id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1310.6288
Hao Zhang
Hao Zhang and Liqing Zhang
Spatial-Spectral Boosting Analysis for Stroke Patients' Motor Imagery EEG in Rehabilitation Training
10 pages,3 figures
null
10.3233/978-1-61499-419-0-537
null
stat.ML cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current studies about motor imagery based rehabilitation training systems for stroke subjects lack an appropriate analytic method, which can achieve a considerable classification accuracy, at the same time detects gradual changes of imagery patterns during rehabilitation process and disinters potential mechanisms about motor function recovery. In this study, we propose an adaptive boosting algorithm based on the cortex plasticity and spectral band shifts. This approach models the usually predetermined spatial-spectral configurations in EEG study into variable preconditions, and introduces a new heuristic of stochastic gradient boost for training base learners under these preconditions. We compare our proposed algorithm with commonly used methods on datasets collected from 2 months' clinical experiments. The simulation results demonstrate the effectiveness of the method in detecting the variations of stroke patients' EEG patterns. By chronologically reorganizing the weight parameters of the learned additive model, we verify the spatial compensatory mechanism on impaired cortex and detect the changes of accentuation bands in spectral domain, which may contribute important prior knowledge for rehabilitation practice.
[ { "version": "v1", "created": "Wed, 23 Oct 2013 16:43:59 GMT" } ]
2014-09-19T00:00:00
[ [ "Zhang", "Hao", "" ], [ "Zhang", "Liqing", "" ] ]
TITLE: Spatial-Spectral Boosting Analysis for Stroke Patients' Motor Imagery EEG in Rehabilitation Training ABSTRACT: Current studies about motor imagery based rehabilitation training systems for stroke subjects lack an appropriate analytic method, which can achieve a considerable classification accuracy, at the same time detects gradual changes of imagery patterns during rehabilitation process and disinters potential mechanisms about motor function recovery. In this study, we propose an adaptive boosting algorithm based on the cortex plasticity and spectral band shifts. This approach models the usually predetermined spatial-spectral configurations in EEG study into variable preconditions, and introduces a new heuristic of stochastic gradient boost for training base learners under these preconditions. We compare our proposed algorithm with commonly used methods on datasets collected from 2 months' clinical experiments. The simulation results demonstrate the effectiveness of the method in detecting the variations of stroke patients' EEG patterns. By chronologically reorganizing the weight parameters of the learned additive model, we verify the spatial compensatory mechanism on impaired cortex and detect the changes of accentuation bands in spectral domain, which may contribute important prior knowledge for rehabilitation practice.
1405.6874
Sebastian Deorowicz
Szymon Grabowski, Sebastian Deorowicz, {\L}ukasz Roguski
Disk-based genome sequencing data compression
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivation: High-coverage sequencing data have significant, yet hard to exploit, redundancy. Most FASTQ compressors cannot efficiently compress the DNA stream of large datasets, since the redundancy between overlapping reads cannot be easily captured in the (relatively small) main memory. More interesting solutions for this problem are disk-based~(Yanovsky, 2011; Cox et al., 2012), where the better of these two, from Cox~{\it et al.}~(2012), is based on the Burrows--Wheeler transform (BWT) and achieves 0.518 bits per base for a 134.0 Gb human genome sequencing collection with almost 45-fold coverage. Results: We propose ORCOM (Overlapping Reads COmpression with Minimizers), a compression algorithm dedicated to sequencing reads (DNA only). Our method makes use of a conceptually simple and easily parallelizable idea of minimizers, to obtain 0.317 bits per base as the compression ratio, allowing to fit the 134.0 Gb dataset into only 5.31 GB of space. Availability: http://sun.aei.polsl.pl/orcom under a free license.
[ { "version": "v1", "created": "Tue, 27 May 2014 11:34:35 GMT" }, { "version": "v2", "created": "Thu, 18 Sep 2014 17:41:36 GMT" } ]
2014-09-19T00:00:00
[ [ "Grabowski", "Szymon", "" ], [ "Deorowicz", "Sebastian", "" ], [ "Roguski", "Łukasz", "" ] ]
TITLE: Disk-based genome sequencing data compression ABSTRACT: Motivation: High-coverage sequencing data have significant, yet hard to exploit, redundancy. Most FASTQ compressors cannot efficiently compress the DNA stream of large datasets, since the redundancy between overlapping reads cannot be easily captured in the (relatively small) main memory. More interesting solutions for this problem are disk-based~(Yanovsky, 2011; Cox et al., 2012), where the better of these two, from Cox~{\it et al.}~(2012), is based on the Burrows--Wheeler transform (BWT) and achieves 0.518 bits per base for a 134.0 Gb human genome sequencing collection with almost 45-fold coverage. Results: We propose ORCOM (Overlapping Reads COmpression with Minimizers), a compression algorithm dedicated to sequencing reads (DNA only). Our method makes use of a conceptually simple and easily parallelizable idea of minimizers, to obtain 0.317 bits per base as the compression ratio, allowing to fit the 134.0 Gb dataset into only 5.31 GB of space. Availability: http://sun.aei.polsl.pl/orcom under a free license.
1409.5165
Michael Bloodgood
Michael Bloodgood and K. Vijay-Shanker
A Method for Stopping Active Learning Based on Stabilizing Predictions and the Need for User-Adjustable Stopping
9 pages, 3 figures, 5 tables; appeared in Proceedings of the Thirteenth Conference on Computational Natural Language Learning (CoNLL-2009), June 2009
In Proceedings of the Thirteenth Conference on Computational Natural Language Learning (CoNLL-2009), pages 39-47, Boulder, Colorado, June 2009. Association for Computational Linguistics
null
null
cs.LG cs.CL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A survey of existing methods for stopping active learning (AL) reveals the needs for methods that are: more widely applicable; more aggressive in saving annotations; and more stable across changing datasets. A new method for stopping AL based on stabilizing predictions is presented that addresses these needs. Furthermore, stopping methods are required to handle a broad range of different annotation/performance tradeoff valuations. Despite this, the existing body of work is dominated by conservative methods with little (if any) attention paid to providing users with control over the behavior of stopping methods. The proposed method is shown to fill a gap in the level of aggressiveness available for stopping AL and supports providing users with control over stopping behavior.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 23:28:59 GMT" } ]
2014-09-19T00:00:00
[ [ "Bloodgood", "Michael", "" ], [ "Vijay-Shanker", "K.", "" ] ]
TITLE: A Method for Stopping Active Learning Based on Stabilizing Predictions and the Need for User-Adjustable Stopping ABSTRACT: A survey of existing methods for stopping active learning (AL) reveals the needs for methods that are: more widely applicable; more aggressive in saving annotations; and more stable across changing datasets. A new method for stopping AL based on stabilizing predictions is presented that addresses these needs. Furthermore, stopping methods are required to handle a broad range of different annotation/performance tradeoff valuations. Despite this, the existing body of work is dominated by conservative methods with little (if any) attention paid to providing users with control over the behavior of stopping methods. The proposed method is shown to fill a gap in the level of aggressiveness available for stopping AL and supports providing users with control over stopping behavior.
1409.5327
Neil Walton
N.S. Walton
Store-Forward and its implications for Proportional Scheduling
null
null
null
null
cs.NI cs.PF math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Proportional Scheduler was recently proposed as a scheduling algorithm for multi-hop switch networks. For these networks, the BackPressure scheduler is the classical benchmark. For networks with fixed routing, the Proportional Scheduler is maximum stable, myopic and, furthermore, will alleviate certain scaling issued found in BackPressure for large networks. Nonetheless, the equilibrium and delay properties of the Proportional Scheduler has not been fully characterized. In this article, we postulate on the equilibrium behaviour of the Proportional Scheduler though the analysis of an analogous rule called the Store-Forward allocation. It has been shown that Store-Forward has asymptotically allocates according to the Proportional Scheduler. Further, for Store-Forward networks, numerous equilibrium quantities are explicitly calculable. For FIFO networks under Store-Forward, we calculate the policies stationary distribution and end-to-end route delay. We discuss network topologies when the stationary distribution is product-form, a phenomenon which we call \emph{product form resource pooling}. We extend this product form notion to independent set scheduling on perfect graphs, where we show that non-neighbouring queues are statistically independent. Finally, we analyse the large deviations behaviour of the equilibrium distribution of Store-Forward networks in order to construct Lyapunov functions for FIFO switch networks.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 19:45:20 GMT" } ]
2014-09-19T00:00:00
[ [ "Walton", "N. S.", "" ] ]
TITLE: Store-Forward and its implications for Proportional Scheduling ABSTRACT: The Proportional Scheduler was recently proposed as a scheduling algorithm for multi-hop switch networks. For these networks, the BackPressure scheduler is the classical benchmark. For networks with fixed routing, the Proportional Scheduler is maximum stable, myopic and, furthermore, will alleviate certain scaling issued found in BackPressure for large networks. Nonetheless, the equilibrium and delay properties of the Proportional Scheduler has not been fully characterized. In this article, we postulate on the equilibrium behaviour of the Proportional Scheduler though the analysis of an analogous rule called the Store-Forward allocation. It has been shown that Store-Forward has asymptotically allocates according to the Proportional Scheduler. Further, for Store-Forward networks, numerous equilibrium quantities are explicitly calculable. For FIFO networks under Store-Forward, we calculate the policies stationary distribution and end-to-end route delay. We discuss network topologies when the stationary distribution is product-form, a phenomenon which we call \emph{product form resource pooling}. We extend this product form notion to independent set scheduling on perfect graphs, where we show that non-neighbouring queues are statistically independent. Finally, we analyse the large deviations behaviour of the equilibrium distribution of Store-Forward networks in order to construct Lyapunov functions for FIFO switch networks.
1403.4064
Ivan Radi\v{c}ek
Sumit Gulwani, Ivan Radi\v{c}ek, Florian Zuleger
Feedback Generation for Performance Problems in Introductory Programming Assignments
Tech report/extended version of FSE 2014 paper
null
10.1145/2635868.2635912
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Providing feedback on programming assignments manually is a tedious, error prone, and time-consuming task. In this paper, we motivate and address the problem of generating feedback on performance aspects in introductory programming assignments. We studied a large number of functionally correct student solutions to introductory programming assignments and observed: (1) There are different algorithmic strategies, with varying levels of efficiency, for solving a given problem. These different strategies merit different feedback. (2) The same algorithmic strategy can be implemented in countless different ways, which are not relevant for reporting feedback on the student program. We propose a light-weight programming language extension that allows a teacher to define an algorithmic strategy by specifying certain key values that should occur during the execution of an implementation. We describe a dynamic analysis based approach to test whether a student's program matches a teacher's specification. Our experimental results illustrate the effectiveness of both our specification language and our dynamic analysis. On one of our benchmarks consisting of 2316 functionally correct implementations to 3 programming problems, we identified 16 strategies that we were able to describe using our specification language (in 95 minutes after inspecting 66, i.e., around 3%, implementations). Our dynamic analysis correctly matched each implementation with its corresponding specification, thereby automatically producing the intended feedback.
[ { "version": "v1", "created": "Mon, 17 Mar 2014 11:09:59 GMT" }, { "version": "v2", "created": "Wed, 17 Sep 2014 10:01:03 GMT" } ]
2014-09-18T00:00:00
[ [ "Gulwani", "Sumit", "" ], [ "Radiček", "Ivan", "" ], [ "Zuleger", "Florian", "" ] ]
TITLE: Feedback Generation for Performance Problems in Introductory Programming Assignments ABSTRACT: Providing feedback on programming assignments manually is a tedious, error prone, and time-consuming task. In this paper, we motivate and address the problem of generating feedback on performance aspects in introductory programming assignments. We studied a large number of functionally correct student solutions to introductory programming assignments and observed: (1) There are different algorithmic strategies, with varying levels of efficiency, for solving a given problem. These different strategies merit different feedback. (2) The same algorithmic strategy can be implemented in countless different ways, which are not relevant for reporting feedback on the student program. We propose a light-weight programming language extension that allows a teacher to define an algorithmic strategy by specifying certain key values that should occur during the execution of an implementation. We describe a dynamic analysis based approach to test whether a student's program matches a teacher's specification. Our experimental results illustrate the effectiveness of both our specification language and our dynamic analysis. On one of our benchmarks consisting of 2316 functionally correct implementations to 3 programming problems, we identified 16 strategies that we were able to describe using our specification language (in 95 minutes after inspecting 66, i.e., around 3%, implementations). Our dynamic analysis correctly matched each implementation with its corresponding specification, thereby automatically producing the intended feedback.
1406.6811
Fumin Shen
Fumin Shen, Chunhua Shen and Heng Tao Shen
Face Image Classification by Pooling Raw Features
12 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a very simple, efficient yet surprisingly effective feature extraction method for face recognition (about 20 lines of Matlab code), which is mainly inspired by spatial pyramid pooling in generic image classification. We show that features formed by simply pooling local patches over a multi-level pyramid, coupled with a linear classifier, can significantly outperform most recent face recognition methods. The simplicity of our feature extraction procedure is demonstrated by the fact that no learning is involved (except PCA whitening). We show that, multi-level spatial pooling and dense extraction of multi-scale patches play critical roles in face image classification. The extracted facial features can capture strong structural information of individual faces with no label information being used. We also find that, pre-processing on local image patches such as contrast normalization can have an important impact on the classification accuracy. In particular, on the challenging face recognition datasets of FERET and LFW-a, our method improves previous best results by more than 10% and 20%, respectively.
[ { "version": "v1", "created": "Thu, 26 Jun 2014 08:56:55 GMT" }, { "version": "v2", "created": "Wed, 17 Sep 2014 06:40:29 GMT" } ]
2014-09-18T00:00:00
[ [ "Shen", "Fumin", "" ], [ "Shen", "Chunhua", "" ], [ "Shen", "Heng Tao", "" ] ]
TITLE: Face Image Classification by Pooling Raw Features ABSTRACT: We propose a very simple, efficient yet surprisingly effective feature extraction method for face recognition (about 20 lines of Matlab code), which is mainly inspired by spatial pyramid pooling in generic image classification. We show that features formed by simply pooling local patches over a multi-level pyramid, coupled with a linear classifier, can significantly outperform most recent face recognition methods. The simplicity of our feature extraction procedure is demonstrated by the fact that no learning is involved (except PCA whitening). We show that, multi-level spatial pooling and dense extraction of multi-scale patches play critical roles in face image classification. The extracted facial features can capture strong structural information of individual faces with no label information being used. We also find that, pre-processing on local image patches such as contrast normalization can have an important impact on the classification accuracy. In particular, on the challenging face recognition datasets of FERET and LFW-a, our method improves previous best results by more than 10% and 20%, respectively.
1409.4936
Anthony Bagnall Dr
Anthony Bagnall and Reda Younsi
Ensembles of Random Sphere Cover Classifiers
null
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose and evaluate alternative ensemble schemes for a new instance based learning classifier, the Randomised Sphere Cover (RSC) classifier. RSC fuses instances into spheres, then bases classification on distance to spheres rather than distance to instances. The randomised nature of RSC makes it ideal for use in ensembles. We propose two ensemble methods tailored to the RSC classifier; $\alpha \beta$RSE, an ensemble based on instance resampling and $\alpha$RSSE, a subspace ensemble. We compare $\alpha \beta$RSE and $\alpha$RSSE to tree based ensembles on a set of UCI datasets and demonstrates that RSC ensembles perform significantly better than some of these ensembles, and not significantly worse than the others. We demonstrate via a case study on six gene expression data sets that $\alpha$RSSE can outperform other subspace ensemble methods on high dimensional data when used in conjunction with an attribute filter. Finally, we perform a set of Bias/Variance decomposition experiments to analyse the source of improvement in comparison to a base classifier.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 10:18:34 GMT" } ]
2014-09-18T00:00:00
[ [ "Bagnall", "Anthony", "" ], [ "Younsi", "Reda", "" ] ]
TITLE: Ensembles of Random Sphere Cover Classifiers ABSTRACT: We propose and evaluate alternative ensemble schemes for a new instance based learning classifier, the Randomised Sphere Cover (RSC) classifier. RSC fuses instances into spheres, then bases classification on distance to spheres rather than distance to instances. The randomised nature of RSC makes it ideal for use in ensembles. We propose two ensemble methods tailored to the RSC classifier; $\alpha \beta$RSE, an ensemble based on instance resampling and $\alpha$RSSE, a subspace ensemble. We compare $\alpha \beta$RSE and $\alpha$RSSE to tree based ensembles on a set of UCI datasets and demonstrates that RSC ensembles perform significantly better than some of these ensembles, and not significantly worse than the others. We demonstrate via a case study on six gene expression data sets that $\alpha$RSSE can outperform other subspace ensemble methods on high dimensional data when used in conjunction with an attribute filter. Finally, we perform a set of Bias/Variance decomposition experiments to analyse the source of improvement in comparison to a base classifier.
1409.4995
Xirong Li
Xixi He, Xirong Li, Gang Yang, Jieping Xu, Qin Jin
Adaptive Tag Selection for Image Annotation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Not all tags are relevant to an image, and the number of relevant tags is image-dependent. Although many methods have been proposed for image auto-annotation, the question of how to determine the number of tags to be selected per image remains open. The main challenge is that for a large tag vocabulary, there is often a lack of ground truth data for acquiring optimal cutoff thresholds per tag. In contrast to previous works that pre-specify the number of tags to be selected, we propose in this paper adaptive tag selection. The key insight is to divide the vocabulary into two disjoint subsets, namely a seen set consisting of tags having ground truth available for optimizing their thresholds and a novel set consisting of tags without any ground truth. Such a division allows us to estimate how many tags shall be selected from the novel set according to the tags that have been selected from the seen set. The effectiveness of the proposed method is justified by our participation in the ImageCLEF 2014 image annotation task. On a set of 2,065 test images with ground truth available for 207 tags, the benchmark evaluation shows that compared to the popular top-$k$ strategy which obtains an F-score of 0.122, adaptive tag selection achieves a higher F-score of 0.223. Moreover, by treating the underlying image annotation system as a black box, the new method can be used as an easy plug-in to boost the performance of existing systems.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 13:50:37 GMT" } ]
2014-09-18T00:00:00
[ [ "He", "Xixi", "" ], [ "Li", "Xirong", "" ], [ "Yang", "Gang", "" ], [ "Xu", "Jieping", "" ], [ "Jin", "Qin", "" ] ]
TITLE: Adaptive Tag Selection for Image Annotation ABSTRACT: Not all tags are relevant to an image, and the number of relevant tags is image-dependent. Although many methods have been proposed for image auto-annotation, the question of how to determine the number of tags to be selected per image remains open. The main challenge is that for a large tag vocabulary, there is often a lack of ground truth data for acquiring optimal cutoff thresholds per tag. In contrast to previous works that pre-specify the number of tags to be selected, we propose in this paper adaptive tag selection. The key insight is to divide the vocabulary into two disjoint subsets, namely a seen set consisting of tags having ground truth available for optimizing their thresholds and a novel set consisting of tags without any ground truth. Such a division allows us to estimate how many tags shall be selected from the novel set according to the tags that have been selected from the seen set. The effectiveness of the proposed method is justified by our participation in the ImageCLEF 2014 image annotation task. On a set of 2,065 test images with ground truth available for 207 tags, the benchmark evaluation shows that compared to the popular top-$k$ strategy which obtains an F-score of 0.122, adaptive tag selection achieves a higher F-score of 0.223. Moreover, by treating the underlying image annotation system as a black box, the new method can be used as an easy plug-in to boost the performance of existing systems.
1409.5034
Faraz Zaidi
Faraz Zaidi, Chris Muelder, Arnaud Sallaberry
Analysis and Visualization of Dynamic Networks
Book chapter
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This chapter provides an overview of the different techniques and methods that exist for the analysis and visualization of dynamic networks. Basic definitions and formal notations are discussed and important references are cited. A major reason for the popularity of the field of dynamic networks is its applicability in a number of diverse fields. The field of dynamic networks is in its infancy and there are so many avenues that need to be explored. From developing network generation models to developing temporal metrics and measures, from structural analysis to visual analysis, there is room for further exploration in almost every dimension where dynamic networks are studied. Recently, with the availability of dynamic data from various fields, the empirical study and experimentation with real data sets has also helped maturate the field. Furthermore, researchers have started to develop foundations and theories based on these datasets which in turn has resulted lots of activity among research communities.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 15:40:01 GMT" } ]
2014-09-18T00:00:00
[ [ "Zaidi", "Faraz", "" ], [ "Muelder", "Chris", "" ], [ "Sallaberry", "Arnaud", "" ] ]
TITLE: Analysis and Visualization of Dynamic Networks ABSTRACT: This chapter provides an overview of the different techniques and methods that exist for the analysis and visualization of dynamic networks. Basic definitions and formal notations are discussed and important references are cited. A major reason for the popularity of the field of dynamic networks is its applicability in a number of diverse fields. The field of dynamic networks is in its infancy and there are so many avenues that need to be explored. From developing network generation models to developing temporal metrics and measures, from structural analysis to visual analysis, there is room for further exploration in almost every dimension where dynamic networks are studied. Recently, with the availability of dynamic data from various fields, the empirical study and experimentation with real data sets has also helped maturate the field. Furthermore, researchers have started to develop foundations and theories based on these datasets which in turn has resulted lots of activity among research communities.
1310.2963
Michael Szell
Paolo Santi, Giovanni Resta, Michael Szell, Stanislav Sobolevsky, Steven Strogatz, Carlo Ratti
Quantifying the benefits of vehicle pooling with shareability networks
Main text: 6 pages, 3 figures, SI: 24 pages
PNAS 111(37), 13290-13294 (2014)
10.1073/pnas.1403657111
null
physics.soc-ph cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Taxi services are a vital part of urban transportation, and a considerable contributor to traffic congestion and air pollution causing substantial adverse effects on human health. Sharing taxi trips is a possible way of reducing the negative impact of taxi services on cities, but this comes at the expense of passenger discomfort quantifiable in terms of a longer travel time. Due to computational challenges, taxi sharing has traditionally been approached on small scales, such as within airport perimeters, or with dynamical ad-hoc heuristics. However, a mathematical framework for the systematic understanding of the tradeoff between collective benefits of sharing and individual passenger discomfort is lacking. Here we introduce the notion of shareability network which allows us to model the collective benefits of sharing as a function of passenger inconvenience, and to efficiently compute optimal sharing strategies on massive datasets. We apply this framework to a dataset of millions of taxi trips taken in New York City, showing that with increasing but still relatively low passenger discomfort, cumulative trip length can be cut by 40% or more. This benefit comes with reductions in service cost, emissions, and with split fares, hinting towards a wide passenger acceptance of such a shared service. Simulation of a realistic online system demonstrates the feasibility of a shareable taxi service in New York City. Shareability as a function of trip density saturates fast, suggesting effectiveness of the taxi sharing system also in cities with much sparser taxi fleets or when willingness to share is low.
[ { "version": "v1", "created": "Thu, 10 Oct 2013 20:56:56 GMT" }, { "version": "v2", "created": "Tue, 16 Sep 2014 19:48:38 GMT" } ]
2014-09-17T00:00:00
[ [ "Santi", "Paolo", "" ], [ "Resta", "Giovanni", "" ], [ "Szell", "Michael", "" ], [ "Sobolevsky", "Stanislav", "" ], [ "Strogatz", "Steven", "" ], [ "Ratti", "Carlo", "" ] ]
TITLE: Quantifying the benefits of vehicle pooling with shareability networks ABSTRACT: Taxi services are a vital part of urban transportation, and a considerable contributor to traffic congestion and air pollution causing substantial adverse effects on human health. Sharing taxi trips is a possible way of reducing the negative impact of taxi services on cities, but this comes at the expense of passenger discomfort quantifiable in terms of a longer travel time. Due to computational challenges, taxi sharing has traditionally been approached on small scales, such as within airport perimeters, or with dynamical ad-hoc heuristics. However, a mathematical framework for the systematic understanding of the tradeoff between collective benefits of sharing and individual passenger discomfort is lacking. Here we introduce the notion of shareability network which allows us to model the collective benefits of sharing as a function of passenger inconvenience, and to efficiently compute optimal sharing strategies on massive datasets. We apply this framework to a dataset of millions of taxi trips taken in New York City, showing that with increasing but still relatively low passenger discomfort, cumulative trip length can be cut by 40% or more. This benefit comes with reductions in service cost, emissions, and with split fares, hinting towards a wide passenger acceptance of such a shared service. Simulation of a realistic online system demonstrates the feasibility of a shareable taxi service in New York City. Shareability as a function of trip density saturates fast, suggesting effectiveness of the taxi sharing system also in cities with much sparser taxi fleets or when willingness to share is low.
1407.5981
Tom Crick
Tom Crick, Benjamin A. Hall and Samin Ishtiaq
"Can I Implement Your Algorithm?": A Model for Reproducible Research Software
Accepted for the 2nd Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2); 5 pages, LaTeX
null
null
null
cs.SE cs.CE
http://creativecommons.org/licenses/by-nc-sa/3.0/
The reproduction and replication of novel results has become a major issue for a number of scientific disciplines. In computer science and related computational disciplines such as systems biology, the issues closely revolve around the ability to implement novel algorithms and approaches. Taking an approach from the literature and applying it to a new codebase frequently requires local knowledge missing from the published manuscripts and project websites. Alongside this issue, benchmarking, and the development of fair --- and widely available --- benchmark sets present another barrier. In this paper, we outline several suggestions to address these issues, driven by specific examples from a range of scientific domains. Finally, based on these suggestions, we propose a new open platform for scientific software development which effectively isolates specific dependencies from the individual researcher and their workstation and allows faster, more powerful sharing of the results of scientific software engineering.
[ { "version": "v1", "created": "Tue, 22 Jul 2014 19:29:34 GMT" }, { "version": "v2", "created": "Tue, 16 Sep 2014 13:35:18 GMT" } ]
2014-09-17T00:00:00
[ [ "Crick", "Tom", "" ], [ "Hall", "Benjamin A.", "" ], [ "Ishtiaq", "Samin", "" ] ]
TITLE: "Can I Implement Your Algorithm?": A Model for Reproducible Research Software ABSTRACT: The reproduction and replication of novel results has become a major issue for a number of scientific disciplines. In computer science and related computational disciplines such as systems biology, the issues closely revolve around the ability to implement novel algorithms and approaches. Taking an approach from the literature and applying it to a new codebase frequently requires local knowledge missing from the published manuscripts and project websites. Alongside this issue, benchmarking, and the development of fair --- and widely available --- benchmark sets present another barrier. In this paper, we outline several suggestions to address these issues, driven by specific examples from a range of scientific domains. Finally, based on these suggestions, we propose a new open platform for scientific software development which effectively isolates specific dependencies from the individual researcher and their workstation and allows faster, more powerful sharing of the results of scientific software engineering.
1407.6705
Reza Azad
Reza Azad, Hamid Reza Shayegh, Hamed Amiri
A Robust and Efficient Method for Improving Accuracy of License Plate Characters Recognition
This paper has been withdrawn by the author due to a crucial sign error in equation 1 and some mistake
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
License Plate Recognition (LPR) plays an important role on the traffic monitoring and parking management. A robust and efficient method for enhancing accuracy of license plate characters recognition based on K Nearest Neighbours (K-NN) classifier is presented in this paper. The system first prepares a contour form of the extracted character, then the angle and distance feature information about the character is extracted and finally K-NN classifier is used to character recognition. Angle and distance features of a character have been computed based on distribution of points on the bitmap image of character. In K-NN method, the Euclidean distance between testing point and reference points is calculated in order to find the k-nearest neighbours. We evaluated our method on the available dataset that contain 1200 sample. Using 70% samples for training, we tested our method on whole samples and obtained 99% correct recognition rate.Further, we achieved average 99.41% accuracy using three/strategy validation technique on 1200 dataset.
[ { "version": "v1", "created": "Thu, 24 Jul 2014 09:26:01 GMT" }, { "version": "v2", "created": "Tue, 16 Sep 2014 07:28:21 GMT" } ]
2014-09-17T00:00:00
[ [ "Azad", "Reza", "" ], [ "Shayegh", "Hamid Reza", "" ], [ "Amiri", "Hamed", "" ] ]
TITLE: A Robust and Efficient Method for Improving Accuracy of License Plate Characters Recognition ABSTRACT: License Plate Recognition (LPR) plays an important role on the traffic monitoring and parking management. A robust and efficient method for enhancing accuracy of license plate characters recognition based on K Nearest Neighbours (K-NN) classifier is presented in this paper. The system first prepares a contour form of the extracted character, then the angle and distance feature information about the character is extracted and finally K-NN classifier is used to character recognition. Angle and distance features of a character have been computed based on distribution of points on the bitmap image of character. In K-NN method, the Euclidean distance between testing point and reference points is calculated in order to find the k-nearest neighbours. We evaluated our method on the available dataset that contain 1200 sample. Using 70% samples for training, we tested our method on whole samples and obtained 99% correct recognition rate.Further, we achieved average 99.41% accuracy using three/strategy validation technique on 1200 dataset.
1409.4403
Jianguo Liu
Lei Hou, Xue Pan, Qiang Guo, Jian-Guo Liu
Memory effect of the online user preference
22 pages, 5 figures, Scientific Reports 2014 Accepted
null
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The mechanism of the online user preference evolution is of great significance for understanding the online user behaviors and improving the quality of online services. Since users are allowed to rate on objects in many online systems, ratings can well reflect the users' preference. With two benchmark datasets from online systems, we uncover the memory effect in users' selecting behavior which is the sequence of qualities of selected objects and the rating behavior which is the sequence of ratings delivered by each user. Furthermore, the memory duration is presented to describe the length of a memory, which exhibits the power-law distribution, i.e., the probability of the occurring of long-duration memory is much higher than that of the random case which follows the exponential distribution. We present a preference model in which a Markovian process is utilized to describe the users' selecting behavior, and the rating behavior depends on the selecting behavior. With only one parameter for each of the user's selecting and rating behavior, the preference model could regenerate any duration distribution ranging from the power-law form (strong memory) to the exponential form (weak memory).
[ { "version": "v1", "created": "Sat, 13 Sep 2014 11:55:08 GMT" } ]
2014-09-17T00:00:00
[ [ "Hou", "Lei", "" ], [ "Pan", "Xue", "" ], [ "Guo", "Qiang", "" ], [ "Liu", "Jian-Guo", "" ] ]
TITLE: Memory effect of the online user preference ABSTRACT: The mechanism of the online user preference evolution is of great significance for understanding the online user behaviors and improving the quality of online services. Since users are allowed to rate on objects in many online systems, ratings can well reflect the users' preference. With two benchmark datasets from online systems, we uncover the memory effect in users' selecting behavior which is the sequence of qualities of selected objects and the rating behavior which is the sequence of ratings delivered by each user. Furthermore, the memory duration is presented to describe the length of a memory, which exhibits the power-law distribution, i.e., the probability of the occurring of long-duration memory is much higher than that of the random case which follows the exponential distribution. We present a preference model in which a Markovian process is utilized to describe the users' selecting behavior, and the rating behavior depends on the selecting behavior. With only one parameter for each of the user's selecting and rating behavior, the preference model could regenerate any duration distribution ranging from the power-law form (strong memory) to the exponential form (weak memory).
1409.4438
Manoj Gulati
Manoj Gulati, Shobha Sundar Ram, Amarjeet Singh
An In Depth Study into Using EMI Signatures for Appliance Identification
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy conservation is a key factor towards long term energy sustainability. Real-time end user energy feedback, using disaggregated electric load composition, can play a pivotal role in motivating consumers towards energy conservation. Recent works have explored using high frequency conducted electromagnetic interference (EMI) on power lines as a single point sensing parameter for monitoring common home appliances. However, key questions regarding the reliability and feasibility of using EMI signatures for non-intrusive load monitoring over multiple appliances across different sensing paradigms remain unanswered. This work presents some of the key challenges towards using EMI as a unique and time invariant feature for load disaggregation. In-depth empirical evaluations of a large number of appliances in different sensing configurations are carried out, in both laboratory and real world settings. Insights into the effects of external parameters such as line impedance, background noise and appliance coupling on the EMI behavior of an appliance are realized through simulations and measurements. A generic approach for simulating the EMI behavior of an appliance that can then be used to do a detailed analysis of real world phenomenology is presented. The simulation approach is validated with EMI data from a router. Our EMI dataset - High Frequency EMI Dataset (HFED) is also released.
[ { "version": "v1", "created": "Mon, 15 Sep 2014 20:19:46 GMT" } ]
2014-09-17T00:00:00
[ [ "Gulati", "Manoj", "" ], [ "Ram", "Shobha Sundar", "" ], [ "Singh", "Amarjeet", "" ] ]
TITLE: An In Depth Study into Using EMI Signatures for Appliance Identification ABSTRACT: Energy conservation is a key factor towards long term energy sustainability. Real-time end user energy feedback, using disaggregated electric load composition, can play a pivotal role in motivating consumers towards energy conservation. Recent works have explored using high frequency conducted electromagnetic interference (EMI) on power lines as a single point sensing parameter for monitoring common home appliances. However, key questions regarding the reliability and feasibility of using EMI signatures for non-intrusive load monitoring over multiple appliances across different sensing paradigms remain unanswered. This work presents some of the key challenges towards using EMI as a unique and time invariant feature for load disaggregation. In-depth empirical evaluations of a large number of appliances in different sensing configurations are carried out, in both laboratory and real world settings. Insights into the effects of external parameters such as line impedance, background noise and appliance coupling on the EMI behavior of an appliance are realized through simulations and measurements. A generic approach for simulating the EMI behavior of an appliance that can then be used to do a detailed analysis of real world phenomenology is presented. The simulation approach is validated with EMI data from a router. Our EMI dataset - High Frequency EMI Dataset (HFED) is also released.
1409.4481
Aniket Bera
Aniket Bera, David Wolinski, Julien Pettr\'e, Dinesh Manocha
Real-time Crowd Tracking using Parameter Optimized Mixture of Motion Models
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel, real-time algorithm to track the trajectory of each pedestrian in moderately dense crowded scenes. Our formulation is based on an adaptive particle-filtering scheme that uses a combination of various multi-agent heterogeneous pedestrian simulation models. We automatically compute the optimal parameters for each of these different models based on prior tracked data and use the best model as motion prior for our particle-filter based tracking algorithm. We also use our "mixture of motion models" for adaptive particle selection and accelerate the performance of the online tracking algorithm. The motion model parameter estimation is formulated as an optimization problem, and we use an approach that solves this combinatorial optimization problem in a model independent manner and hence scalable to any multi-agent pedestrian motion model. We evaluate the performance of our approach on different crowd video datasets and highlight the improvement in accuracy over homogeneous motion models and a baseline mean-shift based tracker. In practice, our formulation can compute trajectories of tens of pedestrians on a multi-core desktop CPU in in real time and offer higher accuracy as compared to prior real time pedestrian tracking algorithms.
[ { "version": "v1", "created": "Tue, 16 Sep 2014 01:36:52 GMT" } ]
2014-09-17T00:00:00
[ [ "Bera", "Aniket", "" ], [ "Wolinski", "David", "" ], [ "Pettré", "Julien", "" ], [ "Manocha", "Dinesh", "" ] ]
TITLE: Real-time Crowd Tracking using Parameter Optimized Mixture of Motion Models ABSTRACT: We present a novel, real-time algorithm to track the trajectory of each pedestrian in moderately dense crowded scenes. Our formulation is based on an adaptive particle-filtering scheme that uses a combination of various multi-agent heterogeneous pedestrian simulation models. We automatically compute the optimal parameters for each of these different models based on prior tracked data and use the best model as motion prior for our particle-filter based tracking algorithm. We also use our "mixture of motion models" for adaptive particle selection and accelerate the performance of the online tracking algorithm. The motion model parameter estimation is formulated as an optimization problem, and we use an approach that solves this combinatorial optimization problem in a model independent manner and hence scalable to any multi-agent pedestrian motion model. We evaluate the performance of our approach on different crowd video datasets and highlight the improvement in accuracy over homogeneous motion models and a baseline mean-shift based tracker. In practice, our formulation can compute trajectories of tens of pedestrians on a multi-core desktop CPU in in real time and offer higher accuracy as compared to prior real time pedestrian tracking algorithms.
1409.4507
Awny Sayed
Awny Sayed and Amal Almaqrashi
Scalable and Efficient Self-Join Processing technique in RDF data
8-pages, 5-figures, International Journal of Computer Science Issues (IJCSI), Volume 11, Issue 2. April 2014
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data in the same table. As an improvement in this paper, we propose an alternative solution to facilitate flexibility and efficiency in that queries and try to reach to the optimal solution to decrease the self-joins as much as possible, this solution based on the idea of "Recursive Mapping of Twin Tables". Our main goal of Recursive Mapping of Twin Tables (RMTT) approach is divided the main RDF Triple into two tables which have the same structure of RDF Triple and insert the RDF data recursively. Our experimental results compared the performance of join queries in vertically partitioned approach and the RMTT approach using very large RDF data, like DBLP and DBpedia datasets. Our experimental results with a number of complex submitted queries shows that our approach is highly scalable compared with RDF-3X approach and RMTT reduces the number of self-joins especially in complex queries 3-4 times than RDF-3X approach
[ { "version": "v1", "created": "Tue, 16 Sep 2014 05:21:06 GMT" } ]
2014-09-17T00:00:00
[ [ "Sayed", "Awny", "" ], [ "Almaqrashi", "Amal", "" ] ]
TITLE: Scalable and Efficient Self-Join Processing technique in RDF data ABSTRACT: Efficient management of RDF data plays an important role in successfully understanding and fast querying data. Although the current approaches of indexing in RDF Triples such as property tables and vertically partitioned solved many issues; however, they still suffer from the performance in the complex self-join queries and insert data in the same table. As an improvement in this paper, we propose an alternative solution to facilitate flexibility and efficiency in that queries and try to reach to the optimal solution to decrease the self-joins as much as possible, this solution based on the idea of "Recursive Mapping of Twin Tables". Our main goal of Recursive Mapping of Twin Tables (RMTT) approach is divided the main RDF Triple into two tables which have the same structure of RDF Triple and insert the RDF data recursively. Our experimental results compared the performance of join queries in vertically partitioned approach and the RMTT approach using very large RDF data, like DBLP and DBpedia datasets. Our experimental results with a number of complex submitted queries shows that our approach is highly scalable compared with RDF-3X approach and RMTT reduces the number of self-joins especially in complex queries 3-4 times than RDF-3X approach
1409.4698
Charmgil Hong
Charmgil Hong, Iyad Batal, Milos Hauskrecht
A Mixtures-of-Experts Framework for Multi-Label Classification
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a novel probabilistic approach for multi-label classification that is based on the mixtures-of-experts architecture combined with recently introduced conditional tree-structured Bayesian networks. Our approach captures different input-output relations from multi-label data using the efficient tree-structured classifiers, while the mixtures-of-experts architecture aims to compensate for the tree-structured restrictions and build a more accurate model. We develop and present algorithms for learning the model from data and for performing multi-label predictions on future data instances. Experiments on multiple benchmark datasets demonstrate that our approach achieves highly competitive results and outperforms the existing state-of-the-art multi-label classification methods.
[ { "version": "v1", "created": "Tue, 16 Sep 2014 16:52:14 GMT" } ]
2014-09-17T00:00:00
[ [ "Hong", "Charmgil", "" ], [ "Batal", "Iyad", "" ], [ "Hauskrecht", "Milos", "" ] ]
TITLE: A Mixtures-of-Experts Framework for Multi-Label Classification ABSTRACT: We develop a novel probabilistic approach for multi-label classification that is based on the mixtures-of-experts architecture combined with recently introduced conditional tree-structured Bayesian networks. Our approach captures different input-output relations from multi-label data using the efficient tree-structured classifiers, while the mixtures-of-experts architecture aims to compensate for the tree-structured restrictions and build a more accurate model. We develop and present algorithms for learning the model from data and for performing multi-label predictions on future data instances. Experiments on multiple benchmark datasets demonstrate that our approach achieves highly competitive results and outperforms the existing state-of-the-art multi-label classification methods.
1112.5507
Joshua Vogelstein
Joshua T. Vogelstein, John M. Conroy, Vince Lyzinski, Louis J. Podrazik, Steven G. Kratzer, Eric T. Harley, Donniell E. Fishkind, R. Jacob Vogelstein, Carey E. Priebe
Fast Approximate Quadratic Programming for Large (Brain) Graph Matching
17 pages, 5 figures, 2 tables
null
null
null
math.OC cs.DS q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quadratic assignment problems (QAPs) arise in a wide variety of domains, ranging from operations research to graph theory to computer vision to neuroscience. In the age of big data, graph valued data is becoming more prominent, and with it, a desire to run algorithms on ever larger graphs. Because QAP is NP-hard, exact algorithms are intractable. Approximate algorithms necessarily employ an accuracy/efficiency trade-off. We developed a fast approximate quadratic assignment algorithm (FAQ). FAQ finds a local optima in (worst case) time cubic in the number of vertices, similar to other approximate QAP algorithms. We demonstrate empirically that our algorithm is faster and achieves a lower objective value on over 80% of the suite of QAP benchmarks, compared with the previous state-of-the-art. Applying the algorithms to our motivating example, matching C. elegans connectomes (brain-graphs), we find that FAQ achieves the optimal performance in record time, whereas none of the others even find the optimum.
[ { "version": "v1", "created": "Fri, 23 Dec 2011 02:56:26 GMT" }, { "version": "v2", "created": "Thu, 12 Jul 2012 03:44:51 GMT" }, { "version": "v3", "created": "Thu, 15 Nov 2012 04:56:59 GMT" }, { "version": "v4", "created": "Fri, 10 May 2013 01:58:09 GMT" }, { "version": "v5", "created": "Sat, 13 Sep 2014 15:08:28 GMT" } ]
2014-09-16T00:00:00
[ [ "Vogelstein", "Joshua T.", "" ], [ "Conroy", "John M.", "" ], [ "Lyzinski", "Vince", "" ], [ "Podrazik", "Louis J.", "" ], [ "Kratzer", "Steven G.", "" ], [ "Harley", "Eric T.", "" ], [ "Fishkind", "Donniell E.", "" ], [ "Vogelstein", "R. Jacob", "" ], [ "Priebe", "Carey E.", "" ] ]
TITLE: Fast Approximate Quadratic Programming for Large (Brain) Graph Matching ABSTRACT: Quadratic assignment problems (QAPs) arise in a wide variety of domains, ranging from operations research to graph theory to computer vision to neuroscience. In the age of big data, graph valued data is becoming more prominent, and with it, a desire to run algorithms on ever larger graphs. Because QAP is NP-hard, exact algorithms are intractable. Approximate algorithms necessarily employ an accuracy/efficiency trade-off. We developed a fast approximate quadratic assignment algorithm (FAQ). FAQ finds a local optima in (worst case) time cubic in the number of vertices, similar to other approximate QAP algorithms. We demonstrate empirically that our algorithm is faster and achieves a lower objective value on over 80% of the suite of QAP benchmarks, compared with the previous state-of-the-art. Applying the algorithms to our motivating example, matching C. elegans connectomes (brain-graphs), we find that FAQ achieves the optimal performance in record time, whereas none of the others even find the optimum.
1309.1737
Gene Katsevich
Gene Katsevich, Alexander Katsevich, Amit Singer
Covariance Matrix Estimation for the Cryo-EM Heterogeneity Problem
null
null
null
null
math.NA cs.NA physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cryo-electron microscopy (cryo-EM), a microscope generates a top view of a sample of randomly-oriented copies of a molecule. The problem of single particle reconstruction (SPR) from cryo-EM is to use the resulting set of noisy 2D projection images taken at unknown directions to reconstruct the 3D structure of the molecule. In some situations, the molecule under examination exhibits structural variability, which poses a fundamental challenge in SPR. The heterogeneity problem is the task of mapping the space of conformational states of a molecule. It has been previously suggested that the leading eigenvectors of the covariance matrix of the 3D molecules can be used to solve the heterogeneity problem. Estimating the covariance matrix is challenging, since only projections of the molecules are observed, but not the molecules themselves. In this paper, we formulate a general problem of covariance estimation from noisy projections of samples. This problem has intimate connections with matrix completion problems and high-dimensional principal component analysis. We propose an estimator and prove its consistency. When there are finitely many heterogeneity classes, the spectrum of the estimated covariance matrix reveals the number of classes. The estimator can be found as the solution to a certain linear system. In the cryo-EM case, the linear operator to be inverted, which we term the projection covariance transform, is an important object in covariance estimation for tomographic problems involving structural variation. Inverting it involves applying a filter akin to the ramp filter in tomography. We design a basis in which this linear operator is sparse and thus can be tractably inverted despite its large size. We demonstrate via numerical experiments on synthetic datasets the robustness of our algorithm to high levels of noise.
[ { "version": "v1", "created": "Tue, 3 Sep 2013 02:23:53 GMT" }, { "version": "v2", "created": "Sat, 24 May 2014 00:34:30 GMT" }, { "version": "v3", "created": "Fri, 12 Sep 2014 20:29:22 GMT" } ]
2014-09-16T00:00:00
[ [ "Katsevich", "Gene", "" ], [ "Katsevich", "Alexander", "" ], [ "Singer", "Amit", "" ] ]
TITLE: Covariance Matrix Estimation for the Cryo-EM Heterogeneity Problem ABSTRACT: In cryo-electron microscopy (cryo-EM), a microscope generates a top view of a sample of randomly-oriented copies of a molecule. The problem of single particle reconstruction (SPR) from cryo-EM is to use the resulting set of noisy 2D projection images taken at unknown directions to reconstruct the 3D structure of the molecule. In some situations, the molecule under examination exhibits structural variability, which poses a fundamental challenge in SPR. The heterogeneity problem is the task of mapping the space of conformational states of a molecule. It has been previously suggested that the leading eigenvectors of the covariance matrix of the 3D molecules can be used to solve the heterogeneity problem. Estimating the covariance matrix is challenging, since only projections of the molecules are observed, but not the molecules themselves. In this paper, we formulate a general problem of covariance estimation from noisy projections of samples. This problem has intimate connections with matrix completion problems and high-dimensional principal component analysis. We propose an estimator and prove its consistency. When there are finitely many heterogeneity classes, the spectrum of the estimated covariance matrix reveals the number of classes. The estimator can be found as the solution to a certain linear system. In the cryo-EM case, the linear operator to be inverted, which we term the projection covariance transform, is an important object in covariance estimation for tomographic problems involving structural variation. Inverting it involves applying a filter akin to the ramp filter in tomography. We design a basis in which this linear operator is sparse and thus can be tractably inverted despite its large size. We demonstrate via numerical experiments on synthetic datasets the robustness of our algorithm to high levels of noise.
1403.4813
Xianjin Fu
Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong and Ji Wang
MPISE: Symbolic Execution of MPI Programs
25pages, extended version (unpublished!) of paper submitted to ictac 2014. Version 0.2, we carry out experiments using release llvm istead of a debug version one, which makes mpise 10 times faster
null
null
null
cs.DC cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Message Passing Interfaces (MPI) plays an important role in parallel computing. Many parallel applications are implemented as MPI programs. The existing methods of bug detection for MPI programs have the shortage of providing both input and non-determinism coverage, leading to missed bugs. In this paper, we employ symbolic execution to ensure the input coverage, and propose an on-the-fly schedule algorithm to reduce the interleaving explorations for non-determinism coverage, while ensuring the soundness and completeness. We have implemented our approach as a tool, called MPISE, which can automatically detect the deadlock and runtime bugs in MPI programs. The results of the experiments on benchmark programs and real world MPI programs indicate that MPISE finds bugs effectively and efficiently. In addition, our tool also provides diagnostic information and replay mechanism to help understanding bugs.
[ { "version": "v1", "created": "Wed, 19 Mar 2014 14:23:24 GMT" }, { "version": "v2", "created": "Tue, 8 Apr 2014 11:49:01 GMT" }, { "version": "v3", "created": "Mon, 15 Sep 2014 08:21:28 GMT" } ]
2014-09-16T00:00:00
[ [ "Fu", "Xianjin", "" ], [ "Chen", "Zhenbang", "" ], [ "Zhang", "Yufeng", "" ], [ "Huang", "Chun", "" ], [ "Dong", "Wei", "" ], [ "Wang", "Ji", "" ] ]
TITLE: MPISE: Symbolic Execution of MPI Programs ABSTRACT: Message Passing Interfaces (MPI) plays an important role in parallel computing. Many parallel applications are implemented as MPI programs. The existing methods of bug detection for MPI programs have the shortage of providing both input and non-determinism coverage, leading to missed bugs. In this paper, we employ symbolic execution to ensure the input coverage, and propose an on-the-fly schedule algorithm to reduce the interleaving explorations for non-determinism coverage, while ensuring the soundness and completeness. We have implemented our approach as a tool, called MPISE, which can automatically detect the deadlock and runtime bugs in MPI programs. The results of the experiments on benchmark programs and real world MPI programs indicate that MPISE finds bugs effectively and efficiently. In addition, our tool also provides diagnostic information and replay mechanism to help understanding bugs.
1409.3867
Vishwakarma Singh
Vishwakarma Singh and Ambuj K. Singh
Nearest Keyword Set Search in Multi-dimensional Datasets
Accepted as Full Research Paper to ICDE 2014, Chicago, IL, USA
null
null
null
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Keyword-based search in text-rich multi-dimensional datasets facilitates many novel applications and tools. In this paper, we consider objects that are tagged with keywords and are embedded in a vector space. For these datasets, we study queries that ask for the tightest groups of points satisfying a given set of keywords. We propose a novel method called ProMiSH (Projection and Multi Scale Hashing) that uses random projection and hash-based index structures, and achieves high scalability and speedup. We present an exact and an approximate version of the algorithm. Our empirical studies, both on real and synthetic datasets, show that ProMiSH has a speedup of more than four orders over state-of-the-art tree-based techniques. Our scalability tests on datasets of sizes up to 10 million and dimensions up to 100 for queries having up to 9 keywords show that ProMiSH scales linearly with the dataset size, the dataset dimension, the query size, and the result size.
[ { "version": "v1", "created": "Fri, 12 Sep 2014 21:12:16 GMT" } ]
2014-09-16T00:00:00
[ [ "Singh", "Vishwakarma", "" ], [ "Singh", "Ambuj K.", "" ] ]
TITLE: Nearest Keyword Set Search in Multi-dimensional Datasets ABSTRACT: Keyword-based search in text-rich multi-dimensional datasets facilitates many novel applications and tools. In this paper, we consider objects that are tagged with keywords and are embedded in a vector space. For these datasets, we study queries that ask for the tightest groups of points satisfying a given set of keywords. We propose a novel method called ProMiSH (Projection and Multi Scale Hashing) that uses random projection and hash-based index structures, and achieves high scalability and speedup. We present an exact and an approximate version of the algorithm. Our empirical studies, both on real and synthetic datasets, show that ProMiSH has a speedup of more than four orders over state-of-the-art tree-based techniques. Our scalability tests on datasets of sizes up to 10 million and dimensions up to 100 for queries having up to 9 keywords show that ProMiSH scales linearly with the dataset size, the dataset dimension, the query size, and the result size.
1409.3881
Michael Bloodgood
Michael Bloodgood and K. Vijay-Shanker
An Approach to Reducing Annotation Costs for BioNLP
2 pages, 1 figure, 5 tables; appeared in Proceedings of the Workshop on Current Trends in Biomedical Natural Language Processing at ACL (Association for Computational Linguistics) 2008
In Proceedings of the Workshop on Current Trends in Biomedical Natural Language Processing, pages 104-105, Columbus, Ohio, June 2008. Association for Computational Linguistics
null
null
cs.CL cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a broad range of BioNLP tasks for which active learning (AL) can significantly reduce annotation costs and a specific AL algorithm we have developed is particularly effective in reducing annotation costs for these tasks. We have previously developed an AL algorithm called ClosestInitPA that works best with tasks that have the following characteristics: redundancy in training material, burdensome annotation costs, Support Vector Machines (SVMs) work well for the task, and imbalanced datasets (i.e. when set up as a binary classification problem, one class is substantially rarer than the other). Many BioNLP tasks have these characteristics and thus our AL algorithm is a natural approach to apply to BioNLP tasks.
[ { "version": "v1", "created": "Fri, 12 Sep 2014 22:40:38 GMT" } ]
2014-09-16T00:00:00
[ [ "Bloodgood", "Michael", "" ], [ "Vijay-Shanker", "K.", "" ] ]
TITLE: An Approach to Reducing Annotation Costs for BioNLP ABSTRACT: There is a broad range of BioNLP tasks for which active learning (AL) can significantly reduce annotation costs and a specific AL algorithm we have developed is particularly effective in reducing annotation costs for these tasks. We have previously developed an AL algorithm called ClosestInitPA that works best with tasks that have the following characteristics: redundancy in training material, burdensome annotation costs, Support Vector Machines (SVMs) work well for the task, and imbalanced datasets (i.e. when set up as a binary classification problem, one class is substantially rarer than the other). Many BioNLP tasks have these characteristics and thus our AL algorithm is a natural approach to apply to BioNLP tasks.
1409.3913
Jae-Yeong Lee
Jae-Yeong Lee and Wonpil Yu
Concurrent Tracking of Inliers and Outliers
draft
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In object tracking, outlier is one of primary factors which degrade performance of image-based tracking algorithms. In this respect, therefore, most of the existing methods simply discard detected outliers and pay little or no attention to employing them as an important source of information for motion estimation. We consider outliers as important as inliers for object tracking and propose a motion estimation algorithm based on concurrent tracking of inliers and outliers. Our tracker makes use of pyramidal implementation of the Lucas-Kanade tracker to estimate motion flows of inliers and outliers and final target motion is estimated robustly based on both of these information. Experimental results from challenging benchmark video sequences confirm enhanced tracking performance, showing highly stable target tracking under severe occlusion compared with state-of-the-art algorithms. The proposed algorithm runs at more than 100 frames per second even without using a hardware accelerator, which makes the proposed method more practical and portable.
[ { "version": "v1", "created": "Sat, 13 Sep 2014 05:52:36 GMT" } ]
2014-09-16T00:00:00
[ [ "Lee", "Jae-Yeong", "" ], [ "Yu", "Wonpil", "" ] ]
TITLE: Concurrent Tracking of Inliers and Outliers ABSTRACT: In object tracking, outlier is one of primary factors which degrade performance of image-based tracking algorithms. In this respect, therefore, most of the existing methods simply discard detected outliers and pay little or no attention to employing them as an important source of information for motion estimation. We consider outliers as important as inliers for object tracking and propose a motion estimation algorithm based on concurrent tracking of inliers and outliers. Our tracker makes use of pyramidal implementation of the Lucas-Kanade tracker to estimate motion flows of inliers and outliers and final target motion is estimated robustly based on both of these information. Experimental results from challenging benchmark video sequences confirm enhanced tracking performance, showing highly stable target tracking under severe occlusion compared with state-of-the-art algorithms. The proposed algorithm runs at more than 100 frames per second even without using a hardware accelerator, which makes the proposed method more practical and portable.
1409.3924
Yuguang Wang
Yuguang Wang and Feilong Cao and Yubo Yuan
A study on effectiveness of extreme learning machine
null
Neurocomputing, 74(16):2483--2490, 2011
10.1016/j.neucom.2010.11.030
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extreme learning machine (ELM), proposed by Huang et al., has been shown a promising learning algorithm for single-hidden layer feedforward neural networks (SLFNs). Nevertheless, because of the random choice of input weights and biases, the ELM algorithm sometimes makes the hidden layer output matrix H of SLFN not full column rank, which lowers the effectiveness of ELM. This paper discusses the effectiveness of ELM and proposes an improved algorithm called EELM that makes a proper selection of the input weights and bias before calculating the output weights, which ensures the full column rank of H in theory. This improves to some extend the learning rate (testing accuracy, prediction accuracy, learning time) and the robustness property of the networks. The experimental results based on both the benchmark function approximation and real-world problems including classification and regression applications show the good performances of EELM.
[ { "version": "v1", "created": "Sat, 13 Sep 2014 07:47:37 GMT" } ]
2014-09-16T00:00:00
[ [ "Wang", "Yuguang", "" ], [ "Cao", "Feilong", "" ], [ "Yuan", "Yubo", "" ] ]
TITLE: A study on effectiveness of extreme learning machine ABSTRACT: Extreme learning machine (ELM), proposed by Huang et al., has been shown a promising learning algorithm for single-hidden layer feedforward neural networks (SLFNs). Nevertheless, because of the random choice of input weights and biases, the ELM algorithm sometimes makes the hidden layer output matrix H of SLFN not full column rank, which lowers the effectiveness of ELM. This paper discusses the effectiveness of ELM and proposes an improved algorithm called EELM that makes a proper selection of the input weights and bias before calculating the output weights, which ensures the full column rank of H in theory. This improves to some extend the learning rate (testing accuracy, prediction accuracy, learning time) and the robustness property of the networks. The experimental results based on both the benchmark function approximation and real-world problems including classification and regression applications show the good performances of EELM.
1409.4044
Alain Tapp
Alain Tapp
A new approach in machine learning
Preliminary report
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this technical report we presented a novel approach to machine learning. Once the new framework is presented, we will provide a simple and yet very powerful learning algorithm which will be benchmark on various dataset. The framework we proposed is based on booleen circuits; more specifically the classifier produced by our algorithm have that form. Using bits and boolean gates instead of real numbers and multiplication enable the the learning algorithm and classifier to use very efficient boolean vector operations. This enable both the learning algorithm and classifier to be extremely efficient. The accuracy of the classifier we obtain with our framework compares very favorably those produced by conventional techniques, both in terms of efficiency and accuracy.
[ { "version": "v1", "created": "Sun, 14 Sep 2014 10:25:23 GMT" } ]
2014-09-16T00:00:00
[ [ "Tapp", "Alain", "" ] ]
TITLE: A new approach in machine learning ABSTRACT: In this technical report we presented a novel approach to machine learning. Once the new framework is presented, we will provide a simple and yet very powerful learning algorithm which will be benchmark on various dataset. The framework we proposed is based on booleen circuits; more specifically the classifier produced by our algorithm have that form. Using bits and boolean gates instead of real numbers and multiplication enable the the learning algorithm and classifier to use very efficient boolean vector operations. This enable both the learning algorithm and classifier to be extremely efficient. The accuracy of the classifier we obtain with our framework compares very favorably those produced by conventional techniques, both in terms of efficiency and accuracy.
1409.4155
Sicheng Xiong
Sicheng Xiong, R\'omer Rosales, Yuanli Pei, Xiaoli Z. Fern
Active Metric Learning from Relative Comparisons
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work focuses on active learning of distance metrics from relative comparison information. A relative comparison specifies, for a data point triplet $(x_i,x_j,x_k)$, that instance $x_i$ is more similar to $x_j$ than to $x_k$. Such constraints, when available, have been shown to be useful toward defining appropriate distance metrics. In real-world applications, acquiring constraints often require considerable human effort. This motivates us to study how to select and query the most useful relative comparisons to achieve effective metric learning with minimum user effort. Given an underlying class concept that is employed by the user to provide such constraints, we present an information-theoretic criterion that selects the triplet whose answer leads to the highest expected gain in information about the classes of a set of examples. Directly applying the proposed criterion requires examining $O(n^3)$ triplets with $n$ instances, which is prohibitive even for datasets of moderate size. We show that a randomized selection strategy can be used to reduce the selection pool from $O(n^3)$ to $O(n)$, allowing us to scale up to larger-size problems. Experiments show that the proposed method consistently outperforms two baseline policies.
[ { "version": "v1", "created": "Mon, 15 Sep 2014 04:37:46 GMT" } ]
2014-09-16T00:00:00
[ [ "Xiong", "Sicheng", "" ], [ "Rosales", "Rómer", "" ], [ "Pei", "Yuanli", "" ], [ "Fern", "Xiaoli Z.", "" ] ]
TITLE: Active Metric Learning from Relative Comparisons ABSTRACT: This work focuses on active learning of distance metrics from relative comparison information. A relative comparison specifies, for a data point triplet $(x_i,x_j,x_k)$, that instance $x_i$ is more similar to $x_j$ than to $x_k$. Such constraints, when available, have been shown to be useful toward defining appropriate distance metrics. In real-world applications, acquiring constraints often require considerable human effort. This motivates us to study how to select and query the most useful relative comparisons to achieve effective metric learning with minimum user effort. Given an underlying class concept that is employed by the user to provide such constraints, we present an information-theoretic criterion that selects the triplet whose answer leads to the highest expected gain in information about the classes of a set of examples. Directly applying the proposed criterion requires examining $O(n^3)$ triplets with $n$ instances, which is prohibitive even for datasets of moderate size. We show that a randomized selection strategy can be used to reduce the selection pool from $O(n^3)$ to $O(n)$, allowing us to scale up to larger-size problems. Experiments show that the proposed method consistently outperforms two baseline policies.
1409.3206
Petko Georgiev
Petko Georgiev, Nicholas D. Lane, Kiran K. Rachuri, Cecilia Mascolo
DSP.Ear: Leveraging Co-Processor Support for Continuous Audio Sensing on Smartphones
15 pages, 12th ACM Conference on Embedded Network Sensor Systems (SenSys '14)
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapidly growing adoption of sensor-enabled smartphones has greatly fueled the proliferation of applications that use phone sensors to monitor user behavior. A central sensor among these is the microphone which enables, for instance, the detection of valence in speech, or the identification of speakers. Deploying multiple of these applications on a mobile device to continuously monitor the audio environment allows for the acquisition of a diverse range of sound-related contextual inferences. However, the cumulative processing burden critically impacts the phone battery. To address this problem, we propose DSP.Ear - an integrated sensing system that takes advantage of the latest low-power DSP co-processor technology in commodity mobile devices to enable the continuous and simultaneous operation of multiple established algorithms that perform complex audio inferences. The system extracts emotions from voice, estimates the number of people in a room, identifies the speakers, and detects commonly found ambient sounds, while critically incurring little overhead to the device battery. This is achieved through a series of pipeline optimizations that allow the computation to remain largely on the DSP. Through detailed evaluation of our prototype implementation we show that, by exploiting a smartphone's co-processor, DSP.Ear achieves a 3 to 7 times increase in the battery lifetime compared to a solution that uses only the phone's main processor. In addition, DSP.Ear is 2 to 3 times more power efficient than a naive DSP solution without optimizations. We further analyze a large-scale dataset from 1320 Android users to show that in about 80-90% of the daily usage instances DSP.Ear is able to sustain a full day of operation (even in the presence of other smartphone workloads) with a single battery charge.
[ { "version": "v1", "created": "Wed, 10 Sep 2014 19:30:58 GMT" } ]
2014-09-15T00:00:00
[ [ "Georgiev", "Petko", "" ], [ "Lane", "Nicholas D.", "" ], [ "Rachuri", "Kiran K.", "" ], [ "Mascolo", "Cecilia", "" ] ]
TITLE: DSP.Ear: Leveraging Co-Processor Support for Continuous Audio Sensing on Smartphones ABSTRACT: The rapidly growing adoption of sensor-enabled smartphones has greatly fueled the proliferation of applications that use phone sensors to monitor user behavior. A central sensor among these is the microphone which enables, for instance, the detection of valence in speech, or the identification of speakers. Deploying multiple of these applications on a mobile device to continuously monitor the audio environment allows for the acquisition of a diverse range of sound-related contextual inferences. However, the cumulative processing burden critically impacts the phone battery. To address this problem, we propose DSP.Ear - an integrated sensing system that takes advantage of the latest low-power DSP co-processor technology in commodity mobile devices to enable the continuous and simultaneous operation of multiple established algorithms that perform complex audio inferences. The system extracts emotions from voice, estimates the number of people in a room, identifies the speakers, and detects commonly found ambient sounds, while critically incurring little overhead to the device battery. This is achieved through a series of pipeline optimizations that allow the computation to remain largely on the DSP. Through detailed evaluation of our prototype implementation we show that, by exploiting a smartphone's co-processor, DSP.Ear achieves a 3 to 7 times increase in the battery lifetime compared to a solution that uses only the phone's main processor. In addition, DSP.Ear is 2 to 3 times more power efficient than a naive DSP solution without optimizations. We further analyze a large-scale dataset from 1320 Android users to show that in about 80-90% of the daily usage instances DSP.Ear is able to sustain a full day of operation (even in the presence of other smartphone workloads) with a single battery charge.
1409.3225
Saurabh Aggarwal
Saurabh Aggarwal, Joy Kuri
Strategies for Utility Maximization in Social Groups with Preferential Exploration
null
null
null
null
cs.GT cs.DS cs.MA cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a \emph{Social Group} of networked nodes, seeking a "universe" of segments for maximization of their utility. Each node has a subset of the universe, and access to an expensive link for downloading data. Nodes can also acquire the universe by exchanging copies of segments among themselves, at low cost, using inter-node links. While exchanges over inter-node links ensure minimum or negligible cost, some nodes in the group try to exploit the system. We term such nodes as `non-reciprocating nodes' and prohibit such behavior by proposing the "Give-and-Take" criterion, where exchange is allowed iff each participating node has segments unavailable with the other. Following this criterion for inter-node links, each node wants to maximize its utility, which depends on the node's segment set available with the node. Link activation among nodes requires mutual consent of participating nodes. Each node tries to find a pairing partner by preferentially exploring nodes for link formation and unpaired nodes choose to download a segment using the expensive link with segment aggressive probability. We present various linear complexity decentralized algorithms based on \emph{Stable Roommates Problem} that can be used by nodes (as per their behavioral nature) for choosing the best strategy based on available information. Then, we present decentralized randomized algorithm that performs close to optimal for large number of nodes. We define \emph{Price of Choices} for benchmarking performance for social groups (consisting of non-aggressive nodes only). We evaluate performances of various algorithms and characterize the behavioral regime that will yield best results for node and social group, spending the minimal on expensive link. We consider social group consisting of non-aggressive nodes and benchmark performances of proposed algorithms with the optimal.
[ { "version": "v1", "created": "Wed, 10 Sep 2014 20:00:07 GMT" } ]
2014-09-12T00:00:00
[ [ "Aggarwal", "Saurabh", "" ], [ "Kuri", "Joy", "" ] ]
TITLE: Strategies for Utility Maximization in Social Groups with Preferential Exploration ABSTRACT: We consider a \emph{Social Group} of networked nodes, seeking a "universe" of segments for maximization of their utility. Each node has a subset of the universe, and access to an expensive link for downloading data. Nodes can also acquire the universe by exchanging copies of segments among themselves, at low cost, using inter-node links. While exchanges over inter-node links ensure minimum or negligible cost, some nodes in the group try to exploit the system. We term such nodes as `non-reciprocating nodes' and prohibit such behavior by proposing the "Give-and-Take" criterion, where exchange is allowed iff each participating node has segments unavailable with the other. Following this criterion for inter-node links, each node wants to maximize its utility, which depends on the node's segment set available with the node. Link activation among nodes requires mutual consent of participating nodes. Each node tries to find a pairing partner by preferentially exploring nodes for link formation and unpaired nodes choose to download a segment using the expensive link with segment aggressive probability. We present various linear complexity decentralized algorithms based on \emph{Stable Roommates Problem} that can be used by nodes (as per their behavioral nature) for choosing the best strategy based on available information. Then, we present decentralized randomized algorithm that performs close to optimal for large number of nodes. We define \emph{Price of Choices} for benchmarking performance for social groups (consisting of non-aggressive nodes only). We evaluate performances of various algorithms and characterize the behavioral regime that will yield best results for node and social group, spending the minimal on expensive link. We consider social group consisting of non-aggressive nodes and benchmark performances of proposed algorithms with the optimal.
1409.3276
Yingtao Jiang
Bill Jason Tomas, Yingtao Jiang and Mei Yang
Co-Emulation of Scan-Chain Based Designs Utilizing SCE-MI Infrastructure
null
null
null
null
cs.OH
http://creativecommons.org/licenses/publicdomain/
As the complexity of the scan algorithm is dependent on the number of design registers, large SoC scan designs can no longer be verified in RTL simulation unless partitioned into smaller sub-blocks. This paper proposes a methodology to decrease scan-chain verification time utilizing SCE-MI, a widely used communication protocol for emulation, and an FPGA-based emulation platform. A high-level (SystemC) testbench and FPGA synthesizable hardware transactor models are developed for the scan-chain ISCAS89 S400 benchmark circuit for high-speed communication between the host CPU workstation and the FPGA emulator. The emulation results are compared to other verification methodologies (RTL Simulation, Simulation Acceleration, and Transaction-based emulation), and found to be 82% faster than regular RTL simulation. In addition, the emulation runs in the MHz speed range, allowing the incorporation of software applications, drivers, and operating systems, as opposed to the Hz range in RTL simulation or sub-megahertz range as accomplished in transaction-based emulation. In addition, the integration of scan testing and acceleration/emulation platforms allows more complex DFT methods to be developed and tested on a large scale system, decreasing the time to market for products.
[ { "version": "v1", "created": "Wed, 10 Sep 2014 23:25:57 GMT" } ]
2014-09-12T00:00:00
[ [ "Tomas", "Bill Jason", "" ], [ "Jiang", "Yingtao", "" ], [ "Yang", "Mei", "" ] ]
TITLE: Co-Emulation of Scan-Chain Based Designs Utilizing SCE-MI Infrastructure ABSTRACT: As the complexity of the scan algorithm is dependent on the number of design registers, large SoC scan designs can no longer be verified in RTL simulation unless partitioned into smaller sub-blocks. This paper proposes a methodology to decrease scan-chain verification time utilizing SCE-MI, a widely used communication protocol for emulation, and an FPGA-based emulation platform. A high-level (SystemC) testbench and FPGA synthesizable hardware transactor models are developed for the scan-chain ISCAS89 S400 benchmark circuit for high-speed communication between the host CPU workstation and the FPGA emulator. The emulation results are compared to other verification methodologies (RTL Simulation, Simulation Acceleration, and Transaction-based emulation), and found to be 82% faster than regular RTL simulation. In addition, the emulation runs in the MHz speed range, allowing the incorporation of software applications, drivers, and operating systems, as opposed to the Hz range in RTL simulation or sub-megahertz range as accomplished in transaction-based emulation. In addition, the integration of scan testing and acceleration/emulation platforms allows more complex DFT methods to be developed and tested on a large scale system, decreasing the time to market for products.
1409.3367
Gabriel Muller
Gabriel L. Muller
HTML5 WebSocket protocol and its application to distributed computing
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
HTML5 WebSocket protocol brings real time communication in web browsers to a new level. Daily, new products are designed to stay permanently connected to the web. WebSocket is the technology enabling this revolution. WebSockets are supported by all current browsers, but it is still a new technology in constant evolution. WebSockets are slowly replacing older client-server communication technologies. As opposed to comet-like technologies WebSockets' remarkable performances is a result of the protocol's fully duplex nature and because it doesn't rely on HTTP communications. To begin with this paper studies the WebSocket protocol and different WebSocket servers implementations. This first theoretic part focuses more deeply on heterogeneous implementations and OpenCL. The second part is a benchmark of a new promising library. The real-time engine used for testing purposes is SocketCluster. SocketCluster provides a highly scalable WebSocket server that makes use of all available cpu cores on an instance. The scope of this work is reduced to vertical scaling of SocketCluster.
[ { "version": "v1", "created": "Thu, 11 Sep 2014 09:36:46 GMT" } ]
2014-09-12T00:00:00
[ [ "Muller", "Gabriel L.", "" ] ]
TITLE: HTML5 WebSocket protocol and its application to distributed computing ABSTRACT: HTML5 WebSocket protocol brings real time communication in web browsers to a new level. Daily, new products are designed to stay permanently connected to the web. WebSocket is the technology enabling this revolution. WebSockets are supported by all current browsers, but it is still a new technology in constant evolution. WebSockets are slowly replacing older client-server communication technologies. As opposed to comet-like technologies WebSockets' remarkable performances is a result of the protocol's fully duplex nature and because it doesn't rely on HTTP communications. To begin with this paper studies the WebSocket protocol and different WebSocket servers implementations. This first theoretic part focuses more deeply on heterogeneous implementations and OpenCL. The second part is a benchmark of a new promising library. The real-time engine used for testing purposes is SocketCluster. SocketCluster provides a highly scalable WebSocket server that makes use of all available cpu cores on an instance. The scope of this work is reduced to vertical scaling of SocketCluster.
1409.3446
Haimonti Dutta
Haimonti Dutta and Ashwin Srinivasan
Consensus-Based Modelling using Distributed Feature Construction
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A particularly successful role for Inductive Logic Programming (ILP) is as a tool for discovering useful relational features for subsequent use in a predictive model. Conceptually, the case for using ILP to construct relational features rests on treating these features as functions, the automated discovery of which necessarily requires some form of first-order learning. Practically, there are now several reports in the literature that suggest that augmenting any existing features with ILP-discovered relational features can substantially improve the predictive power of a model. While the approach is straightforward enough, much still needs to be done to scale it up to explore more fully the space of possible features that can be constructed by an ILP system. This is in principle, infinite and in practice, extremely large. Applications have been confined to heuristic or random selections from this space. In this paper, we address this computational difficulty by allowing features to be constructed in a distributed manner. That is, there is a network of computational units, each of which employs an ILP engine to construct some small number of features and then builds a (local) model. We then employ a consensus-based algorithm, in which neighboring nodes share information to update local models. For a category of models (those with convex loss functions), it can be shown that the algorithm will result in all nodes converging to a consensus model. In practice, it may be slow to achieve this convergence. Nevertheless, our results on synthetic and real datasets that suggests that in relatively short time the "best" node in the network reaches a model whose predictive accuracy is comparable to that obtained using more computational effort in a non-distributed setting (the best node is identified as the one whose weights converge first).
[ { "version": "v1", "created": "Thu, 11 Sep 2014 14:11:02 GMT" } ]
2014-09-12T00:00:00
[ [ "Dutta", "Haimonti", "" ], [ "Srinivasan", "Ashwin", "" ] ]
TITLE: Consensus-Based Modelling using Distributed Feature Construction ABSTRACT: A particularly successful role for Inductive Logic Programming (ILP) is as a tool for discovering useful relational features for subsequent use in a predictive model. Conceptually, the case for using ILP to construct relational features rests on treating these features as functions, the automated discovery of which necessarily requires some form of first-order learning. Practically, there are now several reports in the literature that suggest that augmenting any existing features with ILP-discovered relational features can substantially improve the predictive power of a model. While the approach is straightforward enough, much still needs to be done to scale it up to explore more fully the space of possible features that can be constructed by an ILP system. This is in principle, infinite and in practice, extremely large. Applications have been confined to heuristic or random selections from this space. In this paper, we address this computational difficulty by allowing features to be constructed in a distributed manner. That is, there is a network of computational units, each of which employs an ILP engine to construct some small number of features and then builds a (local) model. We then employ a consensus-based algorithm, in which neighboring nodes share information to update local models. For a category of models (those with convex loss functions), it can be shown that the algorithm will result in all nodes converging to a consensus model. In practice, it may be slow to achieve this convergence. Nevertheless, our results on synthetic and real datasets that suggests that in relatively short time the "best" node in the network reaches a model whose predictive accuracy is comparable to that obtained using more computational effort in a non-distributed setting (the best node is identified as the one whose weights converge first).
1409.2905
Sunsern Cheamanunkul
Sunsern Cheamanunkul, Evan Ettinger and Yoav Freund
Non-Convex Boosting Overcomes Random Label Noise
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sensitivity of Adaboost to random label noise is a well-studied problem. LogitBoost, BrownBoost and RobustBoost are boosting algorithms claimed to be less sensitive to noise than AdaBoost. We present the results of experiments evaluating these algorithms on both synthetic and real datasets. We compare the performance on each of datasets when the labels are corrupted by different levels of independent label noise. In presence of random label noise, we found that BrownBoost and RobustBoost perform significantly better than AdaBoost and LogitBoost, while the difference between each pair of algorithms is insignificant. We provide an explanation for the difference based on the margin distributions of the algorithms.
[ { "version": "v1", "created": "Tue, 9 Sep 2014 21:36:47 GMT" } ]
2014-09-11T00:00:00
[ [ "Cheamanunkul", "Sunsern", "" ], [ "Ettinger", "Evan", "" ], [ "Freund", "Yoav", "" ] ]
TITLE: Non-Convex Boosting Overcomes Random Label Noise ABSTRACT: The sensitivity of Adaboost to random label noise is a well-studied problem. LogitBoost, BrownBoost and RobustBoost are boosting algorithms claimed to be less sensitive to noise than AdaBoost. We present the results of experiments evaluating these algorithms on both synthetic and real datasets. We compare the performance on each of datasets when the labels are corrupted by different levels of independent label noise. In presence of random label noise, we found that BrownBoost and RobustBoost perform significantly better than AdaBoost and LogitBoost, while the difference between each pair of algorithms is insignificant. We provide an explanation for the difference based on the margin distributions of the algorithms.
1211.1513
Naresh Manwani
Naresh Manwani, P. S. Sastry
K-Plane Regression
null
null
10.1016/j.ins.2014.08.058
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel algorithm for piecewise linear regression which can learn continuous as well as discontinuous piecewise linear functions. The main idea is to repeatedly partition the data and learn a liner model in in each partition. While a simple algorithm incorporating this idea does not work well, an interesting modification results in a good algorithm. The proposed algorithm is similar in spirit to $k$-means clustering algorithm. We show that our algorithm can also be viewed as an EM algorithm for maximum likelihood estimation of parameters under a reasonable probability model. We empirically demonstrate the effectiveness of our approach by comparing its performance with the state of art regression learning algorithms on some real world datasets.
[ { "version": "v1", "created": "Wed, 7 Nov 2012 10:57:38 GMT" }, { "version": "v2", "created": "Wed, 27 Mar 2013 09:00:24 GMT" } ]
2014-09-10T00:00:00
[ [ "Manwani", "Naresh", "" ], [ "Sastry", "P. S.", "" ] ]
TITLE: K-Plane Regression ABSTRACT: In this paper, we present a novel algorithm for piecewise linear regression which can learn continuous as well as discontinuous piecewise linear functions. The main idea is to repeatedly partition the data and learn a liner model in in each partition. While a simple algorithm incorporating this idea does not work well, an interesting modification results in a good algorithm. The proposed algorithm is similar in spirit to $k$-means clustering algorithm. We show that our algorithm can also be viewed as an EM algorithm for maximum likelihood estimation of parameters under a reasonable probability model. We empirically demonstrate the effectiveness of our approach by comparing its performance with the state of art regression learning algorithms on some real world datasets.
1403.1840
Yunchao Gong
Yunchao Gong and Liwei Wang and Ruiqi Guo and Svetlana Lazebnik
Multi-scale Orderless Pooling of Deep Convolutional Activation Features
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep convolutional neural networks (CNN) have shown their promise as a universal representation for recognition. However, global CNN activations lack geometric invariance, which limits their robustness for classification and matching of highly variable scenes. To improve the invariance of CNN activations without degrading their discriminative power, this paper presents a simple but effective scheme called multi-scale orderless pooling (MOP-CNN). This scheme extracts CNN activations for local patches at multiple scale levels, performs orderless VLAD pooling of these activations at each level separately, and concatenates the result. The resulting MOP-CNN representation can be used as a generic feature for either supervised or unsupervised recognition tasks, from image classification to instance-level retrieval; it consistently outperforms global CNN activations without requiring any joint training of prediction layers for a particular target dataset. In absolute terms, it achieves state-of-the-art results on the challenging SUN397 and MIT Indoor Scenes classification datasets, and competitive results on ILSVRC2012/2013 classification and INRIA Holidays retrieval datasets.
[ { "version": "v1", "created": "Fri, 7 Mar 2014 19:03:15 GMT" }, { "version": "v2", "created": "Tue, 8 Jul 2014 17:38:52 GMT" }, { "version": "v3", "created": "Mon, 8 Sep 2014 22:03:21 GMT" } ]
2014-09-10T00:00:00
[ [ "Gong", "Yunchao", "" ], [ "Wang", "Liwei", "" ], [ "Guo", "Ruiqi", "" ], [ "Lazebnik", "Svetlana", "" ] ]
TITLE: Multi-scale Orderless Pooling of Deep Convolutional Activation Features ABSTRACT: Deep convolutional neural networks (CNN) have shown their promise as a universal representation for recognition. However, global CNN activations lack geometric invariance, which limits their robustness for classification and matching of highly variable scenes. To improve the invariance of CNN activations without degrading their discriminative power, this paper presents a simple but effective scheme called multi-scale orderless pooling (MOP-CNN). This scheme extracts CNN activations for local patches at multiple scale levels, performs orderless VLAD pooling of these activations at each level separately, and concatenates the result. The resulting MOP-CNN representation can be used as a generic feature for either supervised or unsupervised recognition tasks, from image classification to instance-level retrieval; it consistently outperforms global CNN activations without requiring any joint training of prediction layers for a particular target dataset. In absolute terms, it achieves state-of-the-art results on the challenging SUN397 and MIT Indoor Scenes classification datasets, and competitive results on ILSVRC2012/2013 classification and INRIA Holidays retrieval datasets.
1409.2465
Ives Rey-Otero
Ives Rey-Otero, Mauricio Delbracio, Jean-Michel Morel
Comparing Feature Detectors: A bias in the repeatability criteria, and how to correct it
Fixed typo in affiliations
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most computer vision application rely on algorithms finding local correspondences between different images. These algorithms detect and compare stable local invariant descriptors centered at scale-invariant keypoints. Because of the importance of the problem, new keypoint detectors and descriptors are constantly being proposed, each one claiming to perform better (or to be complementary) to the preceding ones. This raises the question of a fair comparison between very diverse methods. This evaluation has been mainly based on a repeatability criterion of the keypoints under a series of image perturbations (blur, illumination, noise, rotations, homotheties, homographies, etc). In this paper, we argue that the classic repeatability criterion is biased towards algorithms producing redundant overlapped detections. To compensate this bias, we propose a variant of the repeatability rate taking into account the descriptors overlap. We apply this variant to revisit the popular benchmark by Mikolajczyk et al., on classic and new feature detectors. Experimental evidence shows that the hierarchy of these feature detectors is severely disrupted by the amended comparator.
[ { "version": "v1", "created": "Mon, 8 Sep 2014 19:02:01 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2014 08:12:35 GMT" } ]
2014-09-10T00:00:00
[ [ "Rey-Otero", "Ives", "" ], [ "Delbracio", "Mauricio", "" ], [ "Morel", "Jean-Michel", "" ] ]
TITLE: Comparing Feature Detectors: A bias in the repeatability criteria, and how to correct it ABSTRACT: Most computer vision application rely on algorithms finding local correspondences between different images. These algorithms detect and compare stable local invariant descriptors centered at scale-invariant keypoints. Because of the importance of the problem, new keypoint detectors and descriptors are constantly being proposed, each one claiming to perform better (or to be complementary) to the preceding ones. This raises the question of a fair comparison between very diverse methods. This evaluation has been mainly based on a repeatability criterion of the keypoints under a series of image perturbations (blur, illumination, noise, rotations, homotheties, homographies, etc). In this paper, we argue that the classic repeatability criterion is biased towards algorithms producing redundant overlapped detections. To compensate this bias, we propose a variant of the repeatability rate taking into account the descriptors overlap. We apply this variant to revisit the popular benchmark by Mikolajczyk et al., on classic and new feature detectors. Experimental evidence shows that the hierarchy of these feature detectors is severely disrupted by the amended comparator.
1409.2778
Matteo Camilli M.Sc.
Matteo Camilli
Verification of Reachability Problems for Time Basic Petri Nets
21 pages. arXiv admin note: substantial text overlap with arXiv:1107.1166 by other authors
null
null
null
cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-Basic Petri nets, is a powerful formalism for model- ing real-time systems where time constraints are expressed through time functions of marking's time description associated with transition, representing possible firing times. We introduce a technique for reachability analysis based on the building of finite contraction of the infinite state space associated with such a models. The technique constructs a finite symbolic reachability graph relying on a sort of time coverage, and over- comes the limitations of the existing available analyzers for Time-Basic nets, based in turn on a time-bounded inspection of a (possibly infinite) reachability-tree. A key feature of the technique is the introduction of the Time Anonymous concept, which allows the identification of components not influencing the evolution of a model. A running example is used throughout the paper to sketch the symbolic graph construction. The graph construction algorithm has been automated by a Java tool-set, described in the paper together with its main functionality and analysis capability. A use case describing a real-world example has been employed to benchmark the technique and the tool-set. The main outcome of this test are also presented in the paper.
[ { "version": "v1", "created": "Tue, 9 Sep 2014 15:31:00 GMT" } ]
2014-09-10T00:00:00
[ [ "Camilli", "Matteo", "" ] ]
TITLE: Verification of Reachability Problems for Time Basic Petri Nets ABSTRACT: Time-Basic Petri nets, is a powerful formalism for model- ing real-time systems where time constraints are expressed through time functions of marking's time description associated with transition, representing possible firing times. We introduce a technique for reachability analysis based on the building of finite contraction of the infinite state space associated with such a models. The technique constructs a finite symbolic reachability graph relying on a sort of time coverage, and over- comes the limitations of the existing available analyzers for Time-Basic nets, based in turn on a time-bounded inspection of a (possibly infinite) reachability-tree. A key feature of the technique is the introduction of the Time Anonymous concept, which allows the identification of components not influencing the evolution of a model. A running example is used throughout the paper to sketch the symbolic graph construction. The graph construction algorithm has been automated by a Java tool-set, described in the paper together with its main functionality and analysis capability. A use case describing a real-world example has been employed to benchmark the technique and the tool-set. The main outcome of this test are also presented in the paper.
1409.2800
Toufiq Parag
Toufiq Parag
Enforcing Label and Intensity Consistency for IR Target Detection
First appeared in OTCBVS 2011 \cite{parag11otcbvs}. This manuscript presents updated results and an extension
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study formulates the IR target detection as a binary classification problem of each pixel. Each pixel is associated with a label which indicates whether it is a target or background pixel. The optimal label set for all the pixels of an image maximizes aposteriori distribution of label configuration given the pixel intensities. The posterior probability is factored into (or proportional to) a conditional likelihood of the intensity values and a prior probability of label configuration. Each of these two probabilities are computed assuming a Markov Random Field (MRF) on both pixel intensities and their labels. In particular, this study enforces neighborhood dependency on both intensity values, by a Simultaneous Auto Regressive (SAR) model, and on labels, by an Auto-Logistic model. The parameters of these MRF models are learned from labeled examples. During testing, an MRF inference technique, namely Iterated Conditional Mode (ICM), produces the optimal label for each pixel. The detection performance is further improved by incorporating temporal information through background subtraction. High performances on benchmark datasets demonstrate effectiveness of this method for IR target detection.
[ { "version": "v1", "created": "Tue, 9 Sep 2014 16:20:08 GMT" } ]
2014-09-10T00:00:00
[ [ "Parag", "Toufiq", "" ] ]
TITLE: Enforcing Label and Intensity Consistency for IR Target Detection ABSTRACT: This study formulates the IR target detection as a binary classification problem of each pixel. Each pixel is associated with a label which indicates whether it is a target or background pixel. The optimal label set for all the pixels of an image maximizes aposteriori distribution of label configuration given the pixel intensities. The posterior probability is factored into (or proportional to) a conditional likelihood of the intensity values and a prior probability of label configuration. Each of these two probabilities are computed assuming a Markov Random Field (MRF) on both pixel intensities and their labels. In particular, this study enforces neighborhood dependency on both intensity values, by a Simultaneous Auto Regressive (SAR) model, and on labels, by an Auto-Logistic model. The parameters of these MRF models are learned from labeled examples. During testing, an MRF inference technique, namely Iterated Conditional Mode (ICM), produces the optimal label for each pixel. The detection performance is further improved by incorporating temporal information through background subtraction. High performances on benchmark datasets demonstrate effectiveness of this method for IR target detection.
1409.1320
Wei Ping
Wei Ping, Qiang Liu, Alexander Ihler
Marginal Structured SVM with Hidden Variables
Accepted by the 31st International Conference on Machine Learning (ICML 2014). 12 pages version with supplement
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose the marginal structured SVM (MSSVM) for structured prediction with hidden variables. MSSVM properly accounts for the uncertainty of hidden variables, and can significantly outperform the previously proposed latent structured SVM (LSSVM; Yu & Joachims (2009)) and other state-of-art methods, especially when that uncertainty is large. Our method also results in a smoother objective function, making gradient-based optimization of MSSVMs converge significantly faster than for LSSVMs. We also show that our method consistently outperforms hidden conditional random fields (HCRFs; Quattoni et al. (2007)) on both simulated and real-world datasets. Furthermore, we propose a unified framework that includes both our and several other existing methods as special cases, and provides insights into the comparison of different models in practice.
[ { "version": "v1", "created": "Thu, 4 Sep 2014 05:06:34 GMT" }, { "version": "v2", "created": "Fri, 5 Sep 2014 21:13:36 GMT" } ]
2014-09-09T00:00:00
[ [ "Ping", "Wei", "" ], [ "Liu", "Qiang", "" ], [ "Ihler", "Alexander", "" ] ]
TITLE: Marginal Structured SVM with Hidden Variables ABSTRACT: In this work, we propose the marginal structured SVM (MSSVM) for structured prediction with hidden variables. MSSVM properly accounts for the uncertainty of hidden variables, and can significantly outperform the previously proposed latent structured SVM (LSSVM; Yu & Joachims (2009)) and other state-of-art methods, especially when that uncertainty is large. Our method also results in a smoother objective function, making gradient-based optimization of MSSVMs converge significantly faster than for LSSVMs. We also show that our method consistently outperforms hidden conditional random fields (HCRFs; Quattoni et al. (2007)) on both simulated and real-world datasets. Furthermore, we propose a unified framework that includes both our and several other existing methods as special cases, and provides insights into the comparison of different models in practice.
1409.2002
Saba Babakhani
Saba Babakhani, Niloofar Mozaffari and Ali Hamzeh
A Martingale Approach to Detect Peak of News in Social Network
null
null
null
null
cs.SI physics.soc-ph
http://creativecommons.org/licenses/by/3.0/
Nowadays, social medias such as Twitter, Memetracker and Blogs have become powerful tools to propagate information. They facilitate quick dissemination sequence of information such as news article, blog posts, user's interests and thoughts through large scale. Providing strong means to analyzing social networks structure and how information diffuse through them is essential. Many recent studies emphasize on modeling information diffusion and their patterns to gain some useful knowledge. In this paper, we propose a statistical approach to online detect peak points of news when spread over social networks, to the best of our knowledge has never investigated before. The proposed model use martingale approach to predict peak points when news reached the peak of its popularity. Experimental results on real datasets show good performance of our approach to online detect these peak points.
[ { "version": "v1", "created": "Sat, 6 Sep 2014 10:30:20 GMT" } ]
2014-09-09T00:00:00
[ [ "Babakhani", "Saba", "" ], [ "Mozaffari", "Niloofar", "" ], [ "Hamzeh", "Ali", "" ] ]
TITLE: A Martingale Approach to Detect Peak of News in Social Network ABSTRACT: Nowadays, social medias such as Twitter, Memetracker and Blogs have become powerful tools to propagate information. They facilitate quick dissemination sequence of information such as news article, blog posts, user's interests and thoughts through large scale. Providing strong means to analyzing social networks structure and how information diffuse through them is essential. Many recent studies emphasize on modeling information diffusion and their patterns to gain some useful knowledge. In this paper, we propose a statistical approach to online detect peak points of news when spread over social networks, to the best of our knowledge has never investigated before. The proposed model use martingale approach to predict peak points when news reached the peak of its popularity. Experimental results on real datasets show good performance of our approach to online detect these peak points.
1409.2287
Andreas Damianou Mr
Andreas C. Damianou, Michalis K. Titsias, Neil D. Lawrence
Variational Inference for Uncertainty on the Inputs of Gaussian Process Models
51 pages (of which 10 is Appendix), 19 figures
null
null
null
stat.ML cs.AI cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Gaussian process latent variable model (GP-LVM) provides a flexible approach for non-linear dimensionality reduction that has been widely applied. However, the current approach for training GP-LVMs is based on maximum likelihood, where the latent projection variables are maximized over rather than integrated out. In this paper we present a Bayesian method for training GP-LVMs by introducing a non-standard variational inference framework that allows to approximately integrate out the latent variables and subsequently train a GP-LVM by maximizing an analytic lower bound on the exact marginal likelihood. We apply this method for learning a GP-LVM from iid observations and for learning non-linear dynamical systems where the observations are temporally correlated. We show that a benefit of the variational Bayesian procedure is its robustness to overfitting and its ability to automatically select the dimensionality of the nonlinear latent space. The resulting framework is generic, flexible and easy to extend for other purposes, such as Gaussian process regression with uncertain inputs and semi-supervised Gaussian processes. We demonstrate our method on synthetic data and standard machine learning benchmarks, as well as challenging real world datasets, including high resolution video data.
[ { "version": "v1", "created": "Mon, 8 Sep 2014 10:47:23 GMT" } ]
2014-09-09T00:00:00
[ [ "Damianou", "Andreas C.", "" ], [ "Titsias", "Michalis K.", "" ], [ "Lawrence", "Neil D.", "" ] ]
TITLE: Variational Inference for Uncertainty on the Inputs of Gaussian Process Models ABSTRACT: The Gaussian process latent variable model (GP-LVM) provides a flexible approach for non-linear dimensionality reduction that has been widely applied. However, the current approach for training GP-LVMs is based on maximum likelihood, where the latent projection variables are maximized over rather than integrated out. In this paper we present a Bayesian method for training GP-LVMs by introducing a non-standard variational inference framework that allows to approximately integrate out the latent variables and subsequently train a GP-LVM by maximizing an analytic lower bound on the exact marginal likelihood. We apply this method for learning a GP-LVM from iid observations and for learning non-linear dynamical systems where the observations are temporally correlated. We show that a benefit of the variational Bayesian procedure is its robustness to overfitting and its ability to automatically select the dimensionality of the nonlinear latent space. The resulting framework is generic, flexible and easy to extend for other purposes, such as Gaussian process regression with uncertain inputs and semi-supervised Gaussian processes. We demonstrate our method on synthetic data and standard machine learning benchmarks, as well as challenging real world datasets, including high resolution video data.
1409.2450
Robert West
Robert West, Hristo S. Paskov, Jure Leskovec, Christopher Potts
Exploiting Social Network Structure for Person-to-Person Sentiment Analysis
null
null
null
null
cs.SI cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Person-to-person evaluations are prevalent in all kinds of discourse and important for establishing reputations, building social bonds, and shaping public opinion. Such evaluations can be analyzed separately using signed social networks and textual sentiment analysis, but this misses the rich interactions between language and social context. To capture such interactions, we develop a model that predicts individual A's opinion of individual B by synthesizing information from the signed social network in which A and B are embedded with sentiment analysis of the evaluative texts relating A to B. We prove that this problem is NP-hard but can be relaxed to an efficiently solvable hinge-loss Markov random field, and we show that this implementation outperforms text-only and network-only versions in two very different datasets involving community-level decision-making: the Wikipedia Requests for Adminship corpus and the Convote U.S. Congressional speech corpus.
[ { "version": "v1", "created": "Mon, 8 Sep 2014 18:14:16 GMT" } ]
2014-09-09T00:00:00
[ [ "West", "Robert", "" ], [ "Paskov", "Hristo S.", "" ], [ "Leskovec", "Jure", "" ], [ "Potts", "Christopher", "" ] ]
TITLE: Exploiting Social Network Structure for Person-to-Person Sentiment Analysis ABSTRACT: Person-to-person evaluations are prevalent in all kinds of discourse and important for establishing reputations, building social bonds, and shaping public opinion. Such evaluations can be analyzed separately using signed social networks and textual sentiment analysis, but this misses the rich interactions between language and social context. To capture such interactions, we develop a model that predicts individual A's opinion of individual B by synthesizing information from the signed social network in which A and B are embedded with sentiment analysis of the evaluative texts relating A to B. We prove that this problem is NP-hard but can be relaxed to an efficiently solvable hinge-loss Markov random field, and we show that this implementation outperforms text-only and network-only versions in two very different datasets involving community-level decision-making: the Wikipedia Requests for Adminship corpus and the Convote U.S. Congressional speech corpus.
1406.3676
Jason Weston
Antoine Bordes, Sumit Chopra, Jason Weston
Question Answering with Subgraph Embeddings
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper presents a system which learns to answer questions on a broad range of topics from a knowledge base using few hand-crafted features. Our model learns low-dimensional embeddings of words and knowledge base constituents; these representations are used to score natural language questions against candidate answers. Training our system using pairs of questions and structured representations of their answers, and pairs of question paraphrases, yields competitive results on a competitive benchmark of the literature.
[ { "version": "v1", "created": "Sat, 14 Jun 2014 03:00:23 GMT" }, { "version": "v2", "created": "Wed, 3 Sep 2014 01:02:11 GMT" }, { "version": "v3", "created": "Thu, 4 Sep 2014 00:25:35 GMT" } ]
2014-09-05T00:00:00
[ [ "Bordes", "Antoine", "" ], [ "Chopra", "Sumit", "" ], [ "Weston", "Jason", "" ] ]
TITLE: Question Answering with Subgraph Embeddings ABSTRACT: This paper presents a system which learns to answer questions on a broad range of topics from a knowledge base using few hand-crafted features. Our model learns low-dimensional embeddings of words and knowledge base constituents; these representations are used to score natural language questions against candidate answers. Training our system using pairs of questions and structured representations of their answers, and pairs of question paraphrases, yields competitive results on a competitive benchmark of the literature.
1301.2774
Jafar Muhammadi
Jafar Muhammadi, Hamid Reza Rabiee and Abbas Hosseini
Crowd Labeling: a survey
Under consideration for publication in Knowledge and Information Systems
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, there has been a burst in the number of research projects on human computation via crowdsourcing. Multiple choice (or labeling) questions could be referred to as a common type of problem which is solved by this approach. As an application, crowd labeling is applied to find true labels for large machine learning datasets. Since crowds are not necessarily experts, the labels they provide are rather noisy and erroneous. This challenge is usually resolved by collecting multiple labels for each sample, and then aggregating them to estimate the true label. Although the mechanism leads to high-quality labels, it is not actually cost-effective. As a result, efforts are currently made to maximize the accuracy in estimating true labels, while fixing the number of acquired labels. This paper surveys methods to aggregate redundant crowd labels in order to estimate unknown true labels. It presents a unified statistical latent model where the differences among popular methods in the field correspond to different choices for the parameters of the model. Afterwards, algorithms to make inference on these models will be surveyed. Moreover, adaptive methods which iteratively collect labels based on the previously collected labels and estimated models will be discussed. In addition, this paper compares the distinguished methods, and provides guidelines for future work required to address the current open issues.
[ { "version": "v1", "created": "Sun, 13 Jan 2013 14:12:53 GMT" }, { "version": "v2", "created": "Tue, 8 Apr 2014 05:59:49 GMT" }, { "version": "v3", "created": "Wed, 3 Sep 2014 06:37:23 GMT" } ]
2014-09-04T00:00:00
[ [ "Muhammadi", "Jafar", "" ], [ "Rabiee", "Hamid Reza", "" ], [ "Hosseini", "Abbas", "" ] ]
TITLE: Crowd Labeling: a survey ABSTRACT: Recently, there has been a burst in the number of research projects on human computation via crowdsourcing. Multiple choice (or labeling) questions could be referred to as a common type of problem which is solved by this approach. As an application, crowd labeling is applied to find true labels for large machine learning datasets. Since crowds are not necessarily experts, the labels they provide are rather noisy and erroneous. This challenge is usually resolved by collecting multiple labels for each sample, and then aggregating them to estimate the true label. Although the mechanism leads to high-quality labels, it is not actually cost-effective. As a result, efforts are currently made to maximize the accuracy in estimating true labels, while fixing the number of acquired labels. This paper surveys methods to aggregate redundant crowd labels in order to estimate unknown true labels. It presents a unified statistical latent model where the differences among popular methods in the field correspond to different choices for the parameters of the model. Afterwards, algorithms to make inference on these models will be surveyed. Moreover, adaptive methods which iteratively collect labels based on the previously collected labels and estimated models will be discussed. In addition, this paper compares the distinguished methods, and provides guidelines for future work required to address the current open issues.
1405.7718
Sajan Goud Lingala
Sajan Goud Lingala, Edward DiBella, Mathews Jacob
Deformation corrected compressed sensing (DC-CS): a novel framework for accelerated dynamic MRI
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel deformation corrected compressed sensing (DC-CS) framework to recover dynamic magnetic resonance images from undersampled measurements. We introduce a generalized formulation that is capable of handling a wide class of sparsity/compactness priors on the deformation corrected dynamic signal. In this work, we consider example compactness priors such as sparsity in temporal Fourier domain, sparsity in temporal finite difference domain, and nuclear norm penalty to exploit low rank structure. Using variable splitting, we decouple the complex optimization problem to simpler and well understood sub problems; the resulting algorithm alternates between simple steps of shrinkage based denoising, deformable registration, and a quadratic optimization step. Additionally, we employ efficient continuation strategies to minimize the risk of convergence to local minima. The proposed formulation contrasts with existing DC-CS schemes that are customized for free breathing cardiac cine applications, and other schemes that rely on fully sampled reference frames or navigator signals to estimate the deformation parameters. The efficient decoupling enabled by the proposed scheme allows its application to a wide range of applications including contrast enhanced dynamic MRI. Through experiments on numerical phantom and in vivo myocardial perfusion MRI datasets, we demonstrate the utility of the proposed DC-CS scheme in providing robust reconstructions with reduced motion artifacts over classical compressed sensing schemes that utilize the compact priors on the original deformation un-corrected signal.
[ { "version": "v1", "created": "Thu, 29 May 2014 20:36:39 GMT" }, { "version": "v2", "created": "Tue, 2 Sep 2014 23:03:52 GMT" } ]
2014-09-04T00:00:00
[ [ "Lingala", "Sajan Goud", "" ], [ "DiBella", "Edward", "" ], [ "Jacob", "Mathews", "" ] ]
TITLE: Deformation corrected compressed sensing (DC-CS): a novel framework for accelerated dynamic MRI ABSTRACT: We propose a novel deformation corrected compressed sensing (DC-CS) framework to recover dynamic magnetic resonance images from undersampled measurements. We introduce a generalized formulation that is capable of handling a wide class of sparsity/compactness priors on the deformation corrected dynamic signal. In this work, we consider example compactness priors such as sparsity in temporal Fourier domain, sparsity in temporal finite difference domain, and nuclear norm penalty to exploit low rank structure. Using variable splitting, we decouple the complex optimization problem to simpler and well understood sub problems; the resulting algorithm alternates between simple steps of shrinkage based denoising, deformable registration, and a quadratic optimization step. Additionally, we employ efficient continuation strategies to minimize the risk of convergence to local minima. The proposed formulation contrasts with existing DC-CS schemes that are customized for free breathing cardiac cine applications, and other schemes that rely on fully sampled reference frames or navigator signals to estimate the deformation parameters. The efficient decoupling enabled by the proposed scheme allows its application to a wide range of applications including contrast enhanced dynamic MRI. Through experiments on numerical phantom and in vivo myocardial perfusion MRI datasets, we demonstrate the utility of the proposed DC-CS scheme in providing robust reconstructions with reduced motion artifacts over classical compressed sensing schemes that utilize the compact priors on the original deformation un-corrected signal.
1408.5882
Yoon Kim
Yoon Kim
Convolutional Neural Networks for Sentence Classification
To appear in EMNLP 2014
null
null
null
cs.CL cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on a series of experiments with convolutional neural networks (CNN) trained on top of pre-trained word vectors for sentence-level classification tasks. We show that a simple CNN with little hyperparameter tuning and static vectors achieves excellent results on multiple benchmarks. Learning task-specific vectors through fine-tuning offers further gains in performance. We additionally propose a simple modification to the architecture to allow for the use of both task-specific and static vectors. The CNN models discussed herein improve upon the state of the art on 4 out of 7 tasks, which include sentiment analysis and question classification.
[ { "version": "v1", "created": "Mon, 25 Aug 2014 19:48:04 GMT" }, { "version": "v2", "created": "Wed, 3 Sep 2014 03:09:02 GMT" } ]
2014-09-04T00:00:00
[ [ "Kim", "Yoon", "" ] ]
TITLE: Convolutional Neural Networks for Sentence Classification ABSTRACT: We report on a series of experiments with convolutional neural networks (CNN) trained on top of pre-trained word vectors for sentence-level classification tasks. We show that a simple CNN with little hyperparameter tuning and static vectors achieves excellent results on multiple benchmarks. Learning task-specific vectors through fine-tuning offers further gains in performance. We additionally propose a simple modification to the architecture to allow for the use of both task-specific and static vectors. The CNN models discussed herein improve upon the state of the art on 4 out of 7 tasks, which include sentiment analysis and question classification.
1409.0908
Anh Tran
Anh Tran, Jinyan Guan, Thanima Pilantanakitti, Paul Cohen
Action Recognition in the Frequency Domain
Keywords: Artificial Intelligence, Computer Vision, Action Recognition
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe a simple strategy for mitigating variability in temporal data series by shifting focus onto long-term, frequency domain features that are less susceptible to variability. We apply this method to the human action recognition task and demonstrate how working in the frequency domain can yield good recognition features for commonly used optical flow and articulated pose features, which are highly sensitive to small differences in motion, viewpoint, dynamic backgrounds, occlusion and other sources of variability. We show how these frequency-based features can be used in combination with a simple forest classifier to achieve good and robust results on the popular KTH Actions dataset.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 22:34:29 GMT" } ]
2014-09-04T00:00:00
[ [ "Tran", "Anh", "" ], [ "Guan", "Jinyan", "" ], [ "Pilantanakitti", "Thanima", "" ], [ "Cohen", "Paul", "" ] ]
TITLE: Action Recognition in the Frequency Domain ABSTRACT: In this paper, we describe a simple strategy for mitigating variability in temporal data series by shifting focus onto long-term, frequency domain features that are less susceptible to variability. We apply this method to the human action recognition task and demonstrate how working in the frequency domain can yield good recognition features for commonly used optical flow and articulated pose features, which are highly sensitive to small differences in motion, viewpoint, dynamic backgrounds, occlusion and other sources of variability. We show how these frequency-based features can be used in combination with a simple forest classifier to achieve good and robust results on the popular KTH Actions dataset.
1409.0923
Ahmad Hassanat
Ahmad Basheer Hassanat
Dimensionality Invariant Similarity Measure
(ISSN: 1545-1003). http://www.jofamericanscience.org
J Am Sci 2014;10(8):221-226
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new similarity measure to be used for general tasks including supervised learning, which is represented by the K-nearest neighbor classifier (KNN). The proposed similarity measure is invariant to large differences in some dimensions in the feature space. The proposed metric is proved mathematically to be a metric. To test its viability for different applications, the KNN used the proposed metric for classifying test examples chosen from a number of real datasets. Compared to some other well known metrics, the experimental results show that the proposed metric is a promising distance measure for the KNN classifier with strong potential for a wide range of applications.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 23:45:29 GMT" } ]
2014-09-04T00:00:00
[ [ "Hassanat", "Ahmad Basheer", "" ] ]
TITLE: Dimensionality Invariant Similarity Measure ABSTRACT: This paper presents a new similarity measure to be used for general tasks including supervised learning, which is represented by the K-nearest neighbor classifier (KNN). The proposed similarity measure is invariant to large differences in some dimensions in the feature space. The proposed metric is proved mathematically to be a metric. To test its viability for different applications, the KNN used the proposed metric for classifying test examples chosen from a number of real datasets. Compared to some other well known metrics, the experimental results show that the proposed metric is a promising distance measure for the KNN classifier with strong potential for a wide range of applications.
1409.0973
Jin-Kao Hao
Xiangjing Lai, Zhipeng Lu, Jin-Kao Hao, Fred Glover, Liping Xu
Path Relinking for Bandwidth Coloring Problem
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Path Relinking algorithm is proposed for the Bandwidth Coloring problem and the Bandwidth MultiColoring problem. It combines a population based relinking method and a tabu search based local search procedure. The proposed algorithm is assessed on two sets of 66 benchmark instances commonly used in the literature. Computational results demonstrate that the proposed algorithm is highly competitive in terms of both solution quality and efficiency compared to the best performing algorithms in the literature. Specifically, it improves the previous best known results for 15 out of 66 instances, while matching the previous best known results for 47 cases. Some key elements of the proposed algorithm are investigated.
[ { "version": "v1", "created": "Wed, 3 Sep 2014 07:17:16 GMT" } ]
2014-09-04T00:00:00
[ [ "Lai", "Xiangjing", "" ], [ "Lu", "Zhipeng", "" ], [ "Hao", "Jin-Kao", "" ], [ "Glover", "Fred", "" ], [ "Xu", "Liping", "" ] ]
TITLE: Path Relinking for Bandwidth Coloring Problem ABSTRACT: A Path Relinking algorithm is proposed for the Bandwidth Coloring problem and the Bandwidth MultiColoring problem. It combines a population based relinking method and a tabu search based local search procedure. The proposed algorithm is assessed on two sets of 66 benchmark instances commonly used in the literature. Computational results demonstrate that the proposed algorithm is highly competitive in terms of both solution quality and efficiency compared to the best performing algorithms in the literature. Specifically, it improves the previous best known results for 15 out of 66 instances, while matching the previous best known results for 47 cases. Some key elements of the proposed algorithm are investigated.
1409.1057
Uwe Aickelin
Alexandros Ladas, Jonathan M. Garibaldi, Rodrigo Scarpel and Uwe Aickelin
Augmented Neural Networks for Modelling Consumer Indebtness
Proceedings of the 2014 World Congress on Computational Intelligence (WCCI 2014), pp. 3086-3093, 2014
null
null
null
cs.CE cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consumer Debt has risen to be an important problem of modern societies, generating a lot of research in order to understand the nature of consumer indebtness, which so far its modelling has been carried out by statistical models. In this work we show that Computational Intelligence can offer a more holistic approach that is more suitable for the complex relationships an indebtness dataset has and Linear Regression cannot uncover. In particular, as our results show, Neural Networks achieve the best performance in modelling consumer indebtness, especially when they manage to incorporate the significant and experimentally verified results of the Data Mining process in the model, exploiting the flexibility Neural Networks offer in designing their topology. This novel method forms an elaborate framework to model Consumer indebtness that can be extended to any other real world application.
[ { "version": "v1", "created": "Wed, 3 Sep 2014 12:23:50 GMT" } ]
2014-09-04T00:00:00
[ [ "Ladas", "Alexandros", "" ], [ "Garibaldi", "Jonathan M.", "" ], [ "Scarpel", "Rodrigo", "" ], [ "Aickelin", "Uwe", "" ] ]
TITLE: Augmented Neural Networks for Modelling Consumer Indebtness ABSTRACT: Consumer Debt has risen to be an important problem of modern societies, generating a lot of research in order to understand the nature of consumer indebtness, which so far its modelling has been carried out by statistical models. In this work we show that Computational Intelligence can offer a more holistic approach that is more suitable for the complex relationships an indebtness dataset has and Linear Regression cannot uncover. In particular, as our results show, Neural Networks achieve the best performance in modelling consumer indebtness, especially when they manage to incorporate the significant and experimentally verified results of the Data Mining process in the model, exploiting the flexibility Neural Networks offer in designing their topology. This novel method forms an elaborate framework to model Consumer indebtness that can be extended to any other real world application.
1409.1143
Narine Manukyan
Narine Manukyan, Margaret J. Eppstein, and Jeffrey S. Buzas
Tunably Rugged Landscapes with Known Maximum and Minimum
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose NM landscapes as a new class of tunably rugged benchmark problems. NM landscapes are well-defined on alphabets of any arity, including both discrete and real-valued alphabets, include epistasis in a natural and transparent manner, are proven to have known value and location of the global maximum and, with some additional constraints, are proven to also have a known global minimum. Empirical studies are used to illustrate that, when coefficients are selected from a recommended distribution, the ruggedness of NM landscapes is smoothly tunable and correlates with several measures of search difficulty. We discuss why these properties make NM landscapes preferable to both NK landscapes and Walsh polynomials as benchmark landscape models with tunable epistasis.
[ { "version": "v1", "created": "Wed, 3 Sep 2014 16:20:43 GMT" } ]
2014-09-04T00:00:00
[ [ "Manukyan", "Narine", "" ], [ "Eppstein", "Margaret J.", "" ], [ "Buzas", "Jeffrey S.", "" ] ]
TITLE: Tunably Rugged Landscapes with Known Maximum and Minimum ABSTRACT: We propose NM landscapes as a new class of tunably rugged benchmark problems. NM landscapes are well-defined on alphabets of any arity, including both discrete and real-valued alphabets, include epistasis in a natural and transparent manner, are proven to have known value and location of the global maximum and, with some additional constraints, are proven to also have a known global minimum. Empirical studies are used to illustrate that, when coefficients are selected from a recommended distribution, the ruggedness of NM landscapes is smoothly tunable and correlates with several measures of search difficulty. We discuss why these properties make NM landscapes preferable to both NK landscapes and Walsh polynomials as benchmark landscape models with tunable epistasis.
1409.1199
Stephen Plaza PhD
Stephen M. Plaza
Focused Proofreading: Efficiently Extracting Connectomes from Segmented EM Images
null
null
null
null
q-bio.QM cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identifying complex neural circuitry from electron microscopic (EM) images may help unlock the mysteries of the brain. However, identifying this circuitry requires time-consuming, manual tracing (proofreading) due to the size and intricacy of these image datasets, thus limiting state-of-the-art analysis to very small brain regions. Potential avenues to improve scalability include automatic image segmentation and crowd sourcing, but current efforts have had limited success. In this paper, we propose a new strategy, focused proofreading, that works with automatic segmentation and aims to limit proofreading to the regions of a dataset that are most impactful to the resulting circuit. We then introduce a novel workflow, which exploits biological information such as synapses, and apply it to a large dataset in the fly optic lobe. With our techniques, we achieve significant tracing speedups of 3-5x without sacrificing the quality of the resulting circuit. Furthermore, our methodology makes the task of proofreading much more accessible and hence potentially enhances the effectiveness of crowd sourcing.
[ { "version": "v1", "created": "Wed, 3 Sep 2014 19:14:13 GMT" } ]
2014-09-04T00:00:00
[ [ "Plaza", "Stephen M.", "" ] ]
TITLE: Focused Proofreading: Efficiently Extracting Connectomes from Segmented EM Images ABSTRACT: Identifying complex neural circuitry from electron microscopic (EM) images may help unlock the mysteries of the brain. However, identifying this circuitry requires time-consuming, manual tracing (proofreading) due to the size and intricacy of these image datasets, thus limiting state-of-the-art analysis to very small brain regions. Potential avenues to improve scalability include automatic image segmentation and crowd sourcing, but current efforts have had limited success. In this paper, we propose a new strategy, focused proofreading, that works with automatic segmentation and aims to limit proofreading to the regions of a dataset that are most impactful to the resulting circuit. We then introduce a novel workflow, which exploits biological information such as synapses, and apply it to a large dataset in the fly optic lobe. With our techniques, we achieve significant tracing speedups of 3-5x without sacrificing the quality of the resulting circuit. Furthermore, our methodology makes the task of proofreading much more accessible and hence potentially enhances the effectiveness of crowd sourcing.
1311.1780
KyungHyun Cho
Caglar Gulcehre, Kyunghyun Cho, Razvan Pascanu and Yoshua Bengio
Learned-Norm Pooling for Deep Feedforward and Recurrent Neural Networks
ECML/PKDD 2014
null
null
null
cs.NE cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose and investigate a novel nonlinear unit, called $L_p$ unit, for deep neural networks. The proposed $L_p$ unit receives signals from several projections of a subset of units in the layer below and computes a normalized $L_p$ norm. We notice two interesting interpretations of the $L_p$ unit. First, the proposed unit can be understood as a generalization of a number of conventional pooling operators such as average, root-mean-square and max pooling widely used in, for instance, convolutional neural networks (CNN), HMAX models and neocognitrons. Furthermore, the $L_p$ unit is, to a certain degree, similar to the recently proposed maxout unit (Goodfellow et al., 2013) which achieved the state-of-the-art object recognition results on a number of benchmark datasets. Secondly, we provide a geometrical interpretation of the activation function based on which we argue that the $L_p$ unit is more efficient at representing complex, nonlinear separating boundaries. Each $L_p$ unit defines a superelliptic boundary, with its exact shape defined by the order $p$. We claim that this makes it possible to model arbitrarily shaped, curved boundaries more efficiently by combining a few $L_p$ units of different orders. This insight justifies the need for learning different orders for each unit in the model. We empirically evaluate the proposed $L_p$ units on a number of datasets and show that multilayer perceptrons (MLP) consisting of the $L_p$ units achieve the state-of-the-art results on a number of benchmark datasets. Furthermore, we evaluate the proposed $L_p$ unit on the recently proposed deep recurrent neural networks (RNN).
[ { "version": "v1", "created": "Thu, 7 Nov 2013 18:30:37 GMT" }, { "version": "v2", "created": "Mon, 11 Nov 2013 03:32:43 GMT" }, { "version": "v3", "created": "Tue, 12 Nov 2013 18:32:42 GMT" }, { "version": "v4", "created": "Wed, 29 Jan 2014 22:55:24 GMT" }, { "version": "v5", "created": "Sat, 1 Feb 2014 18:17:38 GMT" }, { "version": "v6", "created": "Fri, 7 Feb 2014 18:55:42 GMT" }, { "version": "v7", "created": "Tue, 2 Sep 2014 00:53:40 GMT" } ]
2014-09-03T00:00:00
[ [ "Gulcehre", "Caglar", "" ], [ "Cho", "Kyunghyun", "" ], [ "Pascanu", "Razvan", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Learned-Norm Pooling for Deep Feedforward and Recurrent Neural Networks ABSTRACT: In this paper we propose and investigate a novel nonlinear unit, called $L_p$ unit, for deep neural networks. The proposed $L_p$ unit receives signals from several projections of a subset of units in the layer below and computes a normalized $L_p$ norm. We notice two interesting interpretations of the $L_p$ unit. First, the proposed unit can be understood as a generalization of a number of conventional pooling operators such as average, root-mean-square and max pooling widely used in, for instance, convolutional neural networks (CNN), HMAX models and neocognitrons. Furthermore, the $L_p$ unit is, to a certain degree, similar to the recently proposed maxout unit (Goodfellow et al., 2013) which achieved the state-of-the-art object recognition results on a number of benchmark datasets. Secondly, we provide a geometrical interpretation of the activation function based on which we argue that the $L_p$ unit is more efficient at representing complex, nonlinear separating boundaries. Each $L_p$ unit defines a superelliptic boundary, with its exact shape defined by the order $p$. We claim that this makes it possible to model arbitrarily shaped, curved boundaries more efficiently by combining a few $L_p$ units of different orders. This insight justifies the need for learning different orders for each unit in the model. We empirically evaluate the proposed $L_p$ units on a number of datasets and show that multilayer perceptrons (MLP) consisting of the $L_p$ units achieve the state-of-the-art results on a number of benchmark datasets. Furthermore, we evaluate the proposed $L_p$ unit on the recently proposed deep recurrent neural networks (RNN).
1409.0602
Zhu Shizhan
Shizhan Zhu, Cheng Li, Chen Change Loy, and Xiaoou Tang
Transferring Landmark Annotations for Cross-Dataset Face Alignment
Shizhan Zhu and Cheng Li share equal contributions
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
Dataset bias is a well known problem in object recognition domain. This issue, nonetheless, is rarely explored in face alignment research. In this study, we show that dataset plays an integral part of face alignment performance. Specifically, owing to face alignment dataset bias, training on one database and testing on another or unseen domain would lead to poor performance. Creating an unbiased dataset through combining various existing databases, however, is non-trivial as one has to exhaustively re-label the landmarks for standardisation. In this work, we propose a simple and yet effective method to bridge the disparate annotation spaces between databases, making datasets fusion possible. We show extensive results on combining various popular databases (LFW, AFLW, LFPW, HELEN) for improved cross-dataset and unseen data alignment.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 03:36:55 GMT" } ]
2014-09-03T00:00:00
[ [ "Zhu", "Shizhan", "" ], [ "Li", "Cheng", "" ], [ "Loy", "Chen Change", "" ], [ "Tang", "Xiaoou", "" ] ]
TITLE: Transferring Landmark Annotations for Cross-Dataset Face Alignment ABSTRACT: Dataset bias is a well known problem in object recognition domain. This issue, nonetheless, is rarely explored in face alignment research. In this study, we show that dataset plays an integral part of face alignment performance. Specifically, owing to face alignment dataset bias, training on one database and testing on another or unseen domain would lead to poor performance. Creating an unbiased dataset through combining various existing databases, however, is non-trivial as one has to exhaustively re-label the landmarks for standardisation. In this work, we propose a simple and yet effective method to bridge the disparate annotation spaces between databases, making datasets fusion possible. We show extensive results on combining various popular databases (LFW, AFLW, LFPW, HELEN) for improved cross-dataset and unseen data alignment.
1409.0612
Ying Long
Ying Long, Zhenjiang Shen
Population spatialization and synthesis with open data
14 pages
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Individuals together with their locations & attributes are essential to feed micro-level applied urban models (for example, spatial micro-simulation and agent-based modeling) for policy evaluation. Existed studies on population spatialization and population synthesis are generally separated. In developing countries like China, population distribution in a fine scale, as the input for population synthesis, is not universally available. With the open-government initiatives in China and the emerging Web 2.0 techniques, more and more open data are becoming achievable. In this paper, we propose an automatic process using open data for population spatialization and synthesis. Specifically, the road network in OpenStreetMap is used to identify and delineate parcel geometries, while crowd-sourced POIs are gathered to infer urban parcels with a vector cellular automata model. Housing-related online Check-in records are then applied to distinguish residential parcels from all of the identified urban parcels. Finally the published census data, in which the sub-district level of attributes distribution and relationships are available, is used for synthesizing population attributes with a previously developed tool Agenter (Long and Shen, 2013). The results are validated with ground truth manually-prepared dataset by planners from Beijing Institute of City Planning.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 06:32:39 GMT" } ]
2014-09-03T00:00:00
[ [ "Long", "Ying", "" ], [ "Shen", "Zhenjiang", "" ] ]
TITLE: Population spatialization and synthesis with open data ABSTRACT: Individuals together with their locations & attributes are essential to feed micro-level applied urban models (for example, spatial micro-simulation and agent-based modeling) for policy evaluation. Existed studies on population spatialization and population synthesis are generally separated. In developing countries like China, population distribution in a fine scale, as the input for population synthesis, is not universally available. With the open-government initiatives in China and the emerging Web 2.0 techniques, more and more open data are becoming achievable. In this paper, we propose an automatic process using open data for population spatialization and synthesis. Specifically, the road network in OpenStreetMap is used to identify and delineate parcel geometries, while crowd-sourced POIs are gathered to infer urban parcels with a vector cellular automata model. Housing-related online Check-in records are then applied to distinguish residential parcels from all of the identified urban parcels. Finally the published census data, in which the sub-district level of attributes distribution and relationships are available, is used for synthesizing population attributes with a previously developed tool Agenter (Long and Shen, 2013). The results are validated with ground truth manually-prepared dataset by planners from Beijing Institute of City Planning.
1409.0651
Koninika Pal
Koninika Pal, Sebastian Michel
An LSH Index for Computing Kendall's Tau over Top-k Lists
6 pages, 8 subfigures, presented in Seventeenth International Workshop on the Web and Databases (WebDB 2014) co-located with ACM SIGMOD2014
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of similarity search within a set of top-k lists under the Kendall's Tau distance function. This distance describes how related two rankings are in terms of concordantly and discordantly ordered items. As top-k lists are usually very short compared to the global domain of possible items to be ranked, creating an inverted index to look up overlapping lists is possible but does not capture tight enough the similarity measure. In this work, we investigate locality sensitive hashing schemes for the Kendall's Tau distance and evaluate the proposed methods using two real-world datasets.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 10:07:27 GMT" } ]
2014-09-03T00:00:00
[ [ "Pal", "Koninika", "" ], [ "Michel", "Sebastian", "" ] ]
TITLE: An LSH Index for Computing Kendall's Tau over Top-k Lists ABSTRACT: We consider the problem of similarity search within a set of top-k lists under the Kendall's Tau distance function. This distance describes how related two rankings are in terms of concordantly and discordantly ordered items. As top-k lists are usually very short compared to the global domain of possible items to be ranked, creating an inverted index to look up overlapping lists is possible but does not capture tight enough the similarity measure. In this work, we investigate locality sensitive hashing schemes for the Kendall's Tau distance and evaluate the proposed methods using two real-world datasets.
1409.0748
Uwe Aickelin
Jenna Reps, Jonathan M. Garibaldi, Uwe Aickelin, Daniele Soria, Jack Gibson, Richard Hubbard
Comparison of algorithms that detect drug side effects using electronic healthcare databases
Soft Computing, 17(12) pp. 2381-2397, 2013
null
null
null
cs.LG cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The electronic healthcare databases are starting to become more readily available and are thought to have excellent potential for generating adverse drug reaction signals. The Health Improvement Network (THIN) database is an electronic healthcare database containing medical information on over 11 million patients that has excellent potential for detecting ADRs. In this paper we apply four existing electronic healthcare database signal detecting algorithms (MUTARA, HUNT, Temporal Pattern Discovery and modified ROR) on the THIN database for a selection of drugs from six chosen drug families. This is the first comparison of ADR signalling algorithms that includes MUTARA and HUNT and enabled us to set a benchmark for the adverse drug reaction signalling ability of the THIN database. The drugs were selectively chosen to enable a comparison with previous work and for variety. It was found that no algorithm was generally superior and the algorithms' natural thresholds act at variable stringencies. Furthermore, none of the algorithms perform well at detecting rare ADRs.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 15:16:26 GMT" } ]
2014-09-03T00:00:00
[ [ "Reps", "Jenna", "" ], [ "Garibaldi", "Jonathan M.", "" ], [ "Aickelin", "Uwe", "" ], [ "Soria", "Daniele", "" ], [ "Gibson", "Jack", "" ], [ "Hubbard", "Richard", "" ] ]
TITLE: Comparison of algorithms that detect drug side effects using electronic healthcare databases ABSTRACT: The electronic healthcare databases are starting to become more readily available and are thought to have excellent potential for generating adverse drug reaction signals. The Health Improvement Network (THIN) database is an electronic healthcare database containing medical information on over 11 million patients that has excellent potential for detecting ADRs. In this paper we apply four existing electronic healthcare database signal detecting algorithms (MUTARA, HUNT, Temporal Pattern Discovery and modified ROR) on the THIN database for a selection of drugs from six chosen drug families. This is the first comparison of ADR signalling algorithms that includes MUTARA and HUNT and enabled us to set a benchmark for the adverse drug reaction signalling ability of the THIN database. The drugs were selectively chosen to enable a comparison with previous work and for variety. It was found that no algorithm was generally superior and the algorithms' natural thresholds act at variable stringencies. Furthermore, none of the algorithms perform well at detecting rare ADRs.
1409.0763
Uwe Aickelin
Qi Chen, Amanda Whitbrook, Uwe Aickelin and Chris Roadknight
Data classification using the Dempster-Shafer method
Journal of Experimental & Theoretical Artificial Intelligence, ahead-of-print, 2014
null
10.1080/0952813X.2014.886301
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the Dempster-Shafer method is employed as the theoretical basis for creating data classification systems. Testing is carried out using three popular (multiple attribute) benchmark datasets that have two, three and four classes. In each case, a subset of the available data is used for training to establish thresholds, limits or likelihoods of class membership for each attribute, and hence create mass functions that establish probability of class membership for each attribute of the test data. Classification of each data item is achieved by combination of these probabilities via Dempster's Rule of Combination. Results for the first two datasets show extremely high classification accuracy that is competitive with other popular methods. The third dataset is non-numerical and difficult to classify, but good results can be achieved provided the system and mass functions are designed carefully and the right attributes are chosen for combination. In all cases the Dempster-Shafer method provides comparable performance to other more popular algorithms, but the overhead of generating accurate mass functions increases the complexity with the addition of new attributes. Overall, the results suggest that the D-S approach provides a suitable framework for the design of classification systems and that automating the mass function design and calculation would increase the viability of the algorithm for complex classification problems.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 15:49:40 GMT" } ]
2014-09-03T00:00:00
[ [ "Chen", "Qi", "" ], [ "Whitbrook", "Amanda", "" ], [ "Aickelin", "Uwe", "" ], [ "Roadknight", "Chris", "" ] ]
TITLE: Data classification using the Dempster-Shafer method ABSTRACT: In this paper, the Dempster-Shafer method is employed as the theoretical basis for creating data classification systems. Testing is carried out using three popular (multiple attribute) benchmark datasets that have two, three and four classes. In each case, a subset of the available data is used for training to establish thresholds, limits or likelihoods of class membership for each attribute, and hence create mass functions that establish probability of class membership for each attribute of the test data. Classification of each data item is achieved by combination of these probabilities via Dempster's Rule of Combination. Results for the first two datasets show extremely high classification accuracy that is competitive with other popular methods. The third dataset is non-numerical and difficult to classify, but good results can be achieved provided the system and mass functions are designed carefully and the right attributes are chosen for combination. In all cases the Dempster-Shafer method provides comparable performance to other more popular algorithms, but the overhead of generating accurate mass functions increases the complexity with the addition of new attributes. Overall, the results suggest that the D-S approach provides a suitable framework for the design of classification systems and that automating the mass function design and calculation would increase the viability of the algorithm for complex classification problems.
1409.0791
Jian Yang
Jian Yang, Liqiu Meng
Feature Selection in Conditional Random Fields for Map Matching of GPS Trajectories
null
null
null
null
stat.ML cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Map matching of the GPS trajectory serves the purpose of recovering the original route on a road network from a sequence of noisy GPS observations. It is a fundamental technique to many Location Based Services. However, map matching of a low sampling rate on urban road network is still a challenging task. In this paper, the characteristics of Conditional Random Fields with regard to inducing many contextual features and feature selection are explored for the map matching of the GPS trajectories at a low sampling rate. Experiments on a taxi trajectory dataset show that our method may achieve competitive results along with the success of reducing model complexity for computation-limited applications.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 16:52:53 GMT" } ]
2014-09-03T00:00:00
[ [ "Yang", "Jian", "" ], [ "Meng", "Liqiu", "" ] ]
TITLE: Feature Selection in Conditional Random Fields for Map Matching of GPS Trajectories ABSTRACT: Map matching of the GPS trajectory serves the purpose of recovering the original route on a road network from a sequence of noisy GPS observations. It is a fundamental technique to many Location Based Services. However, map matching of a low sampling rate on urban road network is still a challenging task. In this paper, the characteristics of Conditional Random Fields with regard to inducing many contextual features and feature selection are explored for the map matching of the GPS trajectories at a low sampling rate. Experiments on a taxi trajectory dataset show that our method may achieve competitive results along with the success of reducing model complexity for computation-limited applications.
1409.0798
Aditya Parameswaran
Anant Bhardwaj, Souvik Bhattacherjee, Amit Chavan, Amol Deshpande, Aaron J. Elmore, Samuel Madden, Aditya G. Parameswaran
DataHub: Collaborative Data Science & Dataset Version Management at Scale
7 pages
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relational databases have limited support for data collaboration, where teams collaboratively curate and analyze large datasets. Inspired by software version control systems like git, we propose (a) a dataset version control system, giving users the ability to create, branch, merge, difference and search large, divergent collections of datasets, and (b) a platform, DataHub, that gives users the ability to perform collaborative data analysis building on this version control system. We outline the challenges in providing dataset version control at scale.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 17:16:47 GMT" } ]
2014-09-03T00:00:00
[ [ "Bhardwaj", "Anant", "" ], [ "Bhattacherjee", "Souvik", "" ], [ "Chavan", "Amit", "" ], [ "Deshpande", "Amol", "" ], [ "Elmore", "Aaron J.", "" ], [ "Madden", "Samuel", "" ], [ "Parameswaran", "Aditya G.", "" ] ]
TITLE: DataHub: Collaborative Data Science & Dataset Version Management at Scale ABSTRACT: Relational databases have limited support for data collaboration, where teams collaboratively curate and analyze large datasets. Inspired by software version control systems like git, we propose (a) a dataset version control system, giving users the ability to create, branch, merge, difference and search large, divergent collections of datasets, and (b) a platform, DataHub, that gives users the ability to perform collaborative data analysis building on this version control system. We outline the challenges in providing dataset version control at scale.
1204.6535
Sandeep Gupta
Sandeep Gupta
Citations, Sequence Alignments, Contagion, and Semantics: On Acyclic Structures and their Randomness
null
null
null
null
cs.DM cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Datasets from several domains, such as life-sciences, semantic web, machine learning, natural language processing, etc. are naturally structured as acyclic graphs. These datasets, particularly those in bio-informatics and computational epidemiology, have grown tremendously over the last decade or so. Increasingly, as a consequence, there is a need to build and evaluate various strategies for processing acyclic structured graphs. Most of the proposed research models the real world acyclic structures as random graphs, i.e., they are generated by randomly selecting a subset of edges from all possible edges. Unfortunately the graphs thus generated have predictable and degenerate structures, i.e., the resulting graphs will always have almost the same degree distribution and very short paths. Specifically, we show that if $O(n \log n \log n)$ edges are added to a binary tree of $n$ nodes then with probability more than $O(1/(\log n)^{1/n})$ the depth of all but $O({\log \log n} ^{\log \log n})$ vertices of the dag collapses to 1. Experiments show that irregularity, as measured by distribution of length of random walks from root to leaves, is also predictable and small. The degree distribution and random walk length properties of real world graphs from these domains are significantly different from random graphs of similar vertex and edge size.
[ { "version": "v1", "created": "Mon, 30 Apr 2012 02:19:26 GMT" }, { "version": "v2", "created": "Thu, 26 Jul 2012 16:02:09 GMT" }, { "version": "v3", "created": "Fri, 26 Oct 2012 10:11:36 GMT" }, { "version": "v4", "created": "Tue, 20 Nov 2012 07:07:48 GMT" }, { "version": "v5", "created": "Thu, 17 Jan 2013 19:41:26 GMT" }, { "version": "v6", "created": "Sun, 31 Aug 2014 03:30:09 GMT" } ]
2014-09-02T00:00:00
[ [ "Gupta", "Sandeep", "" ] ]
TITLE: Citations, Sequence Alignments, Contagion, and Semantics: On Acyclic Structures and their Randomness ABSTRACT: Datasets from several domains, such as life-sciences, semantic web, machine learning, natural language processing, etc. are naturally structured as acyclic graphs. These datasets, particularly those in bio-informatics and computational epidemiology, have grown tremendously over the last decade or so. Increasingly, as a consequence, there is a need to build and evaluate various strategies for processing acyclic structured graphs. Most of the proposed research models the real world acyclic structures as random graphs, i.e., they are generated by randomly selecting a subset of edges from all possible edges. Unfortunately the graphs thus generated have predictable and degenerate structures, i.e., the resulting graphs will always have almost the same degree distribution and very short paths. Specifically, we show that if $O(n \log n \log n)$ edges are added to a binary tree of $n$ nodes then with probability more than $O(1/(\log n)^{1/n})$ the depth of all but $O({\log \log n} ^{\log \log n})$ vertices of the dag collapses to 1. Experiments show that irregularity, as measured by distribution of length of random walks from root to leaves, is also predictable and small. The degree distribution and random walk length properties of real world graphs from these domains are significantly different from random graphs of similar vertex and edge size.
1306.3874
KyungHyun Cho
Kyunghyun Cho and Xi Chen
Classifying and Visualizing Motion Capture Sequences using Deep Neural Networks
VISAPP 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The gesture recognition using motion capture data and depth sensors has recently drawn more attention in vision recognition. Currently most systems only classify dataset with a couple of dozens different actions. Moreover, feature extraction from the data is often computational complex. In this paper, we propose a novel system to recognize the actions from skeleton data with simple, but effective, features using deep neural networks. Features are extracted for each frame based on the relative positions of joints (PO), temporal differences (TD), and normalized trajectories of motion (NT). Given these features a hybrid multi-layer perceptron is trained, which simultaneously classifies and reconstructs input data. We use deep autoencoder to visualize learnt features, and the experiments show that deep neural networks can capture more discriminative information than, for instance, principal component analysis can. We test our system on a public database with 65 classes and more than 2,000 motion sequences. We obtain an accuracy above 95% which is, to our knowledge, the state of the art result for such a large dataset.
[ { "version": "v1", "created": "Mon, 17 Jun 2013 14:26:52 GMT" }, { "version": "v2", "created": "Mon, 1 Sep 2014 16:03:02 GMT" } ]
2014-09-02T00:00:00
[ [ "Cho", "Kyunghyun", "" ], [ "Chen", "Xi", "" ] ]
TITLE: Classifying and Visualizing Motion Capture Sequences using Deep Neural Networks ABSTRACT: The gesture recognition using motion capture data and depth sensors has recently drawn more attention in vision recognition. Currently most systems only classify dataset with a couple of dozens different actions. Moreover, feature extraction from the data is often computational complex. In this paper, we propose a novel system to recognize the actions from skeleton data with simple, but effective, features using deep neural networks. Features are extracted for each frame based on the relative positions of joints (PO), temporal differences (TD), and normalized trajectories of motion (NT). Given these features a hybrid multi-layer perceptron is trained, which simultaneously classifies and reconstructs input data. We use deep autoencoder to visualize learnt features, and the experiments show that deep neural networks can capture more discriminative information than, for instance, principal component analysis can. We test our system on a public database with 65 classes and more than 2,000 motion sequences. We obtain an accuracy above 95% which is, to our knowledge, the state of the art result for such a large dataset.
1408.5571
Michael (Micky) Fire
Michael Fire, Thomas Chesney, and Yuval Elovici
Quantitative Analysis of Genealogy Using Digitised Family Trees
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Driven by the popularity of television shows such as Who Do You Think You Are? many millions of users have uploaded their family tree to web projects such as WikiTree. Analysis of this corpus enables us to investigate genealogy computationally. The study of heritage in the social sciences has led to an increased understanding of ancestry and descent but such efforts are hampered by difficult to access data. Genealogical research is typically a tedious process involving trawling through sources such as birth and death certificates, wills, letters and land deeds. Decades of research have developed and examined hypotheses on population sex ratios, marriage trends, fertility, lifespan, and the frequency of twins and triplets. These can now be tested on vast datasets containing many billions of entries using machine learning tools. Here we survey the use of genealogy data mining using family trees dating back centuries and featuring profiles on nearly 7 million individuals based in over 160 countries. These data are not typically created by trained genealogists and so we verify them with reference to third party censuses. We present results on a range of aspects of population dynamics. Our approach extends the boundaries of genealogy inquiry to precise measurement of underlying human phenomena.
[ { "version": "v1", "created": "Sun, 24 Aug 2014 07:11:20 GMT" }, { "version": "v2", "created": "Sat, 30 Aug 2014 18:26:23 GMT" } ]
2014-09-02T00:00:00
[ [ "Fire", "Michael", "" ], [ "Chesney", "Thomas", "" ], [ "Elovici", "Yuval", "" ] ]
TITLE: Quantitative Analysis of Genealogy Using Digitised Family Trees ABSTRACT: Driven by the popularity of television shows such as Who Do You Think You Are? many millions of users have uploaded their family tree to web projects such as WikiTree. Analysis of this corpus enables us to investigate genealogy computationally. The study of heritage in the social sciences has led to an increased understanding of ancestry and descent but such efforts are hampered by difficult to access data. Genealogical research is typically a tedious process involving trawling through sources such as birth and death certificates, wills, letters and land deeds. Decades of research have developed and examined hypotheses on population sex ratios, marriage trends, fertility, lifespan, and the frequency of twins and triplets. These can now be tested on vast datasets containing many billions of entries using machine learning tools. Here we survey the use of genealogy data mining using family trees dating back centuries and featuring profiles on nearly 7 million individuals based in over 160 countries. These data are not typically created by trained genealogists and so we verify them with reference to third party censuses. We present results on a range of aspects of population dynamics. Our approach extends the boundaries of genealogy inquiry to precise measurement of underlying human phenomena.
1409.0347
Chao Li
Chao Li and Lili Guo and Andrzej Cichocki
Multi-tensor Completion for Estimating Missing Values in Video Data
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many tensor-based data completion methods aim to solve image and video in-painting problems. But, all methods were only developed for a single dataset. In most of real applications, we can usually obtain more than one dataset to reflect one phenomenon, and all the datasets are mutually related in some sense. Thus one question raised whether such the relationship can improve the performance of data completion or not? In the paper, we proposed a novel and efficient method by exploiting the relationship among datasets for multi-video data completion. Numerical results show that the proposed method significantly improve the performance of video in-painting, particularly in the case of very high missing percentage.
[ { "version": "v1", "created": "Mon, 1 Sep 2014 09:46:52 GMT" } ]
2014-09-02T00:00:00
[ [ "Li", "Chao", "" ], [ "Guo", "Lili", "" ], [ "Cichocki", "Andrzej", "" ] ]
TITLE: Multi-tensor Completion for Estimating Missing Values in Video Data ABSTRACT: Many tensor-based data completion methods aim to solve image and video in-painting problems. But, all methods were only developed for a single dataset. In most of real applications, we can usually obtain more than one dataset to reflect one phenomenon, and all the datasets are mutually related in some sense. Thus one question raised whether such the relationship can improve the performance of data completion or not? In the paper, we proposed a novel and efficient method by exploiting the relationship among datasets for multi-video data completion. Numerical results show that the proposed method significantly improve the performance of video in-painting, particularly in the case of very high missing percentage.
1409.0405
Freddie Witherden
F. D. Witherden and B. C. Vermeire and P. E. Vincent
Heterogeneous Computing on Mixed Unstructured Grids with PyFR
21 pages, 9 figures, 6 tables
null
null
null
physics.flu-dyn cs.CE physics.comp-ph
http://creativecommons.org/licenses/by/3.0/
PyFR is an open-source high-order accurate computational fluid dynamics solver for mixed unstructured grids that can target a range of hardware platforms from a single codebase. In this paper we demonstrate the ability of PyFR to perform high-order accurate unsteady simulations of flow on mixed unstructured grids using heterogeneous multi-node hardware. Specifically, after benchmarking single-node performance for various platforms, PyFR v0.2.2 is used to undertake simulations of unsteady flow over a circular cylinder at Reynolds number 3 900 using a mixed unstructured grid of prismatic and tetrahedral elements on a desktop workstation containing an Intel Xeon E5-2697 v2 CPU, an NVIDIA Tesla K40c GPU, and an AMD FirePro W9100 GPU. Both the performance and accuracy of PyFR are assessed. PyFR v0.2.2 is freely available under a 3-Clause New Style BSD license (see www.pyfr.org).
[ { "version": "v1", "created": "Mon, 1 Sep 2014 13:06:17 GMT" } ]
2014-09-02T00:00:00
[ [ "Witherden", "F. D.", "" ], [ "Vermeire", "B. C.", "" ], [ "Vincent", "P. E.", "" ] ]
TITLE: Heterogeneous Computing on Mixed Unstructured Grids with PyFR ABSTRACT: PyFR is an open-source high-order accurate computational fluid dynamics solver for mixed unstructured grids that can target a range of hardware platforms from a single codebase. In this paper we demonstrate the ability of PyFR to perform high-order accurate unsteady simulations of flow on mixed unstructured grids using heterogeneous multi-node hardware. Specifically, after benchmarking single-node performance for various platforms, PyFR v0.2.2 is used to undertake simulations of unsteady flow over a circular cylinder at Reynolds number 3 900 using a mixed unstructured grid of prismatic and tetrahedral elements on a desktop workstation containing an Intel Xeon E5-2697 v2 CPU, an NVIDIA Tesla K40c GPU, and an AMD FirePro W9100 GPU. Both the performance and accuracy of PyFR are assessed. PyFR v0.2.2 is freely available under a 3-Clause New Style BSD license (see www.pyfr.org).
1408.7071
Zhenzhong Lan
Zhenzhong Lan, Xuanchong Li, Alexandar G. Hauptmann
Temporal Extension of Scale Pyramid and Spatial Pyramid Matching for Action Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Historically, researchers in the field have spent a great deal of effort to create image representations that have scale invariance and retain spatial location information. This paper proposes to encode equivalent temporal characteristics in video representations for action recognition. To achieve temporal scale invariance, we develop a method called temporal scale pyramid (TSP). To encode temporal information, we present and compare two methods called temporal extension descriptor (TED) and temporal division pyramid (TDP) . Our purpose is to suggest solutions for matching complex actions that have large variation in velocity and appearance, which is missing from most current action representations. The experimental results on four benchmark datasets, UCF50, HMDB51, Hollywood2 and Olympic Sports, support our approach and significantly outperform state-of-the-art methods. Most noticeably, we achieve 65.0% mean accuracy and 68.2% mean average precision on the challenging HMDB51 and Hollywood2 datasets which constitutes an absolute improvement over the state-of-the-art by 7.8% and 3.9%, respectively.
[ { "version": "v1", "created": "Fri, 29 Aug 2014 17:05:29 GMT" } ]
2014-09-01T00:00:00
[ [ "Lan", "Zhenzhong", "" ], [ "Li", "Xuanchong", "" ], [ "Hauptmann", "Alexandar G.", "" ] ]
TITLE: Temporal Extension of Scale Pyramid and Spatial Pyramid Matching for Action Recognition ABSTRACT: Historically, researchers in the field have spent a great deal of effort to create image representations that have scale invariance and retain spatial location information. This paper proposes to encode equivalent temporal characteristics in video representations for action recognition. To achieve temporal scale invariance, we develop a method called temporal scale pyramid (TSP). To encode temporal information, we present and compare two methods called temporal extension descriptor (TED) and temporal division pyramid (TDP) . Our purpose is to suggest solutions for matching complex actions that have large variation in velocity and appearance, which is missing from most current action representations. The experimental results on four benchmark datasets, UCF50, HMDB51, Hollywood2 and Olympic Sports, support our approach and significantly outperform state-of-the-art methods. Most noticeably, we achieve 65.0% mean accuracy and 68.2% mean average precision on the challenging HMDB51 and Hollywood2 datasets which constitutes an absolute improvement over the state-of-the-art by 7.8% and 3.9%, respectively.
1407.2854
Matthew Denny
Matthew J. Denny
Graph Compartmentalization
11 pages, 5 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a concept and measure of graph compartmentalization. This new measure allows for principled comparison between graphs of arbitrary structure, unlike existing measures such as graph modularity. The proposed measure is invariant to graph size and number of groups and can be calculated analytically, facilitating measurement on very large graphs. I also introduce a block model generative process for compartmentalized graphs as a benchmark on which to validate the proposed measure. Simulation results demonstrate improved performance of the new measure over modularity in recovering the degree of compartmentalization of graphs simulated from the generative model. I also explore an application to the measurement of political polarization.
[ { "version": "v1", "created": "Thu, 10 Jul 2014 18:18:43 GMT" }, { "version": "v2", "created": "Thu, 28 Aug 2014 01:33:56 GMT" } ]
2014-08-29T00:00:00
[ [ "Denny", "Matthew J.", "" ] ]
TITLE: Graph Compartmentalization ABSTRACT: This article introduces a concept and measure of graph compartmentalization. This new measure allows for principled comparison between graphs of arbitrary structure, unlike existing measures such as graph modularity. The proposed measure is invariant to graph size and number of groups and can be calculated analytically, facilitating measurement on very large graphs. I also introduce a block model generative process for compartmentalized graphs as a benchmark on which to validate the proposed measure. Simulation results demonstrate improved performance of the new measure over modularity in recovering the degree of compartmentalization of graphs simulated from the generative model. I also explore an application to the measurement of political polarization.
1408.6595
Nipun Batra
Nipun Batra, Oliver Parson, Mario Berges, Amarjeet Singh and Alex Rogers
A comparison of non-intrusive load monitoring methods for commercial and residential buildings
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non intrusive load monitoring (NILM), or energy disaggregation, is the process of separating the total electricity consumption of a building as measured at single point into the building's constituent loads. Previous research in the field has mostly focused on residential buildings, and although the potential benefits of applying this technology to commercial buildings have been recognised since the field's conception, NILM in the commercial domain has been largely unexplored by the academic community. As a result of the heterogeneity of this section of the building stock (i.e., encompassing buildings as diverse as airports, malls and coffee shops), and hence the loads within them, many of the solutions developed for residential energy disaggregation do not apply directly. In this paper we highlight some insights for NILM in the commercial domain using data collected from a large smart meter deployment within an educational campus in Delhi, India, of which a subset of the data has been released for public use. We present an empirical characterisation of loads in commercial buildings, highlighting the differences in energy consumption and load characteristics between residential and commercial buildings. We assess the validity of the assumptions generally made by NILM solutions for residential buildings when applied to measurements from commercial facilities. Based on our observations, we discuss the required traits for a NILM system for commercial buildings, and run benchmark residential NILM algorithms on our data set to confirm our observations. To advance the research in commercial buildings energy disaggregation, we release a subset of our data set, called COMBED (commercial building energy data set).
[ { "version": "v1", "created": "Wed, 27 Aug 2014 23:58:19 GMT" } ]
2014-08-29T00:00:00
[ [ "Batra", "Nipun", "" ], [ "Parson", "Oliver", "" ], [ "Berges", "Mario", "" ], [ "Singh", "Amarjeet", "" ], [ "Rogers", "Alex", "" ] ]
TITLE: A comparison of non-intrusive load monitoring methods for commercial and residential buildings ABSTRACT: Non intrusive load monitoring (NILM), or energy disaggregation, is the process of separating the total electricity consumption of a building as measured at single point into the building's constituent loads. Previous research in the field has mostly focused on residential buildings, and although the potential benefits of applying this technology to commercial buildings have been recognised since the field's conception, NILM in the commercial domain has been largely unexplored by the academic community. As a result of the heterogeneity of this section of the building stock (i.e., encompassing buildings as diverse as airports, malls and coffee shops), and hence the loads within them, many of the solutions developed for residential energy disaggregation do not apply directly. In this paper we highlight some insights for NILM in the commercial domain using data collected from a large smart meter deployment within an educational campus in Delhi, India, of which a subset of the data has been released for public use. We present an empirical characterisation of loads in commercial buildings, highlighting the differences in energy consumption and load characteristics between residential and commercial buildings. We assess the validity of the assumptions generally made by NILM solutions for residential buildings when applied to measurements from commercial facilities. Based on our observations, we discuss the required traits for a NILM system for commercial buildings, and run benchmark residential NILM algorithms on our data set to confirm our observations. To advance the research in commercial buildings energy disaggregation, we release a subset of our data set, called COMBED (commercial building energy data set).
1408.6689
George Kesidis
Yuquan Shan, Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl Levitt, David J. Miller, Jeffry Rowe, Anna Scaglione
Generation bidding game with flexible demand
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a simple model of price-responsive demand, we consider a deregulated electricity marketplace wherein the grid (ISO, retailer-distributor) accepts bids per-unit supply from generators (simplified herein neither to consider start-up/ramp-up expenses nor day-ahead or shorter-term load following) which are then averaged (by supply allocations via an economic dispatch) to a common "clearing" price borne by customers (irrespective of variations in transmission/distribution or generation prices), i.e., the ISO does not compensate generators based on their marginal costs. Rather, the ISO provides sufficient information for generators to sensibly adjust their bids. Notwithstanding our idealizations, the dispatch dynamics are complex. For a simple benchmark power system, we find a price-symmetric Nash equilibrium through numerical experiments.
[ { "version": "v1", "created": "Thu, 28 Aug 2014 11:35:11 GMT" } ]
2014-08-29T00:00:00
[ [ "Shan", "Yuquan", "" ], [ "Raghuram", "Jayaram", "" ], [ "Kesidis", "George", "" ], [ "Griffin", "Christopher", "" ], [ "Levitt", "Karl", "" ], [ "Miller", "David J.", "" ], [ "Rowe", "Jeffry", "" ], [ "Scaglione", "Anna", "" ] ]
TITLE: Generation bidding game with flexible demand ABSTRACT: For a simple model of price-responsive demand, we consider a deregulated electricity marketplace wherein the grid (ISO, retailer-distributor) accepts bids per-unit supply from generators (simplified herein neither to consider start-up/ramp-up expenses nor day-ahead or shorter-term load following) which are then averaged (by supply allocations via an economic dispatch) to a common "clearing" price borne by customers (irrespective of variations in transmission/distribution or generation prices), i.e., the ISO does not compensate generators based on their marginal costs. Rather, the ISO provides sufficient information for generators to sensibly adjust their bids. Notwithstanding our idealizations, the dispatch dynamics are complex. For a simple benchmark power system, we find a price-symmetric Nash equilibrium through numerical experiments.
1408.6691
Luca Matteis
Luca Matteis
VoID-graph: Visualize Linked Datasets on the Web
null
null
null
null
cs.DB cs.HC
http://creativecommons.org/licenses/by-nc-sa/3.0/
The Linked Open Data (LOD) cloud diagram is a picture that helps us grasp the contents and the links of globally available data sets. Such diagram has been a powerful dissemination method for the Linked Data movement, allowing people to glance at the size and structure of this distributed, interconnected database. However, generating such image for third-party datasets can be a quite complex task as it requires the installation and understanding of a variety of tools which are not easy to setup. In this paper we present VoID-graph (http://lmatteis.github.io/void-graph/), a standalone web-tool that, given a VoID description, can visualize a diagram similar to the LOD cloud. It is novel because the diagram is autonomously shaped from VoID descriptions directly within a Web-browser, which doesn't require any server cooperation. This makes it not only easy to use, as no installation or configuration is required, but also makes it more sustainable, as it is built using Open Web standards such as JavaScript and SVG.
[ { "version": "v1", "created": "Thu, 28 Aug 2014 12:01:51 GMT" } ]
2014-08-29T00:00:00
[ [ "Matteis", "Luca", "" ] ]
TITLE: VoID-graph: Visualize Linked Datasets on the Web ABSTRACT: The Linked Open Data (LOD) cloud diagram is a picture that helps us grasp the contents and the links of globally available data sets. Such diagram has been a powerful dissemination method for the Linked Data movement, allowing people to glance at the size and structure of this distributed, interconnected database. However, generating such image for third-party datasets can be a quite complex task as it requires the installation and understanding of a variety of tools which are not easy to setup. In this paper we present VoID-graph (http://lmatteis.github.io/void-graph/), a standalone web-tool that, given a VoID description, can visualize a diagram similar to the LOD cloud. It is novel because the diagram is autonomously shaped from VoID descriptions directly within a Web-browser, which doesn't require any server cooperation. This makes it not only easy to use, as no installation or configuration is required, but also makes it more sustainable, as it is built using Open Web standards such as JavaScript and SVG.
1408.6485
Ciaran McCreesh
Ciaran McCreesh and Patrick Prosser
Finding Maximum k-Cliques Faster using Lazy Global Domination
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A clique in a graph is a set of vertices, each of which is adjacent to every other vertex in this set. A k-clique relaxes this requirement, requiring vertices to be within a distance k of each other, rather than directly adjacent. In theory, a maximum clique algorithm can easily be adapted to solve the maximum k-clique problem. We use a state of the art maximum clique algorithm to show that this is feasible in practice, and introduce a lazy global domination rule which sometimes vastly reduces the search space. We include experimental results for a range of real-world and benchmark graphs, and a detailed look at random graphs.
[ { "version": "v1", "created": "Wed, 27 Aug 2014 18:07:29 GMT" } ]
2014-08-28T00:00:00
[ [ "McCreesh", "Ciaran", "" ], [ "Prosser", "Patrick", "" ] ]
TITLE: Finding Maximum k-Cliques Faster using Lazy Global Domination ABSTRACT: A clique in a graph is a set of vertices, each of which is adjacent to every other vertex in this set. A k-clique relaxes this requirement, requiring vertices to be within a distance k of each other, rather than directly adjacent. In theory, a maximum clique algorithm can easily be adapted to solve the maximum k-clique problem. We use a state of the art maximum clique algorithm to show that this is feasible in practice, and introduce a lazy global domination rule which sometimes vastly reduces the search space. We include experimental results for a range of real-world and benchmark graphs, and a detailed look at random graphs.
1207.1206
Fariba Karimi Ms.
Fariba Karimi, Petter Holme
Threshold model of cascades in temporal networks
7 pages, 5 figures, 2 tables
Physica A: Statistical Mechanics and its Applications.392.16 (2013): 3476-3483
10.1016/j.physa.2013.03.050
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Threshold models try to explain the consequences of social influence like the spread of fads and opinions. Along with models of epidemics, they constitute a major theoretical framework of social spreading processes. In threshold models on static networks, an individual changes her state if a certain fraction of her neighbors has done the same. When there are strong correlations in the temporal aspects of contact patterns, it is useful to represent the system as a temporal network. In such a system, not only contacts but also the time of the contacts are represented explicitly. There is a consensus that bursty temporal patterns slow down disease spreading. However, as we will see, this is not a universal truth for threshold models. In this work, we propose an extension of Watts' classic threshold model to temporal networks. We do this by assuming that an agent is influenced by contacts which lie a certain time into the past. I.e., the individuals are affected by contacts within a time window. In addition to thresholds as the fraction of contacts, we also investigate the number of contacts within the time window as a basis for influence. To elucidate the model's behavior, we run the model on real and randomized empirical contact datasets.
[ { "version": "v1", "created": "Thu, 5 Jul 2012 09:49:51 GMT" }, { "version": "v2", "created": "Fri, 7 Sep 2012 15:19:39 GMT" } ]
2014-08-27T00:00:00
[ [ "Karimi", "Fariba", "" ], [ "Holme", "Petter", "" ] ]
TITLE: Threshold model of cascades in temporal networks ABSTRACT: Threshold models try to explain the consequences of social influence like the spread of fads and opinions. Along with models of epidemics, they constitute a major theoretical framework of social spreading processes. In threshold models on static networks, an individual changes her state if a certain fraction of her neighbors has done the same. When there are strong correlations in the temporal aspects of contact patterns, it is useful to represent the system as a temporal network. In such a system, not only contacts but also the time of the contacts are represented explicitly. There is a consensus that bursty temporal patterns slow down disease spreading. However, as we will see, this is not a universal truth for threshold models. In this work, we propose an extension of Watts' classic threshold model to temporal networks. We do this by assuming that an agent is influenced by contacts which lie a certain time into the past. I.e., the individuals are affected by contacts within a time window. In addition to thresholds as the fraction of contacts, we also investigate the number of contacts within the time window as a basis for influence. To elucidate the model's behavior, we run the model on real and randomized empirical contact datasets.
1403.0315
Conrad Sanderson
Johanna Carvajal, Chris McCool, Conrad Sanderson
Summarisation of Short-Term and Long-Term Videos using Texture and Colour
IEEE Winter Conference on Applications of Computer Vision (WACV), 2014
null
10.1109/WACV.2014.6836025
null
cs.CV stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel approach to video summarisation that makes use of a Bag-of-visual-Textures (BoT) approach. Two systems are proposed, one based solely on the BoT approach and another which exploits both colour information and BoT features. On 50 short-term videos from the Open Video Project we show that our BoT and fusion systems both achieve state-of-the-art performance, obtaining an average F-measure of 0.83 and 0.86 respectively, a relative improvement of 9% and 13% when compared to the previous state-of-the-art. When applied to a new underwater surveillance dataset containing 33 long-term videos, the proposed system reduces the amount of footage by a factor of 27, with only minor degradation in the information content. This order of magnitude reduction in video data represents significant savings in terms of time and potential labour cost when manually reviewing such footage.
[ { "version": "v1", "created": "Mon, 3 Mar 2014 05:19:10 GMT" } ]
2014-08-27T00:00:00
[ [ "Carvajal", "Johanna", "" ], [ "McCool", "Chris", "" ], [ "Sanderson", "Conrad", "" ] ]
TITLE: Summarisation of Short-Term and Long-Term Videos using Texture and Colour ABSTRACT: We present a novel approach to video summarisation that makes use of a Bag-of-visual-Textures (BoT) approach. Two systems are proposed, one based solely on the BoT approach and another which exploits both colour information and BoT features. On 50 short-term videos from the Open Video Project we show that our BoT and fusion systems both achieve state-of-the-art performance, obtaining an average F-measure of 0.83 and 0.86 respectively, a relative improvement of 9% and 13% when compared to the previous state-of-the-art. When applied to a new underwater surveillance dataset containing 33 long-term videos, the proposed system reduces the amount of footage by a factor of 27, with only minor degradation in the information content. This order of magnitude reduction in video data represents significant savings in terms of time and potential labour cost when manually reviewing such footage.
1403.0320
Conrad Sanderson
Shaokang Chen, Arnold Wiliem, Conrad Sanderson, Brian C. Lovell
Matching Image Sets via Adaptive Multi Convex Hull
IEEE Winter Conference on Applications of Computer Vision (WACV), 2014
null
10.1109/WACV.2014.6835985
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional nearest points methods use all the samples in an image set to construct a single convex or affine hull model for classification. However, strong artificial features and noisy data may be generated from combinations of training samples when significant intra-class variations and/or noise occur in the image set. Existing multi-model approaches extract local models by clustering each image set individually only once, with fixed clusters used for matching with various image sets. This may not be optimal for discrimination, as undesirable environmental conditions (eg. illumination and pose variations) may result in the two closest clusters representing different characteristics of an object (eg. frontal face being compared to non-frontal face). To address the above problem, we propose a novel approach to enhance nearest points based methods by integrating affine/convex hull classification with an adapted multi-model approach. We first extract multiple local convex hulls from a query image set via maximum margin clustering to diminish the artificial variations and constrain the noise in local convex hulls. We then propose adaptive reference clustering (ARC) to constrain the clustering of each gallery image set by forcing the clusters to have resemblance to the clusters in the query image set. By applying ARC, noisy clusters in the query set can be discarded. Experiments on Honda, MoBo and ETH-80 datasets show that the proposed method outperforms single model approaches and other recent techniques, such as Sparse Approximated Nearest Points, Mutual Subspace Method and Manifold Discriminant Analysis.
[ { "version": "v1", "created": "Mon, 3 Mar 2014 06:19:45 GMT" } ]
2014-08-27T00:00:00
[ [ "Chen", "Shaokang", "" ], [ "Wiliem", "Arnold", "" ], [ "Sanderson", "Conrad", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Matching Image Sets via Adaptive Multi Convex Hull ABSTRACT: Traditional nearest points methods use all the samples in an image set to construct a single convex or affine hull model for classification. However, strong artificial features and noisy data may be generated from combinations of training samples when significant intra-class variations and/or noise occur in the image set. Existing multi-model approaches extract local models by clustering each image set individually only once, with fixed clusters used for matching with various image sets. This may not be optimal for discrimination, as undesirable environmental conditions (eg. illumination and pose variations) may result in the two closest clusters representing different characteristics of an object (eg. frontal face being compared to non-frontal face). To address the above problem, we propose a novel approach to enhance nearest points based methods by integrating affine/convex hull classification with an adapted multi-model approach. We first extract multiple local convex hulls from a query image set via maximum margin clustering to diminish the artificial variations and constrain the noise in local convex hulls. We then propose adaptive reference clustering (ARC) to constrain the clustering of each gallery image set by forcing the clusters to have resemblance to the clusters in the query image set. By applying ARC, noisy clusters in the query set can be discarded. Experiments on Honda, MoBo and ETH-80 datasets show that the proposed method outperforms single model approaches and other recent techniques, such as Sparse Approximated Nearest Points, Mutual Subspace Method and Manifold Discriminant Analysis.
1404.0333
Jose Javier Ramasco
Maxime Lenormand, Miguel Picornell, Oliva G. Cantu-Ros, Antonia Tugores, Thomas Louail, Ricardo Herranz, Marc Barthelemy, Enrique Frias-Martinez and Jose J. Ramasco
Cross-checking different sources of mobility information
11 pages, 9 figures, 1 appendix with 7 figures
PLoS ONE 9, e105184 (2014)
10.1371/journal.pone.0105184
null
physics.soc-ph cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used) or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2x2 and 1x1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 18:05:12 GMT" }, { "version": "v2", "created": "Tue, 26 Aug 2014 14:18:50 GMT" } ]
2014-08-27T00:00:00
[ [ "Lenormand", "Maxime", "" ], [ "Picornell", "Miguel", "" ], [ "Cantu-Ros", "Oliva G.", "" ], [ "Tugores", "Antonia", "" ], [ "Louail", "Thomas", "" ], [ "Herranz", "Ricardo", "" ], [ "Barthelemy", "Marc", "" ], [ "Frias-Martinez", "Enrique", "" ], [ "Ramasco", "Jose J.", "" ] ]
TITLE: Cross-checking different sources of mobility information ABSTRACT: The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used) or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2x2 and 1x1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered.
1407.6125
Nicolo Colombo
Nicol\`o Colombo and Nikos Vlassis
Spectral Sequence Motif Discovery
20 pages, 3 figures, 1 table
null
null
null
q-bio.QM cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sequence discovery tools play a central role in several fields of computational biology. In the framework of Transcription Factor binding studies, motif finding algorithms of increasingly high performance are required to process the big datasets produced by new high-throughput sequencing technologies. Most existing algorithms are computationally demanding and often cannot support the large size of new experimental data. We present a new motif discovery algorithm that is built on a recent machine learning technique, referred to as Method of Moments. Based on spectral decompositions, this method is robust under model misspecification and is not prone to locally optimal solutions. We obtain an algorithm that is extremely fast and designed for the analysis of big sequencing data. In a few minutes, we can process datasets of hundreds of thousand sequences and extract motif profiles that match those computed by various state-of-the-art algorithms.
[ { "version": "v1", "created": "Wed, 23 Jul 2014 08:07:50 GMT" }, { "version": "v2", "created": "Tue, 26 Aug 2014 18:33:45 GMT" } ]
2014-08-27T00:00:00
[ [ "Colombo", "Nicolò", "" ], [ "Vlassis", "Nikos", "" ] ]
TITLE: Spectral Sequence Motif Discovery ABSTRACT: Sequence discovery tools play a central role in several fields of computational biology. In the framework of Transcription Factor binding studies, motif finding algorithms of increasingly high performance are required to process the big datasets produced by new high-throughput sequencing technologies. Most existing algorithms are computationally demanding and often cannot support the large size of new experimental data. We present a new motif discovery algorithm that is built on a recent machine learning technique, referred to as Method of Moments. Based on spectral decompositions, this method is robust under model misspecification and is not prone to locally optimal solutions. We obtain an algorithm that is extremely fast and designed for the analysis of big sequencing data. In a few minutes, we can process datasets of hundreds of thousand sequences and extract motif profiles that match those computed by various state-of-the-art algorithms.
1408.0467
Yasuo Tabei
Yoshimasa Takabatake, Yasuo Tabei, Hiroshi Sakamoto
Online Pattern Matching for String Edit Distance with Moves
This paper has been accepted to the 21st edition of the International Symposium on String Processing and Information Retrieval (SPIRE2014)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Edit distance with moves (EDM) is a string-to-string distance measure that includes substring moves in addition to ordinal editing operations to turn one string to the other. Although optimizing EDM is intractable, it has many applications especially in error detections. Edit sensitive parsing (ESP) is an efficient parsing algorithm that guarantees an upper bound of parsing discrepancies between different appearances of the same substrings in a string. ESP can be used for computing an approximate EDM as the L1 distance between characteristic vectors built by node labels in parsing trees. However, ESP is not applicable to a streaming text data where a whole text is unknown in advance. We present an online ESP (OESP) that enables an online pattern matching for EDM. OESP builds a parse tree for a streaming text and computes the L1 distance between characteristic vectors in an online manner. For the space-efficient computation of EDM, OESP directly encodes the parse tree into a succinct representation by leveraging the idea behind recent results of a dynamic succinct tree. We experimentally test OESP on the ability to compute EDM in an online manner on benchmark datasets, and we show OESP's efficiency.
[ { "version": "v1", "created": "Sun, 3 Aug 2014 07:48:52 GMT" }, { "version": "v2", "created": "Tue, 26 Aug 2014 05:56:42 GMT" } ]
2014-08-27T00:00:00
[ [ "Takabatake", "Yoshimasa", "" ], [ "Tabei", "Yasuo", "" ], [ "Sakamoto", "Hiroshi", "" ] ]
TITLE: Online Pattern Matching for String Edit Distance with Moves ABSTRACT: Edit distance with moves (EDM) is a string-to-string distance measure that includes substring moves in addition to ordinal editing operations to turn one string to the other. Although optimizing EDM is intractable, it has many applications especially in error detections. Edit sensitive parsing (ESP) is an efficient parsing algorithm that guarantees an upper bound of parsing discrepancies between different appearances of the same substrings in a string. ESP can be used for computing an approximate EDM as the L1 distance between characteristic vectors built by node labels in parsing trees. However, ESP is not applicable to a streaming text data where a whole text is unknown in advance. We present an online ESP (OESP) that enables an online pattern matching for EDM. OESP builds a parse tree for a streaming text and computes the L1 distance between characteristic vectors in an online manner. For the space-efficient computation of EDM, OESP directly encodes the parse tree into a succinct representation by leveraging the idea behind recent results of a dynamic succinct tree. We experimentally test OESP on the ability to compute EDM in an online manner on benchmark datasets, and we show OESP's efficiency.
1408.5601
Jianwei Yang
Jianwei Yang, Zhen Lei, Stan Z. Li
Learn Convolutional Neural Network for Face Anti-Spoofing
8 pages, 9 figures, 7 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Though having achieved some progresses, the hand-crafted texture features, e.g., LBP [23], LBP-TOP [11] are still unable to capture the most discriminative cues between genuine and fake faces. In this paper, instead of designing feature by ourselves, we rely on the deep convolutional neural network (CNN) to learn features of high discriminative ability in a supervised manner. Combined with some data pre-processing, the face anti-spoofing performance improves drastically. In the experiments, over 70% relative decrease of Half Total Error Rate (HTER) is achieved on two challenging datasets, CASIA [36] and REPLAY-ATTACK [7] compared with the state-of-the-art. Meanwhile, the experimental results from inter-tests between two datasets indicates CNN can obtain features with better generalization ability. Moreover, the nets trained using combined data from two datasets have less biases between two datasets.
[ { "version": "v1", "created": "Sun, 24 Aug 2014 13:08:19 GMT" }, { "version": "v2", "created": "Tue, 26 Aug 2014 02:45:55 GMT" } ]
2014-08-27T00:00:00
[ [ "Yang", "Jianwei", "" ], [ "Lei", "Zhen", "" ], [ "Li", "Stan Z.", "" ] ]
TITLE: Learn Convolutional Neural Network for Face Anti-Spoofing ABSTRACT: Though having achieved some progresses, the hand-crafted texture features, e.g., LBP [23], LBP-TOP [11] are still unable to capture the most discriminative cues between genuine and fake faces. In this paper, instead of designing feature by ourselves, we rely on the deep convolutional neural network (CNN) to learn features of high discriminative ability in a supervised manner. Combined with some data pre-processing, the face anti-spoofing performance improves drastically. In the experiments, over 70% relative decrease of Half Total Error Rate (HTER) is achieved on two challenging datasets, CASIA [36] and REPLAY-ATTACK [7] compared with the state-of-the-art. Meanwhile, the experimental results from inter-tests between two datasets indicates CNN can obtain features with better generalization ability. Moreover, the nets trained using combined data from two datasets have less biases between two datasets.
1408.5979
EPTCS
Rumyana Neykova (Imperial College London), Laura Bocchi (Imperial College London), Nobuko Yoshida (Imperial College London)
Timed Runtime Monitoring for Multiparty Conversations
In Proceedings BEAT 2014, arXiv:1408.5564
EPTCS 162, 2014, pp. 19-26
10.4204/EPTCS.162.3
null
cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a dynamic verification framework for protocols in real-time distributed systems. The framework is based on Scribble, a tool-chain for design and verification of choreographies based on multiparty session types, developed with our industrial partners. Drawing from recent work on multiparty session types for real-time interactions, we extend Scribble with clocks, resets, and clock predicates constraining the times in which interactions should occur. We present a timed API for Python to program distributed implementations of Scribble specifications. A dynamic verification framework ensures the safe execution of applications written with our timed API: we have implemented dedicated runtime monitors that check that each interaction occurs at a correct timing with respect to the corresponding Scribble specification. The performance of our implementation and its practicability are analysed via benchmarking.
[ { "version": "v1", "created": "Tue, 26 Aug 2014 02:15:40 GMT" } ]
2014-08-27T00:00:00
[ [ "Neykova", "Rumyana", "", "Imperial College London" ], [ "Bocchi", "Laura", "", "Imperial\n College London" ], [ "Yoshida", "Nobuko", "", "Imperial College London" ] ]
TITLE: Timed Runtime Monitoring for Multiparty Conversations ABSTRACT: We propose a dynamic verification framework for protocols in real-time distributed systems. The framework is based on Scribble, a tool-chain for design and verification of choreographies based on multiparty session types, developed with our industrial partners. Drawing from recent work on multiparty session types for real-time interactions, we extend Scribble with clocks, resets, and clock predicates constraining the times in which interactions should occur. We present a timed API for Python to program distributed implementations of Scribble specifications. A dynamic verification framework ensures the safe execution of applications written with our timed API: we have implemented dedicated runtime monitors that check that each interaction occurs at a correct timing with respect to the corresponding Scribble specification. The performance of our implementation and its practicability are analysed via benchmarking.
1403.2048
Andrzej Cichocki
Andrzej Cichocki
Era of Big Data Processing: A New Approach via Tensor Networks and Tensor Decompositions
Part of this work was presented on the International Workshop on Smart Info-Media Systems in Asia,(invited talk - SISA-2013) Sept.30--Oct.2, 2013, Nagoya, JAPAN
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many problems in computational neuroscience, neuroinformatics, pattern/image recognition, signal processing and machine learning generate massive amounts of multidimensional data with multiple aspects and high dimensionality. Tensors (i.e., multi-way arrays) provide often a natural and compact representation for such massive multidimensional data via suitable low-rank approximations. Big data analytics require novel technologies to efficiently process huge datasets within tolerable elapsed times. Such a new emerging technology for multidimensional big data is a multiway analysis via tensor networks (TNs) and tensor decompositions (TDs) which represent tensors by sets of factor (component) matrices and lower-order (core) tensors. Dynamic tensor analysis allows us to discover meaningful hidden structures of complex data and to perform generalizations by capturing multi-linear and multi-aspect relationships. We will discuss some fundamental TN models, their mathematical and graphical descriptions and associated learning algorithms for large-scale TDs and TNs, with many potential applications including: Anomaly detection, feature extraction, classification, cluster analysis, data fusion and integration, pattern recognition, predictive modeling, regression, time series analysis and multiway component analysis. Keywords: Large-scale HOSVD, Tensor decompositions, CPD, Tucker models, Hierarchical Tucker (HT) decomposition, low-rank tensor approximations (LRA), Tensorization/Quantization, tensor train (TT/QTT) - Matrix Product States (MPS), Matrix Product Operator (MPO), DMRG, Strong Kronecker Product (SKP).
[ { "version": "v1", "created": "Sun, 9 Mar 2014 10:45:18 GMT" }, { "version": "v2", "created": "Sat, 3 May 2014 13:41:52 GMT" }, { "version": "v3", "created": "Fri, 6 Jun 2014 08:53:57 GMT" }, { "version": "v4", "created": "Sun, 24 Aug 2014 11:04:32 GMT" } ]
2014-08-26T00:00:00
[ [ "Cichocki", "Andrzej", "" ] ]
TITLE: Era of Big Data Processing: A New Approach via Tensor Networks and Tensor Decompositions ABSTRACT: Many problems in computational neuroscience, neuroinformatics, pattern/image recognition, signal processing and machine learning generate massive amounts of multidimensional data with multiple aspects and high dimensionality. Tensors (i.e., multi-way arrays) provide often a natural and compact representation for such massive multidimensional data via suitable low-rank approximations. Big data analytics require novel technologies to efficiently process huge datasets within tolerable elapsed times. Such a new emerging technology for multidimensional big data is a multiway analysis via tensor networks (TNs) and tensor decompositions (TDs) which represent tensors by sets of factor (component) matrices and lower-order (core) tensors. Dynamic tensor analysis allows us to discover meaningful hidden structures of complex data and to perform generalizations by capturing multi-linear and multi-aspect relationships. We will discuss some fundamental TN models, their mathematical and graphical descriptions and associated learning algorithms for large-scale TDs and TNs, with many potential applications including: Anomaly detection, feature extraction, classification, cluster analysis, data fusion and integration, pattern recognition, predictive modeling, regression, time series analysis and multiway component analysis. Keywords: Large-scale HOSVD, Tensor decompositions, CPD, Tucker models, Hierarchical Tucker (HT) decomposition, low-rank tensor approximations (LRA), Tensorization/Quantization, tensor train (TT/QTT) - Matrix Product States (MPS), Matrix Product Operator (MPO), DMRG, Strong Kronecker Product (SKP).
1403.3785
Rosario N. Mantegna
Ming-Xia Li, Vasyl Palchykov, Zhi-Qiang Jiang, Kimmo Kaski, Janos Kert\'esz, Salvatore Miccich\`e, Michele Tumminello, Wei-Xing Zhou and Rosario N. Mantegna
Statistically validated mobile communication networks: Evolution of motifs in European and Chinese data
19 pages, 8 figures, 5 tables
New J. Phys. 16 (2014) 083038
10.1088/1367-2630/16/8/083038
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Big data open up unprecedented opportunities to investigate complex systems including the society. In particular, communication data serve as major sources for computational social sciences but they have to be cleaned and filtered as they may contain spurious information due to recording errors as well as interactions, like commercial and marketing activities, not directly related to the social network. The network constructed from communication data can only be considered as a proxy for the network of social relationships. Here we apply a systematic method, based on multiple hypothesis testing, to statistically validate the links and then construct the corresponding Bonferroni network, generalized to the directed case. We study two large datasets of mobile phone records, one from Europe and the other from China. For both datasets we compare the raw data networks with the corresponding Bonferroni networks and point out significant differences in the structures and in the basic network measures. We show evidence that the Bonferroni network provides a better proxy for the network of social interactions than the original one. By using the filtered networks we investigated the statistics and temporal evolution of small directed 3-motifs and conclude that closed communication triads have a formation time-scale, which is quite fast and typically intraday. We also find that open communication triads preferentially evolve to other open triads with a higher fraction of reciprocated calls. These stylized facts were observed for both datasets.
[ { "version": "v1", "created": "Sat, 15 Mar 2014 10:42:14 GMT" } ]
2014-08-26T00:00:00
[ [ "Li", "Ming-Xia", "" ], [ "Palchykov", "Vasyl", "" ], [ "Jiang", "Zhi-Qiang", "" ], [ "Kaski", "Kimmo", "" ], [ "Kertész", "Janos", "" ], [ "Miccichè", "Salvatore", "" ], [ "Tumminello", "Michele", "" ], [ "Zhou", "Wei-Xing", "" ], [ "Mantegna", "Rosario N.", "" ] ]
TITLE: Statistically validated mobile communication networks: Evolution of motifs in European and Chinese data ABSTRACT: Big data open up unprecedented opportunities to investigate complex systems including the society. In particular, communication data serve as major sources for computational social sciences but they have to be cleaned and filtered as they may contain spurious information due to recording errors as well as interactions, like commercial and marketing activities, not directly related to the social network. The network constructed from communication data can only be considered as a proxy for the network of social relationships. Here we apply a systematic method, based on multiple hypothesis testing, to statistically validate the links and then construct the corresponding Bonferroni network, generalized to the directed case. We study two large datasets of mobile phone records, one from Europe and the other from China. For both datasets we compare the raw data networks with the corresponding Bonferroni networks and point out significant differences in the structures and in the basic network measures. We show evidence that the Bonferroni network provides a better proxy for the network of social interactions than the original one. By using the filtered networks we investigated the statistics and temporal evolution of small directed 3-motifs and conclude that closed communication triads have a formation time-scale, which is quite fast and typically intraday. We also find that open communication triads preferentially evolve to other open triads with a higher fraction of reciprocated calls. These stylized facts were observed for both datasets.
1408.5530
Dan He
Dan He, Zhanyong Wang, Laxmi Parida, Eleazar Eskin
IPED2: Inheritance Path based Pedigree Reconstruction Algorithm for Complicated Pedigrees
9 pages
null
null
null
cs.DS q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reconstruction of family trees, or pedigree reconstruction, for a group of individuals is a fundamental problem in genetics. The problem is known to be NP-hard even for datasets known to only contain siblings. Some recent methods have been developed to accurately and efficiently reconstruct pedigrees. These methods, however, still consider relatively simple pedigrees, for example, they are not able to handle half-sibling situations where a pair of individuals only share one parent. In this work, we propose an efficient method, IPED2, based on our previous work, which specifically targets reconstruction of complicated pedigrees that include half-siblings. We note that the presence of half-siblings makes the reconstruction problem significantly more challenging which is why previous methods exclude the possibility of half-siblings. We proposed a novel model as well as an efficient graph algorithm and experiments show that our algorithm achieves relatively accurate reconstruction. To our knowledge, this is the first method that is able to handle pedigree reconstruction based on genotype data only when half-sibling exists in any generation of the pedigree.
[ { "version": "v1", "created": "Sat, 23 Aug 2014 21:01:50 GMT" } ]
2014-08-26T00:00:00
[ [ "He", "Dan", "" ], [ "Wang", "Zhanyong", "" ], [ "Parida", "Laxmi", "" ], [ "Eskin", "Eleazar", "" ] ]
TITLE: IPED2: Inheritance Path based Pedigree Reconstruction Algorithm for Complicated Pedigrees ABSTRACT: Reconstruction of family trees, or pedigree reconstruction, for a group of individuals is a fundamental problem in genetics. The problem is known to be NP-hard even for datasets known to only contain siblings. Some recent methods have been developed to accurately and efficiently reconstruct pedigrees. These methods, however, still consider relatively simple pedigrees, for example, they are not able to handle half-sibling situations where a pair of individuals only share one parent. In this work, we propose an efficient method, IPED2, based on our previous work, which specifically targets reconstruction of complicated pedigrees that include half-siblings. We note that the presence of half-siblings makes the reconstruction problem significantly more challenging which is why previous methods exclude the possibility of half-siblings. We proposed a novel model as well as an efficient graph algorithm and experiments show that our algorithm achieves relatively accurate reconstruction. To our knowledge, this is the first method that is able to handle pedigree reconstruction based on genotype data only when half-sibling exists in any generation of the pedigree.
1408.5539
Mehmet Kuzu
Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu
A Distributed Framework for Scalable Search over Encrypted Documents
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, huge amount of documents are increasingly transferred to the remote servers due to the appealing features of cloud computing. On the other hand, privacy and security of the sensitive information in untrusted cloud environment is a big concern. To alleviate such concerns, encryption of sensitive data before its transfer to the cloud has become an important risk mitigation option. Encrypted storage provides protection at the expense of a significant increase in the data management complexity. For effective management, it is critical to provide efficient selective document retrieval capability on the encrypted collection. In fact, considerable amount of searchable symmetric encryption schemes have been designed in the literature to achieve this task. However, with the emergence of big data everywhere, available approaches are insufficient to address some crucial real-world problems such as scalability. In this study, we focus on practical aspects of a secure keyword search mechanism over encrypted data on a real cloud infrastructure. First, we propose a provably secure distributed index along with a parallelizable retrieval technique that can easily scale to big data. Second, we integrate authorization into the search scheme to limit the information leakage in multi-user setting where users are allowed to access only particular documents. Third, we offer efficient updates on the distributed secure index. In addition, we conduct extensive empirical analysis on a real dataset to illustrate the efficiency of the proposed practical techniques.
[ { "version": "v1", "created": "Sun, 24 Aug 2014 00:38:11 GMT" } ]
2014-08-26T00:00:00
[ [ "Kuzu", "Mehmet", "" ], [ "Islam", "Mohammad Saiful", "" ], [ "Kantarcioglu", "Murat", "" ] ]
TITLE: A Distributed Framework for Scalable Search over Encrypted Documents ABSTRACT: Nowadays, huge amount of documents are increasingly transferred to the remote servers due to the appealing features of cloud computing. On the other hand, privacy and security of the sensitive information in untrusted cloud environment is a big concern. To alleviate such concerns, encryption of sensitive data before its transfer to the cloud has become an important risk mitigation option. Encrypted storage provides protection at the expense of a significant increase in the data management complexity. For effective management, it is critical to provide efficient selective document retrieval capability on the encrypted collection. In fact, considerable amount of searchable symmetric encryption schemes have been designed in the literature to achieve this task. However, with the emergence of big data everywhere, available approaches are insufficient to address some crucial real-world problems such as scalability. In this study, we focus on practical aspects of a secure keyword search mechanism over encrypted data on a real cloud infrastructure. First, we propose a provably secure distributed index along with a parallelizable retrieval technique that can easily scale to big data. Second, we integrate authorization into the search scheme to limit the information leakage in multi-user setting where users are allowed to access only particular documents. Third, we offer efficient updates on the distributed secure index. In addition, we conduct extensive empirical analysis on a real dataset to illustrate the efficiency of the proposed practical techniques.
1408.5573
Paolo Missier
Matias Garcia-Constantino and Paolo Missier and Phil Blytheand Amy Weihong Guo
Measuring the impact of cognitive distractions on driving performance using time series analysis
IEEE ITS conference, 2014
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using current sensing technology, a wealth of data on driving sessions is potentially available through a combination of vehicle sensors and drivers' physiology sensors (heart rate, breathing rate, skin temperature, etc.). Our hypothesis is that it should be possible to exploit the combination of time series produced by such multiple sensors during a driving session, in order to (i) learn models of normal driving behaviour, and (ii) use such models to detect important and potentially dangerous deviations from the norm in real-time, and thus enable the generation of appropriate alerts. Crucially, we believe that such models and interventions should and can be personalised and tailor-made for each individual driver. As an initial step towards this goal, in this paper we present techniques for assessing the impact of cognitive distraction on drivers, based on simple time series analysis. We have tested our method on a rich dataset of driving sessions, carried out in a professional simulator, involving a panel of volunteer drivers. Each session included a different type of cognitive distraction, and resulted in multiple time series from a variety of on-board sensors as well as sensors worn by the driver. Crucially, each driver also recorded an initial session with no distractions. In our model, such initial session provides the baseline times series that make it possible to quantitatively assess driver performance under distraction conditions.
[ { "version": "v1", "created": "Sun, 24 Aug 2014 07:36:21 GMT" } ]
2014-08-26T00:00:00
[ [ "Garcia-Constantino", "Matias", "" ], [ "Missier", "Paolo", "" ], [ "Guo", "Phil Blytheand Amy Weihong", "" ] ]
TITLE: Measuring the impact of cognitive distractions on driving performance using time series analysis ABSTRACT: Using current sensing technology, a wealth of data on driving sessions is potentially available through a combination of vehicle sensors and drivers' physiology sensors (heart rate, breathing rate, skin temperature, etc.). Our hypothesis is that it should be possible to exploit the combination of time series produced by such multiple sensors during a driving session, in order to (i) learn models of normal driving behaviour, and (ii) use such models to detect important and potentially dangerous deviations from the norm in real-time, and thus enable the generation of appropriate alerts. Crucially, we believe that such models and interventions should and can be personalised and tailor-made for each individual driver. As an initial step towards this goal, in this paper we present techniques for assessing the impact of cognitive distraction on drivers, based on simple time series analysis. We have tested our method on a rich dataset of driving sessions, carried out in a professional simulator, involving a panel of volunteer drivers. Each session included a different type of cognitive distraction, and resulted in multiple time series from a variety of on-board sensors as well as sensors worn by the driver. Crucially, each driver also recorded an initial session with no distractions. In our model, such initial session provides the baseline times series that make it possible to quantitatively assess driver performance under distraction conditions.
1408.5693
Bernhard Rumpe
Pit Pietsch, Klaus M\"uller, Bernhard Rumpe
Model Matching Challenge: Benchmarks for Ecore and BPMN Diagrams
7 pages, 7 figures
Softwaretechnik-Trends, Volume 33, Issue 2. Mai, 2013
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last couple of years, Model Driven Engineering (MDE) gained a prominent role in the context of software engineering. In the MDE paradigm, models are considered first level artifacts which are iteratively developed by teams of programmers over a period of time. Because of this, dedicated tools for versioning and management of models are needed. A central functionality within this group of tools is model comparison and differencing. In two disjunct research projects, we identified a group of general matching problems where state-of-the-art comparison algorithms delivered low quality results. In this article, we will present five edit operations which are the cause for these low quality results. The reasons why the algorithms fail, as well as possible solutions, are also discussed. These examples can be used as benchmarks by model developers to assess the quality and applicability of a model comparison tool for a given model type.
[ { "version": "v1", "created": "Mon, 25 Aug 2014 09:26:14 GMT" } ]
2014-08-26T00:00:00
[ [ "Pietsch", "Pit", "" ], [ "Müller", "Klaus", "" ], [ "Rumpe", "Bernhard", "" ] ]
TITLE: Model Matching Challenge: Benchmarks for Ecore and BPMN Diagrams ABSTRACT: In the last couple of years, Model Driven Engineering (MDE) gained a prominent role in the context of software engineering. In the MDE paradigm, models are considered first level artifacts which are iteratively developed by teams of programmers over a period of time. Because of this, dedicated tools for versioning and management of models are needed. A central functionality within this group of tools is model comparison and differencing. In two disjunct research projects, we identified a group of general matching problems where state-of-the-art comparison algorithms delivered low quality results. In this article, we will present five edit operations which are the cause for these low quality results. The reasons why the algorithms fail, as well as possible solutions, are also discussed. These examples can be used as benchmarks by model developers to assess the quality and applicability of a model comparison tool for a given model type.
1408.5777
Saba Ahsan
Saba Ahsan, Varun Singh and J\"org Ott
Characterizing Internet Video for Large-scale Active Measurements
15 pages, 18 figures
null
null
null
cs.MM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The availability of high definition video content on the web has brought about a significant change in the characteristics of Internet video, but not many studies on characterizing video have been done after this change. Video characteristics such as video length, format, target bit rate, and resolution provide valuable input to design Adaptive Bit Rate (ABR) algorithms, sizing playout buffers in Dynamic Adaptive HTTP streaming (DASH) players, model the variability in video frame sizes, etc. This paper presents datasets collected in 2013 and 2014 that contains over 130,000 videos from YouTube's most viewed (or most popular) video charts in 58 countries. We describe the basic characteristics of the videos on YouTube for each category, format, video length, file size, and data rate variation, observing that video length and file size fit a log normal distribution. We show that three minutes of a video suffice to represent its instant data rate fluctuation and that we can infer data rate characteristics of different video resolutions from a single given one. Based on our findings, we design active measurements for measuring the performance of Internet video.
[ { "version": "v1", "created": "Thu, 7 Aug 2014 16:38:25 GMT" } ]
2014-08-26T00:00:00
[ [ "Ahsan", "Saba", "" ], [ "Singh", "Varun", "" ], [ "Ott", "Jörg", "" ] ]
TITLE: Characterizing Internet Video for Large-scale Active Measurements ABSTRACT: The availability of high definition video content on the web has brought about a significant change in the characteristics of Internet video, but not many studies on characterizing video have been done after this change. Video characteristics such as video length, format, target bit rate, and resolution provide valuable input to design Adaptive Bit Rate (ABR) algorithms, sizing playout buffers in Dynamic Adaptive HTTP streaming (DASH) players, model the variability in video frame sizes, etc. This paper presents datasets collected in 2013 and 2014 that contains over 130,000 videos from YouTube's most viewed (or most popular) video charts in 58 countries. We describe the basic characteristics of the videos on YouTube for each category, format, video length, file size, and data rate variation, observing that video length and file size fit a log normal distribution. We show that three minutes of a video suffice to represent its instant data rate fluctuation and that we can infer data rate characteristics of different video resolutions from a single given one. Based on our findings, we design active measurements for measuring the performance of Internet video.
1408.5320
Xin-She Yang
Xin-She Yang, M. Karamanoglu, T. O. Ting and Y. X. Zhao
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Optimization
14 pages 1 figure
Neural Computing and Applications, vol. 25, No. 2, pp. 411-420 (2014)
10.1007/s00521-013-1508-6
null
math.OC cs.NE nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
All swarm-intelligence-based optimization algorithms use some stochastic components to increase the diversity of solutions during the search process. Such randomization is often represented in terms of random walks. However, it is not yet clear why some randomization techniques (and thus why some algorithms) may perform better than others for a given set of problems. In this work, we analyze these randomization methods in the context of nature-inspired algorithms. We also use eagle strategy to provide basic observations and relate step sizes and search efficiency using Markov theory. Then, we apply our analysis and observations to solve four design benchmarks, including the designs of a pressure vessel, a speed reducer, a PID controller and a heat exchanger. Our results demonstrate that eagle strategy with L\'evy flights can perform extremely well in reducing the overall computational efforts.
[ { "version": "v1", "created": "Fri, 22 Aug 2014 15:23:35 GMT" } ]
2014-08-25T00:00:00
[ [ "Yang", "Xin-She", "" ], [ "Karamanoglu", "M.", "" ], [ "Ting", "T. O.", "" ], [ "Zhao", "Y. X.", "" ] ]
TITLE: Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Optimization ABSTRACT: All swarm-intelligence-based optimization algorithms use some stochastic components to increase the diversity of solutions during the search process. Such randomization is often represented in terms of random walks. However, it is not yet clear why some randomization techniques (and thus why some algorithms) may perform better than others for a given set of problems. In this work, we analyze these randomization methods in the context of nature-inspired algorithms. We also use eagle strategy to provide basic observations and relate step sizes and search efficiency using Markov theory. Then, we apply our analysis and observations to solve four design benchmarks, including the designs of a pressure vessel, a speed reducer, a PID controller and a heat exchanger. Our results demonstrate that eagle strategy with L\'evy flights can perform extremely well in reducing the overall computational efforts.
1408.5332
Xin-She Yang
Xin-She Yang, M. Karamanoglu, X. S. He
Flower Pollination Algorithm: A Novel Approach for Multiobjective Optimization
17 pages 8 figures. arXiv admin note: substantial text overlap with arXiv:1404.0695
X. S. Yang, M. Karamanoglu, X. S. He, Flower Pollination Algorithm: A Novel Approach for Multiobjective Optimization, Engineering Optimization, 46 (9), pp. 1222 - 1237 (2014)
10.1080/0305215X.2013.832237
null
math.OC cs.NE nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiobjective design optimization problems require multiobjective optimization techniques to solve, and it is often very challenging to obtain high-quality Pareto fronts accurately. In this paper, the recently developed flower pollination algorithm (FPA) is extended to solve multiobjective optimization problems. The proposed method is used to solve a set of multobjective test functions and two bi-objective design benchmarks, and a comparison of the proposed algorithm with other algorithms has been made, which shows that FPA is efficient with a good convergence rate. Finally, the importance for further parametric studies and theoretical analysis are highlighted and discussed.
[ { "version": "v1", "created": "Fri, 22 Aug 2014 15:41:22 GMT" } ]
2014-08-25T00:00:00
[ [ "Yang", "Xin-She", "" ], [ "Karamanoglu", "M.", "" ], [ "He", "X. S.", "" ] ]
TITLE: Flower Pollination Algorithm: A Novel Approach for Multiobjective Optimization ABSTRACT: Multiobjective design optimization problems require multiobjective optimization techniques to solve, and it is often very challenging to obtain high-quality Pareto fronts accurately. In this paper, the recently developed flower pollination algorithm (FPA) is extended to solve multiobjective optimization problems. The proposed method is used to solve a set of multobjective test functions and two bi-objective design benchmarks, and a comparison of the proposed algorithm with other algorithms has been made, which shows that FPA is efficient with a good convergence rate. Finally, the importance for further parametric studies and theoretical analysis are highlighted and discussed.
1402.2676
Parameswaran Raman
Hyokun Yun, Parameswaran Raman, S.V.N. Vishwanathan
Ranking via Robust Binary Classification and Parallel Parameter Estimation in Large-Scale Data
null
null
null
null
stat.ML cs.DC cs.LG stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose RoBiRank, a ranking algorithm that is motivated by observing a close connection between evaluation metrics for learning to rank and loss functions for robust classification. The algorithm shows a very competitive performance on standard benchmark datasets against other representative algorithms in the literature. On the other hand, in large scale problems where explicit feature vectors and scores are not given, our algorithm can be efficiently parallelized across a large number of machines; for a task that requires 386,133 x 49,824,519 pairwise interactions between items to be ranked, our algorithm finds solutions that are of dramatically higher quality than that can be found by a state-of-the-art competitor algorithm, given the same amount of wall-clock time for computation.
[ { "version": "v1", "created": "Tue, 11 Feb 2014 21:39:54 GMT" }, { "version": "v2", "created": "Fri, 4 Apr 2014 21:08:34 GMT" }, { "version": "v3", "created": "Fri, 11 Apr 2014 06:19:04 GMT" }, { "version": "v4", "created": "Thu, 21 Aug 2014 06:00:32 GMT" } ]
2014-08-22T00:00:00
[ [ "Yun", "Hyokun", "" ], [ "Raman", "Parameswaran", "" ], [ "Vishwanathan", "S. V. N.", "" ] ]
TITLE: Ranking via Robust Binary Classification and Parallel Parameter Estimation in Large-Scale Data ABSTRACT: We propose RoBiRank, a ranking algorithm that is motivated by observing a close connection between evaluation metrics for learning to rank and loss functions for robust classification. The algorithm shows a very competitive performance on standard benchmark datasets against other representative algorithms in the literature. On the other hand, in large scale problems where explicit feature vectors and scores are not given, our algorithm can be efficiently parallelized across a large number of machines; for a task that requires 386,133 x 49,824,519 pairwise interactions between items to be ranked, our algorithm finds solutions that are of dramatically higher quality than that can be found by a state-of-the-art competitor algorithm, given the same amount of wall-clock time for computation.
1408.3863
Christoph Lange
Christoph Lange and Angelo Di Iorio
Semantic Publishing Challenge -- Assessing the Quality of Scientific Output
To appear in: Valentina Presutti and Milan Stankovic and Erik Cambria and Reforgiato Recupero, Diego and Di Iorio, Angelo and Christoph Lange and Di Noia, Tommaso and Ivan Cantador (eds.). Semantic Web Evaluation Challenges 2014. Number 457 in Communications in Computer and Information Science, Springer, 2014
null
null
null
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linked Open Datasets about scholarly publications enable the development and integration of sophisticated end-user services; however, richer datasets are still needed. The first goal of this Challenge was to investigate novel approaches to obtain such semantic data. In particular, we were seeking methods and tools to extract information from scholarly publications, to publish it as LOD, and to use queries over this LOD to assess quality. This year we focused on the quality of workshop proceedings, and of journal articles w.r.t. their citation network. A third, open task, asked to showcase how such semantic data could be exploited and how Semantic Web technologies could help in this emerging context.
[ { "version": "v1", "created": "Sun, 17 Aug 2014 21:33:10 GMT" }, { "version": "v2", "created": "Wed, 20 Aug 2014 22:23:41 GMT" } ]
2014-08-22T00:00:00
[ [ "Lange", "Christoph", "" ], [ "Di Iorio", "Angelo", "" ] ]
TITLE: Semantic Publishing Challenge -- Assessing the Quality of Scientific Output ABSTRACT: Linked Open Datasets about scholarly publications enable the development and integration of sophisticated end-user services; however, richer datasets are still needed. The first goal of this Challenge was to investigate novel approaches to obtain such semantic data. In particular, we were seeking methods and tools to extract information from scholarly publications, to publish it as LOD, and to use queries over this LOD to assess quality. This year we focused on the quality of workshop proceedings, and of journal articles w.r.t. their citation network. A third, open task, asked to showcase how such semantic data could be exploited and how Semantic Web technologies could help in this emerging context.
1408.4793
Luca Matteis
Luca Matteis
Restpark: Minimal RESTful API for Retrieving RDF Triples
null
null
null
null
cs.DB
http://creativecommons.org/licenses/by-nc-sa/3.0/
How do RDF datasets currently get published on the Web? They are either available as large RDF files, which need to be downloaded and processed locally, or they exist behind complex SPARQL endpoints. By providing a RESTful API that can access triple data, we allow users to query a dataset through a simple interface based on just a couple of HTTP parameters. If RDF resources were published this way we could quickly build applications that depend on these datasets, without having to download and process them locally. This is what Restpark is: a set of HTTP GET parameters that servers need to handle, and respond with JSON-LD.
[ { "version": "v1", "created": "Tue, 19 Aug 2014 22:57:41 GMT" } ]
2014-08-22T00:00:00
[ [ "Matteis", "Luca", "" ] ]
TITLE: Restpark: Minimal RESTful API for Retrieving RDF Triples ABSTRACT: How do RDF datasets currently get published on the Web? They are either available as large RDF files, which need to be downloaded and processed locally, or they exist behind complex SPARQL endpoints. By providing a RESTful API that can access triple data, we allow users to query a dataset through a simple interface based on just a couple of HTTP parameters. If RDF resources were published this way we could quickly build applications that depend on these datasets, without having to download and process them locally. This is what Restpark is: a set of HTTP GET parameters that servers need to handle, and respond with JSON-LD.
1401.5836
Vedran Sekara Mr.
Vedran Sekara and Sune Lehmann
The Strength of Friendship Ties in Proximity Sensor Data
Updated Introduction, added references. 12 pages, 7 figures
null
10.1371/journal.pone.0100915
PLoS One 9.7 (2014): e100915
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding how people interact and socialize is important in many contexts from disease control to urban planning. Datasets that capture this specific aspect of human life have increased in size and availability over the last few years. We have yet to understand, however, to what extent such electronic datasets may serve as a valid proxy for real life social interactions. For an observational dataset, gathered using mobile phones, we analyze the problem of identifying transient and non-important links, as well as how to highlight important social interactions. Applying the Bluetooth signal strength parameter to distinguish between observations, we demonstrate that weak links, compared to strong links, have a lower probability of being observed at later times, while such links--on average--also have lower link-weights and probability of sharing an online friendship. Further, the role of link-strength is investigated in relation to social network properties.
[ { "version": "v1", "created": "Thu, 23 Jan 2014 00:29:51 GMT" }, { "version": "v2", "created": "Mon, 10 Feb 2014 23:51:14 GMT" }, { "version": "v3", "created": "Tue, 27 May 2014 22:12:39 GMT" } ]
2014-08-21T00:00:00
[ [ "Sekara", "Vedran", "" ], [ "Lehmann", "Sune", "" ] ]
TITLE: The Strength of Friendship Ties in Proximity Sensor Data ABSTRACT: Understanding how people interact and socialize is important in many contexts from disease control to urban planning. Datasets that capture this specific aspect of human life have increased in size and availability over the last few years. We have yet to understand, however, to what extent such electronic datasets may serve as a valid proxy for real life social interactions. For an observational dataset, gathered using mobile phones, we analyze the problem of identifying transient and non-important links, as well as how to highlight important social interactions. Applying the Bluetooth signal strength parameter to distinguish between observations, we demonstrate that weak links, compared to strong links, have a lower probability of being observed at later times, while such links--on average--also have lower link-weights and probability of sharing an online friendship. Further, the role of link-strength is investigated in relation to social network properties.
1408.4504
Mohammed Abdelsamea
Mohammed M. Abdelsamea
Unsupervised Parallel Extraction based Texture for Efficient Image Representation
arXiv admin note: substantial text overlap with arXiv:1408.4143
2011 International Conference on Signal, Image Processing and Applications With workshop of ICEEA 2011, IPCSIT vol.21 (2011), IACSIT Press, Singapore
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SOM is a type of unsupervised learning where the goal is to discover some underlying structure of the data. In this paper, a new extraction method based on the main idea of Concurrent Self-Organizing Maps (CSOM), representing a winner-takes-all collection of small SOM networks is proposed. Each SOM of the system is trained individually to provide best results for one class only. The experiments confirm that the proposed features based CSOM is capable to represent image content better than extracted features based on a single big SOM and these proposed features improve the final decision of the CAD. Experiments held on Mammographic Image Analysis Society (MIAS) dataset.
[ { "version": "v1", "created": "Wed, 20 Aug 2014 01:10:44 GMT" } ]
2014-08-21T00:00:00
[ [ "Abdelsamea", "Mohammed M.", "" ] ]
TITLE: Unsupervised Parallel Extraction based Texture for Efficient Image Representation ABSTRACT: SOM is a type of unsupervised learning where the goal is to discover some underlying structure of the data. In this paper, a new extraction method based on the main idea of Concurrent Self-Organizing Maps (CSOM), representing a winner-takes-all collection of small SOM networks is proposed. Each SOM of the system is trained individually to provide best results for one class only. The experiments confirm that the proposed features based CSOM is capable to represent image content better than extracted features based on a single big SOM and these proposed features improve the final decision of the CAD. Experiments held on Mammographic Image Analysis Society (MIAS) dataset.
1408.4523
Mohammed Al-Maolegi
Yahya Tashtoush, Mohammed Al-Maolegi and Bassam Arkok
The Correlation among Software Complexity Metrics with Case Study
6 pages
International Journal of Advanced Computer Research, 2014
null
null
cs.SE
http://creativecommons.org/licenses/by/3.0/
People demand for software quality is growing increasingly, thus different scales for the software are growing fast to handle the quality of software. The software complexity metric is one of the measurements that use some of the internal attributes or characteristics of software to know how they effect on the software quality. In this paper, we cover some of more efficient software complexity metrics such as Cyclomatic complexity, line of code and Hallstead complexity metric. This paper presents their impacts on the software quality. It also discusses and analyzes the correlation between them. It finally reveals their relation with the number of errors using a real dataset as a case study.
[ { "version": "v1", "created": "Wed, 20 Aug 2014 05:08:32 GMT" } ]
2014-08-21T00:00:00
[ [ "Tashtoush", "Yahya", "" ], [ "Al-Maolegi", "Mohammed", "" ], [ "Arkok", "Bassam", "" ] ]
TITLE: The Correlation among Software Complexity Metrics with Case Study ABSTRACT: People demand for software quality is growing increasingly, thus different scales for the software are growing fast to handle the quality of software. The software complexity metric is one of the measurements that use some of the internal attributes or characteristics of software to know how they effect on the software quality. In this paper, we cover some of more efficient software complexity metrics such as Cyclomatic complexity, line of code and Hallstead complexity metric. This paper presents their impacts on the software quality. It also discusses and analyzes the correlation between them. It finally reveals their relation with the number of errors using a real dataset as a case study.
1408.4565
Philipp Leitner
Joel Scheuner and Philipp Leitner and Jurgen Cito and Harald Gall
Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To optimally deploy their applications, users of Infrastructure-as-a-Service clouds are required to evaluate the costs and performance of different combinations of cloud configurations to find out which combination provides the best service level for their specific application. Unfortunately, benchmarking cloud services is cumbersome and error-prone. In this paper, we propose an architecture and concrete implementation of a cloud benchmarking Web service, which fosters the definition of reusable and representative benchmarks. In distinction to existing work, our system is based on the notion of Infrastructure-as-Code, which is a state of the art concept to define IT infrastructure in a reproducible, well-defined, and testable way. We demonstrate our system based on an illustrative case study, in which we measure and compare the disk IO speeds of different instance and storage types in Amazon EC2.
[ { "version": "v1", "created": "Wed, 20 Aug 2014 09:04:57 GMT" } ]
2014-08-21T00:00:00
[ [ "Scheuner", "Joel", "" ], [ "Leitner", "Philipp", "" ], [ "Cito", "Jurgen", "" ], [ "Gall", "Harald", "" ] ]
TITLE: Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking ABSTRACT: To optimally deploy their applications, users of Infrastructure-as-a-Service clouds are required to evaluate the costs and performance of different combinations of cloud configurations to find out which combination provides the best service level for their specific application. Unfortunately, benchmarking cloud services is cumbersome and error-prone. In this paper, we propose an architecture and concrete implementation of a cloud benchmarking Web service, which fosters the definition of reusable and representative benchmarks. In distinction to existing work, our system is based on the notion of Infrastructure-as-Code, which is a state of the art concept to define IT infrastructure in a reproducible, well-defined, and testable way. We demonstrate our system based on an illustrative case study, in which we measure and compare the disk IO speeds of different instance and storage types in Amazon EC2.
1408.4587
Pier Stanislao Paolucci
Pier Stanislao Paolucci, Iuliana Bacivarov, Devendra Rai, Lars Schor, Lothar Thiele, Hoeseok Yang, Elena Pastorelli, Roberto Ammendola, Andrea Biagioni, Ottorino Frezza, Francesca Lo Cicero, Alessandro Lonardo, Francesco Simula, Laura Tosoratto, Piero Vicini
EURETILE D7.3 - Dynamic DAL benchmark coding, measurements on MPI version of DPSNN-STDP (distributed plastic spiking neural net) and improvements to other DAL codes
34 pages. arXiv admin note: substantial text overlap with arXiv:1310.8478
null
null
null
cs.DC cs.CE cs.MS cs.NE q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The EURETILE project required the selection and coding of a set of dedicated benchmarks. The project is about the software and hardware architecture of future many-tile distributed fault-tolerant systems. We focus on dynamic workloads characterised by heavy numerical processing requirements. The ambition is to identify common techniques that could be applied to both the Embedded Systems and HPC domains. This document is the first public deliverable of Work Package 7: Challenging Tiled Applications.
[ { "version": "v1", "created": "Wed, 20 Aug 2014 10:00:15 GMT" } ]
2014-08-21T00:00:00
[ [ "Paolucci", "Pier Stanislao", "" ], [ "Bacivarov", "Iuliana", "" ], [ "Rai", "Devendra", "" ], [ "Schor", "Lars", "" ], [ "Thiele", "Lothar", "" ], [ "Yang", "Hoeseok", "" ], [ "Pastorelli", "Elena", "" ], [ "Ammendola", "Roberto", "" ], [ "Biagioni", "Andrea", "" ], [ "Frezza", "Ottorino", "" ], [ "Cicero", "Francesca Lo", "" ], [ "Lonardo", "Alessandro", "" ], [ "Simula", "Francesco", "" ], [ "Tosoratto", "Laura", "" ], [ "Vicini", "Piero", "" ] ]
TITLE: EURETILE D7.3 - Dynamic DAL benchmark coding, measurements on MPI version of DPSNN-STDP (distributed plastic spiking neural net) and improvements to other DAL codes ABSTRACT: The EURETILE project required the selection and coding of a set of dedicated benchmarks. The project is about the software and hardware architecture of future many-tile distributed fault-tolerant systems. We focus on dynamic workloads characterised by heavy numerical processing requirements. The ambition is to identify common techniques that could be applied to both the Embedded Systems and HPC domains. This document is the first public deliverable of Work Package 7: Challenging Tiled Applications.
1408.4630
Roope Vehkalahti
Benjamin Linowitz, Matthew Satriano and Roope Vehkalahti
A non-commutative analogue of the Odlyzko bounds and bounds on performance for space-time lattice codes
null
null
null
null
cs.IT math.IT math.NT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers space-time coding over several independently Rayleigh faded blocks. In particular we will concentrate on giving upper bounds for the coding gain of lattice space-time codes as the number of blocks grow. This problem was previously considered in the single antenna case by Bayer et al. in 2006. Crucial to their work was Odlyzko's bound on the discriminant of an algebraic number field, as this provides an upper bound for the normalized coding gain of number field codes. In the MIMO context natural codes are constructed from division algebras defined over number fields and the coding gain is measured by the discriminant of the corresponding (non-commutative) algebra. In this paper we will develop analogues of the Odlyzko bounds in this context and show how these bounds limit the normalized coding gain of a very general family of division algebra based space-time codes. These bounds can also be used as benchmarks in practical code design and as tools to analyze asymptotic bounds of performance as the number of independently faded blocks increases.
[ { "version": "v1", "created": "Wed, 20 Aug 2014 12:52:19 GMT" } ]
2014-08-21T00:00:00
[ [ "Linowitz", "Benjamin", "" ], [ "Satriano", "Matthew", "" ], [ "Vehkalahti", "Roope", "" ] ]
TITLE: A non-commutative analogue of the Odlyzko bounds and bounds on performance for space-time lattice codes ABSTRACT: This paper considers space-time coding over several independently Rayleigh faded blocks. In particular we will concentrate on giving upper bounds for the coding gain of lattice space-time codes as the number of blocks grow. This problem was previously considered in the single antenna case by Bayer et al. in 2006. Crucial to their work was Odlyzko's bound on the discriminant of an algebraic number field, as this provides an upper bound for the normalized coding gain of number field codes. In the MIMO context natural codes are constructed from division algebras defined over number fields and the coding gain is measured by the discriminant of the corresponding (non-commutative) algebra. In this paper we will develop analogues of the Odlyzko bounds in this context and show how these bounds limit the normalized coding gain of a very general family of division algebra based space-time codes. These bounds can also be used as benchmarks in practical code design and as tools to analyze asymptotic bounds of performance as the number of independently faded blocks increases.
1408.4143
Mohammed Abdelsamea
Marghny H. Mohamed and Mohammed M. Abdelsamea
Self Organization Map based Texture Feature Extraction for Efficient Medical Image Categorization
In Proceedings of the 4th ACM International Conference on Intelligent Computing and Information Systems, ICICIS 2009, Cairo, Egypt 2009
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Texture is one of the most important properties of visual surface that helps in discriminating one object from another or an object from background. The self-organizing map (SOM) is an excellent tool in exploratory phase of data mining. It projects its input space on prototypes of a low-dimensional regular grid that can be effectively utilized to visualize and explore properties of the data. This paper proposes an enhancement extraction method for accurate extracting features for efficient image representation it based on SOM neural network. In this approach, we apply three different partitioning approaches as a region of interested (ROI) selection methods for extracting different accurate textural features from medical image as a primary step of our extraction method. Fisherfaces feature selection is used, for selecting discriminated features form extracted textural features. Experimental result showed the high accuracy of medical image categorization with our proposed extraction method. Experiments held on Mammographic Image Analysis Society (MIAS) dataset.
[ { "version": "v1", "created": "Mon, 14 Jul 2014 13:43:19 GMT" } ]
2014-08-20T00:00:00
[ [ "Mohamed", "Marghny H.", "" ], [ "Abdelsamea", "Mohammed M.", "" ] ]
TITLE: Self Organization Map based Texture Feature Extraction for Efficient Medical Image Categorization ABSTRACT: Texture is one of the most important properties of visual surface that helps in discriminating one object from another or an object from background. The self-organizing map (SOM) is an excellent tool in exploratory phase of data mining. It projects its input space on prototypes of a low-dimensional regular grid that can be effectively utilized to visualize and explore properties of the data. This paper proposes an enhancement extraction method for accurate extracting features for efficient image representation it based on SOM neural network. In this approach, we apply three different partitioning approaches as a region of interested (ROI) selection methods for extracting different accurate textural features from medical image as a primary step of our extraction method. Fisherfaces feature selection is used, for selecting discriminated features form extracted textural features. Experimental result showed the high accuracy of medical image categorization with our proposed extraction method. Experiments held on Mammographic Image Analysis Society (MIAS) dataset.
1408.4325
Diane Larlus
Yangmuzi Zhang, Diane Larlus, Florent Perronnin
What makes an Image Iconic? A Fine-Grained Case Study
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A natural approach to teaching a visual concept, e.g. a bird species, is to show relevant images. However, not all relevant images represent a concept equally well. In other words, they are not necessarily iconic. This observation raises three questions. Is iconicity a subjective property? If not, can we predict iconicity? And what exactly makes an image iconic? We provide answers to these questions through an extensive experimental study on a challenging fine-grained dataset of birds. We first show that iconicity ratings are consistent across individuals, even when they are not domain experts, thus demonstrating that iconicity is not purely subjective. We then consider an exhaustive list of properties that are intuitively related to iconicity and measure their correlation with these iconicity ratings. We combine them to predict iconicity of new unseen images. We also propose a direct iconicity predictor that is discriminatively trained with iconicity ratings. By combining both systems, we get an iconicity prediction that approaches human performance.
[ { "version": "v1", "created": "Tue, 19 Aug 2014 13:26:01 GMT" } ]
2014-08-20T00:00:00
[ [ "Zhang", "Yangmuzi", "" ], [ "Larlus", "Diane", "" ], [ "Perronnin", "Florent", "" ] ]
TITLE: What makes an Image Iconic? A Fine-Grained Case Study ABSTRACT: A natural approach to teaching a visual concept, e.g. a bird species, is to show relevant images. However, not all relevant images represent a concept equally well. In other words, they are not necessarily iconic. This observation raises three questions. Is iconicity a subjective property? If not, can we predict iconicity? And what exactly makes an image iconic? We provide answers to these questions through an extensive experimental study on a challenging fine-grained dataset of birds. We first show that iconicity ratings are consistent across individuals, even when they are not domain experts, thus demonstrating that iconicity is not purely subjective. We then consider an exhaustive list of properties that are intuitively related to iconicity and measure their correlation with these iconicity ratings. We combine them to predict iconicity of new unseen images. We also propose a direct iconicity predictor that is discriminatively trained with iconicity ratings. By combining both systems, we get an iconicity prediction that approaches human performance.
1407.4694
Kaiming Shen
Kaiming Shen and Wei Yu
Distributed Pricing-Based User Association for Downlink Heterogeneous Cellular Networks
IEEE Journal on Selected Areas in Communications, Special Issue on 5G Communication Systems, June 2014
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the optimization of the user and base-station (BS) association in a wireless downlink heterogeneous cellular network under the proportional fairness criterion. We first consider the case where each BS has a single antenna and transmits at fixed power, and propose a distributed price update strategy for a pricing-based user association scheme, in which the users are assigned to the BS based on the value of a utility function minus a price. The proposed price update algorithm is based on a coordinate descent method for solving the dual of the network utility maximization problem, and it has a rigorous performance guarantee. The main advantage of the proposed algorithm as compared to the existing subgradient method for price update is that the proposed algorithm is independent of parameter choices and can be implemented asynchronously. Further, this paper considers the joint user association and BS power control problem, and proposes an iterative dual coordinate descent and the power optimization algorithm that significantly outperforms existing approaches. Finally, this paper considers the joint user association and BS beamforming problem for the case where the BSs are equipped with multiple antennas and spatially multiplex multiple users. We incorporate dual coordinate descent with the weighted minimum mean-squared error (WMMSE) algorithm, and show that it achieves nearly the same performance as a computationally more complex benchmark algorithm (which applies the WMMSE algorithm on the entire network for BS association), while avoiding excessive BS handover.
[ { "version": "v1", "created": "Thu, 17 Jul 2014 14:59:53 GMT" }, { "version": "v2", "created": "Sun, 17 Aug 2014 16:48:44 GMT" } ]
2014-08-19T00:00:00
[ [ "Shen", "Kaiming", "" ], [ "Yu", "Wei", "" ] ]
TITLE: Distributed Pricing-Based User Association for Downlink Heterogeneous Cellular Networks ABSTRACT: This paper considers the optimization of the user and base-station (BS) association in a wireless downlink heterogeneous cellular network under the proportional fairness criterion. We first consider the case where each BS has a single antenna and transmits at fixed power, and propose a distributed price update strategy for a pricing-based user association scheme, in which the users are assigned to the BS based on the value of a utility function minus a price. The proposed price update algorithm is based on a coordinate descent method for solving the dual of the network utility maximization problem, and it has a rigorous performance guarantee. The main advantage of the proposed algorithm as compared to the existing subgradient method for price update is that the proposed algorithm is independent of parameter choices and can be implemented asynchronously. Further, this paper considers the joint user association and BS power control problem, and proposes an iterative dual coordinate descent and the power optimization algorithm that significantly outperforms existing approaches. Finally, this paper considers the joint user association and BS beamforming problem for the case where the BSs are equipped with multiple antennas and spatially multiplex multiple users. We incorporate dual coordinate descent with the weighted minimum mean-squared error (WMMSE) algorithm, and show that it achieves nearly the same performance as a computationally more complex benchmark algorithm (which applies the WMMSE algorithm on the entire network for BS association), while avoiding excessive BS handover.
1408.2770
Christopher Griffin
Sarah Rajtmajer and Christopher Griffin and Derek Mikesell and Anna Squicciarini
A cooperate-defect model for the spread of deviant behavior in social networks
9 pages, 6 figures, corrects an oversight in Version 1 in which equilibrium point analysis is insufficiently qualified
null
null
null
cs.GT cs.SI physics.soc-ph
http://creativecommons.org/licenses/publicdomain/
We present a game-theoretic model for the spread of deviant behavior in online social networks. We utilize a two-strategy framework wherein each player's behavior is classified as normal or deviant and evolves according to the cooperate-defect payoff scheme of the classic prisoner's dilemma game. We demonstrate convergence of individual behavior over time to a final strategy vector and indicate counterexamples to this convergence outside the context of prisoner's dilemma. Theoretical results are validated on a real-world dataset collected from a popular online forum.
[ { "version": "v1", "created": "Tue, 12 Aug 2014 16:33:10 GMT" }, { "version": "v2", "created": "Sat, 16 Aug 2014 18:12:17 GMT" } ]
2014-08-19T00:00:00
[ [ "Rajtmajer", "Sarah", "" ], [ "Griffin", "Christopher", "" ], [ "Mikesell", "Derek", "" ], [ "Squicciarini", "Anna", "" ] ]
TITLE: A cooperate-defect model for the spread of deviant behavior in social networks ABSTRACT: We present a game-theoretic model for the spread of deviant behavior in online social networks. We utilize a two-strategy framework wherein each player's behavior is classified as normal or deviant and evolves according to the cooperate-defect payoff scheme of the classic prisoner's dilemma game. We demonstrate convergence of individual behavior over time to a final strategy vector and indicate counterexamples to this convergence outside the context of prisoner's dilemma. Theoretical results are validated on a real-world dataset collected from a popular online forum.