id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1405.6879
M\'arton Karsai
M\'arton Karsai, Gerardo I\~niguez, Kimmo Kaski, J\'anos Kert\'esz
Complex contagion process in spreading of online innovation
27 pages, 11 figures, 2 tables
J. R. Soc. Interface 11, 101 (2014)
10.1098/rsif.2014.0694
null
physics.soc-ph cs.SI nlin.AO physics.comp-ph physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diffusion of innovation can be interpreted as a social spreading phenomena governed by the impact of media and social interactions. Although these mechanisms have been identified by quantitative theories, their role and relative importance are not entirely understood, since empirical verification has so far been hindered by the lack of appropriate data. Here we analyse a dataset recording the spreading dynamics of the world's largest Voice over Internet Protocol service to empirically support the assumptions behind models of social contagion. We show that the rate of spontaneous service adoption is constant, the probability of adoption via social influence is linearly proportional to the fraction of adopting neighbours, and the rate of service termination is time-invariant and independent of the behaviour of peers. By implementing the detected diffusion mechanisms into a dynamical agent-based model, we are able to emulate the adoption dynamics of the service in several countries worldwide. This approach enables us to make medium-term predictions of service adoption and disclose dependencies between the dynamics of innovation spreading and the socioeconomic development of a country.
[ { "version": "v1", "created": "Tue, 27 May 2014 12:03:31 GMT" }, { "version": "v2", "created": "Thu, 23 Oct 2014 10:10:21 GMT" } ]
2014-10-24T00:00:00
[ [ "Karsai", "Márton", "" ], [ "Iñiguez", "Gerardo", "" ], [ "Kaski", "Kimmo", "" ], [ "Kertész", "János", "" ] ]
TITLE: Complex contagion process in spreading of online innovation ABSTRACT: Diffusion of innovation can be interpreted as a social spreading phenomena governed by the impact of media and social interactions. Although these mechanisms have been identified by quantitative theories, their role and relative importance are not entirely understood, since empirical verification has so far been hindered by the lack of appropriate data. Here we analyse a dataset recording the spreading dynamics of the world's largest Voice over Internet Protocol service to empirically support the assumptions behind models of social contagion. We show that the rate of spontaneous service adoption is constant, the probability of adoption via social influence is linearly proportional to the fraction of adopting neighbours, and the rate of service termination is time-invariant and independent of the behaviour of peers. By implementing the detected diffusion mechanisms into a dynamical agent-based model, we are able to emulate the adoption dynamics of the service in several countries worldwide. This approach enables us to make medium-term predictions of service adoption and disclose dependencies between the dynamics of innovation spreading and the socioeconomic development of a country.
1409.5241
Basura Fernando
Basura Fernando, Amaury Habrard, Marc Sebban and Tinne Tuytelaars
Subspace Alignment For Domain Adaptation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a new domain adaptation (DA) algorithm where the source and target domains are represented by subspaces spanned by eigenvectors. Our method seeks a domain invariant feature space by learning a mapping function which aligns the source subspace with the target one. We show that the solution of the corresponding optimization problem can be obtained in a simple closed form, leading to an extremely fast algorithm. We present two approaches to determine the only hyper-parameter in our method corresponding to the size of the subspaces. In the first approach we tune the size of subspaces using a theoretical bound on the stability of the obtained result. In the second approach, we use maximum likelihood estimation to determine the subspace size, which is particularly useful for high dimensional data. Apart from PCA, we propose a subspace creation method that outperform partial least squares (PLS) and linear discriminant analysis (LDA) in domain adaptation. We test our method on various datasets and show that, despite its intrinsic simplicity, it outperforms state of the art DA methods.
[ { "version": "v1", "created": "Thu, 18 Sep 2014 09:57:41 GMT" }, { "version": "v2", "created": "Thu, 23 Oct 2014 08:40:06 GMT" } ]
2014-10-24T00:00:00
[ [ "Fernando", "Basura", "" ], [ "Habrard", "Amaury", "" ], [ "Sebban", "Marc", "" ], [ "Tuytelaars", "Tinne", "" ] ]
TITLE: Subspace Alignment For Domain Adaptation ABSTRACT: In this paper, we introduce a new domain adaptation (DA) algorithm where the source and target domains are represented by subspaces spanned by eigenvectors. Our method seeks a domain invariant feature space by learning a mapping function which aligns the source subspace with the target one. We show that the solution of the corresponding optimization problem can be obtained in a simple closed form, leading to an extremely fast algorithm. We present two approaches to determine the only hyper-parameter in our method corresponding to the size of the subspaces. In the first approach we tune the size of subspaces using a theoretical bound on the stability of the obtained result. In the second approach, we use maximum likelihood estimation to determine the subspace size, which is particularly useful for high dimensional data. Apart from PCA, we propose a subspace creation method that outperform partial least squares (PLS) and linear discriminant analysis (LDA) in domain adaptation. We test our method on various datasets and show that, despite its intrinsic simplicity, it outperforms state of the art DA methods.
1410.4343
Chiranjib Saha
Anupam Trivedi, Kunal Pal, Chiranjib Saha, Dipti Srinivasan
Enhanced Multiobjective Evolutionary Algorithm based on Decomposition for Solving the Unit Commitment Problem
This paper has been withdrawn by the author due to 1. inconsistency of vector representation in equation (12) and 2. algorithm 3 has not been included in this text which makes the description incomplete
null
null
IEEE Transactions on Industrial Informatics - Manuscript ID TII-14-0921
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The unit commitment (UC) problem is a nonlinear, high-dimensional, highly constrained, mixed-integer power system optimization problem and is generally solved in the literature considering minimizing the system operation cost as the only objective. However, due to increasing environmental concerns, the recent attention has shifted to incorporating emission in the problem formulation. In this paper, a multi-objective evolutionary algorithm based on decomposition (MOEA/D) is proposed to solve the UC problem as a multi-objective optimization problem considering minimizing cost and emission as the multiple objec- tives. Since, UC problem is a mixed-integer optimization problem consisting of binary UC variables and continuous power dispatch variables, a novel hybridization strategy is proposed within the framework of MOEA/D such that genetic algorithm (GA) evolves the binary variables while differential evolution (DE) evolves the continuous variables. Further, a novel non-uniform weight vector distribution strategy is proposed and a parallel island model based on combination of MOEA/D with uniform and non-uniform weight vector distribution strategy is implemented to enhance the performance of the presented algorithm. Extensive case studies are presented on different test systems and the effectiveness of the proposed hybridization strategy, the non-uniform weight vector distribution strategy and parallel island model is verified through stringent simulated results. Further, exhaustive benchmarking against the algorithms proposed in the literature is presented to demonstrate the superiority of the proposed algorithm in obtaining significantly better converged and uniformly distributed trade-off solutions.
[ { "version": "v1", "created": "Thu, 16 Oct 2014 09:17:51 GMT" }, { "version": "v2", "created": "Thu, 23 Oct 2014 18:10:19 GMT" } ]
2014-10-24T00:00:00
[ [ "Trivedi", "Anupam", "" ], [ "Pal", "Kunal", "" ], [ "Saha", "Chiranjib", "" ], [ "Srinivasan", "Dipti", "" ] ]
TITLE: Enhanced Multiobjective Evolutionary Algorithm based on Decomposition for Solving the Unit Commitment Problem ABSTRACT: The unit commitment (UC) problem is a nonlinear, high-dimensional, highly constrained, mixed-integer power system optimization problem and is generally solved in the literature considering minimizing the system operation cost as the only objective. However, due to increasing environmental concerns, the recent attention has shifted to incorporating emission in the problem formulation. In this paper, a multi-objective evolutionary algorithm based on decomposition (MOEA/D) is proposed to solve the UC problem as a multi-objective optimization problem considering minimizing cost and emission as the multiple objec- tives. Since, UC problem is a mixed-integer optimization problem consisting of binary UC variables and continuous power dispatch variables, a novel hybridization strategy is proposed within the framework of MOEA/D such that genetic algorithm (GA) evolves the binary variables while differential evolution (DE) evolves the continuous variables. Further, a novel non-uniform weight vector distribution strategy is proposed and a parallel island model based on combination of MOEA/D with uniform and non-uniform weight vector distribution strategy is implemented to enhance the performance of the presented algorithm. Extensive case studies are presented on different test systems and the effectiveness of the proposed hybridization strategy, the non-uniform weight vector distribution strategy and parallel island model is verified through stringent simulated results. Further, exhaustive benchmarking against the algorithms proposed in the literature is presented to demonstrate the superiority of the proposed algorithm in obtaining significantly better converged and uniformly distributed trade-off solutions.
1311.2524
Ross Girshick
Ross Girshick, Jeff Donahue, Trevor Darrell, Jitendra Malik
Rich feature hierarchies for accurate object detection and semantic segmentation
Extended version of our CVPR 2014 paper; latest update (v5) includes results using deeper networks (see Appendix G. Changelog)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object detection performance, as measured on the canonical PASCAL VOC dataset, has plateaued in the last few years. The best-performing methods are complex ensemble systems that typically combine multiple low-level image features with high-level context. In this paper, we propose a simple and scalable detection algorithm that improves mean average precision (mAP) by more than 30% relative to the previous best result on VOC 2012---achieving a mAP of 53.3%. Our approach combines two key insights: (1) one can apply high-capacity convolutional neural networks (CNNs) to bottom-up region proposals in order to localize and segment objects and (2) when labeled training data is scarce, supervised pre-training for an auxiliary task, followed by domain-specific fine-tuning, yields a significant performance boost. Since we combine region proposals with CNNs, we call our method R-CNN: Regions with CNN features. We also compare R-CNN to OverFeat, a recently proposed sliding-window detector based on a similar CNN architecture. We find that R-CNN outperforms OverFeat by a large margin on the 200-class ILSVRC2013 detection dataset. Source code for the complete system is available at http://www.cs.berkeley.edu/~rbg/rcnn.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 18:43:49 GMT" }, { "version": "v2", "created": "Tue, 15 Apr 2014 01:44:31 GMT" }, { "version": "v3", "created": "Wed, 7 May 2014 17:09:23 GMT" }, { "version": "v4", "created": "Mon, 9 Jun 2014 22:07:33 GMT" }, { "version": "v5", "created": "Wed, 22 Oct 2014 17:23:20 GMT" } ]
2014-10-23T00:00:00
[ [ "Girshick", "Ross", "" ], [ "Donahue", "Jeff", "" ], [ "Darrell", "Trevor", "" ], [ "Malik", "Jitendra", "" ] ]
TITLE: Rich feature hierarchies for accurate object detection and semantic segmentation ABSTRACT: Object detection performance, as measured on the canonical PASCAL VOC dataset, has plateaued in the last few years. The best-performing methods are complex ensemble systems that typically combine multiple low-level image features with high-level context. In this paper, we propose a simple and scalable detection algorithm that improves mean average precision (mAP) by more than 30% relative to the previous best result on VOC 2012---achieving a mAP of 53.3%. Our approach combines two key insights: (1) one can apply high-capacity convolutional neural networks (CNNs) to bottom-up region proposals in order to localize and segment objects and (2) when labeled training data is scarce, supervised pre-training for an auxiliary task, followed by domain-specific fine-tuning, yields a significant performance boost. Since we combine region proposals with CNNs, we call our method R-CNN: Regions with CNN features. We also compare R-CNN to OverFeat, a recently proposed sliding-window detector based on a similar CNN architecture. We find that R-CNN outperforms OverFeat by a large margin on the 200-class ILSVRC2013 detection dataset. Source code for the complete system is available at http://www.cs.berkeley.edu/~rbg/rcnn.
1408.5389
Zhensong Qian
Zhensong Qian, Oliver Schulte and Yan Sun
Computing Multi-Relational Sufficient Statistics for Large Databases
11pages, 8 figures, 8 tables, CIKM'14,November 3--7, 2014, Shanghai, China
null
10.1145/2661829.2662010
null
cs.LG cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of {\em positive and negative} relationships. With a naive enumeration approach, computing sufficient statistics for negative relationships is feasible only for small databases. We solve this problem with a new dynamic programming algorithm that performs a virtual join, where the requisite counts are computed without materializing join tables. Contingency table algebra is a new extension of relational algebra, that facilitates the efficient implementation of this M\"obius virtual join operation. The M\"obius Join scales to large datasets (over 1M tuples) with complex schemas. Empirical evaluation with seven benchmark datasets showed that information about the presence and absence of links can be exploited in feature selection, association rule mining, and Bayesian network learning.
[ { "version": "v1", "created": "Fri, 22 Aug 2014 19:12:19 GMT" } ]
2014-10-23T00:00:00
[ [ "Qian", "Zhensong", "" ], [ "Schulte", "Oliver", "" ], [ "Sun", "Yan", "" ] ]
TITLE: Computing Multi-Relational Sufficient Statistics for Large Databases ABSTRACT: Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of {\em positive and negative} relationships. With a naive enumeration approach, computing sufficient statistics for negative relationships is feasible only for small databases. We solve this problem with a new dynamic programming algorithm that performs a virtual join, where the requisite counts are computed without materializing join tables. Contingency table algebra is a new extension of relational algebra, that facilitates the efficient implementation of this M\"obius virtual join operation. The M\"obius Join scales to large datasets (over 1M tuples) with complex schemas. Empirical evaluation with seven benchmark datasets showed that information about the presence and absence of links can be exploited in feature selection, association rule mining, and Bayesian network learning.
1410.6039
Roberto Sebastiani
Roberto Sebastiani and Silvia Tomasi
Optimization Modulo Theories with Linear Rational Costs
Submitted on january 2014 to ACM Transactions on Computational Logic, currently under revision. arXiv admin note: text overlap with arXiv:1202.1409
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the contexts of automated reasoning (AR) and formal verification (FV), important decision problems are effectively encoded into Satisfiability Modulo Theories (SMT). In the last decade efficient SMT solvers have been developed for several theories of practical interest (e.g., linear arithmetic, arrays, bit-vectors). Surprisingly, little work has been done to extend SMT to deal with optimization problems; in particular, we are not aware of any previous work on SMT solvers able to produce solutions which minimize cost functions over arithmetical variables. This is unfortunate, since some problems of interest require this functionality. In the work described in this paper we start filling this gap. We present and discuss two general procedures for leveraging SMT to handle the minimization of linear rational cost functions, combining SMT with standard minimization techniques. We have implemented the procedures within the MathSAT SMT solver. Due to the absence of competitors in the AR, FV and SMT domains, we have experimentally evaluated our implementation against state-of-the-art tools for the domain of linear generalized disjunctive programming (LGDP), which is closest in spirit to our domain, on sets of problems which have been previously proposed as benchmarks for the latter tools. The results show that our tool is very competitive with, and often outperforms, these tools on these problems, clearly demonstrating the potential of the approach.
[ { "version": "v1", "created": "Wed, 22 Oct 2014 13:39:31 GMT" } ]
2014-10-23T00:00:00
[ [ "Sebastiani", "Roberto", "" ], [ "Tomasi", "Silvia", "" ] ]
TITLE: Optimization Modulo Theories with Linear Rational Costs ABSTRACT: In the contexts of automated reasoning (AR) and formal verification (FV), important decision problems are effectively encoded into Satisfiability Modulo Theories (SMT). In the last decade efficient SMT solvers have been developed for several theories of practical interest (e.g., linear arithmetic, arrays, bit-vectors). Surprisingly, little work has been done to extend SMT to deal with optimization problems; in particular, we are not aware of any previous work on SMT solvers able to produce solutions which minimize cost functions over arithmetical variables. This is unfortunate, since some problems of interest require this functionality. In the work described in this paper we start filling this gap. We present and discuss two general procedures for leveraging SMT to handle the minimization of linear rational cost functions, combining SMT with standard minimization techniques. We have implemented the procedures within the MathSAT SMT solver. Due to the absence of competitors in the AR, FV and SMT domains, we have experimentally evaluated our implementation against state-of-the-art tools for the domain of linear generalized disjunctive programming (LGDP), which is closest in spirit to our domain, on sets of problems which have been previously proposed as benchmarks for the latter tools. The results show that our tool is very competitive with, and often outperforms, these tools on these problems, clearly demonstrating the potential of the approach.
1410.6126
German Ros
German Ros and Jose Alvarez and Julio Guerrero
Motion Estimation via Robust Decomposition with Constrained Rank
Submitted to IEEE TIP
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we address the problem of outlier detection for robust motion estimation by using modern sparse-low-rank decompositions, i.e., Robust PCA-like methods, to impose global rank constraints. Robust decompositions have shown to be good at splitting a corrupted matrix into an uncorrupted low-rank matrix and a sparse matrix, containing outliers. However, this process only works when matrices have relatively low rank with respect to their ambient space, a property not met in motion estimation problems. As a solution, we propose to exploit the partial information present in the decomposition to decide which matches are outliers. We provide evidences showing that even when it is not possible to recover an uncorrupted low-rank matrix, the resulting information can be exploited for outlier detection. To this end we propose the Robust Decomposition with Constrained Rank (RD-CR), a proximal gradient based method that enforces the rank constraints inherent to motion estimation. We also present a general framework to perform robust estimation for stereo Visual Odometry, based on our RD-CR and a simple but effective compressed optimization method that achieves high performance. Our evaluation on synthetic data and on the KITTI dataset demonstrates the applicability of our approach in complex scenarios and it yields state-of-the-art performance.
[ { "version": "v1", "created": "Wed, 22 Oct 2014 18:15:27 GMT" } ]
2014-10-23T00:00:00
[ [ "Ros", "German", "" ], [ "Alvarez", "Jose", "" ], [ "Guerrero", "Julio", "" ] ]
TITLE: Motion Estimation via Robust Decomposition with Constrained Rank ABSTRACT: In this work, we address the problem of outlier detection for robust motion estimation by using modern sparse-low-rank decompositions, i.e., Robust PCA-like methods, to impose global rank constraints. Robust decompositions have shown to be good at splitting a corrupted matrix into an uncorrupted low-rank matrix and a sparse matrix, containing outliers. However, this process only works when matrices have relatively low rank with respect to their ambient space, a property not met in motion estimation problems. As a solution, we propose to exploit the partial information present in the decomposition to decide which matches are outliers. We provide evidences showing that even when it is not possible to recover an uncorrupted low-rank matrix, the resulting information can be exploited for outlier detection. To this end we propose the Robust Decomposition with Constrained Rank (RD-CR), a proximal gradient based method that enforces the rank constraints inherent to motion estimation. We also present a general framework to perform robust estimation for stereo Visual Odometry, based on our RD-CR and a simple but effective compressed optimization method that achieves high performance. Our evaluation on synthetic data and on the KITTI dataset demonstrates the applicability of our approach in complex scenarios and it yields state-of-the-art performance.
1406.6597
Vincent Labatut
G\"unce Keziban Orman, Vincent Labatut, Marc Plantevit (LIRIS), Jean-Fran\c{c}ois Boulicaut (LIRIS)
A Method for Characterizing Communities in Dynamic Attributed Complex Networks
IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM), P\'ekin : China (2014)
null
10.1109/ASONAM.2014.6921629
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many methods have been proposed to detect communities, not only in plain, but also in attributed, directed or even dynamic complex networks. In its simplest form, a community structure takes the form of a partition of the node set. From the modeling point of view, to be of some utility, this partition must then be characterized relatively to the properties of the studied system. However, if most of the existing works focus on defining methods for the detection of communities, only very few try to tackle this interpretation problem. Moreover, the existing approaches are limited either in the type of data they handle, or by the nature of the results they output. In this work, we propose a method to efficiently support such a characterization task. We first define a sequence-based representation of networks, combining temporal information, topological measures, and nodal attributes. We then describe how to identify the most emerging sequential patterns of this dataset, and use them to characterize the communities. We also show how to detect unusual behavior in a community, and highlight outliers. Finally, as an illustration, we apply our method to a network of scientific collaborations.
[ { "version": "v1", "created": "Wed, 25 Jun 2014 14:54:52 GMT" } ]
2014-10-22T00:00:00
[ [ "Orman", "Günce Keziban", "", "LIRIS" ], [ "Labatut", "Vincent", "", "LIRIS" ], [ "Plantevit", "Marc", "", "LIRIS" ], [ "Boulicaut", "Jean-François", "", "LIRIS" ] ]
TITLE: A Method for Characterizing Communities in Dynamic Attributed Complex Networks ABSTRACT: Many methods have been proposed to detect communities, not only in plain, but also in attributed, directed or even dynamic complex networks. In its simplest form, a community structure takes the form of a partition of the node set. From the modeling point of view, to be of some utility, this partition must then be characterized relatively to the properties of the studied system. However, if most of the existing works focus on defining methods for the detection of communities, only very few try to tackle this interpretation problem. Moreover, the existing approaches are limited either in the type of data they handle, or by the nature of the results they output. In this work, we propose a method to efficiently support such a characterization task. We first define a sequence-based representation of networks, combining temporal information, topological measures, and nodal attributes. We then describe how to identify the most emerging sequential patterns of this dataset, and use them to characterize the communities. We also show how to detect unusual behavior in a community, and highlight outliers. Finally, as an illustration, we apply our method to a network of scientific collaborations.
1410.5467
Josef Urban
Cezary Kaliszyk, Lionel Mamane, Josef Urban
Machine Learning of Coq Proof Guidance: First Experiments
null
null
null
null
cs.LO cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report the results of the first experiments with learning proof dependencies from the formalizations done with the Coq system. We explain the process of obtaining the dependencies from the Coq proofs, the characterization of formulas that is used for the learning, and the evaluation method. Various machine learning methods are compared on a dataset of 5021 toplevel Coq proofs coming from the CoRN repository. The best resulting method covers on average 75% of the needed proof dependencies among the first 100 predictions, which is a comparable performance of such initial experiments on other large-theory corpora.
[ { "version": "v1", "created": "Mon, 20 Oct 2014 21:16:52 GMT" } ]
2014-10-22T00:00:00
[ [ "Kaliszyk", "Cezary", "" ], [ "Mamane", "Lionel", "" ], [ "Urban", "Josef", "" ] ]
TITLE: Machine Learning of Coq Proof Guidance: First Experiments ABSTRACT: We report the results of the first experiments with learning proof dependencies from the formalizations done with the Coq system. We explain the process of obtaining the dependencies from the Coq proofs, the characterization of formulas that is used for the learning, and the evaluation method. Various machine learning methods are compared on a dataset of 5021 toplevel Coq proofs coming from the CoRN repository. The best resulting method covers on average 75% of the needed proof dependencies among the first 100 predictions, which is a comparable performance of such initial experiments on other large-theory corpora.
1410.5476
Josef Urban
Cezary Kaliszyk, Josef Urban, Jiri Vyskocil
Certified Connection Tableaux Proofs for HOL Light and TPTP
null
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the recent years, the Metis prover based on ordered paramodulation and model elimination has replaced the earlier built-in methods for general-purpose proof automation in HOL4 and Isabelle/HOL. In the annual CASC competition, the leanCoP system based on connection tableaux has however performed better than Metis. In this paper we show how the leanCoP's core algorithm can be implemented inside HOLLight. leanCoP's flagship feature, namely its minimalistic core, results in a very simple proof system. This plays a crucial role in extending the MESON proof reconstruction mechanism to connection tableaux proofs, providing an implementation of leanCoP that certifies its proofs. We discuss the differences between our direct implementation using an explicit Prolog stack, to the continuation passing implementation of MESON present in HOLLight and compare their performance on all core HOLLight goals. The resulting prover can be also used as a general purpose TPTP prover. We compare its performance against the resolution based Metis on TPTP and other interesting datasets.
[ { "version": "v1", "created": "Mon, 20 Oct 2014 21:36:47 GMT" } ]
2014-10-22T00:00:00
[ [ "Kaliszyk", "Cezary", "" ], [ "Urban", "Josef", "" ], [ "Vyskocil", "Jiri", "" ] ]
TITLE: Certified Connection Tableaux Proofs for HOL Light and TPTP ABSTRACT: In the recent years, the Metis prover based on ordered paramodulation and model elimination has replaced the earlier built-in methods for general-purpose proof automation in HOL4 and Isabelle/HOL. In the annual CASC competition, the leanCoP system based on connection tableaux has however performed better than Metis. In this paper we show how the leanCoP's core algorithm can be implemented inside HOLLight. leanCoP's flagship feature, namely its minimalistic core, results in a very simple proof system. This plays a crucial role in extending the MESON proof reconstruction mechanism to connection tableaux proofs, providing an implementation of leanCoP that certifies its proofs. We discuss the differences between our direct implementation using an explicit Prolog stack, to the continuation passing implementation of MESON present in HOLLight and compare their performance on all core HOLLight goals. The resulting prover can be also used as a general purpose TPTP prover. We compare its performance against the resolution based Metis on TPTP and other interesting datasets.
1410.5652
Andr\'as Kir\'aly Ph.D.
Tam\'as Varga, Andr\'as Kir\'aly, J\'anos Abonyi
Improvement of PSO algorithm by memory based gradient search - application in inventory management
book chapter, 20 pages, 7 figures, 2 tables
Swarm Intelligence and Bio-Inspired Computation: Theory and Applications, 1st Edition, pages 403-422. Elsevier, Oxford, 2013
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advanced inventory management in complex supply chains requires effective and robust nonlinear optimization due to the stochastic nature of supply and demand variations. Application of estimated gradients can boost up the convergence of Particle Swarm Optimization (PSO) algorithm but classical gradient calculation cannot be applied to stochastic and uncertain systems. In these situations Monte-Carlo (MC) simulation can be applied to determine the gradient. We developed a memory based algorithm where instead of generating and evaluating new simulated samples the stored and shared former function evaluations of the particles are sampled to estimate the gradients by local weighted least squares regression. The performance of the resulted regional gradient-based PSO is verified by several benchmark problems and in a complex application example where optimal reorder points of a supply chain are determined.
[ { "version": "v1", "created": "Tue, 21 Oct 2014 13:40:23 GMT" } ]
2014-10-22T00:00:00
[ [ "Varga", "Tamás", "" ], [ "Király", "András", "" ], [ "Abonyi", "János", "" ] ]
TITLE: Improvement of PSO algorithm by memory based gradient search - application in inventory management ABSTRACT: Advanced inventory management in complex supply chains requires effective and robust nonlinear optimization due to the stochastic nature of supply and demand variations. Application of estimated gradients can boost up the convergence of Particle Swarm Optimization (PSO) algorithm but classical gradient calculation cannot be applied to stochastic and uncertain systems. In these situations Monte-Carlo (MC) simulation can be applied to determine the gradient. We developed a memory based algorithm where instead of generating and evaluating new simulated samples the stored and shared former function evaluations of the particles are sampled to estimate the gradients by local weighted least squares regression. The performance of the resulted regional gradient-based PSO is verified by several benchmark problems and in a complex application example where optimal reorder points of a supply chain are determined.
1410.5684
Saahil Ognawala
Saahil Ognawala and Justin Bayer
Regularizing Recurrent Networks - On Injected Noise and Norm-based Methods
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advancements in parallel processing have lead to a surge in multilayer perceptrons' (MLP) applications and deep learning in the past decades. Recurrent Neural Networks (RNNs) give additional representational power to feedforward MLPs by providing a way to treat sequential data. However, RNNs are hard to train using conventional error backpropagation methods because of the difficulty in relating inputs over many time-steps. Regularization approaches from MLP sphere, like dropout and noisy weight training, have been insufficiently applied and tested on simple RNNs. Moreover, solutions have been proposed to improve convergence in RNNs but not enough to improve the long term dependency remembering capabilities thereof. In this study, we aim to empirically evaluate the remembering and generalization ability of RNNs on polyphonic musical datasets. The models are trained with injected noise, random dropout, norm-based regularizers and their respective performances compared to well-initialized plain RNNs and advanced regularization methods like fast-dropout. We conclude with evidence that training with noise does not improve performance as conjectured by a few works in RNN optimization before ours.
[ { "version": "v1", "created": "Tue, 21 Oct 2014 14:36:26 GMT" } ]
2014-10-22T00:00:00
[ [ "Ognawala", "Saahil", "" ], [ "Bayer", "Justin", "" ] ]
TITLE: Regularizing Recurrent Networks - On Injected Noise and Norm-based Methods ABSTRACT: Advancements in parallel processing have lead to a surge in multilayer perceptrons' (MLP) applications and deep learning in the past decades. Recurrent Neural Networks (RNNs) give additional representational power to feedforward MLPs by providing a way to treat sequential data. However, RNNs are hard to train using conventional error backpropagation methods because of the difficulty in relating inputs over many time-steps. Regularization approaches from MLP sphere, like dropout and noisy weight training, have been insufficiently applied and tested on simple RNNs. Moreover, solutions have been proposed to improve convergence in RNNs but not enough to improve the long term dependency remembering capabilities thereof. In this study, we aim to empirically evaluate the remembering and generalization ability of RNNs on polyphonic musical datasets. The models are trained with injected noise, random dropout, norm-based regularizers and their respective performances compared to well-initialized plain RNNs and advanced regularization methods like fast-dropout. We conclude with evidence that training with noise does not improve performance as conjectured by a few works in RNN optimization before ours.
1302.6636
Tamara Kolda
Tamara G. Kolda and Ali Pinar and Todd Plantenga and C. Seshadhri
A Scalable Generative Graph Model with Community Structure
null
SIAM Journal on Scientific Computing, Vol. 36, No. 5, pp. C424-C452, September 2014
10.1137/130914218
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network data is ubiquitous and growing, yet we lack realistic generative network models that can be calibrated to match real-world data. The recently proposed Block Two-Level Erdss-Renyi (BTER) model can be tuned to capture two fundamental properties: degree distribution and clustering coefficients. The latter is particularly important for reproducing graphs with community structure, such as social networks. In this paper, we compare BTER to other scalable models and show that it gives a better fit to real data. We provide a scalable implementation that requires only O(d_max) storage where d_max is the maximum number of neighbors for a single node. The generator is trivially parallelizable, and we show results for a Hadoop MapReduce implementation for a modeling a real-world web graph with over 4.6 billion edges. We propose that the BTER model can be used as a graph generator for benchmarking purposes and provide idealized degree distributions and clustering coefficient profiles that can be tuned for user specifications.
[ { "version": "v1", "created": "Wed, 27 Feb 2013 00:53:12 GMT" }, { "version": "v2", "created": "Fri, 22 Mar 2013 21:11:37 GMT" }, { "version": "v3", "created": "Tue, 10 Dec 2013 01:22:52 GMT" } ]
2014-10-21T00:00:00
[ [ "Kolda", "Tamara G.", "" ], [ "Pinar", "Ali", "" ], [ "Plantenga", "Todd", "" ], [ "Seshadhri", "C.", "" ] ]
TITLE: A Scalable Generative Graph Model with Community Structure ABSTRACT: Network data is ubiquitous and growing, yet we lack realistic generative network models that can be calibrated to match real-world data. The recently proposed Block Two-Level Erdss-Renyi (BTER) model can be tuned to capture two fundamental properties: degree distribution and clustering coefficients. The latter is particularly important for reproducing graphs with community structure, such as social networks. In this paper, we compare BTER to other scalable models and show that it gives a better fit to real data. We provide a scalable implementation that requires only O(d_max) storage where d_max is the maximum number of neighbors for a single node. The generator is trivially parallelizable, and we show results for a Hadoop MapReduce implementation for a modeling a real-world web graph with over 4.6 billion edges. We propose that the BTER model can be used as a graph generator for benchmarking purposes and provide idealized degree distributions and clustering coefficient profiles that can be tuned for user specifications.
1312.3968
Philip Schniter
Mark Borgerding, Philip Schniter, and Sundeep Rangan
Generalized Approximate Message Passing for Cosparse Analysis Compressive Sensing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cosparse analysis compressive sensing (CS), one seeks to estimate a non-sparse signal vector from noisy sub-Nyquist linear measurements by exploiting the knowledge that a given linear transform of the signal is cosparse, i.e., has sufficiently many zeros. We propose a novel approach to cosparse analysis CS based on the generalized approximate message passing (GAMP) algorithm. Unlike other AMP-based approaches to this problem, ours works with a wide range of analysis operators and regularizers. In addition, we propose a novel $\ell_0$-like soft-thresholder based on MMSE denoising for a spike-and-slab distribution with an infinite-variance slab. Numerical demonstrations on synthetic and practical datasets demonstrate advantages over existing AMP-based, greedy, and reweighted-$\ell_1$ approaches.
[ { "version": "v1", "created": "Fri, 13 Dec 2013 21:51:20 GMT" }, { "version": "v2", "created": "Sun, 19 Oct 2014 19:12:54 GMT" } ]
2014-10-21T00:00:00
[ [ "Borgerding", "Mark", "" ], [ "Schniter", "Philip", "" ], [ "Rangan", "Sundeep", "" ] ]
TITLE: Generalized Approximate Message Passing for Cosparse Analysis Compressive Sensing ABSTRACT: In cosparse analysis compressive sensing (CS), one seeks to estimate a non-sparse signal vector from noisy sub-Nyquist linear measurements by exploiting the knowledge that a given linear transform of the signal is cosparse, i.e., has sufficiently many zeros. We propose a novel approach to cosparse analysis CS based on the generalized approximate message passing (GAMP) algorithm. Unlike other AMP-based approaches to this problem, ours works with a wide range of analysis operators and regularizers. In addition, we propose a novel $\ell_0$-like soft-thresholder based on MMSE denoising for a spike-and-slab distribution with an infinite-variance slab. Numerical demonstrations on synthetic and practical datasets demonstrate advantages over existing AMP-based, greedy, and reweighted-$\ell_1$ approaches.
1410.4966
Shay Cohen
Chiraag Lala and Shay B. Cohen
The Visualization of Change in Word Meaning over Time using Temporal Word Embeddings
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a visualization tool that can be used to view the change in meaning of words over time. The tool makes use of existing (static) word embedding datasets together with a timestamped $n$-gram corpus to create {\em temporal} word embeddings.
[ { "version": "v1", "created": "Sat, 18 Oct 2014 14:53:19 GMT" } ]
2014-10-21T00:00:00
[ [ "Lala", "Chiraag", "" ], [ "Cohen", "Shay B.", "" ] ]
TITLE: The Visualization of Change in Word Meaning over Time using Temporal Word Embeddings ABSTRACT: We describe a visualization tool that can be used to view the change in meaning of words over time. The tool makes use of existing (static) word embedding datasets together with a timestamped $n$-gram corpus to create {\em temporal} word embeddings.
1410.4984
Zhenwen Dai
Zhenwen Dai, Andreas Damianou, James Hensman, Neil Lawrence
Gaussian Process Models with Parallelization and GPU acceleration
null
null
null
null
cs.DC cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present an extension of Gaussian process (GP) models with sophisticated parallelization and GPU acceleration. The parallelization scheme arises naturally from the modular computational structure w.r.t. datapoints in the sparse Gaussian process formulation. Additionally, the computational bottleneck is implemented with GPU acceleration for further speed up. Combining both techniques allows applying Gaussian process models to millions of datapoints. The efficiency of our algorithm is demonstrated with a synthetic dataset. Its source code has been integrated into our popular software library GPy.
[ { "version": "v1", "created": "Sat, 18 Oct 2014 18:12:57 GMT" } ]
2014-10-21T00:00:00
[ [ "Dai", "Zhenwen", "" ], [ "Damianou", "Andreas", "" ], [ "Hensman", "James", "" ], [ "Lawrence", "Neil", "" ] ]
TITLE: Gaussian Process Models with Parallelization and GPU acceleration ABSTRACT: In this work, we present an extension of Gaussian process (GP) models with sophisticated parallelization and GPU acceleration. The parallelization scheme arises naturally from the modular computational structure w.r.t. datapoints in the sparse Gaussian process formulation. Additionally, the computational bottleneck is implemented with GPU acceleration for further speed up. Combining both techniques allows applying Gaussian process models to millions of datapoints. The efficiency of our algorithm is demonstrated with a synthetic dataset. Its source code has been integrated into our popular software library GPy.
1403.1349
Sam Anzaroot
Sam Anzaroot, Alexandre Passos, David Belanger, Andrew McCallum
Learning Soft Linear Constraints with Application to Citation Field Extraction
appears in Proc. the 52nd Annual Meeting of the Association for Computational Linguistics (ACL2014)
null
null
null
cs.CL cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accurately segmenting a citation string into fields for authors, titles, etc. is a challenging task because the output typically obeys various global constraints. Previous work has shown that modeling soft constraints, where the model is encouraged, but not require to obey the constraints, can substantially improve segmentation performance. On the other hand, for imposing hard constraints, dual decomposition is a popular technique for efficient prediction given existing algorithms for unconstrained inference. We extend the technique to perform prediction subject to soft constraints. Moreover, with a technique for performing inference given soft constraints, it is easy to automatically generate large families of constraints and learn their costs with a simple convex optimization problem during training. This allows us to obtain substantial gains in accuracy on a new, challenging citation extraction dataset.
[ { "version": "v1", "created": "Thu, 6 Mar 2014 05:24:02 GMT" }, { "version": "v2", "created": "Fri, 17 Oct 2014 13:27:02 GMT" } ]
2014-10-20T00:00:00
[ [ "Anzaroot", "Sam", "" ], [ "Passos", "Alexandre", "" ], [ "Belanger", "David", "" ], [ "McCallum", "Andrew", "" ] ]
TITLE: Learning Soft Linear Constraints with Application to Citation Field Extraction ABSTRACT: Accurately segmenting a citation string into fields for authors, titles, etc. is a challenging task because the output typically obeys various global constraints. Previous work has shown that modeling soft constraints, where the model is encouraged, but not require to obey the constraints, can substantially improve segmentation performance. On the other hand, for imposing hard constraints, dual decomposition is a popular technique for efficient prediction given existing algorithms for unconstrained inference. We extend the technique to perform prediction subject to soft constraints. Moreover, with a technique for performing inference given soft constraints, it is easy to automatically generate large families of constraints and learn their costs with a simple convex optimization problem during training. This allows us to obtain substantial gains in accuracy on a new, challenging citation extraction dataset.
1410.4673
Zhiding Yu
Weiyang Liu, Zhiding Yu, Lijia Lu, Yandong Wen, Hui Li and Yuexian Zou
KCRC-LCD: Discriminative Kernel Collaborative Representation with Locality Constrained Dictionary for Visual Categorization
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the image classification problem via kernel collaborative representation classification with locality constrained dictionary (KCRC-LCD). Specifically, we propose a kernel collaborative representation classification (KCRC) approach in which kernel method is used to improve the discrimination ability of collaborative representation classification (CRC). We then measure the similarities between the query and atoms in the global dictionary in order to construct a locality constrained dictionary (LCD) for KCRC. In addition, we discuss several similarity measure approaches in LCD and further present a simple yet effective unified similarity measure whose superiority is validated in experiments. There are several appealing aspects associated with LCD. First, LCD can be nicely incorporated under the framework of KCRC. The LCD similarity measure can be kernelized under KCRC, which theoretically links CRC and LCD under the kernel method. Second, KCRC-LCD becomes more scalable to both the training set size and the feature dimension. Example shows that KCRC is able to perfectly classify data with certain distribution, while conventional CRC fails completely. Comprehensive experiments on many public datasets also show that KCRC-LCD is a robust discriminative classifier with both excellent performance and good scalability, being comparable or outperforming many other state-of-the-art approaches.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 09:40:20 GMT" } ]
2014-10-20T00:00:00
[ [ "Liu", "Weiyang", "" ], [ "Yu", "Zhiding", "" ], [ "Lu", "Lijia", "" ], [ "Wen", "Yandong", "" ], [ "Li", "Hui", "" ], [ "Zou", "Yuexian", "" ] ]
TITLE: KCRC-LCD: Discriminative Kernel Collaborative Representation with Locality Constrained Dictionary for Visual Categorization ABSTRACT: We consider the image classification problem via kernel collaborative representation classification with locality constrained dictionary (KCRC-LCD). Specifically, we propose a kernel collaborative representation classification (KCRC) approach in which kernel method is used to improve the discrimination ability of collaborative representation classification (CRC). We then measure the similarities between the query and atoms in the global dictionary in order to construct a locality constrained dictionary (LCD) for KCRC. In addition, we discuss several similarity measure approaches in LCD and further present a simple yet effective unified similarity measure whose superiority is validated in experiments. There are several appealing aspects associated with LCD. First, LCD can be nicely incorporated under the framework of KCRC. The LCD similarity measure can be kernelized under KCRC, which theoretically links CRC and LCD under the kernel method. Second, KCRC-LCD becomes more scalable to both the training set size and the feature dimension. Example shows that KCRC is able to perfectly classify data with certain distribution, while conventional CRC fails completely. Comprehensive experiments on many public datasets also show that KCRC-LCD is a robust discriminative classifier with both excellent performance and good scalability, being comparable or outperforming many other state-of-the-art approaches.
1403.6985
Kostyantyn Demchuk
Kostyantyn Demchuk and Douglas J. Leith
A Fast Minimal Infrequent Itemset Mining Algorithm
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel fast algorithm for finding quasi identifiers in large datasets is presented. Performance measurements on a broad range of datasets demonstrate substantial reductions in run-time relative to the state of the art and the scalability of the algorithm to realistically-sized datasets up to several million records.
[ { "version": "v1", "created": "Thu, 27 Mar 2014 11:54:27 GMT" }, { "version": "v2", "created": "Fri, 11 Apr 2014 15:53:20 GMT" }, { "version": "v3", "created": "Thu, 16 Oct 2014 14:56:52 GMT" } ]
2014-10-17T00:00:00
[ [ "Demchuk", "Kostyantyn", "" ], [ "Leith", "Douglas J.", "" ] ]
TITLE: A Fast Minimal Infrequent Itemset Mining Algorithm ABSTRACT: A novel fast algorithm for finding quasi identifiers in large datasets is presented. Performance measurements on a broad range of datasets demonstrate substantial reductions in run-time relative to the state of the art and the scalability of the algorithm to realistically-sized datasets up to several million records.
1410.4341
Manasij Venkatesh
Manasij Venkatesh, Vikas Majjagi, and Deepu Vijayasenan
Implicit segmentation of Kannada characters in offline handwriting recognition using hidden Markov models
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a method for classification of handwritten Kannada characters using Hidden Markov Models (HMMs). Kannada script is agglutinative, where simple shapes are concatenated horizontally to form a character. This results in a large number of characters making the task of classification difficult. Character segmentation plays a significant role in reducing the number of classes. Explicit segmentation techniques suffer when overlapping shapes are present, which is common in the case of handwritten text. We use HMMs to take advantage of the agglutinative nature of Kannada script, which allows us to perform implicit segmentation of characters along with recognition. All the experiments are performed on the Chars74k dataset that consists of 657 handwritten characters collected across multiple users. Gradient-based features are extracted from individual characters and are used to train character HMMs. The use of implicit segmentation technique at the character level resulted in an improvement of around 10%. This system also outperformed an existing system tested on the same dataset by around 16%. Analysis based on learning curves showed that increasing the training data could result in better accuracy. Accordingly, we collected additional data and obtained an improvement of 4% with 6 additional samples.
[ { "version": "v1", "created": "Thu, 16 Oct 2014 09:09:45 GMT" } ]
2014-10-17T00:00:00
[ [ "Venkatesh", "Manasij", "" ], [ "Majjagi", "Vikas", "" ], [ "Vijayasenan", "Deepu", "" ] ]
TITLE: Implicit segmentation of Kannada characters in offline handwriting recognition using hidden Markov models ABSTRACT: We describe a method for classification of handwritten Kannada characters using Hidden Markov Models (HMMs). Kannada script is agglutinative, where simple shapes are concatenated horizontally to form a character. This results in a large number of characters making the task of classification difficult. Character segmentation plays a significant role in reducing the number of classes. Explicit segmentation techniques suffer when overlapping shapes are present, which is common in the case of handwritten text. We use HMMs to take advantage of the agglutinative nature of Kannada script, which allows us to perform implicit segmentation of characters along with recognition. All the experiments are performed on the Chars74k dataset that consists of 657 handwritten characters collected across multiple users. Gradient-based features are extracted from individual characters and are used to train character HMMs. The use of implicit segmentation technique at the character level resulted in an improvement of around 10%. This system also outperformed an existing system tested on the same dataset by around 16%. Analysis based on learning curves showed that increasing the training data could result in better accuracy. Accordingly, we collected additional data and obtained an improvement of 4% with 6 additional samples.
1312.5306
Patrick J. Wolfe
Sofia C. Olhede and Patrick J. Wolfe
Network histograms and universality of blockmodel approximation
27 pages, 4 figures; revised version with link to software
Proceedings of the National Academy of Sciences of the USA 2014, Vol. 111, No. 41, 14722-14727
10.1073/pnas.1400374111
null
stat.ME cs.SI math.CO math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we introduce the network histogram: a statistical summary of network interactions, to be used as a tool for exploratory data analysis. A network histogram is obtained by fitting a stochastic blockmodel to a single observation of a network dataset. Blocks of edges play the role of histogram bins, and community sizes that of histogram bandwidths or bin sizes. Just as standard histograms allow for varying bandwidths, different blockmodel estimates can all be considered valid representations of an underlying probability model, subject to bandwidth constraints. Here we provide methods for automatic bandwidth selection, by which the network histogram approximates the generating mechanism that gives rise to exchangeable random graphs. This makes the blockmodel a universal network representation for unlabeled graphs. With this insight, we discuss the interpretation of network communities in light of the fact that many different community assignments can all give an equally valid representation of such a network. To demonstrate the fidelity-versus-interpretability tradeoff inherent in considering different numbers and sizes of communities, we analyze two publicly available networks - political weblogs and student friendships - and discuss how to interpret the network histogram when additional information related to node and edge labeling is present.
[ { "version": "v1", "created": "Wed, 18 Dec 2013 20:50:06 GMT" }, { "version": "v2", "created": "Tue, 5 Aug 2014 09:18:30 GMT" }, { "version": "v3", "created": "Mon, 1 Sep 2014 21:34:36 GMT" } ]
2014-10-16T00:00:00
[ [ "Olhede", "Sofia C.", "" ], [ "Wolfe", "Patrick J.", "" ] ]
TITLE: Network histograms and universality of blockmodel approximation ABSTRACT: In this article we introduce the network histogram: a statistical summary of network interactions, to be used as a tool for exploratory data analysis. A network histogram is obtained by fitting a stochastic blockmodel to a single observation of a network dataset. Blocks of edges play the role of histogram bins, and community sizes that of histogram bandwidths or bin sizes. Just as standard histograms allow for varying bandwidths, different blockmodel estimates can all be considered valid representations of an underlying probability model, subject to bandwidth constraints. Here we provide methods for automatic bandwidth selection, by which the network histogram approximates the generating mechanism that gives rise to exchangeable random graphs. This makes the blockmodel a universal network representation for unlabeled graphs. With this insight, we discuss the interpretation of network communities in light of the fact that many different community assignments can all give an equally valid representation of such a network. To demonstrate the fidelity-versus-interpretability tradeoff inherent in considering different numbers and sizes of communities, we analyze two publicly available networks - political weblogs and student friendships - and discuss how to interpret the network histogram when additional information related to node and edge labeling is present.
1408.0872
Shengcai Liao
Shengcai Liao, Zhipeng Mo, Jianqing Zhu, Yang Hu, and Stan Z. Li
Open-set Person Re-identification
The OPeRID v1.0 dataset and evaluation toolkit is now available to download at http://www.cbsr.ia.ac.cn/users/scliao/projects/operidv1/
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Person re-identification is becoming a hot research for developing both machine learning algorithms and video surveillance applications. The task of person re-identification is to determine which person in a gallery has the same identity to a probe image. This task basically assumes that the subject of the probe image belongs to the gallery, that is, the gallery contains this person. However, in practical applications such as searching a suspect in a video, this assumption is usually not true. In this paper, we consider the open-set person re-identification problem, which includes two sub-tasks, detection and identification. The detection sub-task is to determine the presence of the probe subject in the gallery, and the identification sub-task is to determine which person in the gallery has the same identity as the accepted probe. We present a database collected from a video surveillance setting of 6 cameras, with 200 persons and 7,413 images segmented. Based on this database, we develop a benchmark protocol for evaluating the performance under the open-set person re-identification scenario. Several popular metric learning algorithms for person re-identification have been evaluated as baselines. From the baseline performance, we observe that the open-set person re-identification problem is still largely unresolved, thus further attention and effort is needed.
[ { "version": "v1", "created": "Tue, 5 Aug 2014 05:55:16 GMT" }, { "version": "v2", "created": "Wed, 15 Oct 2014 14:28:08 GMT" } ]
2014-10-16T00:00:00
[ [ "Liao", "Shengcai", "" ], [ "Mo", "Zhipeng", "" ], [ "Zhu", "Jianqing", "" ], [ "Hu", "Yang", "" ], [ "Li", "Stan Z.", "" ] ]
TITLE: Open-set Person Re-identification ABSTRACT: Person re-identification is becoming a hot research for developing both machine learning algorithms and video surveillance applications. The task of person re-identification is to determine which person in a gallery has the same identity to a probe image. This task basically assumes that the subject of the probe image belongs to the gallery, that is, the gallery contains this person. However, in practical applications such as searching a suspect in a video, this assumption is usually not true. In this paper, we consider the open-set person re-identification problem, which includes two sub-tasks, detection and identification. The detection sub-task is to determine the presence of the probe subject in the gallery, and the identification sub-task is to determine which person in the gallery has the same identity as the accepted probe. We present a database collected from a video surveillance setting of 6 cameras, with 200 persons and 7,413 images segmented. Based on this database, we develop a benchmark protocol for evaluating the performance under the open-set person re-identification scenario. Several popular metric learning algorithms for person re-identification have been evaluated as baselines. From the baseline performance, we observe that the open-set person re-identification problem is still largely unresolved, thus further attention and effort is needed.
1410.3862
James Balhoff
James P. Balhoff, T. Alexander Dececchi, Paula M. Mabee, Hilmar Lapp
Presence-absence reasoning for evolutionary phenotypes
4 pages. Peer-reviewed submission presented to the Bio-ontologies SIG Phenotype Day at ISMB 2014, Boston, Mass. http://phenoday2014.bio-lark.org/pdf/11.pdf
James P. Balhoff, T. Alexander Dececchi, Paula M. Mabee, Hilmar Lapp. 2014. Presence-absence reasoning for evolutionary phenotypes. In proceedings of Phenotype Day of the Bio-ontologies SIG at ISMB 2014
null
null
cs.AI q-bio.QM
http://creativecommons.org/licenses/by/3.0/
Nearly invariably, phenotypes are reported in the scientific literature in meticulous detail, utilizing the full expressivity of natural language. Often it is particularly these detailed observations (facts) that are of interest, and thus specific to the research questions that motivated observing and reporting them. However, research aiming to synthesize or integrate phenotype data across many studies or even fields is often faced with the need to abstract from detailed observations so as to construct phenotypic concepts that are common across many datasets rather than specific to a few. Yet, observations or facts that would fall under such abstracted concepts are typically not directly asserted by the original authors, usually because they are "obvious" according to common domain knowledge, and thus asserting them would be deemed redundant by anyone with sufficient domain knowledge. For example, a phenotype describing the length of a manual digit for an organism implicitly means that the organism must have had a hand, and thus a forelimb; the presence or absence of a forelimb may have supporting data across a far wider range of taxa than the length of a particular manual digit. Here we describe how within the Phenoscape project we use a pipeline of OWL axiom generation and reasoning steps to infer taxon-specific presence/absence of anatomical entities from anatomical phenotypes. Although presence/absence is all but one, and a seemingly simple way to abstract phenotypes across data sources, it can nonetheless be powerful for linking genotype to phenotype, and it is particularly relevant for constructing synthetic morphological supermatrices for comparative analysis; in fact presence/absence is one of the prevailing character observation types in published character matrices.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 20:40:28 GMT" } ]
2014-10-16T00:00:00
[ [ "Balhoff", "James P.", "" ], [ "Dececchi", "T. Alexander", "" ], [ "Mabee", "Paula M.", "" ], [ "Lapp", "Hilmar", "" ] ]
TITLE: Presence-absence reasoning for evolutionary phenotypes ABSTRACT: Nearly invariably, phenotypes are reported in the scientific literature in meticulous detail, utilizing the full expressivity of natural language. Often it is particularly these detailed observations (facts) that are of interest, and thus specific to the research questions that motivated observing and reporting them. However, research aiming to synthesize or integrate phenotype data across many studies or even fields is often faced with the need to abstract from detailed observations so as to construct phenotypic concepts that are common across many datasets rather than specific to a few. Yet, observations or facts that would fall under such abstracted concepts are typically not directly asserted by the original authors, usually because they are "obvious" according to common domain knowledge, and thus asserting them would be deemed redundant by anyone with sufficient domain knowledge. For example, a phenotype describing the length of a manual digit for an organism implicitly means that the organism must have had a hand, and thus a forelimb; the presence or absence of a forelimb may have supporting data across a far wider range of taxa than the length of a particular manual digit. Here we describe how within the Phenoscape project we use a pipeline of OWL axiom generation and reasoning steps to infer taxon-specific presence/absence of anatomical entities from anatomical phenotypes. Although presence/absence is all but one, and a seemingly simple way to abstract phenotypes across data sources, it can nonetheless be powerful for linking genotype to phenotype, and it is particularly relevant for constructing synthetic morphological supermatrices for comparative analysis; in fact presence/absence is one of the prevailing character observation types in published character matrices.
1410.3905
Xiankai Lu
Xiankai Lu, Zheng Fang, Tao Xu, Haiting Zhang, Hongya Tuo
Efficient Image Categorization with Sparse Fisher Vector
5pages,4 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
In object recognition, Fisher vector (FV) representation is one of the state-of-art image representations ways at the expense of dense, high dimensional features and increased computation time. A simplification of FV is attractive, so we propose Sparse Fisher vector (SFV). By incorporating locality strategy, we can accelerate the Fisher coding step in image categorization which is implemented from a collective of local descriptors. Combining with pooling step, we explore the relationship between coding step and pooling step to give a theoretical explanation about SFV. Experiments on benchmark datasets have shown that SFV leads to a speedup of several-fold of magnitude compares with FV, while maintaining the categorization performance. In addition, we demonstrate how SFV preserves the consistence in representation of similar local features.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 02:00:29 GMT" } ]
2014-10-16T00:00:00
[ [ "Lu", "Xiankai", "" ], [ "Fang", "Zheng", "" ], [ "Xu", "Tao", "" ], [ "Zhang", "Haiting", "" ], [ "Tuo", "Hongya", "" ] ]
TITLE: Efficient Image Categorization with Sparse Fisher Vector ABSTRACT: In object recognition, Fisher vector (FV) representation is one of the state-of-art image representations ways at the expense of dense, high dimensional features and increased computation time. A simplification of FV is attractive, so we propose Sparse Fisher vector (SFV). By incorporating locality strategy, we can accelerate the Fisher coding step in image categorization which is implemented from a collective of local descriptors. Combining with pooling step, we explore the relationship between coding step and pooling step to give a theoretical explanation about SFV. Experiments on benchmark datasets have shown that SFV leads to a speedup of several-fold of magnitude compares with FV, while maintaining the categorization performance. In addition, we demonstrate how SFV preserves the consistence in representation of similar local features.
1410.3942
Niharika Sachdeva
Ponnurangam Kumaraguru and Niharika Sachdeva
Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness about ICT Use
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several ICT studies give anecdotal evidences showing privacy to be an area of concern that can influence adoption of technology in the developing world. However, in-depth understanding of end users' privacy attitudes and awareness is largely unexplored in developing countries such as India. We conducted a survey with 10,427 Indian citizens to bring forth various insights on privacy expectations and perceptions of end users. Our study explores end-users' privacy expectations on three ICT platforms - mobile phones, OSN (Online Social Network), and government projects. Our results, though preliminary, show that users disproportionately consider financial details as personal information in comparison to medical records. Users heavily use mobile phones to store personal details and show high trust in mobile service providers for protecting the private data. However, users show concerns that mobile service provider may allow improper access of their personal information to third parties and government. We also find that female participants in the study were marginally more conscious of their privacy than males. To the best of our knowledge, this work presents the largest privacy study which benchmarks privacy perceptions among Indian citizens. Understanding users' privacy perceptions can help improve technology adoption and develop policies and laws for improving technology experience and enabling development for a better life in India.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 06:57:44 GMT" } ]
2014-10-16T00:00:00
[ [ "Kumaraguru", "Ponnurangam", "" ], [ "Sachdeva", "Niharika", "" ] ]
TITLE: Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness about ICT Use ABSTRACT: Several ICT studies give anecdotal evidences showing privacy to be an area of concern that can influence adoption of technology in the developing world. However, in-depth understanding of end users' privacy attitudes and awareness is largely unexplored in developing countries such as India. We conducted a survey with 10,427 Indian citizens to bring forth various insights on privacy expectations and perceptions of end users. Our study explores end-users' privacy expectations on three ICT platforms - mobile phones, OSN (Online Social Network), and government projects. Our results, though preliminary, show that users disproportionately consider financial details as personal information in comparison to medical records. Users heavily use mobile phones to store personal details and show high trust in mobile service providers for protecting the private data. However, users show concerns that mobile service provider may allow improper access of their personal information to third parties and government. We also find that female participants in the study were marginally more conscious of their privacy than males. To the best of our knowledge, this work presents the largest privacy study which benchmarks privacy perceptions among Indian citizens. Understanding users' privacy perceptions can help improve technology adoption and develop policies and laws for improving technology experience and enabling development for a better life in India.
1410.4168
Adrien Devresse
Adrien Devresse, Fabrizio Furano
Efficient HTTP based I/O on very large datasets for high performance computing with the libdavix library
Presented at: Very large Data Bases (VLDB) 2014, Hangzhou
null
null
null
cs.PF cs.DC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Remote data access for data analysis in high performance computing is commonly done with specialized data access protocols and storage systems. These protocols are highly optimized for high throughput on very large datasets, multi-streams, high availability, low latency and efficient parallel I/O. The purpose of this paper is to describe how we have adapted a generic protocol, the Hyper Text Transport Protocol (HTTP) to make it a competitive alternative for high performance I/O and data analysis applications in a global computing grid: the Worldwide LHC Computing Grid. In this work, we first analyze the design differences between the HTTP protocol and the most common high performance I/O protocols, pointing out the main performance weaknesses of HTTP. Then, we describe in detail how we solved these issues. Our solutions have been implemented in a toolkit called davix, available through several recent Linux distributions. Finally, we describe the results of our benchmarks where we compare the performance of davix against a HPC specific protocol for a data analysis use case.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 18:57:12 GMT" } ]
2014-10-16T00:00:00
[ [ "Devresse", "Adrien", "" ], [ "Furano", "Fabrizio", "" ] ]
TITLE: Efficient HTTP based I/O on very large datasets for high performance computing with the libdavix library ABSTRACT: Remote data access for data analysis in high performance computing is commonly done with specialized data access protocols and storage systems. These protocols are highly optimized for high throughput on very large datasets, multi-streams, high availability, low latency and efficient parallel I/O. The purpose of this paper is to describe how we have adapted a generic protocol, the Hyper Text Transport Protocol (HTTP) to make it a competitive alternative for high performance I/O and data analysis applications in a global computing grid: the Worldwide LHC Computing Grid. In this work, we first analyze the design differences between the HTTP protocol and the most common high performance I/O protocols, pointing out the main performance weaknesses of HTTP. Then, we describe in detail how we solved these issues. Our solutions have been implemented in a toolkit called davix, available through several recent Linux distributions. Finally, we describe the results of our benchmarks where we compare the performance of davix against a HPC specific protocol for a data analysis use case.
1405.7903
Carsten Gottschlich
Carsten Gottschlich and Dominic Schuhmacher
The Shortlist Method for Fast Computation of the Earth Mover's Distance and Finding Optimal Solutions to Transportation Problems
null
PLOS ONE 9(10): e110214, Oct. 2014
10.1371/journal.pone.0110214
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding solutions to the classical transportation problem is of great importance, since this optimization problem arises in many engineering and computer science applications. Especially the Earth Mover's Distance is used in a plethora of applications ranging from content-based image retrieval, shape matching, fingerprint recognition, object tracking and phishing web page detection to computing color differences in linguistics and biology. Our starting point is the well-known revised simplex algorithm, which iteratively improves a feasible solution to optimality. The Shortlist Method that we propose substantially reduces the number of candidates inspected for improving the solution, while at the same time balancing the number of pivots required. Tests on simulated benchmarks demonstrate a considerable reduction in computation time for the new method as compared to the usual revised simplex algorithm implemented with state-of-the-art initialization and pivot strategies. As a consequence, the Shortlist Method facilitates the computation of large scale transportation problems in viable time. In addition we describe a novel method for finding an initial feasible solution which we coin Modified Russell's Method.
[ { "version": "v1", "created": "Fri, 30 May 2014 16:07:55 GMT" } ]
2014-10-15T00:00:00
[ [ "Gottschlich", "Carsten", "" ], [ "Schuhmacher", "Dominic", "" ] ]
TITLE: The Shortlist Method for Fast Computation of the Earth Mover's Distance and Finding Optimal Solutions to Transportation Problems ABSTRACT: Finding solutions to the classical transportation problem is of great importance, since this optimization problem arises in many engineering and computer science applications. Especially the Earth Mover's Distance is used in a plethora of applications ranging from content-based image retrieval, shape matching, fingerprint recognition, object tracking and phishing web page detection to computing color differences in linguistics and biology. Our starting point is the well-known revised simplex algorithm, which iteratively improves a feasible solution to optimality. The Shortlist Method that we propose substantially reduces the number of candidates inspected for improving the solution, while at the same time balancing the number of pivots required. Tests on simulated benchmarks demonstrate a considerable reduction in computation time for the new method as compared to the usual revised simplex algorithm implemented with state-of-the-art initialization and pivot strategies. As a consequence, the Shortlist Method facilitates the computation of large scale transportation problems in viable time. In addition we describe a novel method for finding an initial feasible solution which we coin Modified Russell's Method.
1408.0102
Sandeep Kumar
Sandeep Kumar, Vivek Kumar Sharma, Rajani Kumari
Randomized Memetic Artificial Bee Colony Algorithm
arXiv admin note: text overlap with arXiv:1407.5574
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial Bee Colony (ABC) optimization algorithm is one of the recent population based probabilistic approach developed for global optimization. ABC is simple and has been showed significant improvement over other Nature Inspired Algorithms (NIAs) when tested over some standard benchmark functions and for some complex real world optimization problems. Memetic Algorithms also become one of the key methodologies to solve the very large and complex real-world optimization problems. The solution search equation of Memetic ABC is based on Golden Section Search and an arbitrary value which tries to balance exploration and exploitation of search space. But still there are some chances to skip the exact solution due to its step size. In order to balance between diversification and intensification capability of the Memetic ABC, it is randomized the step size in Memetic ABC. The proposed algorithm is named as Randomized Memetic ABC (RMABC). In RMABC, new solutions are generated nearby the best so far solution and it helps to increase the exploitation capability of Memetic ABC. The experiments on some test problems of different complexities and one well known engineering optimization application show that the proposed algorithm outperforms over Memetic ABC (MeABC) and some other variant of ABC algorithm(like Gbest guided ABC (GABC),Hooke Jeeves ABC (HJABC), Best-So-Far ABC (BSFABC) and Modified ABC (MABC) in case of almost all the problems.
[ { "version": "v1", "created": "Fri, 1 Aug 2014 08:49:25 GMT" } ]
2014-10-15T00:00:00
[ [ "Kumar", "Sandeep", "" ], [ "Sharma", "Vivek Kumar", "" ], [ "Kumari", "Rajani", "" ] ]
TITLE: Randomized Memetic Artificial Bee Colony Algorithm ABSTRACT: Artificial Bee Colony (ABC) optimization algorithm is one of the recent population based probabilistic approach developed for global optimization. ABC is simple and has been showed significant improvement over other Nature Inspired Algorithms (NIAs) when tested over some standard benchmark functions and for some complex real world optimization problems. Memetic Algorithms also become one of the key methodologies to solve the very large and complex real-world optimization problems. The solution search equation of Memetic ABC is based on Golden Section Search and an arbitrary value which tries to balance exploration and exploitation of search space. But still there are some chances to skip the exact solution due to its step size. In order to balance between diversification and intensification capability of the Memetic ABC, it is randomized the step size in Memetic ABC. The proposed algorithm is named as Randomized Memetic ABC (RMABC). In RMABC, new solutions are generated nearby the best so far solution and it helps to increase the exploitation capability of Memetic ABC. The experiments on some test problems of different complexities and one well known engineering optimization application show that the proposed algorithm outperforms over Memetic ABC (MeABC) and some other variant of ABC algorithm(like Gbest guided ABC (GABC),Hooke Jeeves ABC (HJABC), Best-So-Far ABC (BSFABC) and Modified ABC (MABC) in case of almost all the problems.
1409.0367
Tom Crick
Tom Crick, Benjamin A. Hall, Samin Ishtiaq and Kenji Takeda
"Share and Enjoy": Publishing Useful and Usable Scientific Models
Accepted for the 1st International Workshop on Recomputability (part of UCC 2014); 5 pages, LaTeX
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The reproduction and replication of reported scientific results is a hot topic within the academic community. The retraction of numerous studies from a wide range of disciplines, from climate science to bioscience, has drawn the focus of many commentators, but there exists a wider socio-cultural problem that pervades the scientific community. Sharing code, data and models often requires extra effort; this is currently seen as a significant overhead that may not be worth the time investment. Automated systems, which allow easy reproduction of results, offer the potential to incentivise a culture change and drive the adoption of new techniques to improve the efficiency of scientific exploration. In this paper, we discuss the value of improved access and sharing of the two key types of results arising from work done in the computational sciences: models and algorithms. We propose the development of an integrated cloud-based system underpinning computational science, linking together software and data repositories, toolchains, workflows and outputs, providing a seamless automated infrastructure for the verification and validation of scientific models and in particular, performance benchmarks.
[ { "version": "v1", "created": "Mon, 1 Sep 2014 11:16:21 GMT" }, { "version": "v2", "created": "Tue, 14 Oct 2014 13:03:37 GMT" } ]
2014-10-15T00:00:00
[ [ "Crick", "Tom", "" ], [ "Hall", "Benjamin A.", "" ], [ "Ishtiaq", "Samin", "" ], [ "Takeda", "Kenji", "" ] ]
TITLE: "Share and Enjoy": Publishing Useful and Usable Scientific Models ABSTRACT: The reproduction and replication of reported scientific results is a hot topic within the academic community. The retraction of numerous studies from a wide range of disciplines, from climate science to bioscience, has drawn the focus of many commentators, but there exists a wider socio-cultural problem that pervades the scientific community. Sharing code, data and models often requires extra effort; this is currently seen as a significant overhead that may not be worth the time investment. Automated systems, which allow easy reproduction of results, offer the potential to incentivise a culture change and drive the adoption of new techniques to improve the efficiency of scientific exploration. In this paper, we discuss the value of improved access and sharing of the two key types of results arising from work done in the computational sciences: models and algorithms. We propose the development of an integrated cloud-based system underpinning computational science, linking together software and data repositories, toolchains, workflows and outputs, providing a seamless automated infrastructure for the verification and validation of scientific models and in particular, performance benchmarks.
1410.3462
Xirong Li
Xirong Li
Tag Relevance Fusion for Social Image Retrieval
null
null
10.1007/s00530-014-0430-9
null
cs.IR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the subjective nature of social tagging, measuring the relevance of social tags with respect to the visual content is crucial for retrieving the increasing amounts of social-networked images. Witnessing the limit of a single measurement of tag relevance, we introduce in this paper tag relevance fusion as an extension to methods for tag relevance estimation. We present a systematic study, covering tag relevance fusion in early and late stages, and in supervised and unsupervised settings. Experiments on a large present-day benchmark set show that tag relevance fusion leads to better image retrieval. Moreover, unsupervised tag relevance fusion is found to be practically as effective as supervised tag relevance fusion, but without the need of any training efforts. This finding suggests the potential of tag relevance fusion for real-world deployment.
[ { "version": "v1", "created": "Mon, 13 Oct 2014 13:27:55 GMT" } ]
2014-10-15T00:00:00
[ [ "Li", "Xirong", "" ] ]
TITLE: Tag Relevance Fusion for Social Image Retrieval ABSTRACT: Due to the subjective nature of social tagging, measuring the relevance of social tags with respect to the visual content is crucial for retrieving the increasing amounts of social-networked images. Witnessing the limit of a single measurement of tag relevance, we introduce in this paper tag relevance fusion as an extension to methods for tag relevance estimation. We present a systematic study, covering tag relevance fusion in early and late stages, and in supervised and unsupervised settings. Experiments on a large present-day benchmark set show that tag relevance fusion leads to better image retrieval. Moreover, unsupervised tag relevance fusion is found to be practically as effective as supervised tag relevance fusion, but without the need of any training efforts. This finding suggests the potential of tag relevance fusion for real-world deployment.
1410.3463
Lavanya Sita Tekumalla
Lavanya Sita Tekumalla, Chiranjib Bhattacharyya
Mining Block I/O Traces for Cache Preloading with Sparse Temporal Non-parametric Mixture of Multivariate Poisson
null
null
null
null
cs.OS cs.LG cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing caching strategies, in the storage domain, though well suited to exploit short range spatio-temporal patterns, are unable to leverage long-range motifs for improving hitrates. Motivated by this, we investigate novel Bayesian non-parametric modeling(BNP) techniques for count vectors, to capture long range correlations for cache preloading, by mining Block I/O traces. Such traces comprise of a sequence of memory accesses that can be aggregated into high-dimensional sparse correlated count vector sequences. While there are several state of the art BNP algorithms for clustering and their temporal extensions for prediction, there has been no work on exploring these for correlated count vectors. Our first contribution addresses this gap by proposing a DP based mixture model of Multivariate Poisson (DP-MMVP) and its temporal extension(HMM-DP-MMVP) that captures the full covariance structure of multivariate count data. However, modeling full covariance structure for count vectors is computationally expensive, particularly for high dimensional data. Hence, we exploit sparsity in our count vectors, and as our main contribution, introduce the Sparse DP mixture of multivariate Poisson(Sparse-DP-MMVP), generalizing our DP-MMVP mixture model, also leading to more efficient inference. We then discuss a temporal extension to our model for cache preloading. We take the first step towards mining historical data, to capture long range patterns in storage traces for cache preloading. Experimentally, we show a dramatic improvement in hitrates on benchmark traces and lay the groundwork for further research in storage domain to reduce latencies using data mining techniques to capture long range motifs.
[ { "version": "v1", "created": "Mon, 13 Oct 2014 14:26:28 GMT" } ]
2014-10-15T00:00:00
[ [ "Tekumalla", "Lavanya Sita", "" ], [ "Bhattacharyya", "Chiranjib", "" ] ]
TITLE: Mining Block I/O Traces for Cache Preloading with Sparse Temporal Non-parametric Mixture of Multivariate Poisson ABSTRACT: Existing caching strategies, in the storage domain, though well suited to exploit short range spatio-temporal patterns, are unable to leverage long-range motifs for improving hitrates. Motivated by this, we investigate novel Bayesian non-parametric modeling(BNP) techniques for count vectors, to capture long range correlations for cache preloading, by mining Block I/O traces. Such traces comprise of a sequence of memory accesses that can be aggregated into high-dimensional sparse correlated count vector sequences. While there are several state of the art BNP algorithms for clustering and their temporal extensions for prediction, there has been no work on exploring these for correlated count vectors. Our first contribution addresses this gap by proposing a DP based mixture model of Multivariate Poisson (DP-MMVP) and its temporal extension(HMM-DP-MMVP) that captures the full covariance structure of multivariate count data. However, modeling full covariance structure for count vectors is computationally expensive, particularly for high dimensional data. Hence, we exploit sparsity in our count vectors, and as our main contribution, introduce the Sparse DP mixture of multivariate Poisson(Sparse-DP-MMVP), generalizing our DP-MMVP mixture model, also leading to more efficient inference. We then discuss a temporal extension to our model for cache preloading. We take the first step towards mining historical data, to capture long range patterns in storage traces for cache preloading. Experimentally, we show a dramatic improvement in hitrates on benchmark traces and lay the groundwork for further research in storage domain to reduce latencies using data mining techniques to capture long range motifs.
1410.3710
Jisun An
Haewoon Kwak and Jisun An
Understanding News Geography and Major Determinants of Global News Coverage of Disasters
Presented at Computation+Jounalism Symposium (C+J Symposium) 2014
null
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we reveal the structure of global news coverage of disasters and its determinants by using a large-scale news coverage dataset collected by the GDELT (Global Data on Events, Location, and Tone) project that monitors news media in over 100 languages from the whole world. Significant variables in our hierarchical (mixed-effect) regression model, such as the number of population, the political stability, the damage, and more, are well aligned with a series of previous research. Yet, strong regionalism we found in news geography highlights the necessity of the comprehensive dataset for the study of global news coverage.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 14:36:29 GMT" } ]
2014-10-15T00:00:00
[ [ "Kwak", "Haewoon", "" ], [ "An", "Jisun", "" ] ]
TITLE: Understanding News Geography and Major Determinants of Global News Coverage of Disasters ABSTRACT: In this work, we reveal the structure of global news coverage of disasters and its determinants by using a large-scale news coverage dataset collected by the GDELT (Global Data on Events, Location, and Tone) project that monitors news media in over 100 languages from the whole world. Significant variables in our hierarchical (mixed-effect) regression model, such as the number of population, the political stability, the damage, and more, are well aligned with a series of previous research. Yet, strong regionalism we found in news geography highlights the necessity of the comprehensive dataset for the study of global news coverage.
1410.3748
Chee Seng Chan
Wai Lam Hoo and Chee Seng Chan
Zero-Shot Object Recognition System based on Topic Model
To appear in IEEE Transactions on Human-Machine Systems
null
10.1109/THMS.2014.2358649
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object recognition systems usually require fully complete manually labeled training data to train the classifier. In this paper, we study the problem of object recognition where the training samples are missing during the classifier learning stage, a task also known as zero-shot learning. We propose a novel zero-shot learning strategy that utilizes the topic model and hierarchical class concept. Our proposed method advanced where cumbersome human annotation stage (i.e. attribute-based classification) is eliminated. We achieve comparable performance with state-of-the-art algorithms in four public datasets: PubFig (67.09%), Cifar-100 (54.85%), Caltech-256 (52.14%), and Animals with Attributes (49.65%) when unseen classes exist in the classification task.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 16:11:43 GMT" } ]
2014-10-15T00:00:00
[ [ "Hoo", "Wai Lam", "" ], [ "Chan", "Chee Seng", "" ] ]
TITLE: Zero-Shot Object Recognition System based on Topic Model ABSTRACT: Object recognition systems usually require fully complete manually labeled training data to train the classifier. In this paper, we study the problem of object recognition where the training samples are missing during the classifier learning stage, a task also known as zero-shot learning. We propose a novel zero-shot learning strategy that utilizes the topic model and hierarchical class concept. Our proposed method advanced where cumbersome human annotation stage (i.e. attribute-based classification) is eliminated. We achieve comparable performance with state-of-the-art algorithms in four public datasets: PubFig (67.09%), Cifar-100 (54.85%), Caltech-256 (52.14%), and Animals with Attributes (49.65%) when unseen classes exist in the classification task.
1410.3751
Chee Seng Chan
Wei Ren Tan, Chee Seng Chan, Pratheepan Yogarajah and Joan Condell
A Fusion Approach for Efficient Human Skin Detection
Accepted in IEEE Transactions on Industrial Informatics, vol. 8(1), pp. 138-147, new skin detection + ground truth (Pratheepan) dataset
IEEE Transactions on Industrial Informatics, vol. 8(1), pp. 138-147, 2012
10.1109/TII.2011.2172451
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A reliable human skin detection method that is adaptable to different human skin colours and illu- mination conditions is essential for better human skin segmentation. Even though different human skin colour detection solutions have been successfully applied, they are prone to false skin detection and are not able to cope with the variety of human skin colours across different ethnic. Moreover, existing methods require high computational cost. In this paper, we propose a novel human skin de- tection approach that combines a smoothed 2D histogram and Gaussian model, for automatic human skin detection in colour image(s). In our approach an eye detector is used to refine the skin model for a specific person. The proposed approach reduces computational costs as no training is required; and it improves the accuracy of skin detection despite wide variation in ethnicity and illumination. To the best of our knowledge, this is the first method to employ fusion strategy for this purpose. Qualitative and quantitative results on three standard public datasets and a comparison with state-of-the-art methods have shown the effectiveness and robustness of the proposed approach.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 16:12:58 GMT" } ]
2014-10-15T00:00:00
[ [ "Tan", "Wei Ren", "" ], [ "Chan", "Chee Seng", "" ], [ "Yogarajah", "Pratheepan", "" ], [ "Condell", "Joan", "" ] ]
TITLE: A Fusion Approach for Efficient Human Skin Detection ABSTRACT: A reliable human skin detection method that is adaptable to different human skin colours and illu- mination conditions is essential for better human skin segmentation. Even though different human skin colour detection solutions have been successfully applied, they are prone to false skin detection and are not able to cope with the variety of human skin colours across different ethnic. Moreover, existing methods require high computational cost. In this paper, we propose a novel human skin de- tection approach that combines a smoothed 2D histogram and Gaussian model, for automatic human skin detection in colour image(s). In our approach an eye detector is used to refine the skin model for a specific person. The proposed approach reduces computational costs as no training is required; and it improves the accuracy of skin detection despite wide variation in ethnicity and illumination. To the best of our knowledge, this is the first method to employ fusion strategy for this purpose. Qualitative and quantitative results on three standard public datasets and a comparison with state-of-the-art methods have shown the effectiveness and robustness of the proposed approach.
1410.3752
Chee Seng Chan
Wai Lam Hoo, Tae-Kyun Kim, Yuru Pei and Chee Seng Chan
Enhanced Random Forest with Image/Patch-Level Learning for Image Understanding
Accepted in ICPR 2014 (Oral)
null
null
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image understanding is an important research domain in the computer vision due to its wide real-world applications. For an image understanding framework that uses the Bag-of-Words model representation, the visual codebook is an essential part. Random forest (RF) as a tree-structure discriminative codebook has been a popular choice. However, the performance of the RF can be degraded if the local patch labels are poorly assigned. In this paper, we tackle this problem by a novel way to update the RF codebook learning for a more discriminative codebook with the introduction of the soft class labels, estimated from the pLSA model based on a feedback scheme. The feedback scheme is performed on both the image and patch levels respectively, which is in contrast to the state- of-the-art RF codebook learning that focused on either image or patch level only. Experiments on 15-Scene and C-Pascal datasets had shown the effectiveness of the proposed method in image understanding task.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 16:13:45 GMT" } ]
2014-10-15T00:00:00
[ [ "Hoo", "Wai Lam", "" ], [ "Kim", "Tae-Kyun", "" ], [ "Pei", "Yuru", "" ], [ "Chan", "Chee Seng", "" ] ]
TITLE: Enhanced Random Forest with Image/Patch-Level Learning for Image Understanding ABSTRACT: Image understanding is an important research domain in the computer vision due to its wide real-world applications. For an image understanding framework that uses the Bag-of-Words model representation, the visual codebook is an essential part. Random forest (RF) as a tree-structure discriminative codebook has been a popular choice. However, the performance of the RF can be degraded if the local patch labels are poorly assigned. In this paper, we tackle this problem by a novel way to update the RF codebook learning for a more discriminative codebook with the introduction of the soft class labels, estimated from the pLSA model based on a feedback scheme. The feedback scheme is performed on both the image and patch levels respectively, which is in contrast to the state- of-the-art RF codebook learning that focused on either image or patch level only. Experiments on 15-Scene and C-Pascal datasets had shown the effectiveness of the proposed method in image understanding task.
1410.3756
Chee Seng Chan
Mei Kuan Lim, Ven Jyn Kok, Chen Change Loy and Chee Seng Chan
Crowd Saliency Detection via Global Similarity Structure
Accepted in ICPR 2014 (Oral). Mei Kuan Lim and Ven Jyn Kok share equal contributions
null
null
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is common for CCTV operators to overlook inter- esting events taking place within the crowd due to large number of people in the crowded scene (i.e. marathon, rally). Thus, there is a dire need to automate the detection of salient crowd regions acquiring immediate attention for a more effective and proactive surveillance. This paper proposes a novel framework to identify and localize salient regions in a crowd scene, by transforming low-level features extracted from crowd motion field into a global similarity structure. The global similarity structure representation allows the discovery of the intrinsic manifold of the motion dynamics, which could not be captured by the low-level representation. Ranking is then performed on the global similarity structure to identify a set of extrema. The proposed approach is unsupervised so learning stage is eliminated. Experimental results on public datasets demonstrates the effectiveness of exploiting such extrema in identifying salient regions in various crowd scenarios that exhibit crowding, local irregular motion, and unique motion areas such as sources and sinks.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 16:24:24 GMT" } ]
2014-10-15T00:00:00
[ [ "Lim", "Mei Kuan", "" ], [ "Kok", "Ven Jyn", "" ], [ "Loy", "Chen Change", "" ], [ "Chan", "Chee Seng", "" ] ]
TITLE: Crowd Saliency Detection via Global Similarity Structure ABSTRACT: It is common for CCTV operators to overlook inter- esting events taking place within the crowd due to large number of people in the crowded scene (i.e. marathon, rally). Thus, there is a dire need to automate the detection of salient crowd regions acquiring immediate attention for a more effective and proactive surveillance. This paper proposes a novel framework to identify and localize salient regions in a crowd scene, by transforming low-level features extracted from crowd motion field into a global similarity structure. The global similarity structure representation allows the discovery of the intrinsic manifold of the motion dynamics, which could not be captured by the low-level representation. Ranking is then performed on the global similarity structure to identify a set of extrema. The proposed approach is unsupervised so learning stage is eliminated. Experimental results on public datasets demonstrates the effectiveness of exploiting such extrema in identifying salient regions in various crowd scenarios that exhibit crowding, local irregular motion, and unique motion areas such as sources and sinks.
1410.3791
Rami Al-Rfou
Rami Al-Rfou, Vivek Kulkarni, Bryan Perozzi, Steven Skiena
POLYGLOT-NER: Massive Multilingual Named Entity Recognition
9 pages, 4 figures, 5 tables
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing diversity of languages used on the web introduces a new level of complexity to Information Retrieval (IR) systems. We can no longer assume that textual content is written in one language or even the same language family. In this paper, we demonstrate how to build massive multilingual annotators with minimal human expertise and intervention. We describe a system that builds Named Entity Recognition (NER) annotators for 40 major languages using Wikipedia and Freebase. Our approach does not require NER human annotated datasets or language specific resources like treebanks, parallel corpora, and orthographic rules. The novelty of approach lies therein - using only language agnostic techniques, while achieving competitive performance. Our method learns distributed word representations (word embeddings) which encode semantic and syntactic features of words in each language. Then, we automatically generate datasets from Wikipedia link structure and Freebase attributes. Finally, we apply two preprocessing stages (oversampling and exact surface form matching) which do not require any linguistic expertise. Our evaluation is two fold: First, we demonstrate the system performance on human annotated datasets. Second, for languages where no gold-standard benchmarks are available, we propose a new method, distant evaluation, based on statistical machine translation.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 18:37:32 GMT" } ]
2014-10-15T00:00:00
[ [ "Al-Rfou", "Rami", "" ], [ "Kulkarni", "Vivek", "" ], [ "Perozzi", "Bryan", "" ], [ "Skiena", "Steven", "" ] ]
TITLE: POLYGLOT-NER: Massive Multilingual Named Entity Recognition ABSTRACT: The increasing diversity of languages used on the web introduces a new level of complexity to Information Retrieval (IR) systems. We can no longer assume that textual content is written in one language or even the same language family. In this paper, we demonstrate how to build massive multilingual annotators with minimal human expertise and intervention. We describe a system that builds Named Entity Recognition (NER) annotators for 40 major languages using Wikipedia and Freebase. Our approach does not require NER human annotated datasets or language specific resources like treebanks, parallel corpora, and orthographic rules. The novelty of approach lies therein - using only language agnostic techniques, while achieving competitive performance. Our method learns distributed word representations (word embeddings) which encode semantic and syntactic features of words in each language. Then, we automatically generate datasets from Wikipedia link structure and Freebase attributes. Finally, we apply two preprocessing stages (oversampling and exact surface form matching) which do not require any linguistic expertise. Our evaluation is two fold: First, we demonstrate the system performance on human annotated datasets. Second, for languages where no gold-standard benchmarks are available, we propose a new method, distant evaluation, based on statistical machine translation.
1405.4044
Nicolas Guarin-Zapata
Nicol\'as Guar\'in-Zapata, Juan G\'omez and Juan Jaramillo
Seismic Wave Scattering Through a Compressed Hybrid BEM/FEM Method
19 pages, 13 figures
null
null
null
cs.CE math.NA physics.comp-ph
http://creativecommons.org/licenses/by/3.0/
Approximated numerical techniques, for the solution of the elastic wave scattering problem over semi-infinite domains are reviewed. The approximations involve the representation of the half-space by a boundary condition described in terms of 2D boundary element discretizations. The classical BEM matrices are initially re-written into the form of a dense dynamic stiffness matrix and later approximated to a banded matrix. The resulting final banded matrix is then used like a standard finite element to solve the wave scattering problem at lower memory requirements. The accuracy of the reviewed methods is benchmarked against the classical problems of a semi-circular and a rectangular canyon. Results are presented in the time and frequency domain, as well as in terms of relative errors in the considered approximations. The main goal of the paper is to give the analyst a method that can be used at the practising level where an approximate solution is enough in order to support engineering decisions.
[ { "version": "v1", "created": "Fri, 16 May 2014 01:26:35 GMT" } ]
2014-10-14T00:00:00
[ [ "Guarín-Zapata", "Nicolás", "" ], [ "Gómez", "Juan", "" ], [ "Jaramillo", "Juan", "" ] ]
TITLE: Seismic Wave Scattering Through a Compressed Hybrid BEM/FEM Method ABSTRACT: Approximated numerical techniques, for the solution of the elastic wave scattering problem over semi-infinite domains are reviewed. The approximations involve the representation of the half-space by a boundary condition described in terms of 2D boundary element discretizations. The classical BEM matrices are initially re-written into the form of a dense dynamic stiffness matrix and later approximated to a banded matrix. The resulting final banded matrix is then used like a standard finite element to solve the wave scattering problem at lower memory requirements. The accuracy of the reviewed methods is benchmarked against the classical problems of a semi-circular and a rectangular canyon. Results are presented in the time and frequency domain, as well as in terms of relative errors in the considered approximations. The main goal of the paper is to give the analyst a method that can be used at the practising level where an approximate solution is enough in order to support engineering decisions.
1405.4802
Paritosh Parmar
Paritosh Parmar
Use of Computer Vision to Detect Tangles in Tangled Objects
IEEE International Conference on Image Information Processing; untangle; untangling; computer vision; robotic vision; untangling by robot; Tangled-100 dataset; tangled linear deformable objects; personal robotics; image processing
null
10.1109/ICIIP.2013.6707551
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Untangling of structures like ropes and wires by autonomous robots can be useful in areas such as personal robotics, industries and electrical wiring & repairing by robots. This problem can be tackled by using computer vision system in robot. This paper proposes a computer vision based method for analyzing visual data acquired from camera for perceiving the overlap of wires, ropes, hoses i.e. detecting tangles. Information obtained after processing image according to the proposed method comprises of position of tangles in tangled object and which wire passes over which wire. This information can then be used to guide robot to untangle wire/s. Given an image, preprocessing is done to remove noise. Then edges of wire are detected. After that, the image is divided into smaller blocks and each block is checked for wire overlap/s and finding other relevant information. TANGLED-100 dataset was introduced, which consists of images of tangled linear deformable objects. Method discussed in here was tested on the TANGLED-100 dataset. Accuracy achieved during experiments was found to be 74.9%. Robotic simulations were carried out to demonstrate the use of the proposed method in applications of robot. Proposed method is a general method that can be used by robots working in different situations.
[ { "version": "v1", "created": "Mon, 19 May 2014 16:51:11 GMT" }, { "version": "v2", "created": "Sat, 11 Oct 2014 04:50:24 GMT" } ]
2014-10-14T00:00:00
[ [ "Parmar", "Paritosh", "" ] ]
TITLE: Use of Computer Vision to Detect Tangles in Tangled Objects ABSTRACT: Untangling of structures like ropes and wires by autonomous robots can be useful in areas such as personal robotics, industries and electrical wiring & repairing by robots. This problem can be tackled by using computer vision system in robot. This paper proposes a computer vision based method for analyzing visual data acquired from camera for perceiving the overlap of wires, ropes, hoses i.e. detecting tangles. Information obtained after processing image according to the proposed method comprises of position of tangles in tangled object and which wire passes over which wire. This information can then be used to guide robot to untangle wire/s. Given an image, preprocessing is done to remove noise. Then edges of wire are detected. After that, the image is divided into smaller blocks and each block is checked for wire overlap/s and finding other relevant information. TANGLED-100 dataset was introduced, which consists of images of tangled linear deformable objects. Method discussed in here was tested on the TANGLED-100 dataset. Accuracy achieved during experiments was found to be 74.9%. Robotic simulations were carried out to demonstrate the use of the proposed method in applications of robot. Proposed method is a general method that can be used by robots working in different situations.
1408.7039
Eugene Goldberg
Eugene Goldberg and Panagiotis Manolios
Bug Hunting By Computing Range Reduction
The only difference of this version from the previous one is in Section 2. We added a comparison of the performance of the CRR method and other model checkers on an abstract counter
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a method of model checking called Computing Range Reduction (CRR). The CRR method is based on derivation of clauses that reduce the set of traces of reachable states in such a way that at least one counterexample remains (if any). These clauses are derived by a technique called Partial Quantifier Elimination (PQE). Given a number n, the CRR method finds a counterexample of length less or equal to n or proves that such a counterexample does not exist. We show experimentally that a PQE-solver we developed earlier can be efficiently applied to derivation of constraining clauses for transition relations of realistic benchmarks. One of the most appealing features of the CRR method is that it can potentially find long counterexamples. This is the area where it can beat model checkers computing reachable states (or their approximations as in IC3) or SAT-based methods of bounded model checking. PQE cannot be efficiently simulated by a SAT-solver. This is important because the current research in model checking is dominated by SAT-based algorithms. The CRR method is a reminder that one should not put all eggs in one basket.
[ { "version": "v1", "created": "Fri, 29 Aug 2014 14:39:58 GMT" }, { "version": "v2", "created": "Mon, 8 Sep 2014 19:04:03 GMT" }, { "version": "v3", "created": "Sun, 21 Sep 2014 21:43:17 GMT" }, { "version": "v4", "created": "Sat, 11 Oct 2014 20:36:37 GMT" } ]
2014-10-14T00:00:00
[ [ "Goldberg", "Eugene", "" ], [ "Manolios", "Panagiotis", "" ] ]
TITLE: Bug Hunting By Computing Range Reduction ABSTRACT: We describe a method of model checking called Computing Range Reduction (CRR). The CRR method is based on derivation of clauses that reduce the set of traces of reachable states in such a way that at least one counterexample remains (if any). These clauses are derived by a technique called Partial Quantifier Elimination (PQE). Given a number n, the CRR method finds a counterexample of length less or equal to n or proves that such a counterexample does not exist. We show experimentally that a PQE-solver we developed earlier can be efficiently applied to derivation of constraining clauses for transition relations of realistic benchmarks. One of the most appealing features of the CRR method is that it can potentially find long counterexamples. This is the area where it can beat model checkers computing reachable states (or their approximations as in IC3) or SAT-based methods of bounded model checking. PQE cannot be efficiently simulated by a SAT-solver. This is important because the current research in model checking is dominated by SAT-based algorithms. The CRR method is a reminder that one should not put all eggs in one basket.
1410.2988
Jayakrushna Sahoo
Jayakrushna Sahoo, Ashok Kumar Das, A. Goswami
An Algorithm for Mining High Utility Closed Itemsets and Generators
null
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
Traditional association rule mining based on the support-confidence framework provides the objective measure of the rules that are of interest to users. However, it does not reflect the utility of the rules. To extract non-redundant association rules in support-confidence framework frequent closed itemsets and their generators play an important role. To extract non-redundant association rules among high utility itemsets, high utility closed itemsets (HUCI) and their generators should be extracted in order to apply traditional support-confidence framework. However, no efficient method exists at present for mining HUCIs with their generators. This paper addresses this issue. A post-processing algorithm, called the HUCI-Miner, is proposed to mine HUCIs with their generators. The proposed algorithm is implemented using both synthetic and real datasets.
[ { "version": "v1", "created": "Sat, 11 Oct 2014 11:30:14 GMT" } ]
2014-10-14T00:00:00
[ [ "Sahoo", "Jayakrushna", "" ], [ "Das", "Ashok Kumar", "" ], [ "Goswami", "A.", "" ] ]
TITLE: An Algorithm for Mining High Utility Closed Itemsets and Generators ABSTRACT: Traditional association rule mining based on the support-confidence framework provides the objective measure of the rules that are of interest to users. However, it does not reflect the utility of the rules. To extract non-redundant association rules in support-confidence framework frequent closed itemsets and their generators play an important role. To extract non-redundant association rules among high utility itemsets, high utility closed itemsets (HUCI) and their generators should be extracted in order to apply traditional support-confidence framework. However, no efficient method exists at present for mining HUCIs with their generators. This paper addresses this issue. A post-processing algorithm, called the HUCI-Miner, is proposed to mine HUCIs with their generators. The proposed algorithm is implemented using both synthetic and real datasets.
1410.3080
Xin Yuan
Xin Yuan, Patrick Llull, David J. Brady, and Lawrence Carin
Tree-Structure Bayesian Compressive Sensing for Video
5 pages, 4 Figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Bayesian compressive sensing framework is developed for video reconstruction based on the color coded aperture compressive temporal imaging (CACTI) system. By exploiting the three dimension (3D) tree structure of the wavelet and Discrete Cosine Transformation (DCT) coefficients, a Bayesian compressive sensing inversion algorithm is derived to reconstruct (up to 22) color video frames from a single monochromatic compressive measurement. Both simulated and real datasets are adopted to verify the performance of the proposed algorithm.
[ { "version": "v1", "created": "Sun, 12 Oct 2014 11:43:37 GMT" } ]
2014-10-14T00:00:00
[ [ "Yuan", "Xin", "" ], [ "Llull", "Patrick", "" ], [ "Brady", "David J.", "" ], [ "Carin", "Lawrence", "" ] ]
TITLE: Tree-Structure Bayesian Compressive Sensing for Video ABSTRACT: A Bayesian compressive sensing framework is developed for video reconstruction based on the color coded aperture compressive temporal imaging (CACTI) system. By exploiting the three dimension (3D) tree structure of the wavelet and Discrete Cosine Transformation (DCT) coefficients, a Bayesian compressive sensing inversion algorithm is derived to reconstruct (up to 22) color video frames from a single monochromatic compressive measurement. Both simulated and real datasets are adopted to verify the performance of the proposed algorithm.
1410.3169
Ellen Gasparovic
Paul Bendich, Ellen Gasparovic, John Harer, Rauf Izmailov, and Linda Ness
Multi-Scale Local Shape Analysis and Feature Selection in Machine Learning Applications
15 pages, 6 figures, 8 tables
null
null
null
cs.CG cs.LG math.AT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a method called multi-scale local shape analysis, or MLSA, for extracting features that describe the local structure of points within a dataset. The method uses both geometric and topological features at multiple levels of granularity to capture diverse types of local information for subsequent machine learning algorithms operating on the dataset. Using synthetic and real dataset examples, we demonstrate significant performance improvement of classification algorithms constructed for these datasets with correspondingly augmented features.
[ { "version": "v1", "created": "Mon, 13 Oct 2014 00:21:59 GMT" } ]
2014-10-14T00:00:00
[ [ "Bendich", "Paul", "" ], [ "Gasparovic", "Ellen", "" ], [ "Harer", "John", "" ], [ "Izmailov", "Rauf", "" ], [ "Ness", "Linda", "" ] ]
TITLE: Multi-Scale Local Shape Analysis and Feature Selection in Machine Learning Applications ABSTRACT: We introduce a method called multi-scale local shape analysis, or MLSA, for extracting features that describe the local structure of points within a dataset. The method uses both geometric and topological features at multiple levels of granularity to capture diverse types of local information for subsequent machine learning algorithms operating on the dataset. Using synthetic and real dataset examples, we demonstrate significant performance improvement of classification algorithms constructed for these datasets with correspondingly augmented features.
1409.5114
Shuxin Ouyang
Shuxin Ouyang, Timothy Hospedales, Yi-Zhe Song, Xueming Li
A Survey on Heterogeneous Face Recognition: Sketch, Infra-red, 3D and Low-resolution
survey paper(35 pages)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Heterogeneous face recognition (HFR) refers to matching face imagery across different domains. It has received much interest from the research community as a result of its profound implications in law enforcement. A wide variety of new invariant features, cross-modality matching models and heterogeneous datasets being established in recent years. This survey provides a comprehensive review of established techniques and recent developments in HFR. Moreover, we offer a detailed account of datasets and benchmarks commonly used for evaluation. We finish by assessing the state of the field and discussing promising directions for future research.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 19:55:34 GMT" }, { "version": "v2", "created": "Fri, 10 Oct 2014 13:23:30 GMT" } ]
2014-10-13T00:00:00
[ [ "Ouyang", "Shuxin", "" ], [ "Hospedales", "Timothy", "" ], [ "Song", "Yi-Zhe", "" ], [ "Li", "Xueming", "" ] ]
TITLE: A Survey on Heterogeneous Face Recognition: Sketch, Infra-red, 3D and Low-resolution ABSTRACT: Heterogeneous face recognition (HFR) refers to matching face imagery across different domains. It has received much interest from the research community as a result of its profound implications in law enforcement. A wide variety of new invariant features, cross-modality matching models and heterogeneous datasets being established in recent years. This survey provides a comprehensive review of established techniques and recent developments in HFR. Moreover, we offer a detailed account of datasets and benchmarks commonly used for evaluation. We finish by assessing the state of the field and discussing promising directions for future research.
1410.2652
Lane A. Hemaspaandra
Gabor Erdelyi, Edith Hemaspaandra, Lane A. Hemaspaandra
More Natural Models of Electoral Control by Partition
null
null
null
null
cs.GT cs.CC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
"Control" studies attempts to set the outcome of elections through the addition, deletion, or partition of voters or candidates. The set of benchmark control types was largely set in the seminal 1992 paper by Bartholdi, Tovey, and Trick that introduced control, and there now is a large literature studying how many of the benchmark types various election systems are vulnerable to, i.e., have polynomial-time attack algorithms for. However, although the longstanding benchmark models of addition and deletion model relatively well the real-world settings that inspire them, the longstanding benchmark models of partition model settings that are arguably quite distant from those they seek to capture. In this paper, we introduce--and for some important cases analyze the complexity of--new partition models that seek to better capture many real-world partition settings. In particular, in many partition settings one wants the two parts of the partition to be of (almost) equal size, or is partitioning into more than two parts, or has groups of actors who must be placed in the same part of the partition. Our hope is that having these new partition types will allow studies of control attacks to include such models that more realistically capture many settings.
[ { "version": "v1", "created": "Thu, 9 Oct 2014 23:22:49 GMT" } ]
2014-10-13T00:00:00
[ [ "Erdelyi", "Gabor", "" ], [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
TITLE: More Natural Models of Electoral Control by Partition ABSTRACT: "Control" studies attempts to set the outcome of elections through the addition, deletion, or partition of voters or candidates. The set of benchmark control types was largely set in the seminal 1992 paper by Bartholdi, Tovey, and Trick that introduced control, and there now is a large literature studying how many of the benchmark types various election systems are vulnerable to, i.e., have polynomial-time attack algorithms for. However, although the longstanding benchmark models of addition and deletion model relatively well the real-world settings that inspire them, the longstanding benchmark models of partition model settings that are arguably quite distant from those they seek to capture. In this paper, we introduce--and for some important cases analyze the complexity of--new partition models that seek to better capture many real-world partition settings. In particular, in many partition settings one wants the two parts of the partition to be of (almost) equal size, or is partitioning into more than two parts, or has groups of actors who must be placed in the same part of the partition. Our hope is that having these new partition types will allow studies of control attacks to include such models that more realistically capture many settings.
1410.2698
Michael Gowanlock
Michael Gowanlock and Henri Casanova
Technical Report: Towards Efficient Indexing of Spatiotemporal Trajectories on the GPU for Distance Threshold Similarity Searches
30 pages, 18 figures, 1 table
null
null
null
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applications in many domains require processing moving object trajectories. In this work, we focus on a trajectory similarity search that finds all trajectories within a given distance of a query trajectory over a time interval, which we call the distance threshold similarity search. We develop three indexing strategies with spatial, temporal and spatiotemporal selectivity for the GPU that differ significantly from indexes suitable for the CPU, and show the conditions under which each index achieves good performance. Furthermore, we show that the GPU implementations outperform multithreaded CPU implementations in a range of experimental scenarios, making the GPU an attractive technology for processing moving object trajectories. We test our implementations on two synthetic and one real-world dataset of a galaxy merger.
[ { "version": "v1", "created": "Fri, 10 Oct 2014 07:44:05 GMT" } ]
2014-10-13T00:00:00
[ [ "Gowanlock", "Michael", "" ], [ "Casanova", "Henri", "" ] ]
TITLE: Technical Report: Towards Efficient Indexing of Spatiotemporal Trajectories on the GPU for Distance Threshold Similarity Searches ABSTRACT: Applications in many domains require processing moving object trajectories. In this work, we focus on a trajectory similarity search that finds all trajectories within a given distance of a query trajectory over a time interval, which we call the distance threshold similarity search. We develop three indexing strategies with spatial, temporal and spatiotemporal selectivity for the GPU that differ significantly from indexes suitable for the CPU, and show the conditions under which each index achieves good performance. Furthermore, we show that the GPU implementations outperform multithreaded CPU implementations in a range of experimental scenarios, making the GPU an attractive technology for processing moving object trajectories. We test our implementations on two synthetic and one real-world dataset of a galaxy merger.
1405.0773
Yutao Ma
Peng He, Bing Li, Deguang Zhang, Yutao Ma
Simplification of Training Data for Cross-Project Defect Prediction
17 pages, 12 figures
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cross-project defect prediction (CPDP) plays an important role in estimating the most likely defect-prone software components, especially for new or inactive projects. To the best of our knowledge, few prior studies provide explicit guidelines on how to select suitable training data of quality from a large number of public software repositories. In this paper, we have proposed a training data simplification method for practical CPDP in consideration of multiple levels of granularity and filtering strategies for data sets. In addition, we have also provided quantitative evidence on the selection of a suitable filter in terms of defect-proneness ratio. Based on an empirical study on 34 releases of 10 open-source projects, we have elaborately compared the prediction performance of different defect predictors built with five well-known classifiers using training data simplified at different levels of granularity and with two popular filters. The results indicate that when using the multi-granularity simplification method with an appropriate filter, the prediction models based on Naive Bayes can achieve fairly good performance and outperform the benchmark method.
[ { "version": "v1", "created": "Mon, 5 May 2014 03:42:37 GMT" }, { "version": "v2", "created": "Thu, 9 Oct 2014 03:16:31 GMT" } ]
2014-10-10T00:00:00
[ [ "He", "Peng", "" ], [ "Li", "Bing", "" ], [ "Zhang", "Deguang", "" ], [ "Ma", "Yutao", "" ] ]
TITLE: Simplification of Training Data for Cross-Project Defect Prediction ABSTRACT: Cross-project defect prediction (CPDP) plays an important role in estimating the most likely defect-prone software components, especially for new or inactive projects. To the best of our knowledge, few prior studies provide explicit guidelines on how to select suitable training data of quality from a large number of public software repositories. In this paper, we have proposed a training data simplification method for practical CPDP in consideration of multiple levels of granularity and filtering strategies for data sets. In addition, we have also provided quantitative evidence on the selection of a suitable filter in terms of defect-proneness ratio. Based on an empirical study on 34 releases of 10 open-source projects, we have elaborately compared the prediction performance of different defect predictors built with five well-known classifiers using training data simplified at different levels of granularity and with two popular filters. The results indicate that when using the multi-granularity simplification method with an appropriate filter, the prediction models based on Naive Bayes can achieve fairly good performance and outperform the benchmark method.
1410.1035
Rahul Rama Varior Mr.
Rahul Rama Varior, Gang Wang and Jiwen Lu
Learning Invariant Color Features for Person Re-Identification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Matching people across multiple camera views known as person re-identification, is a challenging problem due to the change in visual appearance caused by varying lighting conditions. The perceived color of the subject appears to be different with respect to illumination. Previous works use color as it is or address these challenges by designing color spaces focusing on a specific cue. In this paper, we propose a data driven approach for learning color patterns from pixels sampled from images across two camera views. The intuition behind this work is that, even though pixel values of same color would be different across views, they should be encoded with the same values. We model color feature generation as a learning problem by jointly learning a linear transformation and a dictionary to encode pixel values. We also analyze different photometric invariant color spaces. Using color as the only cue, we compare our approach with all the photometric invariant color spaces and show superior performance over all of them. Combining with other learned low-level and high-level features, we obtain promising results in ViPER, Person Re-ID 2011 and CAVIAR4REID datasets.
[ { "version": "v1", "created": "Sat, 4 Oct 2014 10:27:51 GMT" }, { "version": "v2", "created": "Thu, 9 Oct 2014 10:32:36 GMT" } ]
2014-10-10T00:00:00
[ [ "Varior", "Rahul Rama", "" ], [ "Wang", "Gang", "" ], [ "Lu", "Jiwen", "" ] ]
TITLE: Learning Invariant Color Features for Person Re-Identification ABSTRACT: Matching people across multiple camera views known as person re-identification, is a challenging problem due to the change in visual appearance caused by varying lighting conditions. The perceived color of the subject appears to be different with respect to illumination. Previous works use color as it is or address these challenges by designing color spaces focusing on a specific cue. In this paper, we propose a data driven approach for learning color patterns from pixels sampled from images across two camera views. The intuition behind this work is that, even though pixel values of same color would be different across views, they should be encoded with the same values. We model color feature generation as a learning problem by jointly learning a linear transformation and a dictionary to encode pixel values. We also analyze different photometric invariant color spaces. Using color as the only cue, we compare our approach with all the photometric invariant color spaces and show superior performance over all of them. Combining with other learned low-level and high-level features, we obtain promising results in ViPER, Person Re-ID 2011 and CAVIAR4REID datasets.
1410.1940
Qi(Rose) Yu
Qi (Rose) Yu, Xinran He and Yan Liu
GLAD: Group Anomaly Detection in Social Media Analysis- Extended Abstract
null
null
null
null
cs.LG cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional anomaly detection on social media mostly focuses on individual point anomalies while anomalous phenomena usually occur in groups. Therefore it is valuable to study the collective behavior of individuals and detect group anomalies. Existing group anomaly detection approaches rely on the assumption that the groups are known, which can hardly be true in real world social media applications. In this paper, we take a generative approach by proposing a hierarchical Bayes model: Group Latent Anomaly Detection (GLAD) model. GLAD takes both pair-wise and point-wise data as input, automatically infers the groups and detects group anomalies simultaneously. To account for the dynamic properties of the social media data, we further generalize GLAD to its dynamic extension d-GLAD. We conduct extensive experiments to evaluate our models on both synthetic and real world datasets. The empirical results demonstrate that our approach is effective and robust in discovering latent groups and detecting group anomalies.
[ { "version": "v1", "created": "Tue, 7 Oct 2014 23:11:37 GMT" } ]
2014-10-09T00:00:00
[ [ "Qi", "", "", "Rose" ], [ "Yu", "", "" ], [ "He", "Xinran", "" ], [ "Liu", "Yan", "" ] ]
TITLE: GLAD: Group Anomaly Detection in Social Media Analysis- Extended Abstract ABSTRACT: Traditional anomaly detection on social media mostly focuses on individual point anomalies while anomalous phenomena usually occur in groups. Therefore it is valuable to study the collective behavior of individuals and detect group anomalies. Existing group anomaly detection approaches rely on the assumption that the groups are known, which can hardly be true in real world social media applications. In this paper, we take a generative approach by proposing a hierarchical Bayes model: Group Latent Anomaly Detection (GLAD) model. GLAD takes both pair-wise and point-wise data as input, automatically infers the groups and detects group anomalies simultaneously. To account for the dynamic properties of the social media data, we further generalize GLAD to its dynamic extension d-GLAD. We conduct extensive experiments to evaluate our models on both synthetic and real world datasets. The empirical results demonstrate that our approach is effective and robust in discovering latent groups and detecting group anomalies.
1410.2056
Taymaz Rahkar Farshi
Taymaz Rahkar-Farshi, Sara Behjat-Jamal, Mohammad-Reza Feizi-Derakhshi
An improved multimodal PSO method based on electrostatic interaction using n- nearest-neighbor local search
10 pages, 8 figures, International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014
null
10.5121/ijaia.2014.5506
null
cs.AI
http://creativecommons.org/licenses/publicdomain/
In this paper, an improved multimodal optimization (MMO) algorithm,called LSEPSO,has been proposed. LSEPSO combined Electrostatic Particle Swarm Optimization (EPSO) algorithm and a local search method and then made some modification on them. It has been shown to improve global and local optima finding ability of the algorithm. This algorithm useda modified local search to improve particle's personal best, which used n-nearest-neighbour instead of nearest-neighbour. Then, by creating n new points among each particle and n nearest particles, it tried to find a point which could be the alternative of particle's personal best. This method prevented particle's attenuation and following a specific particle by its neighbours. The performed tests on a number of benchmark functions clearly demonstrated that the improved algorithm is able to solve MMO problems and outperform other tested algorithms in this article.
[ { "version": "v1", "created": "Wed, 8 Oct 2014 10:48:03 GMT" } ]
2014-10-09T00:00:00
[ [ "Rahkar-Farshi", "Taymaz", "" ], [ "Behjat-Jamal", "Sara", "" ], [ "Feizi-Derakhshi", "Mohammad-Reza", "" ] ]
TITLE: An improved multimodal PSO method based on electrostatic interaction using n- nearest-neighbor local search ABSTRACT: In this paper, an improved multimodal optimization (MMO) algorithm,called LSEPSO,has been proposed. LSEPSO combined Electrostatic Particle Swarm Optimization (EPSO) algorithm and a local search method and then made some modification on them. It has been shown to improve global and local optima finding ability of the algorithm. This algorithm useda modified local search to improve particle's personal best, which used n-nearest-neighbour instead of nearest-neighbour. Then, by creating n new points among each particle and n nearest particles, it tried to find a point which could be the alternative of particle's personal best. This method prevented particle's attenuation and following a specific particle by its neighbours. The performed tests on a number of benchmark functions clearly demonstrated that the improved algorithm is able to solve MMO problems and outperform other tested algorithms in this article.
1410.2100
Wu Xianyan student
Wu Xianyan, Han Qi, Le Dan, Niu Xiamu
A New Method for Estimating the Widths of JPEG Images
null
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image width is important for image understanding. We propose a novel method to estimate widths for JPEG images when their widths are not available. The key idea is that the distance between two decoded MCUs (Minimum Coded Unit) adjacent in the vertical direction is usually small, which is measured by the average Euclidean distance between the pixels from the bottom row of the top MCU and the top row of the bottom MCU. On PASCAL VOC 2010 challenge dataset and USC-SIPI image database, experimental results show the high performance of the proposed approach.
[ { "version": "v1", "created": "Wed, 8 Oct 2014 13:24:06 GMT" } ]
2014-10-09T00:00:00
[ [ "Xianyan", "Wu", "" ], [ "Qi", "Han", "" ], [ "Dan", "Le", "" ], [ "Xiamu", "Niu", "" ] ]
TITLE: A New Method for Estimating the Widths of JPEG Images ABSTRACT: Image width is important for image understanding. We propose a novel method to estimate widths for JPEG images when their widths are not available. The key idea is that the distance between two decoded MCUs (Minimum Coded Unit) adjacent in the vertical direction is usually small, which is measured by the average Euclidean distance between the pixels from the bottom row of the top MCU and the top row of the bottom MCU. On PASCAL VOC 2010 challenge dataset and USC-SIPI image database, experimental results show the high performance of the proposed approach.
1401.6413
Nuri Denizcan Vanli
N. Denizcan Vanli, Muhammed O. Sayin, Suleyman S. Kozat
Predicting Nearly As Well As the Optimal Twice Differentiable Regressor
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study nonlinear regression of real valued data in an individual sequence manner, where we provide results that are guaranteed to hold without any statistical assumptions. We address the convergence and undertraining issues of conventional nonlinear regression methods and introduce an algorithm that elegantly mitigates these issues via an incremental hierarchical structure, (i.e., via an incremental decision tree). Particularly, we present a piecewise linear (or nonlinear) regression algorithm that partitions the regressor space in a data driven manner and learns a linear model at each region. Unlike the conventional approaches, our algorithm gradually increases the number of disjoint partitions on the regressor space in a sequential manner according to the observed data. Through this data driven approach, our algorithm sequentially and asymptotically achieves the performance of the optimal twice differentiable regression function for any data sequence with an unknown and arbitrary length. The computational complexity of the introduced algorithm is only logarithmic in the data length under certain regularity conditions. We provide the explicit description of the algorithm and demonstrate the significant gains for the well-known benchmark real data sets and chaotic signals.
[ { "version": "v1", "created": "Thu, 23 Jan 2014 15:51:36 GMT" }, { "version": "v2", "created": "Mon, 6 Oct 2014 23:32:10 GMT" } ]
2014-10-08T00:00:00
[ [ "Vanli", "N. Denizcan", "" ], [ "Sayin", "Muhammed O.", "" ], [ "Kozat", "Suleyman S.", "" ] ]
TITLE: Predicting Nearly As Well As the Optimal Twice Differentiable Regressor ABSTRACT: We study nonlinear regression of real valued data in an individual sequence manner, where we provide results that are guaranteed to hold without any statistical assumptions. We address the convergence and undertraining issues of conventional nonlinear regression methods and introduce an algorithm that elegantly mitigates these issues via an incremental hierarchical structure, (i.e., via an incremental decision tree). Particularly, we present a piecewise linear (or nonlinear) regression algorithm that partitions the regressor space in a data driven manner and learns a linear model at each region. Unlike the conventional approaches, our algorithm gradually increases the number of disjoint partitions on the regressor space in a sequential manner according to the observed data. Through this data driven approach, our algorithm sequentially and asymptotically achieves the performance of the optimal twice differentiable regression function for any data sequence with an unknown and arbitrary length. The computational complexity of the introduced algorithm is only logarithmic in the data length under certain regularity conditions. We provide the explicit description of the algorithm and demonstrate the significant gains for the well-known benchmark real data sets and chaotic signals.
1401.5383
Rayan Chikhi
Rayan Chikhi, Antoine Limasset, Shaun Jackman, Jared Simpson and Paul Medvedev
On the representation of de Bruijn graphs
Journal version (JCB). A preliminary version of this article was published in the proceedings of RECOMB 2014
null
null
null
q-bio.QM cs.DS q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The de Bruijn graph plays an important role in bioinformatics, especially in the context of de novo assembly. However, the representation of the de Bruijn graph in memory is a computational bottleneck for many assemblers. Recent papers proposed a navigational data structure approach in order to improve memory usage. We prove several theoretical space lower bounds to show the limitation of these types of approaches. We further design and implement a general data structure (DBGFM) and demonstrate its use on a human whole-genome dataset, achieving space usage of 1.5 GB and a 46% improvement over previous approaches. As part of DBGFM, we develop the notion of frequency-based minimizers and show how it can be used to enumerate all maximal simple paths of the de Bruijn graph using only 43 MB of memory. Finally, we demonstrate that our approach can be integrated into an existing assembler by modifying the ABySS software to use DBGFM.
[ { "version": "v1", "created": "Tue, 21 Jan 2014 16:55:02 GMT" }, { "version": "v2", "created": "Wed, 22 Jan 2014 16:53:37 GMT" }, { "version": "v3", "created": "Fri, 14 Feb 2014 22:55:09 GMT" }, { "version": "v4", "created": "Mon, 6 Oct 2014 12:39:56 GMT" } ]
2014-10-07T00:00:00
[ [ "Chikhi", "Rayan", "" ], [ "Limasset", "Antoine", "" ], [ "Jackman", "Shaun", "" ], [ "Simpson", "Jared", "" ], [ "Medvedev", "Paul", "" ] ]
TITLE: On the representation of de Bruijn graphs ABSTRACT: The de Bruijn graph plays an important role in bioinformatics, especially in the context of de novo assembly. However, the representation of the de Bruijn graph in memory is a computational bottleneck for many assemblers. Recent papers proposed a navigational data structure approach in order to improve memory usage. We prove several theoretical space lower bounds to show the limitation of these types of approaches. We further design and implement a general data structure (DBGFM) and demonstrate its use on a human whole-genome dataset, achieving space usage of 1.5 GB and a 46% improvement over previous approaches. As part of DBGFM, we develop the notion of frequency-based minimizers and show how it can be used to enumerate all maximal simple paths of the de Bruijn graph using only 43 MB of memory. Finally, we demonstrate that our approach can be integrated into an existing assembler by modifying the ABySS software to use DBGFM.
1404.6218
Ashkan Tousimojarad Mr
Ashkan Tousimojarad and Wim Vanderbauwhede
A Parallel Task-based Approach to Linear Algebra
Final version as appeared in "dx.doi.org/10.1109/ISPDC.2014.11"
Tousimojarad, A., Vanderbauwhede, W.: A parallel task-based approach to linear algebra. In: Parallel and Distributed Computing (ISPDC), 2014 IEEE 13th International Symposium on. pp. 59-66. IEEE (2014)
10.1109/ISPDC.2014.11
null
cs.DC cs.PF cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Processors with large numbers of cores are becoming commonplace. In order to take advantage of the available resources in these systems, the programming paradigm has to move towards increased parallelism. However, increasing the level of concurrency in the program does not necessarily lead to better performance. Parallel programming models have to provide flexible ways of defining parallel tasks and at the same time, efficiently managing the created tasks. OpenMP is a widely accepted programming model for shared-memory architectures. In this paper we highlight some of the drawbacks in the OpenMP tasking approach, and propose an alternative model based on the Glasgow Parallel Reduction Machine (GPRM) programming framework. As the main focus of this study, we deploy our model to solve a fundamental linear algebra problem, LU factorisation of sparse matrices. We have used the SparseLU benchmark from the BOTS benchmark suite, and compared the results obtained from our model to those of the OpenMP tasking approach. The TILEPro64 system has been used to run the experiments. The results are very promising, not only because of the performance improvement for this particular problem, but also because they verify the task management efficiency, stability, and flexibility of our model, which can be applied to solve problems in future many-core systems.
[ { "version": "v1", "created": "Thu, 24 Apr 2014 18:39:30 GMT" }, { "version": "v2", "created": "Fri, 3 Oct 2014 14:53:58 GMT" }, { "version": "v3", "created": "Mon, 6 Oct 2014 15:46:24 GMT" } ]
2014-10-07T00:00:00
[ [ "Tousimojarad", "Ashkan", "" ], [ "Vanderbauwhede", "Wim", "" ] ]
TITLE: A Parallel Task-based Approach to Linear Algebra ABSTRACT: Processors with large numbers of cores are becoming commonplace. In order to take advantage of the available resources in these systems, the programming paradigm has to move towards increased parallelism. However, increasing the level of concurrency in the program does not necessarily lead to better performance. Parallel programming models have to provide flexible ways of defining parallel tasks and at the same time, efficiently managing the created tasks. OpenMP is a widely accepted programming model for shared-memory architectures. In this paper we highlight some of the drawbacks in the OpenMP tasking approach, and propose an alternative model based on the Glasgow Parallel Reduction Machine (GPRM) programming framework. As the main focus of this study, we deploy our model to solve a fundamental linear algebra problem, LU factorisation of sparse matrices. We have used the SparseLU benchmark from the BOTS benchmark suite, and compared the results obtained from our model to those of the OpenMP tasking approach. The TILEPro64 system has been used to run the experiments. The results are very promising, not only because of the performance improvement for this particular problem, but also because they verify the task management efficiency, stability, and flexibility of our model, which can be applied to solve problems in future many-core systems.
1410.0969
Abdul Kadir
Abdul Kadir
A Model of Plant Identification System Using GLCM, Lacunarity And Shen Features
10 pages
Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol 5(2), 2014
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, many approaches have been introduced by several researchers to identify plants. Now, applications of texture, shape, color and vein features are common practices. However, there are many possibilities of methods can be developed to improve the performance of such identification systems. Therefore, several experiments had been conducted in this research. As a result, a new novel approach by using combination of Gray-Level Co-occurrence Matrix, lacunarity and Shen features and a Bayesian classifier gives a better result compared to other plant identification systems. For comparison, this research used two kinds of several datasets that were usually used for testing the performance of each plant identification system. The results show that the system gives an accuracy rate of 97.19% when using the Flavia dataset and 95.00% when using the Foliage dataset and outperforms other approaches.
[ { "version": "v1", "created": "Wed, 27 Aug 2014 00:49:05 GMT" } ]
2014-10-07T00:00:00
[ [ "Kadir", "Abdul", "" ] ]
TITLE: A Model of Plant Identification System Using GLCM, Lacunarity And Shen Features ABSTRACT: Recently, many approaches have been introduced by several researchers to identify plants. Now, applications of texture, shape, color and vein features are common practices. However, there are many possibilities of methods can be developed to improve the performance of such identification systems. Therefore, several experiments had been conducted in this research. As a result, a new novel approach by using combination of Gray-Level Co-occurrence Matrix, lacunarity and Shen features and a Bayesian classifier gives a better result compared to other plant identification systems. For comparison, this research used two kinds of several datasets that were usually used for testing the performance of each plant identification system. The results show that the system gives an accuracy rate of 97.19% when using the Flavia dataset and 95.00% when using the Foliage dataset and outperforms other approaches.
1410.1090
Junhua Mao
Junhua Mao, Wei Xu, Yi Yang, Jiang Wang, Alan L. Yuille
Explain Images with Multimodal Recurrent Neural Networks
null
null
null
null
cs.CV cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a multimodal Recurrent Neural Network (m-RNN) model for generating novel sentence descriptions to explain the content of images. It directly models the probability distribution of generating a word given previous words and the image. Image descriptions are generated by sampling from this distribution. The model consists of two sub-networks: a deep recurrent neural network for sentences and a deep convolutional network for images. These two sub-networks interact with each other in a multimodal layer to form the whole m-RNN model. The effectiveness of our model is validated on three benchmark datasets (IAPR TC-12, Flickr 8K, and Flickr 30K). Our model outperforms the state-of-the-art generative method. In addition, the m-RNN model can be applied to retrieval tasks for retrieving images or sentences, and achieves significant performance improvement over the state-of-the-art methods which directly optimize the ranking objective function for retrieval.
[ { "version": "v1", "created": "Sat, 4 Oct 2014 20:24:34 GMT" } ]
2014-10-07T00:00:00
[ [ "Mao", "Junhua", "" ], [ "Xu", "Wei", "" ], [ "Yang", "Yi", "" ], [ "Wang", "Jiang", "" ], [ "Yuille", "Alan L.", "" ] ]
TITLE: Explain Images with Multimodal Recurrent Neural Networks ABSTRACT: In this paper, we present a multimodal Recurrent Neural Network (m-RNN) model for generating novel sentence descriptions to explain the content of images. It directly models the probability distribution of generating a word given previous words and the image. Image descriptions are generated by sampling from this distribution. The model consists of two sub-networks: a deep recurrent neural network for sentences and a deep convolutional network for images. These two sub-networks interact with each other in a multimodal layer to form the whole m-RNN model. The effectiveness of our model is validated on three benchmark datasets (IAPR TC-12, Flickr 8K, and Flickr 30K). Our model outperforms the state-of-the-art generative method. In addition, the m-RNN model can be applied to retrieval tasks for retrieving images or sentences, and achieves significant performance improvement over the state-of-the-art methods which directly optimize the ranking objective function for retrieval.
1410.1151
Vladimir Bochkarev
Yulia S. Maslennikova, Vladimir V. Bochkarev
Training Algorithm for Neuro-Fuzzy Network Based on Singular Spectrum Analysis
5 pages, 3 figures
null
null
null
cs.NE stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we propose a combination of an noise-reduction algorithm based on Singular Spectrum Analysis (SSA) and a standard feedforward neural prediction model. Basically, the proposed algorithm consists of two different steps: data preprocessing based on the SSA filtering method and step-by-step training procedure in which we use a simple feedforward multilayer neural network with backpropagation learning. The proposed noise-reduction procedure successfully removes most of the noise. That increases long-term predictability of the processed dataset comparison with the raw dataset. The method was applied to predict the International sunspot number RZ time series. The results show that our combined technique has better performances than those offered by the same network directly applied to raw dataset.
[ { "version": "v1", "created": "Sun, 5 Oct 2014 12:25:15 GMT" } ]
2014-10-07T00:00:00
[ [ "Maslennikova", "Yulia S.", "" ], [ "Bochkarev", "Vladimir V.", "" ] ]
TITLE: Training Algorithm for Neuro-Fuzzy Network Based on Singular Spectrum Analysis ABSTRACT: In this article, we propose a combination of an noise-reduction algorithm based on Singular Spectrum Analysis (SSA) and a standard feedforward neural prediction model. Basically, the proposed algorithm consists of two different steps: data preprocessing based on the SSA filtering method and step-by-step training procedure in which we use a simple feedforward multilayer neural network with backpropagation learning. The proposed noise-reduction procedure successfully removes most of the noise. That increases long-term predictability of the processed dataset comparison with the raw dataset. The method was applied to predict the International sunspot number RZ time series. The results show that our combined technique has better performances than those offered by the same network directly applied to raw dataset.
1410.1160
Aleksandar Milenkoski
Aleksandar Milenkoski and Samuel Kounev and Alberto Avritzer and Nuno Antunes and Marco Vieira
On Benchmarking Intrusion Detection Systems in Virtualized Environments
SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group
null
null
SPEC-RG-2013-002
cs.CR cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for virtualized environments as VMM-based IDSes. In this work, we analyze state-of-the-art intrusion detection techniques applied in virtualized environments and architectures of VMM-based IDSes. Further, we identify challenges that apply specifically to benchmarking VMM-based IDSes focussing on workloads and metrics. For example, we discuss the challenge of defining representative baseline benign workload profiles as well as the challenge of defining malicious workloads containing attacks targeted at the VMM. We also discuss the impact of on-demand resource provisioning features of virtualized environments (e.g., CPU and memory hotplugging, memory ballooning) on IDS benchmarking measures such as capacity and attack detection accuracy. Finally, we outline future research directions in the area of benchmarking VMM-based IDSes and of intrusion detection in virtualized environments in general.
[ { "version": "v1", "created": "Sun, 5 Oct 2014 13:30:15 GMT" } ]
2014-10-07T00:00:00
[ [ "Milenkoski", "Aleksandar", "" ], [ "Kounev", "Samuel", "" ], [ "Avritzer", "Alberto", "" ], [ "Antunes", "Nuno", "" ], [ "Vieira", "Marco", "" ] ]
TITLE: On Benchmarking Intrusion Detection Systems in Virtualized Environments ABSTRACT: Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for virtualized environments as VMM-based IDSes. In this work, we analyze state-of-the-art intrusion detection techniques applied in virtualized environments and architectures of VMM-based IDSes. Further, we identify challenges that apply specifically to benchmarking VMM-based IDSes focussing on workloads and metrics. For example, we discuss the challenge of defining representative baseline benign workload profiles as well as the challenge of defining malicious workloads containing attacks targeted at the VMM. We also discuss the impact of on-demand resource provisioning features of virtualized environments (e.g., CPU and memory hotplugging, memory ballooning) on IDS benchmarking measures such as capacity and attack detection accuracy. Finally, we outline future research directions in the area of benchmarking VMM-based IDSes and of intrusion detection in virtualized environments in general.
1407.0733
Davide Barbieri
Giacomo Cocci, Davide Barbieri, Giovanna Citti, Alessandro Sarti
Cortical spatio-temporal dimensionality reduction for visual grouping
null
null
null
null
cs.CV cs.NE q-bio.NC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The visual systems of many mammals, including humans, is able to integrate the geometric information of visual stimuli and to perform cognitive tasks already at the first stages of the cortical processing. This is thought to be the result of a combination of mechanisms, which include feature extraction at single cell level and geometric processing by means of cells connectivity. We present a geometric model of such connectivities in the space of detected features associated to spatio-temporal visual stimuli, and show how they can be used to obtain low-level object segmentation. The main idea is that of defining a spectral clustering procedure with anisotropic affinities over datasets consisting of embeddings of the visual stimuli into higher dimensional spaces. Neural plausibility of the proposed arguments will be discussed.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 22:07:06 GMT" }, { "version": "v2", "created": "Fri, 3 Oct 2014 16:46:41 GMT" } ]
2014-10-06T00:00:00
[ [ "Cocci", "Giacomo", "" ], [ "Barbieri", "Davide", "" ], [ "Citti", "Giovanna", "" ], [ "Sarti", "Alessandro", "" ] ]
TITLE: Cortical spatio-temporal dimensionality reduction for visual grouping ABSTRACT: The visual systems of many mammals, including humans, is able to integrate the geometric information of visual stimuli and to perform cognitive tasks already at the first stages of the cortical processing. This is thought to be the result of a combination of mechanisms, which include feature extraction at single cell level and geometric processing by means of cells connectivity. We present a geometric model of such connectivities in the space of detected features associated to spatio-temporal visual stimuli, and show how they can be used to obtain low-level object segmentation. The main idea is that of defining a spectral clustering procedure with anisotropic affinities over datasets consisting of embeddings of the visual stimuli into higher dimensional spaces. Neural plausibility of the proposed arguments will be discussed.
1402.1973
Alhussein Fawzi
Alhussein Fawzi, Mike Davies, Pascal Frossard
Dictionary learning for fast classification based on soft-thresholding
null
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classifiers based on sparse representations have recently been shown to provide excellent results in many visual recognition and classification tasks. However, the high cost of computing sparse representations at test time is a major obstacle that limits the applicability of these methods in large-scale problems, or in scenarios where computational power is restricted. We consider in this paper a simple yet efficient alternative to sparse coding for feature extraction. We study a classification scheme that applies the soft-thresholding nonlinear mapping in a dictionary, followed by a linear classifier. A novel supervised dictionary learning algorithm tailored for this low complexity classification architecture is proposed. The dictionary learning problem, which jointly learns the dictionary and linear classifier, is cast as a difference of convex (DC) program and solved efficiently with an iterative DC solver. We conduct experiments on several datasets, and show that our learning algorithm that leverages the structure of the classification problem outperforms generic learning procedures. Our simple classifier based on soft-thresholding also competes with the recent sparse coding classifiers, when the dictionary is learned appropriately. The adopted classification scheme further requires less computational time at the testing stage, compared to other classifiers. The proposed scheme shows the potential of the adequately trained soft-thresholding mapping for classification and paves the way towards the development of very efficient classification methods for vision problems.
[ { "version": "v1", "created": "Sun, 9 Feb 2014 18:18:33 GMT" }, { "version": "v2", "created": "Thu, 2 Oct 2014 16:45:19 GMT" } ]
2014-10-03T00:00:00
[ [ "Fawzi", "Alhussein", "" ], [ "Davies", "Mike", "" ], [ "Frossard", "Pascal", "" ] ]
TITLE: Dictionary learning for fast classification based on soft-thresholding ABSTRACT: Classifiers based on sparse representations have recently been shown to provide excellent results in many visual recognition and classification tasks. However, the high cost of computing sparse representations at test time is a major obstacle that limits the applicability of these methods in large-scale problems, or in scenarios where computational power is restricted. We consider in this paper a simple yet efficient alternative to sparse coding for feature extraction. We study a classification scheme that applies the soft-thresholding nonlinear mapping in a dictionary, followed by a linear classifier. A novel supervised dictionary learning algorithm tailored for this low complexity classification architecture is proposed. The dictionary learning problem, which jointly learns the dictionary and linear classifier, is cast as a difference of convex (DC) program and solved efficiently with an iterative DC solver. We conduct experiments on several datasets, and show that our learning algorithm that leverages the structure of the classification problem outperforms generic learning procedures. Our simple classifier based on soft-thresholding also competes with the recent sparse coding classifiers, when the dictionary is learned appropriately. The adopted classification scheme further requires less computational time at the testing stage, compared to other classifiers. The proposed scheme shows the potential of the adequately trained soft-thresholding mapping for classification and paves the way towards the development of very efficient classification methods for vision problems.
1403.7827
David Fabian Klosik
David F. Klosik, Stefan Bornholdt, Marc-Thorsten H\"utt
Motif-based success scores in coauthorship networks are highly sensitive to author name disambiguation
7 pages, 7 figures
Phys. Rev. E 90, 032811 (2014)
10.1103/PhysRevE.90.032811
null
physics.soc-ph cs.DL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Following the work of Krumov et al. [Eur. Phys. J. B 84, 535 (2011)] we revisit the question whether the usage of large citation datasets allows for the quantitative assessment of social (by means of coauthorship of publications) influence on the progression of science. Applying a more comprehensive and well-curated dataset containing the publications in the journals of the American Physical Society during the whole 20th century we find that the measure chosen in the original study, a score based on small induced subgraphs, has to be used with caution, since the obtained results are highly sensitive to the exact implementation of the author disambiguation task.
[ { "version": "v1", "created": "Sun, 30 Mar 2014 22:39:48 GMT" }, { "version": "v2", "created": "Thu, 2 Oct 2014 13:12:32 GMT" } ]
2014-10-03T00:00:00
[ [ "Klosik", "David F.", "" ], [ "Bornholdt", "Stefan", "" ], [ "Hütt", "Marc-Thorsten", "" ] ]
TITLE: Motif-based success scores in coauthorship networks are highly sensitive to author name disambiguation ABSTRACT: Following the work of Krumov et al. [Eur. Phys. J. B 84, 535 (2011)] we revisit the question whether the usage of large citation datasets allows for the quantitative assessment of social (by means of coauthorship of publications) influence on the progression of science. Applying a more comprehensive and well-curated dataset containing the publications in the journals of the American Physical Society during the whole 20th century we find that the measure chosen in the original study, a score based on small induced subgraphs, has to be used with caution, since the obtained results are highly sensitive to the exact implementation of the author disambiguation task.
1410.0510
Ludovic Denoyer
Ludovic Denoyer and Patrick Gallinari
Deep Sequential Neural Network
null
null
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural Networks sequentially build high-level features through their successive layers. We propose here a new neural network model where each layer is associated with a set of candidate mappings. When an input is processed, at each layer, one mapping among these candidates is selected according to a sequential decision process. The resulting model is structured according to a DAG like architecture, so that a path from the root to a leaf node defines a sequence of transformations. Instead of considering global transformations, like in classical multilayer networks, this model allows us for learning a set of local transformations. It is thus able to process data with different characteristics through specific sequences of such local transformations, increasing the expression power of this model w.r.t a classical multilayered network. The learning algorithm is inspired from policy gradient techniques coming from the reinforcement learning domain and is used here instead of the classical back-propagation based gradient descent techniques. Experiments on different datasets show the relevance of this approach.
[ { "version": "v1", "created": "Thu, 2 Oct 2014 10:58:17 GMT" } ]
2014-10-03T00:00:00
[ [ "Denoyer", "Ludovic", "" ], [ "Gallinari", "Patrick", "" ] ]
TITLE: Deep Sequential Neural Network ABSTRACT: Neural Networks sequentially build high-level features through their successive layers. We propose here a new neural network model where each layer is associated with a set of candidate mappings. When an input is processed, at each layer, one mapping among these candidates is selected according to a sequential decision process. The resulting model is structured according to a DAG like architecture, so that a path from the root to a leaf node defines a sequence of transformations. Instead of considering global transformations, like in classical multilayer networks, this model allows us for learning a set of local transformations. It is thus able to process data with different characteristics through specific sequences of such local transformations, increasing the expression power of this model w.r.t a classical multilayered network. The learning algorithm is inspired from policy gradient techniques coming from the reinforcement learning domain and is used here instead of the classical back-propagation based gradient descent techniques. Experiments on different datasets show the relevance of this approach.
1409.8608
Elmar Peise
Elmar Peise (1), Diego Fabregat-Traver (1), Paolo Bientinesi (1) ((1) AICES, RWTH Aachen)
On the Performance Prediction of BLAS-based Tensor Contractions
Submitted to PMBS14
null
null
null
cs.MS cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tensor operations are surging as the computational building blocks for a variety of scientific simulations and the development of high-performance kernels for such operations is known to be a challenging task. While for operations on one- and two-dimensional tensors there exist standardized interfaces and highly-optimized libraries (BLAS), for higher dimensional tensors neither standards nor highly-tuned implementations exist yet. In this paper, we consider contractions between two tensors of arbitrary dimensionality and take on the challenge of generating high-performance implementations by resorting to sequences of BLAS kernels. The approach consists in breaking the contraction down into operations that only involve matrices or vectors. Since in general there are many alternative ways of decomposing a contraction, we are able to methodically derive a large family of algorithms. The main contribution of this paper is a systematic methodology to accurately identify the fastest algorithms in the bunch, without executing them. The goal is instead accomplished with the help of a set of cache-aware micro-benchmarks for the underlying BLAS kernels. The predictions we construct from such benchmarks allow us to reliably single out the best-performing algorithms in a tiny fraction of the time taken by the direct execution of the algorithms.
[ { "version": "v1", "created": "Tue, 30 Sep 2014 15:54:13 GMT" } ]
2014-10-02T00:00:00
[ [ "Peise", "Elmar", "" ], [ "Fabregat-Traver", "Diego", "" ], [ "Bientinesi", "Paolo", "" ] ]
TITLE: On the Performance Prediction of BLAS-based Tensor Contractions ABSTRACT: Tensor operations are surging as the computational building blocks for a variety of scientific simulations and the development of high-performance kernels for such operations is known to be a challenging task. While for operations on one- and two-dimensional tensors there exist standardized interfaces and highly-optimized libraries (BLAS), for higher dimensional tensors neither standards nor highly-tuned implementations exist yet. In this paper, we consider contractions between two tensors of arbitrary dimensionality and take on the challenge of generating high-performance implementations by resorting to sequences of BLAS kernels. The approach consists in breaking the contraction down into operations that only involve matrices or vectors. Since in general there are many alternative ways of decomposing a contraction, we are able to methodically derive a large family of algorithms. The main contribution of this paper is a systematic methodology to accurately identify the fastest algorithms in the bunch, without executing them. The goal is instead accomplished with the help of a set of cache-aware micro-benchmarks for the underlying BLAS kernels. The predictions we construct from such benchmarks allow us to reliably single out the best-performing algorithms in a tiny fraction of the time taken by the direct execution of the algorithms.
1410.0001
Fabien Gouyon
Fabien Gouyon, Bob L. Sturm, Joao Lobato Oliveira, Nuno Hespanhol, and Thibault Langlois
On Evaluation Validity in Music Autotagging
Submitted for journal publication in September 2014
null
null
null
cs.IR cs.SD
http://creativecommons.org/licenses/by/3.0/
Music autotagging, an established problem in Music Information Retrieval, aims to alleviate the human cost required to manually annotate collections of recorded music with textual labels by automating the process. Many autotagging systems have been proposed and evaluated by procedures and datasets that are now standard (used in MIREX, for instance). Very little work, however, has been dedicated to determine what these evaluations really mean about an autotagging system, or the comparison of two systems, for the problem of annotating music in the real world. In this article, we are concerned with explaining the figure of merit of an autotagging system evaluated with a standard approach. Specifically, does the figure of merit, or a comparison of figures of merit, warrant a conclusion about how well autotagging systems have learned to describe music with a specific vocabulary? The main contributions of this paper are a formalization of the notion of validity in autotagging evaluation, and a method to test it in general. We demonstrate the practical use of our method in experiments with three specific state-of-the-art autotagging systems --all of which are reproducible using the linked code and data. Our experiments show for these specific systems in a simple and objective two-class task that the standard evaluation approach does not provide valid indicators of their performance.
[ { "version": "v1", "created": "Tue, 30 Sep 2014 14:57:52 GMT" } ]
2014-10-02T00:00:00
[ [ "Gouyon", "Fabien", "" ], [ "Sturm", "Bob L.", "" ], [ "Oliveira", "Joao Lobato", "" ], [ "Hespanhol", "Nuno", "" ], [ "Langlois", "Thibault", "" ] ]
TITLE: On Evaluation Validity in Music Autotagging ABSTRACT: Music autotagging, an established problem in Music Information Retrieval, aims to alleviate the human cost required to manually annotate collections of recorded music with textual labels by automating the process. Many autotagging systems have been proposed and evaluated by procedures and datasets that are now standard (used in MIREX, for instance). Very little work, however, has been dedicated to determine what these evaluations really mean about an autotagging system, or the comparison of two systems, for the problem of annotating music in the real world. In this article, we are concerned with explaining the figure of merit of an autotagging system evaluated with a standard approach. Specifically, does the figure of merit, or a comparison of figures of merit, warrant a conclusion about how well autotagging systems have learned to describe music with a specific vocabulary? The main contributions of this paper are a formalization of the notion of validity in autotagging evaluation, and a method to test it in general. We demonstrate the practical use of our method in experiments with three specific state-of-the-art autotagging systems --all of which are reproducible using the linked code and data. Our experiments show for these specific systems in a simple and objective two-class task that the standard evaluation approach does not provide valid indicators of their performance.
1410.0095
Xu Wang
Xu Wang, Konstantinos Slavakis, Gilad Lerman
Riemannian Multi-Manifold Modeling
null
null
null
null
stat.ML cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper advocates a novel framework for segmenting a dataset in a Riemannian manifold $M$ into clusters lying around low-dimensional submanifolds of $M$. Important examples of $M$, for which the proposed clustering algorithm is computationally efficient, are the sphere, the set of positive definite matrices, and the Grassmannian. The clustering problem with these examples of $M$ is already useful for numerous application domains such as action identification in video sequences, dynamic texture clustering, brain fiber segmentation in medical imaging, and clustering of deformed images. The proposed clustering algorithm constructs a data-affinity matrix by thoroughly exploiting the intrinsic geometry and then applies spectral clustering. The intrinsic local geometry is encoded by local sparse coding and more importantly by directional information of local tangent spaces and geodesics. Theoretical guarantees are established for a simplified variant of the algorithm even when the clusters intersect. To avoid complication, these guarantees assume that the underlying submanifolds are geodesic. Extensive validation on synthetic and real data demonstrates the resiliency of the proposed method against deviations from the theoretical model as well as its superior performance over state-of-the-art techniques.
[ { "version": "v1", "created": "Wed, 1 Oct 2014 02:37:12 GMT" } ]
2014-10-02T00:00:00
[ [ "Wang", "Xu", "" ], [ "Slavakis", "Konstantinos", "" ], [ "Lerman", "Gilad", "" ] ]
TITLE: Riemannian Multi-Manifold Modeling ABSTRACT: This paper advocates a novel framework for segmenting a dataset in a Riemannian manifold $M$ into clusters lying around low-dimensional submanifolds of $M$. Important examples of $M$, for which the proposed clustering algorithm is computationally efficient, are the sphere, the set of positive definite matrices, and the Grassmannian. The clustering problem with these examples of $M$ is already useful for numerous application domains such as action identification in video sequences, dynamic texture clustering, brain fiber segmentation in medical imaging, and clustering of deformed images. The proposed clustering algorithm constructs a data-affinity matrix by thoroughly exploiting the intrinsic geometry and then applies spectral clustering. The intrinsic local geometry is encoded by local sparse coding and more importantly by directional information of local tangent spaces and geodesics. Theoretical guarantees are established for a simplified variant of the algorithm even when the clusters intersect. To avoid complication, these guarantees assume that the underlying submanifolds are geodesic. Extensive validation on synthetic and real data demonstrates the resiliency of the proposed method against deviations from the theoretical model as well as its superior performance over state-of-the-art techniques.
1410.0265
Chao Li
Chao Li, Michael Hay, Gerome Miklau, Yue Wang
A Data- and Workload-Aware Algorithm for Range Queries Under Differential Privacy
VLDB 2014
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new algorithm for answering a given set of range queries under $\epsilon$-differential privacy which often achieves substantially lower error than competing methods. Our algorithm satisfies differential privacy by adding noise that is adapted to the input data and to the given query set. We first privately learn a partitioning of the domain into buckets that suit the input data well. Then we privately estimate counts for each bucket, doing so in a manner well-suited for the given query set. Since the performance of the algorithm depends on the input database, we evaluate it on a wide range of real datasets, showing that we can achieve the benefits of data-dependence on both "easy" and "hard" databases.
[ { "version": "v1", "created": "Wed, 1 Oct 2014 15:56:42 GMT" } ]
2014-10-02T00:00:00
[ [ "Li", "Chao", "" ], [ "Hay", "Michael", "" ], [ "Miklau", "Gerome", "" ], [ "Wang", "Yue", "" ] ]
TITLE: A Data- and Workload-Aware Algorithm for Range Queries Under Differential Privacy ABSTRACT: We describe a new algorithm for answering a given set of range queries under $\epsilon$-differential privacy which often achieves substantially lower error than competing methods. Our algorithm satisfies differential privacy by adding noise that is adapted to the input data and to the given query set. We first privately learn a partitioning of the domain into buckets that suit the input data well. Then we privately estimate counts for each bucket, doing so in a manner well-suited for the given query set. Since the performance of the algorithm depends on the input database, we evaluate it on a wide range of real datasets, showing that we can achieve the benefits of data-dependence on both "easy" and "hard" databases.
1402.1389
Yarin Gal
Yarin Gal, Mark van der Wilk, Carl E. Rasmussen
Distributed Variational Inference in Sparse Gaussian Process Regression and Latent Variable Models
9 pages, 8 figures
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gaussian processes (GPs) are a powerful tool for probabilistic inference over functions. They have been applied to both regression and non-linear dimensionality reduction, and offer desirable properties such as uncertainty estimates, robustness to over-fitting, and principled ways for tuning hyper-parameters. However the scalability of these models to big datasets remains an active topic of research. We introduce a novel re-parametrisation of variational inference for sparse GP regression and latent variable models that allows for an efficient distributed algorithm. This is done by exploiting the decoupling of the data given the inducing points to re-formulate the evidence lower bound in a Map-Reduce setting. We show that the inference scales well with data and computational resources, while preserving a balanced distribution of the load among the nodes. We further demonstrate the utility in scaling Gaussian processes to big data. We show that GP performance improves with increasing amounts of data in regression (on flight data with 2 million records) and latent variable modelling (on MNIST). The results show that GPs perform better than many common models often used for big data.
[ { "version": "v1", "created": "Thu, 6 Feb 2014 16:08:40 GMT" }, { "version": "v2", "created": "Mon, 29 Sep 2014 21:16:47 GMT" } ]
2014-10-01T00:00:00
[ [ "Gal", "Yarin", "" ], [ "van der Wilk", "Mark", "" ], [ "Rasmussen", "Carl E.", "" ] ]
TITLE: Distributed Variational Inference in Sparse Gaussian Process Regression and Latent Variable Models ABSTRACT: Gaussian processes (GPs) are a powerful tool for probabilistic inference over functions. They have been applied to both regression and non-linear dimensionality reduction, and offer desirable properties such as uncertainty estimates, robustness to over-fitting, and principled ways for tuning hyper-parameters. However the scalability of these models to big datasets remains an active topic of research. We introduce a novel re-parametrisation of variational inference for sparse GP regression and latent variable models that allows for an efficient distributed algorithm. This is done by exploiting the decoupling of the data given the inducing points to re-formulate the evidence lower bound in a Map-Reduce setting. We show that the inference scales well with data and computational resources, while preserving a balanced distribution of the load among the nodes. We further demonstrate the utility in scaling Gaussian processes to big data. We show that GP performance improves with increasing amounts of data in regression (on flight data with 2 million records) and latent variable modelling (on MNIST). The results show that GPs perform better than many common models often used for big data.
1402.1774
Ali Makhdoumi
Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, Muriel Medard
From the Information Bottleneck to the Privacy Funnel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on the privacy-utility trade-off encountered by users who wish to disclose some information to an analyst, that is correlated with their private data, in the hope of receiving some utility. We rely on a general privacy statistical inference framework, under which data is transformed before it is disclosed, according to a probabilistic privacy mapping. We show that when the log-loss is introduced in this framework in both the privacy metric and the distortion metric, the privacy leakage and the utility constraint can be reduced to the mutual information between private data and disclosed data, and between non-private data and disclosed data respectively. We justify the relevance and generality of the privacy metric under the log-loss by proving that the inference threat under any bounded cost function can be upper-bounded by an explicit function of the mutual information between private data and disclosed data. We then show that the privacy-utility tradeoff under the log-loss can be cast as the non-convex Privacy Funnel optimization, and we leverage its connection to the Information Bottleneck, to provide a greedy algorithm that is locally optimal. We evaluate its performance on the US census dataset.
[ { "version": "v1", "created": "Fri, 7 Feb 2014 21:23:10 GMT" }, { "version": "v2", "created": "Wed, 26 Feb 2014 20:54:18 GMT" }, { "version": "v3", "created": "Thu, 27 Feb 2014 01:38:04 GMT" }, { "version": "v4", "created": "Sun, 11 May 2014 21:27:18 GMT" }, { "version": "v5", "created": "Tue, 30 Sep 2014 03:28:10 GMT" } ]
2014-10-01T00:00:00
[ [ "Makhdoumi", "Ali", "" ], [ "Salamatian", "Salman", "" ], [ "Fawaz", "Nadia", "" ], [ "Medard", "Muriel", "" ] ]
TITLE: From the Information Bottleneck to the Privacy Funnel ABSTRACT: We focus on the privacy-utility trade-off encountered by users who wish to disclose some information to an analyst, that is correlated with their private data, in the hope of receiving some utility. We rely on a general privacy statistical inference framework, under which data is transformed before it is disclosed, according to a probabilistic privacy mapping. We show that when the log-loss is introduced in this framework in both the privacy metric and the distortion metric, the privacy leakage and the utility constraint can be reduced to the mutual information between private data and disclosed data, and between non-private data and disclosed data respectively. We justify the relevance and generality of the privacy metric under the log-loss by proving that the inference threat under any bounded cost function can be upper-bounded by an explicit function of the mutual information between private data and disclosed data. We then show that the privacy-utility tradeoff under the log-loss can be cast as the non-convex Privacy Funnel optimization, and we leverage its connection to the Information Bottleneck, to provide a greedy algorithm that is locally optimal. We evaluate its performance on the US census dataset.
1402.5792
Seyed Mostafa Kia
Seyed Mostafa Kia, Hossein Rahmani, Reza Mortezaei, Mohsen Ebrahimi Moghaddam, Amer Namazi
A Novel Scheme for Intelligent Recognition of Pornographic Images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Harmful contents are rising in internet day by day and this motivates the essence of more research in fast and reliable obscene and immoral material filtering. Pornographic image recognition is an important component in each filtering system. In this paper, a new approach for detecting pornographic images is introduced. In this approach, two new features are suggested. These two features in combination with other simple traditional features provide decent difference between porn and non-porn images. In addition, we applied fuzzy integral based information fusion to combine MLP (Multi-Layer Perceptron) and NF (Neuro-Fuzzy) outputs. To test the proposed method, performance of system was evaluated over 18354 download images from internet. The attained precision was 93% in TP and 8% in FP on training dataset, and 87% and 5.5% on test dataset. Achieved results verify the performance of proposed system versus other related works.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 11:15:04 GMT" }, { "version": "v2", "created": "Wed, 25 Jun 2014 14:04:13 GMT" }, { "version": "v3", "created": "Mon, 29 Sep 2014 22:15:26 GMT" } ]
2014-10-01T00:00:00
[ [ "Kia", "Seyed Mostafa", "" ], [ "Rahmani", "Hossein", "" ], [ "Mortezaei", "Reza", "" ], [ "Moghaddam", "Mohsen Ebrahimi", "" ], [ "Namazi", "Amer", "" ] ]
TITLE: A Novel Scheme for Intelligent Recognition of Pornographic Images ABSTRACT: Harmful contents are rising in internet day by day and this motivates the essence of more research in fast and reliable obscene and immoral material filtering. Pornographic image recognition is an important component in each filtering system. In this paper, a new approach for detecting pornographic images is introduced. In this approach, two new features are suggested. These two features in combination with other simple traditional features provide decent difference between porn and non-porn images. In addition, we applied fuzzy integral based information fusion to combine MLP (Multi-Layer Perceptron) and NF (Neuro-Fuzzy) outputs. To test the proposed method, performance of system was evaluated over 18354 download images from internet. The attained precision was 93% in TP and 8% in FP on training dataset, and 87% and 5.5% on test dataset. Achieved results verify the performance of proposed system versus other related works.
1409.7311
Matthijs van Leeuwen
Matthijs van Leeuwen and Antti Ukkonen
Estimating the pattern frequency spectrum inside the browser
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a browser application for estimating the number of frequent patterns, in particular itemsets, as well as the pattern frequency spectrum. The pattern frequency spectrum is defined as the function that shows for every value of the frequency threshold $\sigma$ the number of patterns that are frequent in a given dataset. Our demo implements a recent algorithm proposed by the authors for finding the spectrum. The demo is 100% JavaScript, and runs in all modern browsers. We observe that modern JavaScript engines can deliver performance that makes it viable to run non-trivial data analysis algorithms in browser applications.
[ { "version": "v1", "created": "Thu, 25 Sep 2014 16:08:14 GMT" }, { "version": "v2", "created": "Tue, 30 Sep 2014 15:22:51 GMT" } ]
2014-10-01T00:00:00
[ [ "van Leeuwen", "Matthijs", "" ], [ "Ukkonen", "Antti", "" ] ]
TITLE: Estimating the pattern frequency spectrum inside the browser ABSTRACT: We present a browser application for estimating the number of frequent patterns, in particular itemsets, as well as the pattern frequency spectrum. The pattern frequency spectrum is defined as the function that shows for every value of the frequency threshold $\sigma$ the number of patterns that are frequent in a given dataset. Our demo implements a recent algorithm proposed by the authors for finding the spectrum. The demo is 100% JavaScript, and runs in all modern browsers. We observe that modern JavaScript engines can deliver performance that makes it viable to run non-trivial data analysis algorithms in browser applications.
1409.8276
Beyza Ermis Ms
Beyza Ermis, A. Taylan Cemgil
A Bayesian Tensor Factorization Model via Variational Inference for Link Prediction
arXiv admin note: substantial text overlap with arXiv:1409.8083
null
null
null
cs.LG cs.NA stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic approaches for tensor factorization aim to extract meaningful structure from incomplete data by postulating low rank constraints. Recently, variational Bayesian (VB) inference techniques have successfully been applied to large scale models. This paper presents full Bayesian inference via VB on both single and coupled tensor factorization models. Our method can be run even for very large models and is easily implemented. It exhibits better prediction performance than existing approaches based on maximum likelihood on several real-world datasets for missing link prediction problem.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 12:29:21 GMT" } ]
2014-10-01T00:00:00
[ [ "Ermis", "Beyza", "" ], [ "Cemgil", "A. Taylan", "" ] ]
TITLE: A Bayesian Tensor Factorization Model via Variational Inference for Link Prediction ABSTRACT: Probabilistic approaches for tensor factorization aim to extract meaningful structure from incomplete data by postulating low rank constraints. Recently, variational Bayesian (VB) inference techniques have successfully been applied to large scale models. This paper presents full Bayesian inference via VB on both single and coupled tensor factorization models. Our method can be run even for very large models and is easily implemented. It exhibits better prediction performance than existing approaches based on maximum likelihood on several real-world datasets for missing link prediction problem.
1402.6926
Peter Foster
Peter Foster, Matthias Mauch and Simon Dixon
Sequential Complexity as a Descriptor for Musical Similarity
13 pages, 9 figures, 8 tables. Accepted version
IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22 no. 12, pp. 1965-1977, 2014
10.1109/TASLP.2014.2357676
null
cs.IR cs.LG cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose string compressibility as a descriptor of temporal structure in audio, for the purpose of determining musical similarity. Our descriptors are based on computing track-wise compression rates of quantised audio features, using multiple temporal resolutions and quantisation granularities. To verify that our descriptors capture musically relevant information, we incorporate our descriptors into similarity rating prediction and song year prediction tasks. We base our evaluation on a dataset of 15500 track excerpts of Western popular music, for which we obtain 7800 web-sourced pairwise similarity ratings. To assess the agreement among similarity ratings, we perform an evaluation under controlled conditions, obtaining a rank correlation of 0.33 between intersected sets of ratings. Combined with bag-of-features descriptors, we obtain performance gains of 31.1% and 10.9% for similarity rating prediction and song year prediction. For both tasks, analysis of selected descriptors reveals that representing features at multiple time scales benefits prediction accuracy.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 14:51:48 GMT" }, { "version": "v2", "created": "Fri, 28 Feb 2014 15:14:37 GMT" }, { "version": "v3", "created": "Sun, 28 Sep 2014 23:33:44 GMT" } ]
2014-09-30T00:00:00
[ [ "Foster", "Peter", "" ], [ "Mauch", "Matthias", "" ], [ "Dixon", "Simon", "" ] ]
TITLE: Sequential Complexity as a Descriptor for Musical Similarity ABSTRACT: We propose string compressibility as a descriptor of temporal structure in audio, for the purpose of determining musical similarity. Our descriptors are based on computing track-wise compression rates of quantised audio features, using multiple temporal resolutions and quantisation granularities. To verify that our descriptors capture musically relevant information, we incorporate our descriptors into similarity rating prediction and song year prediction tasks. We base our evaluation on a dataset of 15500 track excerpts of Western popular music, for which we obtain 7800 web-sourced pairwise similarity ratings. To assess the agreement among similarity ratings, we perform an evaluation under controlled conditions, obtaining a rank correlation of 0.33 between intersected sets of ratings. Combined with bag-of-features descriptors, we obtain performance gains of 31.1% and 10.9% for similarity rating prediction and song year prediction. For both tasks, analysis of selected descriptors reveals that representing features at multiple time scales benefits prediction accuracy.
1409.1458
Martin Jaggi
Martin Jaggi, Virginia Smith, Martin Tak\'a\v{c}, Jonathan Terhorst, Sanjay Krishnan, Thomas Hofmann, Michael I. Jordan
Communication-Efficient Distributed Dual Coordinate Ascent
NIPS 2014 version, including proofs. Published in Advances in Neural Information Processing Systems 27 (NIPS 2014)
null
null
null
cs.LG math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Communication remains the most significant bottleneck in the performance of distributed optimization algorithms for large-scale machine learning. In this paper, we propose a communication-efficient framework, CoCoA, that uses local computation in a primal-dual setting to dramatically reduce the amount of necessary communication. We provide a strong convergence rate analysis for this class of algorithms, as well as experiments on real-world distributed datasets with implementations in Spark. In our experiments, we find that as compared to state-of-the-art mini-batch versions of SGD and SDCA algorithms, CoCoA converges to the same .001-accurate solution quality on average 25x as quickly.
[ { "version": "v1", "created": "Thu, 4 Sep 2014 14:59:35 GMT" }, { "version": "v2", "created": "Mon, 29 Sep 2014 16:07:32 GMT" } ]
2014-09-30T00:00:00
[ [ "Jaggi", "Martin", "" ], [ "Smith", "Virginia", "" ], [ "Takáč", "Martin", "" ], [ "Terhorst", "Jonathan", "" ], [ "Krishnan", "Sanjay", "" ], [ "Hofmann", "Thomas", "" ], [ "Jordan", "Michael I.", "" ] ]
TITLE: Communication-Efficient Distributed Dual Coordinate Ascent ABSTRACT: Communication remains the most significant bottleneck in the performance of distributed optimization algorithms for large-scale machine learning. In this paper, we propose a communication-efficient framework, CoCoA, that uses local computation in a primal-dual setting to dramatically reduce the amount of necessary communication. We provide a strong convergence rate analysis for this class of algorithms, as well as experiments on real-world distributed datasets with implementations in Spark. In our experiments, we find that as compared to state-of-the-art mini-batch versions of SGD and SDCA algorithms, CoCoA converges to the same .001-accurate solution quality on average 25x as quickly.
1409.5443
Vasileios Kolias
Vasilis Kolias, Ioannis Anagnostopoulos, Eleftherios Kayafas
Exploratory Analysis of a Terabyte Scale Web Corpus
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a preliminary analysis over the largest publicly accessible web dataset: the Common Crawl Corpus. We measure nine web characteristics from two levels of granularity using MapReduce and we comment on the initial observations over a fraction of it. To the best of our knowledge two of the characteristics, the language distribution and the HTML version of pages have not been analyzed in previous work, while the specific dataset has been only analyzed on page level.
[ { "version": "v1", "created": "Thu, 18 Sep 2014 20:00:52 GMT" }, { "version": "v2", "created": "Sat, 27 Sep 2014 08:23:24 GMT" } ]
2014-09-30T00:00:00
[ [ "Kolias", "Vasilis", "" ], [ "Anagnostopoulos", "Ioannis", "" ], [ "Kayafas", "Eleftherios", "" ] ]
TITLE: Exploratory Analysis of a Terabyte Scale Web Corpus ABSTRACT: In this paper we present a preliminary analysis over the largest publicly accessible web dataset: the Common Crawl Corpus. We measure nine web characteristics from two levels of granularity using MapReduce and we comment on the initial observations over a fraction of it. To the best of our knowledge two of the characteristics, the language distribution and the HTML version of pages have not been analyzed in previous work, while the specific dataset has been only analyzed on page level.
1409.7963
Arjun Jain
Arjun Jain, Jonathan Tompson, Yann LeCun and Christoph Bregler
MoDeep: A Deep Learning Framework Using Motion Features for Human Pose Estimation
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose a novel and efficient method for articulated human pose estimation in videos using a convolutional network architecture, which incorporates both color and motion features. We propose a new human body pose dataset, FLIC-motion, that extends the FLIC dataset with additional motion features. We apply our architecture to this dataset and report significantly better performance than current state-of-the-art pose detection systems.
[ { "version": "v1", "created": "Sun, 28 Sep 2014 21:32:15 GMT" } ]
2014-09-30T00:00:00
[ [ "Jain", "Arjun", "" ], [ "Tompson", "Jonathan", "" ], [ "LeCun", "Yann", "" ], [ "Bregler", "Christoph", "" ] ]
TITLE: MoDeep: A Deep Learning Framework Using Motion Features for Human Pose Estimation ABSTRACT: In this work, we propose a novel and efficient method for articulated human pose estimation in videos using a convolutional network architecture, which incorporates both color and motion features. We propose a new human body pose dataset, FLIC-motion, that extends the FLIC dataset with additional motion features. We apply our architecture to this dataset and report significantly better performance than current state-of-the-art pose detection systems.
1409.8028
Christoph Fuchs
Daniel Raumer, Christoph Fuchs, Georg Groh
Reaching Consensus Among Mobile Agents: A Distributed Protocol for the Detection of Social Situations
16 pages, 4 figures, 1 table
null
null
null
cs.SI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Physical social encounters are governed by a set of socio-psychological behavioral rules with a high degree of uniform validity. Past research has shown how these rules or the resulting properties of the encounters (e.g. the geometry of interaction) can be used for algorithmic detection of social interaction. In this paper, we present a distributed protocol to gain a common understanding of the existing social situations among agents. Our approach allows a group of agents to combine their subjective assessment of an ongoing social situation. Based on perceived social cues obtained from raw data signals, they reach a consensus about the existence, parameters, and participants of a social situation. We evaluate our protocol using two real-world datasets with social interaction information and additional synthetic data generated by our social-aware mobility model.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 08:45:51 GMT" } ]
2014-09-30T00:00:00
[ [ "Raumer", "Daniel", "" ], [ "Fuchs", "Christoph", "" ], [ "Groh", "Georg", "" ] ]
TITLE: Reaching Consensus Among Mobile Agents: A Distributed Protocol for the Detection of Social Situations ABSTRACT: Physical social encounters are governed by a set of socio-psychological behavioral rules with a high degree of uniform validity. Past research has shown how these rules or the resulting properties of the encounters (e.g. the geometry of interaction) can be used for algorithmic detection of social interaction. In this paper, we present a distributed protocol to gain a common understanding of the existing social situations among agents. Our approach allows a group of agents to combine their subjective assessment of an ongoing social situation. Based on perceived social cues obtained from raw data signals, they reach a consensus about the existence, parameters, and participants of a social situation. We evaluate our protocol using two real-world datasets with social interaction information and additional synthetic data generated by our social-aware mobility model.
1409.8152
Yelena Mejova
Yelena Mejova, Amy X. Zhang, Nicholas Diakopoulos, Carlos Castillo
Controversy and Sentiment in Online News
Computation+Journalism Symposium 2014
null
null
null
cs.CY cs.CL
http://creativecommons.org/licenses/by/3.0/
How do news sources tackle controversial issues? In this work, we take a data-driven approach to understand how controversy interplays with emotional expression and biased language in the news. We begin by introducing a new dataset of controversial and non-controversial terms collected using crowdsourcing. Then, focusing on 15 major U.S. news outlets, we compare millions of articles discussing controversial and non-controversial issues over a span of 7 months. We find that in general, when it comes to controversial issues, the use of negative affect and biased language is prevalent, while the use of strong emotion is tempered. We also observe many differences across news sources. Using these findings, we show that we can indicate to what extent an issue is controversial, by comparing it with other issues in terms of how they are portrayed across different media.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 15:23:50 GMT" } ]
2014-09-30T00:00:00
[ [ "Mejova", "Yelena", "" ], [ "Zhang", "Amy X.", "" ], [ "Diakopoulos", "Nicholas", "" ], [ "Castillo", "Carlos", "" ] ]
TITLE: Controversy and Sentiment in Online News ABSTRACT: How do news sources tackle controversial issues? In this work, we take a data-driven approach to understand how controversy interplays with emotional expression and biased language in the news. We begin by introducing a new dataset of controversial and non-controversial terms collected using crowdsourcing. Then, focusing on 15 major U.S. news outlets, we compare millions of articles discussing controversial and non-controversial issues over a span of 7 months. We find that in general, when it comes to controversial issues, the use of negative affect and biased language is prevalent, while the use of strong emotion is tempered. We also observe many differences across news sources. Using these findings, we show that we can indicate to what extent an issue is controversial, by comparing it with other issues in terms of how they are portrayed across different media.
1409.8191
Djallel Bouneffouf
Robin Allesiardo, Raphael Feraud and Djallel Bouneffouf
A Neural Networks Committee for the Contextual Bandit Problem
21st International Conference on Neural Information Processing
null
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new contextual bandit algorithm, NeuralBandit, which does not need hypothesis on stationarity of contexts and rewards. Several neural networks are trained to modelize the value of rewards knowing the context. Two variants, based on multi-experts approach, are proposed to choose online the parameters of multi-layer perceptrons. The proposed algorithms are successfully tested on a large dataset with and without stationarity of rewards.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 17:08:21 GMT" } ]
2014-09-30T00:00:00
[ [ "Allesiardo", "Robin", "" ], [ "Feraud", "Raphael", "" ], [ "Bouneffouf", "Djallel", "" ] ]
TITLE: A Neural Networks Committee for the Contextual Bandit Problem ABSTRACT: This paper presents a new contextual bandit algorithm, NeuralBandit, which does not need hypothesis on stationarity of contexts and rewards. Several neural networks are trained to modelize the value of rewards knowing the context. Two variants, based on multi-experts approach, are proposed to choose online the parameters of multi-layer perceptrons. The proposed algorithms are successfully tested on a large dataset with and without stationarity of rewards.
1409.8202
Matteo De Felice
Matteo De Felice, Marcello Petitta, Paolo M. Ruti
Short-Term Predictability of Photovoltaic Production over Italy
Submitted to Renewable Energy
null
null
null
cs.LG stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Photovoltaic (PV) power production increased drastically in Europe throughout the last years. About the 6% of electricity in Italy comes from PV and for an efficient management of the power grid an accurate and reliable forecasting of production would be needed. Starting from a dataset of electricity production of 65 Italian solar plants for the years 2011-2012 we investigate the possibility to forecast daily production from one to ten days of lead time without using on site measurements. Our study is divided in two parts: an assessment of the predictability of meteorological variables using weather forecasts and an analysis on the application of data-driven modelling in predicting solar power production. We calibrate a SVM model using available observations and then we force the same model with the predicted variables from weather forecasts with a lead time from one to ten days. As expected, solar power production is strongly influenced by cloudiness and clear sky, in fact we observe that while during summer we obtain a general error under the 10% (slightly lower in south Italy), during winter the error is abundantly above the 20%.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 17:24:29 GMT" } ]
2014-09-30T00:00:00
[ [ "De Felice", "Matteo", "" ], [ "Petitta", "Marcello", "" ], [ "Ruti", "Paolo M.", "" ] ]
TITLE: Short-Term Predictability of Photovoltaic Production over Italy ABSTRACT: Photovoltaic (PV) power production increased drastically in Europe throughout the last years. About the 6% of electricity in Italy comes from PV and for an efficient management of the power grid an accurate and reliable forecasting of production would be needed. Starting from a dataset of electricity production of 65 Italian solar plants for the years 2011-2012 we investigate the possibility to forecast daily production from one to ten days of lead time without using on site measurements. Our study is divided in two parts: an assessment of the predictability of meteorological variables using weather forecasts and an analysis on the application of data-driven modelling in predicting solar power production. We calibrate a SVM model using available observations and then we force the same model with the predicted variables from weather forecasts with a lead time from one to ten days. As expected, solar power production is strongly influenced by cloudiness and clear sky, in fact we observe that while during summer we obtain a general error under the 10% (slightly lower in south Italy), during winter the error is abundantly above the 20%.
1405.5737
Arif Mahmood
Arif Mahmood and Ajmal S. Mian
Semi-supervised Spectral Clustering for Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a Classification Via Clustering (CVC) algorithm which enables existing clustering methods to be efficiently employed in classification problems. In CVC, training and test data are co-clustered and class-cluster distributions are used to find the label of the test data. To determine an efficient number of clusters, a Semi-supervised Hierarchical Clustering (SHC) algorithm is proposed. Clusters are obtained by hierarchically applying two-way NCut by using signs of the Fiedler vector of the normalized graph Laplacian. To this end, a Direct Fiedler Vector Computation algorithm is proposed. The graph cut is based on the data structure and does not consider labels. Labels are used only to define the stopping criterion for graph cut. We propose clustering to be performed on the Grassmannian manifolds facilitating the formation of spectral ensembles. The proposed algorithm outperformed state-of-the-art image-set classification algorithms on five standard datasets.
[ { "version": "v1", "created": "Thu, 22 May 2014 13:05:27 GMT" }, { "version": "v2", "created": "Fri, 26 Sep 2014 04:01:41 GMT" } ]
2014-09-29T00:00:00
[ [ "Mahmood", "Arif", "" ], [ "Mian", "Ajmal S.", "" ] ]
TITLE: Semi-supervised Spectral Clustering for Classification ABSTRACT: We propose a Classification Via Clustering (CVC) algorithm which enables existing clustering methods to be efficiently employed in classification problems. In CVC, training and test data are co-clustered and class-cluster distributions are used to find the label of the test data. To determine an efficient number of clusters, a Semi-supervised Hierarchical Clustering (SHC) algorithm is proposed. Clusters are obtained by hierarchically applying two-way NCut by using signs of the Fiedler vector of the normalized graph Laplacian. To this end, a Direct Fiedler Vector Computation algorithm is proposed. The graph cut is based on the data structure and does not consider labels. Labels are used only to define the stopping criterion for graph cut. We propose clustering to be performed on the Grassmannian manifolds facilitating the formation of spectral ensembles. The proposed algorithm outperformed state-of-the-art image-set classification algorithms on five standard datasets.
1409.7458
Jiantao Jiao
Jiantao Jiao, Kartik Venkat, Yanjun Han, Tsachy Weissman
Beyond Maximum Likelihood: from Theory to Practice
null
null
null
null
stat.ME cs.DS cs.IT math.IT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximum likelihood is the most widely used statistical estimation technique. Recent work by the authors introduced a general methodology for the construction of estimators for functionals in parametric models, and demonstrated improvements - both in theory and in practice - over the maximum likelihood estimator (MLE), particularly in high dimensional scenarios involving parameter dimension comparable to or larger than the number of samples. This approach to estimation, building on results from approximation theory, is shown to yield minimax rate-optimal estimators for a wide class of functionals, implementable with modest computational requirements. In a nutshell, a message of this recent work is that, for a wide class of functionals, the performance of these essentially optimal estimators with $n$ samples is comparable to that of the MLE with $n \ln n$ samples. In the present paper, we highlight the applicability of the aforementioned methodology to statistical problems beyond functional estimation, and show that it can yield substantial gains. For example, we demonstrate that for learning tree-structured graphical models, our approach achieves a significant reduction of the required data size compared with the classical Chow--Liu algorithm, which is an implementation of the MLE, to achieve the same accuracy. The key step in improving the Chow--Liu algorithm is to replace the empirical mutual information with the estimator for mutual information proposed by the authors. Further, applying the same replacement approach to classical Bayesian network classification, the resulting classifiers uniformly outperform the previous classifiers on 26 widely used datasets.
[ { "version": "v1", "created": "Fri, 26 Sep 2014 01:45:34 GMT" } ]
2014-09-29T00:00:00
[ [ "Jiao", "Jiantao", "" ], [ "Venkat", "Kartik", "" ], [ "Han", "Yanjun", "" ], [ "Weissman", "Tsachy", "" ] ]
TITLE: Beyond Maximum Likelihood: from Theory to Practice ABSTRACT: Maximum likelihood is the most widely used statistical estimation technique. Recent work by the authors introduced a general methodology for the construction of estimators for functionals in parametric models, and demonstrated improvements - both in theory and in practice - over the maximum likelihood estimator (MLE), particularly in high dimensional scenarios involving parameter dimension comparable to or larger than the number of samples. This approach to estimation, building on results from approximation theory, is shown to yield minimax rate-optimal estimators for a wide class of functionals, implementable with modest computational requirements. In a nutshell, a message of this recent work is that, for a wide class of functionals, the performance of these essentially optimal estimators with $n$ samples is comparable to that of the MLE with $n \ln n$ samples. In the present paper, we highlight the applicability of the aforementioned methodology to statistical problems beyond functional estimation, and show that it can yield substantial gains. For example, we demonstrate that for learning tree-structured graphical models, our approach achieves a significant reduction of the required data size compared with the classical Chow--Liu algorithm, which is an implementation of the MLE, to achieve the same accuracy. The key step in improving the Chow--Liu algorithm is to replace the empirical mutual information with the estimator for mutual information proposed by the authors. Further, applying the same replacement approach to classical Bayesian network classification, the resulting classifiers uniformly outperform the previous classifiers on 26 widely used datasets.
1409.7615
Jan Dreier
Jan Dreier
Overlapping Communities in Complex Networks
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Communities are subsets of a network that are densely connected inside and share only few connections to the rest of the network. The aim of this research is the development and evaluation of an efficient algorithm for detection of overlapping, fuzzy communities. The algorithm gets as input some members of each community that we aim to discover. We call these members seed nodes. The algorithm then propagates this information by using random walks that start at non-seed nodes and end as they reach a seed node. The probability that a random walk starting at a non-seed node $v$ ends at a seed node $s$ is then equated with the probability that $v$ belongs to the communities of $s$. The algorithm runs in time $\tilde{O}(l \cdot m \cdot \log n)$, where $l$ is the number of communities to detect, $m$ is the number of edges, $n$ is the number of nodes. The $\tilde{O}$-notation hides a factor of at most $(\log \log n)^2$. The LFR benchmark proposed by Lancichinetti et al.\ is used to evaluate the performance of the algorithm. We found that, given a good set of seed nodes, it is able to reconstruct the communities of a network in a meaningful manner.
[ { "version": "v1", "created": "Fri, 26 Sep 2014 16:14:15 GMT" } ]
2014-09-29T00:00:00
[ [ "Dreier", "Jan", "" ] ]
TITLE: Overlapping Communities in Complex Networks ABSTRACT: Communities are subsets of a network that are densely connected inside and share only few connections to the rest of the network. The aim of this research is the development and evaluation of an efficient algorithm for detection of overlapping, fuzzy communities. The algorithm gets as input some members of each community that we aim to discover. We call these members seed nodes. The algorithm then propagates this information by using random walks that start at non-seed nodes and end as they reach a seed node. The probability that a random walk starting at a non-seed node $v$ ends at a seed node $s$ is then equated with the probability that $v$ belongs to the communities of $s$. The algorithm runs in time $\tilde{O}(l \cdot m \cdot \log n)$, where $l$ is the number of communities to detect, $m$ is the number of edges, $n$ is the number of nodes. The $\tilde{O}$-notation hides a factor of at most $(\log \log n)^2$. The LFR benchmark proposed by Lancichinetti et al.\ is used to evaluate the performance of the algorithm. We found that, given a good set of seed nodes, it is able to reconstruct the communities of a network in a meaningful manner.
1409.6805
Siting Ren
Siting Ren, Sheng Gao
Improving Cross-domain Recommendation through Probabilistic Cluster-level Latent Factor Model--Extended Version
null
null
null
null
cs.IR cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cross-domain recommendation has been proposed to transfer user behavior pattern by pooling together the rating data from multiple domains to alleviate the sparsity problem appearing in single rating domains. However, previous models only assume that multiple domains share a latent common rating pattern based on the user-item co-clustering. To capture diversities among different domains, we propose a novel Probabilistic Cluster-level Latent Factor (PCLF) model to improve the cross-domain recommendation performance. Experiments on several real world datasets demonstrate that our proposed model outperforms the state-of-the-art methods for the cross-domain recommendation task.
[ { "version": "v1", "created": "Wed, 24 Sep 2014 02:55:31 GMT" } ]
2014-09-26T00:00:00
[ [ "Ren", "Siting", "" ], [ "Gao", "Sheng", "" ] ]
TITLE: Improving Cross-domain Recommendation through Probabilistic Cluster-level Latent Factor Model--Extended Version ABSTRACT: Cross-domain recommendation has been proposed to transfer user behavior pattern by pooling together the rating data from multiple domains to alleviate the sparsity problem appearing in single rating domains. However, previous models only assume that multiple domains share a latent common rating pattern based on the user-item co-clustering. To capture diversities among different domains, we propose a novel Probabilistic Cluster-level Latent Factor (PCLF) model to improve the cross-domain recommendation performance. Experiments on several real world datasets demonstrate that our proposed model outperforms the state-of-the-art methods for the cross-domain recommendation task.
1409.7164
Xiang Bai
Zhuotun Zhu, Xinggang Wang, Song Bai, Cong Yao, Xiang Bai
Deep Learning Representation using Autoencoder for 3D Shape Retrieval
6 pages, 7 figures, 2014ICSPAC
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of how to build a deep learning representation for 3D shape. Deep learning has shown to be very effective in variety of visual applications, such as image classification and object detection. However, it has not been successfully applied to 3D shape recognition. This is because 3D shape has complex structure in 3D space and there are limited number of 3D shapes for feature learning. To address these problems, we project 3D shapes into 2D space and use autoencoder for feature learning on the 2D images. High accuracy 3D shape retrieval performance is obtained by aggregating the features learned on 2D images. In addition, we show the proposed deep learning feature is complementary to conventional local image descriptors. By combing the global deep learning representation and the local descriptor representation, our method can obtain the state-of-the-art performance on 3D shape retrieval benchmarks.
[ { "version": "v1", "created": "Thu, 25 Sep 2014 06:27:28 GMT" } ]
2014-09-26T00:00:00
[ [ "Zhu", "Zhuotun", "" ], [ "Wang", "Xinggang", "" ], [ "Bai", "Song", "" ], [ "Yao", "Cong", "" ], [ "Bai", "Xiang", "" ] ]
TITLE: Deep Learning Representation using Autoencoder for 3D Shape Retrieval ABSTRACT: We study the problem of how to build a deep learning representation for 3D shape. Deep learning has shown to be very effective in variety of visual applications, such as image classification and object detection. However, it has not been successfully applied to 3D shape recognition. This is because 3D shape has complex structure in 3D space and there are limited number of 3D shapes for feature learning. To address these problems, we project 3D shapes into 2D space and use autoencoder for feature learning on the 2D images. High accuracy 3D shape retrieval performance is obtained by aggregating the features learned on 2D images. In addition, we show the proposed deep learning feature is complementary to conventional local image descriptors. By combing the global deep learning representation and the local descriptor representation, our method can obtain the state-of-the-art performance on 3D shape retrieval benchmarks.
1409.7307
YuGei Gan
Yufei Gan, Tong Zhuo, Chu He
Image Classification with A Deep Network Model based on Compressive Sensing
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To simplify the parameter of the deep learning network, a cascaded compressive sensing model "CSNet" is implemented for image classification. Firstly, we use cascaded compressive sensing network to learn feature from the data. Secondly, CSNet generates the feature by binary hashing and block-wise histograms. Finally, a linear SVM classifier is used to classify these features. The experiments on the MNIST dataset indicate that higher classification accuracy can be obtained by this algorithm.
[ { "version": "v1", "created": "Thu, 25 Sep 2014 15:52:05 GMT" } ]
2014-09-26T00:00:00
[ [ "Gan", "Yufei", "" ], [ "Zhuo", "Tong", "" ], [ "He", "Chu", "" ] ]
TITLE: Image Classification with A Deep Network Model based on Compressive Sensing ABSTRACT: To simplify the parameter of the deep learning network, a cascaded compressive sensing model "CSNet" is implemented for image classification. Firstly, we use cascaded compressive sensing network to learn feature from the data. Secondly, CSNet generates the feature by binary hashing and block-wise histograms. Finally, a linear SVM classifier is used to classify these features. The experiments on the MNIST dataset indicate that higher classification accuracy can be obtained by this algorithm.
1409.7313
YuGei Gan
Yufei Gan, Teng Yang, Chu He
A Deep Graph Embedding Network Model for Face Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new deep learning network "GENet", it combines the multi-layer network architec- ture and graph embedding framework. Firstly, we use simplest unsupervised learning PCA/LDA as first layer to generate the low- level feature. Secondly, many cascaded dimensionality reduction layers based on graph embedding framework are applied to GENet. Finally, a linear SVM classifier is used to classify dimension-reduced features. The experiments indicate that higher classification accuracy can be obtained by this algorithm on the CMU-PIE, ORL, Extended Yale B dataset.
[ { "version": "v1", "created": "Thu, 25 Sep 2014 16:14:18 GMT" } ]
2014-09-26T00:00:00
[ [ "Gan", "Yufei", "" ], [ "Yang", "Teng", "" ], [ "He", "Chu", "" ] ]
TITLE: A Deep Graph Embedding Network Model for Face Recognition ABSTRACT: In this paper, we propose a new deep learning network "GENet", it combines the multi-layer network architec- ture and graph embedding framework. Firstly, we use simplest unsupervised learning PCA/LDA as first layer to generate the low- level feature. Secondly, many cascaded dimensionality reduction layers based on graph embedding framework are applied to GENet. Finally, a linear SVM classifier is used to classify dimension-reduced features. The experiments indicate that higher classification accuracy can be obtained by this algorithm on the CMU-PIE, ORL, Extended Yale B dataset.
1307.7220
Anmer Daskin
Anmer Daskin, Ananth Grama, Sabre Kais
Multiple Network Alignment on Quantum Computers
null
null
10.1007/s11128-014-0818-7
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Comparative analyses of graph structured datasets underly diverse problems. Examples of these problems include identification of conserved functional components (biochemical interactions) across species, structural similarity of large biomolecules, and recurring patterns of interactions in social networks. A large class of such analyses methods quantify the topological similarity of nodes across networks. The resulting correspondence of nodes across networks, also called node alignment, can be used to identify invariant subgraphs across the input graphs. Given $k$ graphs as input, alignment algorithms use topological information to assign a similarity score to each $k$-tuple of nodes, with elements (nodes) drawn from each of the input graphs. Nodes are considered similar if their neighbors are also similar. An alternate, equivalent view of these network alignment algorithms is to consider the Kronecker product of the input graphs, and to identify high-ranked nodes in the Kronecker product graph. Conventional methods such as PageRank and HITS (Hypertext Induced Topic Selection) can be used for this purpose. These methods typically require computation of the principal eigenvector of a suitably modified Kronecker product matrix of the input graphs. We adopt this alternate view of the problem to address the problem of multiple network alignment. Using the phase estimation algorithm, we show that the multiple network alignment problem can be efficiently solved on quantum computers. We characterize the accuracy and performance of our method, and show that it can deliver exponential speedups over conventional (non-quantum) methods.
[ { "version": "v1", "created": "Sat, 27 Jul 2013 06:37:49 GMT" }, { "version": "v2", "created": "Tue, 26 Aug 2014 14:00:59 GMT" } ]
2014-09-25T00:00:00
[ [ "Daskin", "Anmer", "" ], [ "Grama", "Ananth", "" ], [ "Kais", "Sabre", "" ] ]
TITLE: Multiple Network Alignment on Quantum Computers ABSTRACT: Comparative analyses of graph structured datasets underly diverse problems. Examples of these problems include identification of conserved functional components (biochemical interactions) across species, structural similarity of large biomolecules, and recurring patterns of interactions in social networks. A large class of such analyses methods quantify the topological similarity of nodes across networks. The resulting correspondence of nodes across networks, also called node alignment, can be used to identify invariant subgraphs across the input graphs. Given $k$ graphs as input, alignment algorithms use topological information to assign a similarity score to each $k$-tuple of nodes, with elements (nodes) drawn from each of the input graphs. Nodes are considered similar if their neighbors are also similar. An alternate, equivalent view of these network alignment algorithms is to consider the Kronecker product of the input graphs, and to identify high-ranked nodes in the Kronecker product graph. Conventional methods such as PageRank and HITS (Hypertext Induced Topic Selection) can be used for this purpose. These methods typically require computation of the principal eigenvector of a suitably modified Kronecker product matrix of the input graphs. We adopt this alternate view of the problem to address the problem of multiple network alignment. Using the phase estimation algorithm, we show that the multiple network alignment problem can be efficiently solved on quantum computers. We characterize the accuracy and performance of our method, and show that it can deliver exponential speedups over conventional (non-quantum) methods.
1406.5052
Uldis Boj\=ars
Uldis Boj\=ars and Ren\=ars Liepi\c{n}\v{s}
The State of Open Data in Latvia: 2014
keywords: Open Data, Open Government Data, PSI, Latvia
Baltic J. Modern Computing, Vol. 2 (2014), No. 3, 160-170
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines the state of Open Data in Latvia at the middle of 2014. The study is divided into two parts: (i) a survey of open data situation and (ii) an overview of available open data sets. The first part examines the general open data climate in Latvia according to the guidelines of the OKFN Open Data Index making the results comparable to those of other participants of this index. The second part examines datasets made available on the Latvia Open Data community catalogue, the only open data catalogue available in Latvia at the moment. We conclude that Latvia public sector open data mostly fulfil the basic criteria (e.g., data is available) of the Open Data Index but fail on more advanced criteria: the majority of data considered in the study are not published in machine-readable form, are not available for bulk download and none of the data sources have open license statements.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 14:08:03 GMT" }, { "version": "v2", "created": "Wed, 24 Sep 2014 10:52:45 GMT" } ]
2014-09-25T00:00:00
[ [ "Bojārs", "Uldis", "" ], [ "Liepiņš", "Renārs", "" ] ]
TITLE: The State of Open Data in Latvia: 2014 ABSTRACT: This paper examines the state of Open Data in Latvia at the middle of 2014. The study is divided into two parts: (i) a survey of open data situation and (ii) an overview of available open data sets. The first part examines the general open data climate in Latvia according to the guidelines of the OKFN Open Data Index making the results comparable to those of other participants of this index. The second part examines datasets made available on the Latvia Open Data community catalogue, the only open data catalogue available in Latvia at the moment. We conclude that Latvia public sector open data mostly fulfil the basic criteria (e.g., data is available) of the Open Data Index but fail on more advanced criteria: the majority of data considered in the study are not published in machine-readable form, are not available for bulk download and none of the data sources have open license statements.
1405.2362
Yan Fang
Yan Fang, Matthew J. Cotter, Donald M. Chiarulli, Steven P. Levitan
Image Segmentation Using Frequency Locking of Coupled Oscillators
7 pages, 14 figures, the 51th Design Automation Conference 2014, Work in Progress Poster Session
null
10.1109/CNNA.2014.6888657
null
cs.CV q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synchronization of coupled oscillators is observed at multiple levels of neural systems, and has been shown to play an important function in visual perception. We propose a computing system based on locally coupled oscillator networks for image segmentation. The system can serve as the preprocessing front-end of an image processing pipeline where the common frequencies of clusters of oscillators reflect the segmentation results. To demonstrate the feasibility of our design, the system is simulated and tested on a human face image dataset and its performance is compared with traditional intensity threshold based algorithms. Our system shows both better performance and higher noise tolerance than traditional methods.
[ { "version": "v1", "created": "Fri, 9 May 2014 21:53:05 GMT" } ]
2014-09-24T00:00:00
[ [ "Fang", "Yan", "" ], [ "Cotter", "Matthew J.", "" ], [ "Chiarulli", "Donald M.", "" ], [ "Levitan", "Steven P.", "" ] ]
TITLE: Image Segmentation Using Frequency Locking of Coupled Oscillators ABSTRACT: Synchronization of coupled oscillators is observed at multiple levels of neural systems, and has been shown to play an important function in visual perception. We propose a computing system based on locally coupled oscillator networks for image segmentation. The system can serve as the preprocessing front-end of an image processing pipeline where the common frequencies of clusters of oscillators reflect the segmentation results. To demonstrate the feasibility of our design, the system is simulated and tested on a human face image dataset and its performance is compared with traditional intensity threshold based algorithms. Our system shows both better performance and higher noise tolerance than traditional methods.
1408.2003
Bo Han
Bo Han, Bo He, Rui Nian, Mengmeng Ma, Shujing Zhang, Minghui Li and Amaury Lendasse
LARSEN-ELM: Selective Ensemble of Extreme Learning Machines using LARS for Blended Data
Accepted for publication in Neurocomputing, 01/19/2014
Neurocomputing, 2014, Elsevier. Manuscript ID: NEUCOM-D-13-01029
10.1016/j.neucom.2014.01.069
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extreme learning machine (ELM) as a neural network algorithm has shown its good performance, such as fast speed, simple structure etc, but also, weak robustness is an unavoidable defect in original ELM for blended data. We present a new machine learning framework called LARSEN-ELM for overcoming this problem. In our paper, we would like to show two key steps in LARSEN-ELM. In the first step, preprocessing, we select the input variables highly related to the output using least angle regression (LARS). In the second step, training, we employ Genetic Algorithm (GA) based selective ensemble and original ELM. In the experiments, we apply a sum of two sines and four datasets from UCI repository to verify the robustness of our approach. The experimental results show that compared with original ELM and other methods such as OP-ELM, GASEN-ELM and LSBoost, LARSEN-ELM significantly improve robustness performance while keeping a relatively high speed.
[ { "version": "v1", "created": "Sat, 9 Aug 2014 01:31:02 GMT" }, { "version": "v2", "created": "Wed, 27 Aug 2014 02:54:54 GMT" } ]
2014-09-24T00:00:00
[ [ "Han", "Bo", "" ], [ "He", "Bo", "" ], [ "Nian", "Rui", "" ], [ "Ma", "Mengmeng", "" ], [ "Zhang", "Shujing", "" ], [ "Li", "Minghui", "" ], [ "Lendasse", "Amaury", "" ] ]
TITLE: LARSEN-ELM: Selective Ensemble of Extreme Learning Machines using LARS for Blended Data ABSTRACT: Extreme learning machine (ELM) as a neural network algorithm has shown its good performance, such as fast speed, simple structure etc, but also, weak robustness is an unavoidable defect in original ELM for blended data. We present a new machine learning framework called LARSEN-ELM for overcoming this problem. In our paper, we would like to show two key steps in LARSEN-ELM. In the first step, preprocessing, we select the input variables highly related to the output using least angle regression (LARS). In the second step, training, we employ Genetic Algorithm (GA) based selective ensemble and original ELM. In the experiments, we apply a sum of two sines and four datasets from UCI repository to verify the robustness of our approach. The experimental results show that compared with original ELM and other methods such as OP-ELM, GASEN-ELM and LSBoost, LARSEN-ELM significantly improve robustness performance while keeping a relatively high speed.
1408.2004
Bo Han
Bo Han, Bo He, Mengmeng Ma, Tingting Sun, Tianhong Yan, Amaury Lendasse
RMSE-ELM: Recursive Model based Selective Ensemble of Extreme Learning Machines for Robustness Improvement
Accepted for publication in Mathematical Problems in Engineering, 09/22/2014
null
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extreme learning machine (ELM) as an emerging branch of shallow networks has shown its excellent generalization and fast learning speed. However, for blended data, the robustness of ELM is weak because its weights and biases of hidden nodes are set randomly. Moreover, the noisy data exert a negative effect. To solve this problem, a new framework called RMSE-ELM is proposed in this paper. It is a two-layer recursive model. In the first layer, the framework trains lots of ELMs in different groups concurrently, then employs selective ensemble to pick out an optimal set of ELMs in each group, which can be merged into a large group of ELMs called candidate pool. In the second layer, selective ensemble is recursively used on candidate pool to acquire the final ensemble. In the experiments, we apply UCI blended datasets to confirm the robustness of our new approach in two key aspects (mean square error and standard deviation). The space complexity of our method is increased to some degree, but the results have shown that RMSE-ELM significantly improves robustness with slightly computational time compared with representative methods (ELM, OP-ELM, GASEN-ELM, GASEN-BP and E-GASEN). It becomes a potential framework to solve robustness issue of ELM for high-dimensional blended data in the future.
[ { "version": "v1", "created": "Sat, 9 Aug 2014 01:36:03 GMT" }, { "version": "v2", "created": "Wed, 27 Aug 2014 02:35:11 GMT" }, { "version": "v3", "created": "Tue, 23 Sep 2014 07:48:35 GMT" } ]
2014-09-24T00:00:00
[ [ "Han", "Bo", "" ], [ "He", "Bo", "" ], [ "Ma", "Mengmeng", "" ], [ "Sun", "Tingting", "" ], [ "Yan", "Tianhong", "" ], [ "Lendasse", "Amaury", "" ] ]
TITLE: RMSE-ELM: Recursive Model based Selective Ensemble of Extreme Learning Machines for Robustness Improvement ABSTRACT: Extreme learning machine (ELM) as an emerging branch of shallow networks has shown its excellent generalization and fast learning speed. However, for blended data, the robustness of ELM is weak because its weights and biases of hidden nodes are set randomly. Moreover, the noisy data exert a negative effect. To solve this problem, a new framework called RMSE-ELM is proposed in this paper. It is a two-layer recursive model. In the first layer, the framework trains lots of ELMs in different groups concurrently, then employs selective ensemble to pick out an optimal set of ELMs in each group, which can be merged into a large group of ELMs called candidate pool. In the second layer, selective ensemble is recursively used on candidate pool to acquire the final ensemble. In the experiments, we apply UCI blended datasets to confirm the robustness of our new approach in two key aspects (mean square error and standard deviation). The space complexity of our method is increased to some degree, but the results have shown that RMSE-ELM significantly improves robustness with slightly computational time compared with representative methods (ELM, OP-ELM, GASEN-ELM, GASEN-BP and E-GASEN). It becomes a potential framework to solve robustness issue of ELM for high-dimensional blended data in the future.
1407.1610
Pulkit Agrawal
Pulkit Agrawal, Ross Girshick, Jitendra Malik
Analyzing the Performance of Multilayer Neural Networks for Object Recognition
Published in European Conference on Computer Vision 2014 (ECCV-2014)
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last two years, convolutional neural networks (CNNs) have achieved an impressive suite of results on standard recognition datasets and tasks. CNN-based features seem poised to quickly replace engineered representations, such as SIFT and HOG. However, compared to SIFT and HOG, we understand much less about the nature of the features learned by large CNNs. In this paper, we experimentally probe several aspects of CNN feature learning in an attempt to help practitioners gain useful, evidence-backed intuitions about how to apply CNNs to computer vision problems.
[ { "version": "v1", "created": "Mon, 7 Jul 2014 08:00:57 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2014 17:49:01 GMT" } ]
2014-09-23T00:00:00
[ [ "Agrawal", "Pulkit", "" ], [ "Girshick", "Ross", "" ], [ "Malik", "Jitendra", "" ] ]
TITLE: Analyzing the Performance of Multilayer Neural Networks for Object Recognition ABSTRACT: In the last two years, convolutional neural networks (CNNs) have achieved an impressive suite of results on standard recognition datasets and tasks. CNN-based features seem poised to quickly replace engineered representations, such as SIFT and HOG. However, compared to SIFT and HOG, we understand much less about the nature of the features learned by large CNNs. In this paper, we experimentally probe several aspects of CNN feature learning in an attempt to help practitioners gain useful, evidence-backed intuitions about how to apply CNNs to computer vision problems.
1408.3809
Hossein Rahmani
Hossein Rahmani, Arif Mahmood, Du Q. Huynh, Ajmal Mian
HOPC: Histogram of Oriented Principal Components of 3D Pointclouds for Action Recognition
ECCV 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing techniques for 3D action recognition are sensitive to viewpoint variations because they extract features from depth images which change significantly with viewpoint. In contrast, we directly process the pointclouds and propose a new technique for action recognition which is more robust to noise, action speed and viewpoint variations. Our technique consists of a novel descriptor and keypoint detection algorithm. The proposed descriptor is extracted at a point by encoding the Histogram of Oriented Principal Components (HOPC) within an adaptive spatio-temporal support volume around that point. Based on this descriptor, we present a novel method to detect Spatio-Temporal Key-Points (STKPs) in 3D pointcloud sequences. Experimental results show that the proposed descriptor and STKP detector outperform state-of-the-art algorithms on three benchmark human activity datasets. We also introduce a new multiview public dataset and show the robustness of our proposed method to viewpoint variations.
[ { "version": "v1", "created": "Sun, 17 Aug 2014 10:34:47 GMT" }, { "version": "v2", "created": "Mon, 1 Sep 2014 02:49:32 GMT" }, { "version": "v3", "created": "Tue, 2 Sep 2014 01:46:55 GMT" }, { "version": "v4", "created": "Mon, 22 Sep 2014 06:50:28 GMT" } ]
2014-09-23T00:00:00
[ [ "Rahmani", "Hossein", "" ], [ "Mahmood", "Arif", "" ], [ "Huynh", "Du Q.", "" ], [ "Mian", "Ajmal", "" ] ]
TITLE: HOPC: Histogram of Oriented Principal Components of 3D Pointclouds for Action Recognition ABSTRACT: Existing techniques for 3D action recognition are sensitive to viewpoint variations because they extract features from depth images which change significantly with viewpoint. In contrast, we directly process the pointclouds and propose a new technique for action recognition which is more robust to noise, action speed and viewpoint variations. Our technique consists of a novel descriptor and keypoint detection algorithm. The proposed descriptor is extracted at a point by encoding the Histogram of Oriented Principal Components (HOPC) within an adaptive spatio-temporal support volume around that point. Based on this descriptor, we present a novel method to detect Spatio-Temporal Key-Points (STKPs) in 3D pointcloud sequences. Experimental results show that the proposed descriptor and STKP detector outperform state-of-the-art algorithms on three benchmark human activity datasets. We also introduce a new multiview public dataset and show the robustness of our proposed method to viewpoint variations.
1408.3810
Hossein Rahmani
Hossein Rahmani, Arif Mahmood, Du Huynh, Ajmal Mian
Action Classification with Locality-constrained Linear Coding
ICPR 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an action classification algorithm which uses Locality-constrained Linear Coding (LLC) to capture discriminative information of human body variations in each spatiotemporal subsequence of a video sequence. Our proposed method divides the input video into equally spaced overlapping spatiotemporal subsequences, each of which is decomposed into blocks and then cells. We use the Histogram of Oriented Gradient (HOG3D) feature to encode the information in each cell. We justify the use of LLC for encoding the block descriptor by demonstrating its superiority over Sparse Coding (SC). Our sequence descriptor is obtained via a logistic regression classifier with L2 regularization. We evaluate and compare our algorithm with ten state-of-the-art algorithms on five benchmark datasets. Experimental results show that, on average, our algorithm gives better accuracy than these ten algorithms.
[ { "version": "v1", "created": "Sun, 17 Aug 2014 10:46:45 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2014 06:54:34 GMT" } ]
2014-09-23T00:00:00
[ [ "Rahmani", "Hossein", "" ], [ "Mahmood", "Arif", "" ], [ "Huynh", "Du", "" ], [ "Mian", "Ajmal", "" ] ]
TITLE: Action Classification with Locality-constrained Linear Coding ABSTRACT: We propose an action classification algorithm which uses Locality-constrained Linear Coding (LLC) to capture discriminative information of human body variations in each spatiotemporal subsequence of a video sequence. Our proposed method divides the input video into equally spaced overlapping spatiotemporal subsequences, each of which is decomposed into blocks and then cells. We use the Histogram of Oriented Gradient (HOG3D) feature to encode the information in each cell. We justify the use of LLC for encoding the block descriptor by demonstrating its superiority over Sparse Coding (SC). Our sequence descriptor is obtained via a logistic regression classifier with L2 regularization. We evaluate and compare our algorithm with ten state-of-the-art algorithms on five benchmark datasets. Experimental results show that, on average, our algorithm gives better accuracy than these ten algorithms.
1409.6070
Benjamin Graham
Benjamin Graham
Spatially-sparse convolutional neural networks
13 pages
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional neural networks (CNNs) perform well on problems such as handwriting recognition and image classification. However, the performance of the networks is often limited by budget and time constraints, particularly when trying to train deep networks. Motivated by the problem of online handwriting recognition, we developed a CNN for processing spatially-sparse inputs; a character drawn with a one-pixel wide pen on a high resolution grid looks like a sparse matrix. Taking advantage of the sparsity allowed us more efficiently to train and test large, deep CNNs. On the CASIA-OLHWDB1.1 dataset containing 3755 character classes we get a test error of 3.82%. Although pictures are not sparse, they can be thought of as sparse by adding padding. Applying a deep convolutional network using sparsity has resulted in a substantial reduction in test error on the CIFAR small picture datasets: 6.28% on CIFAR-10 and 24.30% for CIFAR-100.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 02:39:27 GMT" } ]
2014-09-23T00:00:00
[ [ "Graham", "Benjamin", "" ] ]
TITLE: Spatially-sparse convolutional neural networks ABSTRACT: Convolutional neural networks (CNNs) perform well on problems such as handwriting recognition and image classification. However, the performance of the networks is often limited by budget and time constraints, particularly when trying to train deep networks. Motivated by the problem of online handwriting recognition, we developed a CNN for processing spatially-sparse inputs; a character drawn with a one-pixel wide pen on a high resolution grid looks like a sparse matrix. Taking advantage of the sparsity allowed us more efficiently to train and test large, deep CNNs. On the CASIA-OLHWDB1.1 dataset containing 3755 character classes we get a test error of 3.82%. Although pictures are not sparse, they can be thought of as sparse by adding padding. Applying a deep convolutional network using sparsity has resulted in a substantial reduction in test error on the CIFAR small picture datasets: 6.28% on CIFAR-10 and 24.30% for CIFAR-100.
1311.2789
Stian Soiland-Reyes
Kristina M. Hettne, Harish Dharuri, Jun Zhao, Katherine Wolstencroft, Khalid Belhajjame, Stian Soiland-Reyes, Eleni Mina, Mark Thompson, Don Cruickshank, Lourdes Verdes-Montenegro, Julian Garrido, David de Roure, Oscar Corcho, Graham Klyne, Reinout van Schouwen, Peter A. C. 't Hoen, Sean Bechhofer, Carole Goble, Marco Roos
Structuring research methods and data with the Research Object model: genomics workflows as a case study
35 pages, 10 figures, 1 table. Submitted to Journal of Biomedical Semantics on 2013-05-13, resubmitted after reviews 2013-11-09, 2014-06-27. Accepted in principle 2014-07-29. Published: 2014-09-18 http://www.jbiomedsem.com/content/5/1/41. Research Object homepage: http://www.researchobject.org/
null
10.1186/2041-1480-5-41
uk-ac-man-scw:212837
q-bio.GN cs.DL
http://creativecommons.org/licenses/by/3.0/
One of the main challenges for biomedical research lies in the computer-assisted integrative study of large and increasingly complex combinations of data in order to understand molecular mechanisms. The preservation of the materials and methods of such computational experiments with clear annotations is essential for understanding an experiment, and this is increasingly recognized in the bioinformatics community. Our assumption is that offering means of digital, structured aggregation and annotation of the objects of an experiment will provide necessary meta-data for a scientist to understand and recreate the results of an experiment. To support this we explored a model for the semantic description of a workflow-centric Research Object (RO), where an RO is defined as a resource that aggregates other resources, e.g., datasets, software, spreadsheets, text, etc. We applied this model to a case study where we analysed human metabolite variation by workflows.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 14:23:33 GMT" }, { "version": "v2", "created": "Mon, 18 Aug 2014 13:28:07 GMT" }, { "version": "v3", "created": "Fri, 19 Sep 2014 10:37:56 GMT" } ]
2014-09-22T00:00:00
[ [ "Hettne", "Kristina M.", "" ], [ "Dharuri", "Harish", "" ], [ "Zhao", "Jun", "" ], [ "Wolstencroft", "Katherine", "" ], [ "Belhajjame", "Khalid", "" ], [ "Soiland-Reyes", "Stian", "" ], [ "Mina", "Eleni", "" ], [ "Thompson", "Mark", "" ], [ "Cruickshank", "Don", "" ], [ "Verdes-Montenegro", "Lourdes", "" ], [ "Garrido", "Julian", "" ], [ "de Roure", "David", "" ], [ "Corcho", "Oscar", "" ], [ "Klyne", "Graham", "" ], [ "van Schouwen", "Reinout", "" ], [ "Hoen", "Peter A. C. 't", "" ], [ "Bechhofer", "Sean", "" ], [ "Goble", "Carole", "" ], [ "Roos", "Marco", "" ] ]
TITLE: Structuring research methods and data with the Research Object model: genomics workflows as a case study ABSTRACT: One of the main challenges for biomedical research lies in the computer-assisted integrative study of large and increasingly complex combinations of data in order to understand molecular mechanisms. The preservation of the materials and methods of such computational experiments with clear annotations is essential for understanding an experiment, and this is increasingly recognized in the bioinformatics community. Our assumption is that offering means of digital, structured aggregation and annotation of the objects of an experiment will provide necessary meta-data for a scientist to understand and recreate the results of an experiment. To support this we explored a model for the semantic description of a workflow-centric Research Object (RO), where an RO is defined as a resource that aggregates other resources, e.g., datasets, software, spreadsheets, text, etc. We applied this model to a case study where we analysed human metabolite variation by workflows.
1409.5512
Liangyue Li
Liangyue Li, Hanghang Tong, Nan Cao, Kate Ehrlich, Yu-Ru Lin, Norbou Buchler
Replacing the Irreplaceable: Fast Algorithms for Team Member Recommendation
Initially submitted to KDD 2014
null
null
null
cs.SI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the problem of Team Member Replacement: given a team of people embedded in a social network working on the same task, find a good candidate who can fit in the team after one team member becomes unavailable. We conjecture that a good team member replacement should have good skill matching as well as good structure matching. We formulate this problem using the concept of graph kernel. To tackle the computational challenges, we propose a family of fast algorithms by (a) designing effective pruning strategies, and (b) exploring the smoothness between the existing and the new team structures. We conduct extensive experimental evaluations on real world datasets to demonstrate the effectiveness and efficiency. Our algorithms (a) perform significantly better than the alternative choices in terms of both precision and recall; and (b) scale sub-linearly.
[ { "version": "v1", "created": "Fri, 19 Sep 2014 04:05:16 GMT" } ]
2014-09-22T00:00:00
[ [ "Li", "Liangyue", "" ], [ "Tong", "Hanghang", "" ], [ "Cao", "Nan", "" ], [ "Ehrlich", "Kate", "" ], [ "Lin", "Yu-Ru", "" ], [ "Buchler", "Norbou", "" ] ]
TITLE: Replacing the Irreplaceable: Fast Algorithms for Team Member Recommendation ABSTRACT: In this paper, we study the problem of Team Member Replacement: given a team of people embedded in a social network working on the same task, find a good candidate who can fit in the team after one team member becomes unavailable. We conjecture that a good team member replacement should have good skill matching as well as good structure matching. We formulate this problem using the concept of graph kernel. To tackle the computational challenges, we propose a family of fast algorithms by (a) designing effective pruning strategies, and (b) exploring the smoothness between the existing and the new team structures. We conduct extensive experimental evaluations on real world datasets to demonstrate the effectiveness and efficiency. Our algorithms (a) perform significantly better than the alternative choices in terms of both precision and recall; and (b) scale sub-linearly.
1409.5552
Asif Imran
Asif Imran, Emon Kumar Dey and Kazi Sakib
Active-Threaded Algorithms for Provenance Cognition in the Cloud preserving Low Overhead and Fault Tolerance
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Provenance is the derivation history of information about the origin of data and processes. For a highly dynamic system such as the cloud, provenance must be effectively detected to be used as proves to ensure accountability during digital forensic investigations. This paper proposes active-threaded provenance cognition algorithms that ensure effective and high speed detection of provenance information in the activity layer of the cloud. The algorithms also support encapsulation of the provenance information on specific targets. Performance evaluation of the proposed algorithms reveal mean delay of 8.198 seconds that is below the pre-defined benchmark of 10 seconds. Standard deviation and cumulative frequencies for delays are found to be 1.434 and 45.1% respectively.
[ { "version": "v1", "created": "Fri, 19 Sep 2014 08:47:51 GMT" } ]
2014-09-22T00:00:00
[ [ "Imran", "Asif", "" ], [ "Dey", "Emon Kumar", "" ], [ "Sakib", "Kazi", "" ] ]
TITLE: Active-Threaded Algorithms for Provenance Cognition in the Cloud preserving Low Overhead and Fault Tolerance ABSTRACT: Provenance is the derivation history of information about the origin of data and processes. For a highly dynamic system such as the cloud, provenance must be effectively detected to be used as proves to ensure accountability during digital forensic investigations. This paper proposes active-threaded provenance cognition algorithms that ensure effective and high speed detection of provenance information in the activity layer of the cloud. The algorithms also support encapsulation of the provenance information on specific targets. Performance evaluation of the proposed algorithms reveal mean delay of 8.198 seconds that is below the pre-defined benchmark of 10 seconds. Standard deviation and cumulative frequencies for delays are found to be 1.434 and 45.1% respectively.
1409.5567
Yanchao Lu
Yanchao Lu, Donghong Wu, Bingsheng He, Xueyan Tang, Jianliang Xu and Minyi Guo
Rank-Aware Dynamic Migrations and Adaptive Demotions for DRAM Power Management
19 pages
null
null
SJTU-CSE-13-2
cs.PF cs.AR cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern DRAM architectures allow a number of low-power states on individual memory ranks for advanced power management. Many previous studies have taken advantage of demotions on low-power states for energy saving. However, most of the demotion schemes are statically performed on a limited number of pre-selected low-power states, and are suboptimal for different workloads and memory architectures. Even worse, the idle periods are often too short for effective power state transitions, especially for memory intensive applications. Wrong decisions on power state transition incur significant energy and delay penalties. In this paper, we propose a novel memory system design named RAMZzz with rank-aware energy saving optimizations including dynamic page migrations and adaptive demotions. Specifically, we group the pages with similar access locality into the same rank with dynamic page migrations. Ranks have their hotness: hot ranks are kept busy for high utilization and cold ranks can have more lengthy idle periods for power state transitions. We further develop adaptive state demotions by considering all low-power states for each rank and a prediction model to estimate the power-down timeout among states. We experimentally compare our algorithm with other energy saving policies with cycle-accurate simulation. Experiments with benchmark workloads show that RAMZzz achieves significant improvement on energy-delay2 and energy consumption over other energy saving techniques.
[ { "version": "v1", "created": "Fri, 19 Sep 2014 09:30:49 GMT" } ]
2014-09-22T00:00:00
[ [ "Lu", "Yanchao", "" ], [ "Wu", "Donghong", "" ], [ "He", "Bingsheng", "" ], [ "Tang", "Xueyan", "" ], [ "Xu", "Jianliang", "" ], [ "Guo", "Minyi", "" ] ]
TITLE: Rank-Aware Dynamic Migrations and Adaptive Demotions for DRAM Power Management ABSTRACT: Modern DRAM architectures allow a number of low-power states on individual memory ranks for advanced power management. Many previous studies have taken advantage of demotions on low-power states for energy saving. However, most of the demotion schemes are statically performed on a limited number of pre-selected low-power states, and are suboptimal for different workloads and memory architectures. Even worse, the idle periods are often too short for effective power state transitions, especially for memory intensive applications. Wrong decisions on power state transition incur significant energy and delay penalties. In this paper, we propose a novel memory system design named RAMZzz with rank-aware energy saving optimizations including dynamic page migrations and adaptive demotions. Specifically, we group the pages with similar access locality into the same rank with dynamic page migrations. Ranks have their hotness: hot ranks are kept busy for high utilization and cold ranks can have more lengthy idle periods for power state transitions. We further develop adaptive state demotions by considering all low-power states for each rank and a prediction model to estimate the power-down timeout among states. We experimentally compare our algorithm with other energy saving policies with cycle-accurate simulation. Experiments with benchmark workloads show that RAMZzz achieves significant improvement on energy-delay2 and energy consumption over other energy saving techniques.
1310.1525
Yang Yang
Yang Yang and Yuxiao Dong and Nitesh V. Chawla
Microscopic Evolution of Social Networks by Triad Position Profile
12 pages, 13 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Disentangling the mechanisms underlying the social network evolution is one of social science's unsolved puzzles. Preferential attachment is a powerful mechanism explaining social network dynamics, yet not able to explain all scaling-laws in social networks. Recent advances in understanding social network dynamics demonstrate that several scaling-laws in social networks follow as natural consequences of triadic closure. Macroscopic comparisons between them are discussed empirically in many works. However the network evolution drives not only the emergence of macroscopic scaling but also the microscopic behaviors. Here we exploit two fundamental aspects of the network microscopic evolution: the individual influence evolution and the process of link formation. First we develop a novel framework for the microscopic evolution, where the mechanisms of preferential attachment and triadic closure are well balanced. Then on four real-world datasets we apply our approach for two microscopic problems: node's prominence prediction and link prediction, where our method yields significant predictive improvement over baseline solutions. Finally to be rigorous and comprehensive, we further observe that our framework has a stronger generalization capacity across different kinds of social networks for two microscopic prediction problems. We unveil the significant factors with a greater degree of precision than has heretofore been possible, and shed new light on networks evolution.
[ { "version": "v1", "created": "Sun, 6 Oct 2013 01:17:13 GMT" }, { "version": "v2", "created": "Tue, 8 Oct 2013 03:54:19 GMT" }, { "version": "v3", "created": "Thu, 18 Sep 2014 13:15:46 GMT" } ]
2014-09-19T00:00:00
[ [ "Yang", "Yang", "" ], [ "Dong", "Yuxiao", "" ], [ "Chawla", "Nitesh V.", "" ] ]
TITLE: Microscopic Evolution of Social Networks by Triad Position Profile ABSTRACT: Disentangling the mechanisms underlying the social network evolution is one of social science's unsolved puzzles. Preferential attachment is a powerful mechanism explaining social network dynamics, yet not able to explain all scaling-laws in social networks. Recent advances in understanding social network dynamics demonstrate that several scaling-laws in social networks follow as natural consequences of triadic closure. Macroscopic comparisons between them are discussed empirically in many works. However the network evolution drives not only the emergence of macroscopic scaling but also the microscopic behaviors. Here we exploit two fundamental aspects of the network microscopic evolution: the individual influence evolution and the process of link formation. First we develop a novel framework for the microscopic evolution, where the mechanisms of preferential attachment and triadic closure are well balanced. Then on four real-world datasets we apply our approach for two microscopic problems: node's prominence prediction and link prediction, where our method yields significant predictive improvement over baseline solutions. Finally to be rigorous and comprehensive, we further observe that our framework has a stronger generalization capacity across different kinds of social networks for two microscopic prediction problems. We unveil the significant factors with a greater degree of precision than has heretofore been possible, and shed new light on networks evolution.