id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1310.6288 | Hao Zhang | Hao Zhang and Liqing Zhang | Spatial-Spectral Boosting Analysis for Stroke Patients' Motor Imagery
EEG in Rehabilitation Training | 10 pages,3 figures | null | 10.3233/978-1-61499-419-0-537 | null | stat.ML cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current studies about motor imagery based rehabilitation training systems for
stroke subjects lack an appropriate analytic method, which can achieve a
considerable classification accuracy, at the same time detects gradual changes
of imagery patterns during rehabilitation process and disinters potential
mechanisms about motor function recovery. In this study, we propose an adaptive
boosting algorithm based on the cortex plasticity and spectral band shifts.
This approach models the usually predetermined spatial-spectral configurations
in EEG study into variable preconditions, and introduces a new heuristic of
stochastic gradient boost for training base learners under these preconditions.
We compare our proposed algorithm with commonly used methods on datasets
collected from 2 months' clinical experiments. The simulation results
demonstrate the effectiveness of the method in detecting the variations of
stroke patients' EEG patterns. By chronologically reorganizing the weight
parameters of the learned additive model, we verify the spatial compensatory
mechanism on impaired cortex and detect the changes of accentuation bands in
spectral domain, which may contribute important prior knowledge for
rehabilitation practice.
| [
{
"version": "v1",
"created": "Wed, 23 Oct 2013 16:43:59 GMT"
}
] | 2014-09-19T00:00:00 | [
[
"Zhang",
"Hao",
""
],
[
"Zhang",
"Liqing",
""
]
] | TITLE: Spatial-Spectral Boosting Analysis for Stroke Patients' Motor Imagery
EEG in Rehabilitation Training
ABSTRACT: Current studies about motor imagery based rehabilitation training systems for
stroke subjects lack an appropriate analytic method, which can achieve a
considerable classification accuracy, at the same time detects gradual changes
of imagery patterns during rehabilitation process and disinters potential
mechanisms about motor function recovery. In this study, we propose an adaptive
boosting algorithm based on the cortex plasticity and spectral band shifts.
This approach models the usually predetermined spatial-spectral configurations
in EEG study into variable preconditions, and introduces a new heuristic of
stochastic gradient boost for training base learners under these preconditions.
We compare our proposed algorithm with commonly used methods on datasets
collected from 2 months' clinical experiments. The simulation results
demonstrate the effectiveness of the method in detecting the variations of
stroke patients' EEG patterns. By chronologically reorganizing the weight
parameters of the learned additive model, we verify the spatial compensatory
mechanism on impaired cortex and detect the changes of accentuation bands in
spectral domain, which may contribute important prior knowledge for
rehabilitation practice.
|
1405.6874 | Sebastian Deorowicz | Szymon Grabowski, Sebastian Deorowicz, {\L}ukasz Roguski | Disk-based genome sequencing data compression | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivation: High-coverage sequencing data have significant, yet hard to
exploit, redundancy. Most FASTQ compressors cannot efficiently compress the DNA
stream of large datasets, since the redundancy between overlapping reads cannot
be easily captured in the (relatively small) main memory. More interesting
solutions for this problem are disk-based~(Yanovsky, 2011; Cox et al., 2012),
where the better of these two, from Cox~{\it et al.}~(2012), is based on the
Burrows--Wheeler transform (BWT) and achieves 0.518 bits per base for a 134.0
Gb human genome sequencing collection with almost 45-fold coverage.
Results: We propose ORCOM (Overlapping Reads COmpression with Minimizers), a
compression algorithm dedicated to sequencing reads (DNA only). Our method
makes use of a conceptually simple and easily parallelizable idea of
minimizers, to obtain 0.317 bits per base as the compression ratio, allowing to
fit the 134.0 Gb dataset into only 5.31 GB of space.
Availability: http://sun.aei.polsl.pl/orcom under a free license.
| [
{
"version": "v1",
"created": "Tue, 27 May 2014 11:34:35 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Sep 2014 17:41:36 GMT"
}
] | 2014-09-19T00:00:00 | [
[
"Grabowski",
"Szymon",
""
],
[
"Deorowicz",
"Sebastian",
""
],
[
"Roguski",
"Łukasz",
""
]
] | TITLE: Disk-based genome sequencing data compression
ABSTRACT: Motivation: High-coverage sequencing data have significant, yet hard to
exploit, redundancy. Most FASTQ compressors cannot efficiently compress the DNA
stream of large datasets, since the redundancy between overlapping reads cannot
be easily captured in the (relatively small) main memory. More interesting
solutions for this problem are disk-based~(Yanovsky, 2011; Cox et al., 2012),
where the better of these two, from Cox~{\it et al.}~(2012), is based on the
Burrows--Wheeler transform (BWT) and achieves 0.518 bits per base for a 134.0
Gb human genome sequencing collection with almost 45-fold coverage.
Results: We propose ORCOM (Overlapping Reads COmpression with Minimizers), a
compression algorithm dedicated to sequencing reads (DNA only). Our method
makes use of a conceptually simple and easily parallelizable idea of
minimizers, to obtain 0.317 bits per base as the compression ratio, allowing to
fit the 134.0 Gb dataset into only 5.31 GB of space.
Availability: http://sun.aei.polsl.pl/orcom under a free license.
|
1409.5165 | Michael Bloodgood | Michael Bloodgood and K. Vijay-Shanker | A Method for Stopping Active Learning Based on Stabilizing Predictions
and the Need for User-Adjustable Stopping | 9 pages, 3 figures, 5 tables; appeared in Proceedings of the
Thirteenth Conference on Computational Natural Language Learning
(CoNLL-2009), June 2009 | In Proceedings of the Thirteenth Conference on Computational
Natural Language Learning (CoNLL-2009), pages 39-47, Boulder, Colorado, June
2009. Association for Computational Linguistics | null | null | cs.LG cs.CL stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A survey of existing methods for stopping active learning (AL) reveals the
needs for methods that are: more widely applicable; more aggressive in saving
annotations; and more stable across changing datasets. A new method for
stopping AL based on stabilizing predictions is presented that addresses these
needs. Furthermore, stopping methods are required to handle a broad range of
different annotation/performance tradeoff valuations. Despite this, the
existing body of work is dominated by conservative methods with little (if any)
attention paid to providing users with control over the behavior of stopping
methods. The proposed method is shown to fill a gap in the level of
aggressiveness available for stopping AL and supports providing users with
control over stopping behavior.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2014 23:28:59 GMT"
}
] | 2014-09-19T00:00:00 | [
[
"Bloodgood",
"Michael",
""
],
[
"Vijay-Shanker",
"K.",
""
]
] | TITLE: A Method for Stopping Active Learning Based on Stabilizing Predictions
and the Need for User-Adjustable Stopping
ABSTRACT: A survey of existing methods for stopping active learning (AL) reveals the
needs for methods that are: more widely applicable; more aggressive in saving
annotations; and more stable across changing datasets. A new method for
stopping AL based on stabilizing predictions is presented that addresses these
needs. Furthermore, stopping methods are required to handle a broad range of
different annotation/performance tradeoff valuations. Despite this, the
existing body of work is dominated by conservative methods with little (if any)
attention paid to providing users with control over the behavior of stopping
methods. The proposed method is shown to fill a gap in the level of
aggressiveness available for stopping AL and supports providing users with
control over stopping behavior.
|
1409.5327 | Neil Walton | N.S. Walton | Store-Forward and its implications for Proportional Scheduling | null | null | null | null | cs.NI cs.PF math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Proportional Scheduler was recently proposed as a scheduling algorithm
for multi-hop switch networks. For these networks, the BackPressure scheduler
is the classical benchmark. For networks with fixed routing, the Proportional
Scheduler is maximum stable, myopic and, furthermore, will alleviate certain
scaling issued found in BackPressure for large networks. Nonetheless, the
equilibrium and delay properties of the Proportional Scheduler has not been
fully characterized.
In this article, we postulate on the equilibrium behaviour of the
Proportional Scheduler though the analysis of an analogous rule called the
Store-Forward allocation. It has been shown that Store-Forward has
asymptotically allocates according to the Proportional Scheduler. Further, for
Store-Forward networks, numerous equilibrium quantities are explicitly
calculable. For FIFO networks under Store-Forward, we calculate the policies
stationary distribution and end-to-end route delay. We discuss network
topologies when the stationary distribution is product-form, a phenomenon which
we call \emph{product form resource pooling}. We extend this product form
notion to independent set scheduling on perfect graphs, where we show that
non-neighbouring queues are statistically independent. Finally, we analyse the
large deviations behaviour of the equilibrium distribution of Store-Forward
networks in order to construct Lyapunov functions for FIFO switch networks.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2014 19:45:20 GMT"
}
] | 2014-09-19T00:00:00 | [
[
"Walton",
"N. S.",
""
]
] | TITLE: Store-Forward and its implications for Proportional Scheduling
ABSTRACT: The Proportional Scheduler was recently proposed as a scheduling algorithm
for multi-hop switch networks. For these networks, the BackPressure scheduler
is the classical benchmark. For networks with fixed routing, the Proportional
Scheduler is maximum stable, myopic and, furthermore, will alleviate certain
scaling issued found in BackPressure for large networks. Nonetheless, the
equilibrium and delay properties of the Proportional Scheduler has not been
fully characterized.
In this article, we postulate on the equilibrium behaviour of the
Proportional Scheduler though the analysis of an analogous rule called the
Store-Forward allocation. It has been shown that Store-Forward has
asymptotically allocates according to the Proportional Scheduler. Further, for
Store-Forward networks, numerous equilibrium quantities are explicitly
calculable. For FIFO networks under Store-Forward, we calculate the policies
stationary distribution and end-to-end route delay. We discuss network
topologies when the stationary distribution is product-form, a phenomenon which
we call \emph{product form resource pooling}. We extend this product form
notion to independent set scheduling on perfect graphs, where we show that
non-neighbouring queues are statistically independent. Finally, we analyse the
large deviations behaviour of the equilibrium distribution of Store-Forward
networks in order to construct Lyapunov functions for FIFO switch networks.
|
1403.4064 | Ivan Radi\v{c}ek | Sumit Gulwani, Ivan Radi\v{c}ek, Florian Zuleger | Feedback Generation for Performance Problems in Introductory Programming
Assignments | Tech report/extended version of FSE 2014 paper | null | 10.1145/2635868.2635912 | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Providing feedback on programming assignments manually is a tedious, error
prone, and time-consuming task. In this paper, we motivate and address the
problem of generating feedback on performance aspects in introductory
programming assignments. We studied a large number of functionally correct
student solutions to introductory programming assignments and observed: (1)
There are different algorithmic strategies, with varying levels of efficiency,
for solving a given problem. These different strategies merit different
feedback. (2) The same algorithmic strategy can be implemented in countless
different ways, which are not relevant for reporting feedback on the student
program.
We propose a light-weight programming language extension that allows a
teacher to define an algorithmic strategy by specifying certain key values that
should occur during the execution of an implementation. We describe a dynamic
analysis based approach to test whether a student's program matches a teacher's
specification. Our experimental results illustrate the effectiveness of both
our specification language and our dynamic analysis. On one of our benchmarks
consisting of 2316 functionally correct implementations to 3 programming
problems, we identified 16 strategies that we were able to describe using our
specification language (in 95 minutes after inspecting 66, i.e., around 3%,
implementations). Our dynamic analysis correctly matched each implementation
with its corresponding specification, thereby automatically producing the
intended feedback.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2014 11:09:59 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2014 10:01:03 GMT"
}
] | 2014-09-18T00:00:00 | [
[
"Gulwani",
"Sumit",
""
],
[
"Radiček",
"Ivan",
""
],
[
"Zuleger",
"Florian",
""
]
] | TITLE: Feedback Generation for Performance Problems in Introductory Programming
Assignments
ABSTRACT: Providing feedback on programming assignments manually is a tedious, error
prone, and time-consuming task. In this paper, we motivate and address the
problem of generating feedback on performance aspects in introductory
programming assignments. We studied a large number of functionally correct
student solutions to introductory programming assignments and observed: (1)
There are different algorithmic strategies, with varying levels of efficiency,
for solving a given problem. These different strategies merit different
feedback. (2) The same algorithmic strategy can be implemented in countless
different ways, which are not relevant for reporting feedback on the student
program.
We propose a light-weight programming language extension that allows a
teacher to define an algorithmic strategy by specifying certain key values that
should occur during the execution of an implementation. We describe a dynamic
analysis based approach to test whether a student's program matches a teacher's
specification. Our experimental results illustrate the effectiveness of both
our specification language and our dynamic analysis. On one of our benchmarks
consisting of 2316 functionally correct implementations to 3 programming
problems, we identified 16 strategies that we were able to describe using our
specification language (in 95 minutes after inspecting 66, i.e., around 3%,
implementations). Our dynamic analysis correctly matched each implementation
with its corresponding specification, thereby automatically producing the
intended feedback.
|
1406.6811 | Fumin Shen | Fumin Shen, Chunhua Shen and Heng Tao Shen | Face Image Classification by Pooling Raw Features | 12 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a very simple, efficient yet surprisingly effective feature
extraction method for face recognition (about 20 lines of Matlab code), which
is mainly inspired by spatial pyramid pooling in generic image classification.
We show that features formed by simply pooling local patches over a multi-level
pyramid, coupled with a linear classifier, can significantly outperform most
recent face recognition methods. The simplicity of our feature extraction
procedure is demonstrated by the fact that no learning is involved (except PCA
whitening). We show that, multi-level spatial pooling and dense extraction of
multi-scale patches play critical roles in face image classification. The
extracted facial features can capture strong structural information of
individual faces with no label information being used. We also find that,
pre-processing on local image patches such as contrast normalization can have
an important impact on the classification accuracy. In particular, on the
challenging face recognition datasets of FERET and LFW-a, our method improves
previous best results by more than 10% and 20%, respectively.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2014 08:56:55 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2014 06:40:29 GMT"
}
] | 2014-09-18T00:00:00 | [
[
"Shen",
"Fumin",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Shen",
"Heng Tao",
""
]
] | TITLE: Face Image Classification by Pooling Raw Features
ABSTRACT: We propose a very simple, efficient yet surprisingly effective feature
extraction method for face recognition (about 20 lines of Matlab code), which
is mainly inspired by spatial pyramid pooling in generic image classification.
We show that features formed by simply pooling local patches over a multi-level
pyramid, coupled with a linear classifier, can significantly outperform most
recent face recognition methods. The simplicity of our feature extraction
procedure is demonstrated by the fact that no learning is involved (except PCA
whitening). We show that, multi-level spatial pooling and dense extraction of
multi-scale patches play critical roles in face image classification. The
extracted facial features can capture strong structural information of
individual faces with no label information being used. We also find that,
pre-processing on local image patches such as contrast normalization can have
an important impact on the classification accuracy. In particular, on the
challenging face recognition datasets of FERET and LFW-a, our method improves
previous best results by more than 10% and 20%, respectively.
|
1409.4936 | Anthony Bagnall Dr | Anthony Bagnall and Reda Younsi | Ensembles of Random Sphere Cover Classifiers | null | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose and evaluate alternative ensemble schemes for a new instance based
learning classifier, the Randomised Sphere Cover (RSC) classifier. RSC fuses
instances into spheres, then bases classification on distance to spheres rather
than distance to instances. The randomised nature of RSC makes it ideal for use
in ensembles. We propose two ensemble methods tailored to the RSC classifier;
$\alpha \beta$RSE, an ensemble based on instance resampling and $\alpha$RSSE, a
subspace ensemble. We compare $\alpha \beta$RSE and $\alpha$RSSE to tree based
ensembles on a set of UCI datasets and demonstrates that RSC ensembles perform
significantly better than some of these ensembles, and not significantly worse
than the others. We demonstrate via a case study on six gene expression data
sets that $\alpha$RSSE can outperform other subspace ensemble methods on high
dimensional data when used in conjunction with an attribute filter. Finally, we
perform a set of Bias/Variance decomposition experiments to analyse the source
of improvement in comparison to a base classifier.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2014 10:18:34 GMT"
}
] | 2014-09-18T00:00:00 | [
[
"Bagnall",
"Anthony",
""
],
[
"Younsi",
"Reda",
""
]
] | TITLE: Ensembles of Random Sphere Cover Classifiers
ABSTRACT: We propose and evaluate alternative ensemble schemes for a new instance based
learning classifier, the Randomised Sphere Cover (RSC) classifier. RSC fuses
instances into spheres, then bases classification on distance to spheres rather
than distance to instances. The randomised nature of RSC makes it ideal for use
in ensembles. We propose two ensemble methods tailored to the RSC classifier;
$\alpha \beta$RSE, an ensemble based on instance resampling and $\alpha$RSSE, a
subspace ensemble. We compare $\alpha \beta$RSE and $\alpha$RSSE to tree based
ensembles on a set of UCI datasets and demonstrates that RSC ensembles perform
significantly better than some of these ensembles, and not significantly worse
than the others. We demonstrate via a case study on six gene expression data
sets that $\alpha$RSSE can outperform other subspace ensemble methods on high
dimensional data when used in conjunction with an attribute filter. Finally, we
perform a set of Bias/Variance decomposition experiments to analyse the source
of improvement in comparison to a base classifier.
|
1409.4995 | Xirong Li | Xixi He, Xirong Li, Gang Yang, Jieping Xu, Qin Jin | Adaptive Tag Selection for Image Annotation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Not all tags are relevant to an image, and the number of relevant tags is
image-dependent. Although many methods have been proposed for image
auto-annotation, the question of how to determine the number of tags to be
selected per image remains open. The main challenge is that for a large tag
vocabulary, there is often a lack of ground truth data for acquiring optimal
cutoff thresholds per tag. In contrast to previous works that pre-specify the
number of tags to be selected, we propose in this paper adaptive tag selection.
The key insight is to divide the vocabulary into two disjoint subsets, namely a
seen set consisting of tags having ground truth available for optimizing their
thresholds and a novel set consisting of tags without any ground truth. Such a
division allows us to estimate how many tags shall be selected from the novel
set according to the tags that have been selected from the seen set. The
effectiveness of the proposed method is justified by our participation in the
ImageCLEF 2014 image annotation task. On a set of 2,065 test images with ground
truth available for 207 tags, the benchmark evaluation shows that compared to
the popular top-$k$ strategy which obtains an F-score of 0.122, adaptive tag
selection achieves a higher F-score of 0.223. Moreover, by treating the
underlying image annotation system as a black box, the new method can be used
as an easy plug-in to boost the performance of existing systems.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2014 13:50:37 GMT"
}
] | 2014-09-18T00:00:00 | [
[
"He",
"Xixi",
""
],
[
"Li",
"Xirong",
""
],
[
"Yang",
"Gang",
""
],
[
"Xu",
"Jieping",
""
],
[
"Jin",
"Qin",
""
]
] | TITLE: Adaptive Tag Selection for Image Annotation
ABSTRACT: Not all tags are relevant to an image, and the number of relevant tags is
image-dependent. Although many methods have been proposed for image
auto-annotation, the question of how to determine the number of tags to be
selected per image remains open. The main challenge is that for a large tag
vocabulary, there is often a lack of ground truth data for acquiring optimal
cutoff thresholds per tag. In contrast to previous works that pre-specify the
number of tags to be selected, we propose in this paper adaptive tag selection.
The key insight is to divide the vocabulary into two disjoint subsets, namely a
seen set consisting of tags having ground truth available for optimizing their
thresholds and a novel set consisting of tags without any ground truth. Such a
division allows us to estimate how many tags shall be selected from the novel
set according to the tags that have been selected from the seen set. The
effectiveness of the proposed method is justified by our participation in the
ImageCLEF 2014 image annotation task. On a set of 2,065 test images with ground
truth available for 207 tags, the benchmark evaluation shows that compared to
the popular top-$k$ strategy which obtains an F-score of 0.122, adaptive tag
selection achieves a higher F-score of 0.223. Moreover, by treating the
underlying image annotation system as a black box, the new method can be used
as an easy plug-in to boost the performance of existing systems.
|
1409.5034 | Faraz Zaidi | Faraz Zaidi, Chris Muelder, Arnaud Sallaberry | Analysis and Visualization of Dynamic Networks | Book chapter | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This chapter provides an overview of the different techniques and methods
that exist for the analysis and visualization of dynamic networks. Basic
definitions and formal notations are discussed and important references are
cited.
A major reason for the popularity of the field of dynamic networks is its
applicability in a number of diverse fields. The field of dynamic networks is
in its infancy and there are so many avenues that need to be explored. From
developing network generation models to developing temporal metrics and
measures, from structural analysis to visual analysis, there is room for
further exploration in almost every dimension where dynamic networks are
studied. Recently, with the availability of dynamic data from various fields,
the empirical study and experimentation with real data sets has also helped
maturate the field. Furthermore, researchers have started to develop
foundations and theories based on these datasets which in turn has resulted
lots of activity among research communities.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2014 15:40:01 GMT"
}
] | 2014-09-18T00:00:00 | [
[
"Zaidi",
"Faraz",
""
],
[
"Muelder",
"Chris",
""
],
[
"Sallaberry",
"Arnaud",
""
]
] | TITLE: Analysis and Visualization of Dynamic Networks
ABSTRACT: This chapter provides an overview of the different techniques and methods
that exist for the analysis and visualization of dynamic networks. Basic
definitions and formal notations are discussed and important references are
cited.
A major reason for the popularity of the field of dynamic networks is its
applicability in a number of diverse fields. The field of dynamic networks is
in its infancy and there are so many avenues that need to be explored. From
developing network generation models to developing temporal metrics and
measures, from structural analysis to visual analysis, there is room for
further exploration in almost every dimension where dynamic networks are
studied. Recently, with the availability of dynamic data from various fields,
the empirical study and experimentation with real data sets has also helped
maturate the field. Furthermore, researchers have started to develop
foundations and theories based on these datasets which in turn has resulted
lots of activity among research communities.
|
1310.2963 | Michael Szell | Paolo Santi, Giovanni Resta, Michael Szell, Stanislav Sobolevsky,
Steven Strogatz, Carlo Ratti | Quantifying the benefits of vehicle pooling with shareability networks | Main text: 6 pages, 3 figures, SI: 24 pages | PNAS 111(37), 13290-13294 (2014) | 10.1073/pnas.1403657111 | null | physics.soc-ph cs.CY cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Taxi services are a vital part of urban transportation, and a considerable
contributor to traffic congestion and air pollution causing substantial adverse
effects on human health. Sharing taxi trips is a possible way of reducing the
negative impact of taxi services on cities, but this comes at the expense of
passenger discomfort quantifiable in terms of a longer travel time. Due to
computational challenges, taxi sharing has traditionally been approached on
small scales, such as within airport perimeters, or with dynamical ad-hoc
heuristics. However, a mathematical framework for the systematic understanding
of the tradeoff between collective benefits of sharing and individual passenger
discomfort is lacking. Here we introduce the notion of shareability network
which allows us to model the collective benefits of sharing as a function of
passenger inconvenience, and to efficiently compute optimal sharing strategies
on massive datasets. We apply this framework to a dataset of millions of taxi
trips taken in New York City, showing that with increasing but still relatively
low passenger discomfort, cumulative trip length can be cut by 40% or more.
This benefit comes with reductions in service cost, emissions, and with split
fares, hinting towards a wide passenger acceptance of such a shared service.
Simulation of a realistic online system demonstrates the feasibility of a
shareable taxi service in New York City. Shareability as a function of trip
density saturates fast, suggesting effectiveness of the taxi sharing system
also in cities with much sparser taxi fleets or when willingness to share is
low.
| [
{
"version": "v1",
"created": "Thu, 10 Oct 2013 20:56:56 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Sep 2014 19:48:38 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Santi",
"Paolo",
""
],
[
"Resta",
"Giovanni",
""
],
[
"Szell",
"Michael",
""
],
[
"Sobolevsky",
"Stanislav",
""
],
[
"Strogatz",
"Steven",
""
],
[
"Ratti",
"Carlo",
""
]
] | TITLE: Quantifying the benefits of vehicle pooling with shareability networks
ABSTRACT: Taxi services are a vital part of urban transportation, and a considerable
contributor to traffic congestion and air pollution causing substantial adverse
effects on human health. Sharing taxi trips is a possible way of reducing the
negative impact of taxi services on cities, but this comes at the expense of
passenger discomfort quantifiable in terms of a longer travel time. Due to
computational challenges, taxi sharing has traditionally been approached on
small scales, such as within airport perimeters, or with dynamical ad-hoc
heuristics. However, a mathematical framework for the systematic understanding
of the tradeoff between collective benefits of sharing and individual passenger
discomfort is lacking. Here we introduce the notion of shareability network
which allows us to model the collective benefits of sharing as a function of
passenger inconvenience, and to efficiently compute optimal sharing strategies
on massive datasets. We apply this framework to a dataset of millions of taxi
trips taken in New York City, showing that with increasing but still relatively
low passenger discomfort, cumulative trip length can be cut by 40% or more.
This benefit comes with reductions in service cost, emissions, and with split
fares, hinting towards a wide passenger acceptance of such a shared service.
Simulation of a realistic online system demonstrates the feasibility of a
shareable taxi service in New York City. Shareability as a function of trip
density saturates fast, suggesting effectiveness of the taxi sharing system
also in cities with much sparser taxi fleets or when willingness to share is
low.
|
1407.5981 | Tom Crick | Tom Crick, Benjamin A. Hall and Samin Ishtiaq | "Can I Implement Your Algorithm?": A Model for Reproducible Research
Software | Accepted for the 2nd Workshop on Sustainable Software for Science:
Practice and Experiences (WSSSPE2); 5 pages, LaTeX | null | null | null | cs.SE cs.CE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The reproduction and replication of novel results has become a major issue
for a number of scientific disciplines. In computer science and related
computational disciplines such as systems biology, the issues closely revolve
around the ability to implement novel algorithms and approaches. Taking an
approach from the literature and applying it to a new codebase frequently
requires local knowledge missing from the published manuscripts and project
websites. Alongside this issue, benchmarking, and the development of fair ---
and widely available --- benchmark sets present another barrier.
In this paper, we outline several suggestions to address these issues, driven
by specific examples from a range of scientific domains. Finally, based on
these suggestions, we propose a new open platform for scientific software
development which effectively isolates specific dependencies from the
individual researcher and their workstation and allows faster, more powerful
sharing of the results of scientific software engineering.
| [
{
"version": "v1",
"created": "Tue, 22 Jul 2014 19:29:34 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Sep 2014 13:35:18 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Crick",
"Tom",
""
],
[
"Hall",
"Benjamin A.",
""
],
[
"Ishtiaq",
"Samin",
""
]
] | TITLE: "Can I Implement Your Algorithm?": A Model for Reproducible Research
Software
ABSTRACT: The reproduction and replication of novel results has become a major issue
for a number of scientific disciplines. In computer science and related
computational disciplines such as systems biology, the issues closely revolve
around the ability to implement novel algorithms and approaches. Taking an
approach from the literature and applying it to a new codebase frequently
requires local knowledge missing from the published manuscripts and project
websites. Alongside this issue, benchmarking, and the development of fair ---
and widely available --- benchmark sets present another barrier.
In this paper, we outline several suggestions to address these issues, driven
by specific examples from a range of scientific domains. Finally, based on
these suggestions, we propose a new open platform for scientific software
development which effectively isolates specific dependencies from the
individual researcher and their workstation and allows faster, more powerful
sharing of the results of scientific software engineering.
|
1407.6705 | Reza Azad | Reza Azad, Hamid Reza Shayegh, Hamed Amiri | A Robust and Efficient Method for Improving Accuracy of License Plate
Characters Recognition | This paper has been withdrawn by the author due to a crucial sign
error in equation 1 and some mistake | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | License Plate Recognition (LPR) plays an important role on the traffic
monitoring and parking management. A robust and efficient method for enhancing
accuracy of license plate characters recognition based on K Nearest Neighbours
(K-NN) classifier is presented in this paper. The system first prepares a
contour form of the extracted character, then the angle and distance feature
information about the character is extracted and finally K-NN classifier is
used to character recognition. Angle and distance features of a character have
been computed based on distribution of points on the bitmap image of character.
In K-NN method, the Euclidean distance between testing point and reference
points is calculated in order to find the k-nearest neighbours. We evaluated
our method on the available dataset that contain 1200 sample. Using 70% samples
for training, we tested our method on whole samples and obtained 99% correct
recognition rate.Further, we achieved average 99.41% accuracy using
three/strategy validation technique on 1200 dataset.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2014 09:26:01 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Sep 2014 07:28:21 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Azad",
"Reza",
""
],
[
"Shayegh",
"Hamid Reza",
""
],
[
"Amiri",
"Hamed",
""
]
] | TITLE: A Robust and Efficient Method for Improving Accuracy of License Plate
Characters Recognition
ABSTRACT: License Plate Recognition (LPR) plays an important role on the traffic
monitoring and parking management. A robust and efficient method for enhancing
accuracy of license plate characters recognition based on K Nearest Neighbours
(K-NN) classifier is presented in this paper. The system first prepares a
contour form of the extracted character, then the angle and distance feature
information about the character is extracted and finally K-NN classifier is
used to character recognition. Angle and distance features of a character have
been computed based on distribution of points on the bitmap image of character.
In K-NN method, the Euclidean distance between testing point and reference
points is calculated in order to find the k-nearest neighbours. We evaluated
our method on the available dataset that contain 1200 sample. Using 70% samples
for training, we tested our method on whole samples and obtained 99% correct
recognition rate.Further, we achieved average 99.41% accuracy using
three/strategy validation technique on 1200 dataset.
|
1409.4403 | Jianguo Liu | Lei Hou, Xue Pan, Qiang Guo, Jian-Guo Liu | Memory effect of the online user preference | 22 pages, 5 figures, Scientific Reports 2014 Accepted | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The mechanism of the online user preference evolution is of great
significance for understanding the online user behaviors and improving the
quality of online services. Since users are allowed to rate on objects in many
online systems, ratings can well reflect the users' preference. With two
benchmark datasets from online systems, we uncover the memory effect in users'
selecting behavior which is the sequence of qualities of selected objects and
the rating behavior which is the sequence of ratings delivered by each user.
Furthermore, the memory duration is presented to describe the length of a
memory, which exhibits the power-law distribution, i.e., the probability of the
occurring of long-duration memory is much higher than that of the random case
which follows the exponential distribution. We present a preference model in
which a Markovian process is utilized to describe the users' selecting
behavior, and the rating behavior depends on the selecting behavior. With only
one parameter for each of the user's selecting and rating behavior, the
preference model could regenerate any duration distribution ranging from the
power-law form (strong memory) to the exponential form (weak memory).
| [
{
"version": "v1",
"created": "Sat, 13 Sep 2014 11:55:08 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Hou",
"Lei",
""
],
[
"Pan",
"Xue",
""
],
[
"Guo",
"Qiang",
""
],
[
"Liu",
"Jian-Guo",
""
]
] | TITLE: Memory effect of the online user preference
ABSTRACT: The mechanism of the online user preference evolution is of great
significance for understanding the online user behaviors and improving the
quality of online services. Since users are allowed to rate on objects in many
online systems, ratings can well reflect the users' preference. With two
benchmark datasets from online systems, we uncover the memory effect in users'
selecting behavior which is the sequence of qualities of selected objects and
the rating behavior which is the sequence of ratings delivered by each user.
Furthermore, the memory duration is presented to describe the length of a
memory, which exhibits the power-law distribution, i.e., the probability of the
occurring of long-duration memory is much higher than that of the random case
which follows the exponential distribution. We present a preference model in
which a Markovian process is utilized to describe the users' selecting
behavior, and the rating behavior depends on the selecting behavior. With only
one parameter for each of the user's selecting and rating behavior, the
preference model could regenerate any duration distribution ranging from the
power-law form (strong memory) to the exponential form (weak memory).
|
1409.4438 | Manoj Gulati | Manoj Gulati, Shobha Sundar Ram, Amarjeet Singh | An In Depth Study into Using EMI Signatures for Appliance Identification | null | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy conservation is a key factor towards long term energy sustainability.
Real-time end user energy feedback, using disaggregated electric load
composition, can play a pivotal role in motivating consumers towards energy
conservation. Recent works have explored using high frequency conducted
electromagnetic interference (EMI) on power lines as a single point sensing
parameter for monitoring common home appliances. However, key questions
regarding the reliability and feasibility of using EMI signatures for
non-intrusive load monitoring over multiple appliances across different sensing
paradigms remain unanswered. This work presents some of the key challenges
towards using EMI as a unique and time invariant feature for load
disaggregation. In-depth empirical evaluations of a large number of appliances
in different sensing configurations are carried out, in both laboratory and
real world settings. Insights into the effects of external parameters such as
line impedance, background noise and appliance coupling on the EMI behavior of
an appliance are realized through simulations and measurements. A generic
approach for simulating the EMI behavior of an appliance that can then be used
to do a detailed analysis of real world phenomenology is presented. The
simulation approach is validated with EMI data from a router. Our EMI dataset -
High Frequency EMI Dataset (HFED) is also released.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2014 20:19:46 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Gulati",
"Manoj",
""
],
[
"Ram",
"Shobha Sundar",
""
],
[
"Singh",
"Amarjeet",
""
]
] | TITLE: An In Depth Study into Using EMI Signatures for Appliance Identification
ABSTRACT: Energy conservation is a key factor towards long term energy sustainability.
Real-time end user energy feedback, using disaggregated electric load
composition, can play a pivotal role in motivating consumers towards energy
conservation. Recent works have explored using high frequency conducted
electromagnetic interference (EMI) on power lines as a single point sensing
parameter for monitoring common home appliances. However, key questions
regarding the reliability and feasibility of using EMI signatures for
non-intrusive load monitoring over multiple appliances across different sensing
paradigms remain unanswered. This work presents some of the key challenges
towards using EMI as a unique and time invariant feature for load
disaggregation. In-depth empirical evaluations of a large number of appliances
in different sensing configurations are carried out, in both laboratory and
real world settings. Insights into the effects of external parameters such as
line impedance, background noise and appliance coupling on the EMI behavior of
an appliance are realized through simulations and measurements. A generic
approach for simulating the EMI behavior of an appliance that can then be used
to do a detailed analysis of real world phenomenology is presented. The
simulation approach is validated with EMI data from a router. Our EMI dataset -
High Frequency EMI Dataset (HFED) is also released.
|
1409.4481 | Aniket Bera | Aniket Bera, David Wolinski, Julien Pettr\'e, Dinesh Manocha | Real-time Crowd Tracking using Parameter Optimized Mixture of Motion
Models | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel, real-time algorithm to track the trajectory of each
pedestrian in moderately dense crowded scenes. Our formulation is based on an
adaptive particle-filtering scheme that uses a combination of various
multi-agent heterogeneous pedestrian simulation models. We automatically
compute the optimal parameters for each of these different models based on
prior tracked data and use the best model as motion prior for our
particle-filter based tracking algorithm. We also use our "mixture of motion
models" for adaptive particle selection and accelerate the performance of the
online tracking algorithm. The motion model parameter estimation is formulated
as an optimization problem, and we use an approach that solves this
combinatorial optimization problem in a model independent manner and hence
scalable to any multi-agent pedestrian motion model. We evaluate the
performance of our approach on different crowd video datasets and highlight the
improvement in accuracy over homogeneous motion models and a baseline
mean-shift based tracker. In practice, our formulation can compute trajectories
of tens of pedestrians on a multi-core desktop CPU in in real time and offer
higher accuracy as compared to prior real time pedestrian tracking algorithms.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2014 01:36:52 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Bera",
"Aniket",
""
],
[
"Wolinski",
"David",
""
],
[
"Pettré",
"Julien",
""
],
[
"Manocha",
"Dinesh",
""
]
] | TITLE: Real-time Crowd Tracking using Parameter Optimized Mixture of Motion
Models
ABSTRACT: We present a novel, real-time algorithm to track the trajectory of each
pedestrian in moderately dense crowded scenes. Our formulation is based on an
adaptive particle-filtering scheme that uses a combination of various
multi-agent heterogeneous pedestrian simulation models. We automatically
compute the optimal parameters for each of these different models based on
prior tracked data and use the best model as motion prior for our
particle-filter based tracking algorithm. We also use our "mixture of motion
models" for adaptive particle selection and accelerate the performance of the
online tracking algorithm. The motion model parameter estimation is formulated
as an optimization problem, and we use an approach that solves this
combinatorial optimization problem in a model independent manner and hence
scalable to any multi-agent pedestrian motion model. We evaluate the
performance of our approach on different crowd video datasets and highlight the
improvement in accuracy over homogeneous motion models and a baseline
mean-shift based tracker. In practice, our formulation can compute trajectories
of tens of pedestrians on a multi-core desktop CPU in in real time and offer
higher accuracy as compared to prior real time pedestrian tracking algorithms.
|
1409.4507 | Awny Sayed | Awny Sayed and Amal Almaqrashi | Scalable and Efficient Self-Join Processing technique in RDF data | 8-pages, 5-figures, International Journal of Computer Science Issues
(IJCSI), Volume 11, Issue 2. April 2014 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient management of RDF data plays an important role in successfully
understanding and fast querying data. Although the current approaches of
indexing in RDF Triples such as property tables and vertically partitioned
solved many issues; however, they still suffer from the performance in the
complex self-join queries and insert data in the same table. As an improvement
in this paper, we propose an alternative solution to facilitate flexibility and
efficiency in that queries and try to reach to the optimal solution to decrease
the self-joins as much as possible, this solution based on the idea of
"Recursive Mapping of Twin Tables". Our main goal of Recursive Mapping of Twin
Tables (RMTT) approach is divided the main RDF Triple into two tables which
have the same structure of RDF Triple and insert the RDF data recursively. Our
experimental results compared the performance of join queries in vertically
partitioned approach and the RMTT approach using very large RDF data, like DBLP
and DBpedia datasets. Our experimental results with a number of complex
submitted queries shows that our approach is highly scalable compared with
RDF-3X approach and RMTT reduces the number of self-joins especially in complex
queries 3-4 times than RDF-3X approach
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2014 05:21:06 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Sayed",
"Awny",
""
],
[
"Almaqrashi",
"Amal",
""
]
] | TITLE: Scalable and Efficient Self-Join Processing technique in RDF data
ABSTRACT: Efficient management of RDF data plays an important role in successfully
understanding and fast querying data. Although the current approaches of
indexing in RDF Triples such as property tables and vertically partitioned
solved many issues; however, they still suffer from the performance in the
complex self-join queries and insert data in the same table. As an improvement
in this paper, we propose an alternative solution to facilitate flexibility and
efficiency in that queries and try to reach to the optimal solution to decrease
the self-joins as much as possible, this solution based on the idea of
"Recursive Mapping of Twin Tables". Our main goal of Recursive Mapping of Twin
Tables (RMTT) approach is divided the main RDF Triple into two tables which
have the same structure of RDF Triple and insert the RDF data recursively. Our
experimental results compared the performance of join queries in vertically
partitioned approach and the RMTT approach using very large RDF data, like DBLP
and DBpedia datasets. Our experimental results with a number of complex
submitted queries shows that our approach is highly scalable compared with
RDF-3X approach and RMTT reduces the number of self-joins especially in complex
queries 3-4 times than RDF-3X approach
|
1409.4698 | Charmgil Hong | Charmgil Hong, Iyad Batal, Milos Hauskrecht | A Mixtures-of-Experts Framework for Multi-Label Classification | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a novel probabilistic approach for multi-label classification that
is based on the mixtures-of-experts architecture combined with recently
introduced conditional tree-structured Bayesian networks. Our approach captures
different input-output relations from multi-label data using the efficient
tree-structured classifiers, while the mixtures-of-experts architecture aims to
compensate for the tree-structured restrictions and build a more accurate
model. We develop and present algorithms for learning the model from data and
for performing multi-label predictions on future data instances. Experiments on
multiple benchmark datasets demonstrate that our approach achieves highly
competitive results and outperforms the existing state-of-the-art multi-label
classification methods.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2014 16:52:14 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Hong",
"Charmgil",
""
],
[
"Batal",
"Iyad",
""
],
[
"Hauskrecht",
"Milos",
""
]
] | TITLE: A Mixtures-of-Experts Framework for Multi-Label Classification
ABSTRACT: We develop a novel probabilistic approach for multi-label classification that
is based on the mixtures-of-experts architecture combined with recently
introduced conditional tree-structured Bayesian networks. Our approach captures
different input-output relations from multi-label data using the efficient
tree-structured classifiers, while the mixtures-of-experts architecture aims to
compensate for the tree-structured restrictions and build a more accurate
model. We develop and present algorithms for learning the model from data and
for performing multi-label predictions on future data instances. Experiments on
multiple benchmark datasets demonstrate that our approach achieves highly
competitive results and outperforms the existing state-of-the-art multi-label
classification methods.
|
1112.5507 | Joshua Vogelstein | Joshua T. Vogelstein, John M. Conroy, Vince Lyzinski, Louis J.
Podrazik, Steven G. Kratzer, Eric T. Harley, Donniell E. Fishkind, R. Jacob
Vogelstein, Carey E. Priebe | Fast Approximate Quadratic Programming for Large (Brain) Graph Matching | 17 pages, 5 figures, 2 tables | null | null | null | math.OC cs.DS q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quadratic assignment problems (QAPs) arise in a wide variety of domains,
ranging from operations research to graph theory to computer vision to
neuroscience. In the age of big data, graph valued data is becoming more
prominent, and with it, a desire to run algorithms on ever larger graphs.
Because QAP is NP-hard, exact algorithms are intractable. Approximate
algorithms necessarily employ an accuracy/efficiency trade-off. We developed a
fast approximate quadratic assignment algorithm (FAQ). FAQ finds a local optima
in (worst case) time cubic in the number of vertices, similar to other
approximate QAP algorithms. We demonstrate empirically that our algorithm is
faster and achieves a lower objective value on over 80% of the suite of QAP
benchmarks, compared with the previous state-of-the-art. Applying the
algorithms to our motivating example, matching C. elegans connectomes
(brain-graphs), we find that FAQ achieves the optimal performance in record
time, whereas none of the others even find the optimum.
| [
{
"version": "v1",
"created": "Fri, 23 Dec 2011 02:56:26 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Jul 2012 03:44:51 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Nov 2012 04:56:59 GMT"
},
{
"version": "v4",
"created": "Fri, 10 May 2013 01:58:09 GMT"
},
{
"version": "v5",
"created": "Sat, 13 Sep 2014 15:08:28 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Vogelstein",
"Joshua T.",
""
],
[
"Conroy",
"John M.",
""
],
[
"Lyzinski",
"Vince",
""
],
[
"Podrazik",
"Louis J.",
""
],
[
"Kratzer",
"Steven G.",
""
],
[
"Harley",
"Eric T.",
""
],
[
"Fishkind",
"Donniell E.",
""
],
[
"Vogelstein",
"R. Jacob",
""
],
[
"Priebe",
"Carey E.",
""
]
] | TITLE: Fast Approximate Quadratic Programming for Large (Brain) Graph Matching
ABSTRACT: Quadratic assignment problems (QAPs) arise in a wide variety of domains,
ranging from operations research to graph theory to computer vision to
neuroscience. In the age of big data, graph valued data is becoming more
prominent, and with it, a desire to run algorithms on ever larger graphs.
Because QAP is NP-hard, exact algorithms are intractable. Approximate
algorithms necessarily employ an accuracy/efficiency trade-off. We developed a
fast approximate quadratic assignment algorithm (FAQ). FAQ finds a local optima
in (worst case) time cubic in the number of vertices, similar to other
approximate QAP algorithms. We demonstrate empirically that our algorithm is
faster and achieves a lower objective value on over 80% of the suite of QAP
benchmarks, compared with the previous state-of-the-art. Applying the
algorithms to our motivating example, matching C. elegans connectomes
(brain-graphs), we find that FAQ achieves the optimal performance in record
time, whereas none of the others even find the optimum.
|
1309.1737 | Gene Katsevich | Gene Katsevich, Alexander Katsevich, Amit Singer | Covariance Matrix Estimation for the Cryo-EM Heterogeneity Problem | null | null | null | null | math.NA cs.NA physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In cryo-electron microscopy (cryo-EM), a microscope generates a top view of a
sample of randomly-oriented copies of a molecule. The problem of single
particle reconstruction (SPR) from cryo-EM is to use the resulting set of noisy
2D projection images taken at unknown directions to reconstruct the 3D
structure of the molecule. In some situations, the molecule under examination
exhibits structural variability, which poses a fundamental challenge in SPR.
The heterogeneity problem is the task of mapping the space of conformational
states of a molecule. It has been previously suggested that the leading
eigenvectors of the covariance matrix of the 3D molecules can be used to solve
the heterogeneity problem. Estimating the covariance matrix is challenging,
since only projections of the molecules are observed, but not the molecules
themselves. In this paper, we formulate a general problem of covariance
estimation from noisy projections of samples. This problem has intimate
connections with matrix completion problems and high-dimensional principal
component analysis. We propose an estimator and prove its consistency. When
there are finitely many heterogeneity classes, the spectrum of the estimated
covariance matrix reveals the number of classes. The estimator can be found as
the solution to a certain linear system. In the cryo-EM case, the linear
operator to be inverted, which we term the projection covariance transform, is
an important object in covariance estimation for tomographic problems involving
structural variation. Inverting it involves applying a filter akin to the ramp
filter in tomography. We design a basis in which this linear operator is sparse
and thus can be tractably inverted despite its large size. We demonstrate via
numerical experiments on synthetic datasets the robustness of our algorithm to
high levels of noise.
| [
{
"version": "v1",
"created": "Tue, 3 Sep 2013 02:23:53 GMT"
},
{
"version": "v2",
"created": "Sat, 24 May 2014 00:34:30 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Sep 2014 20:29:22 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Katsevich",
"Gene",
""
],
[
"Katsevich",
"Alexander",
""
],
[
"Singer",
"Amit",
""
]
] | TITLE: Covariance Matrix Estimation for the Cryo-EM Heterogeneity Problem
ABSTRACT: In cryo-electron microscopy (cryo-EM), a microscope generates a top view of a
sample of randomly-oriented copies of a molecule. The problem of single
particle reconstruction (SPR) from cryo-EM is to use the resulting set of noisy
2D projection images taken at unknown directions to reconstruct the 3D
structure of the molecule. In some situations, the molecule under examination
exhibits structural variability, which poses a fundamental challenge in SPR.
The heterogeneity problem is the task of mapping the space of conformational
states of a molecule. It has been previously suggested that the leading
eigenvectors of the covariance matrix of the 3D molecules can be used to solve
the heterogeneity problem. Estimating the covariance matrix is challenging,
since only projections of the molecules are observed, but not the molecules
themselves. In this paper, we formulate a general problem of covariance
estimation from noisy projections of samples. This problem has intimate
connections with matrix completion problems and high-dimensional principal
component analysis. We propose an estimator and prove its consistency. When
there are finitely many heterogeneity classes, the spectrum of the estimated
covariance matrix reveals the number of classes. The estimator can be found as
the solution to a certain linear system. In the cryo-EM case, the linear
operator to be inverted, which we term the projection covariance transform, is
an important object in covariance estimation for tomographic problems involving
structural variation. Inverting it involves applying a filter akin to the ramp
filter in tomography. We design a basis in which this linear operator is sparse
and thus can be tractably inverted despite its large size. We demonstrate via
numerical experiments on synthetic datasets the robustness of our algorithm to
high levels of noise.
|
1403.4813 | Xianjin Fu | Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong and Ji
Wang | MPISE: Symbolic Execution of MPI Programs | 25pages, extended version (unpublished!) of paper submitted to ictac
2014. Version 0.2, we carry out experiments using release llvm istead of a
debug version one, which makes mpise 10 times faster | null | null | null | cs.DC cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Message Passing Interfaces (MPI) plays an important role in parallel
computing. Many parallel applications are implemented as MPI programs. The
existing methods of bug detection for MPI programs have the shortage of
providing both input and non-determinism coverage, leading to missed bugs. In
this paper, we employ symbolic execution to ensure the input coverage, and
propose an on-the-fly schedule algorithm to reduce the interleaving
explorations for non-determinism coverage, while ensuring the soundness and
completeness. We have implemented our approach as a tool, called MPISE, which
can automatically detect the deadlock and runtime bugs in MPI programs. The
results of the experiments on benchmark programs and real world MPI programs
indicate that MPISE finds bugs effectively and efficiently. In addition, our
tool also provides diagnostic information and replay mechanism to help
understanding bugs.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2014 14:23:24 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2014 11:49:01 GMT"
},
{
"version": "v3",
"created": "Mon, 15 Sep 2014 08:21:28 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Fu",
"Xianjin",
""
],
[
"Chen",
"Zhenbang",
""
],
[
"Zhang",
"Yufeng",
""
],
[
"Huang",
"Chun",
""
],
[
"Dong",
"Wei",
""
],
[
"Wang",
"Ji",
""
]
] | TITLE: MPISE: Symbolic Execution of MPI Programs
ABSTRACT: Message Passing Interfaces (MPI) plays an important role in parallel
computing. Many parallel applications are implemented as MPI programs. The
existing methods of bug detection for MPI programs have the shortage of
providing both input and non-determinism coverage, leading to missed bugs. In
this paper, we employ symbolic execution to ensure the input coverage, and
propose an on-the-fly schedule algorithm to reduce the interleaving
explorations for non-determinism coverage, while ensuring the soundness and
completeness. We have implemented our approach as a tool, called MPISE, which
can automatically detect the deadlock and runtime bugs in MPI programs. The
results of the experiments on benchmark programs and real world MPI programs
indicate that MPISE finds bugs effectively and efficiently. In addition, our
tool also provides diagnostic information and replay mechanism to help
understanding bugs.
|
1409.3867 | Vishwakarma Singh | Vishwakarma Singh and Ambuj K. Singh | Nearest Keyword Set Search in Multi-dimensional Datasets | Accepted as Full Research Paper to ICDE 2014, Chicago, IL, USA | null | null | null | cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Keyword-based search in text-rich multi-dimensional datasets facilitates many
novel applications and tools. In this paper, we consider objects that are
tagged with keywords and are embedded in a vector space. For these datasets, we
study queries that ask for the tightest groups of points satisfying a given set
of keywords. We propose a novel method called ProMiSH (Projection and Multi
Scale Hashing) that uses random projection and hash-based index structures, and
achieves high scalability and speedup. We present an exact and an approximate
version of the algorithm. Our empirical studies, both on real and synthetic
datasets, show that ProMiSH has a speedup of more than four orders over
state-of-the-art tree-based techniques. Our scalability tests on datasets of
sizes up to 10 million and dimensions up to 100 for queries having up to 9
keywords show that ProMiSH scales linearly with the dataset size, the dataset
dimension, the query size, and the result size.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2014 21:12:16 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Singh",
"Vishwakarma",
""
],
[
"Singh",
"Ambuj K.",
""
]
] | TITLE: Nearest Keyword Set Search in Multi-dimensional Datasets
ABSTRACT: Keyword-based search in text-rich multi-dimensional datasets facilitates many
novel applications and tools. In this paper, we consider objects that are
tagged with keywords and are embedded in a vector space. For these datasets, we
study queries that ask for the tightest groups of points satisfying a given set
of keywords. We propose a novel method called ProMiSH (Projection and Multi
Scale Hashing) that uses random projection and hash-based index structures, and
achieves high scalability and speedup. We present an exact and an approximate
version of the algorithm. Our empirical studies, both on real and synthetic
datasets, show that ProMiSH has a speedup of more than four orders over
state-of-the-art tree-based techniques. Our scalability tests on datasets of
sizes up to 10 million and dimensions up to 100 for queries having up to 9
keywords show that ProMiSH scales linearly with the dataset size, the dataset
dimension, the query size, and the result size.
|
1409.3881 | Michael Bloodgood | Michael Bloodgood and K. Vijay-Shanker | An Approach to Reducing Annotation Costs for BioNLP | 2 pages, 1 figure, 5 tables; appeared in Proceedings of the Workshop
on Current Trends in Biomedical Natural Language Processing at ACL
(Association for Computational Linguistics) 2008 | In Proceedings of the Workshop on Current Trends in Biomedical
Natural Language Processing, pages 104-105, Columbus, Ohio, June 2008.
Association for Computational Linguistics | null | null | cs.CL cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a broad range of BioNLP tasks for which active learning (AL) can
significantly reduce annotation costs and a specific AL algorithm we have
developed is particularly effective in reducing annotation costs for these
tasks. We have previously developed an AL algorithm called ClosestInitPA that
works best with tasks that have the following characteristics: redundancy in
training material, burdensome annotation costs, Support Vector Machines (SVMs)
work well for the task, and imbalanced datasets (i.e. when set up as a binary
classification problem, one class is substantially rarer than the other). Many
BioNLP tasks have these characteristics and thus our AL algorithm is a natural
approach to apply to BioNLP tasks.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2014 22:40:38 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Bloodgood",
"Michael",
""
],
[
"Vijay-Shanker",
"K.",
""
]
] | TITLE: An Approach to Reducing Annotation Costs for BioNLP
ABSTRACT: There is a broad range of BioNLP tasks for which active learning (AL) can
significantly reduce annotation costs and a specific AL algorithm we have
developed is particularly effective in reducing annotation costs for these
tasks. We have previously developed an AL algorithm called ClosestInitPA that
works best with tasks that have the following characteristics: redundancy in
training material, burdensome annotation costs, Support Vector Machines (SVMs)
work well for the task, and imbalanced datasets (i.e. when set up as a binary
classification problem, one class is substantially rarer than the other). Many
BioNLP tasks have these characteristics and thus our AL algorithm is a natural
approach to apply to BioNLP tasks.
|
1409.3913 | Jae-Yeong Lee | Jae-Yeong Lee and Wonpil Yu | Concurrent Tracking of Inliers and Outliers | draft | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In object tracking, outlier is one of primary factors which degrade
performance of image-based tracking algorithms. In this respect, therefore,
most of the existing methods simply discard detected outliers and pay little or
no attention to employing them as an important source of information for motion
estimation. We consider outliers as important as inliers for object tracking
and propose a motion estimation algorithm based on concurrent tracking of
inliers and outliers. Our tracker makes use of pyramidal implementation of the
Lucas-Kanade tracker to estimate motion flows of inliers and outliers and final
target motion is estimated robustly based on both of these information.
Experimental results from challenging benchmark video sequences confirm
enhanced tracking performance, showing highly stable target tracking under
severe occlusion compared with state-of-the-art algorithms. The proposed
algorithm runs at more than 100 frames per second even without using a hardware
accelerator, which makes the proposed method more practical and portable.
| [
{
"version": "v1",
"created": "Sat, 13 Sep 2014 05:52:36 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Lee",
"Jae-Yeong",
""
],
[
"Yu",
"Wonpil",
""
]
] | TITLE: Concurrent Tracking of Inliers and Outliers
ABSTRACT: In object tracking, outlier is one of primary factors which degrade
performance of image-based tracking algorithms. In this respect, therefore,
most of the existing methods simply discard detected outliers and pay little or
no attention to employing them as an important source of information for motion
estimation. We consider outliers as important as inliers for object tracking
and propose a motion estimation algorithm based on concurrent tracking of
inliers and outliers. Our tracker makes use of pyramidal implementation of the
Lucas-Kanade tracker to estimate motion flows of inliers and outliers and final
target motion is estimated robustly based on both of these information.
Experimental results from challenging benchmark video sequences confirm
enhanced tracking performance, showing highly stable target tracking under
severe occlusion compared with state-of-the-art algorithms. The proposed
algorithm runs at more than 100 frames per second even without using a hardware
accelerator, which makes the proposed method more practical and portable.
|
1409.3924 | Yuguang Wang | Yuguang Wang and Feilong Cao and Yubo Yuan | A study on effectiveness of extreme learning machine | null | Neurocomputing, 74(16):2483--2490, 2011 | 10.1016/j.neucom.2010.11.030 | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Extreme learning machine (ELM), proposed by Huang et al., has been shown a
promising learning algorithm for single-hidden layer feedforward neural
networks (SLFNs). Nevertheless, because of the random choice of input weights
and biases, the ELM algorithm sometimes makes the hidden layer output matrix H
of SLFN not full column rank, which lowers the effectiveness of ELM. This paper
discusses the effectiveness of ELM and proposes an improved algorithm called
EELM that makes a proper selection of the input weights and bias before
calculating the output weights, which ensures the full column rank of H in
theory. This improves to some extend the learning rate (testing accuracy,
prediction accuracy, learning time) and the robustness property of the
networks. The experimental results based on both the benchmark function
approximation and real-world problems including classification and regression
applications show the good performances of EELM.
| [
{
"version": "v1",
"created": "Sat, 13 Sep 2014 07:47:37 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Wang",
"Yuguang",
""
],
[
"Cao",
"Feilong",
""
],
[
"Yuan",
"Yubo",
""
]
] | TITLE: A study on effectiveness of extreme learning machine
ABSTRACT: Extreme learning machine (ELM), proposed by Huang et al., has been shown a
promising learning algorithm for single-hidden layer feedforward neural
networks (SLFNs). Nevertheless, because of the random choice of input weights
and biases, the ELM algorithm sometimes makes the hidden layer output matrix H
of SLFN not full column rank, which lowers the effectiveness of ELM. This paper
discusses the effectiveness of ELM and proposes an improved algorithm called
EELM that makes a proper selection of the input weights and bias before
calculating the output weights, which ensures the full column rank of H in
theory. This improves to some extend the learning rate (testing accuracy,
prediction accuracy, learning time) and the robustness property of the
networks. The experimental results based on both the benchmark function
approximation and real-world problems including classification and regression
applications show the good performances of EELM.
|
1409.4044 | Alain Tapp | Alain Tapp | A new approach in machine learning | Preliminary report | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this technical report we presented a novel approach to machine learning.
Once the new framework is presented, we will provide a simple and yet very
powerful learning algorithm which will be benchmark on various dataset.
The framework we proposed is based on booleen circuits; more specifically the
classifier produced by our algorithm have that form. Using bits and boolean
gates instead of real numbers and multiplication enable the the learning
algorithm and classifier to use very efficient boolean vector operations. This
enable both the learning algorithm and classifier to be extremely efficient.
The accuracy of the classifier we obtain with our framework compares very
favorably those produced by conventional techniques, both in terms of
efficiency and accuracy.
| [
{
"version": "v1",
"created": "Sun, 14 Sep 2014 10:25:23 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Tapp",
"Alain",
""
]
] | TITLE: A new approach in machine learning
ABSTRACT: In this technical report we presented a novel approach to machine learning.
Once the new framework is presented, we will provide a simple and yet very
powerful learning algorithm which will be benchmark on various dataset.
The framework we proposed is based on booleen circuits; more specifically the
classifier produced by our algorithm have that form. Using bits and boolean
gates instead of real numbers and multiplication enable the the learning
algorithm and classifier to use very efficient boolean vector operations. This
enable both the learning algorithm and classifier to be extremely efficient.
The accuracy of the classifier we obtain with our framework compares very
favorably those produced by conventional techniques, both in terms of
efficiency and accuracy.
|
1409.4155 | Sicheng Xiong | Sicheng Xiong, R\'omer Rosales, Yuanli Pei, Xiaoli Z. Fern | Active Metric Learning from Relative Comparisons | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work focuses on active learning of distance metrics from relative
comparison information. A relative comparison specifies, for a data point
triplet $(x_i,x_j,x_k)$, that instance $x_i$ is more similar to $x_j$ than to
$x_k$. Such constraints, when available, have been shown to be useful toward
defining appropriate distance metrics. In real-world applications, acquiring
constraints often require considerable human effort. This motivates us to study
how to select and query the most useful relative comparisons to achieve
effective metric learning with minimum user effort. Given an underlying class
concept that is employed by the user to provide such constraints, we present an
information-theoretic criterion that selects the triplet whose answer leads to
the highest expected gain in information about the classes of a set of
examples. Directly applying the proposed criterion requires examining $O(n^3)$
triplets with $n$ instances, which is prohibitive even for datasets of moderate
size. We show that a randomized selection strategy can be used to reduce the
selection pool from $O(n^3)$ to $O(n)$, allowing us to scale up to larger-size
problems. Experiments show that the proposed method consistently outperforms
two baseline policies.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2014 04:37:46 GMT"
}
] | 2014-09-16T00:00:00 | [
[
"Xiong",
"Sicheng",
""
],
[
"Rosales",
"Rómer",
""
],
[
"Pei",
"Yuanli",
""
],
[
"Fern",
"Xiaoli Z.",
""
]
] | TITLE: Active Metric Learning from Relative Comparisons
ABSTRACT: This work focuses on active learning of distance metrics from relative
comparison information. A relative comparison specifies, for a data point
triplet $(x_i,x_j,x_k)$, that instance $x_i$ is more similar to $x_j$ than to
$x_k$. Such constraints, when available, have been shown to be useful toward
defining appropriate distance metrics. In real-world applications, acquiring
constraints often require considerable human effort. This motivates us to study
how to select and query the most useful relative comparisons to achieve
effective metric learning with minimum user effort. Given an underlying class
concept that is employed by the user to provide such constraints, we present an
information-theoretic criterion that selects the triplet whose answer leads to
the highest expected gain in information about the classes of a set of
examples. Directly applying the proposed criterion requires examining $O(n^3)$
triplets with $n$ instances, which is prohibitive even for datasets of moderate
size. We show that a randomized selection strategy can be used to reduce the
selection pool from $O(n^3)$ to $O(n)$, allowing us to scale up to larger-size
problems. Experiments show that the proposed method consistently outperforms
two baseline policies.
|
1409.3206 | Petko Georgiev | Petko Georgiev, Nicholas D. Lane, Kiran K. Rachuri, Cecilia Mascolo | DSP.Ear: Leveraging Co-Processor Support for Continuous Audio Sensing on
Smartphones | 15 pages, 12th ACM Conference on Embedded Network Sensor Systems
(SenSys '14) | null | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rapidly growing adoption of sensor-enabled smartphones has greatly fueled
the proliferation of applications that use phone sensors to monitor user
behavior. A central sensor among these is the microphone which enables, for
instance, the detection of valence in speech, or the identification of
speakers. Deploying multiple of these applications on a mobile device to
continuously monitor the audio environment allows for the acquisition of a
diverse range of sound-related contextual inferences. However, the cumulative
processing burden critically impacts the phone battery.
To address this problem, we propose DSP.Ear - an integrated sensing system
that takes advantage of the latest low-power DSP co-processor technology in
commodity mobile devices to enable the continuous and simultaneous operation of
multiple established algorithms that perform complex audio inferences. The
system extracts emotions from voice, estimates the number of people in a room,
identifies the speakers, and detects commonly found ambient sounds, while
critically incurring little overhead to the device battery. This is achieved
through a series of pipeline optimizations that allow the computation to remain
largely on the DSP. Through detailed evaluation of our prototype implementation
we show that, by exploiting a smartphone's co-processor, DSP.Ear achieves a 3
to 7 times increase in the battery lifetime compared to a solution that uses
only the phone's main processor. In addition, DSP.Ear is 2 to 3 times more
power efficient than a naive DSP solution without optimizations. We further
analyze a large-scale dataset from 1320 Android users to show that in about
80-90% of the daily usage instances DSP.Ear is able to sustain a full day of
operation (even in the presence of other smartphone workloads) with a single
battery charge.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2014 19:30:58 GMT"
}
] | 2014-09-15T00:00:00 | [
[
"Georgiev",
"Petko",
""
],
[
"Lane",
"Nicholas D.",
""
],
[
"Rachuri",
"Kiran K.",
""
],
[
"Mascolo",
"Cecilia",
""
]
] | TITLE: DSP.Ear: Leveraging Co-Processor Support for Continuous Audio Sensing on
Smartphones
ABSTRACT: The rapidly growing adoption of sensor-enabled smartphones has greatly fueled
the proliferation of applications that use phone sensors to monitor user
behavior. A central sensor among these is the microphone which enables, for
instance, the detection of valence in speech, or the identification of
speakers. Deploying multiple of these applications on a mobile device to
continuously monitor the audio environment allows for the acquisition of a
diverse range of sound-related contextual inferences. However, the cumulative
processing burden critically impacts the phone battery.
To address this problem, we propose DSP.Ear - an integrated sensing system
that takes advantage of the latest low-power DSP co-processor technology in
commodity mobile devices to enable the continuous and simultaneous operation of
multiple established algorithms that perform complex audio inferences. The
system extracts emotions from voice, estimates the number of people in a room,
identifies the speakers, and detects commonly found ambient sounds, while
critically incurring little overhead to the device battery. This is achieved
through a series of pipeline optimizations that allow the computation to remain
largely on the DSP. Through detailed evaluation of our prototype implementation
we show that, by exploiting a smartphone's co-processor, DSP.Ear achieves a 3
to 7 times increase in the battery lifetime compared to a solution that uses
only the phone's main processor. In addition, DSP.Ear is 2 to 3 times more
power efficient than a naive DSP solution without optimizations. We further
analyze a large-scale dataset from 1320 Android users to show that in about
80-90% of the daily usage instances DSP.Ear is able to sustain a full day of
operation (even in the presence of other smartphone workloads) with a single
battery charge.
|
1409.3225 | Saurabh Aggarwal | Saurabh Aggarwal, Joy Kuri | Strategies for Utility Maximization in Social Groups with Preferential
Exploration | null | null | null | null | cs.GT cs.DS cs.MA cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a \emph{Social Group} of networked nodes, seeking a "universe" of
segments for maximization of their utility. Each node has a subset of the
universe, and access to an expensive link for downloading data. Nodes can also
acquire the universe by exchanging copies of segments among themselves, at low
cost, using inter-node links. While exchanges over inter-node links ensure
minimum or negligible cost, some nodes in the group try to exploit the system.
We term such nodes as `non-reciprocating nodes' and prohibit such behavior by
proposing the "Give-and-Take" criterion, where exchange is allowed iff each
participating node has segments unavailable with the other. Following this
criterion for inter-node links, each node wants to maximize its utility, which
depends on the node's segment set available with the node. Link activation
among nodes requires mutual consent of participating nodes. Each node tries to
find a pairing partner by preferentially exploring nodes for link formation and
unpaired nodes choose to download a segment using the expensive link with
segment aggressive probability. We present various linear complexity
decentralized algorithms based on \emph{Stable Roommates Problem} that can be
used by nodes (as per their behavioral nature) for choosing the best strategy
based on available information. Then, we present decentralized randomized
algorithm that performs close to optimal for large number of nodes. We define
\emph{Price of Choices} for benchmarking performance for social groups
(consisting of non-aggressive nodes only). We evaluate performances of various
algorithms and characterize the behavioral regime that will yield best results
for node and social group, spending the minimal on expensive link. We consider
social group consisting of non-aggressive nodes and benchmark performances of
proposed algorithms with the optimal.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2014 20:00:07 GMT"
}
] | 2014-09-12T00:00:00 | [
[
"Aggarwal",
"Saurabh",
""
],
[
"Kuri",
"Joy",
""
]
] | TITLE: Strategies for Utility Maximization in Social Groups with Preferential
Exploration
ABSTRACT: We consider a \emph{Social Group} of networked nodes, seeking a "universe" of
segments for maximization of their utility. Each node has a subset of the
universe, and access to an expensive link for downloading data. Nodes can also
acquire the universe by exchanging copies of segments among themselves, at low
cost, using inter-node links. While exchanges over inter-node links ensure
minimum or negligible cost, some nodes in the group try to exploit the system.
We term such nodes as `non-reciprocating nodes' and prohibit such behavior by
proposing the "Give-and-Take" criterion, where exchange is allowed iff each
participating node has segments unavailable with the other. Following this
criterion for inter-node links, each node wants to maximize its utility, which
depends on the node's segment set available with the node. Link activation
among nodes requires mutual consent of participating nodes. Each node tries to
find a pairing partner by preferentially exploring nodes for link formation and
unpaired nodes choose to download a segment using the expensive link with
segment aggressive probability. We present various linear complexity
decentralized algorithms based on \emph{Stable Roommates Problem} that can be
used by nodes (as per their behavioral nature) for choosing the best strategy
based on available information. Then, we present decentralized randomized
algorithm that performs close to optimal for large number of nodes. We define
\emph{Price of Choices} for benchmarking performance for social groups
(consisting of non-aggressive nodes only). We evaluate performances of various
algorithms and characterize the behavioral regime that will yield best results
for node and social group, spending the minimal on expensive link. We consider
social group consisting of non-aggressive nodes and benchmark performances of
proposed algorithms with the optimal.
|
1409.3276 | Yingtao Jiang | Bill Jason Tomas, Yingtao Jiang and Mei Yang | Co-Emulation of Scan-Chain Based Designs Utilizing SCE-MI Infrastructure | null | null | null | null | cs.OH | http://creativecommons.org/licenses/publicdomain/ | As the complexity of the scan algorithm is dependent on the number of design
registers, large SoC scan designs can no longer be verified in RTL simulation
unless partitioned into smaller sub-blocks. This paper proposes a methodology
to decrease scan-chain verification time utilizing SCE-MI, a widely used
communication protocol for emulation, and an FPGA-based emulation platform. A
high-level (SystemC) testbench and FPGA synthesizable hardware transactor
models are developed for the scan-chain ISCAS89 S400 benchmark circuit for
high-speed communication between the host CPU workstation and the FPGA
emulator. The emulation results are compared to other verification
methodologies (RTL Simulation, Simulation Acceleration, and Transaction-based
emulation), and found to be 82% faster than regular RTL simulation. In
addition, the emulation runs in the MHz speed range, allowing the incorporation
of software applications, drivers, and operating systems, as opposed to the Hz
range in RTL simulation or sub-megahertz range as accomplished in
transaction-based emulation. In addition, the integration of scan testing and
acceleration/emulation platforms allows more complex DFT methods to be
developed and tested on a large scale system, decreasing the time to market for
products.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2014 23:25:57 GMT"
}
] | 2014-09-12T00:00:00 | [
[
"Tomas",
"Bill Jason",
""
],
[
"Jiang",
"Yingtao",
""
],
[
"Yang",
"Mei",
""
]
] | TITLE: Co-Emulation of Scan-Chain Based Designs Utilizing SCE-MI Infrastructure
ABSTRACT: As the complexity of the scan algorithm is dependent on the number of design
registers, large SoC scan designs can no longer be verified in RTL simulation
unless partitioned into smaller sub-blocks. This paper proposes a methodology
to decrease scan-chain verification time utilizing SCE-MI, a widely used
communication protocol for emulation, and an FPGA-based emulation platform. A
high-level (SystemC) testbench and FPGA synthesizable hardware transactor
models are developed for the scan-chain ISCAS89 S400 benchmark circuit for
high-speed communication between the host CPU workstation and the FPGA
emulator. The emulation results are compared to other verification
methodologies (RTL Simulation, Simulation Acceleration, and Transaction-based
emulation), and found to be 82% faster than regular RTL simulation. In
addition, the emulation runs in the MHz speed range, allowing the incorporation
of software applications, drivers, and operating systems, as opposed to the Hz
range in RTL simulation or sub-megahertz range as accomplished in
transaction-based emulation. In addition, the integration of scan testing and
acceleration/emulation platforms allows more complex DFT methods to be
developed and tested on a large scale system, decreasing the time to market for
products.
|
1409.3367 | Gabriel Muller | Gabriel L. Muller | HTML5 WebSocket protocol and its application to distributed computing | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | HTML5 WebSocket protocol brings real time communication in web browsers to a
new level. Daily, new products are designed to stay permanently connected to
the web. WebSocket is the technology enabling this revolution. WebSockets are
supported by all current browsers, but it is still a new technology in constant
evolution.
WebSockets are slowly replacing older client-server communication
technologies. As opposed to comet-like technologies WebSockets' remarkable
performances is a result of the protocol's fully duplex nature and because it
doesn't rely on HTTP communications.
To begin with this paper studies the WebSocket protocol and different
WebSocket servers implementations. This first theoretic part focuses more
deeply on heterogeneous implementations and OpenCL. The second part is a
benchmark of a new promising library.
The real-time engine used for testing purposes is SocketCluster.
SocketCluster provides a highly scalable WebSocket server that makes use of all
available cpu cores on an instance. The scope of this work is reduced to
vertical scaling of SocketCluster.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2014 09:36:46 GMT"
}
] | 2014-09-12T00:00:00 | [
[
"Muller",
"Gabriel L.",
""
]
] | TITLE: HTML5 WebSocket protocol and its application to distributed computing
ABSTRACT: HTML5 WebSocket protocol brings real time communication in web browsers to a
new level. Daily, new products are designed to stay permanently connected to
the web. WebSocket is the technology enabling this revolution. WebSockets are
supported by all current browsers, but it is still a new technology in constant
evolution.
WebSockets are slowly replacing older client-server communication
technologies. As opposed to comet-like technologies WebSockets' remarkable
performances is a result of the protocol's fully duplex nature and because it
doesn't rely on HTTP communications.
To begin with this paper studies the WebSocket protocol and different
WebSocket servers implementations. This first theoretic part focuses more
deeply on heterogeneous implementations and OpenCL. The second part is a
benchmark of a new promising library.
The real-time engine used for testing purposes is SocketCluster.
SocketCluster provides a highly scalable WebSocket server that makes use of all
available cpu cores on an instance. The scope of this work is reduced to
vertical scaling of SocketCluster.
|
1409.3446 | Haimonti Dutta | Haimonti Dutta and Ashwin Srinivasan | Consensus-Based Modelling using Distributed Feature Construction | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A particularly successful role for Inductive Logic Programming (ILP) is as a
tool for discovering useful relational features for subsequent use in a
predictive model. Conceptually, the case for using ILP to construct relational
features rests on treating these features as functions, the automated discovery
of which necessarily requires some form of first-order learning. Practically,
there are now several reports in the literature that suggest that augmenting
any existing features with ILP-discovered relational features can substantially
improve the predictive power of a model. While the approach is straightforward
enough, much still needs to be done to scale it up to explore more fully the
space of possible features that can be constructed by an ILP system. This is in
principle, infinite and in practice, extremely large. Applications have been
confined to heuristic or random selections from this space. In this paper, we
address this computational difficulty by allowing features to be constructed in
a distributed manner. That is, there is a network of computational units, each
of which employs an ILP engine to construct some small number of features and
then builds a (local) model. We then employ a consensus-based algorithm, in
which neighboring nodes share information to update local models. For a
category of models (those with convex loss functions), it can be shown that the
algorithm will result in all nodes converging to a consensus model. In
practice, it may be slow to achieve this convergence. Nevertheless, our results
on synthetic and real datasets that suggests that in relatively short time the
"best" node in the network reaches a model whose predictive accuracy is
comparable to that obtained using more computational effort in a
non-distributed setting (the best node is identified as the one whose weights
converge first).
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2014 14:11:02 GMT"
}
] | 2014-09-12T00:00:00 | [
[
"Dutta",
"Haimonti",
""
],
[
"Srinivasan",
"Ashwin",
""
]
] | TITLE: Consensus-Based Modelling using Distributed Feature Construction
ABSTRACT: A particularly successful role for Inductive Logic Programming (ILP) is as a
tool for discovering useful relational features for subsequent use in a
predictive model. Conceptually, the case for using ILP to construct relational
features rests on treating these features as functions, the automated discovery
of which necessarily requires some form of first-order learning. Practically,
there are now several reports in the literature that suggest that augmenting
any existing features with ILP-discovered relational features can substantially
improve the predictive power of a model. While the approach is straightforward
enough, much still needs to be done to scale it up to explore more fully the
space of possible features that can be constructed by an ILP system. This is in
principle, infinite and in practice, extremely large. Applications have been
confined to heuristic or random selections from this space. In this paper, we
address this computational difficulty by allowing features to be constructed in
a distributed manner. That is, there is a network of computational units, each
of which employs an ILP engine to construct some small number of features and
then builds a (local) model. We then employ a consensus-based algorithm, in
which neighboring nodes share information to update local models. For a
category of models (those with convex loss functions), it can be shown that the
algorithm will result in all nodes converging to a consensus model. In
practice, it may be slow to achieve this convergence. Nevertheless, our results
on synthetic and real datasets that suggests that in relatively short time the
"best" node in the network reaches a model whose predictive accuracy is
comparable to that obtained using more computational effort in a
non-distributed setting (the best node is identified as the one whose weights
converge first).
|
1409.2905 | Sunsern Cheamanunkul | Sunsern Cheamanunkul, Evan Ettinger and Yoav Freund | Non-Convex Boosting Overcomes Random Label Noise | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The sensitivity of Adaboost to random label noise is a well-studied problem.
LogitBoost, BrownBoost and RobustBoost are boosting algorithms claimed to be
less sensitive to noise than AdaBoost. We present the results of experiments
evaluating these algorithms on both synthetic and real datasets. We compare the
performance on each of datasets when the labels are corrupted by different
levels of independent label noise. In presence of random label noise, we found
that BrownBoost and RobustBoost perform significantly better than AdaBoost and
LogitBoost, while the difference between each pair of algorithms is
insignificant. We provide an explanation for the difference based on the margin
distributions of the algorithms.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2014 21:36:47 GMT"
}
] | 2014-09-11T00:00:00 | [
[
"Cheamanunkul",
"Sunsern",
""
],
[
"Ettinger",
"Evan",
""
],
[
"Freund",
"Yoav",
""
]
] | TITLE: Non-Convex Boosting Overcomes Random Label Noise
ABSTRACT: The sensitivity of Adaboost to random label noise is a well-studied problem.
LogitBoost, BrownBoost and RobustBoost are boosting algorithms claimed to be
less sensitive to noise than AdaBoost. We present the results of experiments
evaluating these algorithms on both synthetic and real datasets. We compare the
performance on each of datasets when the labels are corrupted by different
levels of independent label noise. In presence of random label noise, we found
that BrownBoost and RobustBoost perform significantly better than AdaBoost and
LogitBoost, while the difference between each pair of algorithms is
insignificant. We provide an explanation for the difference based on the margin
distributions of the algorithms.
|
1211.1513 | Naresh Manwani | Naresh Manwani, P. S. Sastry | K-Plane Regression | null | null | 10.1016/j.ins.2014.08.058 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a novel algorithm for piecewise linear regression
which can learn continuous as well as discontinuous piecewise linear functions.
The main idea is to repeatedly partition the data and learn a liner model in in
each partition. While a simple algorithm incorporating this idea does not work
well, an interesting modification results in a good algorithm. The proposed
algorithm is similar in spirit to $k$-means clustering algorithm. We show that
our algorithm can also be viewed as an EM algorithm for maximum likelihood
estimation of parameters under a reasonable probability model. We empirically
demonstrate the effectiveness of our approach by comparing its performance with
the state of art regression learning algorithms on some real world datasets.
| [
{
"version": "v1",
"created": "Wed, 7 Nov 2012 10:57:38 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Mar 2013 09:00:24 GMT"
}
] | 2014-09-10T00:00:00 | [
[
"Manwani",
"Naresh",
""
],
[
"Sastry",
"P. S.",
""
]
] | TITLE: K-Plane Regression
ABSTRACT: In this paper, we present a novel algorithm for piecewise linear regression
which can learn continuous as well as discontinuous piecewise linear functions.
The main idea is to repeatedly partition the data and learn a liner model in in
each partition. While a simple algorithm incorporating this idea does not work
well, an interesting modification results in a good algorithm. The proposed
algorithm is similar in spirit to $k$-means clustering algorithm. We show that
our algorithm can also be viewed as an EM algorithm for maximum likelihood
estimation of parameters under a reasonable probability model. We empirically
demonstrate the effectiveness of our approach by comparing its performance with
the state of art regression learning algorithms on some real world datasets.
|
1403.1840 | Yunchao Gong | Yunchao Gong and Liwei Wang and Ruiqi Guo and Svetlana Lazebnik | Multi-scale Orderless Pooling of Deep Convolutional Activation Features | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep convolutional neural networks (CNN) have shown their promise as a
universal representation for recognition. However, global CNN activations lack
geometric invariance, which limits their robustness for classification and
matching of highly variable scenes. To improve the invariance of CNN
activations without degrading their discriminative power, this paper presents a
simple but effective scheme called multi-scale orderless pooling (MOP-CNN).
This scheme extracts CNN activations for local patches at multiple scale
levels, performs orderless VLAD pooling of these activations at each level
separately, and concatenates the result. The resulting MOP-CNN representation
can be used as a generic feature for either supervised or unsupervised
recognition tasks, from image classification to instance-level retrieval; it
consistently outperforms global CNN activations without requiring any joint
training of prediction layers for a particular target dataset. In absolute
terms, it achieves state-of-the-art results on the challenging SUN397 and MIT
Indoor Scenes classification datasets, and competitive results on
ILSVRC2012/2013 classification and INRIA Holidays retrieval datasets.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2014 19:03:15 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jul 2014 17:38:52 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Sep 2014 22:03:21 GMT"
}
] | 2014-09-10T00:00:00 | [
[
"Gong",
"Yunchao",
""
],
[
"Wang",
"Liwei",
""
],
[
"Guo",
"Ruiqi",
""
],
[
"Lazebnik",
"Svetlana",
""
]
] | TITLE: Multi-scale Orderless Pooling of Deep Convolutional Activation Features
ABSTRACT: Deep convolutional neural networks (CNN) have shown their promise as a
universal representation for recognition. However, global CNN activations lack
geometric invariance, which limits their robustness for classification and
matching of highly variable scenes. To improve the invariance of CNN
activations without degrading their discriminative power, this paper presents a
simple but effective scheme called multi-scale orderless pooling (MOP-CNN).
This scheme extracts CNN activations for local patches at multiple scale
levels, performs orderless VLAD pooling of these activations at each level
separately, and concatenates the result. The resulting MOP-CNN representation
can be used as a generic feature for either supervised or unsupervised
recognition tasks, from image classification to instance-level retrieval; it
consistently outperforms global CNN activations without requiring any joint
training of prediction layers for a particular target dataset. In absolute
terms, it achieves state-of-the-art results on the challenging SUN397 and MIT
Indoor Scenes classification datasets, and competitive results on
ILSVRC2012/2013 classification and INRIA Holidays retrieval datasets.
|
1409.2465 | Ives Rey-Otero | Ives Rey-Otero, Mauricio Delbracio, Jean-Michel Morel | Comparing Feature Detectors: A bias in the repeatability criteria, and
how to correct it | Fixed typo in affiliations | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most computer vision application rely on algorithms finding local
correspondences between different images. These algorithms detect and compare
stable local invariant descriptors centered at scale-invariant keypoints.
Because of the importance of the problem, new keypoint detectors and
descriptors are constantly being proposed, each one claiming to perform better
(or to be complementary) to the preceding ones. This raises the question of a
fair comparison between very diverse methods. This evaluation has been mainly
based on a repeatability criterion of the keypoints under a series of image
perturbations (blur, illumination, noise, rotations, homotheties, homographies,
etc). In this paper, we argue that the classic repeatability criterion is
biased towards algorithms producing redundant overlapped detections. To
compensate this bias, we propose a variant of the repeatability rate taking
into account the descriptors overlap. We apply this variant to revisit the
popular benchmark by Mikolajczyk et al., on classic and new feature detectors.
Experimental evidence shows that the hierarchy of these feature detectors is
severely disrupted by the amended comparator.
| [
{
"version": "v1",
"created": "Mon, 8 Sep 2014 19:02:01 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Sep 2014 08:12:35 GMT"
}
] | 2014-09-10T00:00:00 | [
[
"Rey-Otero",
"Ives",
""
],
[
"Delbracio",
"Mauricio",
""
],
[
"Morel",
"Jean-Michel",
""
]
] | TITLE: Comparing Feature Detectors: A bias in the repeatability criteria, and
how to correct it
ABSTRACT: Most computer vision application rely on algorithms finding local
correspondences between different images. These algorithms detect and compare
stable local invariant descriptors centered at scale-invariant keypoints.
Because of the importance of the problem, new keypoint detectors and
descriptors are constantly being proposed, each one claiming to perform better
(or to be complementary) to the preceding ones. This raises the question of a
fair comparison between very diverse methods. This evaluation has been mainly
based on a repeatability criterion of the keypoints under a series of image
perturbations (blur, illumination, noise, rotations, homotheties, homographies,
etc). In this paper, we argue that the classic repeatability criterion is
biased towards algorithms producing redundant overlapped detections. To
compensate this bias, we propose a variant of the repeatability rate taking
into account the descriptors overlap. We apply this variant to revisit the
popular benchmark by Mikolajczyk et al., on classic and new feature detectors.
Experimental evidence shows that the hierarchy of these feature detectors is
severely disrupted by the amended comparator.
|
1409.2778 | Matteo Camilli M.Sc. | Matteo Camilli | Verification of Reachability Problems for Time Basic Petri Nets | 21 pages. arXiv admin note: substantial text overlap with
arXiv:1107.1166 by other authors | null | null | null | cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time-Basic Petri nets, is a powerful formalism for model- ing real-time
systems where time constraints are expressed through time functions of
marking's time description associated with transition, representing possible
firing times. We introduce a technique for reachability analysis based on the
building of finite contraction of the infinite state space associated with such
a models. The technique constructs a finite symbolic reachability graph relying
on a sort of time coverage, and over- comes the limitations of the existing
available analyzers for Time-Basic nets, based in turn on a time-bounded
inspection of a (possibly infinite) reachability-tree. A key feature of the
technique is the introduction of the Time Anonymous concept, which allows the
identification of components not influencing the evolution of a model. A
running example is used throughout the paper to sketch the symbolic graph
construction. The graph construction algorithm has been automated by a Java
tool-set, described in the paper together with its main functionality and
analysis capability. A use case describing a real-world example has been
employed to benchmark the technique and the tool-set. The main outcome of this
test are also presented in the paper.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2014 15:31:00 GMT"
}
] | 2014-09-10T00:00:00 | [
[
"Camilli",
"Matteo",
""
]
] | TITLE: Verification of Reachability Problems for Time Basic Petri Nets
ABSTRACT: Time-Basic Petri nets, is a powerful formalism for model- ing real-time
systems where time constraints are expressed through time functions of
marking's time description associated with transition, representing possible
firing times. We introduce a technique for reachability analysis based on the
building of finite contraction of the infinite state space associated with such
a models. The technique constructs a finite symbolic reachability graph relying
on a sort of time coverage, and over- comes the limitations of the existing
available analyzers for Time-Basic nets, based in turn on a time-bounded
inspection of a (possibly infinite) reachability-tree. A key feature of the
technique is the introduction of the Time Anonymous concept, which allows the
identification of components not influencing the evolution of a model. A
running example is used throughout the paper to sketch the symbolic graph
construction. The graph construction algorithm has been automated by a Java
tool-set, described in the paper together with its main functionality and
analysis capability. A use case describing a real-world example has been
employed to benchmark the technique and the tool-set. The main outcome of this
test are also presented in the paper.
|
1409.2800 | Toufiq Parag | Toufiq Parag | Enforcing Label and Intensity Consistency for IR Target Detection | First appeared in OTCBVS 2011 \cite{parag11otcbvs}. This manuscript
presents updated results and an extension | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study formulates the IR target detection as a binary classification
problem of each pixel. Each pixel is associated with a label which indicates
whether it is a target or background pixel. The optimal label set for all the
pixels of an image maximizes aposteriori distribution of label configuration
given the pixel intensities. The posterior probability is factored into (or
proportional to) a conditional likelihood of the intensity values and a prior
probability of label configuration. Each of these two probabilities are
computed assuming a Markov Random Field (MRF) on both pixel intensities and
their labels. In particular, this study enforces neighborhood dependency on
both intensity values, by a Simultaneous Auto Regressive (SAR) model, and on
labels, by an Auto-Logistic model. The parameters of these MRF models are
learned from labeled examples. During testing, an MRF inference technique,
namely Iterated Conditional Mode (ICM), produces the optimal label for each
pixel. The detection performance is further improved by incorporating temporal
information through background subtraction. High performances on benchmark
datasets demonstrate effectiveness of this method for IR target detection.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2014 16:20:08 GMT"
}
] | 2014-09-10T00:00:00 | [
[
"Parag",
"Toufiq",
""
]
] | TITLE: Enforcing Label and Intensity Consistency for IR Target Detection
ABSTRACT: This study formulates the IR target detection as a binary classification
problem of each pixel. Each pixel is associated with a label which indicates
whether it is a target or background pixel. The optimal label set for all the
pixels of an image maximizes aposteriori distribution of label configuration
given the pixel intensities. The posterior probability is factored into (or
proportional to) a conditional likelihood of the intensity values and a prior
probability of label configuration. Each of these two probabilities are
computed assuming a Markov Random Field (MRF) on both pixel intensities and
their labels. In particular, this study enforces neighborhood dependency on
both intensity values, by a Simultaneous Auto Regressive (SAR) model, and on
labels, by an Auto-Logistic model. The parameters of these MRF models are
learned from labeled examples. During testing, an MRF inference technique,
namely Iterated Conditional Mode (ICM), produces the optimal label for each
pixel. The detection performance is further improved by incorporating temporal
information through background subtraction. High performances on benchmark
datasets demonstrate effectiveness of this method for IR target detection.
|
1409.1320 | Wei Ping | Wei Ping, Qiang Liu, Alexander Ihler | Marginal Structured SVM with Hidden Variables | Accepted by the 31st International Conference on Machine Learning
(ICML 2014). 12 pages version with supplement | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we propose the marginal structured SVM (MSSVM) for structured
prediction with hidden variables. MSSVM properly accounts for the uncertainty
of hidden variables, and can significantly outperform the previously proposed
latent structured SVM (LSSVM; Yu & Joachims (2009)) and other state-of-art
methods, especially when that uncertainty is large. Our method also results in
a smoother objective function, making gradient-based optimization of MSSVMs
converge significantly faster than for LSSVMs. We also show that our method
consistently outperforms hidden conditional random fields (HCRFs; Quattoni et
al. (2007)) on both simulated and real-world datasets. Furthermore, we propose
a unified framework that includes both our and several other existing methods
as special cases, and provides insights into the comparison of different models
in practice.
| [
{
"version": "v1",
"created": "Thu, 4 Sep 2014 05:06:34 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Sep 2014 21:13:36 GMT"
}
] | 2014-09-09T00:00:00 | [
[
"Ping",
"Wei",
""
],
[
"Liu",
"Qiang",
""
],
[
"Ihler",
"Alexander",
""
]
] | TITLE: Marginal Structured SVM with Hidden Variables
ABSTRACT: In this work, we propose the marginal structured SVM (MSSVM) for structured
prediction with hidden variables. MSSVM properly accounts for the uncertainty
of hidden variables, and can significantly outperform the previously proposed
latent structured SVM (LSSVM; Yu & Joachims (2009)) and other state-of-art
methods, especially when that uncertainty is large. Our method also results in
a smoother objective function, making gradient-based optimization of MSSVMs
converge significantly faster than for LSSVMs. We also show that our method
consistently outperforms hidden conditional random fields (HCRFs; Quattoni et
al. (2007)) on both simulated and real-world datasets. Furthermore, we propose
a unified framework that includes both our and several other existing methods
as special cases, and provides insights into the comparison of different models
in practice.
|
1409.2002 | Saba Babakhani | Saba Babakhani, Niloofar Mozaffari and Ali Hamzeh | A Martingale Approach to Detect Peak of News in Social Network | null | null | null | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/by/3.0/ | Nowadays, social medias such as Twitter, Memetracker and Blogs have become
powerful tools to propagate information. They facilitate quick dissemination
sequence of information such as news article, blog posts, user's interests and
thoughts through large scale. Providing strong means to analyzing social
networks structure and how information diffuse through them is essential. Many
recent studies emphasize on modeling information diffusion and their patterns
to gain some useful knowledge. In this paper, we propose a statistical approach
to online detect peak points of news when spread over social networks, to the
best of our knowledge has never investigated before. The proposed model use
martingale approach to predict peak points when news reached the peak of its
popularity. Experimental results on real datasets show good performance of our
approach to online detect these peak points.
| [
{
"version": "v1",
"created": "Sat, 6 Sep 2014 10:30:20 GMT"
}
] | 2014-09-09T00:00:00 | [
[
"Babakhani",
"Saba",
""
],
[
"Mozaffari",
"Niloofar",
""
],
[
"Hamzeh",
"Ali",
""
]
] | TITLE: A Martingale Approach to Detect Peak of News in Social Network
ABSTRACT: Nowadays, social medias such as Twitter, Memetracker and Blogs have become
powerful tools to propagate information. They facilitate quick dissemination
sequence of information such as news article, blog posts, user's interests and
thoughts through large scale. Providing strong means to analyzing social
networks structure and how information diffuse through them is essential. Many
recent studies emphasize on modeling information diffusion and their patterns
to gain some useful knowledge. In this paper, we propose a statistical approach
to online detect peak points of news when spread over social networks, to the
best of our knowledge has never investigated before. The proposed model use
martingale approach to predict peak points when news reached the peak of its
popularity. Experimental results on real datasets show good performance of our
approach to online detect these peak points.
|
1409.2287 | Andreas Damianou Mr | Andreas C. Damianou, Michalis K. Titsias, Neil D. Lawrence | Variational Inference for Uncertainty on the Inputs of Gaussian Process
Models | 51 pages (of which 10 is Appendix), 19 figures | null | null | null | stat.ML cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Gaussian process latent variable model (GP-LVM) provides a flexible
approach for non-linear dimensionality reduction that has been widely applied.
However, the current approach for training GP-LVMs is based on maximum
likelihood, where the latent projection variables are maximized over rather
than integrated out. In this paper we present a Bayesian method for training
GP-LVMs by introducing a non-standard variational inference framework that
allows to approximately integrate out the latent variables and subsequently
train a GP-LVM by maximizing an analytic lower bound on the exact marginal
likelihood. We apply this method for learning a GP-LVM from iid observations
and for learning non-linear dynamical systems where the observations are
temporally correlated. We show that a benefit of the variational Bayesian
procedure is its robustness to overfitting and its ability to automatically
select the dimensionality of the nonlinear latent space. The resulting
framework is generic, flexible and easy to extend for other purposes, such as
Gaussian process regression with uncertain inputs and semi-supervised Gaussian
processes. We demonstrate our method on synthetic data and standard machine
learning benchmarks, as well as challenging real world datasets, including high
resolution video data.
| [
{
"version": "v1",
"created": "Mon, 8 Sep 2014 10:47:23 GMT"
}
] | 2014-09-09T00:00:00 | [
[
"Damianou",
"Andreas C.",
""
],
[
"Titsias",
"Michalis K.",
""
],
[
"Lawrence",
"Neil D.",
""
]
] | TITLE: Variational Inference for Uncertainty on the Inputs of Gaussian Process
Models
ABSTRACT: The Gaussian process latent variable model (GP-LVM) provides a flexible
approach for non-linear dimensionality reduction that has been widely applied.
However, the current approach for training GP-LVMs is based on maximum
likelihood, where the latent projection variables are maximized over rather
than integrated out. In this paper we present a Bayesian method for training
GP-LVMs by introducing a non-standard variational inference framework that
allows to approximately integrate out the latent variables and subsequently
train a GP-LVM by maximizing an analytic lower bound on the exact marginal
likelihood. We apply this method for learning a GP-LVM from iid observations
and for learning non-linear dynamical systems where the observations are
temporally correlated. We show that a benefit of the variational Bayesian
procedure is its robustness to overfitting and its ability to automatically
select the dimensionality of the nonlinear latent space. The resulting
framework is generic, flexible and easy to extend for other purposes, such as
Gaussian process regression with uncertain inputs and semi-supervised Gaussian
processes. We demonstrate our method on synthetic data and standard machine
learning benchmarks, as well as challenging real world datasets, including high
resolution video data.
|
1409.2450 | Robert West | Robert West, Hristo S. Paskov, Jure Leskovec, Christopher Potts | Exploiting Social Network Structure for Person-to-Person Sentiment
Analysis | null | null | null | null | cs.SI cs.CL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Person-to-person evaluations are prevalent in all kinds of discourse and
important for establishing reputations, building social bonds, and shaping
public opinion. Such evaluations can be analyzed separately using signed social
networks and textual sentiment analysis, but this misses the rich interactions
between language and social context. To capture such interactions, we develop a
model that predicts individual A's opinion of individual B by synthesizing
information from the signed social network in which A and B are embedded with
sentiment analysis of the evaluative texts relating A to B. We prove that this
problem is NP-hard but can be relaxed to an efficiently solvable hinge-loss
Markov random field, and we show that this implementation outperforms text-only
and network-only versions in two very different datasets involving
community-level decision-making: the Wikipedia Requests for Adminship corpus
and the Convote U.S. Congressional speech corpus.
| [
{
"version": "v1",
"created": "Mon, 8 Sep 2014 18:14:16 GMT"
}
] | 2014-09-09T00:00:00 | [
[
"West",
"Robert",
""
],
[
"Paskov",
"Hristo S.",
""
],
[
"Leskovec",
"Jure",
""
],
[
"Potts",
"Christopher",
""
]
] | TITLE: Exploiting Social Network Structure for Person-to-Person Sentiment
Analysis
ABSTRACT: Person-to-person evaluations are prevalent in all kinds of discourse and
important for establishing reputations, building social bonds, and shaping
public opinion. Such evaluations can be analyzed separately using signed social
networks and textual sentiment analysis, but this misses the rich interactions
between language and social context. To capture such interactions, we develop a
model that predicts individual A's opinion of individual B by synthesizing
information from the signed social network in which A and B are embedded with
sentiment analysis of the evaluative texts relating A to B. We prove that this
problem is NP-hard but can be relaxed to an efficiently solvable hinge-loss
Markov random field, and we show that this implementation outperforms text-only
and network-only versions in two very different datasets involving
community-level decision-making: the Wikipedia Requests for Adminship corpus
and the Convote U.S. Congressional speech corpus.
|
1406.3676 | Jason Weston | Antoine Bordes, Sumit Chopra, Jason Weston | Question Answering with Subgraph Embeddings | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper presents a system which learns to answer questions on a broad
range of topics from a knowledge base using few hand-crafted features. Our
model learns low-dimensional embeddings of words and knowledge base
constituents; these representations are used to score natural language
questions against candidate answers. Training our system using pairs of
questions and structured representations of their answers, and pairs of
question paraphrases, yields competitive results on a competitive benchmark of
the literature.
| [
{
"version": "v1",
"created": "Sat, 14 Jun 2014 03:00:23 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Sep 2014 01:02:11 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Sep 2014 00:25:35 GMT"
}
] | 2014-09-05T00:00:00 | [
[
"Bordes",
"Antoine",
""
],
[
"Chopra",
"Sumit",
""
],
[
"Weston",
"Jason",
""
]
] | TITLE: Question Answering with Subgraph Embeddings
ABSTRACT: This paper presents a system which learns to answer questions on a broad
range of topics from a knowledge base using few hand-crafted features. Our
model learns low-dimensional embeddings of words and knowledge base
constituents; these representations are used to score natural language
questions against candidate answers. Training our system using pairs of
questions and structured representations of their answers, and pairs of
question paraphrases, yields competitive results on a competitive benchmark of
the literature.
|
1301.2774 | Jafar Muhammadi | Jafar Muhammadi, Hamid Reza Rabiee and Abbas Hosseini | Crowd Labeling: a survey | Under consideration for publication in Knowledge and Information
Systems | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, there has been a burst in the number of research projects on human
computation via crowdsourcing. Multiple choice (or labeling) questions could be
referred to as a common type of problem which is solved by this approach. As an
application, crowd labeling is applied to find true labels for large machine
learning datasets. Since crowds are not necessarily experts, the labels they
provide are rather noisy and erroneous. This challenge is usually resolved by
collecting multiple labels for each sample, and then aggregating them to
estimate the true label. Although the mechanism leads to high-quality labels,
it is not actually cost-effective. As a result, efforts are currently made to
maximize the accuracy in estimating true labels, while fixing the number of
acquired labels.
This paper surveys methods to aggregate redundant crowd labels in order to
estimate unknown true labels. It presents a unified statistical latent model
where the differences among popular methods in the field correspond to
different choices for the parameters of the model. Afterwards, algorithms to
make inference on these models will be surveyed. Moreover, adaptive methods
which iteratively collect labels based on the previously collected labels and
estimated models will be discussed. In addition, this paper compares the
distinguished methods, and provides guidelines for future work required to
address the current open issues.
| [
{
"version": "v1",
"created": "Sun, 13 Jan 2013 14:12:53 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2014 05:59:49 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Sep 2014 06:37:23 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Muhammadi",
"Jafar",
""
],
[
"Rabiee",
"Hamid Reza",
""
],
[
"Hosseini",
"Abbas",
""
]
] | TITLE: Crowd Labeling: a survey
ABSTRACT: Recently, there has been a burst in the number of research projects on human
computation via crowdsourcing. Multiple choice (or labeling) questions could be
referred to as a common type of problem which is solved by this approach. As an
application, crowd labeling is applied to find true labels for large machine
learning datasets. Since crowds are not necessarily experts, the labels they
provide are rather noisy and erroneous. This challenge is usually resolved by
collecting multiple labels for each sample, and then aggregating them to
estimate the true label. Although the mechanism leads to high-quality labels,
it is not actually cost-effective. As a result, efforts are currently made to
maximize the accuracy in estimating true labels, while fixing the number of
acquired labels.
This paper surveys methods to aggregate redundant crowd labels in order to
estimate unknown true labels. It presents a unified statistical latent model
where the differences among popular methods in the field correspond to
different choices for the parameters of the model. Afterwards, algorithms to
make inference on these models will be surveyed. Moreover, adaptive methods
which iteratively collect labels based on the previously collected labels and
estimated models will be discussed. In addition, this paper compares the
distinguished methods, and provides guidelines for future work required to
address the current open issues.
|
1405.7718 | Sajan Goud Lingala | Sajan Goud Lingala, Edward DiBella, Mathews Jacob | Deformation corrected compressed sensing (DC-CS): a novel framework for
accelerated dynamic MRI | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel deformation corrected compressed sensing (DC-CS) framework
to recover dynamic magnetic resonance images from undersampled measurements. We
introduce a generalized formulation that is capable of handling a wide class of
sparsity/compactness priors on the deformation corrected dynamic signal. In
this work, we consider example compactness priors such as sparsity in temporal
Fourier domain, sparsity in temporal finite difference domain, and nuclear norm
penalty to exploit low rank structure. Using variable splitting, we decouple
the complex optimization problem to simpler and well understood sub problems;
the resulting algorithm alternates between simple steps of shrinkage based
denoising, deformable registration, and a quadratic optimization step.
Additionally, we employ efficient continuation strategies to minimize the risk
of convergence to local minima. The proposed formulation contrasts with
existing DC-CS schemes that are customized for free breathing cardiac cine
applications, and other schemes that rely on fully sampled reference frames or
navigator signals to estimate the deformation parameters. The efficient
decoupling enabled by the proposed scheme allows its application to a wide
range of applications including contrast enhanced dynamic MRI. Through
experiments on numerical phantom and in vivo myocardial perfusion MRI datasets,
we demonstrate the utility of the proposed DC-CS scheme in providing robust
reconstructions with reduced motion artifacts over classical compressed sensing
schemes that utilize the compact priors on the original deformation
un-corrected signal.
| [
{
"version": "v1",
"created": "Thu, 29 May 2014 20:36:39 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2014 23:03:52 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Lingala",
"Sajan Goud",
""
],
[
"DiBella",
"Edward",
""
],
[
"Jacob",
"Mathews",
""
]
] | TITLE: Deformation corrected compressed sensing (DC-CS): a novel framework for
accelerated dynamic MRI
ABSTRACT: We propose a novel deformation corrected compressed sensing (DC-CS) framework
to recover dynamic magnetic resonance images from undersampled measurements. We
introduce a generalized formulation that is capable of handling a wide class of
sparsity/compactness priors on the deformation corrected dynamic signal. In
this work, we consider example compactness priors such as sparsity in temporal
Fourier domain, sparsity in temporal finite difference domain, and nuclear norm
penalty to exploit low rank structure. Using variable splitting, we decouple
the complex optimization problem to simpler and well understood sub problems;
the resulting algorithm alternates between simple steps of shrinkage based
denoising, deformable registration, and a quadratic optimization step.
Additionally, we employ efficient continuation strategies to minimize the risk
of convergence to local minima. The proposed formulation contrasts with
existing DC-CS schemes that are customized for free breathing cardiac cine
applications, and other schemes that rely on fully sampled reference frames or
navigator signals to estimate the deformation parameters. The efficient
decoupling enabled by the proposed scheme allows its application to a wide
range of applications including contrast enhanced dynamic MRI. Through
experiments on numerical phantom and in vivo myocardial perfusion MRI datasets,
we demonstrate the utility of the proposed DC-CS scheme in providing robust
reconstructions with reduced motion artifacts over classical compressed sensing
schemes that utilize the compact priors on the original deformation
un-corrected signal.
|
1408.5882 | Yoon Kim | Yoon Kim | Convolutional Neural Networks for Sentence Classification | To appear in EMNLP 2014 | null | null | null | cs.CL cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We report on a series of experiments with convolutional neural networks (CNN)
trained on top of pre-trained word vectors for sentence-level classification
tasks. We show that a simple CNN with little hyperparameter tuning and static
vectors achieves excellent results on multiple benchmarks. Learning
task-specific vectors through fine-tuning offers further gains in performance.
We additionally propose a simple modification to the architecture to allow for
the use of both task-specific and static vectors. The CNN models discussed
herein improve upon the state of the art on 4 out of 7 tasks, which include
sentiment analysis and question classification.
| [
{
"version": "v1",
"created": "Mon, 25 Aug 2014 19:48:04 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Sep 2014 03:09:02 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Kim",
"Yoon",
""
]
] | TITLE: Convolutional Neural Networks for Sentence Classification
ABSTRACT: We report on a series of experiments with convolutional neural networks (CNN)
trained on top of pre-trained word vectors for sentence-level classification
tasks. We show that a simple CNN with little hyperparameter tuning and static
vectors achieves excellent results on multiple benchmarks. Learning
task-specific vectors through fine-tuning offers further gains in performance.
We additionally propose a simple modification to the architecture to allow for
the use of both task-specific and static vectors. The CNN models discussed
herein improve upon the state of the art on 4 out of 7 tasks, which include
sentiment analysis and question classification.
|
1409.0908 | Anh Tran | Anh Tran, Jinyan Guan, Thanima Pilantanakitti, Paul Cohen | Action Recognition in the Frequency Domain | Keywords: Artificial Intelligence, Computer Vision, Action
Recognition | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we describe a simple strategy for mitigating variability in
temporal data series by shifting focus onto long-term, frequency domain
features that are less susceptible to variability. We apply this method to the
human action recognition task and demonstrate how working in the frequency
domain can yield good recognition features for commonly used optical flow and
articulated pose features, which are highly sensitive to small differences in
motion, viewpoint, dynamic backgrounds, occlusion and other sources of
variability. We show how these frequency-based features can be used in
combination with a simple forest classifier to achieve good and robust results
on the popular KTH Actions dataset.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 22:34:29 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Tran",
"Anh",
""
],
[
"Guan",
"Jinyan",
""
],
[
"Pilantanakitti",
"Thanima",
""
],
[
"Cohen",
"Paul",
""
]
] | TITLE: Action Recognition in the Frequency Domain
ABSTRACT: In this paper, we describe a simple strategy for mitigating variability in
temporal data series by shifting focus onto long-term, frequency domain
features that are less susceptible to variability. We apply this method to the
human action recognition task and demonstrate how working in the frequency
domain can yield good recognition features for commonly used optical flow and
articulated pose features, which are highly sensitive to small differences in
motion, viewpoint, dynamic backgrounds, occlusion and other sources of
variability. We show how these frequency-based features can be used in
combination with a simple forest classifier to achieve good and robust results
on the popular KTH Actions dataset.
|
1409.0923 | Ahmad Hassanat | Ahmad Basheer Hassanat | Dimensionality Invariant Similarity Measure | (ISSN: 1545-1003). http://www.jofamericanscience.org | J Am Sci 2014;10(8):221-226 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new similarity measure to be used for general tasks
including supervised learning, which is represented by the K-nearest neighbor
classifier (KNN). The proposed similarity measure is invariant to large
differences in some dimensions in the feature space. The proposed metric is
proved mathematically to be a metric. To test its viability for different
applications, the KNN used the proposed metric for classifying test examples
chosen from a number of real datasets. Compared to some other well known
metrics, the experimental results show that the proposed metric is a promising
distance measure for the KNN classifier with strong potential for a wide range
of applications.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 23:45:29 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Hassanat",
"Ahmad Basheer",
""
]
] | TITLE: Dimensionality Invariant Similarity Measure
ABSTRACT: This paper presents a new similarity measure to be used for general tasks
including supervised learning, which is represented by the K-nearest neighbor
classifier (KNN). The proposed similarity measure is invariant to large
differences in some dimensions in the feature space. The proposed metric is
proved mathematically to be a metric. To test its viability for different
applications, the KNN used the proposed metric for classifying test examples
chosen from a number of real datasets. Compared to some other well known
metrics, the experimental results show that the proposed metric is a promising
distance measure for the KNN classifier with strong potential for a wide range
of applications.
|
1409.0973 | Jin-Kao Hao | Xiangjing Lai, Zhipeng Lu, Jin-Kao Hao, Fred Glover, Liping Xu | Path Relinking for Bandwidth Coloring Problem | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Path Relinking algorithm is proposed for the Bandwidth Coloring problem and
the Bandwidth MultiColoring problem. It combines a population based relinking
method and a tabu search based local search procedure. The proposed algorithm
is assessed on two sets of 66 benchmark instances commonly used in the
literature. Computational results demonstrate that the proposed algorithm is
highly competitive in terms of both solution quality and efficiency compared to
the best performing algorithms in the literature. Specifically, it improves the
previous best known results for 15 out of 66 instances, while matching the
previous best known results for 47 cases. Some key elements of the proposed
algorithm are investigated.
| [
{
"version": "v1",
"created": "Wed, 3 Sep 2014 07:17:16 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Lai",
"Xiangjing",
""
],
[
"Lu",
"Zhipeng",
""
],
[
"Hao",
"Jin-Kao",
""
],
[
"Glover",
"Fred",
""
],
[
"Xu",
"Liping",
""
]
] | TITLE: Path Relinking for Bandwidth Coloring Problem
ABSTRACT: A Path Relinking algorithm is proposed for the Bandwidth Coloring problem and
the Bandwidth MultiColoring problem. It combines a population based relinking
method and a tabu search based local search procedure. The proposed algorithm
is assessed on two sets of 66 benchmark instances commonly used in the
literature. Computational results demonstrate that the proposed algorithm is
highly competitive in terms of both solution quality and efficiency compared to
the best performing algorithms in the literature. Specifically, it improves the
previous best known results for 15 out of 66 instances, while matching the
previous best known results for 47 cases. Some key elements of the proposed
algorithm are investigated.
|
1409.1057 | Uwe Aickelin | Alexandros Ladas, Jonathan M. Garibaldi, Rodrigo Scarpel and Uwe
Aickelin | Augmented Neural Networks for Modelling Consumer Indebtness | Proceedings of the 2014 World Congress on Computational Intelligence
(WCCI 2014), pp. 3086-3093, 2014 | null | null | null | cs.CE cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consumer Debt has risen to be an important problem of modern societies,
generating a lot of research in order to understand the nature of consumer
indebtness, which so far its modelling has been carried out by statistical
models. In this work we show that Computational Intelligence can offer a more
holistic approach that is more suitable for the complex relationships an
indebtness dataset has and Linear Regression cannot uncover. In particular, as
our results show, Neural Networks achieve the best performance in modelling
consumer indebtness, especially when they manage to incorporate the significant
and experimentally verified results of the Data Mining process in the model,
exploiting the flexibility Neural Networks offer in designing their topology.
This novel method forms an elaborate framework to model Consumer indebtness
that can be extended to any other real world application.
| [
{
"version": "v1",
"created": "Wed, 3 Sep 2014 12:23:50 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Ladas",
"Alexandros",
""
],
[
"Garibaldi",
"Jonathan M.",
""
],
[
"Scarpel",
"Rodrigo",
""
],
[
"Aickelin",
"Uwe",
""
]
] | TITLE: Augmented Neural Networks for Modelling Consumer Indebtness
ABSTRACT: Consumer Debt has risen to be an important problem of modern societies,
generating a lot of research in order to understand the nature of consumer
indebtness, which so far its modelling has been carried out by statistical
models. In this work we show that Computational Intelligence can offer a more
holistic approach that is more suitable for the complex relationships an
indebtness dataset has and Linear Regression cannot uncover. In particular, as
our results show, Neural Networks achieve the best performance in modelling
consumer indebtness, especially when they manage to incorporate the significant
and experimentally verified results of the Data Mining process in the model,
exploiting the flexibility Neural Networks offer in designing their topology.
This novel method forms an elaborate framework to model Consumer indebtness
that can be extended to any other real world application.
|
1409.1143 | Narine Manukyan | Narine Manukyan, Margaret J. Eppstein, and Jeffrey S. Buzas | Tunably Rugged Landscapes with Known Maximum and Minimum | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose NM landscapes as a new class of tunably rugged benchmark problems.
NM landscapes are well-defined on alphabets of any arity, including both
discrete and real-valued alphabets, include epistasis in a natural and
transparent manner, are proven to have known value and location of the global
maximum and, with some additional constraints, are proven to also have a known
global minimum. Empirical studies are used to illustrate that, when
coefficients are selected from a recommended distribution, the ruggedness of NM
landscapes is smoothly tunable and correlates with several measures of search
difficulty. We discuss why these properties make NM landscapes preferable to
both NK landscapes and Walsh polynomials as benchmark landscape models with
tunable epistasis.
| [
{
"version": "v1",
"created": "Wed, 3 Sep 2014 16:20:43 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Manukyan",
"Narine",
""
],
[
"Eppstein",
"Margaret J.",
""
],
[
"Buzas",
"Jeffrey S.",
""
]
] | TITLE: Tunably Rugged Landscapes with Known Maximum and Minimum
ABSTRACT: We propose NM landscapes as a new class of tunably rugged benchmark problems.
NM landscapes are well-defined on alphabets of any arity, including both
discrete and real-valued alphabets, include epistasis in a natural and
transparent manner, are proven to have known value and location of the global
maximum and, with some additional constraints, are proven to also have a known
global minimum. Empirical studies are used to illustrate that, when
coefficients are selected from a recommended distribution, the ruggedness of NM
landscapes is smoothly tunable and correlates with several measures of search
difficulty. We discuss why these properties make NM landscapes preferable to
both NK landscapes and Walsh polynomials as benchmark landscape models with
tunable epistasis.
|
1409.1199 | Stephen Plaza PhD | Stephen M. Plaza | Focused Proofreading: Efficiently Extracting Connectomes from Segmented
EM Images | null | null | null | null | q-bio.QM cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Identifying complex neural circuitry from electron microscopic (EM) images
may help unlock the mysteries of the brain. However, identifying this circuitry
requires time-consuming, manual tracing (proofreading) due to the size and
intricacy of these image datasets, thus limiting state-of-the-art analysis to
very small brain regions. Potential avenues to improve scalability include
automatic image segmentation and crowd sourcing, but current efforts have had
limited success. In this paper, we propose a new strategy, focused
proofreading, that works with automatic segmentation and aims to limit
proofreading to the regions of a dataset that are most impactful to the
resulting circuit. We then introduce a novel workflow, which exploits
biological information such as synapses, and apply it to a large dataset in the
fly optic lobe. With our techniques, we achieve significant tracing speedups of
3-5x without sacrificing the quality of the resulting circuit. Furthermore, our
methodology makes the task of proofreading much more accessible and hence
potentially enhances the effectiveness of crowd sourcing.
| [
{
"version": "v1",
"created": "Wed, 3 Sep 2014 19:14:13 GMT"
}
] | 2014-09-04T00:00:00 | [
[
"Plaza",
"Stephen M.",
""
]
] | TITLE: Focused Proofreading: Efficiently Extracting Connectomes from Segmented
EM Images
ABSTRACT: Identifying complex neural circuitry from electron microscopic (EM) images
may help unlock the mysteries of the brain. However, identifying this circuitry
requires time-consuming, manual tracing (proofreading) due to the size and
intricacy of these image datasets, thus limiting state-of-the-art analysis to
very small brain regions. Potential avenues to improve scalability include
automatic image segmentation and crowd sourcing, but current efforts have had
limited success. In this paper, we propose a new strategy, focused
proofreading, that works with automatic segmentation and aims to limit
proofreading to the regions of a dataset that are most impactful to the
resulting circuit. We then introduce a novel workflow, which exploits
biological information such as synapses, and apply it to a large dataset in the
fly optic lobe. With our techniques, we achieve significant tracing speedups of
3-5x without sacrificing the quality of the resulting circuit. Furthermore, our
methodology makes the task of proofreading much more accessible and hence
potentially enhances the effectiveness of crowd sourcing.
|
1311.1780 | KyungHyun Cho | Caglar Gulcehre, Kyunghyun Cho, Razvan Pascanu and Yoshua Bengio | Learned-Norm Pooling for Deep Feedforward and Recurrent Neural Networks | ECML/PKDD 2014 | null | null | null | cs.NE cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose and investigate a novel nonlinear unit, called $L_p$
unit, for deep neural networks. The proposed $L_p$ unit receives signals from
several projections of a subset of units in the layer below and computes a
normalized $L_p$ norm. We notice two interesting interpretations of the $L_p$
unit. First, the proposed unit can be understood as a generalization of a
number of conventional pooling operators such as average, root-mean-square and
max pooling widely used in, for instance, convolutional neural networks (CNN),
HMAX models and neocognitrons. Furthermore, the $L_p$ unit is, to a certain
degree, similar to the recently proposed maxout unit (Goodfellow et al., 2013)
which achieved the state-of-the-art object recognition results on a number of
benchmark datasets. Secondly, we provide a geometrical interpretation of the
activation function based on which we argue that the $L_p$ unit is more
efficient at representing complex, nonlinear separating boundaries. Each $L_p$
unit defines a superelliptic boundary, with its exact shape defined by the
order $p$. We claim that this makes it possible to model arbitrarily shaped,
curved boundaries more efficiently by combining a few $L_p$ units of different
orders. This insight justifies the need for learning different orders for each
unit in the model. We empirically evaluate the proposed $L_p$ units on a number
of datasets and show that multilayer perceptrons (MLP) consisting of the $L_p$
units achieve the state-of-the-art results on a number of benchmark datasets.
Furthermore, we evaluate the proposed $L_p$ unit on the recently proposed deep
recurrent neural networks (RNN).
| [
{
"version": "v1",
"created": "Thu, 7 Nov 2013 18:30:37 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Nov 2013 03:32:43 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Nov 2013 18:32:42 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Jan 2014 22:55:24 GMT"
},
{
"version": "v5",
"created": "Sat, 1 Feb 2014 18:17:38 GMT"
},
{
"version": "v6",
"created": "Fri, 7 Feb 2014 18:55:42 GMT"
},
{
"version": "v7",
"created": "Tue, 2 Sep 2014 00:53:40 GMT"
}
] | 2014-09-03T00:00:00 | [
[
"Gulcehre",
"Caglar",
""
],
[
"Cho",
"Kyunghyun",
""
],
[
"Pascanu",
"Razvan",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Learned-Norm Pooling for Deep Feedforward and Recurrent Neural Networks
ABSTRACT: In this paper we propose and investigate a novel nonlinear unit, called $L_p$
unit, for deep neural networks. The proposed $L_p$ unit receives signals from
several projections of a subset of units in the layer below and computes a
normalized $L_p$ norm. We notice two interesting interpretations of the $L_p$
unit. First, the proposed unit can be understood as a generalization of a
number of conventional pooling operators such as average, root-mean-square and
max pooling widely used in, for instance, convolutional neural networks (CNN),
HMAX models and neocognitrons. Furthermore, the $L_p$ unit is, to a certain
degree, similar to the recently proposed maxout unit (Goodfellow et al., 2013)
which achieved the state-of-the-art object recognition results on a number of
benchmark datasets. Secondly, we provide a geometrical interpretation of the
activation function based on which we argue that the $L_p$ unit is more
efficient at representing complex, nonlinear separating boundaries. Each $L_p$
unit defines a superelliptic boundary, with its exact shape defined by the
order $p$. We claim that this makes it possible to model arbitrarily shaped,
curved boundaries more efficiently by combining a few $L_p$ units of different
orders. This insight justifies the need for learning different orders for each
unit in the model. We empirically evaluate the proposed $L_p$ units on a number
of datasets and show that multilayer perceptrons (MLP) consisting of the $L_p$
units achieve the state-of-the-art results on a number of benchmark datasets.
Furthermore, we evaluate the proposed $L_p$ unit on the recently proposed deep
recurrent neural networks (RNN).
|
1409.0602 | Zhu Shizhan | Shizhan Zhu, Cheng Li, Chen Change Loy, and Xiaoou Tang | Transferring Landmark Annotations for Cross-Dataset Face Alignment | Shizhan Zhu and Cheng Li share equal contributions | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | Dataset bias is a well known problem in object recognition domain. This
issue, nonetheless, is rarely explored in face alignment research. In this
study, we show that dataset plays an integral part of face alignment
performance. Specifically, owing to face alignment dataset bias, training on
one database and testing on another or unseen domain would lead to poor
performance. Creating an unbiased dataset through combining various existing
databases, however, is non-trivial as one has to exhaustively re-label the
landmarks for standardisation. In this work, we propose a simple and yet
effective method to bridge the disparate annotation spaces between databases,
making datasets fusion possible. We show extensive results on combining various
popular databases (LFW, AFLW, LFPW, HELEN) for improved cross-dataset and
unseen data alignment.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 03:36:55 GMT"
}
] | 2014-09-03T00:00:00 | [
[
"Zhu",
"Shizhan",
""
],
[
"Li",
"Cheng",
""
],
[
"Loy",
"Chen Change",
""
],
[
"Tang",
"Xiaoou",
""
]
] | TITLE: Transferring Landmark Annotations for Cross-Dataset Face Alignment
ABSTRACT: Dataset bias is a well known problem in object recognition domain. This
issue, nonetheless, is rarely explored in face alignment research. In this
study, we show that dataset plays an integral part of face alignment
performance. Specifically, owing to face alignment dataset bias, training on
one database and testing on another or unseen domain would lead to poor
performance. Creating an unbiased dataset through combining various existing
databases, however, is non-trivial as one has to exhaustively re-label the
landmarks for standardisation. In this work, we propose a simple and yet
effective method to bridge the disparate annotation spaces between databases,
making datasets fusion possible. We show extensive results on combining various
popular databases (LFW, AFLW, LFPW, HELEN) for improved cross-dataset and
unseen data alignment.
|
1409.0612 | Ying Long | Ying Long, Zhenjiang Shen | Population spatialization and synthesis with open data | 14 pages | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Individuals together with their locations & attributes are essential to feed
micro-level applied urban models (for example, spatial micro-simulation and
agent-based modeling) for policy evaluation. Existed studies on population
spatialization and population synthesis are generally separated. In developing
countries like China, population distribution in a fine scale, as the input for
population synthesis, is not universally available. With the open-government
initiatives in China and the emerging Web 2.0 techniques, more and more open
data are becoming achievable. In this paper, we propose an automatic process
using open data for population spatialization and synthesis. Specifically, the
road network in OpenStreetMap is used to identify and delineate parcel
geometries, while crowd-sourced POIs are gathered to infer urban parcels with a
vector cellular automata model. Housing-related online Check-in records are
then applied to distinguish residential parcels from all of the identified
urban parcels. Finally the published census data, in which the sub-district
level of attributes distribution and relationships are available, is used for
synthesizing population attributes with a previously developed tool Agenter
(Long and Shen, 2013). The results are validated with ground truth
manually-prepared dataset by planners from Beijing Institute of City Planning.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 06:32:39 GMT"
}
] | 2014-09-03T00:00:00 | [
[
"Long",
"Ying",
""
],
[
"Shen",
"Zhenjiang",
""
]
] | TITLE: Population spatialization and synthesis with open data
ABSTRACT: Individuals together with their locations & attributes are essential to feed
micro-level applied urban models (for example, spatial micro-simulation and
agent-based modeling) for policy evaluation. Existed studies on population
spatialization and population synthesis are generally separated. In developing
countries like China, population distribution in a fine scale, as the input for
population synthesis, is not universally available. With the open-government
initiatives in China and the emerging Web 2.0 techniques, more and more open
data are becoming achievable. In this paper, we propose an automatic process
using open data for population spatialization and synthesis. Specifically, the
road network in OpenStreetMap is used to identify and delineate parcel
geometries, while crowd-sourced POIs are gathered to infer urban parcels with a
vector cellular automata model. Housing-related online Check-in records are
then applied to distinguish residential parcels from all of the identified
urban parcels. Finally the published census data, in which the sub-district
level of attributes distribution and relationships are available, is used for
synthesizing population attributes with a previously developed tool Agenter
(Long and Shen, 2013). The results are validated with ground truth
manually-prepared dataset by planners from Beijing Institute of City Planning.
|
1409.0651 | Koninika Pal | Koninika Pal, Sebastian Michel | An LSH Index for Computing Kendall's Tau over Top-k Lists | 6 pages, 8 subfigures, presented in Seventeenth International
Workshop on the Web and Databases (WebDB 2014) co-located with ACM SIGMOD2014 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of similarity search within a set of top-k lists
under the Kendall's Tau distance function. This distance describes how related
two rankings are in terms of concordantly and discordantly ordered items. As
top-k lists are usually very short compared to the global domain of possible
items to be ranked, creating an inverted index to look up overlapping lists is
possible but does not capture tight enough the similarity measure. In this
work, we investigate locality sensitive hashing schemes for the Kendall's Tau
distance and evaluate the proposed methods using two real-world datasets.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 10:07:27 GMT"
}
] | 2014-09-03T00:00:00 | [
[
"Pal",
"Koninika",
""
],
[
"Michel",
"Sebastian",
""
]
] | TITLE: An LSH Index for Computing Kendall's Tau over Top-k Lists
ABSTRACT: We consider the problem of similarity search within a set of top-k lists
under the Kendall's Tau distance function. This distance describes how related
two rankings are in terms of concordantly and discordantly ordered items. As
top-k lists are usually very short compared to the global domain of possible
items to be ranked, creating an inverted index to look up overlapping lists is
possible but does not capture tight enough the similarity measure. In this
work, we investigate locality sensitive hashing schemes for the Kendall's Tau
distance and evaluate the proposed methods using two real-world datasets.
|
1409.0748 | Uwe Aickelin | Jenna Reps, Jonathan M. Garibaldi, Uwe Aickelin, Daniele Soria, Jack
Gibson, Richard Hubbard | Comparison of algorithms that detect drug side effects using electronic
healthcare databases | Soft Computing, 17(12) pp. 2381-2397, 2013 | null | null | null | cs.LG cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The electronic healthcare databases are starting to become more readily
available and are thought to have excellent potential for generating adverse
drug reaction signals. The Health Improvement Network (THIN) database is an
electronic healthcare database containing medical information on over 11
million patients that has excellent potential for detecting ADRs. In this paper
we apply four existing electronic healthcare database signal detecting
algorithms (MUTARA, HUNT, Temporal Pattern Discovery and modified ROR) on the
THIN database for a selection of drugs from six chosen drug families. This is
the first comparison of ADR signalling algorithms that includes MUTARA and HUNT
and enabled us to set a benchmark for the adverse drug reaction signalling
ability of the THIN database. The drugs were selectively chosen to enable a
comparison with previous work and for variety. It was found that no algorithm
was generally superior and the algorithms' natural thresholds act at variable
stringencies. Furthermore, none of the algorithms perform well at detecting
rare ADRs.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 15:16:26 GMT"
}
] | 2014-09-03T00:00:00 | [
[
"Reps",
"Jenna",
""
],
[
"Garibaldi",
"Jonathan M.",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Soria",
"Daniele",
""
],
[
"Gibson",
"Jack",
""
],
[
"Hubbard",
"Richard",
""
]
] | TITLE: Comparison of algorithms that detect drug side effects using electronic
healthcare databases
ABSTRACT: The electronic healthcare databases are starting to become more readily
available and are thought to have excellent potential for generating adverse
drug reaction signals. The Health Improvement Network (THIN) database is an
electronic healthcare database containing medical information on over 11
million patients that has excellent potential for detecting ADRs. In this paper
we apply four existing electronic healthcare database signal detecting
algorithms (MUTARA, HUNT, Temporal Pattern Discovery and modified ROR) on the
THIN database for a selection of drugs from six chosen drug families. This is
the first comparison of ADR signalling algorithms that includes MUTARA and HUNT
and enabled us to set a benchmark for the adverse drug reaction signalling
ability of the THIN database. The drugs were selectively chosen to enable a
comparison with previous work and for variety. It was found that no algorithm
was generally superior and the algorithms' natural thresholds act at variable
stringencies. Furthermore, none of the algorithms perform well at detecting
rare ADRs.
|
1409.0763 | Uwe Aickelin | Qi Chen, Amanda Whitbrook, Uwe Aickelin and Chris Roadknight | Data classification using the Dempster-Shafer method | Journal of Experimental & Theoretical Artificial Intelligence,
ahead-of-print, 2014 | null | 10.1080/0952813X.2014.886301 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the Dempster-Shafer method is employed as the theoretical
basis for creating data classification systems. Testing is carried out using
three popular (multiple attribute) benchmark datasets that have two, three and
four classes. In each case, a subset of the available data is used for training
to establish thresholds, limits or likelihoods of class membership for each
attribute, and hence create mass functions that establish probability of class
membership for each attribute of the test data. Classification of each data
item is achieved by combination of these probabilities via Dempster's Rule of
Combination. Results for the first two datasets show extremely high
classification accuracy that is competitive with other popular methods. The
third dataset is non-numerical and difficult to classify, but good results can
be achieved provided the system and mass functions are designed carefully and
the right attributes are chosen for combination. In all cases the
Dempster-Shafer method provides comparable performance to other more popular
algorithms, but the overhead of generating accurate mass functions increases
the complexity with the addition of new attributes. Overall, the results
suggest that the D-S approach provides a suitable framework for the design of
classification systems and that automating the mass function design and
calculation would increase the viability of the algorithm for complex
classification problems.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 15:49:40 GMT"
}
] | 2014-09-03T00:00:00 | [
[
"Chen",
"Qi",
""
],
[
"Whitbrook",
"Amanda",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Roadknight",
"Chris",
""
]
] | TITLE: Data classification using the Dempster-Shafer method
ABSTRACT: In this paper, the Dempster-Shafer method is employed as the theoretical
basis for creating data classification systems. Testing is carried out using
three popular (multiple attribute) benchmark datasets that have two, three and
four classes. In each case, a subset of the available data is used for training
to establish thresholds, limits or likelihoods of class membership for each
attribute, and hence create mass functions that establish probability of class
membership for each attribute of the test data. Classification of each data
item is achieved by combination of these probabilities via Dempster's Rule of
Combination. Results for the first two datasets show extremely high
classification accuracy that is competitive with other popular methods. The
third dataset is non-numerical and difficult to classify, but good results can
be achieved provided the system and mass functions are designed carefully and
the right attributes are chosen for combination. In all cases the
Dempster-Shafer method provides comparable performance to other more popular
algorithms, but the overhead of generating accurate mass functions increases
the complexity with the addition of new attributes. Overall, the results
suggest that the D-S approach provides a suitable framework for the design of
classification systems and that automating the mass function design and
calculation would increase the viability of the algorithm for complex
classification problems.
|
1409.0791 | Jian Yang | Jian Yang, Liqiu Meng | Feature Selection in Conditional Random Fields for Map Matching of GPS
Trajectories | null | null | null | null | stat.ML cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Map matching of the GPS trajectory serves the purpose of recovering the
original route on a road network from a sequence of noisy GPS observations. It
is a fundamental technique to many Location Based Services. However, map
matching of a low sampling rate on urban road network is still a challenging
task. In this paper, the characteristics of Conditional Random Fields with
regard to inducing many contextual features and feature selection are explored
for the map matching of the GPS trajectories at a low sampling rate.
Experiments on a taxi trajectory dataset show that our method may achieve
competitive results along with the success of reducing model complexity for
computation-limited applications.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 16:52:53 GMT"
}
] | 2014-09-03T00:00:00 | [
[
"Yang",
"Jian",
""
],
[
"Meng",
"Liqiu",
""
]
] | TITLE: Feature Selection in Conditional Random Fields for Map Matching of GPS
Trajectories
ABSTRACT: Map matching of the GPS trajectory serves the purpose of recovering the
original route on a road network from a sequence of noisy GPS observations. It
is a fundamental technique to many Location Based Services. However, map
matching of a low sampling rate on urban road network is still a challenging
task. In this paper, the characteristics of Conditional Random Fields with
regard to inducing many contextual features and feature selection are explored
for the map matching of the GPS trajectories at a low sampling rate.
Experiments on a taxi trajectory dataset show that our method may achieve
competitive results along with the success of reducing model complexity for
computation-limited applications.
|
1409.0798 | Aditya Parameswaran | Anant Bhardwaj, Souvik Bhattacherjee, Amit Chavan, Amol Deshpande,
Aaron J. Elmore, Samuel Madden, Aditya G. Parameswaran | DataHub: Collaborative Data Science & Dataset Version Management at
Scale | 7 pages | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Relational databases have limited support for data collaboration, where teams
collaboratively curate and analyze large datasets. Inspired by software version
control systems like git, we propose (a) a dataset version control system,
giving users the ability to create, branch, merge, difference and search large,
divergent collections of datasets, and (b) a platform, DataHub, that gives
users the ability to perform collaborative data analysis building on this
version control system. We outline the challenges in providing dataset version
control at scale.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2014 17:16:47 GMT"
}
] | 2014-09-03T00:00:00 | [
[
"Bhardwaj",
"Anant",
""
],
[
"Bhattacherjee",
"Souvik",
""
],
[
"Chavan",
"Amit",
""
],
[
"Deshpande",
"Amol",
""
],
[
"Elmore",
"Aaron J.",
""
],
[
"Madden",
"Samuel",
""
],
[
"Parameswaran",
"Aditya G.",
""
]
] | TITLE: DataHub: Collaborative Data Science & Dataset Version Management at
Scale
ABSTRACT: Relational databases have limited support for data collaboration, where teams
collaboratively curate and analyze large datasets. Inspired by software version
control systems like git, we propose (a) a dataset version control system,
giving users the ability to create, branch, merge, difference and search large,
divergent collections of datasets, and (b) a platform, DataHub, that gives
users the ability to perform collaborative data analysis building on this
version control system. We outline the challenges in providing dataset version
control at scale.
|
1204.6535 | Sandeep Gupta | Sandeep Gupta | Citations, Sequence Alignments, Contagion, and Semantics: On Acyclic
Structures and their Randomness | null | null | null | null | cs.DM cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Datasets from several domains, such as life-sciences, semantic web, machine
learning, natural language processing, etc. are naturally structured as acyclic
graphs. These datasets, particularly those in bio-informatics and computational
epidemiology, have grown tremendously over the last decade or so. Increasingly,
as a consequence, there is a need to build and evaluate various strategies for
processing acyclic structured graphs. Most of the proposed research models the
real world acyclic structures as random graphs, i.e., they are generated by
randomly selecting a subset of edges from all possible edges. Unfortunately the
graphs thus generated have predictable and degenerate structures, i.e., the
resulting graphs will always have almost the same degree distribution and very
short paths.
Specifically, we show that if $O(n \log n \log n)$ edges are added to a
binary tree of $n$ nodes then with probability more than $O(1/(\log n)^{1/n})$
the depth of all but $O({\log \log n} ^{\log \log n})$ vertices of the dag
collapses to 1. Experiments show that irregularity, as measured by distribution
of length of random walks from root to leaves, is also predictable and small.
The degree distribution and random walk length properties of real world graphs
from these domains are significantly different from random graphs of similar
vertex and edge size.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2012 02:19:26 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Jul 2012 16:02:09 GMT"
},
{
"version": "v3",
"created": "Fri, 26 Oct 2012 10:11:36 GMT"
},
{
"version": "v4",
"created": "Tue, 20 Nov 2012 07:07:48 GMT"
},
{
"version": "v5",
"created": "Thu, 17 Jan 2013 19:41:26 GMT"
},
{
"version": "v6",
"created": "Sun, 31 Aug 2014 03:30:09 GMT"
}
] | 2014-09-02T00:00:00 | [
[
"Gupta",
"Sandeep",
""
]
] | TITLE: Citations, Sequence Alignments, Contagion, and Semantics: On Acyclic
Structures and their Randomness
ABSTRACT: Datasets from several domains, such as life-sciences, semantic web, machine
learning, natural language processing, etc. are naturally structured as acyclic
graphs. These datasets, particularly those in bio-informatics and computational
epidemiology, have grown tremendously over the last decade or so. Increasingly,
as a consequence, there is a need to build and evaluate various strategies for
processing acyclic structured graphs. Most of the proposed research models the
real world acyclic structures as random graphs, i.e., they are generated by
randomly selecting a subset of edges from all possible edges. Unfortunately the
graphs thus generated have predictable and degenerate structures, i.e., the
resulting graphs will always have almost the same degree distribution and very
short paths.
Specifically, we show that if $O(n \log n \log n)$ edges are added to a
binary tree of $n$ nodes then with probability more than $O(1/(\log n)^{1/n})$
the depth of all but $O({\log \log n} ^{\log \log n})$ vertices of the dag
collapses to 1. Experiments show that irregularity, as measured by distribution
of length of random walks from root to leaves, is also predictable and small.
The degree distribution and random walk length properties of real world graphs
from these domains are significantly different from random graphs of similar
vertex and edge size.
|
1306.3874 | KyungHyun Cho | Kyunghyun Cho and Xi Chen | Classifying and Visualizing Motion Capture Sequences using Deep Neural
Networks | VISAPP 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The gesture recognition using motion capture data and depth sensors has
recently drawn more attention in vision recognition. Currently most systems
only classify dataset with a couple of dozens different actions. Moreover,
feature extraction from the data is often computational complex. In this paper,
we propose a novel system to recognize the actions from skeleton data with
simple, but effective, features using deep neural networks. Features are
extracted for each frame based on the relative positions of joints (PO),
temporal differences (TD), and normalized trajectories of motion (NT). Given
these features a hybrid multi-layer perceptron is trained, which simultaneously
classifies and reconstructs input data. We use deep autoencoder to visualize
learnt features, and the experiments show that deep neural networks can capture
more discriminative information than, for instance, principal component
analysis can. We test our system on a public database with 65 classes and more
than 2,000 motion sequences. We obtain an accuracy above 95% which is, to our
knowledge, the state of the art result for such a large dataset.
| [
{
"version": "v1",
"created": "Mon, 17 Jun 2013 14:26:52 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2014 16:03:02 GMT"
}
] | 2014-09-02T00:00:00 | [
[
"Cho",
"Kyunghyun",
""
],
[
"Chen",
"Xi",
""
]
] | TITLE: Classifying and Visualizing Motion Capture Sequences using Deep Neural
Networks
ABSTRACT: The gesture recognition using motion capture data and depth sensors has
recently drawn more attention in vision recognition. Currently most systems
only classify dataset with a couple of dozens different actions. Moreover,
feature extraction from the data is often computational complex. In this paper,
we propose a novel system to recognize the actions from skeleton data with
simple, but effective, features using deep neural networks. Features are
extracted for each frame based on the relative positions of joints (PO),
temporal differences (TD), and normalized trajectories of motion (NT). Given
these features a hybrid multi-layer perceptron is trained, which simultaneously
classifies and reconstructs input data. We use deep autoencoder to visualize
learnt features, and the experiments show that deep neural networks can capture
more discriminative information than, for instance, principal component
analysis can. We test our system on a public database with 65 classes and more
than 2,000 motion sequences. We obtain an accuracy above 95% which is, to our
knowledge, the state of the art result for such a large dataset.
|
1408.5571 | Michael (Micky) Fire | Michael Fire, Thomas Chesney, and Yuval Elovici | Quantitative Analysis of Genealogy Using Digitised Family Trees | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Driven by the popularity of television shows such as Who Do You Think You
Are? many millions of users have uploaded their family tree to web projects
such as WikiTree. Analysis of this corpus enables us to investigate genealogy
computationally. The study of heritage in the social sciences has led to an
increased understanding of ancestry and descent but such efforts are hampered
by difficult to access data. Genealogical research is typically a tedious
process involving trawling through sources such as birth and death
certificates, wills, letters and land deeds. Decades of research have developed
and examined hypotheses on population sex ratios, marriage trends, fertility,
lifespan, and the frequency of twins and triplets. These can now be tested on
vast datasets containing many billions of entries using machine learning tools.
Here we survey the use of genealogy data mining using family trees dating back
centuries and featuring profiles on nearly 7 million individuals based in over
160 countries. These data are not typically created by trained genealogists and
so we verify them with reference to third party censuses. We present results on
a range of aspects of population dynamics. Our approach extends the boundaries
of genealogy inquiry to precise measurement of underlying human phenomena.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2014 07:11:20 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Aug 2014 18:26:23 GMT"
}
] | 2014-09-02T00:00:00 | [
[
"Fire",
"Michael",
""
],
[
"Chesney",
"Thomas",
""
],
[
"Elovici",
"Yuval",
""
]
] | TITLE: Quantitative Analysis of Genealogy Using Digitised Family Trees
ABSTRACT: Driven by the popularity of television shows such as Who Do You Think You
Are? many millions of users have uploaded their family tree to web projects
such as WikiTree. Analysis of this corpus enables us to investigate genealogy
computationally. The study of heritage in the social sciences has led to an
increased understanding of ancestry and descent but such efforts are hampered
by difficult to access data. Genealogical research is typically a tedious
process involving trawling through sources such as birth and death
certificates, wills, letters and land deeds. Decades of research have developed
and examined hypotheses on population sex ratios, marriage trends, fertility,
lifespan, and the frequency of twins and triplets. These can now be tested on
vast datasets containing many billions of entries using machine learning tools.
Here we survey the use of genealogy data mining using family trees dating back
centuries and featuring profiles on nearly 7 million individuals based in over
160 countries. These data are not typically created by trained genealogists and
so we verify them with reference to third party censuses. We present results on
a range of aspects of population dynamics. Our approach extends the boundaries
of genealogy inquiry to precise measurement of underlying human phenomena.
|
1409.0347 | Chao Li | Chao Li and Lili Guo and Andrzej Cichocki | Multi-tensor Completion for Estimating Missing Values in Video Data | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many tensor-based data completion methods aim to solve image and video
in-painting problems. But, all methods were only developed for a single
dataset. In most of real applications, we can usually obtain more than one
dataset to reflect one phenomenon, and all the datasets are mutually related in
some sense. Thus one question raised whether such the relationship can improve
the performance of data completion or not? In the paper, we proposed a novel
and efficient method by exploiting the relationship among datasets for
multi-video data completion. Numerical results show that the proposed method
significantly improve the performance of video in-painting, particularly in the
case of very high missing percentage.
| [
{
"version": "v1",
"created": "Mon, 1 Sep 2014 09:46:52 GMT"
}
] | 2014-09-02T00:00:00 | [
[
"Li",
"Chao",
""
],
[
"Guo",
"Lili",
""
],
[
"Cichocki",
"Andrzej",
""
]
] | TITLE: Multi-tensor Completion for Estimating Missing Values in Video Data
ABSTRACT: Many tensor-based data completion methods aim to solve image and video
in-painting problems. But, all methods were only developed for a single
dataset. In most of real applications, we can usually obtain more than one
dataset to reflect one phenomenon, and all the datasets are mutually related in
some sense. Thus one question raised whether such the relationship can improve
the performance of data completion or not? In the paper, we proposed a novel
and efficient method by exploiting the relationship among datasets for
multi-video data completion. Numerical results show that the proposed method
significantly improve the performance of video in-painting, particularly in the
case of very high missing percentage.
|
1409.0405 | Freddie Witherden | F. D. Witherden and B. C. Vermeire and P. E. Vincent | Heterogeneous Computing on Mixed Unstructured Grids with PyFR | 21 pages, 9 figures, 6 tables | null | null | null | physics.flu-dyn cs.CE physics.comp-ph | http://creativecommons.org/licenses/by/3.0/ | PyFR is an open-source high-order accurate computational fluid dynamics
solver for mixed unstructured grids that can target a range of hardware
platforms from a single codebase. In this paper we demonstrate the ability of
PyFR to perform high-order accurate unsteady simulations of flow on mixed
unstructured grids using heterogeneous multi-node hardware. Specifically, after
benchmarking single-node performance for various platforms, PyFR v0.2.2 is used
to undertake simulations of unsteady flow over a circular cylinder at Reynolds
number 3 900 using a mixed unstructured grid of prismatic and tetrahedral
elements on a desktop workstation containing an Intel Xeon E5-2697 v2 CPU, an
NVIDIA Tesla K40c GPU, and an AMD FirePro W9100 GPU. Both the performance and
accuracy of PyFR are assessed. PyFR v0.2.2 is freely available under a 3-Clause
New Style BSD license (see www.pyfr.org).
| [
{
"version": "v1",
"created": "Mon, 1 Sep 2014 13:06:17 GMT"
}
] | 2014-09-02T00:00:00 | [
[
"Witherden",
"F. D.",
""
],
[
"Vermeire",
"B. C.",
""
],
[
"Vincent",
"P. E.",
""
]
] | TITLE: Heterogeneous Computing on Mixed Unstructured Grids with PyFR
ABSTRACT: PyFR is an open-source high-order accurate computational fluid dynamics
solver for mixed unstructured grids that can target a range of hardware
platforms from a single codebase. In this paper we demonstrate the ability of
PyFR to perform high-order accurate unsteady simulations of flow on mixed
unstructured grids using heterogeneous multi-node hardware. Specifically, after
benchmarking single-node performance for various platforms, PyFR v0.2.2 is used
to undertake simulations of unsteady flow over a circular cylinder at Reynolds
number 3 900 using a mixed unstructured grid of prismatic and tetrahedral
elements on a desktop workstation containing an Intel Xeon E5-2697 v2 CPU, an
NVIDIA Tesla K40c GPU, and an AMD FirePro W9100 GPU. Both the performance and
accuracy of PyFR are assessed. PyFR v0.2.2 is freely available under a 3-Clause
New Style BSD license (see www.pyfr.org).
|
1408.7071 | Zhenzhong Lan | Zhenzhong Lan, Xuanchong Li, Alexandar G. Hauptmann | Temporal Extension of Scale Pyramid and Spatial Pyramid Matching for
Action Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Historically, researchers in the field have spent a great deal of effort to
create image representations that have scale invariance and retain spatial
location information. This paper proposes to encode equivalent temporal
characteristics in video representations for action recognition. To achieve
temporal scale invariance, we develop a method called temporal scale pyramid
(TSP). To encode temporal information, we present and compare two methods
called temporal extension descriptor (TED) and temporal division pyramid (TDP)
. Our purpose is to suggest solutions for matching complex actions that have
large variation in velocity and appearance, which is missing from most current
action representations. The experimental results on four benchmark datasets,
UCF50, HMDB51, Hollywood2 and Olympic Sports, support our approach and
significantly outperform state-of-the-art methods. Most noticeably, we achieve
65.0% mean accuracy and 68.2% mean average precision on the challenging HMDB51
and Hollywood2 datasets which constitutes an absolute improvement over the
state-of-the-art by 7.8% and 3.9%, respectively.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2014 17:05:29 GMT"
}
] | 2014-09-01T00:00:00 | [
[
"Lan",
"Zhenzhong",
""
],
[
"Li",
"Xuanchong",
""
],
[
"Hauptmann",
"Alexandar G.",
""
]
] | TITLE: Temporal Extension of Scale Pyramid and Spatial Pyramid Matching for
Action Recognition
ABSTRACT: Historically, researchers in the field have spent a great deal of effort to
create image representations that have scale invariance and retain spatial
location information. This paper proposes to encode equivalent temporal
characteristics in video representations for action recognition. To achieve
temporal scale invariance, we develop a method called temporal scale pyramid
(TSP). To encode temporal information, we present and compare two methods
called temporal extension descriptor (TED) and temporal division pyramid (TDP)
. Our purpose is to suggest solutions for matching complex actions that have
large variation in velocity and appearance, which is missing from most current
action representations. The experimental results on four benchmark datasets,
UCF50, HMDB51, Hollywood2 and Olympic Sports, support our approach and
significantly outperform state-of-the-art methods. Most noticeably, we achieve
65.0% mean accuracy and 68.2% mean average precision on the challenging HMDB51
and Hollywood2 datasets which constitutes an absolute improvement over the
state-of-the-art by 7.8% and 3.9%, respectively.
|
1407.2854 | Matthew Denny | Matthew J. Denny | Graph Compartmentalization | 11 pages, 5 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces a concept and measure of graph compartmentalization.
This new measure allows for principled comparison between graphs of arbitrary
structure, unlike existing measures such as graph modularity. The proposed
measure is invariant to graph size and number of groups and can be calculated
analytically, facilitating measurement on very large graphs. I also introduce a
block model generative process for compartmentalized graphs as a benchmark on
which to validate the proposed measure. Simulation results demonstrate improved
performance of the new measure over modularity in recovering the degree of
compartmentalization of graphs simulated from the generative model. I also
explore an application to the measurement of political polarization.
| [
{
"version": "v1",
"created": "Thu, 10 Jul 2014 18:18:43 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Aug 2014 01:33:56 GMT"
}
] | 2014-08-29T00:00:00 | [
[
"Denny",
"Matthew J.",
""
]
] | TITLE: Graph Compartmentalization
ABSTRACT: This article introduces a concept and measure of graph compartmentalization.
This new measure allows for principled comparison between graphs of arbitrary
structure, unlike existing measures such as graph modularity. The proposed
measure is invariant to graph size and number of groups and can be calculated
analytically, facilitating measurement on very large graphs. I also introduce a
block model generative process for compartmentalized graphs as a benchmark on
which to validate the proposed measure. Simulation results demonstrate improved
performance of the new measure over modularity in recovering the degree of
compartmentalization of graphs simulated from the generative model. I also
explore an application to the measurement of political polarization.
|
1408.6595 | Nipun Batra | Nipun Batra, Oliver Parson, Mario Berges, Amarjeet Singh and Alex
Rogers | A comparison of non-intrusive load monitoring methods for commercial and
residential buildings | null | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non intrusive load monitoring (NILM), or energy disaggregation, is the
process of separating the total electricity consumption of a building as
measured at single point into the building's constituent loads. Previous
research in the field has mostly focused on residential buildings, and although
the potential benefits of applying this technology to commercial buildings have
been recognised since the field's conception, NILM in the commercial domain has
been largely unexplored by the academic community. As a result of the
heterogeneity of this section of the building stock (i.e., encompassing
buildings as diverse as airports, malls and coffee shops), and hence the loads
within them, many of the solutions developed for residential energy
disaggregation do not apply directly. In this paper we highlight some insights
for NILM in the commercial domain using data collected from a large smart meter
deployment within an educational campus in Delhi, India, of which a subset of
the data has been released for public use. We present an empirical
characterisation of loads in commercial buildings, highlighting the differences
in energy consumption and load characteristics between residential and
commercial buildings. We assess the validity of the assumptions generally made
by NILM solutions for residential buildings when applied to measurements from
commercial facilities. Based on our observations, we discuss the required
traits for a NILM system for commercial buildings, and run benchmark
residential NILM algorithms on our data set to confirm our observations. To
advance the research in commercial buildings energy disaggregation, we release
a subset of our data set, called COMBED (commercial building energy data set).
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2014 23:58:19 GMT"
}
] | 2014-08-29T00:00:00 | [
[
"Batra",
"Nipun",
""
],
[
"Parson",
"Oliver",
""
],
[
"Berges",
"Mario",
""
],
[
"Singh",
"Amarjeet",
""
],
[
"Rogers",
"Alex",
""
]
] | TITLE: A comparison of non-intrusive load monitoring methods for commercial and
residential buildings
ABSTRACT: Non intrusive load monitoring (NILM), or energy disaggregation, is the
process of separating the total electricity consumption of a building as
measured at single point into the building's constituent loads. Previous
research in the field has mostly focused on residential buildings, and although
the potential benefits of applying this technology to commercial buildings have
been recognised since the field's conception, NILM in the commercial domain has
been largely unexplored by the academic community. As a result of the
heterogeneity of this section of the building stock (i.e., encompassing
buildings as diverse as airports, malls and coffee shops), and hence the loads
within them, many of the solutions developed for residential energy
disaggregation do not apply directly. In this paper we highlight some insights
for NILM in the commercial domain using data collected from a large smart meter
deployment within an educational campus in Delhi, India, of which a subset of
the data has been released for public use. We present an empirical
characterisation of loads in commercial buildings, highlighting the differences
in energy consumption and load characteristics between residential and
commercial buildings. We assess the validity of the assumptions generally made
by NILM solutions for residential buildings when applied to measurements from
commercial facilities. Based on our observations, we discuss the required
traits for a NILM system for commercial buildings, and run benchmark
residential NILM algorithms on our data set to confirm our observations. To
advance the research in commercial buildings energy disaggregation, we release
a subset of our data set, called COMBED (commercial building energy data set).
|
1408.6689 | George Kesidis | Yuquan Shan, Jayaram Raghuram, George Kesidis, Christopher Griffin,
Karl Levitt, David J. Miller, Jeffry Rowe, Anna Scaglione | Generation bidding game with flexible demand | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a simple model of price-responsive demand, we consider a deregulated
electricity marketplace wherein the grid (ISO, retailer-distributor) accepts
bids per-unit supply from generators (simplified herein neither to consider
start-up/ramp-up expenses nor day-ahead or shorter-term load following) which
are then averaged (by supply allocations via an economic dispatch) to a common
"clearing" price borne by customers (irrespective of variations in
transmission/distribution or generation prices), i.e., the ISO does not
compensate generators based on their marginal costs. Rather, the ISO provides
sufficient information for generators to sensibly adjust their bids.
Notwithstanding our idealizations, the dispatch dynamics are complex. For a
simple benchmark power system, we find a price-symmetric Nash equilibrium
through numerical experiments.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2014 11:35:11 GMT"
}
] | 2014-08-29T00:00:00 | [
[
"Shan",
"Yuquan",
""
],
[
"Raghuram",
"Jayaram",
""
],
[
"Kesidis",
"George",
""
],
[
"Griffin",
"Christopher",
""
],
[
"Levitt",
"Karl",
""
],
[
"Miller",
"David J.",
""
],
[
"Rowe",
"Jeffry",
""
],
[
"Scaglione",
"Anna",
""
]
] | TITLE: Generation bidding game with flexible demand
ABSTRACT: For a simple model of price-responsive demand, we consider a deregulated
electricity marketplace wherein the grid (ISO, retailer-distributor) accepts
bids per-unit supply from generators (simplified herein neither to consider
start-up/ramp-up expenses nor day-ahead or shorter-term load following) which
are then averaged (by supply allocations via an economic dispatch) to a common
"clearing" price borne by customers (irrespective of variations in
transmission/distribution or generation prices), i.e., the ISO does not
compensate generators based on their marginal costs. Rather, the ISO provides
sufficient information for generators to sensibly adjust their bids.
Notwithstanding our idealizations, the dispatch dynamics are complex. For a
simple benchmark power system, we find a price-symmetric Nash equilibrium
through numerical experiments.
|
1408.6691 | Luca Matteis | Luca Matteis | VoID-graph: Visualize Linked Datasets on the Web | null | null | null | null | cs.DB cs.HC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The Linked Open Data (LOD) cloud diagram is a picture that helps us grasp the
contents and the links of globally available data sets. Such diagram has been a
powerful dissemination method for the Linked Data movement, allowing people to
glance at the size and structure of this distributed, interconnected database.
However, generating such image for third-party datasets can be a quite complex
task as it requires the installation and understanding of a variety of tools
which are not easy to setup. In this paper we present VoID-graph
(http://lmatteis.github.io/void-graph/), a standalone web-tool that, given a
VoID description, can visualize a diagram similar to the LOD cloud. It is novel
because the diagram is autonomously shaped from VoID descriptions directly
within a Web-browser, which doesn't require any server cooperation. This makes
it not only easy to use, as no installation or configuration is required, but
also makes it more sustainable, as it is built using Open Web standards such as
JavaScript and SVG.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2014 12:01:51 GMT"
}
] | 2014-08-29T00:00:00 | [
[
"Matteis",
"Luca",
""
]
] | TITLE: VoID-graph: Visualize Linked Datasets on the Web
ABSTRACT: The Linked Open Data (LOD) cloud diagram is a picture that helps us grasp the
contents and the links of globally available data sets. Such diagram has been a
powerful dissemination method for the Linked Data movement, allowing people to
glance at the size and structure of this distributed, interconnected database.
However, generating such image for third-party datasets can be a quite complex
task as it requires the installation and understanding of a variety of tools
which are not easy to setup. In this paper we present VoID-graph
(http://lmatteis.github.io/void-graph/), a standalone web-tool that, given a
VoID description, can visualize a diagram similar to the LOD cloud. It is novel
because the diagram is autonomously shaped from VoID descriptions directly
within a Web-browser, which doesn't require any server cooperation. This makes
it not only easy to use, as no installation or configuration is required, but
also makes it more sustainable, as it is built using Open Web standards such as
JavaScript and SVG.
|
1408.6485 | Ciaran McCreesh | Ciaran McCreesh and Patrick Prosser | Finding Maximum k-Cliques Faster using Lazy Global Domination | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A clique in a graph is a set of vertices, each of which is adjacent to every
other vertex in this set. A k-clique relaxes this requirement, requiring
vertices to be within a distance k of each other, rather than directly
adjacent. In theory, a maximum clique algorithm can easily be adapted to solve
the maximum k-clique problem. We use a state of the art maximum clique
algorithm to show that this is feasible in practice, and introduce a lazy
global domination rule which sometimes vastly reduces the search space. We
include experimental results for a range of real-world and benchmark graphs,
and a detailed look at random graphs.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2014 18:07:29 GMT"
}
] | 2014-08-28T00:00:00 | [
[
"McCreesh",
"Ciaran",
""
],
[
"Prosser",
"Patrick",
""
]
] | TITLE: Finding Maximum k-Cliques Faster using Lazy Global Domination
ABSTRACT: A clique in a graph is a set of vertices, each of which is adjacent to every
other vertex in this set. A k-clique relaxes this requirement, requiring
vertices to be within a distance k of each other, rather than directly
adjacent. In theory, a maximum clique algorithm can easily be adapted to solve
the maximum k-clique problem. We use a state of the art maximum clique
algorithm to show that this is feasible in practice, and introduce a lazy
global domination rule which sometimes vastly reduces the search space. We
include experimental results for a range of real-world and benchmark graphs,
and a detailed look at random graphs.
|
1207.1206 | Fariba Karimi Ms. | Fariba Karimi, Petter Holme | Threshold model of cascades in temporal networks | 7 pages, 5 figures, 2 tables | Physica A: Statistical Mechanics and its Applications.392.16
(2013): 3476-3483 | 10.1016/j.physa.2013.03.050 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Threshold models try to explain the consequences of social influence like the
spread of fads and opinions. Along with models of epidemics, they constitute a
major theoretical framework of social spreading processes. In threshold models
on static networks, an individual changes her state if a certain fraction of
her neighbors has done the same. When there are strong correlations in the
temporal aspects of contact patterns, it is useful to represent the system as a
temporal network. In such a system, not only contacts but also the time of the
contacts are represented explicitly. There is a consensus that bursty temporal
patterns slow down disease spreading. However, as we will see, this is not a
universal truth for threshold models. In this work, we propose an extension of
Watts' classic threshold model to temporal networks. We do this by assuming
that an agent is influenced by contacts which lie a certain time into the past.
I.e., the individuals are affected by contacts within a time window. In
addition to thresholds as the fraction of contacts, we also investigate the
number of contacts within the time window as a basis for influence. To
elucidate the model's behavior, we run the model on real and randomized
empirical contact datasets.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2012 09:49:51 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Sep 2012 15:19:39 GMT"
}
] | 2014-08-27T00:00:00 | [
[
"Karimi",
"Fariba",
""
],
[
"Holme",
"Petter",
""
]
] | TITLE: Threshold model of cascades in temporal networks
ABSTRACT: Threshold models try to explain the consequences of social influence like the
spread of fads and opinions. Along with models of epidemics, they constitute a
major theoretical framework of social spreading processes. In threshold models
on static networks, an individual changes her state if a certain fraction of
her neighbors has done the same. When there are strong correlations in the
temporal aspects of contact patterns, it is useful to represent the system as a
temporal network. In such a system, not only contacts but also the time of the
contacts are represented explicitly. There is a consensus that bursty temporal
patterns slow down disease spreading. However, as we will see, this is not a
universal truth for threshold models. In this work, we propose an extension of
Watts' classic threshold model to temporal networks. We do this by assuming
that an agent is influenced by contacts which lie a certain time into the past.
I.e., the individuals are affected by contacts within a time window. In
addition to thresholds as the fraction of contacts, we also investigate the
number of contacts within the time window as a basis for influence. To
elucidate the model's behavior, we run the model on real and randomized
empirical contact datasets.
|
1403.0315 | Conrad Sanderson | Johanna Carvajal, Chris McCool, Conrad Sanderson | Summarisation of Short-Term and Long-Term Videos using Texture and
Colour | IEEE Winter Conference on Applications of Computer Vision (WACV),
2014 | null | 10.1109/WACV.2014.6836025 | null | cs.CV stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel approach to video summarisation that makes use of a
Bag-of-visual-Textures (BoT) approach. Two systems are proposed, one based
solely on the BoT approach and another which exploits both colour information
and BoT features. On 50 short-term videos from the Open Video Project we show
that our BoT and fusion systems both achieve state-of-the-art performance,
obtaining an average F-measure of 0.83 and 0.86 respectively, a relative
improvement of 9% and 13% when compared to the previous state-of-the-art. When
applied to a new underwater surveillance dataset containing 33 long-term
videos, the proposed system reduces the amount of footage by a factor of 27,
with only minor degradation in the information content. This order of magnitude
reduction in video data represents significant savings in terms of time and
potential labour cost when manually reviewing such footage.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 05:19:10 GMT"
}
] | 2014-08-27T00:00:00 | [
[
"Carvajal",
"Johanna",
""
],
[
"McCool",
"Chris",
""
],
[
"Sanderson",
"Conrad",
""
]
] | TITLE: Summarisation of Short-Term and Long-Term Videos using Texture and
Colour
ABSTRACT: We present a novel approach to video summarisation that makes use of a
Bag-of-visual-Textures (BoT) approach. Two systems are proposed, one based
solely on the BoT approach and another which exploits both colour information
and BoT features. On 50 short-term videos from the Open Video Project we show
that our BoT and fusion systems both achieve state-of-the-art performance,
obtaining an average F-measure of 0.83 and 0.86 respectively, a relative
improvement of 9% and 13% when compared to the previous state-of-the-art. When
applied to a new underwater surveillance dataset containing 33 long-term
videos, the proposed system reduces the amount of footage by a factor of 27,
with only minor degradation in the information content. This order of magnitude
reduction in video data represents significant savings in terms of time and
potential labour cost when manually reviewing such footage.
|
1403.0320 | Conrad Sanderson | Shaokang Chen, Arnold Wiliem, Conrad Sanderson, Brian C. Lovell | Matching Image Sets via Adaptive Multi Convex Hull | IEEE Winter Conference on Applications of Computer Vision (WACV),
2014 | null | 10.1109/WACV.2014.6835985 | null | cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional nearest points methods use all the samples in an image set to
construct a single convex or affine hull model for classification. However,
strong artificial features and noisy data may be generated from combinations of
training samples when significant intra-class variations and/or noise occur in
the image set. Existing multi-model approaches extract local models by
clustering each image set individually only once, with fixed clusters used for
matching with various image sets. This may not be optimal for discrimination,
as undesirable environmental conditions (eg. illumination and pose variations)
may result in the two closest clusters representing different characteristics
of an object (eg. frontal face being compared to non-frontal face). To address
the above problem, we propose a novel approach to enhance nearest points based
methods by integrating affine/convex hull classification with an adapted
multi-model approach. We first extract multiple local convex hulls from a query
image set via maximum margin clustering to diminish the artificial variations
and constrain the noise in local convex hulls. We then propose adaptive
reference clustering (ARC) to constrain the clustering of each gallery image
set by forcing the clusters to have resemblance to the clusters in the query
image set. By applying ARC, noisy clusters in the query set can be discarded.
Experiments on Honda, MoBo and ETH-80 datasets show that the proposed method
outperforms single model approaches and other recent techniques, such as Sparse
Approximated Nearest Points, Mutual Subspace Method and Manifold Discriminant
Analysis.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 06:19:45 GMT"
}
] | 2014-08-27T00:00:00 | [
[
"Chen",
"Shaokang",
""
],
[
"Wiliem",
"Arnold",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Lovell",
"Brian C.",
""
]
] | TITLE: Matching Image Sets via Adaptive Multi Convex Hull
ABSTRACT: Traditional nearest points methods use all the samples in an image set to
construct a single convex or affine hull model for classification. However,
strong artificial features and noisy data may be generated from combinations of
training samples when significant intra-class variations and/or noise occur in
the image set. Existing multi-model approaches extract local models by
clustering each image set individually only once, with fixed clusters used for
matching with various image sets. This may not be optimal for discrimination,
as undesirable environmental conditions (eg. illumination and pose variations)
may result in the two closest clusters representing different characteristics
of an object (eg. frontal face being compared to non-frontal face). To address
the above problem, we propose a novel approach to enhance nearest points based
methods by integrating affine/convex hull classification with an adapted
multi-model approach. We first extract multiple local convex hulls from a query
image set via maximum margin clustering to diminish the artificial variations
and constrain the noise in local convex hulls. We then propose adaptive
reference clustering (ARC) to constrain the clustering of each gallery image
set by forcing the clusters to have resemblance to the clusters in the query
image set. By applying ARC, noisy clusters in the query set can be discarded.
Experiments on Honda, MoBo and ETH-80 datasets show that the proposed method
outperforms single model approaches and other recent techniques, such as Sparse
Approximated Nearest Points, Mutual Subspace Method and Manifold Discriminant
Analysis.
|
1404.0333 | Jose Javier Ramasco | Maxime Lenormand, Miguel Picornell, Oliva G. Cantu-Ros, Antonia
Tugores, Thomas Louail, Ricardo Herranz, Marc Barthelemy, Enrique
Frias-Martinez and Jose J. Ramasco | Cross-checking different sources of mobility information | 11 pages, 9 figures, 1 appendix with 7 figures | PLoS ONE 9, e105184 (2014) | 10.1371/journal.pone.0105184 | null | physics.soc-ph cs.CY cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The pervasive use of new mobile devices has allowed a better characterization
in space and time of human concentrations and mobility in general. Besides its
theoretical interest, describing mobility is of great importance for a number
of practical applications ranging from the forecast of disease spreading to the
design of new spaces in urban environments. While classical data sources, such
as surveys or census, have a limited level of geographical resolution (e.g.,
districts, municipalities, counties are typically used) or are restricted to
generic workdays or weekends, the data coming from mobile devices can be
precisely located both in time and space. Most previous works have used a
single data source to study human mobility patterns. Here we perform instead a
cross-check analysis by comparing results obtained with data collected from
three different sources: Twitter, census and cell phones. The analysis is
focused on the urban areas of Barcelona and Madrid, for which data of the three
types is available. We assess the correlation between the datasets on different
aspects: the spatial distribution of people concentration, the temporal
evolution of people density and the mobility patterns of individuals. Our
results show that the three data sources are providing comparable information.
Even though the representativeness of Twitter geolocated data is lower than
that of mobile phone and census data, the correlations between the population
density profiles and mobility patterns detected by the three datasets are close
to one in a grid with cells of 2x2 and 1x1 square kilometers. This level of
correlation supports the feasibility of interchanging the three data sources at
the spatio-temporal scales considered.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2014 18:05:12 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Aug 2014 14:18:50 GMT"
}
] | 2014-08-27T00:00:00 | [
[
"Lenormand",
"Maxime",
""
],
[
"Picornell",
"Miguel",
""
],
[
"Cantu-Ros",
"Oliva G.",
""
],
[
"Tugores",
"Antonia",
""
],
[
"Louail",
"Thomas",
""
],
[
"Herranz",
"Ricardo",
""
],
[
"Barthelemy",
"Marc",
""
],
[
"Frias-Martinez",
"Enrique",
""
],
[
"Ramasco",
"Jose J.",
""
]
] | TITLE: Cross-checking different sources of mobility information
ABSTRACT: The pervasive use of new mobile devices has allowed a better characterization
in space and time of human concentrations and mobility in general. Besides its
theoretical interest, describing mobility is of great importance for a number
of practical applications ranging from the forecast of disease spreading to the
design of new spaces in urban environments. While classical data sources, such
as surveys or census, have a limited level of geographical resolution (e.g.,
districts, municipalities, counties are typically used) or are restricted to
generic workdays or weekends, the data coming from mobile devices can be
precisely located both in time and space. Most previous works have used a
single data source to study human mobility patterns. Here we perform instead a
cross-check analysis by comparing results obtained with data collected from
three different sources: Twitter, census and cell phones. The analysis is
focused on the urban areas of Barcelona and Madrid, for which data of the three
types is available. We assess the correlation between the datasets on different
aspects: the spatial distribution of people concentration, the temporal
evolution of people density and the mobility patterns of individuals. Our
results show that the three data sources are providing comparable information.
Even though the representativeness of Twitter geolocated data is lower than
that of mobile phone and census data, the correlations between the population
density profiles and mobility patterns detected by the three datasets are close
to one in a grid with cells of 2x2 and 1x1 square kilometers. This level of
correlation supports the feasibility of interchanging the three data sources at
the spatio-temporal scales considered.
|
1407.6125 | Nicolo Colombo | Nicol\`o Colombo and Nikos Vlassis | Spectral Sequence Motif Discovery | 20 pages, 3 figures, 1 table | null | null | null | q-bio.QM cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sequence discovery tools play a central role in several fields of
computational biology. In the framework of Transcription Factor binding
studies, motif finding algorithms of increasingly high performance are required
to process the big datasets produced by new high-throughput sequencing
technologies. Most existing algorithms are computationally demanding and often
cannot support the large size of new experimental data. We present a new motif
discovery algorithm that is built on a recent machine learning technique,
referred to as Method of Moments. Based on spectral decompositions, this method
is robust under model misspecification and is not prone to locally optimal
solutions. We obtain an algorithm that is extremely fast and designed for the
analysis of big sequencing data. In a few minutes, we can process datasets of
hundreds of thousand sequences and extract motif profiles that match those
computed by various state-of-the-art algorithms.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2014 08:07:50 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Aug 2014 18:33:45 GMT"
}
] | 2014-08-27T00:00:00 | [
[
"Colombo",
"Nicolò",
""
],
[
"Vlassis",
"Nikos",
""
]
] | TITLE: Spectral Sequence Motif Discovery
ABSTRACT: Sequence discovery tools play a central role in several fields of
computational biology. In the framework of Transcription Factor binding
studies, motif finding algorithms of increasingly high performance are required
to process the big datasets produced by new high-throughput sequencing
technologies. Most existing algorithms are computationally demanding and often
cannot support the large size of new experimental data. We present a new motif
discovery algorithm that is built on a recent machine learning technique,
referred to as Method of Moments. Based on spectral decompositions, this method
is robust under model misspecification and is not prone to locally optimal
solutions. We obtain an algorithm that is extremely fast and designed for the
analysis of big sequencing data. In a few minutes, we can process datasets of
hundreds of thousand sequences and extract motif profiles that match those
computed by various state-of-the-art algorithms.
|
1408.0467 | Yasuo Tabei | Yoshimasa Takabatake, Yasuo Tabei, Hiroshi Sakamoto | Online Pattern Matching for String Edit Distance with Moves | This paper has been accepted to the 21st edition of the International
Symposium on String Processing and Information Retrieval (SPIRE2014) | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Edit distance with moves (EDM) is a string-to-string distance measure that
includes substring moves in addition to ordinal editing operations to turn one
string to the other. Although optimizing EDM is intractable, it has many
applications especially in error detections. Edit sensitive parsing (ESP) is an
efficient parsing algorithm that guarantees an upper bound of parsing
discrepancies between different appearances of the same substrings in a string.
ESP can be used for computing an approximate EDM as the L1 distance between
characteristic vectors built by node labels in parsing trees. However, ESP is
not applicable to a streaming text data where a whole text is unknown in
advance. We present an online ESP (OESP) that enables an online pattern
matching for EDM. OESP builds a parse tree for a streaming text and computes
the L1 distance between characteristic vectors in an online manner. For the
space-efficient computation of EDM, OESP directly encodes the parse tree into a
succinct representation by leveraging the idea behind recent results of a
dynamic succinct tree. We experimentally test OESP on the ability to compute
EDM in an online manner on benchmark datasets, and we show OESP's efficiency.
| [
{
"version": "v1",
"created": "Sun, 3 Aug 2014 07:48:52 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Aug 2014 05:56:42 GMT"
}
] | 2014-08-27T00:00:00 | [
[
"Takabatake",
"Yoshimasa",
""
],
[
"Tabei",
"Yasuo",
""
],
[
"Sakamoto",
"Hiroshi",
""
]
] | TITLE: Online Pattern Matching for String Edit Distance with Moves
ABSTRACT: Edit distance with moves (EDM) is a string-to-string distance measure that
includes substring moves in addition to ordinal editing operations to turn one
string to the other. Although optimizing EDM is intractable, it has many
applications especially in error detections. Edit sensitive parsing (ESP) is an
efficient parsing algorithm that guarantees an upper bound of parsing
discrepancies between different appearances of the same substrings in a string.
ESP can be used for computing an approximate EDM as the L1 distance between
characteristic vectors built by node labels in parsing trees. However, ESP is
not applicable to a streaming text data where a whole text is unknown in
advance. We present an online ESP (OESP) that enables an online pattern
matching for EDM. OESP builds a parse tree for a streaming text and computes
the L1 distance between characteristic vectors in an online manner. For the
space-efficient computation of EDM, OESP directly encodes the parse tree into a
succinct representation by leveraging the idea behind recent results of a
dynamic succinct tree. We experimentally test OESP on the ability to compute
EDM in an online manner on benchmark datasets, and we show OESP's efficiency.
|
1408.5601 | Jianwei Yang | Jianwei Yang, Zhen Lei, Stan Z. Li | Learn Convolutional Neural Network for Face Anti-Spoofing | 8 pages, 9 figures, 7 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Though having achieved some progresses, the hand-crafted texture features,
e.g., LBP [23], LBP-TOP [11] are still unable to capture the most
discriminative cues between genuine and fake faces. In this paper, instead of
designing feature by ourselves, we rely on the deep convolutional neural
network (CNN) to learn features of high discriminative ability in a supervised
manner. Combined with some data pre-processing, the face anti-spoofing
performance improves drastically. In the experiments, over 70% relative
decrease of Half Total Error Rate (HTER) is achieved on two challenging
datasets, CASIA [36] and REPLAY-ATTACK [7] compared with the state-of-the-art.
Meanwhile, the experimental results from inter-tests between two datasets
indicates CNN can obtain features with better generalization ability. Moreover,
the nets trained using combined data from two datasets have less biases between
two datasets.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2014 13:08:19 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Aug 2014 02:45:55 GMT"
}
] | 2014-08-27T00:00:00 | [
[
"Yang",
"Jianwei",
""
],
[
"Lei",
"Zhen",
""
],
[
"Li",
"Stan Z.",
""
]
] | TITLE: Learn Convolutional Neural Network for Face Anti-Spoofing
ABSTRACT: Though having achieved some progresses, the hand-crafted texture features,
e.g., LBP [23], LBP-TOP [11] are still unable to capture the most
discriminative cues between genuine and fake faces. In this paper, instead of
designing feature by ourselves, we rely on the deep convolutional neural
network (CNN) to learn features of high discriminative ability in a supervised
manner. Combined with some data pre-processing, the face anti-spoofing
performance improves drastically. In the experiments, over 70% relative
decrease of Half Total Error Rate (HTER) is achieved on two challenging
datasets, CASIA [36] and REPLAY-ATTACK [7] compared with the state-of-the-art.
Meanwhile, the experimental results from inter-tests between two datasets
indicates CNN can obtain features with better generalization ability. Moreover,
the nets trained using combined data from two datasets have less biases between
two datasets.
|
1408.5979 | EPTCS | Rumyana Neykova (Imperial College London), Laura Bocchi (Imperial
College London), Nobuko Yoshida (Imperial College London) | Timed Runtime Monitoring for Multiparty Conversations | In Proceedings BEAT 2014, arXiv:1408.5564 | EPTCS 162, 2014, pp. 19-26 | 10.4204/EPTCS.162.3 | null | cs.DC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a dynamic verification framework for protocols in real-time
distributed systems. The framework is based on Scribble, a tool-chain for
design and verification of choreographies based on multiparty session types,
developed with our industrial partners. Drawing from recent work on multiparty
session types for real-time interactions, we extend Scribble with clocks,
resets, and clock predicates constraining the times in which interactions
should occur. We present a timed API for Python to program distributed
implementations of Scribble specifications. A dynamic verification framework
ensures the safe execution of applications written with our timed API: we have
implemented dedicated runtime monitors that check that each interaction occurs
at a correct timing with respect to the corresponding Scribble specification.
The performance of our implementation and its practicability are analysed via
benchmarking.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2014 02:15:40 GMT"
}
] | 2014-08-27T00:00:00 | [
[
"Neykova",
"Rumyana",
"",
"Imperial College London"
],
[
"Bocchi",
"Laura",
"",
"Imperial\n College London"
],
[
"Yoshida",
"Nobuko",
"",
"Imperial College London"
]
] | TITLE: Timed Runtime Monitoring for Multiparty Conversations
ABSTRACT: We propose a dynamic verification framework for protocols in real-time
distributed systems. The framework is based on Scribble, a tool-chain for
design and verification of choreographies based on multiparty session types,
developed with our industrial partners. Drawing from recent work on multiparty
session types for real-time interactions, we extend Scribble with clocks,
resets, and clock predicates constraining the times in which interactions
should occur. We present a timed API for Python to program distributed
implementations of Scribble specifications. A dynamic verification framework
ensures the safe execution of applications written with our timed API: we have
implemented dedicated runtime monitors that check that each interaction occurs
at a correct timing with respect to the corresponding Scribble specification.
The performance of our implementation and its practicability are analysed via
benchmarking.
|
1403.2048 | Andrzej Cichocki | Andrzej Cichocki | Era of Big Data Processing: A New Approach via Tensor Networks and
Tensor Decompositions | Part of this work was presented on the International Workshop on
Smart Info-Media Systems in Asia,(invited talk - SISA-2013) Sept.30--Oct.2,
2013, Nagoya, JAPAN | null | null | null | cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many problems in computational neuroscience, neuroinformatics, pattern/image
recognition, signal processing and machine learning generate massive amounts of
multidimensional data with multiple aspects and high dimensionality. Tensors
(i.e., multi-way arrays) provide often a natural and compact representation for
such massive multidimensional data via suitable low-rank approximations. Big
data analytics require novel technologies to efficiently process huge datasets
within tolerable elapsed times. Such a new emerging technology for
multidimensional big data is a multiway analysis via tensor networks (TNs) and
tensor decompositions (TDs) which represent tensors by sets of factor
(component) matrices and lower-order (core) tensors. Dynamic tensor analysis
allows us to discover meaningful hidden structures of complex data and to
perform generalizations by capturing multi-linear and multi-aspect
relationships. We will discuss some fundamental TN models, their mathematical
and graphical descriptions and associated learning algorithms for large-scale
TDs and TNs, with many potential applications including: Anomaly detection,
feature extraction, classification, cluster analysis, data fusion and
integration, pattern recognition, predictive modeling, regression, time series
analysis and multiway component analysis.
Keywords: Large-scale HOSVD, Tensor decompositions, CPD, Tucker models,
Hierarchical Tucker (HT) decomposition, low-rank tensor approximations (LRA),
Tensorization/Quantization, tensor train (TT/QTT) - Matrix Product States
(MPS), Matrix Product Operator (MPO), DMRG, Strong Kronecker Product (SKP).
| [
{
"version": "v1",
"created": "Sun, 9 Mar 2014 10:45:18 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2014 13:41:52 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Jun 2014 08:53:57 GMT"
},
{
"version": "v4",
"created": "Sun, 24 Aug 2014 11:04:32 GMT"
}
] | 2014-08-26T00:00:00 | [
[
"Cichocki",
"Andrzej",
""
]
] | TITLE: Era of Big Data Processing: A New Approach via Tensor Networks and
Tensor Decompositions
ABSTRACT: Many problems in computational neuroscience, neuroinformatics, pattern/image
recognition, signal processing and machine learning generate massive amounts of
multidimensional data with multiple aspects and high dimensionality. Tensors
(i.e., multi-way arrays) provide often a natural and compact representation for
such massive multidimensional data via suitable low-rank approximations. Big
data analytics require novel technologies to efficiently process huge datasets
within tolerable elapsed times. Such a new emerging technology for
multidimensional big data is a multiway analysis via tensor networks (TNs) and
tensor decompositions (TDs) which represent tensors by sets of factor
(component) matrices and lower-order (core) tensors. Dynamic tensor analysis
allows us to discover meaningful hidden structures of complex data and to
perform generalizations by capturing multi-linear and multi-aspect
relationships. We will discuss some fundamental TN models, their mathematical
and graphical descriptions and associated learning algorithms for large-scale
TDs and TNs, with many potential applications including: Anomaly detection,
feature extraction, classification, cluster analysis, data fusion and
integration, pattern recognition, predictive modeling, regression, time series
analysis and multiway component analysis.
Keywords: Large-scale HOSVD, Tensor decompositions, CPD, Tucker models,
Hierarchical Tucker (HT) decomposition, low-rank tensor approximations (LRA),
Tensorization/Quantization, tensor train (TT/QTT) - Matrix Product States
(MPS), Matrix Product Operator (MPO), DMRG, Strong Kronecker Product (SKP).
|
1403.3785 | Rosario N. Mantegna | Ming-Xia Li, Vasyl Palchykov, Zhi-Qiang Jiang, Kimmo Kaski, Janos
Kert\'esz, Salvatore Miccich\`e, Michele Tumminello, Wei-Xing Zhou and
Rosario N. Mantegna | Statistically validated mobile communication networks: Evolution of
motifs in European and Chinese data | 19 pages, 8 figures, 5 tables | New J. Phys. 16 (2014) 083038 | 10.1088/1367-2630/16/8/083038 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Big data open up unprecedented opportunities to investigate complex systems
including the society. In particular, communication data serve as major sources
for computational social sciences but they have to be cleaned and filtered as
they may contain spurious information due to recording errors as well as
interactions, like commercial and marketing activities, not directly related to
the social network. The network constructed from communication data can only be
considered as a proxy for the network of social relationships. Here we apply a
systematic method, based on multiple hypothesis testing, to statistically
validate the links and then construct the corresponding Bonferroni network,
generalized to the directed case. We study two large datasets of mobile phone
records, one from Europe and the other from China. For both datasets we compare
the raw data networks with the corresponding Bonferroni networks and point out
significant differences in the structures and in the basic network measures. We
show evidence that the Bonferroni network provides a better proxy for the
network of social interactions than the original one. By using the filtered
networks we investigated the statistics and temporal evolution of small
directed 3-motifs and conclude that closed communication triads have a
formation time-scale, which is quite fast and typically intraday. We also find
that open communication triads preferentially evolve to other open triads with
a higher fraction of reciprocated calls. These stylized facts were observed for
both datasets.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2014 10:42:14 GMT"
}
] | 2014-08-26T00:00:00 | [
[
"Li",
"Ming-Xia",
""
],
[
"Palchykov",
"Vasyl",
""
],
[
"Jiang",
"Zhi-Qiang",
""
],
[
"Kaski",
"Kimmo",
""
],
[
"Kertész",
"Janos",
""
],
[
"Miccichè",
"Salvatore",
""
],
[
"Tumminello",
"Michele",
""
],
[
"Zhou",
"Wei-Xing",
""
],
[
"Mantegna",
"Rosario N.",
""
]
] | TITLE: Statistically validated mobile communication networks: Evolution of
motifs in European and Chinese data
ABSTRACT: Big data open up unprecedented opportunities to investigate complex systems
including the society. In particular, communication data serve as major sources
for computational social sciences but they have to be cleaned and filtered as
they may contain spurious information due to recording errors as well as
interactions, like commercial and marketing activities, not directly related to
the social network. The network constructed from communication data can only be
considered as a proxy for the network of social relationships. Here we apply a
systematic method, based on multiple hypothesis testing, to statistically
validate the links and then construct the corresponding Bonferroni network,
generalized to the directed case. We study two large datasets of mobile phone
records, one from Europe and the other from China. For both datasets we compare
the raw data networks with the corresponding Bonferroni networks and point out
significant differences in the structures and in the basic network measures. We
show evidence that the Bonferroni network provides a better proxy for the
network of social interactions than the original one. By using the filtered
networks we investigated the statistics and temporal evolution of small
directed 3-motifs and conclude that closed communication triads have a
formation time-scale, which is quite fast and typically intraday. We also find
that open communication triads preferentially evolve to other open triads with
a higher fraction of reciprocated calls. These stylized facts were observed for
both datasets.
|
1408.5530 | Dan He | Dan He, Zhanyong Wang, Laxmi Parida, Eleazar Eskin | IPED2: Inheritance Path based Pedigree Reconstruction Algorithm for
Complicated Pedigrees | 9 pages | null | null | null | cs.DS q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reconstruction of family trees, or pedigree reconstruction, for a group of
individuals is a fundamental problem in genetics. The problem is known to be
NP-hard even for datasets known to only contain siblings. Some recent methods
have been developed to accurately and efficiently reconstruct pedigrees. These
methods, however, still consider relatively simple pedigrees, for example, they
are not able to handle half-sibling situations where a pair of individuals only
share one parent. In this work, we propose an efficient method, IPED2, based on
our previous work, which specifically targets reconstruction of complicated
pedigrees that include half-siblings. We note that the presence of
half-siblings makes the reconstruction problem significantly more challenging
which is why previous methods exclude the possibility of half-siblings. We
proposed a novel model as well as an efficient graph algorithm and experiments
show that our algorithm achieves relatively accurate reconstruction. To our
knowledge, this is the first method that is able to handle pedigree
reconstruction based on genotype data only when half-sibling exists in any
generation of the pedigree.
| [
{
"version": "v1",
"created": "Sat, 23 Aug 2014 21:01:50 GMT"
}
] | 2014-08-26T00:00:00 | [
[
"He",
"Dan",
""
],
[
"Wang",
"Zhanyong",
""
],
[
"Parida",
"Laxmi",
""
],
[
"Eskin",
"Eleazar",
""
]
] | TITLE: IPED2: Inheritance Path based Pedigree Reconstruction Algorithm for
Complicated Pedigrees
ABSTRACT: Reconstruction of family trees, or pedigree reconstruction, for a group of
individuals is a fundamental problem in genetics. The problem is known to be
NP-hard even for datasets known to only contain siblings. Some recent methods
have been developed to accurately and efficiently reconstruct pedigrees. These
methods, however, still consider relatively simple pedigrees, for example, they
are not able to handle half-sibling situations where a pair of individuals only
share one parent. In this work, we propose an efficient method, IPED2, based on
our previous work, which specifically targets reconstruction of complicated
pedigrees that include half-siblings. We note that the presence of
half-siblings makes the reconstruction problem significantly more challenging
which is why previous methods exclude the possibility of half-siblings. We
proposed a novel model as well as an efficient graph algorithm and experiments
show that our algorithm achieves relatively accurate reconstruction. To our
knowledge, this is the first method that is able to handle pedigree
reconstruction based on genotype data only when half-sibling exists in any
generation of the pedigree.
|
1408.5539 | Mehmet Kuzu | Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu | A Distributed Framework for Scalable Search over Encrypted Documents | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nowadays, huge amount of documents are increasingly transferred to the remote
servers due to the appealing features of cloud computing. On the other hand,
privacy and security of the sensitive information in untrusted cloud
environment is a big concern. To alleviate such concerns, encryption of
sensitive data before its transfer to the cloud has become an important risk
mitigation option. Encrypted storage provides protection at the expense of a
significant increase in the data management complexity. For effective
management, it is critical to provide efficient selective document retrieval
capability on the encrypted collection. In fact, considerable amount of
searchable symmetric encryption schemes have been designed in the literature to
achieve this task. However, with the emergence of big data everywhere,
available approaches are insufficient to address some crucial real-world
problems such as scalability.
In this study, we focus on practical aspects of a secure keyword search
mechanism over encrypted data on a real cloud infrastructure. First, we propose
a provably secure distributed index along with a parallelizable retrieval
technique that can easily scale to big data. Second, we integrate authorization
into the search scheme to limit the information leakage in multi-user setting
where users are allowed to access only particular documents. Third, we offer
efficient updates on the distributed secure index. In addition, we conduct
extensive empirical analysis on a real dataset to illustrate the efficiency of
the proposed practical techniques.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2014 00:38:11 GMT"
}
] | 2014-08-26T00:00:00 | [
[
"Kuzu",
"Mehmet",
""
],
[
"Islam",
"Mohammad Saiful",
""
],
[
"Kantarcioglu",
"Murat",
""
]
] | TITLE: A Distributed Framework for Scalable Search over Encrypted Documents
ABSTRACT: Nowadays, huge amount of documents are increasingly transferred to the remote
servers due to the appealing features of cloud computing. On the other hand,
privacy and security of the sensitive information in untrusted cloud
environment is a big concern. To alleviate such concerns, encryption of
sensitive data before its transfer to the cloud has become an important risk
mitigation option. Encrypted storage provides protection at the expense of a
significant increase in the data management complexity. For effective
management, it is critical to provide efficient selective document retrieval
capability on the encrypted collection. In fact, considerable amount of
searchable symmetric encryption schemes have been designed in the literature to
achieve this task. However, with the emergence of big data everywhere,
available approaches are insufficient to address some crucial real-world
problems such as scalability.
In this study, we focus on practical aspects of a secure keyword search
mechanism over encrypted data on a real cloud infrastructure. First, we propose
a provably secure distributed index along with a parallelizable retrieval
technique that can easily scale to big data. Second, we integrate authorization
into the search scheme to limit the information leakage in multi-user setting
where users are allowed to access only particular documents. Third, we offer
efficient updates on the distributed secure index. In addition, we conduct
extensive empirical analysis on a real dataset to illustrate the efficiency of
the proposed practical techniques.
|
1408.5573 | Paolo Missier | Matias Garcia-Constantino and Paolo Missier and Phil Blytheand Amy
Weihong Guo | Measuring the impact of cognitive distractions on driving performance
using time series analysis | IEEE ITS conference, 2014 | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using current sensing technology, a wealth of data on driving sessions is
potentially available through a combination of vehicle sensors and drivers'
physiology sensors (heart rate, breathing rate, skin temperature, etc.). Our
hypothesis is that it should be possible to exploit the combination of time
series produced by such multiple sensors during a driving session, in order to
(i) learn models of normal driving behaviour, and (ii) use such models to
detect important and potentially dangerous deviations from the norm in
real-time, and thus enable the generation of appropriate alerts. Crucially, we
believe that such models and interventions should and can be personalised and
tailor-made for each individual driver. As an initial step towards this goal,
in this paper we present techniques for assessing the impact of cognitive
distraction on drivers, based on simple time series analysis. We have tested
our method on a rich dataset of driving sessions, carried out in a professional
simulator, involving a panel of volunteer drivers. Each session included a
different type of cognitive distraction, and resulted in multiple time series
from a variety of on-board sensors as well as sensors worn by the driver.
Crucially, each driver also recorded an initial session with no distractions.
In our model, such initial session provides the baseline times series that make
it possible to quantitatively assess driver performance under distraction
conditions.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2014 07:36:21 GMT"
}
] | 2014-08-26T00:00:00 | [
[
"Garcia-Constantino",
"Matias",
""
],
[
"Missier",
"Paolo",
""
],
[
"Guo",
"Phil Blytheand Amy Weihong",
""
]
] | TITLE: Measuring the impact of cognitive distractions on driving performance
using time series analysis
ABSTRACT: Using current sensing technology, a wealth of data on driving sessions is
potentially available through a combination of vehicle sensors and drivers'
physiology sensors (heart rate, breathing rate, skin temperature, etc.). Our
hypothesis is that it should be possible to exploit the combination of time
series produced by such multiple sensors during a driving session, in order to
(i) learn models of normal driving behaviour, and (ii) use such models to
detect important and potentially dangerous deviations from the norm in
real-time, and thus enable the generation of appropriate alerts. Crucially, we
believe that such models and interventions should and can be personalised and
tailor-made for each individual driver. As an initial step towards this goal,
in this paper we present techniques for assessing the impact of cognitive
distraction on drivers, based on simple time series analysis. We have tested
our method on a rich dataset of driving sessions, carried out in a professional
simulator, involving a panel of volunteer drivers. Each session included a
different type of cognitive distraction, and resulted in multiple time series
from a variety of on-board sensors as well as sensors worn by the driver.
Crucially, each driver also recorded an initial session with no distractions.
In our model, such initial session provides the baseline times series that make
it possible to quantitatively assess driver performance under distraction
conditions.
|
1408.5693 | Bernhard Rumpe | Pit Pietsch, Klaus M\"uller, Bernhard Rumpe | Model Matching Challenge: Benchmarks for Ecore and BPMN Diagrams | 7 pages, 7 figures | Softwaretechnik-Trends, Volume 33, Issue 2. Mai, 2013 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last couple of years, Model Driven Engineering (MDE) gained a
prominent role in the context of software engineering. In the MDE paradigm,
models are considered first level artifacts which are iteratively developed by
teams of programmers over a period of time. Because of this, dedicated tools
for versioning and management of models are needed. A central functionality
within this group of tools is model comparison and differencing. In two
disjunct research projects, we identified a group of general matching problems
where state-of-the-art comparison algorithms delivered low quality results. In
this article, we will present five edit operations which are the cause for
these low quality results. The reasons why the algorithms fail, as well as
possible solutions, are also discussed. These examples can be used as
benchmarks by model developers to assess the quality and applicability of a
model comparison tool for a given model type.
| [
{
"version": "v1",
"created": "Mon, 25 Aug 2014 09:26:14 GMT"
}
] | 2014-08-26T00:00:00 | [
[
"Pietsch",
"Pit",
""
],
[
"Müller",
"Klaus",
""
],
[
"Rumpe",
"Bernhard",
""
]
] | TITLE: Model Matching Challenge: Benchmarks for Ecore and BPMN Diagrams
ABSTRACT: In the last couple of years, Model Driven Engineering (MDE) gained a
prominent role in the context of software engineering. In the MDE paradigm,
models are considered first level artifacts which are iteratively developed by
teams of programmers over a period of time. Because of this, dedicated tools
for versioning and management of models are needed. A central functionality
within this group of tools is model comparison and differencing. In two
disjunct research projects, we identified a group of general matching problems
where state-of-the-art comparison algorithms delivered low quality results. In
this article, we will present five edit operations which are the cause for
these low quality results. The reasons why the algorithms fail, as well as
possible solutions, are also discussed. These examples can be used as
benchmarks by model developers to assess the quality and applicability of a
model comparison tool for a given model type.
|
1408.5777 | Saba Ahsan | Saba Ahsan, Varun Singh and J\"org Ott | Characterizing Internet Video for Large-scale Active Measurements | 15 pages, 18 figures | null | null | null | cs.MM cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The availability of high definition video content on the web has brought
about a significant change in the characteristics of Internet video, but not
many studies on characterizing video have been done after this change. Video
characteristics such as video length, format, target bit rate, and resolution
provide valuable input to design Adaptive Bit Rate (ABR) algorithms, sizing
playout buffers in Dynamic Adaptive HTTP streaming (DASH) players, model the
variability in video frame sizes, etc. This paper presents datasets collected
in 2013 and 2014 that contains over 130,000 videos from YouTube's most viewed
(or most popular) video charts in 58 countries. We describe the basic
characteristics of the videos on YouTube for each category, format, video
length, file size, and data rate variation, observing that video length and
file size fit a log normal distribution. We show that three minutes of a video
suffice to represent its instant data rate fluctuation and that we can infer
data rate characteristics of different video resolutions from a single given
one. Based on our findings, we design active measurements for measuring the
performance of Internet video.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2014 16:38:25 GMT"
}
] | 2014-08-26T00:00:00 | [
[
"Ahsan",
"Saba",
""
],
[
"Singh",
"Varun",
""
],
[
"Ott",
"Jörg",
""
]
] | TITLE: Characterizing Internet Video for Large-scale Active Measurements
ABSTRACT: The availability of high definition video content on the web has brought
about a significant change in the characteristics of Internet video, but not
many studies on characterizing video have been done after this change. Video
characteristics such as video length, format, target bit rate, and resolution
provide valuable input to design Adaptive Bit Rate (ABR) algorithms, sizing
playout buffers in Dynamic Adaptive HTTP streaming (DASH) players, model the
variability in video frame sizes, etc. This paper presents datasets collected
in 2013 and 2014 that contains over 130,000 videos from YouTube's most viewed
(or most popular) video charts in 58 countries. We describe the basic
characteristics of the videos on YouTube for each category, format, video
length, file size, and data rate variation, observing that video length and
file size fit a log normal distribution. We show that three minutes of a video
suffice to represent its instant data rate fluctuation and that we can infer
data rate characteristics of different video resolutions from a single given
one. Based on our findings, we design active measurements for measuring the
performance of Internet video.
|
1408.5320 | Xin-She Yang | Xin-She Yang, M. Karamanoglu, T. O. Ting and Y. X. Zhao | Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering
Optimization | 14 pages 1 figure | Neural Computing and Applications, vol. 25, No. 2, pp. 411-420
(2014) | 10.1007/s00521-013-1508-6 | null | math.OC cs.NE nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | All swarm-intelligence-based optimization algorithms use some stochastic
components to increase the diversity of solutions during the search process.
Such randomization is often represented in terms of random walks. However, it
is not yet clear why some randomization techniques (and thus why some
algorithms) may perform better than others for a given set of problems. In this
work, we analyze these randomization methods in the context of nature-inspired
algorithms. We also use eagle strategy to provide basic observations and relate
step sizes and search efficiency using Markov theory. Then, we apply our
analysis and observations to solve four design benchmarks, including the
designs of a pressure vessel, a speed reducer, a PID controller and a heat
exchanger. Our results demonstrate that eagle strategy with L\'evy flights can
perform extremely well in reducing the overall computational efforts.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2014 15:23:35 GMT"
}
] | 2014-08-25T00:00:00 | [
[
"Yang",
"Xin-She",
""
],
[
"Karamanoglu",
"M.",
""
],
[
"Ting",
"T. O.",
""
],
[
"Zhao",
"Y. X.",
""
]
] | TITLE: Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering
Optimization
ABSTRACT: All swarm-intelligence-based optimization algorithms use some stochastic
components to increase the diversity of solutions during the search process.
Such randomization is often represented in terms of random walks. However, it
is not yet clear why some randomization techniques (and thus why some
algorithms) may perform better than others for a given set of problems. In this
work, we analyze these randomization methods in the context of nature-inspired
algorithms. We also use eagle strategy to provide basic observations and relate
step sizes and search efficiency using Markov theory. Then, we apply our
analysis and observations to solve four design benchmarks, including the
designs of a pressure vessel, a speed reducer, a PID controller and a heat
exchanger. Our results demonstrate that eagle strategy with L\'evy flights can
perform extremely well in reducing the overall computational efforts.
|
1408.5332 | Xin-She Yang | Xin-She Yang, M. Karamanoglu, X. S. He | Flower Pollination Algorithm: A Novel Approach for Multiobjective
Optimization | 17 pages 8 figures. arXiv admin note: substantial text overlap with
arXiv:1404.0695 | X. S. Yang, M. Karamanoglu, X. S. He, Flower Pollination
Algorithm: A Novel Approach for Multiobjective Optimization, Engineering
Optimization, 46 (9), pp. 1222 - 1237 (2014) | 10.1080/0305215X.2013.832237 | null | math.OC cs.NE nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiobjective design optimization problems require multiobjective
optimization techniques to solve, and it is often very challenging to obtain
high-quality Pareto fronts accurately. In this paper, the recently developed
flower pollination algorithm (FPA) is extended to solve multiobjective
optimization problems. The proposed method is used to solve a set of
multobjective test functions and two bi-objective design benchmarks, and a
comparison of the proposed algorithm with other algorithms has been made, which
shows that FPA is efficient with a good convergence rate. Finally, the
importance for further parametric studies and theoretical analysis are
highlighted and discussed.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2014 15:41:22 GMT"
}
] | 2014-08-25T00:00:00 | [
[
"Yang",
"Xin-She",
""
],
[
"Karamanoglu",
"M.",
""
],
[
"He",
"X. S.",
""
]
] | TITLE: Flower Pollination Algorithm: A Novel Approach for Multiobjective
Optimization
ABSTRACT: Multiobjective design optimization problems require multiobjective
optimization techniques to solve, and it is often very challenging to obtain
high-quality Pareto fronts accurately. In this paper, the recently developed
flower pollination algorithm (FPA) is extended to solve multiobjective
optimization problems. The proposed method is used to solve a set of
multobjective test functions and two bi-objective design benchmarks, and a
comparison of the proposed algorithm with other algorithms has been made, which
shows that FPA is efficient with a good convergence rate. Finally, the
importance for further parametric studies and theoretical analysis are
highlighted and discussed.
|
1402.2676 | Parameswaran Raman | Hyokun Yun, Parameswaran Raman, S.V.N. Vishwanathan | Ranking via Robust Binary Classification and Parallel Parameter
Estimation in Large-Scale Data | null | null | null | null | stat.ML cs.DC cs.LG stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose RoBiRank, a ranking algorithm that is motivated by observing a
close connection between evaluation metrics for learning to rank and loss
functions for robust classification. The algorithm shows a very competitive
performance on standard benchmark datasets against other representative
algorithms in the literature. On the other hand, in large scale problems where
explicit feature vectors and scores are not given, our algorithm can be
efficiently parallelized across a large number of machines; for a task that
requires 386,133 x 49,824,519 pairwise interactions between items to be ranked,
our algorithm finds solutions that are of dramatically higher quality than that
can be found by a state-of-the-art competitor algorithm, given the same amount
of wall-clock time for computation.
| [
{
"version": "v1",
"created": "Tue, 11 Feb 2014 21:39:54 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Apr 2014 21:08:34 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Apr 2014 06:19:04 GMT"
},
{
"version": "v4",
"created": "Thu, 21 Aug 2014 06:00:32 GMT"
}
] | 2014-08-22T00:00:00 | [
[
"Yun",
"Hyokun",
""
],
[
"Raman",
"Parameswaran",
""
],
[
"Vishwanathan",
"S. V. N.",
""
]
] | TITLE: Ranking via Robust Binary Classification and Parallel Parameter
Estimation in Large-Scale Data
ABSTRACT: We propose RoBiRank, a ranking algorithm that is motivated by observing a
close connection between evaluation metrics for learning to rank and loss
functions for robust classification. The algorithm shows a very competitive
performance on standard benchmark datasets against other representative
algorithms in the literature. On the other hand, in large scale problems where
explicit feature vectors and scores are not given, our algorithm can be
efficiently parallelized across a large number of machines; for a task that
requires 386,133 x 49,824,519 pairwise interactions between items to be ranked,
our algorithm finds solutions that are of dramatically higher quality than that
can be found by a state-of-the-art competitor algorithm, given the same amount
of wall-clock time for computation.
|
1408.3863 | Christoph Lange | Christoph Lange and Angelo Di Iorio | Semantic Publishing Challenge -- Assessing the Quality of Scientific
Output | To appear in: Valentina Presutti and Milan Stankovic and Erik Cambria
and Reforgiato Recupero, Diego and Di Iorio, Angelo and Christoph Lange and
Di Noia, Tommaso and Ivan Cantador (eds.). Semantic Web Evaluation Challenges
2014. Number 457 in Communications in Computer and Information Science,
Springer, 2014 | null | null | null | cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linked Open Datasets about scholarly publications enable the development and
integration of sophisticated end-user services; however, richer datasets are
still needed. The first goal of this Challenge was to investigate novel
approaches to obtain such semantic data. In particular, we were seeking methods
and tools to extract information from scholarly publications, to publish it as
LOD, and to use queries over this LOD to assess quality. This year we focused
on the quality of workshop proceedings, and of journal articles w.r.t. their
citation network. A third, open task, asked to showcase how such semantic data
could be exploited and how Semantic Web technologies could help in this
emerging context.
| [
{
"version": "v1",
"created": "Sun, 17 Aug 2014 21:33:10 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Aug 2014 22:23:41 GMT"
}
] | 2014-08-22T00:00:00 | [
[
"Lange",
"Christoph",
""
],
[
"Di Iorio",
"Angelo",
""
]
] | TITLE: Semantic Publishing Challenge -- Assessing the Quality of Scientific
Output
ABSTRACT: Linked Open Datasets about scholarly publications enable the development and
integration of sophisticated end-user services; however, richer datasets are
still needed. The first goal of this Challenge was to investigate novel
approaches to obtain such semantic data. In particular, we were seeking methods
and tools to extract information from scholarly publications, to publish it as
LOD, and to use queries over this LOD to assess quality. This year we focused
on the quality of workshop proceedings, and of journal articles w.r.t. their
citation network. A third, open task, asked to showcase how such semantic data
could be exploited and how Semantic Web technologies could help in this
emerging context.
|
1408.4793 | Luca Matteis | Luca Matteis | Restpark: Minimal RESTful API for Retrieving RDF Triples | null | null | null | null | cs.DB | http://creativecommons.org/licenses/by-nc-sa/3.0/ | How do RDF datasets currently get published on the Web? They are either
available as large RDF files, which need to be downloaded and processed
locally, or they exist behind complex SPARQL endpoints. By providing a RESTful
API that can access triple data, we allow users to query a dataset through a
simple interface based on just a couple of HTTP parameters. If RDF resources
were published this way we could quickly build applications that depend on
these datasets, without having to download and process them locally. This is
what Restpark is: a set of HTTP GET parameters that servers need to handle, and
respond with JSON-LD.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2014 22:57:41 GMT"
}
] | 2014-08-22T00:00:00 | [
[
"Matteis",
"Luca",
""
]
] | TITLE: Restpark: Minimal RESTful API for Retrieving RDF Triples
ABSTRACT: How do RDF datasets currently get published on the Web? They are either
available as large RDF files, which need to be downloaded and processed
locally, or they exist behind complex SPARQL endpoints. By providing a RESTful
API that can access triple data, we allow users to query a dataset through a
simple interface based on just a couple of HTTP parameters. If RDF resources
were published this way we could quickly build applications that depend on
these datasets, without having to download and process them locally. This is
what Restpark is: a set of HTTP GET parameters that servers need to handle, and
respond with JSON-LD.
|
1401.5836 | Vedran Sekara Mr. | Vedran Sekara and Sune Lehmann | The Strength of Friendship Ties in Proximity Sensor Data | Updated Introduction, added references. 12 pages, 7 figures | null | 10.1371/journal.pone.0100915 | PLoS One 9.7 (2014): e100915 | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding how people interact and socialize is important in many contexts
from disease control to urban planning. Datasets that capture this specific
aspect of human life have increased in size and availability over the last few
years. We have yet to understand, however, to what extent such electronic
datasets may serve as a valid proxy for real life social interactions. For an
observational dataset, gathered using mobile phones, we analyze the problem of
identifying transient and non-important links, as well as how to highlight
important social interactions. Applying the Bluetooth signal strength parameter
to distinguish between observations, we demonstrate that weak links, compared
to strong links, have a lower probability of being observed at later times,
while such links--on average--also have lower link-weights and probability of
sharing an online friendship. Further, the role of link-strength is
investigated in relation to social network properties.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2014 00:29:51 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Feb 2014 23:51:14 GMT"
},
{
"version": "v3",
"created": "Tue, 27 May 2014 22:12:39 GMT"
}
] | 2014-08-21T00:00:00 | [
[
"Sekara",
"Vedran",
""
],
[
"Lehmann",
"Sune",
""
]
] | TITLE: The Strength of Friendship Ties in Proximity Sensor Data
ABSTRACT: Understanding how people interact and socialize is important in many contexts
from disease control to urban planning. Datasets that capture this specific
aspect of human life have increased in size and availability over the last few
years. We have yet to understand, however, to what extent such electronic
datasets may serve as a valid proxy for real life social interactions. For an
observational dataset, gathered using mobile phones, we analyze the problem of
identifying transient and non-important links, as well as how to highlight
important social interactions. Applying the Bluetooth signal strength parameter
to distinguish between observations, we demonstrate that weak links, compared
to strong links, have a lower probability of being observed at later times,
while such links--on average--also have lower link-weights and probability of
sharing an online friendship. Further, the role of link-strength is
investigated in relation to social network properties.
|
1408.4504 | Mohammed Abdelsamea | Mohammed M. Abdelsamea | Unsupervised Parallel Extraction based Texture for Efficient Image
Representation | arXiv admin note: substantial text overlap with arXiv:1408.4143 | 2011 International Conference on Signal, Image Processing and
Applications With workshop of ICEEA 2011, IPCSIT vol.21 (2011), IACSIT Press,
Singapore | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | SOM is a type of unsupervised learning where the goal is to discover some
underlying structure of the data. In this paper, a new extraction method based
on the main idea of Concurrent Self-Organizing Maps (CSOM), representing a
winner-takes-all collection of small SOM networks is proposed. Each SOM of the
system is trained individually to provide best results for one class only. The
experiments confirm that the proposed features based CSOM is capable to
represent image content better than extracted features based on a single big
SOM and these proposed features improve the final decision of the CAD.
Experiments held on Mammographic Image Analysis Society (MIAS) dataset.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2014 01:10:44 GMT"
}
] | 2014-08-21T00:00:00 | [
[
"Abdelsamea",
"Mohammed M.",
""
]
] | TITLE: Unsupervised Parallel Extraction based Texture for Efficient Image
Representation
ABSTRACT: SOM is a type of unsupervised learning where the goal is to discover some
underlying structure of the data. In this paper, a new extraction method based
on the main idea of Concurrent Self-Organizing Maps (CSOM), representing a
winner-takes-all collection of small SOM networks is proposed. Each SOM of the
system is trained individually to provide best results for one class only. The
experiments confirm that the proposed features based CSOM is capable to
represent image content better than extracted features based on a single big
SOM and these proposed features improve the final decision of the CAD.
Experiments held on Mammographic Image Analysis Society (MIAS) dataset.
|
1408.4523 | Mohammed Al-Maolegi | Yahya Tashtoush, Mohammed Al-Maolegi and Bassam Arkok | The Correlation among Software Complexity Metrics with Case Study | 6 pages | International Journal of Advanced Computer Research, 2014 | null | null | cs.SE | http://creativecommons.org/licenses/by/3.0/ | People demand for software quality is growing increasingly, thus different
scales for the software are growing fast to handle the quality of software. The
software complexity metric is one of the measurements that use some of the
internal attributes or characteristics of software to know how they effect on
the software quality. In this paper, we cover some of more efficient software
complexity metrics such as Cyclomatic complexity, line of code and Hallstead
complexity metric. This paper presents their impacts on the software quality.
It also discusses and analyzes the correlation between them. It finally reveals
their relation with the number of errors using a real dataset as a case study.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2014 05:08:32 GMT"
}
] | 2014-08-21T00:00:00 | [
[
"Tashtoush",
"Yahya",
""
],
[
"Al-Maolegi",
"Mohammed",
""
],
[
"Arkok",
"Bassam",
""
]
] | TITLE: The Correlation among Software Complexity Metrics with Case Study
ABSTRACT: People demand for software quality is growing increasingly, thus different
scales for the software are growing fast to handle the quality of software. The
software complexity metric is one of the measurements that use some of the
internal attributes or characteristics of software to know how they effect on
the software quality. In this paper, we cover some of more efficient software
complexity metrics such as Cyclomatic complexity, line of code and Hallstead
complexity metric. This paper presents their impacts on the software quality.
It also discusses and analyzes the correlation between them. It finally reveals
their relation with the number of errors using a real dataset as a case study.
|
1408.4565 | Philipp Leitner | Joel Scheuner and Philipp Leitner and Jurgen Cito and Harald Gall | Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To optimally deploy their applications, users of Infrastructure-as-a-Service
clouds are required to evaluate the costs and performance of different
combinations of cloud configurations to find out which combination provides the
best service level for their specific application. Unfortunately, benchmarking
cloud services is cumbersome and error-prone. In this paper, we propose an
architecture and concrete implementation of a cloud benchmarking Web service,
which fosters the definition of reusable and representative benchmarks. In
distinction to existing work, our system is based on the notion of
Infrastructure-as-Code, which is a state of the art concept to define IT
infrastructure in a reproducible, well-defined, and testable way. We
demonstrate our system based on an illustrative case study, in which we measure
and compare the disk IO speeds of different instance and storage types in
Amazon EC2.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2014 09:04:57 GMT"
}
] | 2014-08-21T00:00:00 | [
[
"Scheuner",
"Joel",
""
],
[
"Leitner",
"Philipp",
""
],
[
"Cito",
"Jurgen",
""
],
[
"Gall",
"Harald",
""
]
] | TITLE: Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking
ABSTRACT: To optimally deploy their applications, users of Infrastructure-as-a-Service
clouds are required to evaluate the costs and performance of different
combinations of cloud configurations to find out which combination provides the
best service level for their specific application. Unfortunately, benchmarking
cloud services is cumbersome and error-prone. In this paper, we propose an
architecture and concrete implementation of a cloud benchmarking Web service,
which fosters the definition of reusable and representative benchmarks. In
distinction to existing work, our system is based on the notion of
Infrastructure-as-Code, which is a state of the art concept to define IT
infrastructure in a reproducible, well-defined, and testable way. We
demonstrate our system based on an illustrative case study, in which we measure
and compare the disk IO speeds of different instance and storage types in
Amazon EC2.
|
1408.4587 | Pier Stanislao Paolucci | Pier Stanislao Paolucci, Iuliana Bacivarov, Devendra Rai, Lars Schor,
Lothar Thiele, Hoeseok Yang, Elena Pastorelli, Roberto Ammendola, Andrea
Biagioni, Ottorino Frezza, Francesca Lo Cicero, Alessandro Lonardo, Francesco
Simula, Laura Tosoratto, Piero Vicini | EURETILE D7.3 - Dynamic DAL benchmark coding, measurements on MPI
version of DPSNN-STDP (distributed plastic spiking neural net) and
improvements to other DAL codes | 34 pages. arXiv admin note: substantial text overlap with
arXiv:1310.8478 | null | null | null | cs.DC cs.CE cs.MS cs.NE q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The EURETILE project required the selection and coding of a set of dedicated
benchmarks. The project is about the software and hardware architecture of
future many-tile distributed fault-tolerant systems. We focus on dynamic
workloads characterised by heavy numerical processing requirements. The
ambition is to identify common techniques that could be applied to both the
Embedded Systems and HPC domains. This document is the first public deliverable
of Work Package 7: Challenging Tiled Applications.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2014 10:00:15 GMT"
}
] | 2014-08-21T00:00:00 | [
[
"Paolucci",
"Pier Stanislao",
""
],
[
"Bacivarov",
"Iuliana",
""
],
[
"Rai",
"Devendra",
""
],
[
"Schor",
"Lars",
""
],
[
"Thiele",
"Lothar",
""
],
[
"Yang",
"Hoeseok",
""
],
[
"Pastorelli",
"Elena",
""
],
[
"Ammendola",
"Roberto",
""
],
[
"Biagioni",
"Andrea",
""
],
[
"Frezza",
"Ottorino",
""
],
[
"Cicero",
"Francesca Lo",
""
],
[
"Lonardo",
"Alessandro",
""
],
[
"Simula",
"Francesco",
""
],
[
"Tosoratto",
"Laura",
""
],
[
"Vicini",
"Piero",
""
]
] | TITLE: EURETILE D7.3 - Dynamic DAL benchmark coding, measurements on MPI
version of DPSNN-STDP (distributed plastic spiking neural net) and
improvements to other DAL codes
ABSTRACT: The EURETILE project required the selection and coding of a set of dedicated
benchmarks. The project is about the software and hardware architecture of
future many-tile distributed fault-tolerant systems. We focus on dynamic
workloads characterised by heavy numerical processing requirements. The
ambition is to identify common techniques that could be applied to both the
Embedded Systems and HPC domains. This document is the first public deliverable
of Work Package 7: Challenging Tiled Applications.
|
1408.4630 | Roope Vehkalahti | Benjamin Linowitz, Matthew Satriano and Roope Vehkalahti | A non-commutative analogue of the Odlyzko bounds and bounds on
performance for space-time lattice codes | null | null | null | null | cs.IT math.IT math.NT math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers space-time coding over several independently Rayleigh
faded blocks. In particular we will concentrate on giving upper bounds for the
coding gain of lattice space-time codes as the number of blocks grow. This
problem was previously considered in the single antenna case by Bayer et al. in
2006. Crucial to their work was Odlyzko's bound on the discriminant of an
algebraic number field, as this provides an upper bound for the normalized
coding gain of number field codes. In the MIMO context natural codes are
constructed from division algebras defined over number fields and the coding
gain is measured by the discriminant of the corresponding (non-commutative)
algebra. In this paper we will develop analogues of the Odlyzko bounds in this
context and show how these bounds limit the normalized coding gain of a very
general family of division algebra based space-time codes. These bounds can
also be used as benchmarks in practical code design and as tools to analyze
asymptotic bounds of performance as the number of independently faded blocks
increases.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2014 12:52:19 GMT"
}
] | 2014-08-21T00:00:00 | [
[
"Linowitz",
"Benjamin",
""
],
[
"Satriano",
"Matthew",
""
],
[
"Vehkalahti",
"Roope",
""
]
] | TITLE: A non-commutative analogue of the Odlyzko bounds and bounds on
performance for space-time lattice codes
ABSTRACT: This paper considers space-time coding over several independently Rayleigh
faded blocks. In particular we will concentrate on giving upper bounds for the
coding gain of lattice space-time codes as the number of blocks grow. This
problem was previously considered in the single antenna case by Bayer et al. in
2006. Crucial to their work was Odlyzko's bound on the discriminant of an
algebraic number field, as this provides an upper bound for the normalized
coding gain of number field codes. In the MIMO context natural codes are
constructed from division algebras defined over number fields and the coding
gain is measured by the discriminant of the corresponding (non-commutative)
algebra. In this paper we will develop analogues of the Odlyzko bounds in this
context and show how these bounds limit the normalized coding gain of a very
general family of division algebra based space-time codes. These bounds can
also be used as benchmarks in practical code design and as tools to analyze
asymptotic bounds of performance as the number of independently faded blocks
increases.
|
1408.4143 | Mohammed Abdelsamea | Marghny H. Mohamed and Mohammed M. Abdelsamea | Self Organization Map based Texture Feature Extraction for Efficient
Medical Image Categorization | In Proceedings of the 4th ACM International Conference on Intelligent
Computing and Information Systems, ICICIS 2009, Cairo, Egypt 2009 | null | null | null | cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Texture is one of the most important properties of visual surface that helps
in discriminating one object from another or an object from background. The
self-organizing map (SOM) is an excellent tool in exploratory phase of data
mining. It projects its input space on prototypes of a low-dimensional regular
grid that can be effectively utilized to visualize and explore properties of
the data. This paper proposes an enhancement extraction method for accurate
extracting features for efficient image representation it based on SOM neural
network. In this approach, we apply three different partitioning approaches as
a region of interested (ROI) selection methods for extracting different
accurate textural features from medical image as a primary step of our
extraction method. Fisherfaces feature selection is used, for selecting
discriminated features form extracted textural features. Experimental result
showed the high accuracy of medical image categorization with our proposed
extraction method. Experiments held on Mammographic Image Analysis Society
(MIAS) dataset.
| [
{
"version": "v1",
"created": "Mon, 14 Jul 2014 13:43:19 GMT"
}
] | 2014-08-20T00:00:00 | [
[
"Mohamed",
"Marghny H.",
""
],
[
"Abdelsamea",
"Mohammed M.",
""
]
] | TITLE: Self Organization Map based Texture Feature Extraction for Efficient
Medical Image Categorization
ABSTRACT: Texture is one of the most important properties of visual surface that helps
in discriminating one object from another or an object from background. The
self-organizing map (SOM) is an excellent tool in exploratory phase of data
mining. It projects its input space on prototypes of a low-dimensional regular
grid that can be effectively utilized to visualize and explore properties of
the data. This paper proposes an enhancement extraction method for accurate
extracting features for efficient image representation it based on SOM neural
network. In this approach, we apply three different partitioning approaches as
a region of interested (ROI) selection methods for extracting different
accurate textural features from medical image as a primary step of our
extraction method. Fisherfaces feature selection is used, for selecting
discriminated features form extracted textural features. Experimental result
showed the high accuracy of medical image categorization with our proposed
extraction method. Experiments held on Mammographic Image Analysis Society
(MIAS) dataset.
|
1408.4325 | Diane Larlus | Yangmuzi Zhang, Diane Larlus, Florent Perronnin | What makes an Image Iconic? A Fine-Grained Case Study | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A natural approach to teaching a visual concept, e.g. a bird species, is to
show relevant images. However, not all relevant images represent a concept
equally well. In other words, they are not necessarily iconic. This observation
raises three questions. Is iconicity a subjective property? If not, can we
predict iconicity? And what exactly makes an image iconic? We provide answers
to these questions through an extensive experimental study on a challenging
fine-grained dataset of birds. We first show that iconicity ratings are
consistent across individuals, even when they are not domain experts, thus
demonstrating that iconicity is not purely subjective. We then consider an
exhaustive list of properties that are intuitively related to iconicity and
measure their correlation with these iconicity ratings. We combine them to
predict iconicity of new unseen images. We also propose a direct iconicity
predictor that is discriminatively trained with iconicity ratings. By combining
both systems, we get an iconicity prediction that approaches human performance.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2014 13:26:01 GMT"
}
] | 2014-08-20T00:00:00 | [
[
"Zhang",
"Yangmuzi",
""
],
[
"Larlus",
"Diane",
""
],
[
"Perronnin",
"Florent",
""
]
] | TITLE: What makes an Image Iconic? A Fine-Grained Case Study
ABSTRACT: A natural approach to teaching a visual concept, e.g. a bird species, is to
show relevant images. However, not all relevant images represent a concept
equally well. In other words, they are not necessarily iconic. This observation
raises three questions. Is iconicity a subjective property? If not, can we
predict iconicity? And what exactly makes an image iconic? We provide answers
to these questions through an extensive experimental study on a challenging
fine-grained dataset of birds. We first show that iconicity ratings are
consistent across individuals, even when they are not domain experts, thus
demonstrating that iconicity is not purely subjective. We then consider an
exhaustive list of properties that are intuitively related to iconicity and
measure their correlation with these iconicity ratings. We combine them to
predict iconicity of new unseen images. We also propose a direct iconicity
predictor that is discriminatively trained with iconicity ratings. By combining
both systems, we get an iconicity prediction that approaches human performance.
|
1407.4694 | Kaiming Shen | Kaiming Shen and Wei Yu | Distributed Pricing-Based User Association for Downlink Heterogeneous
Cellular Networks | IEEE Journal on Selected Areas in Communications, Special Issue on 5G
Communication Systems, June 2014 | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the optimization of the user and base-station (BS)
association in a wireless downlink heterogeneous cellular network under the
proportional fairness criterion. We first consider the case where each BS has a
single antenna and transmits at fixed power, and propose a distributed price
update strategy for a pricing-based user association scheme, in which the users
are assigned to the BS based on the value of a utility function minus a price.
The proposed price update algorithm is based on a coordinate descent method for
solving the dual of the network utility maximization problem, and it has a
rigorous performance guarantee. The main advantage of the proposed algorithm as
compared to the existing subgradient method for price update is that the
proposed algorithm is independent of parameter choices and can be implemented
asynchronously. Further, this paper considers the joint user association and BS
power control problem, and proposes an iterative dual coordinate descent and
the power optimization algorithm that significantly outperforms existing
approaches. Finally, this paper considers the joint user association and BS
beamforming problem for the case where the BSs are equipped with multiple
antennas and spatially multiplex multiple users. We incorporate dual coordinate
descent with the weighted minimum mean-squared error (WMMSE) algorithm, and
show that it achieves nearly the same performance as a computationally more
complex benchmark algorithm (which applies the WMMSE algorithm on the entire
network for BS association), while avoiding excessive BS handover.
| [
{
"version": "v1",
"created": "Thu, 17 Jul 2014 14:59:53 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Aug 2014 16:48:44 GMT"
}
] | 2014-08-19T00:00:00 | [
[
"Shen",
"Kaiming",
""
],
[
"Yu",
"Wei",
""
]
] | TITLE: Distributed Pricing-Based User Association for Downlink Heterogeneous
Cellular Networks
ABSTRACT: This paper considers the optimization of the user and base-station (BS)
association in a wireless downlink heterogeneous cellular network under the
proportional fairness criterion. We first consider the case where each BS has a
single antenna and transmits at fixed power, and propose a distributed price
update strategy for a pricing-based user association scheme, in which the users
are assigned to the BS based on the value of a utility function minus a price.
The proposed price update algorithm is based on a coordinate descent method for
solving the dual of the network utility maximization problem, and it has a
rigorous performance guarantee. The main advantage of the proposed algorithm as
compared to the existing subgradient method for price update is that the
proposed algorithm is independent of parameter choices and can be implemented
asynchronously. Further, this paper considers the joint user association and BS
power control problem, and proposes an iterative dual coordinate descent and
the power optimization algorithm that significantly outperforms existing
approaches. Finally, this paper considers the joint user association and BS
beamforming problem for the case where the BSs are equipped with multiple
antennas and spatially multiplex multiple users. We incorporate dual coordinate
descent with the weighted minimum mean-squared error (WMMSE) algorithm, and
show that it achieves nearly the same performance as a computationally more
complex benchmark algorithm (which applies the WMMSE algorithm on the entire
network for BS association), while avoiding excessive BS handover.
|
1408.2770 | Christopher Griffin | Sarah Rajtmajer and Christopher Griffin and Derek Mikesell and Anna
Squicciarini | A cooperate-defect model for the spread of deviant behavior in social
networks | 9 pages, 6 figures, corrects an oversight in Version 1 in which
equilibrium point analysis is insufficiently qualified | null | null | null | cs.GT cs.SI physics.soc-ph | http://creativecommons.org/licenses/publicdomain/ | We present a game-theoretic model for the spread of deviant behavior in
online social networks. We utilize a two-strategy framework wherein each
player's behavior is classified as normal or deviant and evolves according to
the cooperate-defect payoff scheme of the classic prisoner's dilemma game. We
demonstrate convergence of individual behavior over time to a final strategy
vector and indicate counterexamples to this convergence outside the context of
prisoner's dilemma. Theoretical results are validated on a real-world dataset
collected from a popular online forum.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2014 16:33:10 GMT"
},
{
"version": "v2",
"created": "Sat, 16 Aug 2014 18:12:17 GMT"
}
] | 2014-08-19T00:00:00 | [
[
"Rajtmajer",
"Sarah",
""
],
[
"Griffin",
"Christopher",
""
],
[
"Mikesell",
"Derek",
""
],
[
"Squicciarini",
"Anna",
""
]
] | TITLE: A cooperate-defect model for the spread of deviant behavior in social
networks
ABSTRACT: We present a game-theoretic model for the spread of deviant behavior in
online social networks. We utilize a two-strategy framework wherein each
player's behavior is classified as normal or deviant and evolves according to
the cooperate-defect payoff scheme of the classic prisoner's dilemma game. We
demonstrate convergence of individual behavior over time to a final strategy
vector and indicate counterexamples to this convergence outside the context of
prisoner's dilemma. Theoretical results are validated on a real-world dataset
collected from a popular online forum.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.