based approaches to this problem, ours works
with a wide range of analysis operators and regularizers. In addition, we
propose a novel $\ell_0$-like soft-thresholder based on MMSE denoising for a
spike-and-slab distribution with an infinite-variance slab. Numerical
demonstrations on synthetic and practical datasets demonstrate advantages over
existing AMP-based, greedy, and reweighted-$\ell_1$ approaches.
| [
{
"version": "v1",
"created": "Fri, 13 Dec 2013 21:51:20 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Oct 2014 19:12:54 GMT"
}
] | 2014-10-21T00:00:00 | [
[
"Borgerding",
"Mark",
""
],
[
"Schniter",
"Philip",
""
],
[
"Rangan",
"Sundeep",
""
]
] | TITLE: Generalized Approximate Message Passing for Cosparse Analysis
Compressive Sensing
ABSTRACT: In cosparse analysis compressive sensing (CS), one seeks to estimate a
non-sparse signal vector from noisy sub-Nyquist linear measurements by
exploiting the knowledge that a given linear transform of the signal is
cosparse, i.e., has sufficiently many zeros. We propose a novel approach to
cosparse analysis CS based on the generalized approximate message passing
(GAMP) algorithm. Unlike other AMP-based approaches to this problem, ours works
with a wide range of analysis operators and regularizers. In addition, we
propose a novel $\ell_0$-like soft-thresholder based on MMSE denoising for a
spike-and-slab distribution with an infinite-variance slab. Numerical
demonstrations on synthetic and practical datasets demonstrate advantages over
existing AMP-based, greedy, and reweighted-$\ell_1$ approaches.
|
1410.4966 | Shay Cohen | Chiraag Lala and Shay B. Cohen | The Visualization of Change in Word Meaning over Time using Temporal
Word Embeddings | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a visualization tool that can be used to view the change in
meaning of words over time. The tool makes use of existing (static) word
embedding datasets together with a timestamped $n$-gram corpus to create {\em
temporal} word embeddings.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 2014 14:53:19 GMT"
}
] | 2014-10-21T00:00:00 | [
[
"Lala",
"Chiraag",
""
],
[
"Cohen",
"Shay B.",
""
]
] | TITLE: The Visualization of Change in Word Meaning over Time using Temporal
Word Embeddings
ABSTRACT: We describe a visualization tool that can be used to view the change in
meaning of words over time. The tool makes use of existing (static) word
embedding datasets together with a timestamped $n$-gram corpus to create {\em
temporal} word embeddings.
|
1410.4984 | Zhenwen Dai | Zhenwen Dai, Andreas Damianou, James Hensman, Neil Lawrence | Gaussian Process Models with Parallelization and GPU acceleration | null | null | null | null | cs.DC cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we present an extension of Gaussian process (GP) models with
sophisticated parallelization and GPU acceleration. The parallelization scheme
arises naturally from the modular computational structure w.r.t. datapoints in
the sparse Gaussian process formulation. Additionally, the computational
bottleneck is implemented with GPU acceleration for further speed up. Combining
both techniques allows applying Gaussian process models to millions of
datapoints. The efficiency of our algorithm is demonstrated with a synthetic
dataset. Its source code has been integrated into our popular software library
GPy.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 2014 18:12:57 GMT"
}
] | 2014-10-21T00:00:00 | [
[
"Dai",
"Zhenwen",
""
],
[
"Damianou",
"Andreas",
""
],
[
"Hensman",
"James",
""
],
[
"Lawrence",
"Neil",
""
]
] | TITLE: Gaussian Process Models with Parallelization and GPU acceleration
ABSTRACT: In this work, we present an extension of Gaussian process (GP) models with
sophisticated parallelization and GPU acceleration. The parallelization scheme
arises naturally from the modular computational structure w.r.t. datapoints in
the sparse Gaussian process formulation. Additionally, the computational
bottleneck is implemented with GPU acceleration for further speed up. Combining
both techniques allows applying Gaussian process models to millions of
datapoints. The efficiency of our algorithm is demonstrated with a synthetic
dataset. Its source code has been integrated into our popular software library
GPy.
|
1403.1349 | Sam Anzaroot | Sam Anzaroot, Alexandre Passos, David Belanger, Andrew McCallum | Learning Soft Linear Constraints with Application to Citation Field
Extraction | appears in Proc. the 52nd Annual Meeting of the Association for
Computational Linguistics (ACL2014) | null | null | null | cs.CL cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurately segmenting a citation string into fields for authors, titles, etc.
is a challenging task because the output typically obeys various global
constraints. Previous work has shown that modeling soft constraints, where the
model is encouraged, but not require to obey the constraints, can substantially
improve segmentation performance. On the other hand, for imposing hard
constraints, dual decomposition is a popular technique for efficient prediction
given existing algorithms for unconstrained inference. We extend the technique
to perform prediction subject to soft constraints. Moreover, with a technique
for performing inference given soft constraints, it is easy to automatically
generate large families of constraints and learn their costs with a simple
convex optimization problem during training. This allows us to obtain
substantial gains in accuracy on a new, challenging citation extraction
dataset.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2014 05:24:02 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Oct 2014 13:27:02 GMT"
}
] | 2014-10-20T00:00:00 | [
[
"Anzaroot",
"Sam",
""
],
[
"Passos",
"Alexandre",
""
],
[
"Belanger",
"David",
""
],
[
"McCallum",
"Andrew",
""
]
] | TITLE: Learning Soft Linear Constraints with Application to Citation Field
Extraction
ABSTRACT: Accurately segmenting a citation string into fields for authors, titles, etc.
is a challenging task because the output typically obeys various global
constraints. Previous work has shown that modeling soft constraints, where the
model is encouraged, but not require to obey the constraints, can substantially
improve segmentation performance. On the other hand, for imposing hard
constraints, dual decomposition is a popular technique for efficient prediction
given existing algorithms for unconstrained inference. We extend the technique
to perform prediction subject to soft constraints. Moreover, with a technique
for performing inference given soft constraints, it is easy to automatically
generate large families of constraints and learn their costs with a simple
convex optimization problem during training. This allows us to obtain
substantial gains in accuracy on a new, challenging citation extraction
dataset.
|
1410.4673 | Zhiding Yu | Weiyang Liu, Zhiding Yu, Lijia Lu, Yandong Wen, Hui Li and Yuexian Zou | KCRC-LCD: Discriminative Kernel Collaborative Representation with
Locality Constrained Dictionary for Visual Categorization | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the image classification problem via kernel collaborative
representation classification with locality constrained dictionary (KCRC-LCD).
Specifically, we propose a kernel collaborative representation classification
(KCRC) approach in which kernel method is used to improve the discrimination
ability of collaborative representation classification (CRC). We then measure
the similarities between the query and atoms in the global dictionary in order
to construct a locality constrained dictionary (LCD) for KCRC. In addition, we
discuss several similarity measure approaches in LCD and further present a
simple yet effective unified similarity measure whose superiority is validated
in experiments. There are several appealing aspects associated with LCD. First,
LCD can be nicely incorporated under the framework of KCRC. The LCD similarity
measure can be kernelized under KCRC, which theoretically links CRC and LCD
under the kernel method. Second, KCRC-LCD becomes more scalable to both the
training set size and the feature dimension. Example shows that KCRC is able to
perfectly classify data with certain distribution, while conventional CRC fails
completely. Comprehensive experiments on many public datasets also show that
KCRC-LCD is a robust discriminative classifier with both excellent performance
and good scalability, being comparable or outperforming many other
state-of-the-art approaches.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2014 09:40:20 GMT"
}
] | 2014-10-20T00:00:00 | [
[
"Liu",
"Weiyang",
""
],
[
"Yu",
"Zhiding",
""
],
[
"Lu",
"Lijia",
""
],
[
"Wen",
"Yandong",
""
],
[
"Li",
"Hui",
""
],
[
"Zou",
"Yuexian",
""
]
] | TITLE: KCRC-LCD: Discriminative Kernel Collaborative Representation with
Locality Constrained Dictionary for Visual Categorization
ABSTRACT: We consider the image classification problem via kernel collaborative
representation classification with locality constrained dictionary (KCRC-LCD).
Specifically, we propose a kernel collaborative representation classification
(KCRC) approach in which kernel method is used to improve the discrimination
ability of collaborative representation classification (CRC). We then measure
the similarities between the query and atoms in the global dictionary in order
to construct a locality constrained dictionary (LCD) for KCRC. In addition, we
discuss several similarity measure approaches in LCD and further present a
simple yet effective unified similarity measure whose superiority is validated
in experiments. There are several appealing aspects associated with LCD. First,
LCD can be nicely incorporated under the framework of KCRC. The LCD similarity
measure can be kernelized under KCRC, which theoretically links CRC and LCD
under the kernel method. Second, KCRC-LCD becomes more scalable to both the
training set size and the feature dimension. Example shows that KCRC is able to
perfectly classify data with certain distribution, while conventional CRC fails
completely. Comprehensive experiments on many public datasets also show that
KCRC-LCD is a robust discriminative classifier with both excellent performance
and good scalability, being comparable or outperforming many other
state-of-the-art approaches.
|
1403.6985 | Kostyantyn Demchuk | Kostyantyn Demchuk and Douglas J. Leith | A Fast Minimal Infrequent Itemset Mining Algorithm | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel fast algorithm for finding quasi identifiers in large datasets is
presented. Performance measurements on a broad range of datasets demonstrate
substantial reductions in run-time relative to the state of the art and the
scalability of the algorithm to realistically-sized datasets up to several
million records.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2014 11:54:27 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2014 15:53:20 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Oct 2014 14:56:52 GMT"
}
] | 2014-10-17T00:00:00 | [
[
"Demchuk",
"Kostyantyn",
""
],
[
"Leith",
"Douglas J.",
""
]
] | TITLE: A Fast Minimal Infrequent Itemset Mining Algorithm
ABSTRACT: A novel fast algorithm for finding quasi identifiers in large datasets is
presented. Performance measurements on a broad range of datasets demonstrate
substantial reductions in run-time relative to the state of the art and the
scalability of the algorithm to realistically-sized datasets up to several
million records.
|
1410.4341 | Manasij Venkatesh | Manasij Venkatesh, Vikas Majjagi, and Deepu Vijayasenan | Implicit segmentation of Kannada characters in offline handwriting
recognition using hidden Markov models | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a method for classification of handwritten Kannada characters
using Hidden Markov Models (HMMs). Kannada script is agglutinative, where
simple shapes are concatenated horizontally to form a character. This results
in a large number of characters making the task of classification difficult.
Character segmentation plays a significant role in reducing the number of
classes. Explicit segmentation techniques suffer when overlapping shapes are
present, which is common in the case of handwritten text. We use HMMs to take
advantage of the agglutinative nature of Kannada script, which allows us to
perform implicit segmentation of characters along with recognition. All the
experiments are performed on the Chars74k dataset that consists of 657
handwritten characters collected across multiple users. Gradient-based features
are extracted from individual characters and are used to train character HMMs.
The use of implicit segmentation technique at the character level resulted in
an improvement of around 10%. This system also outperformed an existing system
tested on the same dataset by around 16%. Analysis based on learning curves
showed that increasing the training data could result in better accuracy.
Accordingly, we collected additional data and obtained an improvement of 4%
with 6 additional samples.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2014 09:09:45 GMT"
}
] | 2014-10-17T00:00:00 | [
[
"Venkatesh",
"Manasij",
""
],
[
"Majjagi",
"Vikas",
""
],
[
"Vijayasenan",
"Deepu",
""
]
] | TITLE: Implicit segmentation of Kannada characters in offline handwriting
recognition using hidden Markov models
ABSTRACT: We describe a method for classification of handwritten Kannada characters
using Hidden Markov Models (HMMs). Kannada script is agglutinative, where
simple shapes are concatenated horizontally to form a character. This results
in a large number of characters making the task of classification difficult.
Character segmentation plays a significant role in reducing the number of
classes. Explicit segmentation techniques suffer when overlapping shapes are
present, which is common in the case of handwritten text. We use HMMs to take
advantage of the agglutinative nature of Kannada script, which allows us to
perform implicit segmentation of characters along with recognition. All the
experiments are performed on the Chars74k dataset that consists of 657
handwritten characters collected across multiple users. Gradient-based features
are extracted from individual characters and are used to train character HMMs.
The use of implicit segmentation technique at the character level resulted in
an improvement of around 10%. This system also outperformed an existing system
tested on the same dataset by around 16%. Analysis based on learning curves
showed that increasing the training data could result in better accuracy.
Accordingly, we collected additional data and obtained an improvement of 4%
with 6 additional samples.
|
1312.5306 | Patrick J. Wolfe | Sofia C. Olhede and Patrick J. Wolfe | Network histograms and universality of blockmodel approximation | 27 pages, 4 figures; revised version with link to software | Proceedings of the National Academy of Sciences of the USA 2014,
Vol. 111, No. 41, 14722-14727 | 10.1073/pnas.1400374111 | null | stat.ME cs.SI math.CO math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we introduce the network histogram: a statistical summary of
network interactions, to be used as a tool for exploratory data analysis. A
network histogram is obtained by fitting a stochastic blockmodel to a single
observation of a network dataset. Blocks of edges play the role of histogram
bins, and community sizes that of histogram bandwidths or bin sizes. Just as
standard histograms allow for varying bandwidths, different blockmodel
estimates can all be considered valid representations of an underlying
probability model, subject to bandwidth constraints. Here we provide methods
for automatic bandwidth selection, by which the network histogram approximates
the generating mechanism that gives rise to exchangeable random graphs. This
makes the blockmodel a universal network representation for unlabeled graphs.
With this insight, we discuss the interpretation of network communities in
light of the fact that many different community assignments can all give an
equally valid representation of such a network. To demonstrate the
fidelity-versus-interpretability tradeoff inherent in considering different
numbers and sizes of communities, we analyze two publicly available networks -
political weblogs and student friendships - and discuss how to interpret the
network histogram when additional information related to node and edge labeling
is present.
| [
{
"version": "v1",
"created": "Wed, 18 Dec 2013 20:50:06 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Aug 2014 09:18:30 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Sep 2014 21:34:36 GMT"
}
] | 2014-10-16T00:00:00 | [
[
"Olhede",
"Sofia C.",
""
],
[
"Wolfe",
"Patrick J.",
""
]
] | TITLE: Network histograms and universality of blockmodel approximation
ABSTRACT: In this article we introduce the network histogram: a statistical summary of
network interactions, to be used as a tool for exploratory data analysis. A
network histogram is obtained by fitting a stochastic blockmodel to a single
observation of a network dataset. Blocks of edges play the role of histogram
bins, and community sizes that of histogram bandwidths or bin sizes. Just as
standard histograms allow for varying bandwidths, different blockmodel
estimates can all be considered valid representations of an underlying
probability model, subject to bandwidth constraints. Here we provide methods
for automatic bandwidth selection, by which the network histogram approximates
the generating mechanism that gives rise to exchangeable random graphs. This
makes the blockmodel a universal network representation for unlabeled graphs.
With this insight, we discuss the interpretation of network communities in
light of the fact that many different community assignments can all give an
equally valid representation of such a network. To demonstrate the
fidelity-versus-interpretability tradeoff inherent in considering different
numbers and sizes of communities, we analyze two publicly available networks -
political weblogs and student friendships - and discuss how to interpret the
network histogram when additional information related to node and edge labeling
is present.
|
1408.0872 | Shengcai Liao | Shengcai Liao, Zhipeng Mo, Jianqing Zhu, Yang Hu, and Stan Z. Li | Open-set Person Re-identification | The OPeRID v1.0 dataset and evaluation toolkit is now available to
download at http://www.cbsr.ia.ac.cn/users/scliao/projects/operidv1/ | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Person re-identification is becoming a hot research for developing both
machine learning algorithms and video surveillance applications. The task of
person re-identification is to determine which person in a gallery has the same
identity to a probe image. This task basically assumes that the subject of the
probe image belongs to the gallery, that is, the gallery contains this person.
However, in practical applications such as searching a suspect in a video, this
assumption is usually not true. In this paper, we consider the open-set person
re-identification problem, which includes two sub-tasks, detection and
identification. The detection sub-task is to determine the presence of the
probe subject in the gallery, and the identification sub-task is to determine
which person in the gallery has the same identity as the accepted probe. We
present a database collected from a video surveillance setting of 6 cameras,
with 200 persons and 7,413 images segmented. Based on this database, we develop
a benchmark protocol for evaluating the performance under the open-set person
re-identification scenario. Several popular metric learning algorithms for
person re-identification have been evaluated as baselines. From the baseline
performance, we observe that the open-set person re-identification problem is
still largely unresolved, thus further attention and effort is needed.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2014 05:55:16 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Oct 2014 14:28:08 GMT"
}
] | 2014-10-16T00:00:00 | [
[
"Liao",
"Shengcai",
""
],
[
"Mo",
"Zhipeng",
""
],
[
"Zhu",
"Jianqing",
""
],
[
"Hu",
"Yang",
""
],
[
"Li",
"Stan Z.",
""
]
] | TITLE: Open-set Person Re-identification
ABSTRACT: Person re-identification is becoming a hot research for developing both
machine learning algorithms and video surveillance applications. The task of
person re-identification is to determine which person in a gallery has the same
identity to a probe image. This task basically assumes that the subject of the
probe image belongs to the gallery, that is, the gallery contains this person.
However, in practical applications such as searching a suspect in a video, this
assumption is usually not true. In this paper, we consider the open-set person
re-identification problem, which includes two sub-tasks, detection and
identification. The detection sub-task is to determine the presence of the
probe subject in the gallery, and the identification sub-task is to determine
which person in the gallery has the same identity as the accepted probe. We
present a database collected from a video surveillance setting of 6 cameras,
with 200 persons and 7,413 images segmented. Based on this database, we develop
a benchmark protocol for evaluating the performance under the open-set person
re-identification scenario. Several popular metric learning algorithms for
person re-identification have been evaluated as baselines. From the baseline
performance, we observe that the open-set person re-identification problem is
still largely unresolved, thus further attention and effort is needed.
|
1410.3862 | James Balhoff | James P. Balhoff, T. Alexander Dececchi, Paula M. Mabee, Hilmar Lapp | Presence-absence reasoning for evolutionary phenotypes | 4 pages. Peer-reviewed submission presented to the Bio-ontologies SIG
Phenotype Day at ISMB 2014, Boston, Mass.
http://phenoday2014.bio-lark.org/pdf/11.pdf | James P. Balhoff, T. Alexander Dececchi, Paula M. Mabee, Hilmar
Lapp. 2014. Presence-absence reasoning for evolutionary phenotypes. In
proceedings of Phenotype Day of the Bio-ontologies SIG at ISMB 2014 | null | null | cs.AI q-bio.QM | http://creativecommons.org/licenses/by/3.0/ | Nearly invariably, phenotypes are reported in the scientific literature in
meticulous detail, utilizing the full expressivity of natural language. Often
it is particularly these detailed observations (facts) that are of interest,
and thus specific to the research questions that motivated observing and
reporting them. However, research aiming to synthesize or integrate phenotype
data across many studies or even fields is often faced with the need to
abstract from detailed observations so as to construct phenotypic concepts that
are common across many datasets rather than specific to a few. Yet,
observations or facts that would fall under such abstracted concepts are
typically not directly asserted by the original authors, usually because they
are "obvious" according to common domain knowledge, and thus asserting them
would be deemed redundant by anyone with sufficient domain knowledge. For
example, a phenotype describing the length of a manual digit for an organism
implicitly means that the organism must have had a hand, and thus a forelimb;
the presence or absence of a forelimb may have supporting data across a far
wider range of taxa than the length of a particular manual digit. Here we
describe how within the Phenoscape project we use a pipeline of OWL axiom
generation and reasoning steps to infer taxon-specific presence/absence of
anatomical entities from anatomical phenotypes. Although presence/absence is
all but one, and a seemingly simple way to abstract phenotypes across data
sources, it can nonetheless be powerful for linking genotype to phenotype, and
it is particularly relevant for constructing synthetic morphological
supermatrices for comparative analysis; in fact presence/absence is one of the
prevailing character observation types in published character matrices.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 20:40:28 GMT"
}
] | 2014-10-16T00:00:00 | [
[
"Balhoff",
"James P.",
""
],
[
"Dececchi",
"T. Alexander",
""
],
[
"Mabee",
"Paula M.",
""
],
[
"Lapp",
"Hilmar",
""
]
] | TITLE: Presence-absence reasoning for evolutionary phenotypes
ABSTRACT: Nearly invariably, phenotypes are reported in the scientific literature in
meticulous detail, utilizing the full expressivity of natural language. Often
it is particularly these detailed observations (facts) that are of interest,
and thus specific to the research questions that motivated observing and
reporting them. However, research aiming to synthesize or integrate phenotype
data across many studies or even fields is often faced with the need to
abstract from detailed observations so as to construct phenotypic concepts that
are common across many datasets rather than specific to a few. Yet,
observations or facts that would fall under such abstracted concepts are
typically not directly asserted by the original authors, usually because they
are "obvious" according to common domain knowledge, and thus asserting them
would be deemed redundant by anyone with sufficient domain knowledge. For
example, a phenotype describing the length of a manual digit for an organism
implicitly means that the organism must have had a hand, and thus a forelimb;
the presence or absence of a forelimb may have supporting data across a far
wider range of taxa than the length of a particular manual digit. Here we
describe how within the Phenoscape project we use a pipeline of OWL axiom
generation and reasoning steps to infer taxon-specific presence/absence of
anatomical entities from anatomical phenotypes. Although presence/absence is
all but one, and a seemingly simple way to abstract phenotypes across data
sources, it can nonetheless be powerful for linking genotype to phenotype, and
it is particularly relevant for constructing synthetic morphological
supermatrices for comparative analysis; in fact presence/absence is one of the
prevailing character observation types in published character matrices.
|
1410.3905 | Xiankai Lu | Xiankai Lu, Zheng Fang, Tao Xu, Haiting Zhang, Hongya Tuo | Efficient Image Categorization with Sparse Fisher Vector | 5pages,4 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | In object recognition, Fisher vector (FV) representation is one of the
state-of-art image representations ways at the expense of dense, high
dimensional features and increased computation time. A simplification of FV is
attractive, so we propose Sparse Fisher vector (SFV). By incorporating locality
strategy, we can accelerate the Fisher coding step in image categorization
which is implemented from a collective of local descriptors. Combining with
pooling step, we explore the relationship between coding step and pooling step
to give a theoretical explanation about SFV. Experiments on benchmark datasets
have shown that SFV leads to a speedup of several-fold of magnitude compares
with FV, while maintaining the categorization performance. In addition, we
demonstrate how SFV preserves the consistence in representation of similar
local features.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2014 02:00:29 GMT"
}
] | 2014-10-16T00:00:00 | [
[
"Lu",
"Xiankai",
""
],
[
"Fang",
"Zheng",
""
],
[
"Xu",
"Tao",
""
],
[
"Zhang",
"Haiting",
""
],
[
"Tuo",
"Hongya",
""
]
] | TITLE: Efficient Image Categorization with Sparse Fisher Vector
ABSTRACT: In object recognition, Fisher vector (FV) representation is one of the
state-of-art image representations ways at the expense of dense, high
dimensional features and increased computation time. A simplification of FV is
attractive, so we propose Sparse Fisher vector (SFV). By incorporating locality
strategy, we can accelerate the Fisher coding step in image categorization
which is implemented from a collective of local descriptors. Combining with
pooling step, we explore the relationship between coding step and pooling step
to give a theoretical explanation about SFV. Experiments on benchmark datasets
have shown that SFV leads to a speedup of several-fold of magnitude compares
with FV, while maintaining the categorization performance. In addition, we
demonstrate how SFV preserves the consistence in representation of similar
local features.
|
1410.3942 | Niharika Sachdeva | Ponnurangam Kumaraguru and Niharika Sachdeva | Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness
about ICT Use | null | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several ICT studies give anecdotal evidences showing privacy to be an area of
concern that can influence adoption of technology in the developing world.
However, in-depth understanding of end users' privacy attitudes and awareness
is largely unexplored in developing countries such as India. We conducted a
survey with 10,427 Indian citizens to bring forth various insights on privacy
expectations and perceptions of end users. Our study explores end-users'
privacy expectations on three ICT platforms - mobile phones, OSN (Online Social
Network), and government projects. Our results, though preliminary, show that
users disproportionately consider financial details as personal information in
comparison to medical records. Users heavily use mobile phones to store
personal details and show high trust in mobile service providers for protecting
the private data. However, users show concerns that mobile service provider may
allow improper access of their personal information to third parties and
government. We also find that female participants in the study were marginally
more conscious of their privacy than males. To the best of our knowledge, this
work presents the largest privacy study which benchmarks privacy perceptions
among Indian citizens. Understanding users' privacy perceptions can help
improve technology adoption and develop policies and laws for improving
technology experience and enabling development for a better life in India.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2014 06:57:44 GMT"
}
] | 2014-10-16T00:00:00 | [
[
"Kumaraguru",
"Ponnurangam",
""
],
[
"Sachdeva",
"Niharika",
""
]
] | TITLE: Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness
about ICT Use
ABSTRACT: Several ICT studies give anecdotal evidences showing privacy to be an area of
concern that can influence adoption of technology in the developing world.
However, in-depth understanding of end users' privacy attitudes and awareness
is largely unexplored in developing countries such as India. We conducted a
survey with 10,427 Indian citizens to bring forth various insights on privacy
expectations and perceptions of end users. Our study explores end-users'
privacy expectations on three ICT platforms - mobile phones, OSN (Online Social
Network), and government projects. Our results, though preliminary, show that
users disproportionately consider financial details as personal information in
comparison to medical records. Users heavily use mobile phones to store
personal details and show high trust in mobile service providers for protecting
the private data. However, users show concerns that mobile service provider may
allow improper access of their personal information to third parties and
government. We also find that female participants in the study were marginally
more conscious of their privacy than males. To the best of our knowledge, this
work presents the largest privacy study which benchmarks privacy perceptions
among Indian citizens. Understanding users' privacy perceptions can help
improve technology adoption and develop policies and laws for improving
technology experience and enabling development for a better life in India.
|
1410.4168 | Adrien Devresse | Adrien Devresse, Fabrizio Furano | Efficient HTTP based I/O on very large datasets for high performance
computing with the libdavix library | Presented at: Very large Data Bases (VLDB) 2014, Hangzhou | null | null | null | cs.PF cs.DC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Remote data access for data analysis in high performance computing is
commonly done with specialized data access protocols and storage systems. These
protocols are highly optimized for high throughput on very large datasets,
multi-streams, high availability, low latency and efficient parallel I/O. The
purpose of this paper is to describe how we have adapted a generic protocol,
the Hyper Text Transport Protocol (HTTP) to make it a competitive alternative
for high performance I/O and data analysis applications in a global computing
grid: the Worldwide LHC Computing Grid. In this work, we first analyze the
design differences between the HTTP protocol and the most common high
performance I/O protocols, pointing out the main performance weaknesses of
HTTP. Then, we describe in detail how we solved these issues. Our solutions
have been implemented in a toolkit called davix, available through several
recent Linux distributions. Finally, we describe the results of our benchmarks
where we compare the performance of davix against a HPC specific protocol for a
data analysis use case.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2014 18:57:12 GMT"
}
] | 2014-10-16T00:00:00 | [
[
"Devresse",
"Adrien",
""
],
[
"Furano",
"Fabrizio",
""
]
] | TITLE: Efficient HTTP based I/O on very large datasets for high performance
computing with the libdavix library
ABSTRACT: Remote data access for data analysis in high performance computing is
commonly done with specialized data access protocols and storage systems. These
protocols are highly optimized for high throughput on very large datasets,
multi-streams, high availability, low latency and efficient parallel I/O. The
purpose of this paper is to describe how we have adapted a generic protocol,
the Hyper Text Transport Protocol (HTTP) to make it a competitive alternative
for high performance I/O and data analysis applications in a global computing
grid: the Worldwide LHC Computing Grid. In this work, we first analyze the
design differences between the HTTP protocol and the most common high
performance I/O protocols, pointing out the main performance weaknesses of
HTTP. Then, we describe in detail how we solved these issues. Our solutions
have been implemented in a toolkit called davix, available through several
recent Linux distributions. Finally, we describe the results of our benchmarks
where we compare the performance of davix against a HPC specific protocol for a
data analysis use case.
|
1405.7903 | Carsten Gottschlich | Carsten Gottschlich and Dominic Schuhmacher | The Shortlist Method for Fast Computation of the Earth Mover's Distance
and Finding Optimal Solutions to Transportation Problems | null | PLOS ONE 9(10): e110214, Oct. 2014 | 10.1371/journal.pone.0110214 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finding solutions to the classical transportation problem is of great
importance, since this optimization problem arises in many engineering and
computer science applications. Especially the Earth Mover's Distance is used in
a plethora of applications ranging from content-based image retrieval, shape
matching, fingerprint recognition, object tracking and phishing web page
detection to computing color differences in linguistics and biology. Our
starting point is the well-known revised simplex algorithm, which iteratively
improves a feasible solution to optimality. The Shortlist Method that we
propose substantially reduces the number of candidates inspected for improving
the solution, while at the same time balancing the number of pivots required.
Tests on simulated benchmarks demonstrate a considerable reduction in
computation time for the new method as compared to the usual revised simplex
algorithm implemented with state-of-the-art initialization and pivot
strategies. As a consequence, the Shortlist Method facilitates the computation
of large scale transportation problems in viable time. In addition we describe
a novel method for finding an initial feasible solution which we coin Modified
Russell's Method.
| [
{
"version": "v1",
"created": "Fri, 30 May 2014 16:07:55 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Gottschlich",
"Carsten",
""
],
[
"Schuhmacher",
"Dominic",
""
]
] | TITLE: The Shortlist Method for Fast Computation of the Earth Mover's Distance
and Finding Optimal Solutions to Transportation Problems
ABSTRACT: Finding solutions to the classical transportation problem is of great
importance, since this optimization problem arises in many engineering and
computer science applications. Especially the Earth Mover's Distance is used in
a plethora of applications ranging from content-based image retrieval, shape
matching, fingerprint recognition, object tracking and phishing web page
detection to computing color differences in linguistics and biology. Our
starting point is the well-known revised simplex algorithm, which iteratively
improves a feasible solution to optimality. The Shortlist Method that we
propose substantially reduces the number of candidates inspected for improving
the solution, while at the same time balancing the number of pivots required.
Tests on simulated benchmarks demonstrate a considerable reduction in
computation time for the new method as compared to the usual revised simplex
algorithm implemented with state-of-the-art initialization and pivot
strategies. As a consequence, the Shortlist Method facilitates the computation
of large scale transportation problems in viable time. In addition we describe
a novel method for finding an initial feasible solution which we coin Modified
Russell's Method.
|
1408.0102 | Sandeep Kumar | Sandeep Kumar, Vivek Kumar Sharma, Rajani Kumari | Randomized Memetic Artificial Bee Colony Algorithm | arXiv admin note: text overlap with arXiv:1407.5574 | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Bee Colony (ABC) optimization algorithm is one of the recent
population based probabilistic approach developed for global optimization. ABC
is simple and has been showed significant improvement over other Nature
Inspired Algorithms (NIAs) when tested over some standard benchmark functions
and for some complex real world optimization problems. Memetic Algorithms also
become one of the key methodologies to solve the very large and complex
real-world optimization problems. The solution search equation of Memetic ABC
is based on Golden Section Search and an arbitrary value which tries to balance
exploration and exploitation of search space. But still there are some chances
to skip the exact solution due to its step size. In order to balance between
diversification and intensification capability of the Memetic ABC, it is
randomized the step size in Memetic ABC. The proposed algorithm is named as
Randomized Memetic ABC (RMABC). In RMABC, new solutions are generated nearby
the best so far solution and it helps to increase the exploitation capability
of Memetic ABC. The experiments on some test problems of different complexities
and one well known engineering optimization application show that the proposed
algorithm outperforms over Memetic ABC (MeABC) and some other variant of ABC
algorithm(like Gbest guided ABC (GABC),Hooke Jeeves ABC (HJABC), Best-So-Far
ABC (BSFABC) and Modified ABC (MABC) in case of almost all the problems.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2014 08:49:25 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Kumar",
"Sandeep",
""
],
[
"Sharma",
"Vivek Kumar",
""
],
[
"Kumari",
"Rajani",
""
]
] | TITLE: Randomized Memetic Artificial Bee Colony Algorithm
ABSTRACT: Artificial Bee Colony (ABC) optimization algorithm is one of the recent
population based probabilistic approach developed for global optimization. ABC
is simple and has been showed significant improvement over other Nature
Inspired Algorithms (NIAs) when tested over some standard benchmark functions
and for some complex real world optimization problems. Memetic Algorithms also
become one of the key methodologies to solve the very large and complex
real-world optimization problems. The solution search equation of Memetic ABC
is based on Golden Section Search and an arbitrary value which tries to balance
exploration and exploitation of search space. But still there are some chances
to skip the exact solution due to its step size. In order to balance between
diversification and intensification capability of the Memetic ABC, it is
randomized the step size in Memetic ABC. The proposed algorithm is named as
Randomized Memetic ABC (RMABC). In RMABC, new solutions are generated nearby
the best so far solution and it helps to increase the exploitation capability
of Memetic ABC. The experiments on some test problems of different complexities
and one well known engineering optimization application show that the proposed
algorithm outperforms over Memetic ABC (MeABC) and some other variant of ABC
algorithm(like Gbest guided ABC (GABC),Hooke Jeeves ABC (HJABC), Best-So-Far
ABC (BSFABC) and Modified ABC (MABC) in case of almost all the problems.
|
1409.0367 | Tom Crick | Tom Crick, Benjamin A. Hall, Samin Ishtiaq and Kenji Takeda | "Share and Enjoy": Publishing Useful and Usable Scientific Models | Accepted for the 1st International Workshop on Recomputability (part
of UCC 2014); 5 pages, LaTeX | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The reproduction and replication of reported scientific results is a hot
topic within the academic community. The retraction of numerous studies from a
wide range of disciplines, from climate science to bioscience, has drawn the
focus of many commentators, but there exists a wider socio-cultural problem
that pervades the scientific community. Sharing code, data and models often
requires extra effort; this is currently seen as a significant overhead that
may not be worth the time investment.
Automated systems, which allow easy reproduction of results, offer the
potential to incentivise a culture change and drive the adoption of new
techniques to improve the efficiency of scientific exploration. In this paper,
we discuss the value of improved access and sharing of the two key types of
results arising from work done in the computational sciences: models and
algorithms. We propose the development of an integrated cloud-based system
underpinning computational science, linking together software and data
repositories, toolchains, workflows and outputs, providing a seamless automated
infrastructure for the verification and validation of scientific models and in
particular, performance benchmarks.
| [
{
"version": "v1",
"created": "Mon, 1 Sep 2014 11:16:21 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Oct 2014 13:03:37 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Crick",
"Tom",
""
],
[
"Hall",
"Benjamin A.",
""
],
[
"Ishtiaq",
"Samin",
""
],
[
"Takeda",
"Kenji",
""
]
] | TITLE: "Share and Enjoy": Publishing Useful and Usable Scientific Models
ABSTRACT: The reproduction and replication of reported scientific results is a hot
topic within the academic community. The retraction of numerous studies from a
wide range of disciplines, from climate science to bioscience, has drawn the
focus of many commentators, but there exists a wider socio-cultural problem
that pervades the scientific community. Sharing code, data and models often
requires extra effort; this is currently seen as a significant overhead that
may not be worth the time investment.
Automated systems, which allow easy reproduction of results, offer the
potential to incentivise a culture change and drive the adoption of new
techniques to improve the efficiency of scientific exploration. In this paper,
we discuss the value of improved access and sharing of the two key types of
results arising from work done in the computational sciences: models and
algorithms. We propose the development of an integrated cloud-based system
underpinning computational science, linking together software and data
repositories, toolchains, workflows and outputs, providing a seamless automated
infrastructure for the verification and validation of scientific models and in
particular, performance benchmarks.
|
1410.3462 | Xirong Li | Xirong Li | Tag Relevance Fusion for Social Image Retrieval | null | null | 10.1007/s00530-014-0430-9 | null | cs.IR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to the subjective nature of social tagging, measuring the relevance of
social tags with respect to the visual content is crucial for retrieving the
increasing amounts of social-networked images. Witnessing the limit of a single
measurement of tag relevance, we introduce in this paper tag relevance fusion
as an extension to methods for tag relevance estimation. We present a
systematic study, covering tag relevance fusion in early and late stages, and
in supervised and unsupervised settings. Experiments on a large present-day
benchmark set show that tag relevance fusion leads to better image retrieval.
Moreover, unsupervised tag relevance fusion is found to be practically as
effective as supervised tag relevance fusion, but without the need of any
training efforts. This finding suggests the potential of tag relevance fusion
for real-world deployment.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2014 13:27:55 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Li",
"Xirong",
""
]
] | TITLE: Tag Relevance Fusion for Social Image Retrieval
ABSTRACT: Due to the subjective nature of social tagging, measuring the relevance of
social tags with respect to the visual content is crucial for retrieving the
increasing amounts of social-networked images. Witnessing the limit of a single
measurement of tag relevance, we introduce in this paper tag relevance fusion
as an extension to methods for tag relevance estimation. We present a
systematic study, covering tag relevance fusion in early and late stages, and
in supervised and unsupervised settings. Experiments on a large present-day
benchmark set show that tag relevance fusion leads to better image retrieval.
Moreover, unsupervised tag relevance fusion is found to be practically as
effective as supervised tag relevance fusion, but without the need of any
training efforts. This finding suggests the potential of tag relevance fusion
for real-world deployment.
|
1410.3463 | Lavanya Sita Tekumalla | Lavanya Sita Tekumalla, Chiranjib Bhattacharyya | Mining Block I/O Traces for Cache Preloading with Sparse Temporal
Non-parametric Mixture of Multivariate Poisson | null | null | null | null | cs.OS cs.LG cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing caching strategies, in the storage domain, though well suited to
exploit short range spatio-temporal patterns, are unable to leverage long-range
motifs for improving hitrates. Motivated by this, we investigate novel Bayesian
non-parametric modeling(BNP) techniques for count vectors, to capture long
range correlations for cache preloading, by mining Block I/O traces. Such
traces comprise of a sequence of memory accesses that can be aggregated into
high-dimensional sparse correlated count vector sequences.
While there are several state of the art BNP algorithms for clustering and
their temporal extensions for prediction, there has been no work on exploring
these for correlated count vectors. Our first contribution addresses this gap
by proposing a DP based mixture model of Multivariate Poisson (DP-MMVP) and its
temporal extension(HMM-DP-MMVP) that captures the full covariance structure of
multivariate count data. However, modeling full covariance structure for count
vectors is computationally expensive, particularly for high dimensional data.
Hence, we exploit sparsity in our count vectors, and as our main contribution,
introduce the Sparse DP mixture of multivariate Poisson(Sparse-DP-MMVP),
generalizing our DP-MMVP mixture model, also leading to more efficient
inference. We then discuss a temporal extension to our model for cache
preloading.
We take the first step towards mining historical data, to capture long range
patterns in storage traces for cache preloading. Experimentally, we show a
dramatic improvement in hitrates on benchmark traces and lay the groundwork for
further research in storage domain to reduce latencies using data mining
techniques to capture long range motifs.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2014 14:26:28 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Tekumalla",
"Lavanya Sita",
""
],
[
"Bhattacharyya",
"Chiranjib",
""
]
] | TITLE: Mining Block I/O Traces for Cache Preloading with Sparse Temporal
Non-parametric Mixture of Multivariate Poisson
ABSTRACT: Existing caching strategies, in the storage domain, though well suited to
exploit short range spatio-temporal patterns, are unable to leverage long-range
motifs for improving hitrates. Motivated by this, we investigate novel Bayesian
non-parametric modeling(BNP) techniques for count vectors, to capture long
range correlations for cache preloading, by mining Block I/O traces. Such
traces comprise of a sequence of memory accesses that can be aggregated into
high-dimensional sparse correlated count vector sequences.
While there are several state of the art BNP algorithms for clustering and
their temporal extensions for prediction, there has been no work on exploring
these for correlated count vectors. Our first contribution addresses this gap
by proposing a DP based mixture model of Multivariate Poisson (DP-MMVP) and its
temporal extension(HMM-DP-MMVP) that captures the full covariance structure of
multivariate count data. However, modeling full covariance structure for count
vectors is computationally expensive, particularly for high dimensional data.
Hence, we exploit sparsity in our count vectors, and as our main contribution,
introduce the Sparse DP mixture of multivariate Poisson(Sparse-DP-MMVP),
generalizing our DP-MMVP mixture model, also leading to more efficient
inference. We then discuss a temporal extension to our model for cache
preloading.
We take the first step towards mining historical data, to capture long range
patterns in storage traces for cache preloading. Experimentally, we show a
dramatic improvement in hitrates on benchmark traces and lay the groundwork for
further research in storage domain to reduce latencies using data mining
techniques to capture long range motifs.
|
1410.3710 | Jisun An | Haewoon Kwak and Jisun An | Understanding News Geography and Major Determinants of Global News
Coverage of Disasters | Presented at Computation+Jounalism Symposium (C+J Symposium) 2014 | null | null | null | cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we reveal the structure of global news coverage of disasters
and its determinants by using a large-scale news coverage dataset collected by
the GDELT (Global Data on Events, Location, and Tone) project that monitors
news media in over 100 languages from the whole world. Significant variables in
our hierarchical (mixed-effect) regression model, such as the number of
population, the political stability, the damage, and more, are well aligned
with a series of previous research. Yet, strong regionalism we found in news
geography highlights the necessity of the comprehensive dataset for the study
of global news coverage.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 14:36:29 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Kwak",
"Haewoon",
""
],
[
"An",
"Jisun",
""
]
] | TITLE: Understanding News Geography and Major Determinants of Global News
Coverage of Disasters
ABSTRACT: In this work, we reveal the structure of global news coverage of disasters
and its determinants by using a large-scale news coverage dataset collected by
the GDELT (Global Data on Events, Location, and Tone) project that monitors
news media in over 100 languages from the whole world. Significant variables in
our hierarchical (mixed-effect) regression model, such as the number of
population, the political stability, the damage, and more, are well aligned
with a series of previous research. Yet, strong regionalism we found in news
geography highlights the necessity of the comprehensive dataset for the study
of global news coverage.
|
1410.3748 | Chee Seng Chan | Wai Lam Hoo and Chee Seng Chan | Zero-Shot Object Recognition System based on Topic Model | To appear in IEEE Transactions on Human-Machine Systems | null | 10.1109/THMS.2014.2358649 | null | cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object recognition systems usually require fully complete manually labeled
training data to train the classifier. In this paper, we study the problem of
object recognition where the training samples are missing during the classifier
learning stage, a task also known as zero-shot learning. We propose a novel
zero-shot learning strategy that utilizes the topic model and hierarchical
class concept. Our proposed method advanced where cumbersome human annotation
stage (i.e. attribute-based classification) is eliminated. We achieve
comparable performance with state-of-the-art algorithms in four public
datasets: PubFig (67.09%), Cifar-100 (54.85%), Caltech-256 (52.14%), and
Animals with Attributes (49.65%) when unseen classes exist in the
classification task.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 16:11:43 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Hoo",
"Wai Lam",
""
],
[
"Chan",
"Chee Seng",
""
]
] | TITLE: Zero-Shot Object Recognition System based on Topic Model
ABSTRACT: Object recognition systems usually require fully complete manually labeled
training data to train the classifier. In this paper, we study the problem of
object recognition where the training samples are missing during the classifier
learning stage, a task also known as zero-shot learning. We propose a novel
zero-shot learning strategy that utilizes the topic model and hierarchical
class concept. Our proposed method advanced where cumbersome human annotation
stage (i.e. attribute-based classification) is eliminated. We achieve
comparable performance with state-of-the-art algorithms in four public
datasets: PubFig (67.09%), Cifar-100 (54.85%), Caltech-256 (52.14%), and
Animals with Attributes (49.65%) when unseen classes exist in the
classification task.
|
1410.3751 | Chee Seng Chan | Wei Ren Tan, Chee Seng Chan, Pratheepan Yogarajah and Joan Condell | A Fusion Approach for Efficient Human Skin Detection | Accepted in IEEE Transactions on Industrial Informatics, vol. 8(1),
pp. 138-147, new skin detection + ground truth (Pratheepan) dataset | IEEE Transactions on Industrial Informatics, vol. 8(1), pp.
138-147, 2012 | 10.1109/TII.2011.2172451 | null | cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A reliable human skin detection method that is adaptable to different human
skin colours and illu- mination conditions is essential for better human skin
segmentation. Even though different human skin colour detection solutions have
been successfully applied, they are prone to false skin detection and are not
able to cope with the variety of human skin colours across different ethnic.
Moreover, existing methods require high computational cost. In this paper, we
propose a novel human skin de- tection approach that combines a smoothed 2D
histogram and Gaussian model, for automatic human skin detection in colour
image(s). In our approach an eye detector is used to refine the skin model for
a specific person. The proposed approach reduces computational costs as no
training is required; and it improves the accuracy of skin detection despite
wide variation in ethnicity and illumination. To the best of our knowledge,
this is the first method to employ fusion strategy for this purpose.
Qualitative and quantitative results on three standard public datasets and a
comparison with state-of-the-art methods have shown the effectiveness and
robustness of the proposed approach.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 16:12:58 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Tan",
"Wei Ren",
""
],
[
"Chan",
"Chee Seng",
""
],
[
"Yogarajah",
"Pratheepan",
""
],
[
"Condell",
"Joan",
""
]
] | TITLE: A Fusion Approach for Efficient Human Skin Detection
ABSTRACT: A reliable human skin detection method that is adaptable to different human
skin colours and illu- mination conditions is essential for better human skin
segmentation. Even though different human skin colour detection solutions have
been successfully applied, they are prone to false skin detection and are not
able to cope with the variety of human skin colours across different ethnic.
Moreover, existing methods require high computational cost. In this paper, we
propose a novel human skin de- tection approach that combines a smoothed 2D
histogram and Gaussian model, for automatic human skin detection in colour
image(s). In our approach an eye detector is used to refine the skin model for
a specific person. The proposed approach reduces computational costs as no
training is required; and it improves the accuracy of skin detection despite
wide variation in ethnicity and illumination. To the best of our knowledge,
this is the first method to employ fusion strategy for this purpose.
Qualitative and quantitative results on three standard public datasets and a
comparison with state-of-the-art methods have shown the effectiveness and
robustness of the proposed approach.
|
1410.3752 | Chee Seng Chan | Wai Lam Hoo, Tae-Kyun Kim, Yuru Pei and Chee Seng Chan | Enhanced Random Forest with Image/Patch-Level Learning for Image
Understanding | Accepted in ICPR 2014 (Oral) | null | null | null | cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image understanding is an important research domain in the computer vision
due to its wide real-world applications. For an image understanding framework
that uses the Bag-of-Words model representation, the visual codebook is an
essential part. Random forest (RF) as a tree-structure discriminative codebook
has been a popular choice. However, the performance of the RF can be degraded
if the local patch labels are poorly assigned. In this paper, we tackle this
problem by a novel way to update the RF codebook learning for a more
discriminative codebook with the introduction of the soft class labels,
estimated from the pLSA model based on a feedback scheme. The feedback scheme
is performed on both the image and patch levels respectively, which is in
contrast to the state- of-the-art RF codebook learning that focused on either
image or patch level only. Experiments on 15-Scene and C-Pascal datasets had
shown the effectiveness of the proposed method in image understanding task.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 16:13:45 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Hoo",
"Wai Lam",
""
],
[
"Kim",
"Tae-Kyun",
""
],
[
"Pei",
"Yuru",
""
],
[
"Chan",
"Chee Seng",
""
]
] | TITLE: Enhanced Random Forest with Image/Patch-Level Learning for Image
Understanding
ABSTRACT: Image understanding is an important research domain in the computer vision
due to its wide real-world applications. For an image understanding framework
that uses the Bag-of-Words model representation, the visual codebook is an
essential part. Random forest (RF) as a tree-structure discriminative codebook
has been a popular choice. However, the performance of the RF can be degraded
if the local patch labels are poorly assigned. In this paper, we tackle this
problem by a novel way to update the RF codebook learning for a more
discriminative codebook with the introduction of the soft class labels,
estimated from the pLSA model based on a feedback scheme. The feedback scheme
is performed on both the image and patch levels respectively, which is in
contrast to the state- of-the-art RF codebook learning that focused on either
image or patch level only. Experiments on 15-Scene and C-Pascal datasets had
shown the effectiveness of the proposed method in image understanding task.
|
1410.3756 | Chee Seng Chan | Mei Kuan Lim, Ven Jyn Kok, Chen Change Loy and Chee Seng Chan | Crowd Saliency Detection via Global Similarity Structure | Accepted in ICPR 2014 (Oral). Mei Kuan Lim and Ven Jyn Kok share
equal contributions | null | null | null | cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is common for CCTV operators to overlook inter- esting events taking place
within the crowd due to large number of people in the crowded scene (i.e.
marathon, rally). Thus, there is a dire need to automate the detection of
salient crowd regions acquiring immediate attention for a more effective and
proactive surveillance. This paper proposes a novel framework to identify and
localize salient regions in a crowd scene, by transforming low-level features
extracted from crowd motion field into a global similarity structure. The
global similarity structure representation allows the discovery of the
intrinsic manifold of the motion dynamics, which could not be captured by the
low-level representation. Ranking is then performed on the global similarity
structure to identify a set of extrema. The proposed approach is unsupervised
so learning stage is eliminated. Experimental results on public datasets
demonstrates the effectiveness of exploiting such extrema in identifying
salient regions in various crowd scenarios that exhibit crowding, local
irregular motion, and unique motion areas such as sources and sinks.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 16:24:24 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Lim",
"Mei Kuan",
""
],
[
"Kok",
"Ven Jyn",
""
],
[
"Loy",
"Chen Change",
""
],
[
"Chan",
"Chee Seng",
""
]
] | TITLE: Crowd Saliency Detection via Global Similarity Structure
ABSTRACT: It is common for CCTV operators to overlook inter- esting events taking place
within the crowd due to large number of people in the crowded scene (i.e.
marathon, rally). Thus, there is a dire need to automate the detection of
salient crowd regions acquiring immediate attention for a more effective and
proactive surveillance. This paper proposes a novel framework to identify and
localize salient regions in a crowd scene, by transforming low-level features
extracted from crowd motion field into a global similarity structure. The
global similarity structure representation allows the discovery of the
intrinsic manifold of the motion dynamics, which could not be captured by the
low-level representation. Ranking is then performed on the global similarity
structure to identify a set of extrema. The proposed approach is unsupervised
so learning stage is eliminated. Experimental results on public datasets
demonstrates the effectiveness of exploiting such extrema in identifying
salient regions in various crowd scenarios that exhibit crowding, local
irregular motion, and unique motion areas such as sources and sinks.
|
1410.3791 | Rami Al-Rfou | Rami Al-Rfou, Vivek Kulkarni, Bryan Perozzi, Steven Skiena | POLYGLOT-NER: Massive Multilingual Named Entity Recognition | 9 pages, 4 figures, 5 tables | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing diversity of languages used on the web introduces a new level
of complexity to Information Retrieval (IR) systems. We can no longer assume
that textual content is written in one language or even the same language
family. In this paper, we demonstrate how to build massive multilingual
annotators with minimal human expertise and intervention. We describe a system
that builds Named Entity Recognition (NER) annotators for 40 major languages
using Wikipedia and Freebase. Our approach does not require NER human annotated
datasets or language specific resources like treebanks, parallel corpora, and
orthographic rules. The novelty of approach lies therein - using only language
agnostic techniques, while achieving competitive performance.
Our method learns distributed word representations (word embeddings) which
encode semantic and syntactic features of words in each language. Then, we
automatically generate datasets from Wikipedia link structure and Freebase
attributes. Finally, we apply two preprocessing stages (oversampling and exact
surface form matching) which do not require any linguistic expertise.
Our evaluation is two fold: First, we demonstrate the system performance on
human annotated datasets. Second, for languages where no gold-standard
benchmarks are available, we propose a new method, distant evaluation, based on
statistical machine translation.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 18:37:32 GMT"
}
] | 2014-10-15T00:00:00 | [
[
"Al-Rfou",
"Rami",
""
],
[
"Kulkarni",
"Vivek",
""
],
[
"Perozzi",
"Bryan",
""
],
[
"Skiena",
"Steven",
""
]
] | TITLE: POLYGLOT-NER: Massive Multilingual Named Entity Recognition
ABSTRACT: The increasing diversity of languages used on the web introduces a new level
of complexity to Information Retrieval (IR) systems. We can no longer assume
that textual content is written in one language or even the same language
family. In this paper, we demonstrate how to build massive multilingual
annotators with minimal human expertise and intervention. We describe a system
that builds Named Entity Recognition (NER) annotators for 40 major languages
using Wikipedia and Freebase. Our approach does not require NER human annotated
datasets or language specific resources like treebanks, parallel corpora, and
orthographic rules. The novelty of approach lies therein - using only language
agnostic techniques, while achieving competitive performance.
Our method learns distributed word representations (word embeddings) which
encode semantic and syntactic features of words in each language. Then, we
automatically generate datasets from Wikipedia link structure and Freebase
attributes. Finally, we apply two preprocessing stages (oversampling and exact
surface form matching) which do not require any linguistic expertise.
Our evaluation is two fold: First, we demonstrate the system performance on
human annotated datasets. Second, for languages where no gold-standard
benchmarks are available, we propose a new method, distant evaluation, based on
statistical machine translation.
|
1405.4044 | Nicolas Guarin-Zapata | Nicol\'as Guar\'in-Zapata, Juan G\'omez and Juan Jaramillo | Seismic Wave Scattering Through a Compressed Hybrid BEM/FEM Method | 19 pages, 13 figures | null | null | null | cs.CE math.NA physics.comp-ph | http://creativecommons.org/licenses/by/3.0/ | Approximated numerical techniques, for the solution of the elastic wave
scattering problem over semi-infinite domains are reviewed. The approximations
involve the representation of the half-space by a boundary condition described
in terms of 2D boundary element discretizations. The classical BEM matrices are
initially re-written into the form of a dense dynamic stiffness matrix and
later approximated to a banded matrix. The resulting final banded matrix is
then used like a standard finite element to solve the wave scattering problem
at lower memory requirements. The accuracy of the reviewed methods is
benchmarked against the classical problems of a semi-circular and a rectangular
canyon. Results are presented in the time and frequency domain, as well as in
terms of relative errors in the considered approximations. The main goal of the
paper is to give the analyst a method that can be used at the practising level
where an approximate solution is enough in order to support engineering
decisions.
| [
{
"version": "v1",
"created": "Fri, 16 May 2014 01:26:35 GMT"
}
] | 2014-10-14T00:00:00 | [
[
"Guarín-Zapata",
"Nicolás",
""
],
[
"Gómez",
"Juan",
""
],
[
"Jaramillo",
"Juan",
""
]
] | TITLE: Seismic Wave Scattering Through a Compressed Hybrid BEM/FEM Method
ABSTRACT: Approximated numerical techniques, for the solution of the elastic wave
scattering problem over semi-infinite domains are reviewed. The approximations
involve the representation of the half-space by a boundary condition described
in terms of 2D boundary element discretizations. The classical BEM matrices are
initially re-written into the form of a dense dynamic stiffness matrix and
later approximated to a banded matrix. The resulting final banded matrix is
then used like a standard finite element to solve the wave scattering problem
at lower memory requirements. The accuracy of the reviewed methods is
benchmarked against the classical problems of a semi-circular and a rectangular
canyon. Results are presented in the time and frequency domain, as well as in
terms of relative errors in the considered approximations. The main goal of the
paper is to give the analyst a method that can be used at the practising level
where an approximate solution is enough in order to support engineering
decisions.
|
1405.4802 | Paritosh Parmar | Paritosh Parmar | Use of Computer Vision to Detect Tangles in Tangled Objects | IEEE International Conference on Image Information Processing;
untangle; untangling; computer vision; robotic vision; untangling by robot;
Tangled-100 dataset; tangled linear deformable objects; personal robotics;
image processing | null | 10.1109/ICIIP.2013.6707551 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Untangling of structures like ropes and wires by autonomous robots can be
useful in areas such as personal robotics, industries and electrical wiring &
repairing by robots. This problem can be tackled by using computer vision
system in robot. This paper proposes a computer vision based method for
analyzing visual data acquired from camera for perceiving the overlap of wires,
ropes, hoses i.e. detecting tangles. Information obtained after processing
image according to the proposed method comprises of position of tangles in
tangled object and which wire passes over which wire. This information can then
be used to guide robot to untangle wire/s. Given an image, preprocessing is
done to remove noise. Then edges of wire are detected. After that, the image is
divided into smaller blocks and each block is checked for wire overlap/s and
finding other relevant information. TANGLED-100 dataset was introduced, which
consists of images of tangled linear deformable objects. Method discussed in
here was tested on the TANGLED-100 dataset. Accuracy achieved during
experiments was found to be 74.9%. Robotic simulations were carried out to
demonstrate the use of the proposed method in applications of robot. Proposed
method is a general method that can be used by robots working in different
situations.
| [
{
"version": "v1",
"created": "Mon, 19 May 2014 16:51:11 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Oct 2014 04:50:24 GMT"
}
] | 2014-10-14T00:00:00 | [
[
"Parmar",
"Paritosh",
""
]
] | TITLE: Use of Computer Vision to Detect Tangles in Tangled Objects
ABSTRACT: Untangling of structures like ropes and wires by autonomous robots can be
useful in areas such as personal robotics, industries and electrical wiring &
repairing by robots. This problem can be tackled by using computer vision
system in robot. This paper proposes a computer vision based method for
analyzing visual data acquired from camera for perceiving the overlap of wires,
ropes, hoses i.e. detecting tangles. Information obtained after processing
image according to the proposed method comprises of position of tangles in
tangled object and which wire passes over which wire. This information can then
be used to guide robot to untangle wire/s. Given an image, preprocessing is
done to remove noise. Then edges of wire are detected. After that, the image is
divided into smaller blocks and each block is checked for wire overlap/s and
finding other relevant information. TANGLED-100 dataset was introduced, which
consists of images of tangled linear deformable objects. Method discussed in
here was tested on the TANGLED-100 dataset. Accuracy achieved during
experiments was found to be 74.9%. Robotic simulations were carried out to
demonstrate the use of the proposed method in applications of robot. Proposed
method is a general method that can be used by robots working in different
situations.
|
1408.7039 | Eugene Goldberg | Eugene Goldberg and Panagiotis Manolios | Bug Hunting By Computing Range Reduction | The only difference of this version from the previous one is in
Section 2. We added a comparison of the performance of the CRR method and
other model checkers on an abstract counter | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a method of model checking called Computing Range Reduction
(CRR). The CRR method is based on derivation of clauses that reduce the set of
traces of reachable states in such a way that at least one counterexample
remains (if any). These clauses are derived by a technique called Partial
Quantifier Elimination (PQE). Given a number n, the CRR method finds a
counterexample of length less or equal to n or proves that such a
counterexample does not exist. We show experimentally that a PQE-solver we
developed earlier can be efficiently applied to derivation of constraining
clauses for transition relations of realistic benchmarks.
One of the most appealing features of the CRR method is that it can
potentially find long counterexamples. This is the area where it can beat model
checkers computing reachable states (or their approximations as in IC3) or
SAT-based methods of bounded model checking. PQE cannot be efficiently
simulated by a SAT-solver. This is important because the current research in
model checking is dominated by SAT-based algorithms. The CRR method is a
reminder that one should not put all eggs in one basket.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2014 14:39:58 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Sep 2014 19:04:03 GMT"
},
{
"version": "v3",
"created": "Sun, 21 Sep 2014 21:43:17 GMT"
},
{
"version": "v4",
"created": "Sat, 11 Oct 2014 20:36:37 GMT"
}
] | 2014-10-14T00:00:00 | [
[
"Goldberg",
"Eugene",
""
],
[
"Manolios",
"Panagiotis",
""
]
] | TITLE: Bug Hunting By Computing Range Reduction
ABSTRACT: We describe a method of model checking called Computing Range Reduction
(CRR). The CRR method is based on derivation of clauses that reduce the set of
traces of reachable states in such a way that at least one counterexample
remains (if any). These clauses are derived by a technique called Partial
Quantifier Elimination (PQE). Given a number n, the CRR method finds a
counterexample of length less or equal to n or proves that such a
counterexample does not exist. We show experimentally that a PQE-solver we
developed earlier can be efficiently applied to derivation of constraining
clauses for transition relations of realistic benchmarks.
One of the most appealing features of the CRR method is that it can
potentially find long counterexamples. This is the area where it can beat model
checkers computing reachable states (or their approximations as in IC3) or
SAT-based methods of bounded model checking. PQE cannot be efficiently
simulated by a SAT-solver. This is important because the current research in
model checking is dominated by SAT-based algorithms. The CRR method is a
reminder that one should not put all eggs in one basket.
|
1410.2988 | Jayakrushna Sahoo | Jayakrushna Sahoo, Ashok Kumar Das, A. Goswami | An Algorithm for Mining High Utility Closed Itemsets and Generators | null | null | null | null | cs.DB | http://creativecommons.org/licenses/by/3.0/ | Traditional association rule mining based on the support-confidence framework
provides the objective measure of the rules that are of interest to users.
However, it does not reflect the utility of the rules. To extract non-redundant
association rules in support-confidence framework frequent closed itemsets and
their generators play an important role. To extract non-redundant association
rules among high utility itemsets, high utility closed itemsets (HUCI) and
their generators should be extracted in order to apply traditional
support-confidence framework. However, no efficient method exists at present
for mining HUCIs with their generators. This paper addresses this issue. A
post-processing algorithm, called the HUCI-Miner, is proposed to mine HUCIs
with their generators. The proposed algorithm is implemented using both
synthetic and real datasets.
| [
{
"version": "v1",
"created": "Sat, 11 Oct 2014 11:30:14 GMT"
}
] | 2014-10-14T00:00:00 | [
[
"Sahoo",
"Jayakrushna",
""
],
[
"Das",
"Ashok Kumar",
""
],
[
"Goswami",
"A.",
""
]
] | TITLE: An Algorithm for Mining High Utility Closed Itemsets and Generators
ABSTRACT: Traditional association rule mining based on the support-confidence framework
provides the objective measure of the rules that are of interest to users.
However, it does not reflect the utility of the rules. To extract non-redundant
association rules in support-confidence framework frequent closed itemsets and
their generators play an important role. To extract non-redundant association
rules among high utility itemsets, high utility closed itemsets (HUCI) and
their generators should be extracted in order to apply traditional
support-confidence framework. However, no efficient method exists at present
for mining HUCIs with their generators. This paper addresses this issue. A
post-processing algorithm, called the HUCI-Miner, is proposed to mine HUCIs
with their generators. The proposed algorithm is implemented using both
synthetic and real datasets.
|
1410.3080 | Xin Yuan | Xin Yuan, Patrick Llull, David J. Brady, and Lawrence Carin | Tree-Structure Bayesian Compressive Sensing for Video | 5 pages, 4 Figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Bayesian compressive sensing framework is developed for video
reconstruction based on the color coded aperture compressive temporal imaging
(CACTI) system. By exploiting the three dimension (3D) tree structure of the
wavelet and Discrete Cosine Transformation (DCT) coefficients, a Bayesian
compressive sensing inversion algorithm is derived to reconstruct (up to 22)
color video frames from a single monochromatic compressive measurement. Both
simulated and real datasets are adopted to verify the performance of the
proposed algorithm.
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2014 11:43:37 GMT"
}
] | 2014-10-14T00:00:00 | [
[
"Yuan",
"Xin",
""
],
[
"Llull",
"Patrick",
""
],
[
"Brady",
"David J.",
""
],
[
"Carin",
"Lawrence",
""
]
] | TITLE: Tree-Structure Bayesian Compressive Sensing for Video
ABSTRACT: A Bayesian compressive sensing framework is developed for video
reconstruction based on the color coded aperture compressive temporal imaging
(CACTI) system. By exploiting the three dimension (3D) tree structure of the
wavelet and Discrete Cosine Transformation (DCT) coefficients, a Bayesian
compressive sensing inversion algorithm is derived to reconstruct (up to 22)
color video frames from a single monochromatic compressive measurement. Both
simulated and real datasets are adopted to verify the performance of the
proposed algorithm.
|
1410.3169 | Ellen Gasparovic | Paul Bendich, Ellen Gasparovic, John Harer, Rauf Izmailov, and Linda
Ness | Multi-Scale Local Shape Analysis and Feature Selection in Machine
Learning Applications | 15 pages, 6 figures, 8 tables | null | null | null | cs.CG cs.LG math.AT stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a method called multi-scale local shape analysis, or MLSA, for
extracting features that describe the local structure of points within a
dataset. The method uses both geometric and topological features at multiple
levels of granularity to capture diverse types of local information for
subsequent machine learning algorithms operating on the dataset. Using
synthetic and real dataset examples, we demonstrate significant performance
improvement of classification algorithms constructed for these datasets with
correspondingly augmented features.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2014 00:21:59 GMT"
}
] | 2014-10-14T00:00:00 | [
[
"Bendich",
"Paul",
""
],
[
"Gasparovic",
"Ellen",
""
],
[
"Harer",
"John",
""
],
[
"Izmailov",
"Rauf",
""
],
[
"Ness",
"Linda",
""
]
] | TITLE: Multi-Scale Local Shape Analysis and Feature Selection in Machine
Learning Applications
ABSTRACT: We introduce a method called multi-scale local shape analysis, or MLSA, for
extracting features that describe the local structure of points within a
dataset. The method uses both geometric and topological features at multiple
levels of granularity to capture diverse types of local information for
subsequent machine learning algorithms operating on the dataset. Using
synthetic and real dataset examples, we demonstrate significant performance
improvement of classification algorithms constructed for these datasets with
correspondingly augmented features.
|
1409.5114 | Shuxin Ouyang | Shuxin Ouyang, Timothy Hospedales, Yi-Zhe Song, Xueming Li | A Survey on Heterogeneous Face Recognition: Sketch, Infra-red, 3D and
Low-resolution | survey paper(35 pages) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heterogeneous face recognition (HFR) refers to matching face imagery across
different domains. It has received much interest from the research community as
a result of its profound implications in law enforcement. A wide variety of new
invariant features, cross-modality matching models and heterogeneous datasets
being established in recent years. This survey provides a comprehensive review
of established techniques and recent developments in HFR. Moreover, we offer a
detailed account of datasets and benchmarks commonly used for evaluation. We
finish by assessing the state of the field and discussing promising directions
for future research.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2014 19:55:34 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Oct 2014 13:23:30 GMT"
}
] | 2014-10-13T00:00:00 | [
[
"Ouyang",
"Shuxin",
""
],
[
"Hospedales",
"Timothy",
""
],
[
"Song",
"Yi-Zhe",
""
],
[
"Li",
"Xueming",
""
]
] | TITLE: A Survey on Heterogeneous Face Recognition: Sketch, Infra-red, 3D and
Low-resolution
ABSTRACT: Heterogeneous face recognition (HFR) refers to matching face imagery across
different domains. It has received much interest from the research community as
a result of its profound implications in law enforcement. A wide variety of new
invariant features, cross-modality matching models and heterogeneous datasets
being established in recent years. This survey provides a comprehensive review
of established techniques and recent developments in HFR. Moreover, we offer a
detailed account of datasets and benchmarks commonly used for evaluation. We
finish by assessing the state of the field and discussing promising directions
for future research.
|
1410.2652 | Lane A. Hemaspaandra | Gabor Erdelyi, Edith Hemaspaandra, Lane A. Hemaspaandra | More Natural Models of Electoral Control by Partition | null | null | null | null | cs.GT cs.CC cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | "Control" studies attempts to set the outcome of elections through the
addition, deletion, or partition of voters or candidates. The set of benchmark
control types was largely set in the seminal 1992 paper by Bartholdi, Tovey,
and Trick that introduced control, and there now is a large literature studying
how many of the benchmark types various election systems are vulnerable to,
i.e., have polynomial-time attack algorithms for.
However, although the longstanding benchmark models of addition and deletion
model relatively well the real-world settings that inspire them, the
longstanding benchmark models of partition model settings that are arguably
quite distant from those they seek to capture.
In this paper, we introduce--and for some important cases analyze the
complexity of--new partition models that seek to better capture many real-world
partition settings. In particular, in many partition settings one wants the two
parts of the partition to be of (almost) equal size, or is partitioning into
more than two parts, or has groups of actors who must be placed in the same
part of the partition. Our hope is that having these new partition types will
allow studies of control attacks to include such models that more realistically
capture many settings.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2014 23:22:49 GMT"
}
] | 2014-10-13T00:00:00 | [
[
"Erdelyi",
"Gabor",
""
],
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] | TITLE: More Natural Models of Electoral Control by Partition
ABSTRACT: "Control" studies attempts to set the outcome of elections through the
addition, deletion, or partition of voters or candidates. The set of benchmark
control types was largely set in the seminal 1992 paper by Bartholdi, Tovey,
and Trick that introduced control, and there now is a large literature studying
how many of the benchmark types various election systems are vulnerable to,
i.e., have polynomial-time attack algorithms for.
However, although the longstanding benchmark models of addition and deletion
model relatively well the real-world settings that inspire them, the
longstanding benchmark models of partition model settings that are arguably
quite distant from those they seek to capture.
In this paper, we introduce--and for some important cases analyze the
complexity of--new partition models that seek to better capture many real-world
partition settings. In particular, in many partition settings one wants the two
parts of the partition to be of (almost) equal size, or is partitioning into
more than two parts, or has groups of actors who must be placed in the same
part of the partition. Our hope is that having these new partition types will
allow studies of control attacks to include such models that more realistically
capture many settings.
|
1410.2698 | Michael Gowanlock | Michael Gowanlock and Henri Casanova | Technical Report: Towards Efficient Indexing of Spatiotemporal
Trajectories on the GPU for Distance Threshold Similarity Searches | 30 pages, 18 figures, 1 table | null | null | null | cs.DC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Applications in many domains require processing moving object trajectories.
In this work, we focus on a trajectory similarity search that finds all
trajectories within a given distance of a query trajectory over a time
interval, which we call the distance threshold similarity search. We develop
three indexing strategies with spatial, temporal and spatiotemporal selectivity
for the GPU that differ significantly from indexes suitable for the CPU, and
show the conditions under which each index achieves good performance.
Furthermore, we show that the GPU implementations outperform multithreaded CPU
implementations in a range of experimental scenarios, making the GPU an
attractive technology for processing moving object trajectories. We test our
implementations on two synthetic and one real-world dataset of a galaxy merger.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2014 07:44:05 GMT"
}
] | 2014-10-13T00:00:00 | [
[
"Gowanlock",
"Michael",
""
],
[
"Casanova",
"Henri",
""
]
] | TITLE: Technical Report: Towards Efficient Indexing of Spatiotemporal
Trajectories on the GPU for Distance Threshold Similarity Searches
ABSTRACT: Applications in many domains require processing moving object trajectories.
In this work, we focus on a trajectory similarity search that finds all
trajectories within a given distance of a query trajectory over a time
interval, which we call the distance threshold similarity search. We develop
three indexing strategies with spatial, temporal and spatiotemporal selectivity
for the GPU that differ significantly from indexes suitable for the CPU, and
show the conditions under which each index achieves good performance.
Furthermore, we show that the GPU implementations outperform multithreaded CPU
implementations in a range of experimental scenarios, making the GPU an
attractive technology for processing moving object trajectories. We test our
implementations on two synthetic and one real-world dataset of a galaxy merger.
|
1405.0773 | Yutao Ma | Peng He, Bing Li, Deguang Zhang, Yutao Ma | Simplification of Training Data for Cross-Project Defect Prediction | 17 pages, 12 figures | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cross-project defect prediction (CPDP) plays an important role in estimating
the most likely defect-prone software components, especially for new or
inactive projects. To the best of our knowledge, few prior studies provide
explicit guidelines on how to select suitable training data of quality from a
large number of public software repositories. In this paper, we have proposed a
training data simplification method for practical CPDP in consideration of
multiple levels of granularity and filtering strategies for data sets. In
addition, we have also provided quantitative evidence on the selection of a
suitable filter in terms of defect-proneness ratio. Based on an empirical study
on 34 releases of 10 open-source projects, we have elaborately compared the
prediction performance of different defect predictors built with five
well-known classifiers using training data simplified at different levels of
granularity and with two popular filters. The results indicate that when using
the multi-granularity simplification method with an appropriate filter, the
prediction models based on Naive Bayes can achieve fairly good performance and
outperform the benchmark method.
| [
{
"version": "v1",
"created": "Mon, 5 May 2014 03:42:37 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Oct 2014 03:16:31 GMT"
}
] | 2014-10-10T00:00:00 | [
[
"He",
"Peng",
""
],
[
"Li",
"Bing",
""
],
[
"Zhang",
"Deguang",
""
],
[
"Ma",
"Yutao",
""
]
] | TITLE: Simplification of Training Data for Cross-Project Defect Prediction
ABSTRACT: Cross-project defect prediction (CPDP) plays an important role in estimating
the most likely defect-prone software components, especially for new or
inactive projects. To the best of our knowledge, few prior studies provide
explicit guidelines on how to select suitable training data of quality from a
large number of public software repositories. In this paper, we have proposed a
training data simplification method for practical CPDP in consideration of
multiple levels of granularity and filtering strategies for data sets. In
addition, we have also provided quantitative evidence on the selection of a
suitable filter in terms of defect-proneness ratio. Based on an empirical study
on 34 releases of 10 open-source projects, we have elaborately compared the
prediction performance of different defect predictors built with five
well-known classifiers using training data simplified at different levels of
granularity and with two popular filters. The results indicate that when using
the multi-granularity simplification method with an appropriate filter, the
prediction models based on Naive Bayes can achieve fairly good performance and
outperform the benchmark method.
|
1410.1035 | Rahul Rama Varior Mr. | Rahul Rama Varior, Gang Wang and Jiwen Lu | Learning Invariant Color Features for Person Re-Identification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Matching people across multiple camera views known as person
re-identification, is a challenging problem due to the change in visual
appearance caused by varying lighting conditions. The perceived color of the
subject appears to be different with respect to illumination. Previous works
use color as it is or address these challenges by designing color spaces
focusing on a specific cue. In this paper, we propose a data driven approach
for learning color patterns from pixels sampled from images across two camera
views. The intuition behind this work is that, even though pixel values of same
color would be different across views, they should be encoded with the same
values. We model color feature generation as a learning problem by jointly
learning a linear transformation and a dictionary to encode pixel values. We
also analyze different photometric invariant color spaces. Using color as the
only cue, we compare our approach with all the photometric invariant color
spaces and show superior performance over all of them. Combining with other
learned low-level and high-level features, we obtain promising results in
ViPER, Person Re-ID 2011 and CAVIAR4REID datasets.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 2014 10:27:51 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Oct 2014 10:32:36 GMT"
}
] | 2014-10-10T00:00:00 | [
[
"Varior",
"Rahul Rama",
""
],
[
"Wang",
"Gang",
""
],
[
"Lu",
"Jiwen",
""
]
] | TITLE: Learning Invariant Color Features for Person Re-Identification
ABSTRACT: Matching people across multiple camera views known as person
re-identification, is a challenging problem due to the change in visual
appearance caused by varying lighting conditions. The perceived color of the
subject appears to be different with respect to illumination. Previous works
use color as it is or address these challenges by designing color spaces
focusing on a specific cue. In this paper, we propose a data driven approach
for learning color patterns from pixels sampled from images across two camera
views. The intuition behind this work is that, even though pixel values of same
color would be different across views, they should be encoded with the same
values. We model color feature generation as a learning problem by jointly
learning a linear transformation and a dictionary to encode pixel values. We
also analyze different photometric invariant color spaces. Using color as the
only cue, we compare our approach with all the photometric invariant color
spaces and show superior performance over all of them. Combining with other
learned low-level and high-level features, we obtain promising results in
ViPER, Person Re-ID 2011 and CAVIAR4REID datasets.
|
1410.1940 | Qi(Rose) Yu | Qi (Rose) Yu, Xinran He and Yan Liu | GLAD: Group Anomaly Detection in Social Media Analysis- Extended
Abstract | null | null | null | null | cs.LG cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional anomaly detection on social media mostly focuses on individual
point anomalies while anomalous phenomena usually occur in groups. Therefore it
is valuable to study the collective behavior of individuals and detect group
anomalies. Existing group anomaly detection approaches rely on the assumption
that the groups are known, which can hardly be true in real world social media
applications. In this paper, we take a generative approach by proposing a
hierarchical Bayes model: Group Latent Anomaly Detection (GLAD) model. GLAD
takes both pair-wise and point-wise data as input, automatically infers the
groups and detects group anomalies simultaneously. To account for the dynamic
properties of the social media data, we further generalize GLAD to its dynamic
extension d-GLAD. We conduct extensive experiments to evaluate our models on
both synthetic and real world datasets. The empirical results demonstrate that
our approach is effective and robust in discovering latent groups and detecting
group anomalies.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2014 23:11:37 GMT"
}
] | 2014-10-09T00:00:00 | [
[
"Qi",
"",
"",
"Rose"
],
[
"Yu",
"",
""
],
[
"He",
"Xinran",
""
],
[
"Liu",
"Yan",
""
]
] | TITLE: GLAD: Group Anomaly Detection in Social Media Analysis- Extended
Abstract
ABSTRACT: Traditional anomaly detection on social media mostly focuses on individual
point anomalies while anomalous phenomena usually occur in groups. Therefore it
is valuable to study the collective behavior of individuals and detect group
anomalies. Existing group anomaly detection approaches rely on the assumption
that the groups are known, which can hardly be true in real world social media
applications. In this paper, we take a generative approach by proposing a
hierarchical Bayes model: Group Latent Anomaly Detection (GLAD) model. GLAD
takes both pair-wise and point-wise data as input, automatically infers the
groups and detects group anomalies simultaneously. To account for the dynamic
properties of the social media data, we further generalize GLAD to its dynamic
extension d-GLAD. We conduct extensive experiments to evaluate our models on
both synthetic and real world datasets. The empirical results demonstrate that
our approach is effective and robust in discovering latent groups and detecting
group anomalies.
|
1410.2056 | Taymaz Rahkar Farshi | Taymaz Rahkar-Farshi, Sara Behjat-Jamal, Mohammad-Reza Feizi-Derakhshi | An improved multimodal PSO method based on electrostatic interaction
using n- nearest-neighbor local search | 10 pages, 8 figures, International Journal of Artificial Intelligence
& Applications (IJAIA), Vol. 5, No. 5, September 2014 | null | 10.5121/ijaia.2014.5506 | null | cs.AI | http://creativecommons.org/licenses/publicdomain/ | In this paper, an improved multimodal optimization (MMO) algorithm,called
LSEPSO,has been proposed. LSEPSO combined Electrostatic Particle Swarm
Optimization (EPSO) algorithm and a local search method and then made some
modification on them. It has been shown to improve global and local optima
finding ability of the algorithm. This algorithm useda modified local search to
improve particle's personal best, which used n-nearest-neighbour instead of
nearest-neighbour. Then, by creating n new points among each particle and n
nearest particles, it tried to find a point which could be the alternative of
particle's personal best. This method prevented particle's attenuation and
following a specific particle by its neighbours. The performed tests on a
number of benchmark functions clearly demonstrated that the improved algorithm
is able to solve MMO problems and outperform other tested algorithms in this
article.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2014 10:48:03 GMT"
}
] | 2014-10-09T00:00:00 | [
[
"Rahkar-Farshi",
"Taymaz",
""
],
[
"Behjat-Jamal",
"Sara",
""
],
[
"Feizi-Derakhshi",
"Mohammad-Reza",
""
]
] | TITLE: An improved multimodal PSO method based on electrostatic interaction
using n- nearest-neighbor local search
ABSTRACT: In this paper, an improved multimodal optimization (MMO) algorithm,called
LSEPSO,has been proposed. LSEPSO combined Electrostatic Particle Swarm
Optimization (EPSO) algorithm and a local search method and then made some
modification on them. It has been shown to improve global and local optima
finding ability of the algorithm. This algorithm useda modified local search to
improve particle's personal best, which used n-nearest-neighbour instead of
nearest-neighbour. Then, by creating n new points among each particle and n
nearest particles, it tried to find a point which could be the alternative of
particle's personal best. This method prevented particle's attenuation and
following a specific particle by its neighbours. The performed tests on a
number of benchmark functions clearly demonstrated that the improved algorithm
is able to solve MMO problems and outperform other tested algorithms in this
article.
|
1410.2100 | Wu Xianyan student | Wu Xianyan, Han Qi, Le Dan, Niu Xiamu | A New Method for Estimating the Widths of JPEG Images | null | null | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image width is important for image understanding. We propose a novel method
to estimate widths for JPEG images when their widths are not available. The key
idea is that the distance between two decoded MCUs (Minimum Coded Unit)
adjacent in the vertical direction is usually small, which is measured by the
average Euclidean distance between the pixels from the bottom row of the top
MCU and the top row of the bottom MCU. On PASCAL VOC 2010 challenge dataset and
USC-SIPI image database, experimental results show the high performance of the
proposed approach.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2014 13:24:06 GMT"
}
] | 2014-10-09T00:00:00 | [
[
"Xianyan",
"Wu",
""
],
[
"Qi",
"Han",
""
],
[
"Dan",
"Le",
""
],
[
"Xiamu",
"Niu",
""
]
] | TITLE: A New Method for Estimating the Widths of JPEG Images
ABSTRACT: Image width is important for image understanding. We propose a novel method
to estimate widths for JPEG images when their widths are not available. The key
idea is that the distance between two decoded MCUs (Minimum Coded Unit)
adjacent in the vertical direction is usually small, which is measured by the
average Euclidean distance between the pixels from the bottom row of the top
MCU and the top row of the bottom MCU. On PASCAL VOC 2010 challenge dataset and
USC-SIPI image database, experimental results show the high performance of the
proposed approach.
|
1401.6413 | Nuri Denizcan Vanli | N. Denizcan Vanli, Muhammed O. Sayin, Suleyman S. Kozat | Predicting Nearly As Well As the Optimal Twice Differentiable Regressor | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study nonlinear regression of real valued data in an individual sequence
manner, where we provide results that are guaranteed to hold without any
statistical assumptions. We address the convergence and undertraining issues of
conventional nonlinear regression methods and introduce an algorithm that
elegantly mitigates these issues via an incremental hierarchical structure,
(i.e., via an incremental decision tree). Particularly, we present a piecewise
linear (or nonlinear) regression algorithm that partitions the regressor space
in a data driven manner and learns a linear model at each region. Unlike the
conventional approaches, our algorithm gradually increases the number of
disjoint partitions on the regressor space in a sequential manner according to
the observed data. Through this data driven approach, our algorithm
sequentially and asymptotically achieves the performance of the optimal twice
differentiable regression function for any data sequence with an unknown and
arbitrary length. The computational complexity of the introduced algorithm is
only logarithmic in the data length under certain regularity conditions. We
provide the explicit description of the algorithm and demonstrate the
significant gains for the well-known benchmark real data sets and chaotic
signals.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2014 15:51:36 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2014 23:32:10 GMT"
}
] | 2014-10-08T00:00:00 | [
[
"Vanli",
"N. Denizcan",
""
],
[
"Sayin",
"Muhammed O.",
""
],
[
"Kozat",
"Suleyman S.",
""
]
] | TITLE: Predicting Nearly As Well As the Optimal Twice Differentiable Regressor
ABSTRACT: We study nonlinear regression of real valued data in an individual sequence
manner, where we provide results that are guaranteed to hold without any
statistical assumptions. We address the convergence and undertraining issues of
conventional nonlinear regression methods and introduce an algorithm that
elegantly mitigates these issues via an incremental hierarchical structure,
(i.e., via an incremental decision tree). Particularly, we present a piecewise
linear (or nonlinear) regression algorithm that partitions the regressor space
in a data driven manner and learns a linear model at each region. Unlike the
conventional approaches, our algorithm gradually increases the number of
disjoint partitions on the regressor space in a sequential manner according to
the observed data. Through this data driven approach, our algorithm
sequentially and asymptotically achieves the performance of the optimal twice
differentiable regression function for any data sequence with an unknown and
arbitrary length. The computational complexity of the introduced algorithm is
only logarithmic in the data length under certain regularity conditions. We
provide the explicit description of the algorithm and demonstrate the
significant gains for the well-known benchmark real data sets and chaotic
signals.
|
1401.5383 | Rayan Chikhi | Rayan Chikhi, Antoine Limasset, Shaun Jackman, Jared Simpson and Paul
Medvedev | On the representation of de Bruijn graphs | Journal version (JCB). A preliminary version of this article was
published in the proceedings of RECOMB 2014 | null | null | null | q-bio.QM cs.DS q-bio.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The de Bruijn graph plays an important role in bioinformatics, especially in
the context of de novo assembly. However, the representation of the de Bruijn
graph in memory is a computational bottleneck for many assemblers. Recent
papers proposed a navigational data structure approach in order to improve
memory usage. We prove several theoretical space lower bounds to show the
limitation of these types of approaches. We further design and implement a
general data structure (DBGFM) and demonstrate its use on a human whole-genome
dataset, achieving space usage of 1.5 GB and a 46% improvement over previous
approaches. As part of DBGFM, we develop the notion of frequency-based
minimizers and show how it can be used to enumerate all maximal simple paths of
the de Bruijn graph using only 43 MB of memory. Finally, we demonstrate that
our approach can be integrated into an existing assembler by modifying the
ABySS software to use DBGFM.
| [
{
"version": "v1",
"created": "Tue, 21 Jan 2014 16:55:02 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Jan 2014 16:53:37 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Feb 2014 22:55:09 GMT"
},
{
"version": "v4",
"created": "Mon, 6 Oct 2014 12:39:56 GMT"
}
] | 2014-10-07T00:00:00 | [
[
"Chikhi",
"Rayan",
""
],
[
"Limasset",
"Antoine",
""
],
[
"Jackman",
"Shaun",
""
],
[
"Simpson",
"Jared",
""
],
[
"Medvedev",
"Paul",
""
]
] | TITLE: On the representation of de Bruijn graphs
ABSTRACT: The de Bruijn graph plays an important role in bioinformatics, especially in
the context of de novo assembly. However, the representation of the de Bruijn
graph in memory is a computational bottleneck for many assemblers. Recent
papers proposed a navigational data structure approach in order to improve
memory usage. We prove several theoretical space lower bounds to show the
limitation of these types of approaches. We further design and implement a
general data structure (DBGFM) and demonstrate its use on a human whole-genome
dataset, achieving space usage of 1.5 GB and a 46% improvement over previous
approaches. As part of DBGFM, we develop the notion of frequency-based
minimizers and show how it can be used to enumerate all maximal simple paths of
the de Bruijn graph using only 43 MB of memory. Finally, we demonstrate that
our approach can be integrated into an existing assembler by modifying the
ABySS software to use DBGFM.
|
1404.6218 | Ashkan Tousimojarad Mr | Ashkan Tousimojarad and Wim Vanderbauwhede | A Parallel Task-based Approach to Linear Algebra | Final version as appeared in "dx.doi.org/10.1109/ISPDC.2014.11" | Tousimojarad, A., Vanderbauwhede, W.: A parallel task-based
approach to linear algebra. In: Parallel and Distributed Computing (ISPDC),
2014 IEEE 13th International Symposium on. pp. 59-66. IEEE (2014) | 10.1109/ISPDC.2014.11 | null | cs.DC cs.PF cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Processors with large numbers of cores are becoming commonplace. In order to
take advantage of the available resources in these systems, the programming
paradigm has to move towards increased parallelism. However, increasing the
level of concurrency in the program does not necessarily lead to better
performance. Parallel programming models have to provide flexible ways of
defining parallel tasks and at the same time, efficiently managing the created
tasks. OpenMP is a widely accepted programming model for shared-memory
architectures. In this paper we highlight some of the drawbacks in the OpenMP
tasking approach, and propose an alternative model based on the Glasgow
Parallel Reduction Machine (GPRM) programming framework. As the main focus of
this study, we deploy our model to solve a fundamental linear algebra problem,
LU factorisation of sparse matrices. We have used the SparseLU benchmark from
the BOTS benchmark suite, and compared the results obtained from our model to
those of the OpenMP tasking approach. The TILEPro64 system has been used to run
the experiments. The results are very promising, not only because of the
performance improvement for this particular problem, but also because they
verify the task management efficiency, stability, and flexibility of our model,
which can be applied to solve problems in future many-core systems.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2014 18:39:30 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Oct 2014 14:53:58 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Oct 2014 15:46:24 GMT"
}
] | 2014-10-07T00:00:00 | [
[
"Tousimojarad",
"Ashkan",
""
],
[
"Vanderbauwhede",
"Wim",
""
]
] | TITLE: A Parallel Task-based Approach to Linear Algebra
ABSTRACT: Processors with large numbers of cores are becoming commonplace. In order to
take advantage of the available resources in these systems, the programming
paradigm has to move towards increased parallelism. However, increasing the
level of concurrency in the program does not necessarily lead to better
performance. Parallel programming models have to provide flexible ways of
defining parallel tasks and at the same time, efficiently managing the created
tasks. OpenMP is a widely accepted programming model for shared-memory
architectures. In this paper we highlight some of the drawbacks in the OpenMP
tasking approach, and propose an alternative model based on the Glasgow
Parallel Reduction Machine (GPRM) programming framework. As the main focus of
this study, we deploy our model to solve a fundamental linear algebra problem,
LU factorisation of sparse matrices. We have used the SparseLU benchmark from
the BOTS benchmark suite, and compared the results obtained from our model to
those of the OpenMP tasking approach. The TILEPro64 system has been used to run
the experiments. The results are very promising, not only because of the
performance improvement for this particular problem, but also because they
verify the task management efficiency, stability, and flexibility of our model,
which can be applied to solve problems in future many-core systems.
|
1410.0969 | Abdul Kadir | Abdul Kadir | A Model of Plant Identification System Using GLCM, Lacunarity And Shen
Features | 10 pages | Research Journal of Pharmaceutical, Biological and Chemical
Sciences, Vol 5(2), 2014 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, many approaches have been introduced by several researchers to
identify plants. Now, applications of texture, shape, color and vein features
are common practices. However, there are many possibilities of methods can be
developed to improve the performance of such identification systems. Therefore,
several experiments had been conducted in this research. As a result, a new
novel approach by using combination of Gray-Level Co-occurrence Matrix,
lacunarity and Shen features and a Bayesian classifier gives a better result
compared to other plant identification systems. For comparison, this research
used two kinds of several datasets that were usually used for testing the
performance of each plant identification system. The results show that the
system gives an accuracy rate of 97.19% when using the Flavia dataset and
95.00% when using the Foliage dataset and outperforms other approaches.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2014 00:49:05 GMT"
}
] | 2014-10-07T00:00:00 | [
[
"Kadir",
"Abdul",
""
]
] | TITLE: A Model of Plant Identification System Using GLCM, Lacunarity And Shen
Features
ABSTRACT: Recently, many approaches have been introduced by several researchers to
identify plants. Now, applications of texture, shape, color and vein features
are common practices. However, there are many possibilities of methods can be
developed to improve the performance of such identification systems. Therefore,
several experiments had been conducted in this research. As a result, a new
novel approach by using combination of Gray-Level Co-occurrence Matrix,
lacunarity and Shen features and a Bayesian classifier gives a better result
compared to other plant identification systems. For comparison, this research
used two kinds of several datasets that were usually used for testing the
performance of each plant identification system. The results show that the
system gives an accuracy rate of 97.19% when using the Flavia dataset and
95.00% when using the Foliage dataset and outperforms other approaches.
|
1410.1090 | Junhua Mao | Junhua Mao, Wei Xu, Yi Yang, Jiang Wang, Alan L. Yuille | Explain Images with Multimodal Recurrent Neural Networks | null | null | null | null | cs.CV cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a multimodal Recurrent Neural Network (m-RNN) model
for generating novel sentence descriptions to explain the content of images. It
directly models the probability distribution of generating a word given
previous words and the image. Image descriptions are generated by sampling from
this distribution. The model consists of two sub-networks: a deep recurrent
neural network for sentences and a deep convolutional network for images. These
two sub-networks interact with each other in a multimodal layer to form the
whole m-RNN model. The effectiveness of our model is validated on three
benchmark datasets (IAPR TC-12, Flickr 8K, and Flickr 30K). Our model
outperforms the state-of-the-art generative method. In addition, the m-RNN
model can be applied to retrieval tasks for retrieving images or sentences, and
achieves significant performance improvement over the state-of-the-art methods
which directly optimize the ranking objective function for retrieval.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 2014 20:24:34 GMT"
}
] | 2014-10-07T00:00:00 | [
[
"Mao",
"Junhua",
""
],
[
"Xu",
"Wei",
""
],
[
"Yang",
"Yi",
""
],
[
"Wang",
"Jiang",
""
],
[
"Yuille",
"Alan L.",
""
]
] | TITLE: Explain Images with Multimodal Recurrent Neural Networks
ABSTRACT: In this paper, we present a multimodal Recurrent Neural Network (m-RNN) model
for generating novel sentence descriptions to explain the content of images. It
directly models the probability distribution of generating a word given
previous words and the image. Image descriptions are generated by sampling from
this distribution. The model consists of two sub-networks: a deep recurrent
neural network for sentences and a deep convolutional network for images. These
two sub-networks interact with each other in a multimodal layer to form the
whole m-RNN model. The effectiveness of our model is validated on three
benchmark datasets (IAPR TC-12, Flickr 8K, and Flickr 30K). Our model
outperforms the state-of-the-art generative method. In addition, the m-RNN
model can be applied to retrieval tasks for retrieving images or sentences, and
achieves significant performance improvement over the state-of-the-art methods
which directly optimize the ranking objective function for retrieval.
|
1410.1151 | Vladimir Bochkarev | Yulia S. Maslennikova, Vladimir V. Bochkarev | Training Algorithm for Neuro-Fuzzy Network Based on Singular Spectrum
Analysis | 5 pages, 3 figures | null | null | null | cs.NE stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we propose a combination of an noise-reduction algorithm
based on Singular Spectrum Analysis (SSA) and a standard feedforward neural
prediction model. Basically, the proposed algorithm consists of two different
steps: data preprocessing based on the SSA filtering method and step-by-step
training procedure in which we use a simple feedforward multilayer neural
network with backpropagation learning. The proposed noise-reduction procedure
successfully removes most of the noise. That increases long-term predictability
of the processed dataset comparison with the raw dataset. The method was
applied to predict the International sunspot number RZ time series. The results
show that our combined technique has better performances than those offered by
the same network directly applied to raw dataset.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2014 12:25:15 GMT"
}
] | 2014-10-07T00:00:00 | [
[
"Maslennikova",
"Yulia S.",
""
],
[
"Bochkarev",
"Vladimir V.",
""
]
] | TITLE: Training Algorithm for Neuro-Fuzzy Network Based on Singular Spectrum
Analysis
ABSTRACT: In this article, we propose a combination of an noise-reduction algorithm
based on Singular Spectrum Analysis (SSA) and a standard feedforward neural
prediction model. Basically, the proposed algorithm consists of two different
steps: data preprocessing based on the SSA filtering method and step-by-step
training procedure in which we use a simple feedforward multilayer neural
network with backpropagation learning. The proposed noise-reduction procedure
successfully removes most of the noise. That increases long-term predictability
of the processed dataset comparison with the raw dataset. The method was
applied to predict the International sunspot number RZ time series. The results
show that our combined technique has better performances than those offered by
the same network directly applied to raw dataset.
|
1410.1160 | Aleksandar Milenkoski | Aleksandar Milenkoski and Samuel Kounev and Alberto Avritzer and Nuno
Antunes and Marco Vieira | On Benchmarking Intrusion Detection Systems in Virtualized Environments | SPEC (Standard Performance Evaluation Corporation) Research Group ---
IDS Benchmarking Working Group | null | null | SPEC-RG-2013-002 | cs.CR cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern intrusion detection systems (IDSes) for virtualized environments are
deployed in the virtualization layer with components inside the virtual machine
monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor
at the same time the network and host activities of all guest VMs running on
top of a VMM being isolated from malicious users of these VMs. We refer to
IDSes for virtualized environments as VMM-based IDSes. In this work, we analyze
state-of-the-art intrusion detection techniques applied in virtualized
environments and architectures of VMM-based IDSes. Further, we identify
challenges that apply specifically to benchmarking VMM-based IDSes focussing on
workloads and metrics. For example, we discuss the challenge of defining
representative baseline benign workload profiles as well as the challenge of
defining malicious workloads containing attacks targeted at the VMM. We also
discuss the impact of on-demand resource provisioning features of virtualized
environments (e.g., CPU and memory hotplugging, memory ballooning) on IDS
benchmarking measures such as capacity and attack detection accuracy. Finally,
we outline future research directions in the area of benchmarking VMM-based
IDSes and of intrusion detection in virtualized environments in general.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2014 13:30:15 GMT"
}
] | 2014-10-07T00:00:00 | [
[
"Milenkoski",
"Aleksandar",
""
],
[
"Kounev",
"Samuel",
""
],
[
"Avritzer",
"Alberto",
""
],
[
"Antunes",
"Nuno",
""
],
[
"Vieira",
"Marco",
""
]
] | TITLE: On Benchmarking Intrusion Detection Systems in Virtualized Environments
ABSTRACT: Modern intrusion detection systems (IDSes) for virtualized environments are
deployed in the virtualization layer with components inside the virtual machine
monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor
at the same time the network and host activities of all guest VMs running on
top of a VMM being isolated from malicious users of these VMs. We refer to
IDSes for virtualized environments as VMM-based IDSes. In this work, we analyze
state-of-the-art intrusion detection techniques applied in virtualized
environments and architectures of VMM-based IDSes. Further, we identify
challenges that apply specifically to benchmarking VMM-based IDSes focussing on
workloads and metrics. For example, we discuss the challenge of defining
representative baseline benign workload profiles as well as the challenge of
defining malicious workloads containing attacks targeted at the VMM. We also
discuss the impact of on-demand resource provisioning features of virtualized
environments (e.g., CPU and memory hotplugging, memory ballooning) on IDS
benchmarking measures such as capacity and attack detection accuracy. Finally,
we outline future research directions in the area of benchmarking VMM-based
IDSes and of intrusion detection in virtualized environments in general.
|
1407.0733 | Davide Barbieri | Giacomo Cocci, Davide Barbieri, Giovanna Citti, Alessandro Sarti | Cortical spatio-temporal dimensionality reduction for visual grouping | null | null | null | null | cs.CV cs.NE q-bio.NC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The visual systems of many mammals, including humans, is able to integrate
the geometric information of visual stimuli and to perform cognitive tasks
already at the first stages of the cortical processing. This is thought to be
the result of a combination of mechanisms, which include feature extraction at
single cell level and geometric processing by means of cells connectivity. We
present a geometric model of such connectivities in the space of detected
features associated to spatio-temporal visual stimuli, and show how they can be
used to obtain low-level object segmentation. The main idea is that of defining
a spectral clustering procedure with anisotropic affinities over datasets
consisting of embeddings of the visual stimuli into higher dimensional spaces.
Neural plausibility of the proposed arguments will be discussed.
| [
{
"version": "v1",
"created": "Wed, 2 Jul 2014 22:07:06 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Oct 2014 16:46:41 GMT"
}
] | 2014-10-06T00:00:00 | [
[
"Cocci",
"Giacomo",
""
],
[
"Barbieri",
"Davide",
""
],
[
"Citti",
"Giovanna",
""
],
[
"Sarti",
"Alessandro",
""
]
] | TITLE: Cortical spatio-temporal dimensionality reduction for visual grouping
ABSTRACT: The visual systems of many mammals, including humans, is able to integrate
the geometric information of visual stimuli and to perform cognitive tasks
already at the first stages of the cortical processing. This is thought to be
the result of a combination of mechanisms, which include feature extraction at
single cell level and geometric processing by means of cells connectivity. We
present a geometric model of such connectivities in the space of detected
features associated to spatio-temporal visual stimuli, and show how they can be
used to obtain low-level object segmentation. The main idea is that of defining
a spectral clustering procedure with anisotropic affinities over datasets
consisting of embeddings of the visual stimuli into higher dimensional spaces.
Neural plausibility of the proposed arguments will be discussed.
|
1402.1973 | Alhussein Fawzi | Alhussein Fawzi, Mike Davies, Pascal Frossard | Dictionary learning for fast classification based on soft-thresholding | null | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classifiers based on sparse representations have recently been shown to
provide excellent results in many visual recognition and classification tasks.
However, the high cost of computing sparse representations at test time is a
major obstacle that limits the applicability of these methods in large-scale
problems, or in scenarios where computational power is restricted. We consider
in this paper a simple yet efficient alternative to sparse coding for feature
extraction. We study a classification scheme that applies the soft-thresholding
nonlinear mapping in a dictionary, followed by a linear classifier. A novel
supervised dictionary learning algorithm tailored for this low complexity
classification architecture is proposed. The dictionary learning problem, which
jointly learns the dictionary and linear classifier, is cast as a difference of
convex (DC) program and solved efficiently with an iterative DC solver. We
conduct experiments on several datasets, and show that our learning algorithm
that leverages the structure of the classification problem outperforms generic
learning procedures. Our simple classifier based on soft-thresholding also
competes with the recent sparse coding classifiers, when the dictionary is
learned appropriately. The adopted classification scheme further requires less
computational time at the testing stage, compared to other classifiers. The
proposed scheme shows the potential of the adequately trained soft-thresholding
mapping for classification and paves the way towards the development of very
efficient classification methods for vision problems.
| [
{
"version": "v1",
"created": "Sun, 9 Feb 2014 18:18:33 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Oct 2014 16:45:19 GMT"
}
] | 2014-10-03T00:00:00 | [
[
"Fawzi",
"Alhussein",
""
],
[
"Davies",
"Mike",
""
],
[
"Frossard",
"Pascal",
""
]
] | TITLE: Dictionary learning for fast classification based on soft-thresholding
ABSTRACT: Classifiers based on sparse representations have recently been shown to
provide excellent results in many visual recognition and classification tasks.
However, the high cost of computing sparse representations at test time is a
major obstacle that limits the applicability of these methods in large-scale
problems, or in scenarios where computational power is restricted. We consider
in this paper a simple yet efficient alternative to sparse coding for feature
extraction. We study a classification scheme that applies the soft-thresholding
nonlinear mapping in a dictionary, followed by a linear classifier. A novel
supervised dictionary learning algorithm tailored for this low complexity
classification architecture is proposed. The dictionary learning problem, which
jointly learns the dictionary and linear classifier, is cast as a difference of
convex (DC) program and solved efficiently with an iterative DC solver. We
conduct experiments on several datasets, and show that our learning algorithm
that leverages the structure of the classification problem outperforms generic
learning procedures. Our simple classifier based on soft-thresholding also
competes with the recent sparse coding classifiers, when the dictionary is
learned appropriately. The adopted classification scheme further requires less
computational time at the testing stage, compared to other classifiers. The
proposed scheme shows the potential of the adequately trained soft-thresholding
mapping for classification and paves the way towards the development of very
efficient classification methods for vision problems.
|
1403.7827 | David Fabian Klosik | David F. Klosik, Stefan Bornholdt, Marc-Thorsten H\"utt | Motif-based success scores in coauthorship networks are highly sensitive
to author name disambiguation | 7 pages, 7 figures | Phys. Rev. E 90, 032811 (2014) | 10.1103/PhysRevE.90.032811 | null | physics.soc-ph cs.DL cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Following the work of Krumov et al. [Eur. Phys. J. B 84, 535 (2011)] we
revisit the question whether the usage of large citation datasets allows for
the quantitative assessment of social (by means of coauthorship of
publications) influence on the progression of science. Applying a more
comprehensive and well-curated dataset containing the publications in the
journals of the American Physical Society during the whole 20th century we find
that the measure chosen in the original study, a score based on small induced
subgraphs, has to be used with caution, since the obtained results are highly
sensitive to the exact implementation of the author disambiguation task.
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2014 22:39:48 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Oct 2014 13:12:32 GMT"
}
] | 2014-10-03T00:00:00 | [
[
"Klosik",
"David F.",
""
],
[
"Bornholdt",
"Stefan",
""
],
[
"Hütt",
"Marc-Thorsten",
""
]
] | TITLE: Motif-based success scores in coauthorship networks are highly sensitive
to author name disambiguation
ABSTRACT: Following the work of Krumov et al. [Eur. Phys. J. B 84, 535 (2011)] we
revisit the question whether the usage of large citation datasets allows for
the quantitative assessment of social (by means of coauthorship of
publications) influence on the progression of science. Applying a more
comprehensive and well-curated dataset containing the publications in the
journals of the American Physical Society during the whole 20th century we find
that the measure chosen in the original study, a score based on small induced
subgraphs, has to be used with caution, since the obtained results are highly
sensitive to the exact implementation of the author disambiguation task.
|
1410.0510 | Ludovic Denoyer | Ludovic Denoyer and Patrick Gallinari | Deep Sequential Neural Network | null | null | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural Networks sequentially build high-level features through their
successive layers. We propose here a new neural network model where each layer
is associated with a set of candidate mappings. When an input is processed, at
each layer, one mapping among these candidates is selected according to a
sequential decision process. The resulting model is structured according to a
DAG like architecture, so that a path from the root to a leaf node defines a
sequence of transformations. Instead of considering global transformations,
like in classical multilayer networks, this model allows us for learning a set
of local transformations. It is thus able to process data with different
characteristics through specific sequences of such local transformations,
increasing the expression power of this model w.r.t a classical multilayered
network. The learning algorithm is inspired from policy gradient techniques
coming from the reinforcement learning domain and is used here instead of the
classical back-propagation based gradient descent techniques. Experiments on
different datasets show the relevance of this approach.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2014 10:58:17 GMT"
}
] | 2014-10-03T00:00:00 | [
[
"Denoyer",
"Ludovic",
""
],
[
"Gallinari",
"Patrick",
""
]
] | TITLE: Deep Sequential Neural Network
ABSTRACT: Neural Networks sequentially build high-level features through their
successive layers. We propose here a new neural network model where each layer
is associated with a set of candidate mappings. When an input is processed, at
each layer, one mapping among these candidates is selected according to a
sequential decision process. The resulting model is structured according to a
DAG like architecture, so that a path from the root to a leaf node defines a
sequence of transformations. Instead of considering global transformations,
like in classical multilayer networks, this model allows us for learning a set
of local transformations. It is thus able to process data with different
characteristics through specific sequences of such local transformations,
increasing the expression power of this model w.r.t a classical multilayered
network. The learning algorithm is inspired from policy gradient techniques
coming from the reinforcement learning domain and is used here instead of the
classical back-propagation based gradient descent techniques. Experiments on
different datasets show the relevance of this approach.
|
1409.8608 | Elmar Peise | Elmar Peise (1), Diego Fabregat-Traver (1), Paolo Bientinesi (1) ((1)
AICES, RWTH Aachen) | On the Performance Prediction of BLAS-based Tensor Contractions | Submitted to PMBS14 | null | null | null | cs.MS cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tensor operations are surging as the computational building blocks for a
variety of scientific simulations and the development of high-performance
kernels for such operations is known to be a challenging task. While for
operations on one- and two-dimensional tensors there exist standardized
interfaces and highly-optimized libraries (BLAS), for higher dimensional
tensors neither standards nor highly-tuned implementations exist yet. In this
paper, we consider contractions between two tensors of arbitrary dimensionality
and take on the challenge of generating high-performance implementations by
resorting to sequences of BLAS kernels. The approach consists in breaking the
contraction down into operations that only involve matrices or vectors. Since
in general there are many alternative ways of decomposing a contraction, we are
able to methodically derive a large family of algorithms. The main contribution
of this paper is a systematic methodology to accurately identify the fastest
algorithms in the bunch, without executing them. The goal is instead
accomplished with the help of a set of cache-aware micro-benchmarks for the
underlying BLAS kernels. The predictions we construct from such benchmarks
allow us to reliably single out the best-performing algorithms in a tiny
fraction of the time taken by the direct execution of the algorithms.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2014 15:54:13 GMT"
}
] | 2014-10-02T00:00:00 | [
[
"Peise",
"Elmar",
""
],
[
"Fabregat-Traver",
"Diego",
""
],
[
"Bientinesi",
"Paolo",
""
]
] | TITLE: On the Performance Prediction of BLAS-based Tensor Contractions
ABSTRACT: Tensor operations are surging as the computational building blocks for a
variety of scientific simulations and the development of high-performance
kernels for such operations is known to be a challenging task. While for
operations on one- and two-dimensional tensors there exist standardized
interfaces and highly-optimized libraries (BLAS), for higher dimensional
tensors neither standards nor highly-tuned implementations exist yet. In this
paper, we consider contractions between two tensors of arbitrary dimensionality
and take on the challenge of generating high-performance implementations by
resorting to sequences of BLAS kernels. The approach consists in breaking the
contraction down into operations that only involve matrices or vectors. Since
in general there are many alternative ways of decomposing a contraction, we are
able to methodically derive a large family of algorithms. The main contribution
of this paper is a systematic methodology to accurately identify the fastest
algorithms in the bunch, without executing them. The goal is instead
accomplished with the help of a set of cache-aware micro-benchmarks for the
underlying BLAS kernels. The predictions we construct from such benchmarks
allow us to reliably single out the best-performing algorithms in a tiny
fraction of the time taken by the direct execution of the algorithms.
|
1410.0001 | Fabien Gouyon | Fabien Gouyon, Bob L. Sturm, Joao Lobato Oliveira, Nuno Hespanhol, and
Thibault Langlois | On Evaluation Validity in Music Autotagging | Submitted for journal publication in September 2014 | null | null | null | cs.IR cs.SD | http://creativecommons.org/licenses/by/3.0/ | Music autotagging, an established problem in Music Information Retrieval,
aims to alleviate the human cost required to manually annotate collections of
recorded music with textual labels by automating the process. Many autotagging
systems have been proposed and evaluated by procedures and datasets that are
now standard (used in MIREX, for instance). Very little work, however, has been
dedicated to determine what these evaluations really mean about an autotagging
system, or the comparison of two systems, for the problem of annotating music
in the real world. In this article, we are concerned with explaining the figure
of merit of an autotagging system evaluated with a standard approach.
Specifically, does the figure of merit, or a comparison of figures of merit,
warrant a conclusion about how well autotagging systems have learned to
describe music with a specific vocabulary? The main contributions of this paper
are a formalization of the notion of validity in autotagging evaluation, and a
method to test it in general. We demonstrate the practical use of our method in
experiments with three specific state-of-the-art autotagging systems --all of
which are reproducible using the linked code and data. Our experiments show for
these specific systems in a simple and objective two-class task that the
standard evaluation approach does not provide valid indicators of their
performance.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2014 14:57:52 GMT"
}
] | 2014-10-02T00:00:00 | [
[
"Gouyon",
"Fabien",
""
],
[
"Sturm",
"Bob L.",
""
],
[
"Oliveira",
"Joao Lobato",
""
],
[
"Hespanhol",
"Nuno",
""
],
[
"Langlois",
"Thibault",
""
]
] | TITLE: On Evaluation Validity in Music Autotagging
ABSTRACT: Music autotagging, an established problem in Music Information Retrieval,
aims to alleviate the human cost required to manually annotate collections of
recorded music with textual labels by automating the process. Many autotagging
systems have been proposed and evaluated by procedures and datasets that are
now standard (used in MIREX, for instance). Very little work, however, has been
dedicated to determine what these evaluations really mean about an autotagging
system, or the comparison of two systems, for the problem of annotating music
in the real world. In this article, we are concerned with explaining the figure
of merit of an autotagging system evaluated with a standard approach.
Specifically, does the figure of merit, or a comparison of figures of merit,
warrant a conclusion about how well autotagging systems have learned to
describe music with a specific vocabulary? The main contributions of this paper
are a formalization of the notion of validity in autotagging evaluation, and a
method to test it in general. We demonstrate the practical use of our method in
experiments with three specific state-of-the-art autotagging systems --all of
which are reproducible using the linked code and data. Our experiments show for
these specific systems in a simple and objective two-class task that the
standard evaluation approach does not provide valid indicators of their
performance.
|
1410.0095 | Xu Wang | Xu Wang, Konstantinos Slavakis, Gilad Lerman | Riemannian Multi-Manifold Modeling | null | null | null | null | stat.ML cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper advocates a novel framework for segmenting a dataset in a
Riemannian manifold $M$ into clusters lying around low-dimensional submanifolds
of $M$. Important examples of $M$, for which the proposed clustering algorithm
is computationally efficient, are the sphere, the set of positive definite
matrices, and the Grassmannian. The clustering problem with these examples of
$M$ is already useful for numerous application domains such as action
identification in video sequences, dynamic texture clustering, brain fiber
segmentation in medical imaging, and clustering of deformed images. The
proposed clustering algorithm constructs a data-affinity matrix by thoroughly
exploiting the intrinsic geometry and then applies spectral clustering. The
intrinsic local geometry is encoded by local sparse coding and more importantly
by directional information of local tangent spaces and geodesics. Theoretical
guarantees are established for a simplified variant of the algorithm even when
the clusters intersect. To avoid complication, these guarantees assume that the
underlying submanifolds are geodesic. Extensive validation on synthetic and
real data demonstrates the resiliency of the proposed method against deviations
from the theoretical model as well as its superior performance over
state-of-the-art techniques.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2014 02:37:12 GMT"
}
] | 2014-10-02T00:00:00 | [
[
"Wang",
"Xu",
""
],
[
"Slavakis",
"Konstantinos",
""
],
[
"Lerman",
"Gilad",
""
]
] | TITLE: Riemannian Multi-Manifold Modeling
ABSTRACT: This paper advocates a novel framework for segmenting a dataset in a
Riemannian manifold $M$ into clusters lying around low-dimensional submanifolds
of $M$. Important examples of $M$, for which the proposed clustering algorithm
is computationally efficient, are the sphere, the set of positive definite
matrices, and the Grassmannian. The clustering problem with these examples of
$M$ is already useful for numerous application domains such as action
identification in video sequences, dynamic texture clustering, brain fiber
segmentation in medical imaging, and clustering of deformed images. The
proposed clustering algorithm constructs a data-affinity matrix by thoroughly
exploiting the intrinsic geometry and then applies spectral clustering. The
intrinsic local geometry is encoded by local sparse coding and more importantly
by directional information of local tangent spaces and geodesics. Theoretical
guarantees are established for a simplified variant of the algorithm even when
the clusters intersect. To avoid complication, these guarantees assume that the
underlying submanifolds are geodesic. Extensive validation on synthetic and
real data demonstrates the resiliency of the proposed method against deviations
from the theoretical model as well as its superior performance over
state-of-the-art techniques.
|
1410.0265 | Chao Li | Chao Li, Michael Hay, Gerome Miklau, Yue Wang | A Data- and Workload-Aware Algorithm for Range Queries Under
Differential Privacy | VLDB 2014 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a new algorithm for answering a given set of range queries under
$\epsilon$-differential privacy which often achieves substantially lower error
than competing methods. Our algorithm satisfies differential privacy by adding
noise that is adapted to the input data and to the given query set. We first
privately learn a partitioning of the domain into buckets that suit the input
data well. Then we privately estimate counts for each bucket, doing so in a
manner well-suited for the given query set. Since the performance of the
algorithm depends on the input database, we evaluate it on a wide range of real
datasets, showing that we can achieve the benefits of data-dependence on both
"easy" and "hard" databases.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2014 15:56:42 GMT"
}
] | 2014-10-02T00:00:00 | [
[
"Li",
"Chao",
""
],
[
"Hay",
"Michael",
""
],
[
"Miklau",
"Gerome",
""
],
[
"Wang",
"Yue",
""
]
] | TITLE: A Data- and Workload-Aware Algorithm for Range Queries Under
Differential Privacy
ABSTRACT: We describe a new algorithm for answering a given set of range queries under
$\epsilon$-differential privacy which often achieves substantially lower error
than competing methods. Our algorithm satisfies differential privacy by adding
noise that is adapted to the input data and to the given query set. We first
privately learn a partitioning of the domain into buckets that suit the input
data well. Then we privately estimate counts for each bucket, doing so in a
manner well-suited for the given query set. Since the performance of the
algorithm depends on the input database, we evaluate it on a wide range of real
datasets, showing that we can achieve the benefits of data-dependence on both
"easy" and "hard" databases.
|
1402.1389 | Yarin Gal | Yarin Gal, Mark van der Wilk, Carl E. Rasmussen | Distributed Variational Inference in Sparse Gaussian Process Regression
and Latent Variable Models | 9 pages, 8 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gaussian processes (GPs) are a powerful tool for probabilistic inference over
functions. They have been applied to both regression and non-linear
dimensionality reduction, and offer desirable properties such as uncertainty
estimates, robustness to over-fitting, and principled ways for tuning
hyper-parameters. However the scalability of these models to big datasets
remains an active topic of research. We introduce a novel re-parametrisation of
variational inference for sparse GP regression and latent variable models that
allows for an efficient distributed algorithm. This is done by exploiting the
decoupling of the data given the inducing points to re-formulate the evidence
lower bound in a Map-Reduce setting. We show that the inference scales well
with data and computational resources, while preserving a balanced distribution
of the load among the nodes. We further demonstrate the utility in scaling
Gaussian processes to big data. We show that GP performance improves with
increasing amounts of data in regression (on flight data with 2 million
records) and latent variable modelling (on MNIST). The results show that GPs
perform better than many common models often used for big data.
| [
{
"version": "v1",
"created": "Thu, 6 Feb 2014 16:08:40 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Sep 2014 21:16:47 GMT"
}
] | 2014-10-01T00:00:00 | [
[
"Gal",
"Yarin",
""
],
[
"van der Wilk",
"Mark",
""
],
[
"Rasmussen",
"Carl E.",
""
]
] | TITLE: Distributed Variational Inference in Sparse Gaussian Process Regression
and Latent Variable Models
ABSTRACT: Gaussian processes (GPs) are a powerful tool for probabilistic inference over
functions. They have been applied to both regression and non-linear
dimensionality reduction, and offer desirable properties such as uncertainty
estimates, robustness to over-fitting, and principled ways for tuning
hyper-parameters. However the scalability of these models to big datasets
remains an active topic of research. We introduce a novel re-parametrisation of
variational inference for sparse GP regression and latent variable models that
allows for an efficient distributed algorithm. This is done by exploiting the
decoupling of the data given the inducing points to re-formulate the evidence
lower bound in a Map-Reduce setting. We show that the inference scales well
with data and computational resources, while preserving a balanced distribution
of the load among the nodes. We further demonstrate the utility in scaling
Gaussian processes to big data. We show that GP performance improves with
increasing amounts of data in regression (on flight data with 2 million
records) and latent variable modelling (on MNIST). The results show that GPs
perform better than many common models often used for big data.
|
1402.1774 | Ali Makhdoumi | Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, Muriel Medard | From the Information Bottleneck to the Privacy Funnel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on the privacy-utility trade-off encountered by users who wish to
disclose some information to an analyst, that is correlated with their private
data, in the hope of receiving some utility. We rely on a general privacy
statistical inference framework, under which data is transformed before it is
disclosed, according to a probabilistic privacy mapping. We show that when the
log-loss is introduced in this framework in both the privacy metric and the
distortion metric, the privacy leakage and the utility constraint can be
reduced to the mutual information between private data and disclosed data, and
between non-private data and disclosed data respectively. We justify the
relevance and generality of the privacy metric under the log-loss by proving
that the inference threat under any bounded cost function can be upper-bounded
by an explicit function of the mutual information between private data and
disclosed data. We then show that the privacy-utility tradeoff under the
log-loss can be cast as the non-convex Privacy Funnel optimization, and we
leverage its connection to the Information Bottleneck, to provide a greedy
algorithm that is locally optimal. We evaluate its performance on the US census
dataset.
| [
{
"version": "v1",
"created": "Fri, 7 Feb 2014 21:23:10 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Feb 2014 20:54:18 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Feb 2014 01:38:04 GMT"
},
{
"version": "v4",
"created": "Sun, 11 May 2014 21:27:18 GMT"
},
{
"version": "v5",
"created": "Tue, 30 Sep 2014 03:28:10 GMT"
}
] | 2014-10-01T00:00:00 | [
[
"Makhdoumi",
"Ali",
""
],
[
"Salamatian",
"Salman",
""
],
[
"Fawaz",
"Nadia",
""
],
[
"Medard",
"Muriel",
""
]
] | TITLE: From the Information Bottleneck to the Privacy Funnel
ABSTRACT: We focus on the privacy-utility trade-off encountered by users who wish to
disclose some information to an analyst, that is correlated with their private
data, in the hope of receiving some utility. We rely on a general privacy
statistical inference framework, under which data is transformed before it is
disclosed, according to a probabilistic privacy mapping. We show that when the
log-loss is introduced in this framework in both the privacy metric and the
distortion metric, the privacy leakage and the utility constraint can be
reduced to the mutual information between private data and disclosed data, and
between non-private data and disclosed data respectively. We justify the
relevance and generality of the privacy metric under the log-loss by proving
that the inference threat under any bounded cost function can be upper-bounded
by an explicit function of the mutual information between private data and
disclosed data. We then show that the privacy-utility tradeoff under the
log-loss can be cast as the non-convex Privacy Funnel optimization, and we
leverage its connection to the Information Bottleneck, to provide a greedy
algorithm that is locally optimal. We evaluate its performance on the US census
dataset.
|
1402.5792 | Seyed Mostafa Kia | Seyed Mostafa Kia, Hossein Rahmani, Reza Mortezaei, Mohsen Ebrahimi
Moghaddam, Amer Namazi | A Novel Scheme for Intelligent Recognition of Pornographic Images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Harmful contents are rising in internet day by day and this motivates the
essence of more research in fast and reliable obscene and immoral material
filtering. Pornographic image recognition is an important component in each
filtering system. In this paper, a new approach for detecting pornographic
images is introduced. In this approach, two new features are suggested. These
two features in combination with other simple traditional features provide
decent difference between porn and non-porn images. In addition, we applied
fuzzy integral based information fusion to combine MLP (Multi-Layer Perceptron)
and NF (Neuro-Fuzzy) outputs. To test the proposed method, performance of
system was evaluated over 18354 download images from internet. The attained
precision was 93% in TP and 8% in FP on training dataset, and 87% and 5.5% on
test dataset. Achieved results verify the performance of proposed system versus
other related works.
| [
{
"version": "v1",
"created": "Mon, 24 Feb 2014 11:15:04 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jun 2014 14:04:13 GMT"
},
{
"version": "v3",
"created": "Mon, 29 Sep 2014 22:15:26 GMT"
}
] | 2014-10-01T00:00:00 | [
[
"Kia",
"Seyed Mostafa",
""
],
[
"Rahmani",
"Hossein",
""
],
[
"Mortezaei",
"Reza",
""
],
[
"Moghaddam",
"Mohsen Ebrahimi",
""
],
[
"Namazi",
"Amer",
""
]
] | TITLE: A Novel Scheme for Intelligent Recognition of Pornographic Images
ABSTRACT: Harmful contents are rising in internet day by day and this motivates the
essence of more research in fast and reliable obscene and immoral material
filtering. Pornographic image recognition is an important component in each
filtering system. In this paper, a new approach for detecting pornographic
images is introduced. In this approach, two new features are suggested. These
two features in combination with other simple traditional features provide
decent difference between porn and non-porn images. In addition, we applied
fuzzy integral based information fusion to combine MLP (Multi-Layer Perceptron)
and NF (Neuro-Fuzzy) outputs. To test the proposed method, performance of
system was evaluated over 18354 download images from internet. The attained
precision was 93% in TP and 8% in FP on training dataset, and 87% and 5.5% on
test dataset. Achieved results verify the performance of proposed system versus
other related works.
|
1409.7311 | Matthijs van Leeuwen | Matthijs van Leeuwen and Antti Ukkonen | Estimating the pattern frequency spectrum inside the browser | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a browser application for estimating the number of frequent
patterns, in particular itemsets, as well as the pattern frequency spectrum.
The pattern frequency spectrum is defined as the function that shows for every
value of the frequency threshold $\sigma$ the number of patterns that are
frequent in a given dataset. Our demo implements a recent algorithm proposed by
the authors for finding the spectrum. The demo is 100% JavaScript, and runs in
all modern browsers. We observe that modern JavaScript engines can deliver
performance that makes it viable to run non-trivial data analysis algorithms in
browser applications.
| [
{
"version": "v1",
"created": "Thu, 25 Sep 2014 16:08:14 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Sep 2014 15:22:51 GMT"
}
] | 2014-10-01T00:00:00 | [
[
"van Leeuwen",
"Matthijs",
""
],
[
"Ukkonen",
"Antti",
""
]
] | TITLE: Estimating the pattern frequency spectrum inside the browser
ABSTRACT: We present a browser application for estimating the number of frequent
patterns, in particular itemsets, as well as the pattern frequency spectrum.
The pattern frequency spectrum is defined as the function that shows for every
value of the frequency threshold $\sigma$ the number of patterns that are
frequent in a given dataset. Our demo implements a recent algorithm proposed by
the authors for finding the spectrum. The demo is 100% JavaScript, and runs in
all modern browsers. We observe that modern JavaScript engines can deliver
performance that makes it viable to run non-trivial data analysis algorithms in
browser applications.
|
1409.8276 | Beyza Ermis Ms | Beyza Ermis, A. Taylan Cemgil | A Bayesian Tensor Factorization Model via Variational Inference for Link
Prediction | arXiv admin note: substantial text overlap with arXiv:1409.8083 | null | null | null | cs.LG cs.NA stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Probabilistic approaches for tensor factorization aim to extract meaningful
structure from incomplete data by postulating low rank constraints. Recently,
variational Bayesian (VB) inference techniques have successfully been applied
to large scale models. This paper presents full Bayesian inference via VB on
both single and coupled tensor factorization models. Our method can be run even
for very large models and is easily implemented. It exhibits better prediction
performance than existing approaches based on maximum likelihood on several
real-world datasets for missing link prediction problem.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2014 12:29:21 GMT"
}
] | 2014-10-01T00:00:00 | [
[
"Ermis",
"Beyza",
""
],
[
"Cemgil",
"A. Taylan",
""
]
] | TITLE: A Bayesian Tensor Factorization Model via Variational Inference for Link
Prediction
ABSTRACT: Probabilistic approaches for tensor factorization aim to extract meaningful
structure from incomplete data by postulating low rank constraints. Recently,
variational Bayesian (VB) inference techniques have successfully been applied
to large scale models. This paper presents full Bayesian inference via VB on
both single and coupled tensor factorization models. Our method can be run even
for very large models and is easily implemented. It exhibits better prediction
performance than existing approaches based on maximum likelihood on several
real-world datasets for missing link prediction problem.
|
1402.6926 | Peter Foster | Peter Foster, Matthias Mauch and Simon Dixon | Sequential Complexity as a Descriptor for Musical Similarity | 13 pages, 9 figures, 8 tables. Accepted version | IEEE/ACM Transactions on Audio, Speech, and Language Processing,
vol. 22 no. 12, pp. 1965-1977, 2014 | 10.1109/TASLP.2014.2357676 | null | cs.IR cs.LG cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose string compressibility as a descriptor of temporal structure in
audio, for the purpose of determining musical similarity. Our descriptors are
based on computing track-wise compression rates of quantised audio features,
using multiple temporal resolutions and quantisation granularities. To verify
that our descriptors capture musically relevant information, we incorporate our
descriptors into similarity rating prediction and song year prediction tasks.
We base our evaluation on a dataset of 15500 track excerpts of Western popular
music, for which we obtain 7800 web-sourced pairwise similarity ratings. To
assess the agreement among similarity ratings, we perform an evaluation under
controlled conditions, obtaining a rank correlation of 0.33 between intersected
sets of ratings. Combined with bag-of-features descriptors, we obtain
performance gains of 31.1% and 10.9% for similarity rating prediction and song
year prediction. For both tasks, analysis of selected descriptors reveals that
representing features at multiple time scales benefits prediction accuracy.
| [
{
"version": "v1",
"created": "Thu, 27 Feb 2014 14:51:48 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Feb 2014 15:14:37 GMT"
},
{
"version": "v3",
"created": "Sun, 28 Sep 2014 23:33:44 GMT"
}
] | 2014-09-30T00:00:00 | [
[
"Foster",
"Peter",
""
],
[
"Mauch",
"Matthias",
""
],
[
"Dixon",
"Simon",
""
]
] | TITLE: Sequential Complexity as a Descriptor for Musical Similarity
ABSTRACT: We propose string compressibility as a descriptor of temporal structure in
audio, for the purpose of determining musical similarity. Our descriptors are
based on computing track-wise compression rates of quantised audio features,
using multiple temporal resolutions and quantisation granularities. To verify
that our descriptors capture musically relevant information, we incorporate our
descriptors into similarity rating prediction and song year prediction tasks.
We base our evaluation on a dataset of 15500 track excerpts of Western popular
music, for which we obtain 7800 web-sourced pairwise similarity ratings. To
assess the agreement among similarity ratings, we perform an evaluation under
controlled conditions, obtaining a rank correlation of 0.33 between intersected
sets of ratings. Combined with bag-of-features descriptors, we obtain
performance gains of 31.1% and 10.9% for similarity rating prediction and song
year prediction. For both tasks, analysis of selected descriptors reveals that
representing features at multiple time scales benefits prediction accuracy.
|
1409.1458 | Martin Jaggi | Martin Jaggi, Virginia Smith, Martin Tak\'a\v{c}, Jonathan Terhorst,
Sanjay Krishnan, Thomas Hofmann, Michael I. Jordan | Communication-Efficient Distributed Dual Coordinate Ascent | NIPS 2014 version, including proofs. Published in Advances in Neural
Information Processing Systems 27 (NIPS 2014) | null | null | null | cs.LG math.OC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Communication remains the most significant bottleneck in the performance of
distributed optimization algorithms for large-scale machine learning. In this
paper, we propose a communication-efficient framework, CoCoA, that uses local
computation in a primal-dual setting to dramatically reduce the amount of
necessary communication. We provide a strong convergence rate analysis for this
class of algorithms, as well as experiments on real-world distributed datasets
with implementations in Spark. In our experiments, we find that as compared to
state-of-the-art mini-batch versions of SGD and SDCA algorithms, CoCoA
converges to the same .001-accurate solution quality on average 25x as quickly.
| [
{
"version": "v1",
"created": "Thu, 4 Sep 2014 14:59:35 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Sep 2014 16:07:32 GMT"
}
] | 2014-09-30T00:00:00 | [
[
"Jaggi",
"Martin",
""
],
[
"Smith",
"Virginia",
""
],
[
"Takáč",
"Martin",
""
],
[
"Terhorst",
"Jonathan",
""
],
[
"Krishnan",
"Sanjay",
""
],
[
"Hofmann",
"Thomas",
""
],
[
"Jordan",
"Michael I.",
""
]
] | TITLE: Communication-Efficient Distributed Dual Coordinate Ascent
ABSTRACT: Communication remains the most significant bottleneck in the performance of
distributed optimization algorithms for large-scale machine learning. In this
paper, we propose a communication-efficient framework, CoCoA, that uses local
computation in a primal-dual setting to dramatically reduce the amount of
necessary communication. We provide a strong convergence rate analysis for this
class of algorithms, as well as experiments on real-world distributed datasets
with implementations in Spark. In our experiments, we find that as compared to
state-of-the-art mini-batch versions of SGD and SDCA algorithms, CoCoA
converges to the same .001-accurate solution quality on average 25x as quickly.
|
1409.5443 | Vasileios Kolias | Vasilis Kolias, Ioannis Anagnostopoulos, Eleftherios Kayafas | Exploratory Analysis of a Terabyte Scale Web Corpus | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a preliminary analysis over the largest publicly
accessible web dataset: the Common Crawl Corpus. We measure nine web
characteristics from two levels of granularity using MapReduce and we comment
on the initial observations over a fraction of it. To the best of our knowledge
two of the characteristics, the language distribution and the HTML version of
pages have not been analyzed in previous work, while the specific dataset has
been only analyzed on page level.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2014 20:00:52 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Sep 2014 08:23:24 GMT"
}
] | 2014-09-30T00:00:00 | [
[
"Kolias",
"Vasilis",
""
],
[
"Anagnostopoulos",
"Ioannis",
""
],
[
"Kayafas",
"Eleftherios",
""
]
] | TITLE: Exploratory Analysis of a Terabyte Scale Web Corpus
ABSTRACT: In this paper we present a preliminary analysis over the largest publicly
accessible web dataset: the Common Crawl Corpus. We measure nine web
characteristics from two levels of granularity using MapReduce and we comment
on the initial observations over a fraction of it. To the best of our knowledge
two of the characteristics, the language distribution and the HTML version of
pages have not been analyzed in previous work, while the specific dataset has
been only analyzed on page level.
|
1409.7963 | Arjun Jain | Arjun Jain, Jonathan Tompson, Yann LeCun and Christoph Bregler | MoDeep: A Deep Learning Framework Using Motion Features for Human Pose
Estimation | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we propose a novel and efficient method for articulated human
pose estimation in videos using a convolutional network architecture, which
incorporates both color and motion features. We propose a new human body pose
dataset, FLIC-motion, that extends the FLIC dataset with additional motion
features. We apply our architecture to this dataset and report significantly
better performance than current state-of-the-art pose detection systems.
| [
{
"version": "v1",
"created": "Sun, 28 Sep 2014 21:32:15 GMT"
}
] | 2014-09-30T00:00:00 | [
[
"Jain",
"Arjun",
""
],
[
"Tompson",
"Jonathan",
""
],
[
"LeCun",
"Yann",
""
],
[
"Bregler",
"Christoph",
""
]
] | TITLE: MoDeep: A Deep Learning Framework Using Motion Features for Human Pose
Estimation
ABSTRACT: In this work, we propose a novel and efficient method for articulated human
pose estimation in videos using a convolutional network architecture, which
incorporates both color and motion features. We propose a new human body pose
dataset, FLIC-motion, that extends the FLIC dataset with additional motion
features. We apply our architecture to this dataset and report significantly
better performance than current state-of-the-art pose detection systems.
|
1409.8028 | Christoph Fuchs | Daniel Raumer, Christoph Fuchs, Georg Groh | Reaching Consensus Among Mobile Agents: A Distributed Protocol for the
Detection of Social Situations | 16 pages, 4 figures, 1 table | null | null | null | cs.SI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Physical social encounters are governed by a set of socio-psychological
behavioral rules with a high degree of uniform validity. Past research has
shown how these rules or the resulting properties of the encounters (e.g. the
geometry of interaction) can be used for algorithmic detection of social
interaction. In this paper, we present a distributed protocol to gain a common
understanding of the existing social situations among agents.
Our approach allows a group of agents to combine their subjective assessment
of an ongoing social situation. Based on perceived social cues obtained from
raw data signals, they reach a consensus about the existence, parameters, and
participants of a social situation. We evaluate our protocol using two
real-world datasets with social interaction information and additional
synthetic data generated by our social-aware mobility model.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2014 08:45:51 GMT"
}
] | 2014-09-30T00:00:00 | [
[
"Raumer",
"Daniel",
""
],
[
"Fuchs",
"Christoph",
""
],
[
"Groh",
"Georg",
""
]
] | TITLE: Reaching Consensus Among Mobile Agents: A Distributed Protocol for the
Detection of Social Situations
ABSTRACT: Physical social encounters are governed by a set of socio-psychological
behavioral rules with a high degree of uniform validity. Past research has
shown how these rules or the resulting properties of the encounters (e.g. the
geometry of interaction) can be used for algorithmic detection of social
interaction. In this paper, we present a distributed protocol to gain a common
understanding of the existing social situations among agents.
Our approach allows a group of agents to combine their subjective assessment
of an ongoing social situation. Based on perceived social cues obtained from
raw data signals, they reach a consensus about the existence, parameters, and
participants of a social situation. We evaluate our protocol using two
real-world datasets with social interaction information and additional
synthetic data generated by our social-aware mobility model.
|
1409.8152 | Yelena Mejova | Yelena Mejova, Amy X. Zhang, Nicholas Diakopoulos, Carlos Castillo | Controversy and Sentiment in Online News | Computation+Journalism Symposium 2014 | null | null | null | cs.CY cs.CL | http://creativecommons.org/licenses/by/3.0/ | How do news sources tackle controversial issues? In this work, we take a
data-driven approach to understand how controversy interplays with emotional
expression and biased language in the news. We begin by introducing a new
dataset of controversial and non-controversial terms collected using
crowdsourcing. Then, focusing on 15 major U.S. news outlets, we compare
millions of articles discussing controversial and non-controversial issues over
a span of 7 months. We find that in general, when it comes to controversial
issues, the use of negative affect and biased language is prevalent, while the
use of strong emotion is tempered. We also observe many differences across news
sources. Using these findings, we show that we can indicate to what extent an
issue is controversial, by comparing it with other issues in terms of how they
are portrayed across different media.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2014 15:23:50 GMT"
}
] | 2014-09-30T00:00:00 | [
[
"Mejova",
"Yelena",
""
],
[
"Zhang",
"Amy X.",
""
],
[
"Diakopoulos",
"Nicholas",
""
],
[
"Castillo",
"Carlos",
""
]
] | TITLE: Controversy and Sentiment in Online News
ABSTRACT: How do news sources tackle controversial issues? In this work, we take a
data-driven approach to understand how controversy interplays with emotional
expression and biased language in the news. We begin by introducing a new
dataset of controversial and non-controversial terms collected using
crowdsourcing. Then, focusing on 15 major U.S. news outlets, we compare
millions of articles discussing controversial and non-controversial issues over
a span of 7 months. We find that in general, when it comes to controversial
issues, the use of negative affect and biased language is prevalent, while the
use of strong emotion is tempered. We also observe many differences across news
sources. Using these findings, we show that we can indicate to what extent an
issue is controversial, by comparing it with other issues in terms of how they
are portrayed across different media.
|
1409.8191 | Djallel Bouneffouf | Robin Allesiardo, Raphael Feraud and Djallel Bouneffouf | A Neural Networks Committee for the Contextual Bandit Problem | 21st International Conference on Neural Information Processing | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new contextual bandit algorithm, NeuralBandit, which
does not need hypothesis on stationarity of contexts and rewards. Several
neural networks are trained to modelize the value of rewards knowing the
context. Two variants, based on multi-experts approach, are proposed to choose
online the parameters of multi-layer perceptrons. The proposed algorithms are
successfully tested on a large dataset with and without stationarity of
rewards.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2014 17:08:21 GMT"
}
] | 2014-09-30T00:00:00 | [
[
"Allesiardo",
"Robin",
""
],
[
"Feraud",
"Raphael",
""
],
[
"Bouneffouf",
"Djallel",
""
]
] | TITLE: A Neural Networks Committee for the Contextual Bandit Problem
ABSTRACT: This paper presents a new contextual bandit algorithm, NeuralBandit, which
does not need hypothesis on stationarity of contexts and rewards. Several
neural networks are trained to modelize the value of rewards knowing the
context. Two variants, based on multi-experts approach, are proposed to choose
online the parameters of multi-layer perceptrons. The proposed algorithms are
successfully tested on a large dataset with and without stationarity of
rewards.
|
1409.8202 | Matteo De Felice | Matteo De Felice, Marcello Petitta, Paolo M. Ruti | Short-Term Predictability of Photovoltaic Production over Italy | Submitted to Renewable Energy | null | null | null | cs.LG stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Photovoltaic (PV) power production increased drastically in Europe throughout
the last years. About the 6% of electricity in Italy comes from PV and for an
efficient management of the power grid an accurate and reliable forecasting of
production would be needed. Starting from a dataset of electricity production
of 65 Italian solar plants for the years 2011-2012 we investigate the
possibility to forecast daily production from one to ten days of lead time
without using on site measurements. Our study is divided in two parts: an
assessment of the predictability of meteorological variables using weather
forecasts and an analysis on the application of data-driven modelling in
predicting solar power production. We calibrate a SVM model using available
observations and then we force the same model with the predicted variables from
weather forecasts with a lead time from one to ten days. As expected, solar
power production is strongly influenced by cloudiness and clear sky, in fact we
observe that while during summer we obtain a general error under the 10%
(slightly lower in south Italy), during winter the error is abundantly above
the 20%.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2014 17:24:29 GMT"
}
] | 2014-09-30T00:00:00 | [
[
"De Felice",
"Matteo",
""
],
[
"Petitta",
"Marcello",
""
],
[
"Ruti",
"Paolo M.",
""
]
] | TITLE: Short-Term Predictability of Photovoltaic Production over Italy
ABSTRACT: Photovoltaic (PV) power production increased drastically in Europe throughout
the last years. About the 6% of electricity in Italy comes from PV and for an
efficient management of the power grid an accurate and reliable forecasting of
production would be needed. Starting from a dataset of electricity production
of 65 Italian solar plants for the years 2011-2012 we investigate the
possibility to forecast daily production from one to ten days of lead time
without using on site measurements. Our study is divided in two parts: an
assessment of the predictability of meteorological variables using weather
forecasts and an analysis on the application of data-driven modelling in
predicting solar power production. We calibrate a SVM model using available
observations and then we force the same model with the predicted variables from
weather forecasts with a lead time from one to ten days. As expected, solar
power production is strongly influenced by cloudiness and clear sky, in fact we
observe that while during summer we obtain a general error under the 10%
(slightly lower in south Italy), during winter the error is abundantly above
the 20%.
|
1405.5737 | Arif Mahmood | Arif Mahmood and Ajmal S. Mian | Semi-supervised Spectral Clustering for Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a Classification Via Clustering (CVC) algorithm which enables
existing clustering methods to be efficiently employed in classification
problems. In CVC, training and test data are co-clustered and class-cluster
distributions are used to find the label of the test data. To determine an
efficient number of clusters, a Semi-supervised Hierarchical Clustering (SHC)
algorithm is proposed. Clusters are obtained by hierarchically applying two-way
NCut by using signs of the Fiedler vector of the normalized graph Laplacian. To
this end, a Direct Fiedler Vector Computation algorithm is proposed. The graph
cut is based on the data structure and does not consider labels. Labels are
used only to define the stopping criterion for graph cut. We propose clustering
to be performed on the Grassmannian manifolds facilitating the formation of
spectral ensembles. The proposed algorithm outperformed state-of-the-art
image-set classification algorithms on five standard datasets.
| [
{
"version": "v1",
"created": "Thu, 22 May 2014 13:05:27 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Sep 2014 04:01:41 GMT"
}
] | 2014-09-29T00:00:00 | [
[
"Mahmood",
"Arif",
""
],
[
"Mian",
"Ajmal S.",
""
]
] | TITLE: Semi-supervised Spectral Clustering for Classification
ABSTRACT: We propose a Classification Via Clustering (CVC) algorithm which enables
existing clustering methods to be efficiently employed in classification
problems. In CVC, training and test data are co-clustered and class-cluster
distributions are used to find the label of the test data. To determine an
efficient number of clusters, a Semi-supervised Hierarchical Clustering (SHC)
algorithm is proposed. Clusters are obtained by hierarchically applying two-way
NCut by using signs of the Fiedler vector of the normalized graph Laplacian. To
this end, a Direct Fiedler Vector Computation algorithm is proposed. The graph
cut is based on the data structure and does not consider labels. Labels are
used only to define the stopping criterion for graph cut. We propose clustering
to be performed on the Grassmannian manifolds facilitating the formation of
spectral ensembles. The proposed algorithm outperformed state-of-the-art
image-set classification algorithms on five standard datasets.
|
1409.7458 | Jiantao Jiao | Jiantao Jiao, Kartik Venkat, Yanjun Han, Tsachy Weissman | Beyond Maximum Likelihood: from Theory to Practice | null | null | null | null | stat.ME cs.DS cs.IT math.IT stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximum likelihood is the most widely used statistical estimation technique.
Recent work by the authors introduced a general methodology for the
construction of estimators for functionals in parametric models, and
demonstrated improvements - both in theory and in practice - over the maximum
likelihood estimator (MLE), particularly in high dimensional scenarios
involving parameter dimension comparable to or larger than the number of
samples. This approach to estimation, building on results from approximation
theory, is shown to yield minimax rate-optimal estimators for a wide class of
functionals, implementable with modest computational requirements. In a
nutshell, a message of this recent work is that, for a wide class of
functionals, the performance of these essentially optimal estimators with $n$
samples is comparable to that of the MLE with $n \ln n$ samples.
In the present paper, we highlight the applicability of the aforementioned
methodology to statistical problems beyond functional estimation, and show that
it can yield substantial gains. For example, we demonstrate that for learning
tree-structured graphical models, our approach achieves a significant reduction
of the required data size compared with the classical Chow--Liu algorithm,
which is an implementation of the MLE, to achieve the same accuracy. The key
step in improving the Chow--Liu algorithm is to replace the empirical mutual
information with the estimator for mutual information proposed by the authors.
Further, applying the same replacement approach to classical Bayesian network
classification, the resulting classifiers uniformly outperform the previous
classifiers on 26 widely used datasets.
| [
{
"version": "v1",
"created": "Fri, 26 Sep 2014 01:45:34 GMT"
}
] | 2014-09-29T00:00:00 | [
[
"Jiao",
"Jiantao",
""
],
[
"Venkat",
"Kartik",
""
],
[
"Han",
"Yanjun",
""
],
[
"Weissman",
"Tsachy",
""
]
] | TITLE: Beyond Maximum Likelihood: from Theory to Practice
ABSTRACT: Maximum likelihood is the most widely used statistical estimation technique.
Recent work by the authors introduced a general methodology for the
construction of estimators for functionals in parametric models, and
demonstrated improvements - both in theory and in practice - over the maximum
likelihood estimator (MLE), particularly in high dimensional scenarios
involving parameter dimension comparable to or larger than the number of
samples. This approach to estimation, building on results from approximation
theory, is shown to yield minimax rate-optimal estimators for a wide class of
functionals, implementable with modest computational requirements. In a
nutshell, a message of this recent work is that, for a wide class of
functionals, the performance of these essentially optimal estimators with $n$
samples is comparable to that of the MLE with $n \ln n$ samples.
In the present paper, we highlight the applicability of the aforementioned
methodology to statistical problems beyond functional estimation, and show that
it can yield substantial gains. For example, we demonstrate that for learning
tree-structured graphical models, our approach achieves a significant reduction
of the required data size compared with the classical Chow--Liu algorithm,
which is an implementation of the MLE, to achieve the same accuracy. The key
step in improving the Chow--Liu algorithm is to replace the empirical mutual
information with the estimator for mutual information proposed by the authors.
Further, applying the same replacement approach to classical Bayesian network
classification, the resulting classifiers uniformly outperform the previous
classifiers on 26 widely used datasets.
|
1409.7615 | Jan Dreier | Jan Dreier | Overlapping Communities in Complex Networks | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Communities are subsets of a network that are densely connected inside and
share only few connections to the rest of the network. The aim of this research
is the development and evaluation of an efficient algorithm for detection of
overlapping, fuzzy communities. The algorithm gets as input some members of
each community that we aim to discover. We call these members seed nodes. The
algorithm then propagates this information by using random walks that start at
non-seed nodes and end as they reach a seed node. The probability that a random
walk starting at a non-seed node $v$ ends at a seed node $s$ is then equated
with the probability that $v$ belongs to the communities of $s$. The algorithm
runs in time $\tilde{O}(l \cdot m \cdot \log n)$, where $l$ is the number of
communities to detect, $m$ is the number of edges, $n$ is the number of nodes.
The $\tilde{O}$-notation hides a factor of at most $(\log \log n)^2$. The LFR
benchmark proposed by Lancichinetti et al.\ is used to evaluate the performance
of the algorithm. We found that, given a good set of seed nodes, it is able to
reconstruct the communities of a network in a meaningful manner.
| [
{
"version": "v1",
"created": "Fri, 26 Sep 2014 16:14:15 GMT"
}
] | 2014-09-29T00:00:00 | [
[
"Dreier",
"Jan",
""
]
] | TITLE: Overlapping Communities in Complex Networks
ABSTRACT: Communities are subsets of a network that are densely connected inside and
share only few connections to the rest of the network. The aim of this research
is the development and evaluation of an efficient algorithm for detection of
overlapping, fuzzy communities. The algorithm gets as input some members of
each community that we aim to discover. We call these members seed nodes. The
algorithm then propagates this information by using random walks that start at
non-seed nodes and end as they reach a seed node. The probability that a random
walk starting at a non-seed node $v$ ends at a seed node $s$ is then equated
with the probability that $v$ belongs to the communities of $s$. The algorithm
runs in time $\tilde{O}(l \cdot m \cdot \log n)$, where $l$ is the number of
communities to detect, $m$ is the number of edges, $n$ is the number of nodes.
The $\tilde{O}$-notation hides a factor of at most $(\log \log n)^2$. The LFR
benchmark proposed by Lancichinetti et al.\ is used to evaluate the performance
of the algorithm. We found that, given a good set of seed nodes, it is able to
reconstruct the communities of a network in a meaningful manner.
|
1409.6805 | Siting Ren | Siting Ren, Sheng Gao | Improving Cross-domain Recommendation through Probabilistic
Cluster-level Latent Factor Model--Extended Version | null | null | null | null | cs.IR cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cross-domain recommendation has been proposed to transfer user behavior
pattern by pooling together the rating data from multiple domains to alleviate
the sparsity problem appearing in single rating domains. However, previous
models only assume that multiple domains share a latent common rating pattern
based on the user-item co-clustering. To capture diversities among different
domains, we propose a novel Probabilistic Cluster-level Latent Factor (PCLF)
model to improve the cross-domain recommendation performance. Experiments on
several real world datasets demonstrate that our proposed model outperforms the
state-of-the-art methods for the cross-domain recommendation task.
| [
{
"version": "v1",
"created": "Wed, 24 Sep 2014 02:55:31 GMT"
}
] | 2014-09-26T00:00:00 | [
[
"Ren",
"Siting",
""
],
[
"Gao",
"Sheng",
""
]
] | TITLE: Improving Cross-domain Recommendation through Probabilistic
Cluster-level Latent Factor Model--Extended Version
ABSTRACT: Cross-domain recommendation has been proposed to transfer user behavior
pattern by pooling together the rating data from multiple domains to alleviate
the sparsity problem appearing in single rating domains. However, previous
models only assume that multiple domains share a latent common rating pattern
based on the user-item co-clustering. To capture diversities among different
domains, we propose a novel Probabilistic Cluster-level Latent Factor (PCLF)
model to improve the cross-domain recommendation performance. Experiments on
several real world datasets demonstrate that our proposed model outperforms the
state-of-the-art methods for the cross-domain recommendation task.
|
1409.7164 | Xiang Bai | Zhuotun Zhu, Xinggang Wang, Song Bai, Cong Yao, Xiang Bai | Deep Learning Representation using Autoencoder for 3D Shape Retrieval | 6 pages, 7 figures, 2014ICSPAC | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of how to build a deep learning representation for 3D
shape. Deep learning has shown to be very effective in variety of visual
applications, such as image classification and object detection. However, it
has not been successfully applied to 3D shape recognition. This is because 3D
shape has complex structure in 3D space and there are limited number of 3D
shapes for feature learning. To address these problems, we project 3D shapes
into 2D space and use autoencoder for feature learning on the 2D images. High
accuracy 3D shape retrieval performance is obtained by aggregating the features
learned on 2D images. In addition, we show the proposed deep learning feature
is complementary to conventional local image descriptors. By combing the global
deep learning representation and the local descriptor representation, our
method can obtain the state-of-the-art performance on 3D shape retrieval
benchmarks.
| [
{
"version": "v1",
"created": "Thu, 25 Sep 2014 06:27:28 GMT"
}
] | 2014-09-26T00:00:00 | [
[
"Zhu",
"Zhuotun",
""
],
[
"Wang",
"Xinggang",
""
],
[
"Bai",
"Song",
""
],
[
"Yao",
"Cong",
""
],
[
"Bai",
"Xiang",
""
]
] | TITLE: Deep Learning Representation using Autoencoder for 3D Shape Retrieval
ABSTRACT: We study the problem of how to build a deep learning representation for 3D
shape. Deep learning has shown to be very effective in variety of visual
applications, such as image classification and object detection. However, it
has not been successfully applied to 3D shape recognition. This is because 3D
shape has complex structure in 3D space and there are limited number of 3D
shapes for feature learning. To address these problems, we project 3D shapes
into 2D space and use autoencoder for feature learning on the 2D images. High
accuracy 3D shape retrieval performance is obtained by aggregating the features
learned on 2D images. In addition, we show the proposed deep learning feature
is complementary to conventional local image descriptors. By combing the global
deep learning representation and the local descriptor representation, our
method can obtain the state-of-the-art performance on 3D shape retrieval
benchmarks.
|
1409.7307 | YuGei Gan | Yufei Gan, Tong Zhuo, Chu He | Image Classification with A Deep Network Model based on Compressive
Sensing | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To simplify the parameter of the deep learning network, a cascaded
compressive sensing model "CSNet" is implemented for image classification.
Firstly, we use cascaded compressive sensing network to learn feature from the
data. Secondly, CSNet generates the feature by binary hashing and block-wise
histograms. Finally, a linear SVM classifier is used to classify these
features. The experiments on the MNIST dataset indicate that higher
classification accuracy can be obtained by this algorithm.
| [
{
"version": "v1",
"created": "Thu, 25 Sep 2014 15:52:05 GMT"
}
] | 2014-09-26T00:00:00 | [
[
"Gan",
"Yufei",
""
],
[
"Zhuo",
"Tong",
""
],
[
"He",
"Chu",
""
]
] | TITLE: Image Classification with A Deep Network Model based on Compressive
Sensing
ABSTRACT: To simplify the parameter of the deep learning network, a cascaded
compressive sensing model "CSNet" is implemented for image classification.
Firstly, we use cascaded compressive sensing network to learn feature from the
data. Secondly, CSNet generates the feature by binary hashing and block-wise
histograms. Finally, a linear SVM classifier is used to classify these
features. The experiments on the MNIST dataset indicate that higher
classification accuracy can be obtained by this algorithm.
|
1409.7313 | YuGei Gan | Yufei Gan, Teng Yang, Chu He | A Deep Graph Embedding Network Model for Face Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a new deep learning network "GENet", it combines
the multi-layer network architec- ture and graph embedding framework. Firstly,
we use simplest unsupervised learning PCA/LDA as first layer to generate the
low- level feature. Secondly, many cascaded dimensionality reduction layers
based on graph embedding framework are applied to GENet. Finally, a linear SVM
classifier is used to classify dimension-reduced features. The experiments
indicate that higher classification accuracy can be obtained by this algorithm
on the CMU-PIE, ORL, Extended Yale B dataset.
| [
{
"version": "v1",
"created": "Thu, 25 Sep 2014 16:14:18 GMT"
}
] | 2014-09-26T00:00:00 | [
[
"Gan",
"Yufei",
""
],
[
"Yang",
"Teng",
""
],
[
"He",
"Chu",
""
]
] | TITLE: A Deep Graph Embedding Network Model for Face Recognition
ABSTRACT: In this paper, we propose a new deep learning network "GENet", it combines
the multi-layer network architec- ture and graph embedding framework. Firstly,
we use simplest unsupervised learning PCA/LDA as first layer to generate the
low- level feature. Secondly, many cascaded dimensionality reduction layers
based on graph embedding framework are applied to GENet. Finally, a linear SVM
classifier is used to classify dimension-reduced features. The experiments
indicate that higher classification accuracy can be obtained by this algorithm
on the CMU-PIE, ORL, Extended Yale B dataset.
|
1307.7220 | Anmer Daskin | Anmer Daskin, Ananth Grama, Sabre Kais | Multiple Network Alignment on Quantum Computers | null | null | 10.1007/s11128-014-0818-7 | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Comparative analyses of graph structured datasets underly diverse problems.
Examples of these problems include identification of conserved functional
components (biochemical interactions) across species, structural similarity of
large biomolecules, and recurring patterns of interactions in social networks.
A large class of such analyses methods quantify the topological similarity of
nodes across networks. The resulting correspondence of nodes across networks,
also called node alignment, can be used to identify invariant subgraphs across
the input graphs.
Given $k$ graphs as input, alignment algorithms use topological information
to assign a similarity score to each $k$-tuple of nodes, with elements (nodes)
drawn from each of the input graphs. Nodes are considered similar if their
neighbors are also similar. An alternate, equivalent view of these network
alignment algorithms is to consider the Kronecker product of the input graphs,
and to identify high-ranked nodes in the Kronecker product graph. Conventional
methods such as PageRank and HITS (Hypertext Induced Topic Selection) can be
used for this purpose. These methods typically require computation of the
principal eigenvector of a suitably modified Kronecker product matrix of the
input graphs. We adopt this alternate view of the problem to address the
problem of multiple network alignment. Using the phase estimation algorithm, we
show that the multiple network alignment problem can be efficiently solved on
quantum computers. We characterize the accuracy and performance of our method,
and show that it can deliver exponential speedups over conventional
(non-quantum) methods.
| [
{
"version": "v1",
"created": "Sat, 27 Jul 2013 06:37:49 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Aug 2014 14:00:59 GMT"
}
] | 2014-09-25T00:00:00 | [
[
"Daskin",
"Anmer",
""
],
[
"Grama",
"Ananth",
""
],
[
"Kais",
"Sabre",
""
]
] | TITLE: Multiple Network Alignment on Quantum Computers
ABSTRACT: Comparative analyses of graph structured datasets underly diverse problems.
Examples of these problems include identification of conserved functional
components (biochemical interactions) across species, structural similarity of
large biomolecules, and recurring patterns of interactions in social networks.
A large class of such analyses methods quantify the topological similarity of
nodes across networks. The resulting correspondence of nodes across networks,
also called node alignment, can be used to identify invariant subgraphs across
the input graphs.
Given $k$ graphs as input, alignment algorithms use topological information
to assign a similarity score to each $k$-tuple of nodes, with elements (nodes)
drawn from each of the input graphs. Nodes are considered similar if their
neighbors are also similar. An alternate, equivalent view of these network
alignment algorithms is to consider the Kronecker product of the input graphs,
and to identify high-ranked nodes in the Kronecker product graph. Conventional
methods such as PageRank and HITS (Hypertext Induced Topic Selection) can be
used for this purpose. These methods typically require computation of the
principal eigenvector of a suitably modified Kronecker product matrix of the
input graphs. We adopt this alternate view of the problem to address the
problem of multiple network alignment. Using the phase estimation algorithm, we
show that the multiple network alignment problem can be efficiently solved on
quantum computers. We characterize the accuracy and performance of our method,
and show that it can deliver exponential speedups over conventional
(non-quantum) methods.
|
1406.5052 | Uldis Boj\=ars | Uldis Boj\=ars and Ren\=ars Liepi\c{n}\v{s} | The State of Open Data in Latvia: 2014 | keywords: Open Data, Open Government Data, PSI, Latvia | Baltic J. Modern Computing, Vol. 2 (2014), No. 3, 160-170 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper examines the state of Open Data in Latvia at the middle of 2014.
The study is divided into two parts: (i) a survey of open data situation and
(ii) an overview of available open data sets. The first part examines the
general open data climate in Latvia according to the guidelines of the OKFN
Open Data Index making the results comparable to those of other participants of
this index. The second part examines datasets made available on the Latvia Open
Data community catalogue, the only open data catalogue available in Latvia at
the moment. We conclude that Latvia public sector open data mostly fulfil the
basic criteria (e.g., data is available) of the Open Data Index but fail on
more advanced criteria: the majority of data considered in the study are not
published in machine-readable form, are not available for bulk download and
none of the data sources have open license statements.
| [
{
"version": "v1",
"created": "Thu, 19 Jun 2014 14:08:03 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Sep 2014 10:52:45 GMT"
}
] | 2014-09-25T00:00:00 | [
[
"Bojārs",
"Uldis",
""
],
[
"Liepiņš",
"Renārs",
""
]
] | TITLE: The State of Open Data in Latvia: 2014
ABSTRACT: This paper examines the state of Open Data in Latvia at the middle of 2014.
The study is divided into two parts: (i) a survey of open data situation and
(ii) an overview of available open data sets. The first part examines the
general open data climate in Latvia according to the guidelines of the OKFN
Open Data Index making the results comparable to those of other participants of
this index. The second part examines datasets made available on the Latvia Open
Data community catalogue, the only open data catalogue available in Latvia at
the moment. We conclude that Latvia public sector open data mostly fulfil the
basic criteria (e.g., data is available) of the Open Data Index but fail on
more advanced criteria: the majority of data considered in the study are not
published in machine-readable form, are not available for bulk download and
none of the data sources have open license statements.
|
1405.2362 | Yan Fang | Yan Fang, Matthew J. Cotter, Donald M. Chiarulli, Steven P. Levitan | Image Segmentation Using Frequency Locking of Coupled Oscillators | 7 pages, 14 figures, the 51th Design Automation Conference 2014, Work
in Progress Poster Session | null | 10.1109/CNNA.2014.6888657 | null | cs.CV q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Synchronization of coupled oscillators is observed at multiple levels of
neural systems, and has been shown to play an important function in visual
perception. We propose a computing system based on locally coupled oscillator
networks for image segmentation. The system can serve as the preprocessing
front-end of an image processing pipeline where the common frequencies of
clusters of oscillators reflect the segmentation results. To demonstrate the
feasibility of our design, the system is simulated and tested on a human face
image dataset and its performance is compared with traditional intensity
threshold based algorithms. Our system shows both better performance and higher
noise tolerance than traditional methods.
| [
{
"version": "v1",
"created": "Fri, 9 May 2014 21:53:05 GMT"
}
] | 2014-09-24T00:00:00 | [
[
"Fang",
"Yan",
""
],
[
"Cotter",
"Matthew J.",
""
],
[
"Chiarulli",
"Donald M.",
""
],
[
"Levitan",
"Steven P.",
""
]
] | TITLE: Image Segmentation Using Frequency Locking of Coupled Oscillators
ABSTRACT: Synchronization of coupled oscillators is observed at multiple levels of
neural systems, and has been shown to play an important function in visual
perception. We propose a computing system based on locally coupled oscillator
networks for image segmentation. The system can serve as the preprocessing
front-end of an image processing pipeline where the common frequencies of
clusters of oscillators reflect the segmentation results. To demonstrate the
feasibility of our design, the system is simulated and tested on a human face
image dataset and its performance is compared with traditional intensity
threshold based algorithms. Our system shows both better performance and higher
noise tolerance than traditional methods.
|
1408.2003 | Bo Han | Bo Han, Bo He, Rui Nian, Mengmeng Ma, Shujing Zhang, Minghui Li and
Amaury Lendasse | LARSEN-ELM: Selective Ensemble of Extreme Learning Machines using LARS
for Blended Data | Accepted for publication in Neurocomputing, 01/19/2014 | Neurocomputing, 2014, Elsevier. Manuscript ID: NEUCOM-D-13-01029 | 10.1016/j.neucom.2014.01.069 | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Extreme learning machine (ELM) as a neural network algorithm has shown its
good performance, such as fast speed, simple structure etc, but also, weak
robustness is an unavoidable defect in original ELM for blended data. We
present a new machine learning framework called LARSEN-ELM for overcoming this
problem. In our paper, we would like to show two key steps in LARSEN-ELM. In
the first step, preprocessing, we select the input variables highly related to
the output using least angle regression (LARS). In the second step, training,
we employ Genetic Algorithm (GA) based selective ensemble and original ELM. In
the experiments, we apply a sum of two sines and four datasets from UCI
repository to verify the robustness of our approach. The experimental results
show that compared with original ELM and other methods such as OP-ELM,
GASEN-ELM and LSBoost, LARSEN-ELM significantly improve robustness performance
while keeping a relatively high speed.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2014 01:31:02 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Aug 2014 02:54:54 GMT"
}
] | 2014-09-24T00:00:00 | [
[
"Han",
"Bo",
""
],
[
"He",
"Bo",
""
],
[
"Nian",
"Rui",
""
],
[
"Ma",
"Mengmeng",
""
],
[
"Zhang",
"Shujing",
""
],
[
"Li",
"Minghui",
""
],
[
"Lendasse",
"Amaury",
""
]
] | TITLE: LARSEN-ELM: Selective Ensemble of Extreme Learning Machines using LARS
for Blended Data
ABSTRACT: Extreme learning machine (ELM) as a neural network algorithm has shown its
good performance, such as fast speed, simple structure etc, but also, weak
robustness is an unavoidable defect in original ELM for blended data. We
present a new machine learning framework called LARSEN-ELM for overcoming this
problem. In our paper, we would like to show two key steps in LARSEN-ELM. In
the first step, preprocessing, we select the input variables highly related to
the output using least angle regression (LARS). In the second step, training,
we employ Genetic Algorithm (GA) based selective ensemble and original ELM. In
the experiments, we apply a sum of two sines and four datasets from UCI
repository to verify the robustness of our approach. The experimental results
show that compared with original ELM and other methods such as OP-ELM,
GASEN-ELM and LSBoost, LARSEN-ELM significantly improve robustness performance
while keeping a relatively high speed.
|
1408.2004 | Bo Han | Bo Han, Bo He, Mengmeng Ma, Tingting Sun, Tianhong Yan, Amaury
Lendasse | RMSE-ELM: Recursive Model based Selective Ensemble of Extreme Learning
Machines for Robustness Improvement | Accepted for publication in Mathematical Problems in Engineering,
09/22/2014 | null | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Extreme learning machine (ELM) as an emerging branch of shallow networks has
shown its excellent generalization and fast learning speed. However, for
blended data, the robustness of ELM is weak because its weights and biases of
hidden nodes are set randomly. Moreover, the noisy data exert a negative
effect. To solve this problem, a new framework called RMSE-ELM is proposed in
this paper. It is a two-layer recursive model. In the first layer, the
framework trains lots of ELMs in different groups concurrently, then employs
selective ensemble to pick out an optimal set of ELMs in each group, which can
be merged into a large group of ELMs called candidate pool. In the second
layer, selective ensemble is recursively used on candidate pool to acquire the
final ensemble. In the experiments, we apply UCI blended datasets to confirm
the robustness of our new approach in two key aspects (mean square error and
standard deviation). The space complexity of our method is increased to some
degree, but the results have shown that RMSE-ELM significantly improves
robustness with slightly computational time compared with representative
methods (ELM, OP-ELM, GASEN-ELM, GASEN-BP and E-GASEN). It becomes a potential
framework to solve robustness issue of ELM for high-dimensional blended data in
the future.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2014 01:36:03 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Aug 2014 02:35:11 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Sep 2014 07:48:35 GMT"
}
] | 2014-09-24T00:00:00 | [
[
"Han",
"Bo",
""
],
[
"He",
"Bo",
""
],
[
"Ma",
"Mengmeng",
""
],
[
"Sun",
"Tingting",
""
],
[
"Yan",
"Tianhong",
""
],
[
"Lendasse",
"Amaury",
""
]
] | TITLE: RMSE-ELM: Recursive Model based Selective Ensemble of Extreme Learning
Machines for Robustness Improvement
ABSTRACT: Extreme learning machine (ELM) as an emerging branch of shallow networks has
shown its excellent generalization and fast learning speed. However, for
blended data, the robustness of ELM is weak because its weights and biases of
hidden nodes are set randomly. Moreover, the noisy data exert a negative
effect. To solve this problem, a new framework called RMSE-ELM is proposed in
this paper. It is a two-layer recursive model. In the first layer, the
framework trains lots of ELMs in different groups concurrently, then employs
selective ensemble to pick out an optimal set of ELMs in each group, which can
be merged into a large group of ELMs called candidate pool. In the second
layer, selective ensemble is recursively used on candidate pool to acquire the
final ensemble. In the experiments, we apply UCI blended datasets to confirm
the robustness of our new approach in two key aspects (mean square error and
standard deviation). The space complexity of our method is increased to some
degree, but the results have shown that RMSE-ELM significantly improves
robustness with slightly computational time compared with representative
methods (ELM, OP-ELM, GASEN-ELM, GASEN-BP and E-GASEN). It becomes a potential
framework to solve robustness issue of ELM for high-dimensional blended data in
the future.
|
1407.1610 | Pulkit Agrawal | Pulkit Agrawal, Ross Girshick, Jitendra Malik | Analyzing the Performance of Multilayer Neural Networks for Object
Recognition | Published in European Conference on Computer Vision 2014 (ECCV-2014) | null | null | null | cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last two years, convolutional neural networks (CNNs) have achieved an
impressive suite of results on standard recognition datasets and tasks.
CNN-based features seem poised to quickly replace engineered representations,
such as SIFT and HOG. However, compared to SIFT and HOG, we understand much
less about the nature of the features learned by large CNNs. In this paper, we
experimentally probe several aspects of CNN feature learning in an attempt to
help practitioners gain useful, evidence-backed intuitions about how to apply
CNNs to computer vision problems.
| [
{
"version": "v1",
"created": "Mon, 7 Jul 2014 08:00:57 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2014 17:49:01 GMT"
}
] | 2014-09-23T00:00:00 | [
[
"Agrawal",
"Pulkit",
""
],
[
"Girshick",
"Ross",
""
],
[
"Malik",
"Jitendra",
""
]
] | TITLE: Analyzing the Performance of Multilayer Neural Networks for Object
Recognition
ABSTRACT: In the last two years, convolutional neural networks (CNNs) have achieved an
impressive suite of results on standard recognition datasets and tasks.
CNN-based features seem poised to quickly replace engineered representations,
such as SIFT and HOG. However, compared to SIFT and HOG, we understand much
less about the nature of the features learned by large CNNs. In this paper, we
experimentally probe several aspects of CNN feature learning in an attempt to
help practitioners gain useful, evidence-backed intuitions about how to apply
CNNs to computer vision problems.
|
1408.3809 | Hossein Rahmani | Hossein Rahmani, Arif Mahmood, Du Q. Huynh, Ajmal Mian | HOPC: Histogram of Oriented Principal Components of 3D Pointclouds for
Action Recognition | ECCV 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing techniques for 3D action recognition are sensitive to viewpoint
variations because they extract features from depth images which change
significantly with viewpoint. In contrast, we directly process the pointclouds
and propose a new technique for action recognition which is more robust to
noise, action speed and viewpoint variations. Our technique consists of a novel
descriptor and keypoint detection algorithm. The proposed descriptor is
extracted at a point by encoding the Histogram of Oriented Principal Components
(HOPC) within an adaptive spatio-temporal support volume around that point.
Based on this descriptor, we present a novel method to detect Spatio-Temporal
Key-Points (STKPs) in 3D pointcloud sequences. Experimental results show that
the proposed descriptor and STKP detector outperform state-of-the-art
algorithms on three benchmark human activity datasets. We also introduce a new
multiview public dataset and show the robustness of our proposed method to
viewpoint variations.
| [
{
"version": "v1",
"created": "Sun, 17 Aug 2014 10:34:47 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2014 02:49:32 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Sep 2014 01:46:55 GMT"
},
{
"version": "v4",
"created": "Mon, 22 Sep 2014 06:50:28 GMT"
}
] | 2014-09-23T00:00:00 | [
[
"Rahmani",
"Hossein",
""
],
[
"Mahmood",
"Arif",
""
],
[
"Huynh",
"Du Q.",
""
],
[
"Mian",
"Ajmal",
""
]
] | TITLE: HOPC: Histogram of Oriented Principal Components of 3D Pointclouds for
Action Recognition
ABSTRACT: Existing techniques for 3D action recognition are sensitive to viewpoint
variations because they extract features from depth images which change
significantly with viewpoint. In contrast, we directly process the pointclouds
and propose a new technique for action recognition which is more robust to
noise, action speed and viewpoint variations. Our technique consists of a novel
descriptor and keypoint detection algorithm. The proposed descriptor is
extracted at a point by encoding the Histogram of Oriented Principal Components
(HOPC) within an adaptive spatio-temporal support volume around that point.
Based on this descriptor, we present a novel method to detect Spatio-Temporal
Key-Points (STKPs) in 3D pointcloud sequences. Experimental results show that
the proposed descriptor and STKP detector outperform state-of-the-art
algorithms on three benchmark human activity datasets. We also introduce a new
multiview public dataset and show the robustness of our proposed method to
viewpoint variations.
|
1408.3810 | Hossein Rahmani | Hossein Rahmani, Arif Mahmood, Du Huynh, Ajmal Mian | Action Classification with Locality-constrained Linear Coding | ICPR 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an action classification algorithm which uses Locality-constrained
Linear Coding (LLC) to capture discriminative information of human body
variations in each spatiotemporal subsequence of a video sequence. Our proposed
method divides the input video into equally spaced overlapping spatiotemporal
subsequences, each of which is decomposed into blocks and then cells. We use
the Histogram of Oriented Gradient (HOG3D) feature to encode the information in
each cell. We justify the use of LLC for encoding the block descriptor by
demonstrating its superiority over Sparse Coding (SC). Our sequence descriptor
is obtained via a logistic regression classifier with L2 regularization. We
evaluate and compare our algorithm with ten state-of-the-art algorithms on five
benchmark datasets. Experimental results show that, on average, our algorithm
gives better accuracy than these ten algorithms.
| [
{
"version": "v1",
"created": "Sun, 17 Aug 2014 10:46:45 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2014 06:54:34 GMT"
}
] | 2014-09-23T00:00:00 | [
[
"Rahmani",
"Hossein",
""
],
[
"Mahmood",
"Arif",
""
],
[
"Huynh",
"Du",
""
],
[
"Mian",
"Ajmal",
""
]
] | TITLE: Action Classification with Locality-constrained Linear Coding
ABSTRACT: We propose an action classification algorithm which uses Locality-constrained
Linear Coding (LLC) to capture discriminative information of human body
variations in each spatiotemporal subsequence of a video sequence. Our proposed
method divides the input video into equally spaced overlapping spatiotemporal
subsequences, each of which is decomposed into blocks and then cells. We use
the Histogram of Oriented Gradient (HOG3D) feature to encode the information in
each cell. We justify the use of LLC for encoding the block descriptor by
demonstrating its superiority over Sparse Coding (SC). Our sequence descriptor
is obtained via a logistic regression classifier with L2 regularization. We
evaluate and compare our algorithm with ten state-of-the-art algorithms on five
benchmark datasets. Experimental results show that, on average, our algorithm
gives better accuracy than these ten algorithms.
|
1409.6070 | Benjamin Graham | Benjamin Graham | Spatially-sparse convolutional neural networks | 13 pages | null | null | null | cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional neural networks (CNNs) perform well on problems such as
handwriting recognition and image classification. However, the performance of
the networks is often limited by budget and time constraints, particularly when
trying to train deep networks.
Motivated by the problem of online handwriting recognition, we developed a
CNN for processing spatially-sparse inputs; a character drawn with a one-pixel
wide pen on a high resolution grid looks like a sparse matrix. Taking advantage
of the sparsity allowed us more efficiently to train and test large, deep CNNs.
On the CASIA-OLHWDB1.1 dataset containing 3755 character classes we get a test
error of 3.82%.
Although pictures are not sparse, they can be thought of as sparse by adding
padding. Applying a deep convolutional network using sparsity has resulted in a
substantial reduction in test error on the CIFAR small picture datasets: 6.28%
on CIFAR-10 and 24.30% for CIFAR-100.
| [
{
"version": "v1",
"created": "Mon, 22 Sep 2014 02:39:27 GMT"
}
] | 2014-09-23T00:00:00 | [
[
"Graham",
"Benjamin",
""
]
] | TITLE: Spatially-sparse convolutional neural networks
ABSTRACT: Convolutional neural networks (CNNs) perform well on problems such as
handwriting recognition and image classification. However, the performance of
the networks is often limited by budget and time constraints, particularly when
trying to train deep networks.
Motivated by the problem of online handwriting recognition, we developed a
CNN for processing spatially-sparse inputs; a character drawn with a one-pixel
wide pen on a high resolution grid looks like a sparse matrix. Taking advantage
of the sparsity allowed us more efficiently to train and test large, deep CNNs.
On the CASIA-OLHWDB1.1 dataset containing 3755 character classes we get a test
error of 3.82%.
Although pictures are not sparse, they can be thought of as sparse by adding
padding. Applying a deep convolutional network using sparsity has resulted in a
substantial reduction in test error on the CIFAR small picture datasets: 6.28%
on CIFAR-10 and 24.30% for CIFAR-100.
|
1311.2789 | Stian Soiland-Reyes | Kristina M. Hettne, Harish Dharuri, Jun Zhao, Katherine Wolstencroft,
Khalid Belhajjame, Stian Soiland-Reyes, Eleni Mina, Mark Thompson, Don
Cruickshank, Lourdes Verdes-Montenegro, Julian Garrido, David de Roure, Oscar
Corcho, Graham Klyne, Reinout van Schouwen, Peter A. C. 't Hoen, Sean
Bechhofer, Carole Goble, Marco Roos | Structuring research methods and data with the Research Object model:
genomics workflows as a case study | 35 pages, 10 figures, 1 table. Submitted to Journal of Biomedical
Semantics on 2013-05-13, resubmitted after reviews 2013-11-09, 2014-06-27.
Accepted in principle 2014-07-29. Published: 2014-09-18
http://www.jbiomedsem.com/content/5/1/41. Research Object homepage:
http://www.researchobject.org/ | null | 10.1186/2041-1480-5-41 | uk-ac-man-scw:212837 | q-bio.GN cs.DL | http://creativecommons.org/licenses/by/3.0/ | One of the main challenges for biomedical research lies in the
computer-assisted integrative study of large and increasingly complex
combinations of data in order to understand molecular mechanisms. The
preservation of the materials and methods of such computational experiments
with clear annotations is essential for understanding an experiment, and this
is increasingly recognized in the bioinformatics community. Our assumption is
that offering means of digital, structured aggregation and annotation of the
objects of an experiment will provide necessary meta-data for a scientist to
understand and recreate the results of an experiment. To support this we
explored a model for the semantic description of a workflow-centric Research
Object (RO), where an RO is defined as a resource that aggregates other
resources, e.g., datasets, software, spreadsheets, text, etc. We applied this
model to a case study where we analysed human metabolite variation by
workflows.
| [
{
"version": "v1",
"created": "Tue, 12 Nov 2013 14:23:33 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Aug 2014 13:28:07 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Sep 2014 10:37:56 GMT"
}
] | 2014-09-22T00:00:00 | [
[
"Hettne",
"Kristina M.",
""
],
[
"Dharuri",
"Harish",
""
],
[
"Zhao",
"Jun",
""
],
[
"Wolstencroft",
"Katherine",
""
],
[
"Belhajjame",
"Khalid",
""
],
[
"Soiland-Reyes",
"Stian",
""
],
[
"Mina",
"Eleni",
""
],
[
"Thompson",
"Mark",
""
],
[
"Cruickshank",
"Don",
""
],
[
"Verdes-Montenegro",
"Lourdes",
""
],
[
"Garrido",
"Julian",
""
],
[
"de Roure",
"David",
""
],
[
"Corcho",
"Oscar",
""
],
[
"Klyne",
"Graham",
""
],
[
"van Schouwen",
"Reinout",
""
],
[
"Hoen",
"Peter A. C. 't",
""
],
[
"Bechhofer",
"Sean",
""
],
[
"Goble",
"Carole",
""
],
[
"Roos",
"Marco",
""
]
] | TITLE: Structuring research methods and data with the Research Object model:
genomics workflows as a case study
ABSTRACT: One of the main challenges for biomedical research lies in the
computer-assisted integrative study of large and increasingly complex
combinations of data in order to understand molecular mechanisms. The
preservation of the materials and methods of such computational experiments
with clear annotations is essential for understanding an experiment, and this
is increasingly recognized in the bioinformatics community. Our assumption is
that offering means of digital, structured aggregation and annotation of the
objects of an experiment will provide necessary meta-data for a scientist to
understand and recreate the results of an experiment. To support this we
explored a model for the semantic description of a workflow-centric Research
Object (RO), where an RO is defined as a resource that aggregates other
resources, e.g., datasets, software, spreadsheets, text, etc. We applied this
model to a case study where we analysed human metabolite variation by
workflows.
|
1409.5512 | Liangyue Li | Liangyue Li, Hanghang Tong, Nan Cao, Kate Ehrlich, Yu-Ru Lin, Norbou
Buchler | Replacing the Irreplaceable: Fast Algorithms for Team Member
Recommendation | Initially submitted to KDD 2014 | null | null | null | cs.SI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the problem of Team Member Replacement: given a team
of people embedded in a social network working on the same task, find a good
candidate who can fit in the team after one team member becomes unavailable. We
conjecture that a good team member replacement should have good skill matching
as well as good structure matching. We formulate this problem using the concept
of graph kernel. To tackle the computational challenges, we propose a family of
fast algorithms by (a) designing effective pruning strategies, and (b)
exploring the smoothness between the existing and the new team structures. We
conduct extensive experimental evaluations on real world datasets to
demonstrate the effectiveness and efficiency. Our algorithms (a) perform
significantly better than the alternative choices in terms of both precision
and recall; and (b) scale sub-linearly.
| [
{
"version": "v1",
"created": "Fri, 19 Sep 2014 04:05:16 GMT"
}
] | 2014-09-22T00:00:00 | [
[
"Li",
"Liangyue",
""
],
[
"Tong",
"Hanghang",
""
],
[
"Cao",
"Nan",
""
],
[
"Ehrlich",
"Kate",
""
],
[
"Lin",
"Yu-Ru",
""
],
[
"Buchler",
"Norbou",
""
]
] | TITLE: Replacing the Irreplaceable: Fast Algorithms for Team Member
Recommendation
ABSTRACT: In this paper, we study the problem of Team Member Replacement: given a team
of people embedded in a social network working on the same task, find a good
candidate who can fit in the team after one team member becomes unavailable. We
conjecture that a good team member replacement should have good skill matching
as well as good structure matching. We formulate this problem using the concept
of graph kernel. To tackle the computational challenges, we propose a family of
fast algorithms by (a) designing effective pruning strategies, and (b)
exploring the smoothness between the existing and the new team structures. We
conduct extensive experimental evaluations on real world datasets to
demonstrate the effectiveness and efficiency. Our algorithms (a) perform
significantly better than the alternative choices in terms of both precision
and recall; and (b) scale sub-linearly.
|
1409.5552 | Asif Imran | Asif Imran, Emon Kumar Dey and Kazi Sakib | Active-Threaded Algorithms for Provenance Cognition in the Cloud
preserving Low Overhead and Fault Tolerance | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Provenance is the derivation history of information about the origin of data
and processes. For a highly dynamic system such as the cloud, provenance must
be effectively detected to be used as proves to ensure accountability during
digital forensic investigations. This paper proposes active-threaded provenance
cognition algorithms that ensure effective and high speed detection of
provenance information in the activity layer of the cloud. The algorithms also
support encapsulation of the provenance information on specific targets.
Performance evaluation of the proposed algorithms reveal mean delay of 8.198
seconds that is below the pre-defined benchmark of 10 seconds. Standard
deviation and cumulative frequencies for delays are found to be 1.434 and 45.1%
respectively.
| [
{
"version": "v1",
"created": "Fri, 19 Sep 2014 08:47:51 GMT"
}
] | 2014-09-22T00:00:00 | [
[
"Imran",
"Asif",
""
],
[
"Dey",
"Emon Kumar",
""
],
[
"Sakib",
"Kazi",
""
]
] | TITLE: Active-Threaded Algorithms for Provenance Cognition in the Cloud
preserving Low Overhead and Fault Tolerance
ABSTRACT: Provenance is the derivation history of information about the origin of data
and processes. For a highly dynamic system such as the cloud, provenance must
be effectively detected to be used as proves to ensure accountability during
digital forensic investigations. This paper proposes active-threaded provenance
cognition algorithms that ensure effective and high speed detection of
provenance information in the activity layer of the cloud. The algorithms also
support encapsulation of the provenance information on specific targets.
Performance evaluation of the proposed algorithms reveal mean delay of 8.198
seconds that is below the pre-defined benchmark of 10 seconds. Standard
deviation and cumulative frequencies for delays are found to be 1.434 and 45.1%
respectively.
|
1409.5567 | Yanchao Lu | Yanchao Lu, Donghong Wu, Bingsheng He, Xueyan Tang, Jianliang Xu and
Minyi Guo | Rank-Aware Dynamic Migrations and Adaptive Demotions for DRAM Power
Management | 19 pages | null | null | SJTU-CSE-13-2 | cs.PF cs.AR cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern DRAM architectures allow a number of low-power states on individual
memory ranks for advanced power management. Many previous studies have taken
advantage of demotions on low-power states for energy saving. However, most of
the demotion schemes are statically performed on a limited number of
pre-selected low-power states, and are suboptimal for different workloads and
memory architectures. Even worse, the idle periods are often too short for
effective power state transitions, especially for memory intensive
applications. Wrong decisions on power state transition incur significant
energy and delay penalties. In this paper, we propose a novel memory system
design named RAMZzz with rank-aware energy saving optimizations including
dynamic page migrations and adaptive demotions. Specifically, we group the
pages with similar access locality into the same rank with dynamic page
migrations. Ranks have their hotness: hot ranks are kept busy for high
utilization and cold ranks can have more lengthy idle periods for power state
transitions. We further develop adaptive state demotions by considering all
low-power states for each rank and a prediction model to estimate the
power-down timeout among states. We experimentally compare our algorithm with
other energy saving policies with cycle-accurate simulation. Experiments with
benchmark workloads show that RAMZzz achieves significant improvement on
energy-delay2 and energy consumption over other energy saving techniques.
| [
{
"version": "v1",
"created": "Fri, 19 Sep 2014 09:30:49 GMT"
}
] | 2014-09-22T00:00:00 | [
[
"Lu",
"Yanchao",
""
],
[
"Wu",
"Donghong",
""
],
[
"He",
"Bingsheng",
""
],
[
"Tang",
"Xueyan",
""
],
[
"Xu",
"Jianliang",
""
],
[
"Guo",
"Minyi",
""
]
] | TITLE: Rank-Aware Dynamic Migrations and Adaptive Demotions for DRAM Power
Management
ABSTRACT: Modern DRAM architectures allow a number of low-power states on individual
memory ranks for advanced power management. Many previous studies have taken
advantage of demotions on low-power states for energy saving. However, most of
the demotion schemes are statically performed on a limited number of
pre-selected low-power states, and are suboptimal for different workloads and
memory architectures. Even worse, the idle periods are often too short for
effective power state transitions, especially for memory intensive
applications. Wrong decisions on power state transition incur significant
energy and delay penalties. In this paper, we propose a novel memory system
design named RAMZzz with rank-aware energy saving optimizations including
dynamic page migrations and adaptive demotions. Specifically, we group the
pages with similar access locality into the same rank with dynamic page
migrations. Ranks have their hotness: hot ranks are kept busy for high
utilization and cold ranks can have more lengthy idle periods for power state
transitions. We further develop adaptive state demotions by considering all
low-power states for each rank and a prediction model to estimate the
power-down timeout among states. We experimentally compare our algorithm with
other energy saving policies with cycle-accurate simulation. Experiments with
benchmark workloads show that RAMZzz achieves significant improvement on
energy-delay2 and energy consumption over other energy saving techniques.
|
1310.1525 | Yang Yang | Yang Yang and Yuxiao Dong and Nitesh V. Chawla | Microscopic Evolution of Social Networks by Triad Position Profile | 12 pages, 13 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Disentangling the mechanisms underlying the social network evolution is one
of social science's unsolved puzzles. Preferential attachment is a powerful
mechanism explaining social network dynamics, yet not able to explain all
scaling-laws in social networks. Recent advances in understanding social
network dynamics demonstrate that several scaling-laws in social networks
follow as natural consequences of triadic closure. Macroscopic comparisons
between them are discussed empirically in many works. However the network
evolution drives not only the emergence of macroscopic scaling but also the
microscopic behaviors. Here we exploit two fundamental aspects of the network
microscopic evolution: the individual influence evolution and the process of
link formation. First we develop a novel framework for the microscopic
evolution, where the mechanisms of preferential attachment and triadic closure
are well balanced. Then on four real-world datasets we apply our approach for
two microscopic problems: node's prominence prediction and link prediction,
where our method yields significant predictive improvement over baseline
solutions. Finally to be rigorous and comprehensive, we further observe that
our framework has a stronger generalization capacity across different kinds of
social networks for two microscopic prediction problems. We unveil the
significant factors with a greater degree of precision than has heretofore been
possible, and shed new light on networks evolution.
| [
{
"version": "v1",
"created": "Sun, 6 Oct 2013 01:17:13 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Oct 2013 03:54:19 GMT"
},
{
"version": "v3",
"created": "Thu, 18 Sep 2014 13:15:46 GMT"
}
] | 2014-09-19T00:00:00 | [
[
"Yang",
"Yang",
""
],
[
"Dong",
"Yuxiao",
""
],
[
"Chawla",
"Nitesh V.",
""
]
] | TITLE: Microscopic Evolution of Social Networks by Triad Position Profile
ABSTRACT: Disentangling the mechanisms underlying the social network evolution is one
of social science's unsolved puzzles. Preferential attachment is a powerful
mechanism explaining social network dynamics, yet not able to explain all
scaling-laws in social networks. Recent advances in understanding social
network dynamics demonstrate that several scaling-laws in social networks
follow as natural consequences of triadic closure. Macroscopic comparisons
between them are discussed empirically in many works. However the network
evolution drives not only the emergence of macroscopic scaling but also the
microscopic behaviors. Here we exploit two fundamental aspects of the network
microscopic evolution: the individual influence evolution and the process of
link formation. First we develop a novel framework for the microscopic
evolution, where the mechanisms of preferential attachment and triadic closure
are well balanced. Then on four real-world datasets we apply our approach for
two microscopic problems: node's prominence prediction and link prediction,
where our method yields significant predictive improvement over baseline
solutions. Finally to be rigorous and comprehensive, we further observe that
our framework has a stronger generalization capacity across different kinds of
social networks for two microscopic prediction problems. We unveil the
significant factors with a greater degree of precision than has heretofore been
possible, and shed new light on networks evolution.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.