id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1408.3733 | Ehtesham Hassan | Ehtesham Hassan and Gautam Shroff and Puneet Agarwal | Multi-Sensor Event Detection using Shape Histograms | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vehicular sensor data consists of multiple time-series arising from a number
of sensors. Using such multi-sensor data we would like to detect occurrences of
specific events that vehicles encounter, e.g., corresponding to particular
maneuvers that a vehicle makes or conditions that it encounters. Events are
characterized by similar waveform patterns re-appearing within one or more
sensors. Further such patterns can be of variable duration. In this work, we
propose a method for detecting such events in time-series data using a novel
feature descriptor motivated by similar ideas in image processing. We define
the shape histogram: a constant dimension descriptor that nevertheless captures
patterns of variable duration. We demonstrate the efficacy of using shape
histograms as features to detect events in an SVM-based, multi-sensor,
supervised learning scenario, i.e., multiple time-series are used to detect an
event. We present results on real-life vehicular sensor data and show that our
technique performs better than available pattern detection implementations on
our data, and that it can also be used to combine features from multiple
sensors resulting in better accuracy than using any single sensor. Since
previous work on pattern detection in time-series has been in the single series
context, we also present results using our technique on multiple standard
time-series datasets and show that it is the most versatile in terms of how it
ranks compared to other published results.
| [
{
"version": "v1",
"created": "Sat, 16 Aug 2014 11:11:59 GMT"
}
] | 2014-08-19T00:00:00 | [
[
"Hassan",
"Ehtesham",
""
],
[
"Shroff",
"Gautam",
""
],
[
"Agarwal",
"Puneet",
""
]
] | TITLE: Multi-Sensor Event Detection using Shape Histograms
ABSTRACT: Vehicular sensor data consists of multiple time-series arising from a number
of sensors. Using such multi-sensor data we would like to detect occurrences of
specific events that vehicles encounter, e.g., corresponding to particular
maneuvers that a vehicle makes or conditions that it encounters. Events are
characterized by similar waveform patterns re-appearing within one or more
sensors. Further such patterns can be of variable duration. In this work, we
propose a method for detecting such events in time-series data using a novel
feature descriptor motivated by similar ideas in image processing. We define
the shape histogram: a constant dimension descriptor that nevertheless captures
patterns of variable duration. We demonstrate the efficacy of using shape
histograms as features to detect events in an SVM-based, multi-sensor,
supervised learning scenario, i.e., multiple time-series are used to detect an
event. We present results on real-life vehicular sensor data and show that our
technique performs better than available pattern detection implementations on
our data, and that it can also be used to combine features from multiple
sensors resulting in better accuracy than using any single sensor. Since
previous work on pattern detection in time-series has been in the single series
context, we also present results using our technique on multiple standard
time-series datasets and show that it is the most versatile in terms of how it
ranks compared to other published results.
|
1304.3016 | Martin Kasparick | Martin Kasparick, Gerhard Wunder | Autonomous Algorithms for Centralized and Distributed Interference
Coordination: A Virtual Layer Based Approach | revised version | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interference mitigation techniques are essential for improving the
performance of interference limited wireless networks. In this paper, we
introduce novel interference mitigation schemes for wireless cellular networks
with space division multiple access (SDMA). The schemes are based on a virtual
layer that captures and simplifies the complicated interference situation in
the network and that is used for power control. We show how optimization in
this virtual layer generates gradually adapting power control settings that
lead to autonomous interference minimization. Thereby, the granularity of
control ranges from controlling frequency sub-band power via controlling the
power on a per-beam basis, to a granularity of only enforcing average power
constraints per beam. In conjunction with suitable short-term scheduling, our
algorithms gradually steer the network towards a higher utility. We use
extensive system-level simulations to compare three distributed algorithms and
evaluate their applicability for different user mobility assumptions. In
particular, it turns out that larger gains can be achieved by imposing average
power constraints and allowing opportunistic scheduling instantaneously, rather
than controlling the power in a strict way. Furthermore, we introduce a
centralized algorithm, which directly solves the underlying optimization and
shows fast convergence, as a performance benchmark for the distributed
solutions. Moreover, we investigate the deviation from global optimality by
comparing to a branch-and-bound-based solution.
| [
{
"version": "v1",
"created": "Wed, 10 Apr 2013 16:21:48 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Jan 2014 15:32:54 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Aug 2014 16:07:28 GMT"
}
] | 2014-08-18T00:00:00 | [
[
"Kasparick",
"Martin",
""
],
[
"Wunder",
"Gerhard",
""
]
] | TITLE: Autonomous Algorithms for Centralized and Distributed Interference
Coordination: A Virtual Layer Based Approach
ABSTRACT: Interference mitigation techniques are essential for improving the
performance of interference limited wireless networks. In this paper, we
introduce novel interference mitigation schemes for wireless cellular networks
with space division multiple access (SDMA). The schemes are based on a virtual
layer that captures and simplifies the complicated interference situation in
the network and that is used for power control. We show how optimization in
this virtual layer generates gradually adapting power control settings that
lead to autonomous interference minimization. Thereby, the granularity of
control ranges from controlling frequency sub-band power via controlling the
power on a per-beam basis, to a granularity of only enforcing average power
constraints per beam. In conjunction with suitable short-term scheduling, our
algorithms gradually steer the network towards a higher utility. We use
extensive system-level simulations to compare three distributed algorithms and
evaluate their applicability for different user mobility assumptions. In
particular, it turns out that larger gains can be achieved by imposing average
power constraints and allowing opportunistic scheduling instantaneously, rather
than controlling the power in a strict way. Furthermore, we introduce a
centralized algorithm, which directly solves the underlying optimization and
shows fast convergence, as a performance benchmark for the distributed
solutions. Moreover, we investigate the deviation from global optimality by
comparing to a branch-and-bound-based solution.
|
1408.3170 | Eugene Ch'ng | Eugene Ch'ng | The Value of Using Big Data Technologies in Computational Social Science | 3rd ASE Big Data Science Conference, Tsinghua University Beijing, 3-7
August 2014 | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The discovery of phenomena in social networks has prompted renewed interests
in the field. Data in social networks however can be massive, requiring
scalable Big Data architecture. Conversely, research in Big Data needs the
volume and velocity of social media data for testing its scalability. Not only
so, appropriate data processing and mining of acquired datasets involve complex
issues in the variety, veracity, and variability of the data, after which
visualisation must occur before we can see fruition in our efforts. This
article presents topical, multimodal, and longitudinal social media datasets
from the integration of various scalable open source technologies. The article
details the process that led to the discovery of social information landscapes
within the Twitter social network, highlighting the experience of dealing with
social media datasets, using a funneling approach so that data becomes
manageable. The article demonstrated the feasibility and value of using
scalable open source technologies for acquiring massive, connected datasets for
research in the social sciences.
| [
{
"version": "v1",
"created": "Thu, 14 Aug 2014 00:21:59 GMT"
}
] | 2014-08-15T00:00:00 | [
[
"Ch'ng",
"Eugene",
""
]
] | TITLE: The Value of Using Big Data Technologies in Computational Social Science
ABSTRACT: The discovery of phenomena in social networks has prompted renewed interests
in the field. Data in social networks however can be massive, requiring
scalable Big Data architecture. Conversely, research in Big Data needs the
volume and velocity of social media data for testing its scalability. Not only
so, appropriate data processing and mining of acquired datasets involve complex
issues in the variety, veracity, and variability of the data, after which
visualisation must occur before we can see fruition in our efforts. This
article presents topical, multimodal, and longitudinal social media datasets
from the integration of various scalable open source technologies. The article
details the process that led to the discovery of social information landscapes
within the Twitter social network, highlighting the experience of dealing with
social media datasets, using a funneling approach so that data becomes
manageable. The article demonstrated the feasibility and value of using
scalable open source technologies for acquiring massive, connected datasets for
research in the social sciences.
|
1408.3215 | Timothy Molter | M. Alexander Nugent, Timothy W. Molter | Cortical Processing with Thermodynamic-RAM | null | null | null | null | cs.NE cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | AHaH computing forms a theoretical framework from which a
biologically-inspired type of computing architecture can be built where, unlike
von Neumann systems, memory and processor are physically combined. In this
paper we report on an incremental step beyond the theoretical framework of AHaH
computing toward the development of a memristor-based physical neural
processing unit (NPU), which we call Thermodynamic-RAM (kT-RAM). While the
power consumption and speed dominance of such an NPU over von Neumann
architectures for machine learning applications is well appreciated,
Thermodynamic-RAM offers several advantages over other hardware approaches to
adaptation and learning. Benefits include general-purpose use, a simple yet
flexible instruction set and easy integration into existing digital platforms.
We present a high level design of kT-RAM and a formal definition of its
instruction set. We report the completion of a kT-RAM emulator and the
successful port of all previous machine learning benchmark applications
including unsupervised clustering, supervised and unsupervised classification,
complex signal prediction, unsupervised robotic actuation and combinatorial
optimization. Lastly, we extend a previous MNIST hand written digits benchmark
application, to show that an extra step of reading the synaptic states of AHaH
nodes during the train phase (healing) alone results in plasticity that
improves the classifier's performance, bumping our best F1 score up to 99.5%.
| [
{
"version": "v1",
"created": "Thu, 14 Aug 2014 08:39:15 GMT"
}
] | 2014-08-15T00:00:00 | [
[
"Nugent",
"M. Alexander",
""
],
[
"Molter",
"Timothy W.",
""
]
] | TITLE: Cortical Processing with Thermodynamic-RAM
ABSTRACT: AHaH computing forms a theoretical framework from which a
biologically-inspired type of computing architecture can be built where, unlike
von Neumann systems, memory and processor are physically combined. In this
paper we report on an incremental step beyond the theoretical framework of AHaH
computing toward the development of a memristor-based physical neural
processing unit (NPU), which we call Thermodynamic-RAM (kT-RAM). While the
power consumption and speed dominance of such an NPU over von Neumann
architectures for machine learning applications is well appreciated,
Thermodynamic-RAM offers several advantages over other hardware approaches to
adaptation and learning. Benefits include general-purpose use, a simple yet
flexible instruction set and easy integration into existing digital platforms.
We present a high level design of kT-RAM and a formal definition of its
instruction set. We report the completion of a kT-RAM emulator and the
successful port of all previous machine learning benchmark applications
including unsupervised clustering, supervised and unsupervised classification,
complex signal prediction, unsupervised robotic actuation and combinatorial
optimization. Lastly, we extend a previous MNIST hand written digits benchmark
application, to show that an extra step of reading the synaptic states of AHaH
nodes during the train phase (healing) alone results in plasticity that
improves the classifier's performance, bumping our best F1 score up to 99.5%.
|
1408.3337 | Ari Seff | Ari Seff, Le Lu, Kevin M. Cherry, Holger Roth, Jiamin Liu, Shijun
Wang, Joanne Hoffman, Evrim B. Turkbey, and Ronald M. Summers | 2D View Aggregation for Lymph Node Detection Using a Shallow Hierarchy
of Linear Classifiers | This article will be presented at MICCAI (Medical Image Computing and
Computer-Assisted Intervention) 2014 | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/publicdomain/ | Enlarged lymph nodes (LNs) can provide important information for cancer
diagnosis, staging, and measuring treatment reactions, making automated
detection a highly sought goal. In this paper, we propose a new algorithm
representation of decomposing the LN detection problem into a set of 2D object
detection subtasks on sampled CT slices, largely alleviating the curse of
dimensionality issue. Our 2D detection can be effectively formulated as linear
classification on a single image feature type of Histogram of Oriented
Gradients (HOG), covering a moderate field-of-view of 45 by 45 voxels. We
exploit both simple pooling and sparse linear fusion schemes to aggregate these
2D detection scores for the final 3D LN detection. In this manner, detection is
more tractable and does not need to perform perfectly at instance level (as
weak hypotheses) since our aggregation process will robustly harness collective
information for LN detection. Two datasets (90 patients with 389 mediastinal
LNs and 86 patients with 595 abdominal LNs) are used for validation.
Cross-validation demonstrates 78.0% sensitivity at 6 false positives/volume
(FP/vol.) (86.1% at 10 FP/vol.) and 73.1% sensitivity at 6 FP/vol. (87.2% at 10
FP/vol.), for the mediastinal and abdominal datasets respectively. Our results
compare favorably to previous state-of-the-art methods.
| [
{
"version": "v1",
"created": "Thu, 14 Aug 2014 16:47:34 GMT"
}
] | 2014-08-15T00:00:00 | [
[
"Seff",
"Ari",
""
],
[
"Lu",
"Le",
""
],
[
"Cherry",
"Kevin M.",
""
],
[
"Roth",
"Holger",
""
],
[
"Liu",
"Jiamin",
""
],
[
"Wang",
"Shijun",
""
],
[
"Hoffman",
"Joanne",
""
],
[
"Turkbey",
"Evrim B.",
""
],
[
"Summers",
"Ronald M.",
""
]
] | TITLE: 2D View Aggregation for Lymph Node Detection Using a Shallow Hierarchy
of Linear Classifiers
ABSTRACT: Enlarged lymph nodes (LNs) can provide important information for cancer
diagnosis, staging, and measuring treatment reactions, making automated
detection a highly sought goal. In this paper, we propose a new algorithm
representation of decomposing the LN detection problem into a set of 2D object
detection subtasks on sampled CT slices, largely alleviating the curse of
dimensionality issue. Our 2D detection can be effectively formulated as linear
classification on a single image feature type of Histogram of Oriented
Gradients (HOG), covering a moderate field-of-view of 45 by 45 voxels. We
exploit both simple pooling and sparse linear fusion schemes to aggregate these
2D detection scores for the final 3D LN detection. In this manner, detection is
more tractable and does not need to perform perfectly at instance level (as
weak hypotheses) since our aggregation process will robustly harness collective
information for LN detection. Two datasets (90 patients with 389 mediastinal
LNs and 86 patients with 595 abdominal LNs) are used for validation.
Cross-validation demonstrates 78.0% sensitivity at 6 false positives/volume
(FP/vol.) (86.1% at 10 FP/vol.) and 73.1% sensitivity at 6 FP/vol. (87.2% at 10
FP/vol.), for the mediastinal and abdominal datasets respectively. Our results
compare favorably to previous state-of-the-art methods.
|
1408.2869 | Wojciech Czarnecki | Wojciech Marian Czarnecki, Jacek Tabor | Cluster based RBF Kernel for Support Vector Machines | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the classical Gaussian SVM classification we use the feature space
projection transforming points to normal distributions with fixed covariance
matrices (identity in the standard RBF and the covariance of the whole dataset
in Mahalanobis RBF). In this paper we add additional information to Gaussian
SVM by considering local geometry-dependent feature space projection. We
emphasize that our approach is in fact an algorithm for a construction of the
new Gaussian-type kernel.
We show that better (compared to standard RBF and Mahalanobis RBF)
classification results are obtained in the simple case when the space is
preliminary divided by k-means into two sets and points are represented as
normal distributions with a covariances calculated according to the dataset
partitioning.
We call the constructed method C$_k$RBF, where $k$ stands for the amount of
clusters used in k-means. We show empirically on nine datasets from UCI
repository that C$_2$RBF increases the stability of the grid search (measured
as the probability of finding good parameters).
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2014 22:30:11 GMT"
}
] | 2014-08-14T00:00:00 | [
[
"Czarnecki",
"Wojciech Marian",
""
],
[
"Tabor",
"Jacek",
""
]
] | TITLE: Cluster based RBF Kernel for Support Vector Machines
ABSTRACT: In the classical Gaussian SVM classification we use the feature space
projection transforming points to normal distributions with fixed covariance
matrices (identity in the standard RBF and the covariance of the whole dataset
in Mahalanobis RBF). In this paper we add additional information to Gaussian
SVM by considering local geometry-dependent feature space projection. We
emphasize that our approach is in fact an algorithm for a construction of the
new Gaussian-type kernel.
We show that better (compared to standard RBF and Mahalanobis RBF)
classification results are obtained in the simple case when the space is
preliminary divided by k-means into two sets and points are represented as
normal distributions with a covariances calculated according to the dataset
partitioning.
We call the constructed method C$_k$RBF, where $k$ stands for the amount of
clusters used in k-means. We show empirically on nine datasets from UCI
repository that C$_2$RBF increases the stability of the grid search (measured
as the probability of finding good parameters).
|
1408.2938 | Wenbin Li | Wenbin Li, Mario Fritz | Learning Multi-Scale Representations for Material Classification | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recent progress in sparse coding and deep learning has made unsupervised
feature learning methods a strong competitor to hand-crafted descriptors. In
computer vision, success stories of learned features have been predominantly
reported for object recognition tasks. In this paper, we investigate if and how
feature learning can be used for material recognition. We propose two
strategies to incorporate scale information into the learning procedure
resulting in a novel multi-scale coding procedure. Our results show that our
learned features for material recognition outperform hand-crafted descriptors
on the FMD and the KTH-TIPS2 material classification benchmarks.
| [
{
"version": "v1",
"created": "Wed, 13 Aug 2014 08:27:12 GMT"
}
] | 2014-08-14T00:00:00 | [
[
"Li",
"Wenbin",
""
],
[
"Fritz",
"Mario",
""
]
] | TITLE: Learning Multi-Scale Representations for Material Classification
ABSTRACT: The recent progress in sparse coding and deep learning has made unsupervised
feature learning methods a strong competitor to hand-crafted descriptors. In
computer vision, success stories of learned features have been predominantly
reported for object recognition tasks. In this paper, we investigate if and how
feature learning can be used for material recognition. We propose two
strategies to incorporate scale information into the learning procedure
resulting in a novel multi-scale coding procedure. Our results show that our
learned features for material recognition outperform hand-crafted descriptors
on the FMD and the KTH-TIPS2 material classification benchmarks.
|
1012.1919 | Yue Deng | Yue Deng, Qionghai Dai, Risheng Liu, Zengke Zhang and Sanqing Hu | Low-Rank Structure Learning via Log-Sum Heuristic Recovery | 13 pages, 3 figures | Neural Networks and Learning Systems, IEEE Transactions on,
Volume:24 , Issue: 3, March, 2013 | 10.1109/TNNLS.2012.2235082 | null | cs.NA cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recovering intrinsic data structure from corrupted observations plays an
important role in various tasks in the communities of machine learning and
signal processing. In this paper, we propose a novel model, named log-sum
heuristic recovery (LHR), to learn the essential low-rank structure from
corrupted data. Different from traditional approaches, which directly utilize
$\ell_1$ norm to measure the sparseness, LHR introduces a more reasonable
log-sum measurement to enhance the sparsity in both the intrinsic low-rank
structure and in the sparse corruptions. Although the proposed LHR optimization
is no longer convex, it still can be effectively solved by a
majorization-minimization (MM) type algorithm, with which the non-convex
objective function is iteratively replaced by its convex surrogate and LHR
finally falls into the general framework of reweighed approaches. We prove that
the MM-type algorithm can converge to a stationary point after successive
iteration. We test the performance of our proposed model by applying it to
solve two typical problems: robust principal component analysis (RPCA) and
low-rank representation (LRR).
For RPCA, we compare LHR with the benchmark Principal Component Pursuit (PCP)
method from both the perspectives of simulations and practical applications.
For LRR, we apply LHR to compute the low-rank representation matrix for motion
segmentation and stock clustering. Experimental results on low rank structure
learning demonstrate that the proposed Log-sum based model performs much better
than the $\ell_1$-based method on for data with higher rank and with denser
corruptions.
| [
{
"version": "v1",
"created": "Thu, 9 Dec 2010 03:54:44 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Apr 2011 15:28:58 GMT"
},
{
"version": "v3",
"created": "Sat, 24 Mar 2012 15:37:12 GMT"
}
] | 2014-08-13T00:00:00 | [
[
"Deng",
"Yue",
""
],
[
"Dai",
"Qionghai",
""
],
[
"Liu",
"Risheng",
""
],
[
"Zhang",
"Zengke",
""
],
[
"Hu",
"Sanqing",
""
]
] | TITLE: Low-Rank Structure Learning via Log-Sum Heuristic Recovery
ABSTRACT: Recovering intrinsic data structure from corrupted observations plays an
important role in various tasks in the communities of machine learning and
signal processing. In this paper, we propose a novel model, named log-sum
heuristic recovery (LHR), to learn the essential low-rank structure from
corrupted data. Different from traditional approaches, which directly utilize
$\ell_1$ norm to measure the sparseness, LHR introduces a more reasonable
log-sum measurement to enhance the sparsity in both the intrinsic low-rank
structure and in the sparse corruptions. Although the proposed LHR optimization
is no longer convex, it still can be effectively solved by a
majorization-minimization (MM) type algorithm, with which the non-convex
objective function is iteratively replaced by its convex surrogate and LHR
finally falls into the general framework of reweighed approaches. We prove that
the MM-type algorithm can converge to a stationary point after successive
iteration. We test the performance of our proposed model by applying it to
solve two typical problems: robust principal component analysis (RPCA) and
low-rank representation (LRR).
For RPCA, we compare LHR with the benchmark Principal Component Pursuit (PCP)
method from both the perspectives of simulations and practical applications.
For LRR, we apply LHR to compute the low-rank representation matrix for motion
segmentation and stock clustering. Experimental results on low rank structure
learning demonstrate that the proposed Log-sum based model performs much better
than the $\ell_1$-based method on for data with higher rank and with denser
corruptions.
|
1407.8041 | Petter Holme | Fariba Karimi, Ver\'onica C. Ramenzoni, Petter Holme | Structural differences between open and direct communication in an
online community | null | Physica A 414, 263-273 (2014) | 10.1016/j.physa.2014.07.037 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most research of online communication focuses on modes of communication that
are either open (like forums, bulletin boards, Twitter, etc.) or direct (like
e-mails). In this work, we study a dataset that has both types of communication
channels. We relate our findings to theories of social organization and human
dynamics. The data comprises 36,492 users of a movie discussion community. Our
results show that there are differences in the way users communicate in the two
channels that are reflected in the shape of degree- and interevent time
distributions. The open communication that is designed to facilitate
conversations with any member, shows a broader degree distribution and more of
the triangles in the network are primarily formed in this mode of
communication. The direct channel is presumably preferred by closer
communication and the response time in dialogues is shorter. On a more
coarse-grained level, there are common patterns in the two networks. The
differences and overlaps between communication networks, thus, provide a unique
window into how social and structural aspects of communication establish and
evolve.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2014 13:49:42 GMT"
}
] | 2014-08-13T00:00:00 | [
[
"Karimi",
"Fariba",
""
],
[
"Ramenzoni",
"Verónica C.",
""
],
[
"Holme",
"Petter",
""
]
] | TITLE: Structural differences between open and direct communication in an
online community
ABSTRACT: Most research of online communication focuses on modes of communication that
are either open (like forums, bulletin boards, Twitter, etc.) or direct (like
e-mails). In this work, we study a dataset that has both types of communication
channels. We relate our findings to theories of social organization and human
dynamics. The data comprises 36,492 users of a movie discussion community. Our
results show that there are differences in the way users communicate in the two
channels that are reflected in the shape of degree- and interevent time
distributions. The open communication that is designed to facilitate
conversations with any member, shows a broader degree distribution and more of
the triangles in the network are primarily formed in this mode of
communication. The direct channel is presumably preferred by closer
communication and the response time in dialogues is shorter. On a more
coarse-grained level, there are common patterns in the two networks. The
differences and overlaps between communication networks, thus, provide a unique
window into how social and structural aspects of communication establish and
evolve.
|
1408.2657 | Ben Cumming Dr | Gilles Fourestey, Ben Cumming, Ladina Gilly, Thomas C. Schulthess | First Experiences With Validating and Using the Cray Power Management
Database Tool | This paper was presented at the 2014 Cray User Group (CUG) user
meeting in Lugano, Switzerland,First Experiences With Validating and Using
the Cray Power Management Database Tool, Gilles Fourestey and Ben Cumming and
Ladina Gilly, Proceedings of the CUG meeting, 2014 | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In October 2013 CSCS installed the first hybrid Cray XC-30 system, dubbed Piz
Daint. This system features the power management database (PMDB), that was
recently introduced by Cray to collect detailed power consumption information
in a non-intrusive manner. Power measurements are taken on each node, with
additional measurements for the Aries network and blowers, and recorded in a
database. This enables fine-grained reporting of power consumption that is not
possible with external power meters, and is useful to both application
developers and facility operators. This paper will show how benchmarks of
representative applications at CSCS were used to validate the PMDB on Piz
Daint. Furthermore we will elaborate, with the well-known HPL benchmark serving
as prototypical application, on how the PMDB streamlines the tuning for optimal
power efficiency in production, which lead to Piz Daint being recognised as the
most energy efficient petascale supercomputer presently in operation.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2014 08:33:03 GMT"
}
] | 2014-08-13T00:00:00 | [
[
"Fourestey",
"Gilles",
""
],
[
"Cumming",
"Ben",
""
],
[
"Gilly",
"Ladina",
""
],
[
"Schulthess",
"Thomas C.",
""
]
] | TITLE: First Experiences With Validating and Using the Cray Power Management
Database Tool
ABSTRACT: In October 2013 CSCS installed the first hybrid Cray XC-30 system, dubbed Piz
Daint. This system features the power management database (PMDB), that was
recently introduced by Cray to collect detailed power consumption information
in a non-intrusive manner. Power measurements are taken on each node, with
additional measurements for the Aries network and blowers, and recorded in a
database. This enables fine-grained reporting of power consumption that is not
possible with external power meters, and is useful to both application
developers and facility operators. This paper will show how benchmarks of
representative applications at CSCS were used to validate the PMDB on Piz
Daint. Furthermore we will elaborate, with the well-known HPL benchmark serving
as prototypical application, on how the PMDB streamlines the tuning for optimal
power efficiency in production, which lead to Piz Daint being recognised as the
most energy efficient petascale supercomputer presently in operation.
|
1408.2810 | Roozbeh Rajabi | Roozbeh Rajabi, Hassan Ghassemian | Spectral Unmixing of Hyperspectral Imagery using Multilayer NMF | 5 pages, Journal | null | 10.1109/LGRS.2014.2325874 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hyperspectral images contain mixed pixels due to low spatial resolution of
hyperspectral sensors. Spectral unmixing problem refers to decomposing mixed
pixels into a set of endmembers and abundance fractions. Due to nonnegativity
constraint on abundance fractions, nonnegative matrix factorization (NMF)
methods have been widely used for solving spectral unmixing problem. In this
letter we proposed using multilayer NMF (MLNMF) for the purpose of
hyperspectral unmixing. In this approach, spectral signature matrix can be
modeled as a product of sparse matrices. In fact MLNMF decomposes the
observation matrix iteratively in a number of layers. In each layer, we applied
sparseness constraint on spectral signature matrix as well as on abundance
fractions matrix. In this way signatures matrix can be sparsely decomposed
despite the fact that it is not generally a sparse matrix. The proposed
algorithm is applied on synthetic and real datasets. Synthetic data is
generated based on endmembers from USGS spectral library. AVIRIS Cuprite
dataset has been used as a real dataset for evaluation of proposed method.
Results of experiments are quantified based on SAD and AAD measures. Results in
comparison with previously proposed methods show that the multilayer approach
can unmix data more effectively.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2014 19:07:23 GMT"
}
] | 2014-08-13T00:00:00 | [
[
"Rajabi",
"Roozbeh",
""
],
[
"Ghassemian",
"Hassan",
""
]
] | TITLE: Spectral Unmixing of Hyperspectral Imagery using Multilayer NMF
ABSTRACT: Hyperspectral images contain mixed pixels due to low spatial resolution of
hyperspectral sensors. Spectral unmixing problem refers to decomposing mixed
pixels into a set of endmembers and abundance fractions. Due to nonnegativity
constraint on abundance fractions, nonnegative matrix factorization (NMF)
methods have been widely used for solving spectral unmixing problem. In this
letter we proposed using multilayer NMF (MLNMF) for the purpose of
hyperspectral unmixing. In this approach, spectral signature matrix can be
modeled as a product of sparse matrices. In fact MLNMF decomposes the
observation matrix iteratively in a number of layers. In each layer, we applied
sparseness constraint on spectral signature matrix as well as on abundance
fractions matrix. In this way signatures matrix can be sparsely decomposed
despite the fact that it is not generally a sparse matrix. The proposed
algorithm is applied on synthetic and real datasets. Synthetic data is
generated based on endmembers from USGS spectral library. AVIRIS Cuprite
dataset has been used as a real dataset for evaluation of proposed method.
Results of experiments are quantified based on SAD and AAD measures. Results in
comparison with previously proposed methods show that the multilayer approach
can unmix data more effectively.
|
1312.2207 | Sparsh Mittal | Sparsh Mittal | A Cache Energy Optimization Technique for STT-RAM Last Level Cache | This paper has been withdrawn by the author for revising experiments | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Last level caches (LLCs) occupy a large chip-area and there size is expected
to grow further to offset the limitations of memory bandwidth and speed. Due to
high leakage consumption of SRAM device, caches designed with SRAM consume
large amount of energy. To address this, use of emerging technologies such as
spin torque transfer RAM (STT-RAM) has been investigated which have lower
leakage power dissipation. However, the high write latency and power of it may
lead to large energy consumption which present challenges in its use. In this
report, we propose a cache reconfiguration based technique for improving the
energy efficiency of STT-RAM based LLCs. Our technique dynamically adjusts the
active cache size to reduce the cache leakage energy consumption with minimum
performance loss. We choose a suitable value of STT-RAM retention time for
avoiding refresh overhead and gaining performance. Single-core simulations have
been performed using SPEC2006 benchmarks and Sniper x86-64 simulator. The
results show that while, compared to an STT-RAM LLC of similar area, an SRAM
LLC incurs nearly 100% loss in energy and 7.3% loss in performance; our
technique using STT-RAM cache saves 21.8% energy and incurs only 1.7% loss in
performance.
| [
{
"version": "v1",
"created": "Sun, 8 Dec 2013 13:03:15 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Aug 2014 20:03:48 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Mittal",
"Sparsh",
""
]
] | TITLE: A Cache Energy Optimization Technique for STT-RAM Last Level Cache
ABSTRACT: Last level caches (LLCs) occupy a large chip-area and there size is expected
to grow further to offset the limitations of memory bandwidth and speed. Due to
high leakage consumption of SRAM device, caches designed with SRAM consume
large amount of energy. To address this, use of emerging technologies such as
spin torque transfer RAM (STT-RAM) has been investigated which have lower
leakage power dissipation. However, the high write latency and power of it may
lead to large energy consumption which present challenges in its use. In this
report, we propose a cache reconfiguration based technique for improving the
energy efficiency of STT-RAM based LLCs. Our technique dynamically adjusts the
active cache size to reduce the cache leakage energy consumption with minimum
performance loss. We choose a suitable value of STT-RAM retention time for
avoiding refresh overhead and gaining performance. Single-core simulations have
been performed using SPEC2006 benchmarks and Sniper x86-64 simulator. The
results show that while, compared to an STT-RAM LLC of similar area, an SRAM
LLC incurs nearly 100% loss in energy and 7.3% loss in performance; our
technique using STT-RAM cache saves 21.8% energy and incurs only 1.7% loss in
performance.
|
1407.4833 | Nikita Zhiltsov | Olga Nevzorova, Nikita Zhiltsov, Alexander Kirillovich, and Evgeny
Lipachev | $OntoMath^{PRO}$ Ontology: A Linked Data Hub for Mathematics | 15 pages, 6 images, 1 table, Knowledge Engineering and the Semantic
Web - 5th International Conference | null | null | null | cs.AI cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present an ontology of mathematical knowledge concepts that
covers a wide range of the fields of mathematics and introduces a balanced
representation between comprehensive and sensible models. We demonstrate the
applications of this representation in information extraction, semantic search,
and education. We argue that the ontology can be a core of future integration
of math-aware data sets in the Web of Data and, therefore, provide mappings
onto relevant datasets, such as DBpedia and ScienceWISE.
| [
{
"version": "v1",
"created": "Thu, 17 Jul 2014 20:36:36 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Aug 2014 06:54:16 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Nevzorova",
"Olga",
""
],
[
"Zhiltsov",
"Nikita",
""
],
[
"Kirillovich",
"Alexander",
""
],
[
"Lipachev",
"Evgeny",
""
]
] | TITLE: $OntoMath^{PRO}$ Ontology: A Linked Data Hub for Mathematics
ABSTRACT: In this paper, we present an ontology of mathematical knowledge concepts that
covers a wide range of the fields of mathematics and introduces a balanced
representation between comprehensive and sensible models. We demonstrate the
applications of this representation in information extraction, semantic search,
and education. We argue that the ontology can be a core of future integration
of math-aware data sets in the Web of Data and, therefore, provide mappings
onto relevant datasets, such as DBpedia and ScienceWISE.
|
1408.0680 | Rafael Berri A | Rafael A. Berri, Alexandre G. Silva, Rafael S. Parpinelli, Elaine
Girardi, Rangel Arthur | A Pattern Recognition System for Detecting Use of Mobile Phones While
Driving | 8 pages, 9th International Conference on Computer Vision Theory and
Applications | null | 10.5220/0004684504110418 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is estimated that 80% of crashes and 65% of near collisions involved
drivers inattentive to traffic for three seconds before the event. This paper
develops an algorithm for extracting characteristics allowing the cell phones
identification used during driving a vehicle. Experiments were performed on
sets of images with 100 positive images (with phone) and the other 100 negative
images (no phone), containing frontal images of the driver. Support Vector
Machine (SVM) with Polynomial kernel is the most advantageous classification
system to the features provided by the algorithm, obtaining a success rate of
91.57% for the vision system. Tests done on videos show that it is possible to
use the image datasets for training classifiers in real situations. Periods of
3 seconds were correctly classified at 87.43% of cases.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2014 13:35:24 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Berri",
"Rafael A.",
""
],
[
"Silva",
"Alexandre G.",
""
],
[
"Parpinelli",
"Rafael S.",
""
],
[
"Girardi",
"Elaine",
""
],
[
"Arthur",
"Rangel",
""
]
] | TITLE: A Pattern Recognition System for Detecting Use of Mobile Phones While
Driving
ABSTRACT: It is estimated that 80% of crashes and 65% of near collisions involved
drivers inattentive to traffic for three seconds before the event. This paper
develops an algorithm for extracting characteristics allowing the cell phones
identification used during driving a vehicle. Experiments were performed on
sets of images with 100 positive images (with phone) and the other 100 negative
images (no phone), containing frontal images of the driver. Support Vector
Machine (SVM) with Polynomial kernel is the most advantageous classification
system to the features provided by the algorithm, obtaining a success rate of
91.57% for the vision system. Tests done on videos show that it is possible to
use the image datasets for training classifiers in real situations. Periods of
3 seconds were correctly classified at 87.43% of cases.
|
1408.2015 | Mohammed Javed | Abdessamad Elboushaki, Rachida Hannane, P. Nagabhushan, Mohammed Javed | Automatic Removal of Marginal Annotations in Printed Text Document | Original Article Published by Elsevier at ERCICA-2014, Pages 123-131,
August 2014 | Proceedings of Second International Conference on Emerging
Research in Computing, Information,Communication and Applications
(ERCICA-14), pages 123-131, August 2014, Bangalore | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recovering the original printed texts from a document with added handwritten
annotations in the marginal area is one of the challenging problems, especially
when the original document is not available. Therefore, this paper aims at
salvaging automatically the original document from the annotated document by
detecting and removing any handwritten annotations that appear in the marginal
area of the document without any loss of information. Here a two stage
algorithm is proposed, where in the first stage due to approximate marginal
boundary detection with horizontal and vertical projection profiles, all of the
marginal annotations along with some part of the original printed text that may
appear very close to the marginal boundary are removed. Therefore as a second
stage, using the connected components, a strategy is applied to bring back the
printed text components cropped during the first stage. The proposed method is
validated using a dataset of 50 documents having complex handwritten
annotations, which gives an overall accuracy of 89.01% in removing the marginal
annotations and 97.74% in case of retrieving the original printed text
document.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2014 03:56:16 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Elboushaki",
"Abdessamad",
""
],
[
"Hannane",
"Rachida",
""
],
[
"Nagabhushan",
"P.",
""
],
[
"Javed",
"Mohammed",
""
]
] | TITLE: Automatic Removal of Marginal Annotations in Printed Text Document
ABSTRACT: Recovering the original printed texts from a document with added handwritten
annotations in the marginal area is one of the challenging problems, especially
when the original document is not available. Therefore, this paper aims at
salvaging automatically the original document from the annotated document by
detecting and removing any handwritten annotations that appear in the marginal
area of the document without any loss of information. Here a two stage
algorithm is proposed, where in the first stage due to approximate marginal
boundary detection with horizontal and vertical projection profiles, all of the
marginal annotations along with some part of the original printed text that may
appear very close to the marginal boundary are removed. Therefore as a second
stage, using the connected components, a strategy is applied to bring back the
printed text components cropped during the first stage. The proposed method is
validated using a dataset of 50 documents having complex handwritten
annotations, which gives an overall accuracy of 89.01% in removing the marginal
annotations and 97.74% in case of retrieving the original printed text
document.
|
1408.2031 | Alina Beygelzimer | Alina Beygelzimer, John Langford, Yuri Lifshits, Gregory Sorkin,
Alexander L. Strehl | Conditional Probability Tree Estimation Analysis and Algorithms | Appears in Proceedings of the Twenty-Fifth Conference on Uncertainty
in Artificial Intelligence (UAI2009) | null | null | UAI-P-2009-PG-51-58 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of estimating the conditional probability of a label
in time O(log n), where n is the number of possible labels. We analyze a
natural reduction of this problem to a set of binary regression problems
organized in a tree structure, proving a regret bound that scales with the
depth of the tree. Motivated by this analysis, we propose the first online
algorithm which provably constructs a logarithmic depth tree on the set of
labels to solve this problem. We test the algorithm empirically, showing that
it works succesfully on a dataset with roughly 106 labels.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2014 05:25:07 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Beygelzimer",
"Alina",
""
],
[
"Langford",
"John",
""
],
[
"Lifshits",
"Yuri",
""
],
[
"Sorkin",
"Gregory",
""
],
[
"Strehl",
"Alexander L.",
""
]
] | TITLE: Conditional Probability Tree Estimation Analysis and Algorithms
ABSTRACT: We consider the problem of estimating the conditional probability of a label
in time O(log n), where n is the number of possible labels. We analyze a
natural reduction of this problem to a set of binary regression problems
organized in a tree structure, proving a regret bound that scales with the
depth of the tree. Motivated by this analysis, we propose the first online
algorithm which provably constructs a logarithmic depth tree on the set of
labels to solve this problem. We test the algorithm empirically, showing that
it works succesfully on a dataset with roughly 106 labels.
|
1408.2045 | Konstantin Voevodski | Konstantin Voevodski, Maria-Florina Balcan, Heiko Roglin, Shang-Hua
Teng, Yu Xia | Efficient Clustering with Limited Distance Information | Appears in Proceedings of the Twenty-Sixth Conference on Uncertainty
in Artificial Intelligence (UAI2010) | null | null | UAI-P-2010-PG-632-640 | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a point set S and an unknown metric d on S, we study the problem of
efficiently partitioning S into k clusters while querying few distances between
the points. In our model we assume that we have access to one versus all
queries that given a point s 2 S return the distances between s and all other
points. We show that given a natural assumption about the structure of the
instance, we can efficiently find an accurate clustering using only O(k)
distance queries. We use our algorithm to cluster proteins by sequence
similarity. This setting nicely fits our model because we can use a fast
sequence database search program to query a sequence against an entire dataset.
We conduct an empirical study that shows that even though we query a small
fraction of the distances between the points, we produce clusterings that are
close to a desired clustering given by manual classification.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2014 05:41:26 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Voevodski",
"Konstantin",
""
],
[
"Balcan",
"Maria-Florina",
""
],
[
"Roglin",
"Heiko",
""
],
[
"Teng",
"Shang-Hua",
""
],
[
"Xia",
"Yu",
""
]
] | TITLE: Efficient Clustering with Limited Distance Information
ABSTRACT: Given a point set S and an unknown metric d on S, we study the problem of
efficiently partitioning S into k clusters while querying few distances between
the points. In our model we assume that we have access to one versus all
queries that given a point s 2 S return the distances between s and all other
points. We show that given a natural assumption about the structure of the
instance, we can efficiently find an accurate clustering using only O(k)
distance queries. We use our algorithm to cluster proteins by sequence
similarity. This setting nicely fits our model because we can use a fast
sequence database search program to query a sequence against an entire dataset.
We conduct an empirical study that shows that even though we query a small
fraction of the distances between the points, we produce clusterings that are
close to a desired clustering given by manual classification.
|
1408.2060 | Jie Chen | Jie Chen, Nannan Cao, Kian Hsiang Low, Ruofei Ouyang, Colin Keng-Yan
Tan, Patrick Jaillet | Parallel Gaussian Process Regression with Low-Rank Covariance Matrix
Approximations | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-152-161 | cs.LG cs.DC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gaussian processes (GP) are Bayesian non-parametric models that are widely
used for probabilistic regression. Unfortunately, it cannot scale well with
large data nor perform real-time predictions due to its cubic time cost in the
data size. This paper presents two parallel GP regression methods that exploit
low-rank covariance matrix approximations for distributing the computational
load among parallel machines to achieve time efficiency and scalability. We
theoretically guarantee the predictive performances of our proposed parallel
GPs to be equivalent to that of some centralized approximate GP regression
methods: The computation of their centralized counterparts can be distributed
among parallel machines, hence achieving greater time efficiency and
scalability. We analytically compare the properties of our parallel GPs such as
time, space, and communication complexity. Empirical evaluation on two
real-world datasets in a cluster of 20 computing nodes shows that our parallel
GPs are significantly more time-efficient and scalable than their centralized
counterparts and exact/full GP while achieving predictive performances
comparable to full GP.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2014 05:58:33 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Chen",
"Jie",
""
],
[
"Cao",
"Nannan",
""
],
[
"Low",
"Kian Hsiang",
""
],
[
"Ouyang",
"Ruofei",
""
],
[
"Tan",
"Colin Keng-Yan",
""
],
[
"Jaillet",
"Patrick",
""
]
] | TITLE: Parallel Gaussian Process Regression with Low-Rank Covariance Matrix
Approximations
ABSTRACT: Gaussian processes (GP) are Bayesian non-parametric models that are widely
used for probabilistic regression. Unfortunately, it cannot scale well with
large data nor perform real-time predictions due to its cubic time cost in the
data size. This paper presents two parallel GP regression methods that exploit
low-rank covariance matrix approximations for distributing the computational
load among parallel machines to achieve time efficiency and scalability. We
theoretically guarantee the predictive performances of our proposed parallel
GPs to be equivalent to that of some centralized approximate GP regression
methods: The computation of their centralized counterparts can be distributed
among parallel machines, hence achieving greater time efficiency and
scalability. We analytically compare the properties of our parallel GPs such as
time, space, and communication complexity. Empirical evaluation on two
real-world datasets in a cluster of 20 computing nodes shows that our parallel
GPs are significantly more time-efficient and scalable than their centralized
counterparts and exact/full GP while achieving predictive performances
comparable to full GP.
|
1408.2061 | Tomoharu Iwata | Tomoharu Iwata, David Duvenaud, Zoubin Ghahramani | Warped Mixtures for Nonparametric Cluster Shapes | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-311-320 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A mixture of Gaussians fit to a single curved or heavy-tailed cluster will
report that the data contains many clusters. To produce more appropriate
clusterings, we introduce a model which warps a latent mixture of Gaussians to
produce nonparametric cluster shapes. The possibly low-dimensional latent
mixture model allows us to summarize the properties of the high-dimensional
clusters (or density manifolds) describing the data. The number of manifolds,
as well as the shape and dimension of each manifold is automatically inferred.
We derive a simple inference scheme for this model which analytically
integrates out both the mixture parameters and the warping function. We show
that our model is effective for density estimation, performs better than
infinite Gaussian mixture models at recovering the true number of clusters, and
produces interpretable summaries of high-dimensional datasets.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2014 06:00:05 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Iwata",
"Tomoharu",
""
],
[
"Duvenaud",
"David",
""
],
[
"Ghahramani",
"Zoubin",
""
]
] | TITLE: Warped Mixtures for Nonparametric Cluster Shapes
ABSTRACT: A mixture of Gaussians fit to a single curved or heavy-tailed cluster will
report that the data contains many clusters. To produce more appropriate
clusterings, we introduce a model which warps a latent mixture of Gaussians to
produce nonparametric cluster shapes. The possibly low-dimensional latent
mixture model allows us to summarize the properties of the high-dimensional
clusters (or density manifolds) describing the data. The number of manifolds,
as well as the shape and dimension of each manifold is automatically inferred.
We derive a simple inference scheme for this model which analytically
integrates out both the mixture parameters and the warping function. We show
that our model is effective for density estimation, performs better than
infinite Gaussian mixture models at recovering the true number of clusters, and
produces interpretable summaries of high-dimensional datasets.
|
1408.2064 | Krikamol Muandet | Krikamol Muandet, Bernhard Schoelkopf | One-Class Support Measure Machines for Group Anomaly Detection | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-449-458 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose one-class support measure machines (OCSMMs) for group anomaly
detection which aims at recognizing anomalous aggregate behaviors of data
points. The OCSMMs generalize well-known one-class support vector machines
(OCSVMs) to a space of probability measures. By formulating the problem as
quantile estimation on distributions, we can establish an interesting
connection to the OCSVMs and variable kernel density estimators (VKDEs) over
the input space on which the distributions are defined, bridging the gap
between large-margin methods and kernel density estimators. In particular, we
show that various types of VKDEs can be considered as solutions to a class of
regularization problems studied in this paper. Experiments on Sloan Digital Sky
Survey dataset and High Energy Particle Physics dataset demonstrate the
benefits of the proposed framework in real-world applications.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2014 06:04:33 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Muandet",
"Krikamol",
""
],
[
"Schoelkopf",
"Bernhard",
""
]
] | TITLE: One-Class Support Measure Machines for Group Anomaly Detection
ABSTRACT: We propose one-class support measure machines (OCSMMs) for group anomaly
detection which aims at recognizing anomalous aggregate behaviors of data
points. The OCSMMs generalize well-known one-class support vector machines
(OCSVMs) to a space of probability measures. By formulating the problem as
quantile estimation on distributions, we can establish an interesting
connection to the OCSVMs and variable kernel density estimators (VKDEs) over
the input space on which the distributions are defined, bridging the gap
between large-margin methods and kernel density estimators. In particular, we
show that various types of VKDEs can be considered as solutions to a class of
regularization problems studied in this paper. Experiments on Sloan Digital Sky
Survey dataset and High Energy Particle Physics dataset demonstrate the
benefits of the proposed framework in real-world applications.
|
1408.2430 | Boris Iolis | Boris Iolis, Gianluca Bontempi | Optimizing Component Combination in a Multi-Indexing Paragraph Retrieval
System | 5 pages, 1 figure, unpublished | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We demonstrate a method to optimize the combination of distinct components in
a paragraph retrieval system. Our system makes use of several indices, query
generators and filters, each of them potentially contributing to the quality of
the returned list of results. The components are combined with a weighed sum,
and we optimize the weights using a heuristic optimization algorithm. This
allows us to maximize the quality of our results, but also to determine which
components are most valuable in our system. We evaluate our approach on the
paragraph selection task of a Question Answering dataset.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2014 14:58:30 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Iolis",
"Boris",
""
],
[
"Bontempi",
"Gianluca",
""
]
] | TITLE: Optimizing Component Combination in a Multi-Indexing Paragraph Retrieval
System
ABSTRACT: We demonstrate a method to optimize the combination of distinct components in
a paragraph retrieval system. Our system makes use of several indices, query
generators and filters, each of them potentially contributing to the quality of
the returned list of results. The components are combined with a weighed sum,
and we optimize the weights using a heuristic optimization algorithm. This
allows us to maximize the quality of our results, but also to determine which
components are most valuable in our system. We evaluate our approach on the
paragraph selection task of a Question Answering dataset.
|
1408.2468 | Christoph Lange | Jeremy Debattista and Christoph Lange and S\"oren Auer | Representing Dataset Quality Metadata using Multi-Dimensional Views | Preprint of a paper submitted to the forthcoming SEMANTiCS 2014, 4-5
September 2014, Leipzig, Germany | null | null | null | cs.DB cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data quality is commonly defined as fitness for use. The problem of
identifying quality of data is faced by many data consumers. Data publishers
often do not have the means to identify quality problems in their data. To make
the task for both stakeholders easier, we have developed the Dataset Quality
Ontology (daQ). daQ is a core vocabulary for representing the results of
quality benchmarking of a linked dataset. It represents quality metadata as
multi-dimensional and statistical observations using the Data Cube vocabulary.
Quality metadata are organised as a self-contained graph, which can, e.g., be
embedded into linked open datasets. We discuss the design considerations, give
examples for extending daQ by custom quality metrics, and present use cases
such as analysing data versions, browsing datasets by quality, and link
identification. We finally discuss how data cube visualisation tools enable
data publishers and consumers to analyse better the quality of their data.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2014 17:00:40 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Debattista",
"Jeremy",
""
],
[
"Lange",
"Christoph",
""
],
[
"Auer",
"Sören",
""
]
] | TITLE: Representing Dataset Quality Metadata using Multi-Dimensional Views
ABSTRACT: Data quality is commonly defined as fitness for use. The problem of
identifying quality of data is faced by many data consumers. Data publishers
often do not have the means to identify quality problems in their data. To make
the task for both stakeholders easier, we have developed the Dataset Quality
Ontology (daQ). daQ is a core vocabulary for representing the results of
quality benchmarking of a linked dataset. It represents quality metadata as
multi-dimensional and statistical observations using the Data Cube vocabulary.
Quality metadata are organised as a self-contained graph, which can, e.g., be
embedded into linked open datasets. We discuss the design considerations, give
examples for extending daQ by custom quality metrics, and present use cases
such as analysing data versions, browsing datasets by quality, and link
identification. We finally discuss how data cube visualisation tools enable
data publishers and consumers to analyse better the quality of their data.
|
1408.2478 | Stefano Melacci | Marco Gori, Marco Lippi, Marco Maggini, Stefano Melacci | Learning to see like children: proof of concept | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last few years we have seen a growing interest in machine learning
approaches to computer vision and, especially, to semantic labeling. Nowadays
state of the art systems use deep learning on millions of labeled images with
very successful results on benchmarks, though it is unlikely to expect similar
results in unrestricted visual environments. Most learning schemes essentially
ignore the inherent sequential structure of videos: this might be a critical
issue, since any visual recognition process is remarkably more complex when
shuffling video frames. Based on this remark, we propose a re-foundation of the
communication protocol between visual agents and the environment, which is
referred to as learning to see like children. Like for human interaction,
visual concepts are acquired by the agents solely by processing their own
visual stream along with human supervisions on selected pixels. We give a proof
of concept that remarkable semantic labeling can emerge within this protocol by
using only a few supervised examples. This is made possible by exploiting a
constraint of motion coherent labeling that virtually offers tons of
supervisions. Additional visual constraints, including those associated with
object supervisions, are used within the context of learning from constraints.
The framework is extended in the direction of lifelong learning, so as our
visual agents live in their own visual environment without distinguishing
learning and test set. Learning takes place in deep architectures under a
progressive developmental scheme. In order to evaluate our Developmental Visual
Agents (DVAs), in addition to classic benchmarks, we open the doors of our lab,
allowing people to evaluate DVAs by crowd-sourcing. Such assessment mechanism
might result in a paradigm shift in methodologies and algorithms for computer
vision, encouraging truly novel solutions within the proposed framework.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2014 17:38:19 GMT"
}
] | 2014-08-12T00:00:00 | [
[
"Gori",
"Marco",
""
],
[
"Lippi",
"Marco",
""
],
[
"Maggini",
"Marco",
""
],
[
"Melacci",
"Stefano",
""
]
] | TITLE: Learning to see like children: proof of concept
ABSTRACT: In the last few years we have seen a growing interest in machine learning
approaches to computer vision and, especially, to semantic labeling. Nowadays
state of the art systems use deep learning on millions of labeled images with
very successful results on benchmarks, though it is unlikely to expect similar
results in unrestricted visual environments. Most learning schemes essentially
ignore the inherent sequential structure of videos: this might be a critical
issue, since any visual recognition process is remarkably more complex when
shuffling video frames. Based on this remark, we propose a re-foundation of the
communication protocol between visual agents and the environment, which is
referred to as learning to see like children. Like for human interaction,
visual concepts are acquired by the agents solely by processing their own
visual stream along with human supervisions on selected pixels. We give a proof
of concept that remarkable semantic labeling can emerge within this protocol by
using only a few supervised examples. This is made possible by exploiting a
constraint of motion coherent labeling that virtually offers tons of
supervisions. Additional visual constraints, including those associated with
object supervisions, are used within the context of learning from constraints.
The framework is extended in the direction of lifelong learning, so as our
visual agents live in their own visual environment without distinguishing
learning and test set. Learning takes place in deep architectures under a
progressive developmental scheme. In order to evaluate our Developmental Visual
Agents (DVAs), in addition to classic benchmarks, we open the doors of our lab,
allowing people to evaluate DVAs by crowd-sourcing. Such assessment mechanism
might result in a paradigm shift in methodologies and algorithms for computer
vision, encouraging truly novel solutions within the proposed framework.
|
1408.1928 | Benjamin Good | Benjamin M Good, Max Nanis, Andrew I. Su | Microtask crowdsourcing for disease mention annotation in PubMed
abstracts | Preprint of an article submitted for consideration in the Pacific
Symposium on Biocomputing copyright 2015; World Scientific Publishing Co.,
Singapore, 2015; http://psb.stanford.edu/. Data produced for this analysis
are available at
http://figshare.com/articles/Disease_Mention_Annotation_with_Mechanical_Turk/1126402 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/3.0/ | Identifying concepts and relationships in biomedical text enables knowledge
to be applied in computational analyses. Many biological natural language
process (BioNLP) projects attempt to address this challenge, but the state of
the art in BioNLP still leaves much room for improvement. Progress in BioNLP
research depends on large, annotated corpora for evaluating information
extraction systems and training machine learning models. Traditionally, such
corpora are created by small numbers of expert annotators often working over
extended periods of time. Recent studies have shown that workers on microtask
crowdsourcing platforms such as Amazon's Mechanical Turk (AMT) can, in
aggregate, generate high-quality annotations of biomedical text. Here, we
investigated the use of the AMT in capturing disease mentions in PubMed
abstracts. We used the NCBI Disease corpus as a gold standard for refining and
benchmarking our crowdsourcing protocol. After several iterations, we arrived
at a protocol that reproduced the annotations of the 593 documents in the
training set of this gold standard with an overall F measure of 0.872
(precision 0.862, recall 0.883). The output can also be tuned to optimize for
precision (max = 0.984 when recall = 0.269) or recall (max = 0.980 when
precision = 0.436). Each document was examined by 15 workers, and their
annotations were merged based on a simple voting method. In total 145 workers
combined to complete all 593 documents in the span of 1 week at a cost of $.06
per abstract per worker. The quality of the annotations, as judged with the F
measure, increases with the number of workers assigned to each task such that
the system can be tuned to balance cost against quality. These results
demonstrate that microtask crowdsourcing can be a valuable tool for generating
well-annotated corpora in BioNLP.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2014 17:49:02 GMT"
}
] | 2014-08-11T00:00:00 | [
[
"Good",
"Benjamin M",
""
],
[
"Nanis",
"Max",
""
],
[
"Su",
"Andrew I.",
""
]
] | TITLE: Microtask crowdsourcing for disease mention annotation in PubMed
abstracts
ABSTRACT: Identifying concepts and relationships in biomedical text enables knowledge
to be applied in computational analyses. Many biological natural language
process (BioNLP) projects attempt to address this challenge, but the state of
the art in BioNLP still leaves much room for improvement. Progress in BioNLP
research depends on large, annotated corpora for evaluating information
extraction systems and training machine learning models. Traditionally, such
corpora are created by small numbers of expert annotators often working over
extended periods of time. Recent studies have shown that workers on microtask
crowdsourcing platforms such as Amazon's Mechanical Turk (AMT) can, in
aggregate, generate high-quality annotations of biomedical text. Here, we
investigated the use of the AMT in capturing disease mentions in PubMed
abstracts. We used the NCBI Disease corpus as a gold standard for refining and
benchmarking our crowdsourcing protocol. After several iterations, we arrived
at a protocol that reproduced the annotations of the 593 documents in the
training set of this gold standard with an overall F measure of 0.872
(precision 0.862, recall 0.883). The output can also be tuned to optimize for
precision (max = 0.984 when recall = 0.269) or recall (max = 0.980 when
precision = 0.436). Each document was examined by 15 workers, and their
annotations were merged based on a simple voting method. In total 145 workers
combined to complete all 593 documents in the span of 1 week at a cost of $.06
per abstract per worker. The quality of the annotations, as judged with the F
measure, increases with the number of workers assigned to each task such that
the system can be tuned to balance cost against quality. These results
demonstrate that microtask crowdsourcing can be a valuable tool for generating
well-annotated corpora in BioNLP.
|
1408.1276 | Kumar Sharad | Kumar Sharad and George Danezis | An Automated Social Graph De-anonymization Technique | 12 pages | null | null | null | cs.CR cs.SI | http://creativecommons.org/licenses/by/3.0/ | We present a generic and automated approach to re-identifying nodes in
anonymized social networks which enables novel anonymization techniques to be
quickly evaluated. It uses machine learning (decision forests) to matching
pairs of nodes in disparate anonymized sub-graphs. The technique uncovers
artefacts and invariants of any black-box anonymization scheme from a small set
of examples. Despite a high degree of automation, classification succeeds with
significant true positive rates even when small false positive rates are
sought. Our evaluation uses publicly available real world datasets to study the
performance of our approach against real-world anonymization strategies, namely
the schemes used to protect datasets of The Data for Development (D4D)
Challenge. We show that the technique is effective even when only small numbers
of samples are used for training. Further, since it detects weaknesses in the
black-box anonymization scheme it can re-identify nodes in one social network
when trained on another.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2014 13:42:48 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Aug 2014 19:45:10 GMT"
}
] | 2014-08-08T00:00:00 | [
[
"Sharad",
"Kumar",
""
],
[
"Danezis",
"George",
""
]
] | TITLE: An Automated Social Graph De-anonymization Technique
ABSTRACT: We present a generic and automated approach to re-identifying nodes in
anonymized social networks which enables novel anonymization techniques to be
quickly evaluated. It uses machine learning (decision forests) to matching
pairs of nodes in disparate anonymized sub-graphs. The technique uncovers
artefacts and invariants of any black-box anonymization scheme from a small set
of examples. Despite a high degree of automation, classification succeeds with
significant true positive rates even when small false positive rates are
sought. Our evaluation uses publicly available real world datasets to study the
performance of our approach against real-world anonymization strategies, namely
the schemes used to protect datasets of The Data for Development (D4D)
Challenge. We show that the technique is effective even when only small numbers
of samples are used for training. Further, since it detects weaknesses in the
black-box anonymization scheme it can re-identify nodes in one social network
when trained on another.
|
1408.1489 | Amos J. Storkey | Amos J. Storkey, Nigel C. Hambly, Christopher K. I. Williams, Robert
G. Mann | Renewal Strings for Cleaning Astronomical Databases | Appears in Proceedings of the Nineteenth Conference on Uncertainty in
Artificial Intelligence (UAI2003) | null | null | UAI-P-2003-PG-559-566 | cs.AI astro-ph.IM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large astronomical databases obtained from sky surveys such as the
SuperCOSMOS Sky Surveys (SSS) invariably suffer from a small number of spurious
records coming from artefactual effects of the telescope, satellites and junk
objects in orbit around earth and physical defects on the photographic plate or
CCD. Though relatively small in number these spurious records present a
significant problem in many situations where they can become a large proportion
of the records potentially of interest to a given astronomer. In this paper we
focus on the four most common causes of unwanted records in the SSS: satellite
or aeroplane tracks, scratches fibres and other linear phenomena introduced to
the plate, circular halos around bright stars due to internal reflections
within the telescope and diffraction spikes near to bright stars. Accurate and
robust techniques are needed for locating and flagging such spurious objects.
We have developed renewal strings, a probabilistic technique combining the
Hough transform, renewal processes and hidden Markov models which have proven
highly effective in this context. The methods are applied to the SSS data to
develop a dataset of spurious object detections, along with confidence
measures, which can allow this unwanted data to be removed from consideration.
These methods are general and can be adapted to any future astronomical survey
data.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2014 06:27:12 GMT"
}
] | 2014-08-08T00:00:00 | [
[
"Storkey",
"Amos J.",
""
],
[
"Hambly",
"Nigel C.",
""
],
[
"Williams",
"Christopher K. I.",
""
],
[
"Mann",
"Robert G.",
""
]
] | TITLE: Renewal Strings for Cleaning Astronomical Databases
ABSTRACT: Large astronomical databases obtained from sky surveys such as the
SuperCOSMOS Sky Surveys (SSS) invariably suffer from a small number of spurious
records coming from artefactual effects of the telescope, satellites and junk
objects in orbit around earth and physical defects on the photographic plate or
CCD. Though relatively small in number these spurious records present a
significant problem in many situations where they can become a large proportion
of the records potentially of interest to a given astronomer. In this paper we
focus on the four most common causes of unwanted records in the SSS: satellite
or aeroplane tracks, scratches fibres and other linear phenomena introduced to
the plate, circular halos around bright stars due to internal reflections
within the telescope and diffraction spikes near to bright stars. Accurate and
robust techniques are needed for locating and flagging such spurious objects.
We have developed renewal strings, a probabilistic technique combining the
Hough transform, renewal processes and hidden Markov models which have proven
highly effective in this context. The methods are applied to the SSS data to
develop a dataset of spurious object detections, along with confidence
measures, which can allow this unwanted data to be removed from consideration.
These methods are general and can be adapted to any future astronomical survey
data.
|
1408.1549 | Reza Azad | Reza Azad, Babak Azad, Nabil Belhaj Khalifa, Shahram Jamali | Real-Time Human-Computer Interaction Based on Face and Hand Gesture
Recognition | null | International Journal in Foundations of Computer Science &
Technology 07/2014; 4(4):37-48 | 10.5121/ijfcst.2014.4403 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | At the present time, hand gestures recognition system could be used as a more
expected and useable approach for human computer interaction. Automatic hand
gesture recognition system provides us a new tactic for interactive with the
virtual environment. In this paper, a face and hand gesture recognition system
which is able to control computer media player is offered. Hand gesture and
human face are the key element to interact with the smart system. We used the
face recognition scheme for viewer verification and the hand gesture
recognition in mechanism of computer media player, for instance, volume
down/up, next music and etc. In the proposed technique, first, the hand gesture
and face location is extracted from the main image by combination of skin and
cascade detector and then is sent to recognition stage. In recognition stage,
first, the threshold condition is inspected then the extracted face and gesture
will be recognized. In the result stage, the proposed technique is applied on
the video dataset and the high precision ratio acquired. Additional the
recommended hand gesture recognition method is applied on static American Sign
Language (ASL) database and the correctness rate achieved nearby 99.40%. also
the planned method could be used in gesture based computer games and virtual
reality.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2014 11:38:20 GMT"
}
] | 2014-08-08T00:00:00 | [
[
"Azad",
"Reza",
""
],
[
"Azad",
"Babak",
""
],
[
"Khalifa",
"Nabil Belhaj",
""
],
[
"Jamali",
"Shahram",
""
]
] | TITLE: Real-Time Human-Computer Interaction Based on Face and Hand Gesture
Recognition
ABSTRACT: At the present time, hand gestures recognition system could be used as a more
expected and useable approach for human computer interaction. Automatic hand
gesture recognition system provides us a new tactic for interactive with the
virtual environment. In this paper, a face and hand gesture recognition system
which is able to control computer media player is offered. Hand gesture and
human face are the key element to interact with the smart system. We used the
face recognition scheme for viewer verification and the hand gesture
recognition in mechanism of computer media player, for instance, volume
down/up, next music and etc. In the proposed technique, first, the hand gesture
and face location is extracted from the main image by combination of skin and
cascade detector and then is sent to recognition stage. In recognition stage,
first, the threshold condition is inspected then the extracted face and gesture
will be recognized. In the result stage, the proposed technique is applied on
the video dataset and the high precision ratio acquired. Additional the
recommended hand gesture recognition method is applied on static American Sign
Language (ASL) database and the correctness rate achieved nearby 99.40%. also
the planned method could be used in gesture based computer games and virtual
reality.
|
1408.0784 | Joseph Gardiner | Joseph Gardiner and Shishir Nagaraja | Blindspot: Indistinguishable Anonymous Communications | 13 Pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Communication anonymity is a key requirement for individuals under targeted
surveillance. Practical anonymous communications also require
indistinguishability - an adversary should be unable to distinguish between
anonymised and non-anonymised traffic for a given user. We propose Blindspot, a
design for high-latency anonymous communications that offers
indistinguishability and unobservability under a (qualified) global active
adversary. Blindspot creates anonymous routes between sender-receiver pairs by
subliminally encoding messages within the pre-existing communication behaviour
of users within a social network. Specifically, the organic image sharing
behaviour of users. Thus channel bandwidth depends on the intensity of image
sharing behaviour of users along a route. A major challenge we successfully
overcome is that routing must be accomplished in the face of significant
restrictions - channel bandwidth is stochastic. We show that conventional
social network routing strategies do not work. To solve this problem, we
propose a novel routing algorithm. We evaluate Blindspot using a real-world
dataset. We find that it delivers reasonable results for applications requiring
low-volume unobservable communication.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2014 19:35:15 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Aug 2014 22:26:32 GMT"
}
] | 2014-08-07T00:00:00 | [
[
"Gardiner",
"Joseph",
""
],
[
"Nagaraja",
"Shishir",
""
]
] | TITLE: Blindspot: Indistinguishable Anonymous Communications
ABSTRACT: Communication anonymity is a key requirement for individuals under targeted
surveillance. Practical anonymous communications also require
indistinguishability - an adversary should be unable to distinguish between
anonymised and non-anonymised traffic for a given user. We propose Blindspot, a
design for high-latency anonymous communications that offers
indistinguishability and unobservability under a (qualified) global active
adversary. Blindspot creates anonymous routes between sender-receiver pairs by
subliminally encoding messages within the pre-existing communication behaviour
of users within a social network. Specifically, the organic image sharing
behaviour of users. Thus channel bandwidth depends on the intensity of image
sharing behaviour of users along a route. A major challenge we successfully
overcome is that routing must be accomplished in the face of significant
restrictions - channel bandwidth is stochastic. We show that conventional
social network routing strategies do not work. To solve this problem, we
propose a novel routing algorithm. We evaluate Blindspot using a real-world
dataset. We find that it delivers reasonable results for applications requiring
low-volume unobservable communication.
|
1408.1160 | Truyen Tran | Truyen Tran, Dinh Phung, Svetha Venkatesh | Mixed-Variate Restricted Boltzmann Machines | Originally published in Proceedings of ACML'11 | null | null | null | stat.ML cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern datasets are becoming heterogeneous. To this end, we present in this
paper Mixed-Variate Restricted Boltzmann Machines for simultaneously modelling
variables of multiple types and modalities, including binary and continuous
responses, categorical options, multicategorical choices, ordinal assessment
and category-ranked preferences. Dependency among variables is modeled using
latent binary variables, each of which can be interpreted as a particular
hidden aspect of the data. The proposed model, similar to the standard RBMs,
allows fast evaluation of the posterior for the latent variables. Hence, it is
naturally suitable for many common tasks including, but not limited to, (a) as
a pre-processing step to convert complex input data into a more convenient
vectorial representation through the latent posteriors, thereby offering a
dimensionality reduction capacity, (b) as a classifier supporting binary,
multiclass, multilabel, and label-ranking outputs, or a regression tool for
continuous outputs and (c) as a data completion tool for multimodal and
heterogeneous data. We evaluate the proposed model on a large-scale dataset
using the world opinion survey results on three tasks: feature extraction and
visualization, data completion and prediction.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2014 01:43:05 GMT"
}
] | 2014-08-07T00:00:00 | [
[
"Tran",
"Truyen",
""
],
[
"Phung",
"Dinh",
""
],
[
"Venkatesh",
"Svetha",
""
]
] | TITLE: Mixed-Variate Restricted Boltzmann Machines
ABSTRACT: Modern datasets are becoming heterogeneous. To this end, we present in this
paper Mixed-Variate Restricted Boltzmann Machines for simultaneously modelling
variables of multiple types and modalities, including binary and continuous
responses, categorical options, multicategorical choices, ordinal assessment
and category-ranked preferences. Dependency among variables is modeled using
latent binary variables, each of which can be interpreted as a particular
hidden aspect of the data. The proposed model, similar to the standard RBMs,
allows fast evaluation of the posterior for the latent variables. Hence, it is
naturally suitable for many common tasks including, but not limited to, (a) as
a pre-processing step to convert complex input data into a more convenient
vectorial representation through the latent posteriors, thereby offering a
dimensionality reduction capacity, (b) as a classifier supporting binary,
multiclass, multilabel, and label-ranking outputs, or a regression tool for
continuous outputs and (c) as a data completion tool for multimodal and
heterogeneous data. We evaluate the proposed model on a large-scale dataset
using the world opinion survey results on three tasks: feature extraction and
visualization, data completion and prediction.
|
1408.1260 | Maxim Kolchin Mr. | Maxim Kolchin, Fedor Kozlov | Unstable markup: A template-based information extraction from web sites
with unstable markup | ESWC 2014 Semantic Publishing Challenge, Task 1 | null | null | null | cs.IR cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents results of a work on crawling CEUR Workshop proceedings
web site to a Linked Open Data (LOD) dataset in the framework of ESWC 2014
Semantic Publishing Challenge 2014. Our approach is based on using an
extensible template-dependent crawler and DBpedia for linking extracted
entities, such as the names of universities and countries.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2014 12:36:23 GMT"
}
] | 2014-08-07T00:00:00 | [
[
"Kolchin",
"Maxim",
""
],
[
"Kozlov",
"Fedor",
""
]
] | TITLE: Unstable markup: A template-based information extraction from web sites
with unstable markup
ABSTRACT: This paper presents results of a work on crawling CEUR Workshop proceedings
web site to a Linked Open Data (LOD) dataset in the framework of ESWC 2014
Semantic Publishing Challenge 2014. Our approach is based on using an
extensible template-dependent crawler and DBpedia for linking extracted
entities, such as the names of universities and countries.
|
1407.3268 | Michael Schreiber | Michael Schreiber | Examples for counterintuitive behavior of the new citation-rank
indicator P100 for bibliometric evaluations | 9 pages, 5 tables, 4 figures; accepted for publication in Journal of
Informetrics | J. Informetrics 8, 738-748 (2014) | null | null | cs.DL physics.soc-ph | http://creativecommons.org/licenses/by-nc-sa/3.0/ | A new percentile-based rating scale P100 has recently been proposed to
describe the citation impact in terms of the distribution of the unique
citation values. Here I investigate P100 for 5 example datasets, two simple
fictitious models and three larger empirical samples. Counterintuitive behavior
is demonstrated in the model datasets, pointing to difficulties when the
evolution with time of the indicator is analyzed or when different fields or
publication years are compared. It is shown that similar problems can occur for
the three larger datasets of empirical citation values. Further, it is observed
that the performance evalution result in terms of percentiles can be influenced
by selecting different journals for publication of a manuscript.
| [
{
"version": "v1",
"created": "Fri, 11 Jul 2014 08:42:19 GMT"
}
] | 2014-08-06T00:00:00 | [
[
"Schreiber",
"Michael",
""
]
] | TITLE: Examples for counterintuitive behavior of the new citation-rank
indicator P100 for bibliometric evaluations
ABSTRACT: A new percentile-based rating scale P100 has recently been proposed to
describe the citation impact in terms of the distribution of the unique
citation values. Here I investigate P100 for 5 example datasets, two simple
fictitious models and three larger empirical samples. Counterintuitive behavior
is demonstrated in the model datasets, pointing to difficulties when the
evolution with time of the indicator is analyzed or when different fields or
publication years are compared. It is shown that similar problems can occur for
the three larger datasets of empirical citation values. Further, it is observed
that the performance evalution result in terms of percentiles can be influenced
by selecting different journals for publication of a manuscript.
|
1408.0926 | James Cheney | Harry Halpin and James Cheney | Dynamic Provenance for SPARQL Update | Pre-publication version of ISWC 2014 paper | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While the Semantic Web currently can exhibit provenance information by using
the W3C PROV standards, there is a "missing link" in connecting PROV to storing
and querying for dynamic changes to RDF graphs using SPARQL. Solving this
problem would be required for such clear use-cases as the creation of version
control systems for RDF. While some provenance models and annotation techniques
for storing and querying provenance data originally developed with databases or
workflows in mind transfer readily to RDF and SPARQL, these techniques do not
readily adapt to describing changes in dynamic RDF datasets over time. In this
paper we explore how to adapt the dynamic copy-paste provenance model of
Buneman et al. [2] to RDF datasets that change over time in response to SPARQL
updates, how to represent the resulting provenance records themselves as RDF in
a manner compatible with W3C PROV, and how the provenance information can be
defined by reinterpreting SPARQL updates. The primary contribution of this
paper is a semantic framework that enables the semantics of SPARQL Update to be
used as the basis for a 'cut-and-paste' provenance model in a principled
manner.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2014 11:17:13 GMT"
}
] | 2014-08-06T00:00:00 | [
[
"Halpin",
"Harry",
""
],
[
"Cheney",
"James",
""
]
] | TITLE: Dynamic Provenance for SPARQL Update
ABSTRACT: While the Semantic Web currently can exhibit provenance information by using
the W3C PROV standards, there is a "missing link" in connecting PROV to storing
and querying for dynamic changes to RDF graphs using SPARQL. Solving this
problem would be required for such clear use-cases as the creation of version
control systems for RDF. While some provenance models and annotation techniques
for storing and querying provenance data originally developed with databases or
workflows in mind transfer readily to RDF and SPARQL, these techniques do not
readily adapt to describing changes in dynamic RDF datasets over time. In this
paper we explore how to adapt the dynamic copy-paste provenance model of
Buneman et al. [2] to RDF datasets that change over time in response to SPARQL
updates, how to represent the resulting provenance records themselves as RDF in
a manner compatible with W3C PROV, and how the provenance information can be
defined by reinterpreting SPARQL updates. The primary contribution of this
paper is a semantic framework that enables the semantics of SPARQL Update to be
used as the basis for a 'cut-and-paste' provenance model in a principled
manner.
|
1408.0972 | Shaina Race Ph.D | Shaina Race and Carl Meyer | A Flexible Iterative Framework for Consensus Clustering | null | null | null | null | stat.ML cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel framework for consensus clustering is presented which has the ability
to determine both the number of clusters and a final solution using multiple
algorithms. A consensus similarity matrix is formed from an ensemble using
multiple algorithms and several values for k. A variety of dimension reduction
techniques and clustering algorithms are considered for analysis. For noisy or
high-dimensional data, an iterative technique is presented to refine this
consensus matrix in way that encourages algorithms to agree upon a common
solution. We utilize the theory of nearly uncoupled Markov chains to determine
the number, k , of clusters in a dataset by considering a random walk on the
graph defined by the consensus matrix. The eigenvalues of the associated
transition probability matrix are used to determine the number of clusters.
This method succeeds at determining the number of clusters in many datasets
where previous methods fail. On every considered dataset, our consensus method
provides a final result with accuracy well above the average of the individual
algorithms.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2014 13:54:01 GMT"
}
] | 2014-08-06T00:00:00 | [
[
"Race",
"Shaina",
""
],
[
"Meyer",
"Carl",
""
]
] | TITLE: A Flexible Iterative Framework for Consensus Clustering
ABSTRACT: A novel framework for consensus clustering is presented which has the ability
to determine both the number of clusters and a final solution using multiple
algorithms. A consensus similarity matrix is formed from an ensemble using
multiple algorithms and several values for k. A variety of dimension reduction
techniques and clustering algorithms are considered for analysis. For noisy or
high-dimensional data, an iterative technique is presented to refine this
consensus matrix in way that encourages algorithms to agree upon a common
solution. We utilize the theory of nearly uncoupled Markov chains to determine
the number, k , of clusters in a dataset by considering a random walk on the
graph defined by the consensus matrix. The eigenvalues of the associated
transition probability matrix are used to determine the number of clusters.
This method succeeds at determining the number of clusters in many datasets
where previous methods fail. On every considered dataset, our consensus method
provides a final result with accuracy well above the average of the individual
algorithms.
|
1408.0985 | Lucas Lacasa | Jordi Luque, Bartolo Luque and Lucas Lacasa | Speech earthquakes: scaling and universality in human voice | Submitted for publication | null | null | null | physics.soc-ph cs.CL q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Speech is a distinctive complex feature of human capabilities. In order to
understand the physics underlying speech production, in this work we
empirically analyse the statistics of large human speech datasets ranging
several languages. We first show that during speech the energy is unevenly
released and power-law distributed, reporting a universal robust
Gutenberg-Richter-like law in speech. We further show that such earthquakes in
speech show temporal correlations, as the interevent statistics are again
power-law distributed. Since this feature takes place in the intra-phoneme
range, we conjecture that the responsible for this complex phenomenon is not
cognitive, but it resides on the physiological speech production mechanism.
Moreover, we show that these waiting time distributions are scale invariant
under a renormalisation group transformation, suggesting that the process of
speech generation is indeed operating close to a critical point. These results
are put in contrast with current paradigms in speech processing, which point
towards low dimensional deterministic chaos as the origin of nonlinear traits
in speech fluctuations. As these latter fluctuations are indeed the aspects
that humanize synthetic speech, these findings may have an impact in future
speech synthesis technologies. Results are robust and independent of the
communication language or the number of speakers, pointing towards an universal
pattern and yet another hint of complexity in human speech.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2014 14:34:20 GMT"
}
] | 2014-08-06T00:00:00 | [
[
"Luque",
"Jordi",
""
],
[
"Luque",
"Bartolo",
""
],
[
"Lacasa",
"Lucas",
""
]
] | TITLE: Speech earthquakes: scaling and universality in human voice
ABSTRACT: Speech is a distinctive complex feature of human capabilities. In order to
understand the physics underlying speech production, in this work we
empirically analyse the statistics of large human speech datasets ranging
several languages. We first show that during speech the energy is unevenly
released and power-law distributed, reporting a universal robust
Gutenberg-Richter-like law in speech. We further show that such earthquakes in
speech show temporal correlations, as the interevent statistics are again
power-law distributed. Since this feature takes place in the intra-phoneme
range, we conjecture that the responsible for this complex phenomenon is not
cognitive, but it resides on the physiological speech production mechanism.
Moreover, we show that these waiting time distributions are scale invariant
under a renormalisation group transformation, suggesting that the process of
speech generation is indeed operating close to a critical point. These results
are put in contrast with current paradigms in speech processing, which point
towards low dimensional deterministic chaos as the origin of nonlinear traits
in speech fluctuations. As these latter fluctuations are indeed the aspects
that humanize synthetic speech, these findings may have an impact in future
speech synthesis technologies. Results are robust and independent of the
communication language or the number of speakers, pointing towards an universal
pattern and yet another hint of complexity in human speech.
|
1408.0427 | Akihiro Fujihara Dr. | Akihiro Fujihara, Hiroyoshi Miwa | Homesick L\'evy walk: A mobility model having Ichi-go Ichi-e and
scale-free properties of human encounters | 8 pages, 10 figures | null | 10.1109/COMPSAC.2014.81 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, mobility models have been reconsidered based on findings by
analyzing some big datasets collected by GPS sensors, cellphone call records,
and Geotagging. To understand the fundamental statistical properties of the
frequency of serendipitous human encounters, we conducted experiments to
collect long-term data on human contact using short-range wireless
communication devices which many people frequently carry in daily life. By
analyzing the data we showed that the majority of human encounters occur
once-in-an-experimental-period: they are Ichi-go Ichi-e. We also found that the
remaining more frequent encounters obey a power-law distribution: they are
scale-free. To theoretically find the origin of these properties, we introduced
as a minimal human mobility model, Homesick L\'evy walk, where the walker
stochastically selects moving long distances as well as L\'evy walk or
returning back home. Using numerical simulations and a simple mean-field
theory, we offer a theoretical explanation for the properties to validate the
mobility model. The proposed model is helpful for evaluating long-term
performance of routing protocols in delay tolerant networks and mobile
opportunistic networks better since some utility-based protocols select nodes
with frequent encounters for message transfer.
| [
{
"version": "v1",
"created": "Sat, 2 Aug 2014 21:53:22 GMT"
}
] | 2014-08-05T00:00:00 | [
[
"Fujihara",
"Akihiro",
""
],
[
"Miwa",
"Hiroyoshi",
""
]
] | TITLE: Homesick L\'evy walk: A mobility model having Ichi-go Ichi-e and
scale-free properties of human encounters
ABSTRACT: In recent years, mobility models have been reconsidered based on findings by
analyzing some big datasets collected by GPS sensors, cellphone call records,
and Geotagging. To understand the fundamental statistical properties of the
frequency of serendipitous human encounters, we conducted experiments to
collect long-term data on human contact using short-range wireless
communication devices which many people frequently carry in daily life. By
analyzing the data we showed that the majority of human encounters occur
once-in-an-experimental-period: they are Ichi-go Ichi-e. We also found that the
remaining more frequent encounters obey a power-law distribution: they are
scale-free. To theoretically find the origin of these properties, we introduced
as a minimal human mobility model, Homesick L\'evy walk, where the walker
stochastically selects moving long distances as well as L\'evy walk or
returning back home. Using numerical simulations and a simple mean-field
theory, we offer a theoretical explanation for the properties to validate the
mobility model. The proposed model is helpful for evaluating long-term
performance of routing protocols in delay tolerant networks and mobile
opportunistic networks better since some utility-based protocols select nodes
with frequent encounters for message transfer.
|
1408.0677 | Chris Muelder | Chris W. Muelder, Nick Leaf, Carmen Sigovan, and Kwan-Liu Ma | A Moving Least Squares Based Approach for Contour Visualization of
Multi-Dimensional Data | null | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analysis of high dimensional data is a common task. Often, small multiples
are used to visualize 1 or 2 dimensions at a time, such as in a scatterplot
matrix. Associating data points between different views can be difficult
though, as the points are not fixed. Other times, dimensional reduction
techniques are employed to summarize the whole dataset in one image, but
individual dimensions are lost in this view. In this paper, we present a means
of augmenting a dimensional reduction plot with isocontours to reintroduce the
original dimensions. By applying this to each dimension in the original data,
we create multiple views where the points are consistent, which facilitates
their comparison. Our approach employs a combination of a novel, graph-based
projection technique with a GPU accelerated implementation of moving least
squares to interpolate space between the points. We also present evaluations of
this approach both with a case study and with a user study.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2014 13:27:17 GMT"
}
] | 2014-08-05T00:00:00 | [
[
"Muelder",
"Chris W.",
""
],
[
"Leaf",
"Nick",
""
],
[
"Sigovan",
"Carmen",
""
],
[
"Ma",
"Kwan-Liu",
""
]
] | TITLE: A Moving Least Squares Based Approach for Contour Visualization of
Multi-Dimensional Data
ABSTRACT: Analysis of high dimensional data is a common task. Often, small multiples
are used to visualize 1 or 2 dimensions at a time, such as in a scatterplot
matrix. Associating data points between different views can be difficult
though, as the points are not fixed. Other times, dimensional reduction
techniques are employed to summarize the whole dataset in one image, but
individual dimensions are lost in this view. In this paper, we present a means
of augmenting a dimensional reduction plot with isocontours to reintroduce the
original dimensions. By applying this to each dimension in the original data,
we create multiple views where the points are consistent, which facilitates
their comparison. Our approach employs a combination of a novel, graph-based
projection technique with a GPU accelerated implementation of moving least
squares to interpolate space between the points. We also present evaluations of
this approach both with a case study and with a user study.
|
1408.0751 | Amirali Abdullah | Amirali Abdullah, Alexandr Andoni, Ravindran Kannan, Robert
Krauthgamer | Spectral Approaches to Nearest Neighbor Search | Accepted in the proceedings of FOCS 2014. 30 pages and 4 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study spectral algorithms for the high-dimensional Nearest Neighbor Search
problem (NNS). In particular, we consider a semi-random setting where a dataset
$P$ in $\mathbb{R}^d$ is chosen arbitrarily from an unknown subspace of low
dimension $k\ll d$, and then perturbed by fully $d$-dimensional Gaussian noise.
We design spectral NNS algorithms whose query time depends polynomially on $d$
and $\log n$ (where $n=|P|$) for large ranges of $k$, $d$ and $n$. Our
algorithms use a repeated computation of the top PCA vector/subspace, and are
effective even when the random-noise magnitude is {\em much larger} than the
interpoint distances in $P$. Our motivation is that in practice, a number of
spectral NNS algorithms outperform the random-projection methods that seem
otherwise theoretically optimal on worst case datasets. In this paper we aim to
provide theoretical justification for this disparity.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2014 17:51:17 GMT"
}
] | 2014-08-05T00:00:00 | [
[
"Abdullah",
"Amirali",
""
],
[
"Andoni",
"Alexandr",
""
],
[
"Kannan",
"Ravindran",
""
],
[
"Krauthgamer",
"Robert",
""
]
] | TITLE: Spectral Approaches to Nearest Neighbor Search
ABSTRACT: We study spectral algorithms for the high-dimensional Nearest Neighbor Search
problem (NNS). In particular, we consider a semi-random setting where a dataset
$P$ in $\mathbb{R}^d$ is chosen arbitrarily from an unknown subspace of low
dimension $k\ll d$, and then perturbed by fully $d$-dimensional Gaussian noise.
We design spectral NNS algorithms whose query time depends polynomially on $d$
and $\log n$ (where $n=|P|$) for large ranges of $k$, $d$ and $n$. Our
algorithms use a repeated computation of the top PCA vector/subspace, and are
effective even when the random-noise magnitude is {\em much larger} than the
interpoint distances in $P$. Our motivation is that in practice, a number of
spectral NNS algorithms outperform the random-projection methods that seem
otherwise theoretically optimal on worst case datasets. In this paper we aim to
provide theoretical justification for this disparity.
|
1408.0047 | Truyen Tran | Truyen Tran, Dinh Phung, Svetha Venkatesh | Cumulative Restricted Boltzmann Machines for Ordinal Matrix Data
Analysis | JMLR: Workshop and Conference Proceedings 25:1-16, 2012; Asian
Conference on Machine Learning | null | null | null | stat.ML cs.IR cs.LG stat.AP stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ordinal data is omnipresent in almost all multiuser-generated feedback -
questionnaires, preferences etc. This paper investigates modelling of ordinal
data with Gaussian restricted Boltzmann machines (RBMs). In particular, we
present the model architecture, learning and inference procedures for both
vector-variate and matrix-variate ordinal data. We show that our model is able
to capture latent opinion profile of citizens around the world, and is
competitive against state-of-art collaborative filtering techniques on
large-scale public datasets. The model thus has the potential to extend
application of RBMs to diverse domains such as recommendation systems, product
reviews and expert assessments.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2014 23:54:16 GMT"
}
] | 2014-08-04T00:00:00 | [
[
"Tran",
"Truyen",
""
],
[
"Phung",
"Dinh",
""
],
[
"Venkatesh",
"Svetha",
""
]
] | TITLE: Cumulative Restricted Boltzmann Machines for Ordinal Matrix Data
Analysis
ABSTRACT: Ordinal data is omnipresent in almost all multiuser-generated feedback -
questionnaires, preferences etc. This paper investigates modelling of ordinal
data with Gaussian restricted Boltzmann machines (RBMs). In particular, we
present the model architecture, learning and inference procedures for both
vector-variate and matrix-variate ordinal data. We show that our model is able
to capture latent opinion profile of citizens around the world, and is
competitive against state-of-art collaborative filtering techniques on
large-scale public datasets. The model thus has the potential to extend
application of RBMs to diverse domains such as recommendation systems, product
reviews and expert assessments.
|
1311.6802 | Smriti Bhagat | Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, Nina Taft | Recommending with an Agenda: Active Learning of Private Attributes using
Matrix Factorization | This is the extended version of a paper that appeared in ACM RecSys
2014 | null | null | null | cs.LG cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recommender systems leverage user demographic information, such as age,
gender, etc., to personalize recommendations and better place their targeted
ads. Oftentimes, users do not volunteer this information due to privacy
concerns, or due to a lack of initiative in filling out their online profiles.
We illustrate a new threat in which a recommender learns private attributes of
users who do not voluntarily disclose them. We design both passive and active
attacks that solicit ratings for strategically selected items, and could thus
be used by a recommender system to pursue this hidden agenda. Our methods are
based on a novel usage of Bayesian matrix factorization in an active learning
setting. Evaluations on multiple datasets illustrate that such attacks are
indeed feasible and use significantly fewer rated items than static inference
methods. Importantly, they succeed without sacrificing the quality of
recommendations to users.
| [
{
"version": "v1",
"created": "Tue, 26 Nov 2013 20:48:59 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jul 2014 23:08:54 GMT"
}
] | 2014-08-01T00:00:00 | [
[
"Bhagat",
"Smriti",
""
],
[
"Weinsberg",
"Udi",
""
],
[
"Ioannidis",
"Stratis",
""
],
[
"Taft",
"Nina",
""
]
] | TITLE: Recommending with an Agenda: Active Learning of Private Attributes using
Matrix Factorization
ABSTRACT: Recommender systems leverage user demographic information, such as age,
gender, etc., to personalize recommendations and better place their targeted
ads. Oftentimes, users do not volunteer this information due to privacy
concerns, or due to a lack of initiative in filling out their online profiles.
We illustrate a new threat in which a recommender learns private attributes of
users who do not voluntarily disclose them. We design both passive and active
attacks that solicit ratings for strategically selected items, and could thus
be used by a recommender system to pursue this hidden agenda. Our methods are
based on a novel usage of Bayesian matrix factorization in an active learning
setting. Evaluations on multiple datasets illustrate that such attacks are
indeed feasible and use significantly fewer rated items than static inference
methods. Importantly, they succeed without sacrificing the quality of
recommendations to users.
|
1312.7715 | Dan Banica | Dan Banica, Cristian Sminchisescu | Constrained Parametric Proposals and Pooling Methods for Semantic
Segmentation in RGB-D Images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on the problem of semantic segmentation based on RGB-D data, with
emphasis on analyzing cluttered indoor scenes containing many instances from
many visual categories. Our approach is based on a parametric figure-ground
intensity and depth-constrained proposal process that generates spatial layout
hypotheses at multiple locations and scales in the image followed by a
sequential inference algorithm that integrates the proposals into a complete
scene estimate. Our contributions can be summarized as proposing the following:
(1) a generalization of parametric max flow figure-ground proposal methodology
to take advantage of intensity and depth information, in order to
systematically and efficiently generate the breakpoints of an underlying
spatial model in polynomial time, (2) new region description methods based on
second-order pooling over multiple features constructed using both intensity
and depth channels, (3) an inference procedure that can resolve conflicts in
overlapping spatial partitions, and handles scenes with a large number of
objects category instances, of very different scales, (4) extensive evaluation
of the impact of depth, as well as the effectiveness of a large number of
descriptors, both pre-designed and automatically obtained using deep learning,
in a difficult RGB-D semantic segmentation problem with 92 classes. We report
state of the art results in the challenging NYU Depth v2 dataset, extended for
RMRC 2013 Indoor Segmentation Challenge, where currently the proposed model
ranks first, with an average score of 24.61% and a number of 39 classes won.
Moreover, we show that by combining second-order and deep learning features,
over 15% relative accuracy improvements can be additionally achieved. In a
scene classification benchmark, our methodology further improves the state of
the art by 24%.
| [
{
"version": "v1",
"created": "Mon, 30 Dec 2013 13:44:53 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Jul 2014 16:17:50 GMT"
}
] | 2014-08-01T00:00:00 | [
[
"Banica",
"Dan",
""
],
[
"Sminchisescu",
"Cristian",
""
]
] | TITLE: Constrained Parametric Proposals and Pooling Methods for Semantic
Segmentation in RGB-D Images
ABSTRACT: We focus on the problem of semantic segmentation based on RGB-D data, with
emphasis on analyzing cluttered indoor scenes containing many instances from
many visual categories. Our approach is based on a parametric figure-ground
intensity and depth-constrained proposal process that generates spatial layout
hypotheses at multiple locations and scales in the image followed by a
sequential inference algorithm that integrates the proposals into a complete
scene estimate. Our contributions can be summarized as proposing the following:
(1) a generalization of parametric max flow figure-ground proposal methodology
to take advantage of intensity and depth information, in order to
systematically and efficiently generate the breakpoints of an underlying
spatial model in polynomial time, (2) new region description methods based on
second-order pooling over multiple features constructed using both intensity
and depth channels, (3) an inference procedure that can resolve conflicts in
overlapping spatial partitions, and handles scenes with a large number of
objects category instances, of very different scales, (4) extensive evaluation
of the impact of depth, as well as the effectiveness of a large number of
descriptors, both pre-designed and automatically obtained using deep learning,
in a difficult RGB-D semantic segmentation problem with 92 classes. We report
state of the art results in the challenging NYU Depth v2 dataset, extended for
RMRC 2013 Indoor Segmentation Challenge, where currently the proposed model
ranks first, with an average score of 24.61% and a number of 39 classes won.
Moreover, we show that by combining second-order and deep learning features,
over 15% relative accuracy improvements can be additionally achieved. In a
scene classification benchmark, our methodology further improves the state of
the art by 24%.
|
1407.8176 | T.R. Gopalakrishnan Nair | T.R. Gopalakrishnan Nair, Richa Sharma | Accurate merging of images for predictive analysis using combined image | 5 pages, 4 figures,Signal Processing Image Processing & Pattern
Recognition (ICSIPR), 2013 International Conference on, Karunya University,
Coimbatore, India, pp.169,173, 7-8 Feb. 2013. arXiv admin note: substantial
text overlap with arXiv:1407.8123 | null | 10.1109/ICSIPR.2013.6497980 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several Scientific and engineering applications require merging of sampled
images for complex perception development. In most cases, for such
requirements, images are merged at intensity level. Even though it gives fairly
good perception of combined scenario of objects and scenes, it is found that
they are not sufficient enough to analyze certain engineering cases. The main
problem is incoherent modulation of intensity arising out of phase properties
being lost. In order to compensate these losses, combined phase and amplitude
merge is demanded. We present here a method which could be used in precision
engineering and biological applications where more precise prediction is
required of a combined phenomenon. When pixels are added, its original property
is lost but accurate merging of intended pixels can be achieved in high quality
using frequency domain properties of an image. This paper introduces a
technique to merge various images which can be used as a simple but effective
technique for overlapped view of a set of images and producing reduced dataset
for review purposes.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2014 07:08:31 GMT"
}
] | 2014-08-01T00:00:00 | [
[
"Nair",
"T. R. Gopalakrishnan",
""
],
[
"Sharma",
"Richa",
""
]
] | TITLE: Accurate merging of images for predictive analysis using combined image
ABSTRACT: Several Scientific and engineering applications require merging of sampled
images for complex perception development. In most cases, for such
requirements, images are merged at intensity level. Even though it gives fairly
good perception of combined scenario of objects and scenes, it is found that
they are not sufficient enough to analyze certain engineering cases. The main
problem is incoherent modulation of intensity arising out of phase properties
being lost. In order to compensate these losses, combined phase and amplitude
merge is demanded. We present here a method which could be used in precision
engineering and biological applications where more precise prediction is
required of a combined phenomenon. When pixels are added, its original property
is lost but accurate merging of intended pixels can be achieved in high quality
using frequency domain properties of an image. This paper introduces a
technique to merge various images which can be used as a simple but effective
technique for overlapped view of a set of images and producing reduced dataset
for review purposes.
|
1407.8187 | Charles Fisher | Charles K. Fisher, Pankaj Mehta | Fast Bayesian Feature Selection for High Dimensional Linear Regression
in Genomics via the Ising Approximation | null | null | null | null | q-bio.QM cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature selection, identifying a subset of variables that are relevant for
predicting a response, is an important and challenging component of many
methods in statistics and machine learning. Feature selection is especially
difficult and computationally intensive when the number of variables approaches
or exceeds the number of samples, as is often the case for many genomic
datasets. Here, we introduce a new approach -- the Bayesian Ising Approximation
(BIA) -- to rapidly calculate posterior probabilities for feature relevance in
L2 penalized linear regression. In the regime where the regression problem is
strongly regularized by the prior, we show that computing the marginal
posterior probabilities for features is equivalent to computing the
magnetizations of an Ising model. Using a mean field approximation, we show it
is possible to rapidly compute the feature selection path described by the
posterior probabilities as a function of the L2 penalty. We present simulations
and analytical results illustrating the accuracy of the BIA on some simple
regression problems. Finally, we demonstrate the applicability of the BIA to
high dimensional regression by analyzing a gene expression dataset with nearly
30,000 features.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2014 20:00:14 GMT"
}
] | 2014-08-01T00:00:00 | [
[
"Fisher",
"Charles K.",
""
],
[
"Mehta",
"Pankaj",
""
]
] | TITLE: Fast Bayesian Feature Selection for High Dimensional Linear Regression
in Genomics via the Ising Approximation
ABSTRACT: Feature selection, identifying a subset of variables that are relevant for
predicting a response, is an important and challenging component of many
methods in statistics and machine learning. Feature selection is especially
difficult and computationally intensive when the number of variables approaches
or exceeds the number of samples, as is often the case for many genomic
datasets. Here, we introduce a new approach -- the Bayesian Ising Approximation
(BIA) -- to rapidly calculate posterior probabilities for feature relevance in
L2 penalized linear regression. In the regime where the regression problem is
strongly regularized by the prior, we show that computing the marginal
posterior probabilities for features is equivalent to computing the
magnetizations of an Ising model. Using a mean field approximation, we show it
is possible to rapidly compute the feature selection path described by the
posterior probabilities as a function of the L2 penalty. We present simulations
and analytical results illustrating the accuracy of the BIA on some simple
regression problems. Finally, we demonstrate the applicability of the BIA to
high dimensional regression by analyzing a gene expression dataset with nearly
30,000 features.
|
1407.8518 | Roberto Rigamonti | Roberto Rigamonti, Vincent Lepetit, Pascal Fua | Beyond KernelBoost | null | null | null | EPFL-REPORT-200378 | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this Technical Report we propose a set of improvements with respect to the
KernelBoost classifier presented in [Becker et al., MICCAI 2013]. We start with
a scheme inspired by Auto-Context, but that is suitable in situations where the
lack of large training sets poses a potential problem of overfitting. The aim
is to capture the interactions between neighboring image pixels to better
regularize the boundaries of segmented regions. As in Auto-Context [Tu et al.,
PAMI 2009] the segmentation process is iterative and, at each iteration, the
segmentation results for the previous iterations are taken into account in
conjunction with the image itself. However, unlike in [Tu et al., PAMI 2009],
we organize our recursion so that the classifiers can progressively focus on
difficult-to-classify locations. This lets us exploit the power of the
decision-tree paradigm while avoiding over-fitting. In the context of this
architecture, KernelBoost represents a powerful building block due to its
ability to learn on the score maps coming from previous iterations. We first
introduce two important mechanisms to empower the KernelBoost classifier,
namely pooling and the clustering of positive samples based on the appearance
of the corresponding ground-truth. These operations significantly contribute to
increase the effectiveness of the system on biomedical images, where texture
plays a major role in the recognition of the different image components. We
then present some other techniques that can be easily integrated in the
KernelBoost framework to further improve the accuracy of the final
segmentation. We show extensive results on different medical image datasets,
including some multi-label tasks, on which our method is shown to outperform
state-of-the-art approaches. The resulting segmentations display high accuracy,
neat contours, and reduced noise.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2014 09:07:03 GMT"
}
] | 2014-08-01T00:00:00 | [
[
"Rigamonti",
"Roberto",
""
],
[
"Lepetit",
"Vincent",
""
],
[
"Fua",
"Pascal",
""
]
] | TITLE: Beyond KernelBoost
ABSTRACT: In this Technical Report we propose a set of improvements with respect to the
KernelBoost classifier presented in [Becker et al., MICCAI 2013]. We start with
a scheme inspired by Auto-Context, but that is suitable in situations where the
lack of large training sets poses a potential problem of overfitting. The aim
is to capture the interactions between neighboring image pixels to better
regularize the boundaries of segmented regions. As in Auto-Context [Tu et al.,
PAMI 2009] the segmentation process is iterative and, at each iteration, the
segmentation results for the previous iterations are taken into account in
conjunction with the image itself. However, unlike in [Tu et al., PAMI 2009],
we organize our recursion so that the classifiers can progressively focus on
difficult-to-classify locations. This lets us exploit the power of the
decision-tree paradigm while avoiding over-fitting. In the context of this
architecture, KernelBoost represents a powerful building block due to its
ability to learn on the score maps coming from previous iterations. We first
introduce two important mechanisms to empower the KernelBoost classifier,
namely pooling and the clustering of positive samples based on the appearance
of the corresponding ground-truth. These operations significantly contribute to
increase the effectiveness of the system on biomedical images, where texture
plays a major role in the recognition of the different image components. We
then present some other techniques that can be easily integrated in the
KernelBoost framework to further improve the accuracy of the final
segmentation. We show extensive results on different medical image datasets,
including some multi-label tasks, on which our method is shown to outperform
state-of-the-art approaches. The resulting segmentations display high accuracy,
neat contours, and reduced noise.
|
1406.6667 | Andrew Crotty | Andrew Crotty, Alex Galakatos, Kayhan Dursun, Tim Kraska, Ugur
Cetintemel, Stan Zdonik | Tupleware: Redefining Modern Analytics | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a fundamental discrepancy between the targeted and actual users of
current analytics frameworks. Most systems are designed for the data and
infrastructure of the Googles and Facebooks of the world---petabytes of data
distributed across large cloud deployments consisting of thousands of cheap
commodity machines. Yet, the vast majority of users operate clusters ranging
from a few to a few dozen nodes, analyze relatively small datasets of up to a
few terabytes, and perform primarily compute-intensive operations. Targeting
these users fundamentally changes the way we should build analytics systems.
This paper describes the design of Tupleware, a new system specifically aimed
at the challenges faced by the typical user. Tupleware's architecture brings
together ideas from the database, compiler, and programming languages
communities to create a powerful end-to-end solution for data analysis. We
propose novel techniques that consider the data, computations, and hardware
together to achieve maximum performance on a case-by-case basis. Our
experimental evaluation quantifies the impact of our novel techniques and shows
orders of magnitude performance improvement over alternative systems.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2014 19:06:15 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jul 2014 12:49:08 GMT"
}
] | 2014-07-31T00:00:00 | [
[
"Crotty",
"Andrew",
""
],
[
"Galakatos",
"Alex",
""
],
[
"Dursun",
"Kayhan",
""
],
[
"Kraska",
"Tim",
""
],
[
"Cetintemel",
"Ugur",
""
],
[
"Zdonik",
"Stan",
""
]
] | TITLE: Tupleware: Redefining Modern Analytics
ABSTRACT: There is a fundamental discrepancy between the targeted and actual users of
current analytics frameworks. Most systems are designed for the data and
infrastructure of the Googles and Facebooks of the world---petabytes of data
distributed across large cloud deployments consisting of thousands of cheap
commodity machines. Yet, the vast majority of users operate clusters ranging
from a few to a few dozen nodes, analyze relatively small datasets of up to a
few terabytes, and perform primarily compute-intensive operations. Targeting
these users fundamentally changes the way we should build analytics systems.
This paper describes the design of Tupleware, a new system specifically aimed
at the challenges faced by the typical user. Tupleware's architecture brings
together ideas from the database, compiler, and programming languages
communities to create a powerful end-to-end solution for data analysis. We
propose novel techniques that consider the data, computations, and hardware
together to achieve maximum performance on a case-by-case basis. Our
experimental evaluation quantifies the impact of our novel techniques and shows
orders of magnitude performance improvement over alternative systems.
|
1407.4885 | Yves-Alexandre de Montjoye | Yves-Alexandre de Montjoye, Zbigniew Smoreda, Romain Trinquart, Cezary
Ziemlicki, Vincent D. Blondel | D4D-Senegal: The Second Mobile Phone Data for Development Challenge | null | null | null | null | cs.CY cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The D4D-Senegal challenge is an open innovation data challenge on anonymous
call patterns of Orange's mobile phone users in Senegal. The goal of the
challenge is to help address society development questions in novel ways by
contributing to the socio-economic development and well-being of the Senegalese
population. Participants to the challenge are given access to three mobile
phone datasets. This paper describes the three datasets. The datasets are based
on Call Detail Records (CDR) of phone calls and text exchanges between more
than 9 million of Orange's customers in Senegal between January 1, 2013 to
December 31, 2013. The datasets are: (1) antenna-to-antenna traffic for 1666
antennas on an hourly basis, (2) fine-grained mobility data on a rolling 2-week
basis for a year with bandicoot behavioral indicators at individual level for
about 300,000 randomly sampled users, (3) one year of coarse-grained mobility
data at arrondissement level with bandicoot behavioral indicators at individual
level for about 150,000 randomly sampled users
| [
{
"version": "v1",
"created": "Fri, 18 Jul 2014 05:07:49 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jul 2014 13:13:59 GMT"
}
] | 2014-07-31T00:00:00 | [
[
"de Montjoye",
"Yves-Alexandre",
""
],
[
"Smoreda",
"Zbigniew",
""
],
[
"Trinquart",
"Romain",
""
],
[
"Ziemlicki",
"Cezary",
""
],
[
"Blondel",
"Vincent D.",
""
]
] | TITLE: D4D-Senegal: The Second Mobile Phone Data for Development Challenge
ABSTRACT: The D4D-Senegal challenge is an open innovation data challenge on anonymous
call patterns of Orange's mobile phone users in Senegal. The goal of the
challenge is to help address society development questions in novel ways by
contributing to the socio-economic development and well-being of the Senegalese
population. Participants to the challenge are given access to three mobile
phone datasets. This paper describes the three datasets. The datasets are based
on Call Detail Records (CDR) of phone calls and text exchanges between more
than 9 million of Orange's customers in Senegal between January 1, 2013 to
December 31, 2013. The datasets are: (1) antenna-to-antenna traffic for 1666
antennas on an hourly basis, (2) fine-grained mobility data on a rolling 2-week
basis for a year with bandicoot behavioral indicators at individual level for
about 300,000 randomly sampled users, (3) one year of coarse-grained mobility
data at arrondissement level with bandicoot behavioral indicators at individual
level for about 150,000 randomly sampled users
|
1407.7930 | EPTCS | Roi Blanco (Yahoo! Research Barcelona, Spain), Paolo Boldi
(Dipartimento di informatica, Universit\`a degli Studi di Milano), Andrea
Marino (Dipartimento di informatica, Universit\`a degli Studi di Milano) | Entity-Linking via Graph-Distance Minimization | In Proceedings GRAPHITE 2014, arXiv:1407.7671. The second and third
authors were supported by the EU-FET grant NADINE (GA 288956) | EPTCS 159, 2014, pp. 30-43 | 10.4204/EPTCS.159.4 | null | cs.DS cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entity-linking is a natural-language-processing task that consists in
identifying the entities mentioned in a piece of text, linking each to an
appropriate item in some knowledge base; when the knowledge base is Wikipedia,
the problem comes to be known as wikification (in this case, items are
wikipedia articles). One instance of entity-linking can be formalized as an
optimization problem on the underlying concept graph, where the quantity to be
optimized is the average distance between chosen items. Inspired by this
application, we define a new graph problem which is a natural variant of the
Maximum Capacity Representative Set. We prove that our problem is NP-hard for
general graphs; nonetheless, under some restrictive assumptions, it turns out
to be solvable in linear time. For the general case, we propose two heuristics:
one tries to enforce the above assumptions and another one is based on the
notion of hitting distance; we show experimentally how these approaches perform
with respect to some baselines on a real-world dataset.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2014 03:22:51 GMT"
}
] | 2014-07-31T00:00:00 | [
[
"Blanco",
"Roi",
"",
"Yahoo! Research Barcelona, Spain"
],
[
"Boldi",
"Paolo",
"",
"Dipartimento di informatica, Università degli Studi di Milano"
],
[
"Marino",
"Andrea",
"",
"Dipartimento di informatica, Università degli Studi di Milano"
]
] | TITLE: Entity-Linking via Graph-Distance Minimization
ABSTRACT: Entity-linking is a natural-language-processing task that consists in
identifying the entities mentioned in a piece of text, linking each to an
appropriate item in some knowledge base; when the knowledge base is Wikipedia,
the problem comes to be known as wikification (in this case, items are
wikipedia articles). One instance of entity-linking can be formalized as an
optimization problem on the underlying concept graph, where the quantity to be
optimized is the average distance between chosen items. Inspired by this
application, we define a new graph problem which is a natural variant of the
Maximum Capacity Representative Set. We prove that our problem is NP-hard for
general graphs; nonetheless, under some restrictive assumptions, it turns out
to be solvable in linear time. For the general case, we propose two heuristics:
one tries to enforce the above assumptions and another one is based on the
notion of hitting distance; we show experimentally how these approaches perform
with respect to some baselines on a real-world dataset.
|
1405.4095 | Xuzhen Zhu | Xuzhen Zhu, Hui Tian, Shimin Cai | Personalized recommendation with corrected similarity | 13 pages, 2 figures, 2 tables. arXiv admin note: text overlap with
arXiv:0805.4127 by other authors | null | 10.1088/1742-5468/2014/07/P07004 | null | cs.IR cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Personalized recommendation attracts a surge of interdisciplinary researches.
Especially, similarity based methods in applications of real recommendation
systems achieve great success. However, the computations of similarities are
overestimated or underestimated outstandingly due to the defective strategy of
unidirectional similarity estimation. In this paper, we solve this drawback by
leveraging mutual correction of forward and backward similarity estimations,
and propose a new personalized recommendation index, i.e., corrected similarity
based inference (CSI). Through extensive experiments on four benchmark
datasets, the results show a greater improvement of CSI in comparison with
these mainstream baselines. And the detailed analysis is presented to unveil
and understand the origin of such difference between CSI and mainstream
indices.
| [
{
"version": "v1",
"created": "Fri, 16 May 2014 08:50:59 GMT"
}
] | 2014-07-30T00:00:00 | [
[
"Zhu",
"Xuzhen",
""
],
[
"Tian",
"Hui",
""
],
[
"Cai",
"Shimin",
""
]
] | TITLE: Personalized recommendation with corrected similarity
ABSTRACT: Personalized recommendation attracts a surge of interdisciplinary researches.
Especially, similarity based methods in applications of real recommendation
systems achieve great success. However, the computations of similarities are
overestimated or underestimated outstandingly due to the defective strategy of
unidirectional similarity estimation. In this paper, we solve this drawback by
leveraging mutual correction of forward and backward similarity estimations,
and propose a new personalized recommendation index, i.e., corrected similarity
based inference (CSI). Through extensive experiments on four benchmark
datasets, the results show a greater improvement of CSI in comparison with
these mainstream baselines. And the detailed analysis is presented to unveil
and understand the origin of such difference between CSI and mainstream
indices.
|
1407.7566 | Eric Strobl | Eric V. Strobl, Shyam Visweswaran | Dependence versus Conditional Dependence in Local Causal Discovery from
Gene Expression Data | 11 pages, 2 algorithms, 4 figures, 5 tables | null | null | null | q-bio.QM cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivation: Algorithms that discover variables which are causally related to
a target may inform the design of experiments. With observational gene
expression data, many methods discover causal variables by measuring each
variable's degree of statistical dependence with the target using dependence
measures (DMs). However, other methods measure each variable's ability to
explain the statistical dependence between the target and the remaining
variables in the data using conditional dependence measures (CDMs), since this
strategy is guaranteed to find the target's direct causes, direct effects, and
direct causes of the direct effects in the infinite sample limit. In this
paper, we design a new algorithm in order to systematically compare the
relative abilities of DMs and CDMs in discovering causal variables from gene
expression data.
Results: The proposed algorithm using a CDM is sample efficient, since it
consistently outperforms other state-of-the-art local causal discovery
algorithms when samples sizes are small. However, the proposed algorithm using
a CDM outperforms the proposed algorithm using a DM only when sample sizes are
above several hundred. These results suggest that accurate causal discovery
from gene expression data using current CDM-based algorithms requires datasets
with at least several hundred samples.
Availability: The proposed algorithm is freely available at
https://github.com/ericstrobl/DvCD.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2014 20:52:18 GMT"
}
] | 2014-07-30T00:00:00 | [
[
"Strobl",
"Eric V.",
""
],
[
"Visweswaran",
"Shyam",
""
]
] | TITLE: Dependence versus Conditional Dependence in Local Causal Discovery from
Gene Expression Data
ABSTRACT: Motivation: Algorithms that discover variables which are causally related to
a target may inform the design of experiments. With observational gene
expression data, many methods discover causal variables by measuring each
variable's degree of statistical dependence with the target using dependence
measures (DMs). However, other methods measure each variable's ability to
explain the statistical dependence between the target and the remaining
variables in the data using conditional dependence measures (CDMs), since this
strategy is guaranteed to find the target's direct causes, direct effects, and
direct causes of the direct effects in the infinite sample limit. In this
paper, we design a new algorithm in order to systematically compare the
relative abilities of DMs and CDMs in discovering causal variables from gene
expression data.
Results: The proposed algorithm using a CDM is sample efficient, since it
consistently outperforms other state-of-the-art local causal discovery
algorithms when samples sizes are small. However, the proposed algorithm using
a CDM outperforms the proposed algorithm using a DM only when sample sizes are
above several hundred. These results suggest that accurate causal discovery
from gene expression data using current CDM-based algorithms requires datasets
with at least several hundred samples.
Availability: The proposed algorithm is freely available at
https://github.com/ericstrobl/DvCD.
|
1407.7584 | Danushka Bollegala | Danushka Bollegala | Dynamic Feature Scaling for Online Learning of Binary Classifiers | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scaling feature values is an important step in numerous machine learning
tasks. Different features can have different value ranges and some form of a
feature scaling is often required in order to learn an accurate classifier.
However, feature scaling is conducted as a preprocessing task prior to
learning. This is problematic in an online setting because of two reasons.
First, it might not be possible to accurately determine the value range of a
feature at the initial stages of learning when we have observed only a few
number of training instances. Second, the distribution of data can change over
the time, which render obsolete any feature scaling that we perform in a
pre-processing step. We propose a simple but an effective method to dynamically
scale features at train time, thereby quickly adapting to any changes in the
data stream. We compare the proposed dynamic feature scaling method against
more complex methods for estimating scaling parameters using several benchmark
datasets for binary classification. Our proposed feature scaling method
consistently outperforms more complex methods on all of the benchmark datasets
and improves classification accuracy of a state-of-the-art online binary
classifier algorithm.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2014 21:59:06 GMT"
}
] | 2014-07-30T00:00:00 | [
[
"Bollegala",
"Danushka",
""
]
] | TITLE: Dynamic Feature Scaling for Online Learning of Binary Classifiers
ABSTRACT: Scaling feature values is an important step in numerous machine learning
tasks. Different features can have different value ranges and some form of a
feature scaling is often required in order to learn an accurate classifier.
However, feature scaling is conducted as a preprocessing task prior to
learning. This is problematic in an online setting because of two reasons.
First, it might not be possible to accurately determine the value range of a
feature at the initial stages of learning when we have observed only a few
number of training instances. Second, the distribution of data can change over
the time, which render obsolete any feature scaling that we perform in a
pre-processing step. We propose a simple but an effective method to dynamically
scale features at train time, thereby quickly adapting to any changes in the
data stream. We compare the proposed dynamic feature scaling method against
more complex methods for estimating scaling parameters using several benchmark
datasets for binary classification. Our proposed feature scaling method
consistently outperforms more complex methods on all of the benchmark datasets
and improves classification accuracy of a state-of-the-art online binary
classifier algorithm.
|
1407.7737 | Ke Ding | Ke Ding and Ying Tan | A CUDA-Based Real Parameter Optimization Benchmark | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Benchmarking is key for developing and comparing optimization algorithms. In
this paper, a CUDA-based real parameter optimization benchmark (cuROB) is
introduced. Test functions of diverse properties are included within cuROB and
implemented efficiently with CUDA. Speedup of one order of magnitude can be
achieved in comparison with CPU-based benchmark of CEC'14.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2014 14:26:57 GMT"
}
] | 2014-07-30T00:00:00 | [
[
"Ding",
"Ke",
""
],
[
"Tan",
"Ying",
""
]
] | TITLE: A CUDA-Based Real Parameter Optimization Benchmark
ABSTRACT: Benchmarking is key for developing and comparing optimization algorithms. In
this paper, a CUDA-based real parameter optimization benchmark (cuROB) is
introduced. Test functions of diverse properties are included within cuROB and
implemented efficiently with CUDA. Speedup of one order of magnitude can be
achieved in comparison with CPU-based benchmark of CEC'14.
|
1205.4418 | Alberto Baccini | Alberto Baccini, Lucio Barabesi, Marzia Marcheselli, Luca Pratelli | Statistical inference on the h-index with an application to
top-scientist performance | 14 pages, 3 tables | Journal of Informetrics, Volume 6, Issue 4, October 2012, Pages
721 - 728 | 10.1016/j.joi.2012.07.009 | null | stat.AP cs.DL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite the huge amount of literature on h-index, few papers have been
devoted to the statistical analysis of h-index when a probabilistic
distribution is assumed for citation counts. The present contribution relies on
showing the available inferential techniques, by providing the details for
proper point and set estimation of the theoretical h-index. Moreover, some
issues on simultaneous inference - aimed to produce suitable scholar
comparisons - are carried out. Finally, the analysis of the citation dataset
for the Nobel Laureates (in the last five years) and for the Fields medallists
(from 2002 onward) is proposed.
| [
{
"version": "v1",
"created": "Sun, 20 May 2012 13:30:26 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Baccini",
"Alberto",
""
],
[
"Barabesi",
"Lucio",
""
],
[
"Marcheselli",
"Marzia",
""
],
[
"Pratelli",
"Luca",
""
]
] | TITLE: Statistical inference on the h-index with an application to
top-scientist performance
ABSTRACT: Despite the huge amount of literature on h-index, few papers have been
devoted to the statistical analysis of h-index when a probabilistic
distribution is assumed for citation counts. The present contribution relies on
showing the available inferential techniques, by providing the details for
proper point and set estimation of the theoretical h-index. Moreover, some
issues on simultaneous inference - aimed to produce suitable scholar
comparisons - are carried out. Finally, the analysis of the citation dataset
for the Nobel Laureates (in the last five years) and for the Fields medallists
(from 2002 onward) is proposed.
|
1312.0084 | Alberto Baccini | Alberto Baccini, Lucio Barabesi, Martina Cioni, Caterina Pisani | Crossing the hurdle: the determinants of individual scientific
performance | Revised version accepted for publication by Scientometrics | null | 10.1007/s11192-014-1395-3 | null | physics.soc-ph cs.DL stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An original cross sectional dataset referring to a medium sized Italian
university is implemented in order to analyze the determinants of scientific
research production at individual level. The dataset includes 942 permanent
researchers of various scientific sectors for a three year time span (2008 -
2010). Three different indicators - based on the number of publications or
citations - are considered as response variables. The corresponding
distributions are highly skewed and display an excess of zero - valued
observations. In this setting, the goodness of fit of several Poisson mixture
regression models are explored by assuming an extensive set of explanatory
variables. As to the personal observable characteristics of the researchers,
the results emphasize the age effect and the gender productivity gap, as
previously documented by existing studies. Analogously, the analysis confirm
that productivity is strongly affected by the publication and citation
practices adopted in different scientific disciplines. The empirical evidence
on the connection between teaching and research activities suggests that no
univocal substitution or complementarity thesis can be claimed: a major
teaching load does not affect the odds to be a non-active researcher and does
not significantly reduce the number of publications for active researchers. In
addition, new evidence emerges on the effect of researchers administrative
tasks, which seem to be negatively related with researcher's productivity, and
on the composition of departments. Researchers' productivity is apparently
enhanced by operating in department filled with more administrative and
technical staff, and it is not significantly affected by the composition of the
department in terms of senior or junior researchers.
| [
{
"version": "v1",
"created": "Sat, 30 Nov 2013 10:20:15 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Jul 2014 14:30:20 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Baccini",
"Alberto",
""
],
[
"Barabesi",
"Lucio",
""
],
[
"Cioni",
"Martina",
""
],
[
"Pisani",
"Caterina",
""
]
] | TITLE: Crossing the hurdle: the determinants of individual scientific
performance
ABSTRACT: An original cross sectional dataset referring to a medium sized Italian
university is implemented in order to analyze the determinants of scientific
research production at individual level. The dataset includes 942 permanent
researchers of various scientific sectors for a three year time span (2008 -
2010). Three different indicators - based on the number of publications or
citations - are considered as response variables. The corresponding
distributions are highly skewed and display an excess of zero - valued
observations. In this setting, the goodness of fit of several Poisson mixture
regression models are explored by assuming an extensive set of explanatory
variables. As to the personal observable characteristics of the researchers,
the results emphasize the age effect and the gender productivity gap, as
previously documented by existing studies. Analogously, the analysis confirm
that productivity is strongly affected by the publication and citation
practices adopted in different scientific disciplines. The empirical evidence
on the connection between teaching and research activities suggests that no
univocal substitution or complementarity thesis can be claimed: a major
teaching load does not affect the odds to be a non-active researcher and does
not significantly reduce the number of publications for active researchers. In
addition, new evidence emerges on the effect of researchers administrative
tasks, which seem to be negatively related with researcher's productivity, and
on the composition of departments. Researchers' productivity is apparently
enhanced by operating in department filled with more administrative and
technical staff, and it is not significantly affected by the composition of the
department in terms of senior or junior researchers.
|
1401.3794 | Thibaut Vidal | Thibaut Vidal, Nelson Maculan, Puca Huachi Vaz Penna, Luis Satoru Ochi | Large neighborhoods with implicit customer selection for vehicle routing
problems with profits | Working Paper -- MIT, Revised, 34 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider several Vehicle Routing Problems (VRP) with profits, which seek
to select a subset of customers, each one being associated with a profit, and
to design service itineraries. When the sum of profits is maximized under
distance constraints, the problem is usually called team orienteering problem.
The capacitated profitable tour problem seeks to maximize profits minus travel
costs under capacity constraints. Finally, in the VRP with private fleet and
common carrier, some customers can be delegated to an external carrier subject
to a cost. Three families of combined decisions must be taken: customers
selection, assignment to vehicles, and sequencing of deliveries for each route.
We propose a new neighborhood search for these problems which explores an
exponential number of solutions in pseudo polynomial time. The search is
conducted with standard VRP neighborhoods on an "exhaustive" solution
representation, visiting all customers. Since visiting all customers is usually
infeasible or sub-optimal, an efficient "Select" algorithm, based on resource
constrained shortest paths, is repeatedly used on any new route to find the
optimal subsequence of visits to customers. The good performance of these
neighborhood structures is demonstrated by extensive computational experiments
with a local search, an iterated local search and a hybrid genetic algorithm.
Intriguingly, even a local-improvement method to the first local optimum of
this neighborhood achieves an average gap of 0.09% on classic team orienteering
benchmark instances, rivaling with the current state-of-the-art metaheuristics.
Promising research avenues on hybridizations with more standard routing
neighborhoods are also open.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 23:47:21 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Jul 2014 22:03:37 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Vidal",
"Thibaut",
""
],
[
"Maculan",
"Nelson",
""
],
[
"Penna",
"Puca Huachi Vaz",
""
],
[
"Ochi",
"Luis Satoru",
""
]
] | TITLE: Large neighborhoods with implicit customer selection for vehicle routing
problems with profits
ABSTRACT: We consider several Vehicle Routing Problems (VRP) with profits, which seek
to select a subset of customers, each one being associated with a profit, and
to design service itineraries. When the sum of profits is maximized under
distance constraints, the problem is usually called team orienteering problem.
The capacitated profitable tour problem seeks to maximize profits minus travel
costs under capacity constraints. Finally, in the VRP with private fleet and
common carrier, some customers can be delegated to an external carrier subject
to a cost. Three families of combined decisions must be taken: customers
selection, assignment to vehicles, and sequencing of deliveries for each route.
We propose a new neighborhood search for these problems which explores an
exponential number of solutions in pseudo polynomial time. The search is
conducted with standard VRP neighborhoods on an "exhaustive" solution
representation, visiting all customers. Since visiting all customers is usually
infeasible or sub-optimal, an efficient "Select" algorithm, based on resource
constrained shortest paths, is repeatedly used on any new route to find the
optimal subsequence of visits to customers. The good performance of these
neighborhood structures is demonstrated by extensive computational experiments
with a local search, an iterated local search and a hybrid genetic algorithm.
Intriguingly, even a local-improvement method to the first local optimum of
this neighborhood achieves an average gap of 0.09% on classic team orienteering
benchmark instances, rivaling with the current state-of-the-art metaheuristics.
Promising research avenues on hybridizations with more standard routing
neighborhoods are also open.
|
1406.1881 | Leonid Pishchulin | Leonid Pishchulin, Mykhaylo Andriluka, Bernt Schiele | Fine-grained Activity Recognition with Holistic and Pose based Features | 12 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Holistic methods based on dense trajectories are currently the de facto
standard for recognition of human activities in video. Whether holistic
representations will sustain or will be superseded by higher level video
encoding in terms of body pose and motion is the subject of an ongoing debate.
In this paper we aim to clarify the underlying factors responsible for good
performance of holistic and pose-based representations. To that end we build on
our recent dataset leveraging the existing taxonomy of human activities. This
dataset includes 24,920 video snippets covering 410 human activities in total.
Our analysis reveals that holistic and pose-based methods are highly
complementary, and their performance varies significantly depending on the
activity. We find that holistic methods are mostly affected by the number and
speed of trajectories, whereas pose-based methods are mostly influenced by
viewpoint of the person. We observe striking performance differences across
activities: for certain activities results with pose-based features are more
than twice as accurate compared to holistic features, and vice versa. The best
performing approach in our comparison is based on the combination of holistic
and pose-based approaches, which again underlines their complementarity.
| [
{
"version": "v1",
"created": "Sat, 7 Jun 2014 10:07:24 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jul 2014 14:55:23 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Pishchulin",
"Leonid",
""
],
[
"Andriluka",
"Mykhaylo",
""
],
[
"Schiele",
"Bernt",
""
]
] | TITLE: Fine-grained Activity Recognition with Holistic and Pose based Features
ABSTRACT: Holistic methods based on dense trajectories are currently the de facto
standard for recognition of human activities in video. Whether holistic
representations will sustain or will be superseded by higher level video
encoding in terms of body pose and motion is the subject of an ongoing debate.
In this paper we aim to clarify the underlying factors responsible for good
performance of holistic and pose-based representations. To that end we build on
our recent dataset leveraging the existing taxonomy of human activities. This
dataset includes 24,920 video snippets covering 410 human activities in total.
Our analysis reveals that holistic and pose-based methods are highly
complementary, and their performance varies significantly depending on the
activity. We find that holistic methods are mostly affected by the number and
speed of trajectories, whereas pose-based methods are mostly influenced by
viewpoint of the person. We observe striking performance differences across
activities: for certain activities results with pose-based features are more
than twice as accurate compared to holistic features, and vice versa. The best
performing approach in our comparison is based on the combination of holistic
and pose-based approaches, which again underlines their complementarity.
|
1407.3068 | Marijn Stollenga | Marijn Stollenga, Jonathan Masci, Faustino Gomez, Juergen Schmidhuber | Deep Networks with Internal Selective Attention through Feedback
Connections | 13 pages, 3 figures | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional convolutional neural networks (CNN) are stationary and
feedforward. They neither change their parameters during evaluation nor use
feedback from higher to lower layers. Real brains, however, do. So does our
Deep Attention Selective Network (dasNet) architecture. DasNets feedback
structure can dynamically alter its convolutional filter sensitivities during
classification. It harnesses the power of sequential processing to improve
classification performance, by allowing the network to iteratively focus its
internal attention on some of its convolutional filters. Feedback is trained
through direct policy search in a huge million-dimensional parameter space,
through scalable natural evolution strategies (SNES). On the CIFAR-10 and
CIFAR-100 datasets, dasNet outperforms the previous state-of-the-art model.
| [
{
"version": "v1",
"created": "Fri, 11 Jul 2014 08:56:54 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jul 2014 08:22:50 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Stollenga",
"Marijn",
""
],
[
"Masci",
"Jonathan",
""
],
[
"Gomez",
"Faustino",
""
],
[
"Schmidhuber",
"Juergen",
""
]
] | TITLE: Deep Networks with Internal Selective Attention through Feedback
Connections
ABSTRACT: Traditional convolutional neural networks (CNN) are stationary and
feedforward. They neither change their parameters during evaluation nor use
feedback from higher to lower layers. Real brains, however, do. So does our
Deep Attention Selective Network (dasNet) architecture. DasNets feedback
structure can dynamically alter its convolutional filter sensitivities during
classification. It harnesses the power of sequential processing to improve
classification performance, by allowing the network to iteratively focus its
internal attention on some of its convolutional filters. Feedback is trained
through direct policy search in a huge million-dimensional parameter space,
through scalable natural evolution strategies (SNES). On the CIFAR-10 and
CIFAR-100 datasets, dasNet outperforms the previous state-of-the-art model.
|
1407.7211 | Jo\~ao Pedro Pedroso | Jo\~ao Pedro Pedroso | An evolutionary solver for linear integer programming | 15 pages | null | null | null | cs.NE cs.AI math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce an evolutionary algorithm for the solution of
linear integer programs. The strategy is based on the separation of the
variables into the integer subset and the continuous subset; the integer
variables are fixed by the evolutionary system, and the continuous ones are
determined in function of them, by a linear program solver.
We report results obtained for some standard benchmark problems, and compare
them with those obtained by branch-and-bound. The performance of the
evolutionary algorithm is promising. Good feasible solutions were generally
obtained, and in some of the difficult benchmark tests it outperformed
branch-and-bound.
| [
{
"version": "v1",
"created": "Sun, 27 Jul 2014 11:45:21 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Pedroso",
"João Pedro",
""
]
] | TITLE: An evolutionary solver for linear integer programming
ABSTRACT: In this paper we introduce an evolutionary algorithm for the solution of
linear integer programs. The strategy is based on the separation of the
variables into the integer subset and the continuous subset; the integer
variables are fixed by the evolutionary system, and the continuous ones are
determined in function of them, by a linear program solver.
We report results obtained for some standard benchmark problems, and compare
them with those obtained by branch-and-bound. The performance of the
evolutionary algorithm is promising. Good feasible solutions were generally
obtained, and in some of the difficult benchmark tests it outperformed
branch-and-bound.
|
1407.7448 | Heechul Yun | Heechul Yun | Parallelism-Aware Memory Interference Delay Analysis for COTS Multicore
Systems | Technical Report | null | null | null | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In modern Commercial Off-The-Shelf (COTS) multicore systems, each core can
generate many parallel memory requests at a time. The processing of these
parallel requests in the DRAM controller greatly affects the memory
interference delay experienced by running tasks on the platform. In this paper,
we model a modern COTS multicore system which has a nonblocking last-level
cache (LLC) and a DRAM controller that prioritizes reads over writes. To
minimize interference, we focus on LLC and DRAM bank partitioned systems. Based
on the model, we propose an analysis that computes a safe upper bound for the
worst-case memory interference delay. We validated our analysis on a real COTS
multicore platform with a set of carefully designed synthetic benchmarks as
well as SPEC2006 benchmarks. Evaluation results show that our analysis is more
accurately capture the worst-case memory interference delay and provides safer
upper bounds compared to a recently proposed analysis which significantly
under-estimate the delay.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2014 08:43:36 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Yun",
"Heechul",
""
]
] | TITLE: Parallelism-Aware Memory Interference Delay Analysis for COTS Multicore
Systems
ABSTRACT: In modern Commercial Off-The-Shelf (COTS) multicore systems, each core can
generate many parallel memory requests at a time. The processing of these
parallel requests in the DRAM controller greatly affects the memory
interference delay experienced by running tasks on the platform. In this paper,
we model a modern COTS multicore system which has a nonblocking last-level
cache (LLC) and a DRAM controller that prioritizes reads over writes. To
minimize interference, we focus on LLC and DRAM bank partitioned systems. Based
on the model, we propose an analysis that computes a safe upper bound for the
worst-case memory interference delay. We validated our analysis on a real COTS
multicore platform with a set of carefully designed synthetic benchmarks as
well as SPEC2006 benchmarks. Evaluation results show that our analysis is more
accurately capture the worst-case memory interference delay and provides safer
upper bounds compared to a recently proposed analysis which significantly
under-estimate the delay.
|
1407.3535 | Arif Mahmood | Arif Mahmood, Ajmal Mian and Robyn Owens | Optimizing Auto-correlation for Fast Target Search in Large Search Space | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In remote sensing image-blurring is induced by many sources such as
atmospheric scatter, optical aberration, spatial and temporal sensor
integration. The natural blurring can be exploited to speed up target search by
fast template matching. In this paper, we synthetically induce additional
non-uniform blurring to further increase the speed of the matching process. To
avoid loss of accuracy, the amount of synthetic blurring is varied spatially
over the image according to the underlying content. We extend transitive
algorithm for fast template matching by incorporating controlled image blur. To
this end we propose an Efficient Group Size (EGS) algorithm which minimizes the
number of similarity computations for a particular search image. A larger
efficient group size guarantees less computations and more speedup. EGS
algorithm is used as a component in our proposed Optimizing auto-correlation
(OptA) algorithm. In OptA a search image is iteratively non-uniformly blurred
while ensuring no accuracy degradation at any image location. In each iteration
efficient group size and overall computations are estimated by using the
proposed EGS algorithm. The OptA algorithm stops when the number of
computations cannot be further decreased without accuracy degradation. The
proposed algorithm is compared with six existing state of the art exhaustive
accuracy techniques using correlation coefficient as the similarity measure.
Experiments on satellite and aerial image datasets demonstrate the
effectiveness of the proposed algorithm.
| [
{
"version": "v1",
"created": "Mon, 14 Jul 2014 03:57:57 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jul 2014 00:47:47 GMT"
}
] | 2014-07-28T00:00:00 | [
[
"Mahmood",
"Arif",
""
],
[
"Mian",
"Ajmal",
""
],
[
"Owens",
"Robyn",
""
]
] | TITLE: Optimizing Auto-correlation for Fast Target Search in Large Search Space
ABSTRACT: In remote sensing image-blurring is induced by many sources such as
atmospheric scatter, optical aberration, spatial and temporal sensor
integration. The natural blurring can be exploited to speed up target search by
fast template matching. In this paper, we synthetically induce additional
non-uniform blurring to further increase the speed of the matching process. To
avoid loss of accuracy, the amount of synthetic blurring is varied spatially
over the image according to the underlying content. We extend transitive
algorithm for fast template matching by incorporating controlled image blur. To
this end we propose an Efficient Group Size (EGS) algorithm which minimizes the
number of similarity computations for a particular search image. A larger
efficient group size guarantees less computations and more speedup. EGS
algorithm is used as a component in our proposed Optimizing auto-correlation
(OptA) algorithm. In OptA a search image is iteratively non-uniformly blurred
while ensuring no accuracy degradation at any image location. In each iteration
efficient group size and overall computations are estimated by using the
proposed EGS algorithm. The OptA algorithm stops when the number of
computations cannot be further decreased without accuracy degradation. The
proposed algorithm is compared with six existing state of the art exhaustive
accuracy techniques using correlation coefficient as the similarity measure.
Experiments on satellite and aerial image datasets demonstrate the
effectiveness of the proposed algorithm.
|
1008.4063 | Alexander Gorban | A. Zinovyev, A.N. Gorban | Nonlinear Quality of Life Index | 9 pages, 1 figure, 1 table with data for 171 countries. In this case
study we use only publicly available data taken from GAPMINDER online data
base for 2005 | null | null | null | cs.NE stat.AP | http://creativecommons.org/licenses/by/3.0/ | We present details of the analysis of the nonlinear quality of life index for
171 countries. This index is based on four indicators: GDP per capita by
Purchasing Power Parities, Life expectancy at birth, Infant mortality rate, and
Tuberculosis incidence. We analyze the structure of the data in order to find
the optimal and independent on expert's opinion way to map several numerical
indicators from a multidimensional space onto the one-dimensional space of the
quality of life. In the 4D space we found a principal curve that goes "through
the middle" of the dataset and project the data points on this curve. The order
along this principal curve gives us the ranking of countries. Projection onto
the principal curve provides a solution to the classical problem of
unsupervised ranking of objects. It allows us to find the independent on
expert's opinion way to project several numerical indicators from a
multidimensional space onto the one-dimensional space of the index values. This
projection is, in some sense, optimal and preserves as much information as
possible. For computation we used ViDaExpert, a tool for visualization and
analysis of multidimensional vectorial data (arXiv:1406.5550).
| [
{
"version": "v1",
"created": "Tue, 24 Aug 2010 15:13:33 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Aug 2010 20:02:29 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Jul 2014 09:58:24 GMT"
}
] | 2014-07-25T00:00:00 | [
[
"Zinovyev",
"A.",
""
],
[
"Gorban",
"A. N.",
""
]
] | TITLE: Nonlinear Quality of Life Index
ABSTRACT: We present details of the analysis of the nonlinear quality of life index for
171 countries. This index is based on four indicators: GDP per capita by
Purchasing Power Parities, Life expectancy at birth, Infant mortality rate, and
Tuberculosis incidence. We analyze the structure of the data in order to find
the optimal and independent on expert's opinion way to map several numerical
indicators from a multidimensional space onto the one-dimensional space of the
quality of life. In the 4D space we found a principal curve that goes "through
the middle" of the dataset and project the data points on this curve. The order
along this principal curve gives us the ranking of countries. Projection onto
the principal curve provides a solution to the classical problem of
unsupervised ranking of objects. It allows us to find the independent on
expert's opinion way to project several numerical indicators from a
multidimensional space onto the one-dimensional space of the index values. This
projection is, in some sense, optimal and preserves as much information as
possible. For computation we used ViDaExpert, a tool for visualization and
analysis of multidimensional vectorial data (arXiv:1406.5550).
|
1206.2775 | Gabriele D'Angelo | Luca Toscano, Gabriele D'Angelo, Moreno Marzolla | Parallel Discrete Event Simulation with Erlang | Proceedings of ACM SIGPLAN Workshop on Functional High-Performance
Computing (FHPC 2012) in conjunction with ICFP 2012. ISBN: 978-1-4503-1577-7 | null | 10.1145/2364474.2364487 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discrete Event Simulation (DES) is a widely used technique in which the state
of the simulator is updated by events happening at discrete points in time
(hence the name). DES is used to model and analyze many kinds of systems,
including computer architectures, communication networks, street traffic, and
others. Parallel and Distributed Simulation (PADS) aims at improving the
efficiency of DES by partitioning the simulation model across multiple
processing elements, in order to enabling larger and/or more detailed studies
to be carried out. The interest on PADS is increasing since the widespread
availability of multicore processors and affordable high performance computing
clusters. However, designing parallel simulation models requires considerable
expertise, the result being that PADS techniques are not as widespread as they
could be. In this paper we describe ErlangTW, a parallel simulation middleware
based on the Time Warp synchronization protocol. ErlangTW is entirely written
in Erlang, a concurrent, functional programming language specifically targeted
at building distributed systems. We argue that writing parallel simulation
models in Erlang is considerably easier than using conventional programming
languages. Moreover, ErlangTW allows simulation models to be executed either on
single-core, multicore and distributed computing architectures. We describe the
design and prototype implementation of ErlangTW, and report some preliminary
performance results on multicore and distributed architectures using the well
known PHOLD benchmark.
| [
{
"version": "v1",
"created": "Wed, 13 Jun 2012 12:12:21 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Dec 2012 07:30:40 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Jul 2014 08:38:15 GMT"
}
] | 2014-07-25T00:00:00 | [
[
"Toscano",
"Luca",
""
],
[
"D'Angelo",
"Gabriele",
""
],
[
"Marzolla",
"Moreno",
""
]
] | TITLE: Parallel Discrete Event Simulation with Erlang
ABSTRACT: Discrete Event Simulation (DES) is a widely used technique in which the state
of the simulator is updated by events happening at discrete points in time
(hence the name). DES is used to model and analyze many kinds of systems,
including computer architectures, communication networks, street traffic, and
others. Parallel and Distributed Simulation (PADS) aims at improving the
efficiency of DES by partitioning the simulation model across multiple
processing elements, in order to enabling larger and/or more detailed studies
to be carried out. The interest on PADS is increasing since the widespread
availability of multicore processors and affordable high performance computing
clusters. However, designing parallel simulation models requires considerable
expertise, the result being that PADS techniques are not as widespread as they
could be. In this paper we describe ErlangTW, a parallel simulation middleware
based on the Time Warp synchronization protocol. ErlangTW is entirely written
in Erlang, a concurrent, functional programming language specifically targeted
at building distributed systems. We argue that writing parallel simulation
models in Erlang is considerably easier than using conventional programming
languages. Moreover, ErlangTW allows simulation models to be executed either on
single-core, multicore and distributed computing architectures. We describe the
design and prototype implementation of ErlangTW, and report some preliminary
performance results on multicore and distributed architectures using the well
known PHOLD benchmark.
|
1407.6513 | Amir Hesam Salavati | Amin Karbasi, Amir Hesam Salavati, Amin Shokrollahi | Convolutional Neural Associative Memories: Massive Capacity with Noise
Tolerance | null | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task of a neural associative memory is to retrieve a set of previously
memorized patterns from their noisy versions using a network of neurons. An
ideal network should have the ability to 1) learn a set of patterns as they
arrive, 2) retrieve the correct patterns from noisy queries, and 3) maximize
the pattern retrieval capacity while maintaining the reliability in responding
to queries. The majority of work on neural associative memories has focused on
designing networks capable of memorizing any set of randomly chosen patterns at
the expense of limiting the retrieval capacity. In this paper, we show that if
we target memorizing only those patterns that have inherent redundancy (i.e.,
belong to a subspace), we can obtain all the aforementioned properties. This is
in sharp contrast with the previous work that could only improve one or two
aspects at the expense of the third. More specifically, we propose framework
based on a convolutional neural network along with an iterative algorithm that
learns the redundancy among the patterns. The resulting network has a retrieval
capacity that is exponential in the size of the network. Moreover, the
asymptotic error correction performance of our network is linear in the size of
the patterns. We then ex- tend our approach to deal with patterns lie
approximately in a subspace. This extension allows us to memorize datasets
containing natural patterns (e.g., images). Finally, we report experimental
results on both synthetic and real datasets to support our claims.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2014 10:06:24 GMT"
}
] | 2014-07-25T00:00:00 | [
[
"Karbasi",
"Amin",
""
],
[
"Salavati",
"Amir Hesam",
""
],
[
"Shokrollahi",
"Amin",
""
]
] | TITLE: Convolutional Neural Associative Memories: Massive Capacity with Noise
Tolerance
ABSTRACT: The task of a neural associative memory is to retrieve a set of previously
memorized patterns from their noisy versions using a network of neurons. An
ideal network should have the ability to 1) learn a set of patterns as they
arrive, 2) retrieve the correct patterns from noisy queries, and 3) maximize
the pattern retrieval capacity while maintaining the reliability in responding
to queries. The majority of work on neural associative memories has focused on
designing networks capable of memorizing any set of randomly chosen patterns at
the expense of limiting the retrieval capacity. In this paper, we show that if
we target memorizing only those patterns that have inherent redundancy (i.e.,
belong to a subspace), we can obtain all the aforementioned properties. This is
in sharp contrast with the previous work that could only improve one or two
aspects at the expense of the third. More specifically, we propose framework
based on a convolutional neural network along with an iterative algorithm that
learns the redundancy among the patterns. The resulting network has a retrieval
capacity that is exponential in the size of the network. Moreover, the
asymptotic error correction performance of our network is linear in the size of
the patterns. We then ex- tend our approach to deal with patterns lie
approximately in a subspace. This extension allows us to memorize datasets
containing natural patterns (e.g., images). Finally, we report experimental
results on both synthetic and real datasets to support our claims.
|
1407.6580 | EPTCS | Roderick Bloem (Graz University of Technology, Austria), Swen Jacobs
(Graz University of Technology, Austria), Ayrat Khalimov (Graz University of
Technology, Austria) | Parameterized Synthesis Case Study: AMBA AHB | Conference version of arXiv:1406.7608. In Proceedings SYNT 2014,
arXiv:1407.4937 | EPTCS 157, 2014, pp. 68-83 | 10.4204/EPTCS.157.9 | null | cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We revisit the AMBA AHB case study that has been used as a benchmark for
several reactive synthesis tools. Synthesizing AMBA AHB implementations that
can serve a large number of masters is still a difficult problem. We
demonstrate how to use parameterized synthesis in token rings to obtain an
implementation for a component that serves a single master, and can be arranged
in a ring of arbitrarily many components. We describe new tricks - property
decompositional synthesis, and direct encoding of simple GR(1) - that together
with previously described optimizations allowed us to synthesize a component
model with 14 states in about 1 hour.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2014 07:28:39 GMT"
}
] | 2014-07-25T00:00:00 | [
[
"Bloem",
"Roderick",
"",
"Graz University of Technology, Austria"
],
[
"Jacobs",
"Swen",
"",
"Graz University of Technology, Austria"
],
[
"Khalimov",
"Ayrat",
"",
"Graz University of\n Technology, Austria"
]
] | TITLE: Parameterized Synthesis Case Study: AMBA AHB
ABSTRACT: We revisit the AMBA AHB case study that has been used as a benchmark for
several reactive synthesis tools. Synthesizing AMBA AHB implementations that
can serve a large number of masters is still a difficult problem. We
demonstrate how to use parameterized synthesis in token rings to obtain an
implementation for a component that serves a single master, and can be arranged
in a ring of arbitrarily many components. We describe new tricks - property
decompositional synthesis, and direct encoding of simple GR(1) - that together
with previously described optimizations allowed us to synthesize a component
model with 14 states in about 1 hour.
|
1407.6603 | Zaid Alyasseri | Zaid Abdi Alkareem Alyasseri, Kadhim Al-Attar, Mazin Nasser (ISMAIL) | Parallelize Bubble Sort Algorithm Using OpenMP | 4 pages, 5 firgyes | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sorting has been a profound area for the algorithmic researchers and many
resources are invested to suggest more works for sorting algorithms. For this
purpose, many existing sorting algorithms were observed in terms of the
efficiency of the algorithmic complexity. In this paper we implemented the
bubble sort algorithm using multithreading (OpenMP). The proposed work tested
on two standard datasets (text file) with different size . The main idea of the
proposed algorithm is distributing the elements of the input datasets into many
additional temporary sub-arrays according to a number of characters in each
word. The sizes of each of these sub-arrays are decided depending on a number
of elements with the same number of characters in the input array. We
implemented OpenMP using Intel core i7-3610QM ,(8 CPUs),using two approaches
(vectors of string and array 3D) . Finally, we get the data structure effects
on the performance of the algorithm for that we choice the second approach.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2014 14:47:48 GMT"
}
] | 2014-07-25T00:00:00 | [
[
"Alyasseri",
"Zaid Abdi Alkareem",
"",
"ISMAIL"
],
[
"Al-Attar",
"Kadhim",
"",
"ISMAIL"
],
[
"Nasser",
"Mazin",
"",
"ISMAIL"
]
] | TITLE: Parallelize Bubble Sort Algorithm Using OpenMP
ABSTRACT: Sorting has been a profound area for the algorithmic researchers and many
resources are invested to suggest more works for sorting algorithms. For this
purpose, many existing sorting algorithms were observed in terms of the
efficiency of the algorithmic complexity. In this paper we implemented the
bubble sort algorithm using multithreading (OpenMP). The proposed work tested
on two standard datasets (text file) with different size . The main idea of the
proposed algorithm is distributing the elements of the input datasets into many
additional temporary sub-arrays according to a number of characters in each
word. The sizes of each of these sub-arrays are decided depending on a number
of elements with the same number of characters in the input array. We
implemented OpenMP using Intel core i7-3610QM ,(8 CPUs),using two approaches
(vectors of string and array 3D) . Finally, we get the data structure effects
on the performance of the algorithm for that we choice the second approach.
|
1312.6995 | Sourav Bhattacharya | Sourav Bhattacharya and Petteri Nurmi and Nils Hammerla and Thomas
Pl\"otz | Towards Using Unlabeled Data in a Sparse-coding Framework for Human
Activity Recognition | 18 pages, 12 figures, Pervasive and Mobile Computing, 2014 | null | 10.1016/j.pmcj.2014.05.006 | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a sparse-coding framework for activity recognition in ubiquitous
and mobile computing that alleviates two fundamental problems of current
supervised learning approaches. (i) It automatically derives a compact, sparse
and meaningful feature representation of sensor data that does not rely on
prior expert knowledge and generalizes extremely well across domain boundaries.
(ii) It exploits unlabeled sample data for bootstrapping effective activity
recognizers, i.e., substantially reduces the amount of ground truth annotation
required for model estimation. Such unlabeled data is trivial to obtain, e.g.,
through contemporary smartphones carried by users as they go about their
everyday activities.
Based on the self-taught learning paradigm we automatically derive an
over-complete set of basis vectors from unlabeled data that captures inherent
patterns present within activity data. Through projecting raw sensor data onto
the feature space defined by such over-complete sets of basis vectors effective
feature extraction is pursued. Given these learned feature representations,
classification backends are then trained using small amounts of labeled
training data.
We study the new approach in detail using two datasets which differ in terms
of the recognition tasks and sensor modalities. Primarily we focus on
transportation mode analysis task, a popular task in mobile-phone based
sensing. The sparse-coding framework significantly outperforms the
state-of-the-art in supervised learning approaches. Furthermore, we demonstrate
the great practical potential of the new approach by successfully evaluating
its generalization capabilities across both domain and sensor modalities by
considering the popular Opportunity dataset. Our feature learning approach
outperforms state-of-the-art approaches to analyzing activities in daily
living.
| [
{
"version": "v1",
"created": "Wed, 25 Dec 2013 18:08:44 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jul 2014 10:32:32 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Jul 2014 13:39:53 GMT"
}
] | 2014-07-24T00:00:00 | [
[
"Bhattacharya",
"Sourav",
""
],
[
"Nurmi",
"Petteri",
""
],
[
"Hammerla",
"Nils",
""
],
[
"Plötz",
"Thomas",
""
]
] | TITLE: Towards Using Unlabeled Data in a Sparse-coding Framework for Human
Activity Recognition
ABSTRACT: We propose a sparse-coding framework for activity recognition in ubiquitous
and mobile computing that alleviates two fundamental problems of current
supervised learning approaches. (i) It automatically derives a compact, sparse
and meaningful feature representation of sensor data that does not rely on
prior expert knowledge and generalizes extremely well across domain boundaries.
(ii) It exploits unlabeled sample data for bootstrapping effective activity
recognizers, i.e., substantially reduces the amount of ground truth annotation
required for model estimation. Such unlabeled data is trivial to obtain, e.g.,
through contemporary smartphones carried by users as they go about their
everyday activities.
Based on the self-taught learning paradigm we automatically derive an
over-complete set of basis vectors from unlabeled data that captures inherent
patterns present within activity data. Through projecting raw sensor data onto
the feature space defined by such over-complete sets of basis vectors effective
feature extraction is pursued. Given these learned feature representations,
classification backends are then trained using small amounts of labeled
training data.
We study the new approach in detail using two datasets which differ in terms
of the recognition tasks and sensor modalities. Primarily we focus on
transportation mode analysis task, a popular task in mobile-phone based
sensing. The sparse-coding framework significantly outperforms the
state-of-the-art in supervised learning approaches. Furthermore, we demonstrate
the great practical potential of the new approach by successfully evaluating
its generalization capabilities across both domain and sensor modalities by
considering the popular Opportunity dataset. Our feature learning approach
outperforms state-of-the-art approaches to analyzing activities in daily
living.
|
1407.6124 | Duc Hiep Chu | Duc-Hiep Chu, Joxan Jaffar, Minh-Thai Trinh | Automating Proofs of Data-Structure Properties in Imperative Programs | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of automated reasoning about dynamically manipulated
data structures. The state-of-the-art methods are limited to the
unfold-and-match (U+M) paradigm, where predicates are transformed via
(un)folding operations induced from their definitions before being treated as
uninterpreted. However, proof obligations from verifying programs with
iterative loops and multiple function calls often do not succumb to this
paradigm. Our contribution is a proof method which -- beyond U+M -- performs
automatic formula re-writing by treating previously encountered obligations in
each proof path as possible induction hypotheses. This enables us, for the
first time, to systematically reason about a wide range of obligations, arising
from practical program verification. We demonstrate the power of our proof
rules on commonly used lemmas, thereby close the remaining gaps in existing
state-of-the-art systems. Another impact, probably more important, is that our
method regains the power of compositional reasoning, and shows that the usage
of user-provided lemmas is no longer needed for the existing set of benchmarks.
This not only removes the burden of coming up with the appropriate lemmas, but
also significantly boosts up the verification process, since lemma
applications, coupled with unfolding, often induce very large search space.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2014 08:06:53 GMT"
}
] | 2014-07-24T00:00:00 | [
[
"Chu",
"Duc-Hiep",
""
],
[
"Jaffar",
"Joxan",
""
],
[
"Trinh",
"Minh-Thai",
""
]
] | TITLE: Automating Proofs of Data-Structure Properties in Imperative Programs
ABSTRACT: We consider the problem of automated reasoning about dynamically manipulated
data structures. The state-of-the-art methods are limited to the
unfold-and-match (U+M) paradigm, where predicates are transformed via
(un)folding operations induced from their definitions before being treated as
uninterpreted. However, proof obligations from verifying programs with
iterative loops and multiple function calls often do not succumb to this
paradigm. Our contribution is a proof method which -- beyond U+M -- performs
automatic formula re-writing by treating previously encountered obligations in
each proof path as possible induction hypotheses. This enables us, for the
first time, to systematically reason about a wide range of obligations, arising
from practical program verification. We demonstrate the power of our proof
rules on commonly used lemmas, thereby close the remaining gaps in existing
state-of-the-art systems. Another impact, probably more important, is that our
method regains the power of compositional reasoning, and shows that the usage
of user-provided lemmas is no longer needed for the existing set of benchmarks.
This not only removes the burden of coming up with the appropriate lemmas, but
also significantly boosts up the verification process, since lemma
applications, coupled with unfolding, often induce very large search space.
|
1407.6174 | Fatih Cakir | Fatih Cakir and Stan Sclaroff | Visual Word Selection without Re-Coding and Re-Pooling | 8 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Bag-of-Words (BoW) representation is widely used in computer vision. The
size of the codebook impacts the time and space complexity of the applications
that use BoW. Thus, given a training set for a particular computer vision task,
a key problem is pruning a large codebook to select only a subset of visual
words. Evaluating possible selections of words to be included in the pruned
codebook can be computationally prohibitive; in a brute-force scheme,
evaluating each pruned codebook requires re-coding of all features extracted
from training images to words in the candidate codebook and then re-pooling the
words to obtain a representation of each image, e.g., histogram of visual word
frequencies. In this paper, a method is proposed that selects and evaluates a
subset of words from an initially large codebook, without the need for
re-coding or re-pooling. Formulations are proposed for two commonly-used
schemes: hard and soft (kernel) coding of visual words with average-pooling.
The effectiveness of these formulations is evaluated on the 15 Scenes and
Caltech 10 benchmarks.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2014 11:10:39 GMT"
}
] | 2014-07-24T00:00:00 | [
[
"Cakir",
"Fatih",
""
],
[
"Sclaroff",
"Stan",
""
]
] | TITLE: Visual Word Selection without Re-Coding and Re-Pooling
ABSTRACT: The Bag-of-Words (BoW) representation is widely used in computer vision. The
size of the codebook impacts the time and space complexity of the applications
that use BoW. Thus, given a training set for a particular computer vision task,
a key problem is pruning a large codebook to select only a subset of visual
words. Evaluating possible selections of words to be included in the pruned
codebook can be computationally prohibitive; in a brute-force scheme,
evaluating each pruned codebook requires re-coding of all features extracted
from training images to words in the candidate codebook and then re-pooling the
words to obtain a representation of each image, e.g., histogram of visual word
frequencies. In this paper, a method is proposed that selects and evaluates a
subset of words from an initially large codebook, without the need for
re-coding or re-pooling. Formulations are proposed for two commonly-used
schemes: hard and soft (kernel) coding of visual words with average-pooling.
The effectiveness of these formulations is evaluated on the 15 Scenes and
Caltech 10 benchmarks.
|
1407.6290 | Naser Alajmi Mr | Naser Alajmi | Wireless Sensor Networks Attacks and Solutions | 4 pages, 3 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A few years ago, wireless sensor networks (WSNs) used by only military. Now,
we have seen many of organizations use WSNs for some purposes such as weather,
pollution, traffic control, and healthcare. Security is becoming on these days
a major concern for wireless sensor network. In this paper I focus on the
security types of attacks and their detection. This paper anatomizes the
security requirements and security attacks in wireless sensor networks. Also,
indicate to the benchmarks for the security in WSNs.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2014 16:50:42 GMT"
}
] | 2014-07-24T00:00:00 | [
[
"Alajmi",
"Naser",
""
]
] | TITLE: Wireless Sensor Networks Attacks and Solutions
ABSTRACT: A few years ago, wireless sensor networks (WSNs) used by only military. Now,
we have seen many of organizations use WSNs for some purposes such as weather,
pollution, traffic control, and healthcare. Security is becoming on these days
a major concern for wireless sensor network. In this paper I focus on the
security types of attacks and their detection. This paper anatomizes the
security requirements and security attacks in wireless sensor networks. Also,
indicate to the benchmarks for the security in WSNs.
|
1407.6315 | Deepak Kumar | Deepak Kumar, A G Ramakrishnan | Quadratically constrained quadratic programming for classification using
particle swarms and applications | 17 pages, 3 figures | null | null | null | cs.AI cs.LG cs.NE math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Particle swarm optimization is used in several combinatorial optimization
problems. In this work, particle swarms are used to solve quadratic programming
problems with quadratic constraints. The approach of particle swarms is an
example for interior point methods in optimization as an iterative technique.
This approach is novel and deals with classification problems without the use
of a traditional classifier. Our method determines the optimal hyperplane or
classification boundary for a data set. In a binary classification problem, we
constrain each class as a cluster, which is enclosed by an ellipsoid. The
estimation of the optimal hyperplane between the two clusters is posed as a
quadratically constrained quadratic problem. The optimization problem is solved
in distributed format using modified particle swarms. Our method has the
advantage of using the direction towards optimal solution rather than searching
the entire feasible region. Our results on the Iris, Pima, Wine, and Thyroid
datasets show that the proposed method works better than a neural network and
the performance is close to that of SVM.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2014 18:04:23 GMT"
}
] | 2014-07-24T00:00:00 | [
[
"Kumar",
"Deepak",
""
],
[
"Ramakrishnan",
"A G",
""
]
] | TITLE: Quadratically constrained quadratic programming for classification using
particle swarms and applications
ABSTRACT: Particle swarm optimization is used in several combinatorial optimization
problems. In this work, particle swarms are used to solve quadratic programming
problems with quadratic constraints. The approach of particle swarms is an
example for interior point methods in optimization as an iterative technique.
This approach is novel and deals with classification problems without the use
of a traditional classifier. Our method determines the optimal hyperplane or
classification boundary for a data set. In a binary classification problem, we
constrain each class as a cluster, which is enclosed by an ellipsoid. The
estimation of the optimal hyperplane between the two clusters is posed as a
quadratically constrained quadratic problem. The optimization problem is solved
in distributed format using modified particle swarms. Our method has the
advantage of using the direction towards optimal solution rather than searching
the entire feasible region. Our results on the Iris, Pima, Wine, and Thyroid
datasets show that the proposed method works better than a neural network and
the performance is close to that of SVM.
|
1306.4066 | Tom Z. J. Fu | Tom Z. J. Fu, Qiufang Ying and Dah Ming Chiu | MYE: Missing Year Estimation in Academic Social Networks | Some typos are corrected | null | null | null | cs.DL cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In bibliometrics studies, a common challenge is how to deal with incorrect or
incomplete data. However, given a large volume of data, there often exists
certain relationships between the data items that can allow us to recover
missing data items and correct erroneous data. In this paper, we study a
particular problem of this sort - estimating the missing year information
associated with publications (and hence authors' years of active publication).
We first propose a simple algorithm that only makes use of the "direct"
information, such as paper citation/reference relationships or paper-author
relationships. The result of this simple algorithm is used as a benchmark for
comparison. Our goal is to develop algorithms that increase both the coverage
(the percentage of missing year papers recovered) and accuracy (mean absolute
error of the estimated year to the real year). We propose some advanced
algorithms that extend inference by information propagation. For each
algorithm, we propose three versions according to the given academic social
network type: a) Homogeneous (only contains paper citation links), b) Bipartite
(only contains paper-author relations), and, c) Heterogeneous (both paper
citation and paper-author relations). We carry out experiments on the three
public data sets (MSR Libra, DBLP and APS), and evaluated by applying the
K-fold cross validation method. We show that the advanced algorithms can
improve both coverage and accuracy.
| [
{
"version": "v1",
"created": "Tue, 18 Jun 2013 04:45:46 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Dec 2013 18:47:21 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Feb 2014 20:03:32 GMT"
},
{
"version": "v4",
"created": "Tue, 22 Jul 2014 16:48:57 GMT"
}
] | 2014-07-23T00:00:00 | [
[
"Fu",
"Tom Z. J.",
""
],
[
"Ying",
"Qiufang",
""
],
[
"Chiu",
"Dah Ming",
""
]
] | TITLE: MYE: Missing Year Estimation in Academic Social Networks
ABSTRACT: In bibliometrics studies, a common challenge is how to deal with incorrect or
incomplete data. However, given a large volume of data, there often exists
certain relationships between the data items that can allow us to recover
missing data items and correct erroneous data. In this paper, we study a
particular problem of this sort - estimating the missing year information
associated with publications (and hence authors' years of active publication).
We first propose a simple algorithm that only makes use of the "direct"
information, such as paper citation/reference relationships or paper-author
relationships. The result of this simple algorithm is used as a benchmark for
comparison. Our goal is to develop algorithms that increase both the coverage
(the percentage of missing year papers recovered) and accuracy (mean absolute
error of the estimated year to the real year). We propose some advanced
algorithms that extend inference by information propagation. For each
algorithm, we propose three versions according to the given academic social
network type: a) Homogeneous (only contains paper citation links), b) Bipartite
(only contains paper-author relations), and, c) Heterogeneous (both paper
citation and paper-author relations). We carry out experiments on the three
public data sets (MSR Libra, DBLP and APS), and evaluated by applying the
K-fold cross validation method. We show that the advanced algorithms can
improve both coverage and accuracy.
|
1407.2098 | G\"unter J\"ager | G\"unter J\"ager, Alexander Peltzer and Kay Nieselt | inPHAP: Interactive visualization of genotype and phased haplotype data | BioVis 2014 conference | null | null | null | cs.CE q-bio.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Background: To understand individual genomes it is necessary to look at the
variations that lead to changes in phenotype and possibly to disease. However,
genotype information alone is often not sufficient and additional knowledge
regarding the phase of the variation is needed to make correct interpretations.
Interactive visualizations, that allow the user to explore the data in various
ways, can be of great assistance in the process of making well informed
decisions. But, currently there is a lack for visualizations that are able to
deal with phased haplotype data. Results: We present inPHAP, an interactive
visualization tool for genotype and phased haplotype data. inPHAP features a
variety of interaction possibilities such as zooming, sorting, filtering and
aggregation of rows in order to explore patterns hidden in large genetic data
sets. As a proof of concept, we apply inPHAP to the phased haplotype data set
of Phase 1 of the 1000 Genomes Project. Thereby, inPHAP's ability to show
genetic variations on the population as well as on the individuals level is
demonstrated for several disease related loci. Conclusions: As of today, inPHAP
is the only visual analytical tool that allows the user to explore unphased and
phased haplotype data interactively. Due to its highly scalable design, inPHAP
can be applied to large datasets with up to 100 GB of data, enabling users to
visualize even large scale input data. inPHAP closes the gap between common
visualization tools for unphased genotype data and introduces several new
features, such as the visualization of phased data.
| [
{
"version": "v1",
"created": "Tue, 8 Jul 2014 14:14:18 GMT"
}
] | 2014-07-23T00:00:00 | [
[
"Jäger",
"Günter",
""
],
[
"Peltzer",
"Alexander",
""
],
[
"Nieselt",
"Kay",
""
]
] | TITLE: inPHAP: Interactive visualization of genotype and phased haplotype data
ABSTRACT: Background: To understand individual genomes it is necessary to look at the
variations that lead to changes in phenotype and possibly to disease. However,
genotype information alone is often not sufficient and additional knowledge
regarding the phase of the variation is needed to make correct interpretations.
Interactive visualizations, that allow the user to explore the data in various
ways, can be of great assistance in the process of making well informed
decisions. But, currently there is a lack for visualizations that are able to
deal with phased haplotype data. Results: We present inPHAP, an interactive
visualization tool for genotype and phased haplotype data. inPHAP features a
variety of interaction possibilities such as zooming, sorting, filtering and
aggregation of rows in order to explore patterns hidden in large genetic data
sets. As a proof of concept, we apply inPHAP to the phased haplotype data set
of Phase 1 of the 1000 Genomes Project. Thereby, inPHAP's ability to show
genetic variations on the population as well as on the individuals level is
demonstrated for several disease related loci. Conclusions: As of today, inPHAP
is the only visual analytical tool that allows the user to explore unphased and
phased haplotype data interactively. Due to its highly scalable design, inPHAP
can be applied to large datasets with up to 100 GB of data, enabling users to
visualize even large scale input data. inPHAP closes the gap between common
visualization tools for unphased genotype data and introduces several new
features, such as the visualization of phased data.
|
1407.3386 | Sadegh Aliakbary | Sadegh Aliakbary, Jafar Habibi, Ali Movaghar | Feature Extraction from Degree Distribution for Comparison and Analysis
of Complex Networks | arXiv admin note: substantial text overlap with arXiv:1307.3625 | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The degree distribution is an important characteristic of complex networks.
In many data analysis applications, the networks should be represented as
fixed-length feature vectors and therefore the feature extraction from the
degree distribution is a necessary step. Moreover, many applications need a
similarity function for comparison of complex networks based on their degree
distributions. Such a similarity measure has many applications including
classification and clustering of network instances, evaluation of network
sampling methods, anomaly detection, and study of epidemic dynamics. The
existing methods are unable to effectively capture the similarity of degree
distributions, particularly when the corresponding networks have different
sizes. Based on our observations about the structure of the degree
distributions in networks over time, we propose a feature extraction and a
similarity function for the degree distributions in complex networks. We
propose to calculate the feature values based on the mean and standard
deviation of the node degrees in order to decrease the effect of the network
size on the extracted features. The proposed method is evaluated using
different artificial and real network datasets, and it outperforms the state of
the art methods with respect to the accuracy of the distance function and the
effectiveness of the extracted features.
| [
{
"version": "v1",
"created": "Sat, 12 Jul 2014 13:58:03 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jul 2014 08:13:45 GMT"
}
] | 2014-07-23T00:00:00 | [
[
"Aliakbary",
"Sadegh",
""
],
[
"Habibi",
"Jafar",
""
],
[
"Movaghar",
"Ali",
""
]
] | TITLE: Feature Extraction from Degree Distribution for Comparison and Analysis
of Complex Networks
ABSTRACT: The degree distribution is an important characteristic of complex networks.
In many data analysis applications, the networks should be represented as
fixed-length feature vectors and therefore the feature extraction from the
degree distribution is a necessary step. Moreover, many applications need a
similarity function for comparison of complex networks based on their degree
distributions. Such a similarity measure has many applications including
classification and clustering of network instances, evaluation of network
sampling methods, anomaly detection, and study of epidemic dynamics. The
existing methods are unable to effectively capture the similarity of degree
distributions, particularly when the corresponding networks have different
sizes. Based on our observations about the structure of the degree
distributions in networks over time, we propose a feature extraction and a
similarity function for the degree distributions in complex networks. We
propose to calculate the feature values based on the mean and standard
deviation of the node degrees in order to decrease the effect of the network
size on the extracted features. The proposed method is evaluated using
different artificial and real network datasets, and it outperforms the state of
the art methods with respect to the accuracy of the distance function and the
effectiveness of the extracted features.
|
1407.5574 | Sandeep Kumar | Sandeep Kumar, Vivek Kumar Sharma, Rajani Kumari | A Novel Hybrid Crossover based Artificial Bee Colony Algorithm for
Optimization Problem | null | null | 10.5120/14136-2266 | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial bee colony (ABC) algorithm has proved its importance in solving a
number of problems including engineering optimization problems. ABC algorithm
is one of the most popular and youngest member of the family of population
based nature inspired meta-heuristic swarm intelligence method. ABC has been
proved its superiority over some other Nature Inspired Algorithms (NIA) when
applied for both benchmark functions and real world problems. The performance
of search process of ABC depends on a random value which tries to balance
exploration and exploitation phase. In order to increase the performance it is
required to balance the exploration of search space and exploitation of optimal
solution of the ABC. This paper outlines a new hybrid of ABC algorithm with
Genetic Algorithm. The proposed method integrates crossover operation from
Genetic Algorithm (GA) with original ABC algorithm. The proposed method is
named as Crossover based ABC (CbABC). The CbABC strengthens the exploitation
phase of ABC as crossover enhances exploration of search space. The CbABC
tested over four standard benchmark functions and a popular continuous
optimization problem.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2014 17:13:43 GMT"
}
] | 2014-07-23T00:00:00 | [
[
"Kumar",
"Sandeep",
""
],
[
"Sharma",
"Vivek Kumar",
""
],
[
"Kumari",
"Rajani",
""
]
] | TITLE: A Novel Hybrid Crossover based Artificial Bee Colony Algorithm for
Optimization Problem
ABSTRACT: Artificial bee colony (ABC) algorithm has proved its importance in solving a
number of problems including engineering optimization problems. ABC algorithm
is one of the most popular and youngest member of the family of population
based nature inspired meta-heuristic swarm intelligence method. ABC has been
proved its superiority over some other Nature Inspired Algorithms (NIA) when
applied for both benchmark functions and real world problems. The performance
of search process of ABC depends on a random value which tries to balance
exploration and exploitation phase. In order to increase the performance it is
required to balance the exploration of search space and exploitation of optimal
solution of the ABC. This paper outlines a new hybrid of ABC algorithm with
Genetic Algorithm. The proposed method integrates crossover operation from
Genetic Algorithm (GA) with original ABC algorithm. The proposed method is
named as Crossover based ABC (CbABC). The CbABC strengthens the exploitation
phase of ABC as crossover enhances exploration of search space. The CbABC
tested over four standard benchmark functions and a popular continuous
optimization problem.
|
1407.5661 | Scott Sawyer | Scott M. Sawyer and B. David O'Gwynn | Evaluating Accumulo Performance for a Scalable Cyber Data Processing
Pipeline | To appear at 2014 IEEE High Performance Extreme Computing Conference
(HPEC '14) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Streaming, big data applications face challenges in creating scalable data
flow pipelines, in which multiple data streams must be collected, stored,
queried, and analyzed. These data sources are characterized by their volume (in
terms of dataset size), velocity (in terms of data rates), and variety (in
terms of fields and types). For many applications, distributed NoSQL databases
are effective alternatives to traditional relational database management
systems. This paper considers a cyber situational awareness system that uses
the Apache Accumulo database to provide scalable data warehousing, real-time
data ingest, and responsive querying for human users and analytic algorithms.
We evaluate Accumulo's ingestion scalability as a function of number of client
processes and servers. We also describe a flexible data model with effective
techniques for query planning and query batching to deliver responsive results.
Query performance is evaluated in terms of latency of the client receiving
initial result sets. Accumulo performance is measured on a database of up to 8
nodes using real cyber data.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2014 20:34:32 GMT"
}
] | 2014-07-23T00:00:00 | [
[
"Sawyer",
"Scott M.",
""
],
[
"O'Gwynn",
"B. David",
""
]
] | TITLE: Evaluating Accumulo Performance for a Scalable Cyber Data Processing
Pipeline
ABSTRACT: Streaming, big data applications face challenges in creating scalable data
flow pipelines, in which multiple data streams must be collected, stored,
queried, and analyzed. These data sources are characterized by their volume (in
terms of dataset size), velocity (in terms of data rates), and variety (in
terms of fields and types). For many applications, distributed NoSQL databases
are effective alternatives to traditional relational database management
systems. This paper considers a cyber situational awareness system that uses
the Apache Accumulo database to provide scalable data warehousing, real-time
data ingest, and responsive querying for human users and analytic algorithms.
We evaluate Accumulo's ingestion scalability as a function of number of client
processes and servers. We also describe a flexible data model with effective
techniques for query planning and query batching to deliver responsive results.
Query performance is evaluated in terms of latency of the client receiving
initial result sets. Accumulo performance is measured on a database of up to 8
nodes using real cyber data.
|
1407.5759 | Denis Fortun | Denis Fortun (INRIA), Patrick Bouthemy (INRIA), Charles Kervrann
(INRIA) | Aggregation of local parametric candidates with exemplar-based occlusion
handling for optical flow | Submission,IEEE Transactions on Image Processing (2014) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Handling all together large displacements, motion details and occlusions
remains an open issue for reliable computation of optical flow in a video
sequence. We propose a two-step aggregation paradigm to address this problem.
The idea is to supply local motion candidates at every pixel in a first step,
and then to combine them to determine the global optical flow field in a second
step. We exploit local parametric estimations combined with patch
correspondences and we experimentally demonstrate that they are sufficient to
produce highly accurate motion candidates. The aggregation step is designed as
the discrete optimization of a global regularized energy. The occlusion map is
estimated jointly with the flow field throughout the two steps. We propose a
generic exemplar-based approach for occlusion filling with motion vectors. We
achieve state-of-the-art results in computer vision benchmarks, with
particularly significant improvements in the case of large displacements and
occlusions.
| [
{
"version": "v1",
"created": "Tue, 22 Jul 2014 06:50:40 GMT"
}
] | 2014-07-23T00:00:00 | [
[
"Fortun",
"Denis",
"",
"INRIA"
],
[
"Bouthemy",
"Patrick",
"",
"INRIA"
],
[
"Kervrann",
"Charles",
"",
"INRIA"
]
] | TITLE: Aggregation of local parametric candidates with exemplar-based occlusion
handling for optical flow
ABSTRACT: Handling all together large displacements, motion details and occlusions
remains an open issue for reliable computation of optical flow in a video
sequence. We propose a two-step aggregation paradigm to address this problem.
The idea is to supply local motion candidates at every pixel in a first step,
and then to combine them to determine the global optical flow field in a second
step. We exploit local parametric estimations combined with patch
correspondences and we experimentally demonstrate that they are sufficient to
produce highly accurate motion candidates. The aggregation step is designed as
the discrete optimization of a global regularized energy. The occlusion map is
estimated jointly with the flow field throughout the two steps. We propose a
generic exemplar-based approach for occlusion filling with motion vectors. We
achieve state-of-the-art results in computer vision benchmarks, with
particularly significant improvements in the case of large displacements and
occlusions.
|
1407.5908 | Mehrdad Mahdavi | Mehrdad Mahdavi | Exploiting Smoothness in Statistical Learning, Sequential Prediction,
and Stochastic Optimization | Ph.D. Thesis | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last several years, the intimate connection between convex
optimization and learning problems, in both statistical and sequential
frameworks, has shifted the focus of algorithmic machine learning to examine
this interplay. In particular, on one hand, this intertwinement brings forward
new challenges in reassessment of the performance of learning algorithms
including generalization and regret bounds under the assumptions imposed by
convexity such as analytical properties of loss functions (e.g., Lipschitzness,
strong convexity, and smoothness). On the other hand, emergence of datasets of
an unprecedented size, demands the development of novel and more efficient
optimization algorithms to tackle large-scale learning problems.
The overarching goal of this thesis is to reassess the smoothness of loss
functions in statistical learning, sequential prediction/online learning, and
stochastic optimization and explicate its consequences. In particular we
examine how smoothness of loss function could be beneficial or detrimental in
these settings in terms of sample complexity, statistical consistency, regret
analysis, and convergence rate, and investigate how smoothness can be leveraged
to devise more efficient learning algorithms.
| [
{
"version": "v1",
"created": "Sat, 19 Jul 2014 15:16:40 GMT"
}
] | 2014-07-23T00:00:00 | [
[
"Mahdavi",
"Mehrdad",
""
]
] | TITLE: Exploiting Smoothness in Statistical Learning, Sequential Prediction,
and Stochastic Optimization
ABSTRACT: In the last several years, the intimate connection between convex
optimization and learning problems, in both statistical and sequential
frameworks, has shifted the focus of algorithmic machine learning to examine
this interplay. In particular, on one hand, this intertwinement brings forward
new challenges in reassessment of the performance of learning algorithms
including generalization and regret bounds under the assumptions imposed by
convexity such as analytical properties of loss functions (e.g., Lipschitzness,
strong convexity, and smoothness). On the other hand, emergence of datasets of
an unprecedented size, demands the development of novel and more efficient
optimization algorithms to tackle large-scale learning problems.
The overarching goal of this thesis is to reassess the smoothness of loss
functions in statistical learning, sequential prediction/online learning, and
stochastic optimization and explicate its consequences. In particular we
examine how smoothness of loss function could be beneficial or detrimental in
these settings in terms of sample complexity, statistical consistency, regret
analysis, and convergence rate, and investigate how smoothness can be leveraged
to devise more efficient learning algorithms.
|
1407.5961 | EPTCS | Romain Brenguier (Universit\'e Libre de Bruxelles), Guillermo A.
P\'erez (Universit\'e Libre de Bruxelles), Jean-Fran\c{c}ois Raskin
(Universit\'e Libre de Bruxelles), Ocan Sankur (Universit\'e Libre de
Bruxelles) | AbsSynthe: abstract synthesis from succinct safety specifications | In Proceedings SYNT 2014, arXiv:1407.4937 | EPTCS 157, 2014, pp. 100-116 | 10.4204/EPTCS.157.11 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we describe a synthesis algorithm for safety specifications
described as circuits. Our algorithm is based on fixpoint computations,
abstraction and refinement, it uses binary decision diagrams as symbolic data
structure. We evaluate our tool on the benchmarks provided by the organizers of
the synthesis competition organized within the SYNT'14 workshop.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2014 07:28:59 GMT"
}
] | 2014-07-23T00:00:00 | [
[
"Brenguier",
"Romain",
"",
"Université Libre de Bruxelles"
],
[
"Pérez",
"Guillermo A.",
"",
"Université Libre de Bruxelles"
],
[
"Raskin",
"Jean-François",
"",
"Université Libre de Bruxelles"
],
[
"Sankur",
"Ocan",
"",
"Université Libre de\n Bruxelles"
]
] | TITLE: AbsSynthe: abstract synthesis from succinct safety specifications
ABSTRACT: In this paper, we describe a synthesis algorithm for safety specifications
described as circuits. Our algorithm is based on fixpoint computations,
abstraction and refinement, it uses binary decision diagrams as symbolic data
structure. We evaluate our tool on the benchmarks provided by the organizers of
the synthesis competition organized within the SYNT'14 workshop.
|
1407.5242 | Ziming Zhang | Ziming Zhang and Philip H.S. Torr | Object Proposal Generation using Two-Stage Cascade SVMs | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object proposal algorithms have shown great promise as a first step for
object recognition and detection. Good object proposal generation algorithms
require high object recall rate as well as low computational cost, because
generating object proposals is usually utilized as a preprocessing step. The
problem of how to accelerate the object proposal generation and evaluation
process without decreasing recall is thus of great interest. In this paper, we
propose a new object proposal generation method using two-stage cascade SVMs,
where in the first stage linear filters are learned for predefined quantized
scales/aspect-ratios independently, and in the second stage a global linear
classifier is learned across all the quantized scales/aspect-ratios for
calibration, so that all the proposals can be compared properly. The proposals
with highest scores are our final output. Specifically, we explain our
scale/aspect-ratio quantization scheme, and investigate the effects of
combinations of $\ell_1$ and $\ell_2$ regularizers in cascade SVMs with/without
ranking constraints in learning. Comprehensive experiments on VOC2007 dataset
are conducted, and our results achieve the state-of-the-art performance with
high object recall rate and high computational efficiency. Besides, our method
has been demonstrated to be suitable for not only class-specific but also
generic object proposal generation.
| [
{
"version": "v1",
"created": "Sun, 20 Jul 2014 03:53:21 GMT"
}
] | 2014-07-22T00:00:00 | [
[
"Zhang",
"Ziming",
""
],
[
"Torr",
"Philip H. S.",
""
]
] | TITLE: Object Proposal Generation using Two-Stage Cascade SVMs
ABSTRACT: Object proposal algorithms have shown great promise as a first step for
object recognition and detection. Good object proposal generation algorithms
require high object recall rate as well as low computational cost, because
generating object proposals is usually utilized as a preprocessing step. The
problem of how to accelerate the object proposal generation and evaluation
process without decreasing recall is thus of great interest. In this paper, we
propose a new object proposal generation method using two-stage cascade SVMs,
where in the first stage linear filters are learned for predefined quantized
scales/aspect-ratios independently, and in the second stage a global linear
classifier is learned across all the quantized scales/aspect-ratios for
calibration, so that all the proposals can be compared properly. The proposals
with highest scores are our final output. Specifically, we explain our
scale/aspect-ratio quantization scheme, and investigate the effects of
combinations of $\ell_1$ and $\ell_2$ regularizers in cascade SVMs with/without
ranking constraints in learning. Comprehensive experiments on VOC2007 dataset
are conducted, and our results achieve the state-of-the-art performance with
high object recall rate and high computational efficiency. Besides, our method
has been demonstrated to be suitable for not only class-specific but also
generic object proposal generation.
|
1407.5547 | Rossano Schifanella | Luca Maria Aiello, Rossano Schifanella, Bogdan State | Reading the Source Code of Social Ties | 10 pages, 8 figures, Proceedings of the 2014 ACM conference on Web
(WebSci'14) | null | 10.1145/2615569.2615672 | null | cs.CY cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Though online social network research has exploded during the past years, not
much thought has been given to the exploration of the nature of social links.
Online interactions have been interpreted as indicative of one social process
or another (e.g., status exchange or trust), often with little systematic
justification regarding the relation between observed data and theoretical
concept. Our research aims to breach this gap in computational social science
by proposing an unsupervised, parameter-free method to discover, with high
accuracy, the fundamental domains of interaction occurring in social networks.
By applying this method on two online datasets different by scope and type of
interaction (aNobii and Flickr) we observe the spontaneous emergence of three
domains of interaction representing the exchange of status, knowledge and
social support. By finding significant relations between the domains of
interaction and classic social network analysis issues (e.g., tie strength,
dyadic interaction over time) we show how the network of interactions induced
by the extracted domains can be used as a starting point for more nuanced
analysis of online social data that may one day incorporate the normative
grammar of social interaction. Our methods finds applications in online social
media services ranging from recommendation to visual link summarization.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2014 16:16:44 GMT"
}
] | 2014-07-22T00:00:00 | [
[
"Aiello",
"Luca Maria",
""
],
[
"Schifanella",
"Rossano",
""
],
[
"State",
"Bogdan",
""
]
] | TITLE: Reading the Source Code of Social Ties
ABSTRACT: Though online social network research has exploded during the past years, not
much thought has been given to the exploration of the nature of social links.
Online interactions have been interpreted as indicative of one social process
or another (e.g., status exchange or trust), often with little systematic
justification regarding the relation between observed data and theoretical
concept. Our research aims to breach this gap in computational social science
by proposing an unsupervised, parameter-free method to discover, with high
accuracy, the fundamental domains of interaction occurring in social networks.
By applying this method on two online datasets different by scope and type of
interaction (aNobii and Flickr) we observe the spontaneous emergence of three
domains of interaction representing the exchange of status, knowledge and
social support. By finding significant relations between the domains of
interaction and classic social network analysis issues (e.g., tie strength,
dyadic interaction over time) we show how the network of interactions induced
by the extracted domains can be used as a starting point for more nuanced
analysis of online social data that may one day incorporate the normative
grammar of social interaction. Our methods finds applications in online social
media services ranging from recommendation to visual link summarization.
|
1407.4832 | Ernesto Diaz-Aviles | Bernat Coma-Puig and Ernesto Diaz-Aviles and Wolfgang Nejdl | Collaborative Filtering Ensemble for Personalized Name Recommendation | Top-N recommendation; personalized ranking; given name recommendation | Proceedings of the ECML PKDD Discovery Challenge - Recommending
Given Names. Co-located with ECML PKDD 2013. Prague, Czech Republic,
September 27, 2013 | null | null | cs.IR cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Out of thousands of names to choose from, picking the right one for your
child is a daunting task. In this work, our objective is to help parents making
an informed decision while choosing a name for their baby. We follow a
recommender system approach and combine, in an ensemble, the individual
rankings produced by simple collaborative filtering algorithms in order to
produce a personalized list of names that meets the individual parents' taste.
Our experiments were conducted using real-world data collected from the query
logs of 'nameling' (nameling.net), an online portal for searching and exploring
names, which corresponds to the dataset released in the context of the ECML
PKDD Discover Challenge 2013. Our approach is intuitive, easy to implement, and
features fast training and prediction steps.
| [
{
"version": "v1",
"created": "Wed, 16 Jul 2014 12:07:36 GMT"
}
] | 2014-07-21T00:00:00 | [
[
"Coma-Puig",
"Bernat",
""
],
[
"Diaz-Aviles",
"Ernesto",
""
],
[
"Nejdl",
"Wolfgang",
""
]
] | TITLE: Collaborative Filtering Ensemble for Personalized Name Recommendation
ABSTRACT: Out of thousands of names to choose from, picking the right one for your
child is a daunting task. In this work, our objective is to help parents making
an informed decision while choosing a name for their baby. We follow a
recommender system approach and combine, in an ensemble, the individual
rankings produced by simple collaborative filtering algorithms in order to
produce a personalized list of names that meets the individual parents' taste.
Our experiments were conducted using real-world data collected from the query
logs of 'nameling' (nameling.net), an online portal for searching and exploring
names, which corresponds to the dataset released in the context of the ECML
PKDD Discover Challenge 2013. Our approach is intuitive, easy to implement, and
features fast training and prediction steps.
|
1407.4859 | Kuldeep Meel | Deepak Majeti, Kuldeep S. Meel, Rajkishore Barik, Vivek Sarkar | ADHA: Automatic Data layout framework for Heterogeneous Architectures | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data layouts play a crucial role in determining the performance of a given
application running on a given architecture. Existing parallel programming
frameworks for both multicore and heterogeneous systems leave the onus of
selecting a data layout to the programmer. Therefore, shifting the burden of
data layout selection to optimizing compilers can greatly enhance programmer
productivity and application performance. In this work, we introduce {\ADHA}: a
two-level hierarchal formulation of the data layout problem for modern
heterogeneous architectures. We have created a reference implementation of ADHA
in the Heterogeneous Habanero-C (H2C) parallel programming system. ADHA shows
significant performance benefits of up to 6.92$\times$ compared to manually
specified layouts for two benchmark programs running on a CPU+GPU heterogeneous
platform.
| [
{
"version": "v1",
"created": "Fri, 18 Jul 2014 00:09:04 GMT"
}
] | 2014-07-21T00:00:00 | [
[
"Majeti",
"Deepak",
""
],
[
"Meel",
"Kuldeep S.",
""
],
[
"Barik",
"Rajkishore",
""
],
[
"Sarkar",
"Vivek",
""
]
] | TITLE: ADHA: Automatic Data layout framework for Heterogeneous Architectures
ABSTRACT: Data layouts play a crucial role in determining the performance of a given
application running on a given architecture. Existing parallel programming
frameworks for both multicore and heterogeneous systems leave the onus of
selecting a data layout to the programmer. Therefore, shifting the burden of
data layout selection to optimizing compilers can greatly enhance programmer
productivity and application performance. In this work, we introduce {\ADHA}: a
two-level hierarchal formulation of the data layout problem for modern
heterogeneous architectures. We have created a reference implementation of ADHA
in the Heterogeneous Habanero-C (H2C) parallel programming system. ADHA shows
significant performance benefits of up to 6.92$\times$ compared to manually
specified layouts for two benchmark programs running on a CPU+GPU heterogeneous
platform.
|
1407.4958 | Stefan Westerlund | Stefan Westerlund and Christopher Harris | A Framework for HI Spectral Source Finding Using Distributed-Memory
Supercomputing | 15 pages, 6 figures | Publications of the Astronomical Society of Australia, 2014,
Volume 31 | 10.1017/pasa.2014.18 | null | astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The latest generation of radio astronomy interferometers will conduct all sky
surveys with data products consisting of petabytes of spectral line data.
Traditional approaches to identifying and parameterising the astrophysical
sources within this data will not scale to datasets of this magnitude, since
the performance of workstations will not keep up with the real-time generation
of data. For this reason, it is necessary to employ high performance computing
systems consisting of a large number of processors connected by a
high-bandwidth network. In order to make use of such supercomputers substantial
modifications must be made to serial source finding code. To ease the
transition, this work presents the Scalable Source Finder Framework, a
framework providing storage access, networking communication and data
composition functionality, which can support a wide range of source finding
algorithms provided they can be applied to subsets of the entire image.
Additionally, the Parallel Gaussian Source Finder was implemented using SSoFF,
utilising Gaussian filters, thresholding, and local statistics. PGSF was able
to search on a 256GB simulated dataset in under 24 minutes, significantly less
than the 8 to 12 hour observation that would generate such a dataset.
| [
{
"version": "v1",
"created": "Fri, 18 Jul 2014 11:36:57 GMT"
}
] | 2014-07-21T00:00:00 | [
[
"Westerlund",
"Stefan",
""
],
[
"Harris",
"Christopher",
""
]
] | TITLE: A Framework for HI Spectral Source Finding Using Distributed-Memory
Supercomputing
ABSTRACT: The latest generation of radio astronomy interferometers will conduct all sky
surveys with data products consisting of petabytes of spectral line data.
Traditional approaches to identifying and parameterising the astrophysical
sources within this data will not scale to datasets of this magnitude, since
the performance of workstations will not keep up with the real-time generation
of data. For this reason, it is necessary to employ high performance computing
systems consisting of a large number of processors connected by a
high-bandwidth network. In order to make use of such supercomputers substantial
modifications must be made to serial source finding code. To ease the
transition, this work presents the Scalable Source Finder Framework, a
framework providing storage access, networking communication and data
composition functionality, which can support a wide range of source finding
algorithms provided they can be applied to subsets of the entire image.
Additionally, the Parallel Gaussian Source Finder was implemented using SSoFF,
utilising Gaussian filters, thresholding, and local statistics. PGSF was able
to search on a 256GB simulated dataset in under 24 minutes, significantly less
than the 8 to 12 hour observation that would generate such a dataset.
|
1407.4979 | Dong Yi | Dong Yi and Zhen Lei and Stan Z. Li | Deep Metric Learning for Practical Person Re-Identification | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Various hand-crafted features and metric learning methods prevail in the
field of person re-identification. Compared to these methods, this paper
proposes a more general way that can learn a similarity metric from image
pixels directly. By using a "siamese" deep neural network, the proposed method
can jointly learn the color feature, texture feature and metric in a unified
framework. The network has a symmetry structure with two sub-networks which are
connected by Cosine function. To deal with the big variations of person images,
binomial deviance is used to evaluate the cost between similarities and labels,
which is proved to be robust to outliers.
Compared to existing researches, a more practical setting is studied in the
experiments that is training and test on different datasets (cross dataset
person re-identification). Both in "intra dataset" and "cross dataset"
settings, the superiorities of the proposed method are illustrated on VIPeR and
PRID.
| [
{
"version": "v1",
"created": "Fri, 18 Jul 2014 13:07:16 GMT"
}
] | 2014-07-21T00:00:00 | [
[
"Yi",
"Dong",
""
],
[
"Lei",
"Zhen",
""
],
[
"Li",
"Stan Z.",
""
]
] | TITLE: Deep Metric Learning for Practical Person Re-Identification
ABSTRACT: Various hand-crafted features and metric learning methods prevail in the
field of person re-identification. Compared to these methods, this paper
proposes a more general way that can learn a similarity metric from image
pixels directly. By using a "siamese" deep neural network, the proposed method
can jointly learn the color feature, texture feature and metric in a unified
framework. The network has a symmetry structure with two sub-networks which are
connected by Cosine function. To deal with the big variations of person images,
binomial deviance is used to evaluate the cost between similarities and labels,
which is proved to be robust to outliers.
Compared to existing researches, a more practical setting is studied in the
experiments that is training and test on different datasets (cross dataset
person re-identification). Both in "intra dataset" and "cross dataset"
settings, the superiorities of the proposed method are illustrated on VIPeR and
PRID.
|
1407.4990 | Xin Liu Dr. | Xin Liu, Tsuyoshi Murata, and Ken Wakita | Detecting network communities beyond assortativity-related attributes | 10 pages, 8 figures | Physical Review E 90, 012806 (2014) | 10.1103/PhysRevE.90.012806 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In network science, assortativity refers to the tendency of links to exist
between nodes with similar attributes. In social networks, for example, links
tend to exist between individuals of similar age, nationality, location, race,
income, educational level, religious belief, and language. Thus, various
attributes jointly affect the network topology. An interesting problem is to
detect community structure beyond some specific assortativity-related
attributes $\rho$, i.e., to take out the effect of $\rho$ on network topology
and reveal the hidden community structure which are due to other attributes. An
approach to this problem is to redefine the null model of the modularity
measure, so as to simulate the effect of $\rho$ on network topology. However, a
challenge is that we do not know to what extent the network topology is
affected by $\rho$ and by other attributes. In this paper, we propose
Dist-Modularity which allows us to freely choose any suitable function to
simulate the effect of $\rho$. Such freedom can help us probe the effect of
$\rho$ and detect the hidden communities which are due to other attributes. We
test the effectiveness of Dist-Modularity on synthetic benchmarks and two
real-world networks.
| [
{
"version": "v1",
"created": "Tue, 15 Jul 2014 01:45:34 GMT"
}
] | 2014-07-21T00:00:00 | [
[
"Liu",
"Xin",
""
],
[
"Murata",
"Tsuyoshi",
""
],
[
"Wakita",
"Ken",
""
]
] | TITLE: Detecting network communities beyond assortativity-related attributes
ABSTRACT: In network science, assortativity refers to the tendency of links to exist
between nodes with similar attributes. In social networks, for example, links
tend to exist between individuals of similar age, nationality, location, race,
income, educational level, religious belief, and language. Thus, various
attributes jointly affect the network topology. An interesting problem is to
detect community structure beyond some specific assortativity-related
attributes $\rho$, i.e., to take out the effect of $\rho$ on network topology
and reveal the hidden community structure which are due to other attributes. An
approach to this problem is to redefine the null model of the modularity
measure, so as to simulate the effect of $\rho$ on network topology. However, a
challenge is that we do not know to what extent the network topology is
affected by $\rho$ and by other attributes. In this paper, we propose
Dist-Modularity which allows us to freely choose any suitable function to
simulate the effect of $\rho$. Such freedom can help us probe the effect of
$\rho$ and detect the hidden communities which are due to other attributes. We
test the effectiveness of Dist-Modularity on synthetic benchmarks and two
real-world networks.
|
1404.4646 | Ping Li | Guangcan Liu and Ping Li | Advancing Matrix Completion by Modeling Extra Structures beyond
Low-Rankness | arXiv admin note: text overlap with arXiv:1404.4032 | null | null | null | stat.ME cs.IT cs.LG math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A well-known method for completing low-rank matrices based on convex
optimization has been established by Cand{\`e}s and Recht. Although
theoretically complete, the method may not entirely solve the low-rank matrix
completion problem. This is because the method captures only the low-rankness
property which gives merely a rough constraint that the data points locate on
some low-dimensional subspace, but generally ignores the extra structures which
specify in more detail how the data points locate on the subspace. Whenever the
geometric distribution of the data points is not uniform, the coherence
parameters of data might be large and, accordingly, the method might fail even
if the latent matrix we want to recover is fairly low-rank. To better handle
non-uniform data, in this paper we propose a method termed Low-Rank Factor
Decomposition (LRFD), which imposes an additional restriction that the data
points must be represented as linear combinations of the bases in a dictionary
constructed or learnt in advance. We show that LRFD can well handle non-uniform
data, provided that the dictionary is configured properly: We mathematically
prove that if the dictionary itself is low-rank then LRFD is immune to the
coherence parameters which might be large on non-uniform data. This provides an
elementary principle for learning the dictionary in LRFD and, naturally, leads
to a practical algorithm for advancing matrix completion. Extensive experiments
on randomly generated matrices and motion datasets show encouraging results.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2014 20:50:26 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Jul 2014 18:04:35 GMT"
}
] | 2014-07-17T00:00:00 | [
[
"Liu",
"Guangcan",
""
],
[
"Li",
"Ping",
""
]
] | TITLE: Advancing Matrix Completion by Modeling Extra Structures beyond
Low-Rankness
ABSTRACT: A well-known method for completing low-rank matrices based on convex
optimization has been established by Cand{\`e}s and Recht. Although
theoretically complete, the method may not entirely solve the low-rank matrix
completion problem. This is because the method captures only the low-rankness
property which gives merely a rough constraint that the data points locate on
some low-dimensional subspace, but generally ignores the extra structures which
specify in more detail how the data points locate on the subspace. Whenever the
geometric distribution of the data points is not uniform, the coherence
parameters of data might be large and, accordingly, the method might fail even
if the latent matrix we want to recover is fairly low-rank. To better handle
non-uniform data, in this paper we propose a method termed Low-Rank Factor
Decomposition (LRFD), which imposes an additional restriction that the data
points must be represented as linear combinations of the bases in a dictionary
constructed or learnt in advance. We show that LRFD can well handle non-uniform
data, provided that the dictionary is configured properly: We mathematically
prove that if the dictionary itself is low-rank then LRFD is immune to the
coherence parameters which might be large on non-uniform data. This provides an
elementary principle for learning the dictionary in LRFD and, naturally, leads
to a practical algorithm for advancing matrix completion. Extensive experiments
on randomly generated matrices and motion datasets show encouraging results.
|
1407.4179 | Paolo Gasti | Jaroslav Sedenka, Kiran Balagani, Vir Phoha, Paolo Gasti | Privacy-Preserving Population-Enhanced Biometric Key Generation from
Free-Text Keystroke Dynamics | null | Jaroslav Sedenka, Kiran Balagani, Vir Phoha and Paolo Gasti.
Privacy-Preserving Population-Enhanced Biometric Key Generation from
Free-Text Keystroke Dynamics. BTAS 2013 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Biometric key generation techniques are used to reliably generate
cryptographic material from biometric signals. Existing constructions require
users to perform a particular activity (e.g., type or say a password, or
provide a handwritten signature), and are therefore not suitable for generating
keys continuously. In this paper we present a new technique for biometric key
generation from free-text keystroke dynamics. This is the first technique
suitable for continuous key generation. Our approach is based on a scaled
parity code for key generation (and subsequent key reconstruction), and can be
augmented with the use of population data to improve security and reduce key
reconstruction error. In particular, we rely on linear discriminant analysis
(LDA) to obtain a better representation of discriminable biometric signals.
To update the LDA matrix without disclosing user's biometric information, we
design a provably secure privacy-preserving protocol (PP-LDA) based on
homomorphic encryption. Our biometric key generation with PP-LDA was evaluated
on a dataset of 486 users. We report equal error rate around 5% when using LDA,
and below 7% without LDA.
| [
{
"version": "v1",
"created": "Wed, 16 Jul 2014 01:47:59 GMT"
}
] | 2014-07-17T00:00:00 | [
[
"Sedenka",
"Jaroslav",
""
],
[
"Balagani",
"Kiran",
""
],
[
"Phoha",
"Vir",
""
],
[
"Gasti",
"Paolo",
""
]
] | TITLE: Privacy-Preserving Population-Enhanced Biometric Key Generation from
Free-Text Keystroke Dynamics
ABSTRACT: Biometric key generation techniques are used to reliably generate
cryptographic material from biometric signals. Existing constructions require
users to perform a particular activity (e.g., type or say a password, or
provide a handwritten signature), and are therefore not suitable for generating
keys continuously. In this paper we present a new technique for biometric key
generation from free-text keystroke dynamics. This is the first technique
suitable for continuous key generation. Our approach is based on a scaled
parity code for key generation (and subsequent key reconstruction), and can be
augmented with the use of population data to improve security and reduce key
reconstruction error. In particular, we rely on linear discriminant analysis
(LDA) to obtain a better representation of discriminable biometric signals.
To update the LDA matrix without disclosing user's biometric information, we
design a provably secure privacy-preserving protocol (PP-LDA) based on
homomorphic encryption. Our biometric key generation with PP-LDA was evaluated
on a dataset of 486 users. We report equal error rate around 5% when using LDA,
and below 7% without LDA.
|
1407.4194 | Chaogui Kang | Chaogui Kang, Yu Liu, Lun Wu | Delineating Intra-Urban Spatial Connectivity Patterns by
Travel-Activities: A Case Study of Beijing, China | 6 pages, 4 figures | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Travel activities have been widely applied to quantify spatial interactions
between places, regions and nations. In this paper, we model the spatial
connectivities between 652 Traffic Analysis Zones (TAZs) in Beijing by a taxi
OD dataset. First, we unveil the gravitational structure of intra-urban spatial
connectivities of Beijing. On overall, the inter-TAZ interactions are well
governed by the Gravity Model $G_{ij} = {\lambda}p_{i}p_{j}/d_{ij}$, where
$p_{i}$, $p_{j}$ are degrees of TAZ $i$, $j$ and $d_{ij}$ the distance between
them, with a goodness-of-fit around 0.8. Second, the network based analysis
well reveals the polycentric form of Beijing. Last, we detect the semantics of
inter-TAZ connectivities based on their spatiotemporal patterns. We further
find that inter-TAZ connections deviating from the Gravity Model can be well
explained by link semantics.
| [
{
"version": "v1",
"created": "Wed, 16 Jul 2014 03:58:00 GMT"
}
] | 2014-07-17T00:00:00 | [
[
"Kang",
"Chaogui",
""
],
[
"Liu",
"Yu",
""
],
[
"Wu",
"Lun",
""
]
] | TITLE: Delineating Intra-Urban Spatial Connectivity Patterns by
Travel-Activities: A Case Study of Beijing, China
ABSTRACT: Travel activities have been widely applied to quantify spatial interactions
between places, regions and nations. In this paper, we model the spatial
connectivities between 652 Traffic Analysis Zones (TAZs) in Beijing by a taxi
OD dataset. First, we unveil the gravitational structure of intra-urban spatial
connectivities of Beijing. On overall, the inter-TAZ interactions are well
governed by the Gravity Model $G_{ij} = {\lambda}p_{i}p_{j}/d_{ij}$, where
$p_{i}$, $p_{j}$ are degrees of TAZ $i$, $j$ and $d_{ij}$ the distance between
them, with a goodness-of-fit around 0.8. Second, the network based analysis
well reveals the polycentric form of Beijing. Last, we detect the semantics of
inter-TAZ connectivities based on their spatiotemporal patterns. We further
find that inter-TAZ connections deviating from the Gravity Model can be well
explained by link semantics.
|
1407.4378 | Cameron Mura | Marcin Cieslik and Cameron Mura | PaPy: Parallel and Distributed Data-processing Pipelines in Python | 7 pages, 5 figures, 2 tables, some use-cases; more at
http://muralab.org/PaPy | null | null | null | cs.PL q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | PaPy, which stands for parallel pipelines in Python, is a highly flexible
framework that enables the construction of robust, scalable workflows for
either generating or processing voluminous datasets. A workflow is created from
user-written Python functions (nodes) connected by 'pipes' (edges) into a
directed acyclic graph. These functions are arbitrarily definable, and can make
use of any Python modules or external binaries. Given a user-defined topology
and collection of input data, functions are composed into nested higher-order
maps, which are transparently and robustly evaluated in parallel on a single
computer or on remote hosts. Local and remote computational resources can be
flexibly pooled and assigned to functional nodes, thereby allowing facile
load-balancing and pipeline optimization to maximize computational throughput.
Input items are processed by nodes in parallel, and traverse the graph in
batches of adjustable size -- a trade-off between lazy-evaluation, parallelism,
and memory consumption. The processing of a single item can be parallelized in
a scatter/gather scheme. The simplicity and flexibility of distributed
workflows using PaPy bridges the gap between desktop -> grid, enabling this new
computing paradigm to be leveraged in the processing of large scientific
datasets.
| [
{
"version": "v1",
"created": "Tue, 15 Jul 2014 03:13:00 GMT"
}
] | 2014-07-17T00:00:00 | [
[
"Cieslik",
"Marcin",
""
],
[
"Mura",
"Cameron",
""
]
] | TITLE: PaPy: Parallel and Distributed Data-processing Pipelines in Python
ABSTRACT: PaPy, which stands for parallel pipelines in Python, is a highly flexible
framework that enables the construction of robust, scalable workflows for
either generating or processing voluminous datasets. A workflow is created from
user-written Python functions (nodes) connected by 'pipes' (edges) into a
directed acyclic graph. These functions are arbitrarily definable, and can make
use of any Python modules or external binaries. Given a user-defined topology
and collection of input data, functions are composed into nested higher-order
maps, which are transparently and robustly evaluated in parallel on a single
computer or on remote hosts. Local and remote computational resources can be
flexibly pooled and assigned to functional nodes, thereby allowing facile
load-balancing and pipeline optimization to maximize computational throughput.
Input items are processed by nodes in parallel, and traverse the graph in
batches of adjustable size -- a trade-off between lazy-evaluation, parallelism,
and memory consumption. The processing of a single item can be parallelized in
a scatter/gather scheme. The simplicity and flexibility of distributed
workflows using PaPy bridges the gap between desktop -> grid, enabling this new
computing paradigm to be leveraged in the processing of large scientific
datasets.
|
1407.4409 | Ming Jin | Ruoxi Jia, Ming Jin, Costas J. Spanos | SoundLoc: Acoustic Method for Indoor Localization without Infrastructure | BuildSys 2014 | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Identifying locations of occupants is beneficial to energy management in
buildings. A key observation in indoor environment is that distinct functional
areas are typically controlled by separate HVAC and lighting systems and room
level localization is sufficient to provide a powerful tool for energy usage
reduction by occupancy-based actuation of the building facilities. Based upon
this observation, this paper focuses on identifying the room where a person or
a mobile device is physically present. Existing room localization methods,
however, require special infrastructure to annotate rooms.
SoundLoc is a room-level localization system that exploits the intrinsic
acoustic properties of individual rooms and obviates the needs for
infrastructures. As we show in the study, rooms' acoustic properties can be
characterized by Room Impulse Response (RIR). Nevertheless, obtaining precise
RIRs is a time-consuming and expensive process. The main contributions of our
work are the following. First, a cost-effective RIR measurement system is
implemented and the Noise Adaptive Extraction of Reverberation (NAER) algorithm
is developed to estimate room acoustic parameters in noisy conditions. Second,
a comprehensive physical and statistical analysis of features extracted from
RIRs is performed. Also, SoundLoc is evaluated using the dataset consisting of
ten (10) different rooms. The overall accuracy of 97.8% achieved demonstrates
the potential to be integrated into automatic mapping of building space.
| [
{
"version": "v1",
"created": "Wed, 16 Jul 2014 18:16:00 GMT"
}
] | 2014-07-17T00:00:00 | [
[
"Jia",
"Ruoxi",
""
],
[
"Jin",
"Ming",
""
],
[
"Spanos",
"Costas J.",
""
]
] | TITLE: SoundLoc: Acoustic Method for Indoor Localization without Infrastructure
ABSTRACT: Identifying locations of occupants is beneficial to energy management in
buildings. A key observation in indoor environment is that distinct functional
areas are typically controlled by separate HVAC and lighting systems and room
level localization is sufficient to provide a powerful tool for energy usage
reduction by occupancy-based actuation of the building facilities. Based upon
this observation, this paper focuses on identifying the room where a person or
a mobile device is physically present. Existing room localization methods,
however, require special infrastructure to annotate rooms.
SoundLoc is a room-level localization system that exploits the intrinsic
acoustic properties of individual rooms and obviates the needs for
infrastructures. As we show in the study, rooms' acoustic properties can be
characterized by Room Impulse Response (RIR). Nevertheless, obtaining precise
RIRs is a time-consuming and expensive process. The main contributions of our
work are the following. First, a cost-effective RIR measurement system is
implemented and the Noise Adaptive Extraction of Reverberation (NAER) algorithm
is developed to estimate room acoustic parameters in noisy conditions. Second,
a comprehensive physical and statistical analysis of features extracted from
RIRs is performed. Also, SoundLoc is evaluated using the dataset consisting of
ten (10) different rooms. The overall accuracy of 97.8% achieved demonstrates
the potential to be integrated into automatic mapping of building space.
|
1407.4416 | Ping Li | Anshumali Shrivastava and Ping Li | In Defense of MinHash Over SimHash | null | null | null | null | stat.CO cs.DS cs.IR cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | MinHash and SimHash are the two widely adopted Locality Sensitive Hashing
(LSH) algorithms for large-scale data processing applications. Deciding which
LSH to use for a particular problem at hand is an important question, which has
no clear answer in the existing literature. In this study, we provide a
theoretical answer (validated by experiments) that MinHash virtually always
outperforms SimHash when the data are binary, as common in practice such as
search.
The collision probability of MinHash is a function of resemblance similarity
($\mathcal{R}$), while the collision probability of SimHash is a function of
cosine similarity ($\mathcal{S}$). To provide a common basis for comparison, we
evaluate retrieval results in terms of $\mathcal{S}$ for both MinHash and
SimHash. This evaluation is valid as we can prove that MinHash is a valid LSH
with respect to $\mathcal{S}$, by using a general inequality $\mathcal{S}^2\leq
\mathcal{R}\leq \frac{\mathcal{S}}{2-\mathcal{S}}$. Our worst case analysis can
show that MinHash significantly outperforms SimHash in high similarity region.
Interestingly, our intensive experiments reveal that MinHash is also
substantially better than SimHash even in datasets where most of the data
points are not too similar to each other. This is partly because, in practical
data, often $\mathcal{R}\geq \frac{\mathcal{S}}{z-\mathcal{S}}$ holds where $z$
is only slightly larger than 2 (e.g., $z\leq 2.1$). Our restricted worst case
analysis by assuming $\frac{\mathcal{S}}{z-\mathcal{S}}\leq \mathcal{R}\leq
\frac{\mathcal{S}}{2-\mathcal{S}}$ shows that MinHash indeed significantly
outperforms SimHash even in low similarity region.
We believe the results in this paper will provide valuable guidelines for
search in practice, especially when the data are sparse.
| [
{
"version": "v1",
"created": "Wed, 16 Jul 2014 18:27:02 GMT"
}
] | 2014-07-17T00:00:00 | [
[
"Shrivastava",
"Anshumali",
""
],
[
"Li",
"Ping",
""
]
] | TITLE: In Defense of MinHash Over SimHash
ABSTRACT: MinHash and SimHash are the two widely adopted Locality Sensitive Hashing
(LSH) algorithms for large-scale data processing applications. Deciding which
LSH to use for a particular problem at hand is an important question, which has
no clear answer in the existing literature. In this study, we provide a
theoretical answer (validated by experiments) that MinHash virtually always
outperforms SimHash when the data are binary, as common in practice such as
search.
The collision probability of MinHash is a function of resemblance similarity
($\mathcal{R}$), while the collision probability of SimHash is a function of
cosine similarity ($\mathcal{S}$). To provide a common basis for comparison, we
evaluate retrieval results in terms of $\mathcal{S}$ for both MinHash and
SimHash. This evaluation is valid as we can prove that MinHash is a valid LSH
with respect to $\mathcal{S}$, by using a general inequality $\mathcal{S}^2\leq
\mathcal{R}\leq \frac{\mathcal{S}}{2-\mathcal{S}}$. Our worst case analysis can
show that MinHash significantly outperforms SimHash in high similarity region.
Interestingly, our intensive experiments reveal that MinHash is also
substantially better than SimHash even in datasets where most of the data
points are not too similar to each other. This is partly because, in practical
data, often $\mathcal{R}\geq \frac{\mathcal{S}}{z-\mathcal{S}}$ holds where $z$
is only slightly larger than 2 (e.g., $z\leq 2.1$). Our restricted worst case
analysis by assuming $\frac{\mathcal{S}}{z-\mathcal{S}}\leq \mathcal{R}\leq
\frac{\mathcal{S}}{2-\mathcal{S}}$ shows that MinHash indeed significantly
outperforms SimHash even in low similarity region.
We believe the results in this paper will provide valuable guidelines for
search in practice, especially when the data are sparse.
|
1403.4106 | Mario Vincenzo Tomasello | Mario Vincenzo Tomasello, Nicola Perra, Claudio Juan Tessone, M\'arton
Karsai, Frank Schweitzer | The role of endogenous and exogenous mechanisms in the formation of R&D
networks | 12 pages, 10 figures | Tomasello, M.V., Perra, N., Tessone, C.J., Karsai, M. &
Schweitzer, F. The role of endogenous and exogenous mechanisms in the
formation of R&D networks. Sci. Rep. 4, 5679 (2014) | 10.1038/srep05679 | null | physics.soc-ph cs.SI physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop an agent-based model of strategic link formation in Research and
Development (R&D) networks. Empirical evidence has shown that the growth of
these networks is driven by mechanisms which are both endogenous to the system
(that is, depending on existing alliances patterns) and exogenous (that is,
driven by an exploratory search for newcomer firms). Extant research to date
has not investigated both mechanisms simultaneously in a comparative manner. To
overcome this limitation, we develop a general modeling framework to shed light
on the relative importance of these two mechanisms. We test our model against a
comprehensive dataset, listing cross-country and cross-sectoral R&D alliances
from 1984 to 2009. Our results show that by fitting only three macroscopic
properties of the network topology, this framework is able to reproduce a
number of micro-level measures, including the distributions of degree, local
clustering, path length and component size, and the emergence of network
clusters. Furthermore, by estimating the link probabilities towards newcomers
and established firms from the data, we find that endogenous mechanisms are
predominant over the exogenous ones in the network formation, thus quantifying
the importance of existing structures in selecting partner firms.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2014 14:21:08 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Jul 2014 08:28:40 GMT"
}
] | 2014-07-16T00:00:00 | [
[
"Tomasello",
"Mario Vincenzo",
""
],
[
"Perra",
"Nicola",
""
],
[
"Tessone",
"Claudio Juan",
""
],
[
"Karsai",
"Márton",
""
],
[
"Schweitzer",
"Frank",
""
]
] | TITLE: The role of endogenous and exogenous mechanisms in the formation of R&D
networks
ABSTRACT: We develop an agent-based model of strategic link formation in Research and
Development (R&D) networks. Empirical evidence has shown that the growth of
these networks is driven by mechanisms which are both endogenous to the system
(that is, depending on existing alliances patterns) and exogenous (that is,
driven by an exploratory search for newcomer firms). Extant research to date
has not investigated both mechanisms simultaneously in a comparative manner. To
overcome this limitation, we develop a general modeling framework to shed light
on the relative importance of these two mechanisms. We test our model against a
comprehensive dataset, listing cross-country and cross-sectoral R&D alliances
from 1984 to 2009. Our results show that by fitting only three macroscopic
properties of the network topology, this framework is able to reproduce a
number of micro-level measures, including the distributions of degree, local
clustering, path length and component size, and the emergence of network
clusters. Furthermore, by estimating the link probabilities towards newcomers
and established firms from the data, we find that endogenous mechanisms are
predominant over the exogenous ones in the network formation, thus quantifying
the importance of existing structures in selecting partner firms.
|
1407.3867 | Ning Zhang | Ning Zhang, Jeff Donahue, Ross Girshick, Trevor Darrell | Part-based R-CNNs for Fine-grained Category Detection | 16 pages. To appear at European Conference on Computer Vision (ECCV),
2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semantic part localization can facilitate fine-grained categorization by
explicitly isolating subtle appearance differences associated with specific
object parts. Methods for pose-normalized representations have been proposed,
but generally presume bounding box annotations at test time due to the
difficulty of object detection. We propose a model for fine-grained
categorization that overcomes these limitations by leveraging deep
convolutional features computed on bottom-up region proposals. Our method
learns whole-object and part detectors, enforces learned geometric constraints
between them, and predicts a fine-grained category from a pose-normalized
representation. Experiments on the Caltech-UCSD bird dataset confirm that our
method outperforms state-of-the-art fine-grained categorization methods in an
end-to-end evaluation without requiring a bounding box at test time.
| [
{
"version": "v1",
"created": "Tue, 15 Jul 2014 02:32:16 GMT"
}
] | 2014-07-16T00:00:00 | [
[
"Zhang",
"Ning",
""
],
[
"Donahue",
"Jeff",
""
],
[
"Girshick",
"Ross",
""
],
[
"Darrell",
"Trevor",
""
]
] | TITLE: Part-based R-CNNs for Fine-grained Category Detection
ABSTRACT: Semantic part localization can facilitate fine-grained categorization by
explicitly isolating subtle appearance differences associated with specific
object parts. Methods for pose-normalized representations have been proposed,
but generally presume bounding box annotations at test time due to the
difficulty of object detection. We propose a model for fine-grained
categorization that overcomes these limitations by leveraging deep
convolutional features computed on bottom-up region proposals. Our method
learns whole-object and part detectors, enforces learned geometric constraints
between them, and predicts a fine-grained category from a pose-normalized
representation. Experiments on the Caltech-UCSD bird dataset confirm that our
method outperforms state-of-the-art fine-grained categorization methods in an
end-to-end evaluation without requiring a bounding box at test time.
|
1407.3950 | Anders Drachen Dr. | Anders Drachen, Christian Thurau, Rafet Sifa, Christian Bauckhage | A Comparison of Methods for Player Clustering via Behavioral Telemetry | Foundations of Digital Games 2013 | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The analysis of user behavior in digital games has been aided by the
introduction of user telemetry in game development, which provides
unprecedented access to quantitative data on user behavior from the installed
game clients of the entire population of players. Player behavior telemetry
datasets can be exceptionally complex, with features recorded for a varying
population of users over a temporal segment that can reach years in duration.
Categorization of behaviors, whether through descriptive methods (e.g.
segmention) or unsupervised/supervised learning techniques, is valuable for
finding patterns in the behavioral data, and developing profiles that are
actionable to game developers. There are numerous methods for unsupervised
clustering of user behavior, e.g. k-means/c-means, Non-negative Matrix
Factorization, or Principal Component Analysis. Although all yield behavior
categorizations, interpretation of the resulting categories in terms of actual
play behavior can be difficult if not impossible. In this paper, a range of
unsupervised techniques are applied together with Archetypal Analysis to
develop behavioral clusters from playtime data of 70,014 World of Warcraft
players, covering a five year interval. The techniques are evaluated with
respect to their ability to develop actionable behavioral profiles from the
dataset.
| [
{
"version": "v1",
"created": "Tue, 15 Jul 2014 11:41:39 GMT"
}
] | 2014-07-16T00:00:00 | [
[
"Drachen",
"Anders",
""
],
[
"Thurau",
"Christian",
""
],
[
"Sifa",
"Rafet",
""
],
[
"Bauckhage",
"Christian",
""
]
] | TITLE: A Comparison of Methods for Player Clustering via Behavioral Telemetry
ABSTRACT: The analysis of user behavior in digital games has been aided by the
introduction of user telemetry in game development, which provides
unprecedented access to quantitative data on user behavior from the installed
game clients of the entire population of players. Player behavior telemetry
datasets can be exceptionally complex, with features recorded for a varying
population of users over a temporal segment that can reach years in duration.
Categorization of behaviors, whether through descriptive methods (e.g.
segmention) or unsupervised/supervised learning techniques, is valuable for
finding patterns in the behavioral data, and developing profiles that are
actionable to game developers. There are numerous methods for unsupervised
clustering of user behavior, e.g. k-means/c-means, Non-negative Matrix
Factorization, or Principal Component Analysis. Although all yield behavior
categorizations, interpretation of the resulting categories in terms of actual
play behavior can be difficult if not impossible. In this paper, a range of
unsupervised techniques are applied together with Archetypal Analysis to
develop behavioral clusters from playtime data of 70,014 World of Warcraft
players, covering a five year interval. The techniques are evaluated with
respect to their ability to develop actionable behavioral profiles from the
dataset.
|
1407.4075 | Grigori Fursin | Lianjie Luo and Yang Chen and Chengyong Wu and Shun Long and Grigori
Fursin | Finding representative sets of optimizations for adaptive
multiversioning applications | 3rd Workshop on Statistical and Machine Learning Approaches Applied
to Architectures and Compilation (SMART'09), co-located with HiPEAC'09
conference, Paphos, Cyprus, 2009 | null | null | null | cs.PL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Iterative compilation is a widely adopted technique to optimize programs for
different constraints such as performance, code size and power consumption in
rapidly evolving hardware and software environments. However, in case of
statically compiled programs, it is often restricted to optimizations for a
specific dataset and may not be applicable to applications that exhibit
different run-time behavior across program phases, multiple datasets or when
executed in heterogeneous, reconfigurable and virtual environments. Several
frameworks have been recently introduced to tackle these problems and enable
run-time optimization and adaptation for statically compiled programs based on
static function multiversioning and monitoring of online program behavior. In
this article, we present a novel technique to select a minimal set of
representative optimization variants (function versions) for such frameworks
while avoiding performance loss across available datasets and code-size
explosion. We developed a novel mapping mechanism using popular decision tree
or rule induction based machine learning techniques to rapidly select best code
versions at run-time based on dataset features and minimize selection overhead.
These techniques enable creation of self-tuning static binaries or libraries
adaptable to changing behavior and environments at run-time using staged
compilation that do not require complex recompilation frameworks while
effectively outperforming traditional single-version non-adaptable code.
| [
{
"version": "v1",
"created": "Mon, 14 Jul 2014 17:55:07 GMT"
}
] | 2014-07-16T00:00:00 | [
[
"Luo",
"Lianjie",
""
],
[
"Chen",
"Yang",
""
],
[
"Wu",
"Chengyong",
""
],
[
"Long",
"Shun",
""
],
[
"Fursin",
"Grigori",
""
]
] | TITLE: Finding representative sets of optimizations for adaptive
multiversioning applications
ABSTRACT: Iterative compilation is a widely adopted technique to optimize programs for
different constraints such as performance, code size and power consumption in
rapidly evolving hardware and software environments. However, in case of
statically compiled programs, it is often restricted to optimizations for a
specific dataset and may not be applicable to applications that exhibit
different run-time behavior across program phases, multiple datasets or when
executed in heterogeneous, reconfigurable and virtual environments. Several
frameworks have been recently introduced to tackle these problems and enable
run-time optimization and adaptation for statically compiled programs based on
static function multiversioning and monitoring of online program behavior. In
this article, we present a novel technique to select a minimal set of
representative optimization variants (function versions) for such frameworks
while avoiding performance loss across available datasets and code-size
explosion. We developed a novel mapping mechanism using popular decision tree
or rule induction based machine learning techniques to rapidly select best code
versions at run-time based on dataset features and minimize selection overhead.
These techniques enable creation of self-tuning static binaries or libraries
adaptable to changing behavior and environments at run-time using staged
compilation that do not require complex recompilation frameworks while
effectively outperforming traditional single-version non-adaptable code.
|
1402.0589 | Thomas L\'eaut\'e | Thomas Leaute, Boi Faltings | Protecting Privacy through Distributed Computation in Multi-agent
Decision Making | null | Journal Of Artificial Intelligence Research, Volume 47, pages
649-695, 2013 | 10.1613/jair.3983 | null | cs.AI cs.CR cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As large-scale theft of data from corporate servers is becoming increasingly
common, it becomes interesting to examine alternatives to the paradigm of
centralizing sensitive data into large databases. Instead, one could use
cryptography and distributed computation so that sensitive data can be supplied
and processed in encrypted form, and only the final result is made known. In
this paper, we examine how such a paradigm can be used to implement constraint
satisfaction, a technique that can solve a broad class of AI problems such as
resource allocation, planning, scheduling, and diagnosis. Most previous work on
privacy in constraint satisfaction only attempted to protect specific types of
information, in particular the feasibility of particular combinations of
decisions. We formalize and extend these restricted notions of privacy by
introducing four types of private information, including the feasibility of
decisions and the final decisions made, but also the identities of the
participants and the topology of the problem. We present distributed algorithms
that allow computing solutions to constraint satisfaction problems while
maintaining these four types of privacy. We formally prove the privacy
properties of these algorithms, and show experiments that compare their
respective performance on benchmark problems.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 01:44:50 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Jul 2014 22:20:22 GMT"
}
] | 2014-07-15T00:00:00 | [
[
"Leaute",
"Thomas",
""
],
[
"Faltings",
"Boi",
""
]
] | TITLE: Protecting Privacy through Distributed Computation in Multi-agent
Decision Making
ABSTRACT: As large-scale theft of data from corporate servers is becoming increasingly
common, it becomes interesting to examine alternatives to the paradigm of
centralizing sensitive data into large databases. Instead, one could use
cryptography and distributed computation so that sensitive data can be supplied
and processed in encrypted form, and only the final result is made known. In
this paper, we examine how such a paradigm can be used to implement constraint
satisfaction, a technique that can solve a broad class of AI problems such as
resource allocation, planning, scheduling, and diagnosis. Most previous work on
privacy in constraint satisfaction only attempted to protect specific types of
information, in particular the feasibility of particular combinations of
decisions. We formalize and extend these restricted notions of privacy by
introducing four types of private information, including the feasibility of
decisions and the final decisions made, but also the identities of the
participants and the topology of the problem. We present distributed algorithms
that allow computing solutions to constraint satisfaction problems while
maintaining these four types of privacy. We formally prove the privacy
properties of these algorithms, and show experiments that compare their
respective performance on benchmark problems.
|
1402.0790 | Philipp Singer | Philipp Singer, Denis Helic, Behnam Taraghi and Markus Strohmaier | Detecting Memory and Structure in Human Navigation Patterns Using Markov
Chain Models of Varying Order | null | PLoS ONE, vol 9(7), 2014 | 10.1371/journal.pone.0102070 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most frequently used models for understanding human navigation on
the Web is the Markov chain model, where Web pages are represented as states
and hyperlinks as probabilities of navigating from one page to another.
Predominantly, human navigation on the Web has been thought to satisfy the
memoryless Markov property stating that the next page a user visits only
depends on her current page and not on previously visited ones. This idea has
found its way in numerous applications such as Google's PageRank algorithm and
others. Recently, new studies suggested that human navigation may better be
modeled using higher order Markov chain models, i.e., the next page depends on
a longer history of past clicks. Yet, this finding is preliminary and does not
account for the higher complexity of higher order Markov chain models which is
why the memoryless model is still widely used. In this work we thoroughly
present a diverse array of advanced inference methods for determining the
appropriate Markov chain order. We highlight strengths and weaknesses of each
method and apply them for investigating memory and structure of human
navigation on the Web. Our experiments reveal that the complexity of higher
order models grows faster than their utility, and thus we confirm that the
memoryless model represents a quite practical model for human navigation on a
page level. However, when we expand our analysis to a topical level, where we
abstract away from specific page transitions to transitions between topics, we
find that the memoryless assumption is violated and specific regularities can
be observed. We report results from experiments with two types of navigational
datasets (goal-oriented vs. free form) and observe interesting structural
differences that make a strong argument for more contextual studies of human
navigation in future work.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 16:25:46 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jun 2014 08:58:24 GMT"
}
] | 2014-07-15T00:00:00 | [
[
"Singer",
"Philipp",
""
],
[
"Helic",
"Denis",
""
],
[
"Taraghi",
"Behnam",
""
],
[
"Strohmaier",
"Markus",
""
]
] | TITLE: Detecting Memory and Structure in Human Navigation Patterns Using Markov
Chain Models of Varying Order
ABSTRACT: One of the most frequently used models for understanding human navigation on
the Web is the Markov chain model, where Web pages are represented as states
and hyperlinks as probabilities of navigating from one page to another.
Predominantly, human navigation on the Web has been thought to satisfy the
memoryless Markov property stating that the next page a user visits only
depends on her current page and not on previously visited ones. This idea has
found its way in numerous applications such as Google's PageRank algorithm and
others. Recently, new studies suggested that human navigation may better be
modeled using higher order Markov chain models, i.e., the next page depends on
a longer history of past clicks. Yet, this finding is preliminary and does not
account for the higher complexity of higher order Markov chain models which is
why the memoryless model is still widely used. In this work we thoroughly
present a diverse array of advanced inference methods for determining the
appropriate Markov chain order. We highlight strengths and weaknesses of each
method and apply them for investigating memory and structure of human
navigation on the Web. Our experiments reveal that the complexity of higher
order models grows faster than their utility, and thus we confirm that the
memoryless model represents a quite practical model for human navigation on a
page level. However, when we expand our analysis to a topical level, where we
abstract away from specific page transitions to transitions between topics, we
find that the memoryless assumption is violated and specific regularities can
be observed. We report results from experiments with two types of navigational
datasets (goal-oriented vs. free form) and observe interesting structural
differences that make a strong argument for more contextual studies of human
navigation in future work.
|
1404.6635 | Gugan Thoppe | Gugan Thoppe, Vivek S. Borkar, Dinesh Garg | Greedy Block Coordinate Descent (GBCD) Method for High Dimensional
Quadratic Programs | 29 pages, 3 figures, New references added | null | null | null | math.OC cs.SY stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High dimensional unconstrained quadratic programs (UQPs) involving massive
datasets are now common in application areas such as web, social networks, etc.
Unless computational resources that match up to these datasets are available,
solving such problems using classical UQP methods is very difficult. This paper
discusses alternatives. We first define high dimensional compliant (HDC)
methods for UQPs---methods that can solve high dimensional UQPs by adapting to
available computational resources. We then show that the class of block
Kaczmarz and block coordinate descent (BCD) are the only existing methods that
can be made HDC. As a possible answer to the question of the `best' amongst BCD
methods for UQP, we propose a novel greedy BCD (GBCD) method with serial,
parallel and distributed variants. Convergence rates and numerical tests
confirm that the GBCD is indeed an effective method to solve high dimensional
UQPs. In fact, it sometimes beats even the conjugate gradient.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2014 11:36:46 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jul 2014 12:05:55 GMT"
},
{
"version": "v3",
"created": "Sat, 12 Jul 2014 08:04:36 GMT"
}
] | 2014-07-15T00:00:00 | [
[
"Thoppe",
"Gugan",
""
],
[
"Borkar",
"Vivek S.",
""
],
[
"Garg",
"Dinesh",
""
]
] | TITLE: Greedy Block Coordinate Descent (GBCD) Method for High Dimensional
Quadratic Programs
ABSTRACT: High dimensional unconstrained quadratic programs (UQPs) involving massive
datasets are now common in application areas such as web, social networks, etc.
Unless computational resources that match up to these datasets are available,
solving such problems using classical UQP methods is very difficult. This paper
discusses alternatives. We first define high dimensional compliant (HDC)
methods for UQPs---methods that can solve high dimensional UQPs by adapting to
available computational resources. We then show that the class of block
Kaczmarz and block coordinate descent (BCD) are the only existing methods that
can be made HDC. As a possible answer to the question of the `best' amongst BCD
methods for UQP, we propose a novel greedy BCD (GBCD) method with serial,
parallel and distributed variants. Convergence rates and numerical tests
confirm that the GBCD is indeed an effective method to solve high dimensional
UQPs. In fact, it sometimes beats even the conjugate gradient.
|
1406.6631 | Aggelos Biboudis | Aggelos Biboudis, Nick Palladinos and Yannis Smaragdakis | Clash of the Lambdas | In the revised version: 1) we used a fixed heap with 3GB. The GC
throughput was improved and results are more balanced, 2) we discussed
briefly why we chose not to use targeted JVM flags, 3) we discussed
@specialized and miniboxing, 4) we added a new benchmark that tests a
streaming operation that avoids automatic boxing of our input data and 5) a
subtitle was added | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The introduction of lambdas in Java 8 completes the slate of
statically-typed, mainstream languages with both object-oriented and functional
features. The main motivation for lambdas in Java has been to facilitate
stream-based declarative APIs, and, therefore, easier parallelism. In this
paper, we evaluate the performance impact of lambda abstraction employed in
stream processing, for a variety of high-level languages that run on a virtual
machine (C#, F#, Java and Scala) and runtime platforms (JVM on Linux and
Windows, .NET CLR for Windows, Mono for Linux). Furthermore, we evaluate the
performance gain that two optimizing libraries (ScalaBlitz and LinqOptimizer)
can offer for C#, F# and Scala. Our study is based on small-scale
throughput-benchmarking, with significant care to isolate different factors,
consult experts on the systems involved, and identify causes and opportunities.
We find that Java exhibits high implementation maturity, which is a dominant
factor in benchmarks. At the same time, optimizing frameworks can be highly
effective for common query patterns.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2014 16:33:11 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jul 2014 11:24:58 GMT"
}
] | 2014-07-15T00:00:00 | [
[
"Biboudis",
"Aggelos",
""
],
[
"Palladinos",
"Nick",
""
],
[
"Smaragdakis",
"Yannis",
""
]
] | TITLE: Clash of the Lambdas
ABSTRACT: The introduction of lambdas in Java 8 completes the slate of
statically-typed, mainstream languages with both object-oriented and functional
features. The main motivation for lambdas in Java has been to facilitate
stream-based declarative APIs, and, therefore, easier parallelism. In this
paper, we evaluate the performance impact of lambda abstraction employed in
stream processing, for a variety of high-level languages that run on a virtual
machine (C#, F#, Java and Scala) and runtime platforms (JVM on Linux and
Windows, .NET CLR for Windows, Mono for Linux). Furthermore, we evaluate the
performance gain that two optimizing libraries (ScalaBlitz and LinqOptimizer)
can offer for C#, F# and Scala. Our study is based on small-scale
throughput-benchmarking, with significant care to isolate different factors,
consult experts on the systems involved, and identify causes and opportunities.
We find that Java exhibits high implementation maturity, which is a dominant
factor in benchmarks. At the same time, optimizing frameworks can be highly
effective for common query patterns.
|
1407.0342 | Jinwei Xu | Jinwei Xu, Jiankun Hu, Xiuping Jia | A New Path to Construct Parametric Orientation Field: Sparse FOMFE Model
and Compressed Sparse FOMFE Model | null | null | null | null | cs.CV cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Orientation field, representing the fingerprint ridge structure direction,
plays a crucial role in fingerprint-related image processing tasks. Orientation
field is able to be constructed by either non-parametric or parametric methods.
In this paper, the advantages and disadvantages regarding to the existing
non-parametric and parametric approaches are briefly summarized. With the
further investigation for constructing the orientation field by parametric
technique, two new models - sparse FOMFE model and compressed sparse FOMFE
model are introduced, based on the rapidly developing signal sparse
representation and compressed sensing theories. The experiments on high-quality
fingerprint image dataset (plain and rolled print) and poor-quality fingerprint
image dataset (latent print) demonstrate their feasibilities to construct the
orientation field in a sparse or even compressed sparse mode. The comparisons
among the state-of-art orientation field modeling approaches show that the
proposed two models have the potential availability in big data-oriented
fingerprint indexing tasks.
| [
{
"version": "v1",
"created": "Tue, 1 Jul 2014 18:18:39 GMT"
}
] | 2014-07-15T00:00:00 | [
[
"Xu",
"Jinwei",
""
],
[
"Hu",
"Jiankun",
""
],
[
"Jia",
"Xiuping",
""
]
] | TITLE: A New Path to Construct Parametric Orientation Field: Sparse FOMFE Model
and Compressed Sparse FOMFE Model
ABSTRACT: Orientation field, representing the fingerprint ridge structure direction,
plays a crucial role in fingerprint-related image processing tasks. Orientation
field is able to be constructed by either non-parametric or parametric methods.
In this paper, the advantages and disadvantages regarding to the existing
non-parametric and parametric approaches are briefly summarized. With the
further investigation for constructing the orientation field by parametric
technique, two new models - sparse FOMFE model and compressed sparse FOMFE
model are introduced, based on the rapidly developing signal sparse
representation and compressed sensing theories. The experiments on high-quality
fingerprint image dataset (plain and rolled print) and poor-quality fingerprint
image dataset (latent print) demonstrate their feasibilities to construct the
orientation field in a sparse or even compressed sparse mode. The comparisons
among the state-of-art orientation field modeling approaches show that the
proposed two models have the potential availability in big data-oriented
fingerprint indexing tasks.
|
1407.3383 | Joris van der Hoeven | Joris van der Hoeven, Gr\'egoire Lecerf, Guillaume Quintin | Modular SIMD arithmetic in Mathemagix | null | null | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modular integer arithmetic occurs in many algorithms for computer algebra,
cryptography, and error correcting codes. Although recent microprocessors
typically offer a wide range of highly optimized arithmetic functions, modular
integer operations still require dedicated implementations. In this article, we
survey existing algorithms for modular integer arithmetic, and present detailed
vectorized counterparts. We also present several applications, such as fast
modular Fourier transforms and multiplication of integer polynomials and
matrices. The vectorized algorithms have been implemented in C++ inside the
free computer algebra and analysis system Mathemagix. The performance of our
implementation is illustrated by various benchmarks.
| [
{
"version": "v1",
"created": "Sat, 12 Jul 2014 13:21:01 GMT"
}
] | 2014-07-15T00:00:00 | [
[
"van der Hoeven",
"Joris",
""
],
[
"Lecerf",
"Grégoire",
""
],
[
"Quintin",
"Guillaume",
""
]
] | TITLE: Modular SIMD arithmetic in Mathemagix
ABSTRACT: Modular integer arithmetic occurs in many algorithms for computer algebra,
cryptography, and error correcting codes. Although recent microprocessors
typically offer a wide range of highly optimized arithmetic functions, modular
integer operations still require dedicated implementations. In this article, we
survey existing algorithms for modular integer arithmetic, and present detailed
vectorized counterparts. We also present several applications, such as fast
modular Fourier transforms and multiplication of integer polynomials and
matrices. The vectorized algorithms have been implemented in C++ inside the
free computer algebra and analysis system Mathemagix. The performance of our
implementation is illustrated by various benchmarks.
|
1407.3487 | Grigori Fursin | Grigori Fursin | Collective Tuning Initiative | GCC Developers' Summit'09, 14 June 2009, Montreal, Canada | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computing systems rarely deliver best possible performance due to ever
increasing hardware and software complexity and limitations of the current
optimization technology. Additional code and architecture optimizations are
often required to improve execution time, size, power consumption, reliability
and other important characteristics of computing systems. However, it is often
a tedious, repetitive, isolated and time consuming process. In order to
automate, simplify and systematize program optimization and architecture
design, we are developing open-source modular plugin-based Collective Tuning
Infrastructure (CTI, http://cTuning.org) that can distribute optimization
process and leverage optimization experience of multiple users. CTI provides a
novel fully integrated, collaborative, "one button" approach to improve
existing underperfoming computing systems ranging from embedded architectures
to high-performance servers based on systematic iterative compilation,
statistical collective optimization and machine learning. Our experimental
results show that it is possible to reduce execution time (and code size) of
some programs from SPEC2006 and EEMBC among others by more than a factor of 2
automatically. It can also reduce development and testing time considerably.
Together with the first production quality machine learning enabled interactive
research compiler (MILEPOST GCC) this infrastructure opens up many research
opportunities to study and develop future realistic self-tuning and
self-organizing adaptive intelligent computing systems based on systematic
statistical performance evaluation and benchmarking. Finally, using common
optimization repository is intended to improve the quality and reproducibility
of the research on architecture and code optimization.
| [
{
"version": "v1",
"created": "Sun, 13 Jul 2014 17:13:17 GMT"
}
] | 2014-07-15T00:00:00 | [
[
"Fursin",
"Grigori",
""
]
] | TITLE: Collective Tuning Initiative
ABSTRACT: Computing systems rarely deliver best possible performance due to ever
increasing hardware and software complexity and limitations of the current
optimization technology. Additional code and architecture optimizations are
often required to improve execution time, size, power consumption, reliability
and other important characteristics of computing systems. However, it is often
a tedious, repetitive, isolated and time consuming process. In order to
automate, simplify and systematize program optimization and architecture
design, we are developing open-source modular plugin-based Collective Tuning
Infrastructure (CTI, http://cTuning.org) that can distribute optimization
process and leverage optimization experience of multiple users. CTI provides a
novel fully integrated, collaborative, "one button" approach to improve
existing underperfoming computing systems ranging from embedded architectures
to high-performance servers based on systematic iterative compilation,
statistical collective optimization and machine learning. Our experimental
results show that it is possible to reduce execution time (and code size) of
some programs from SPEC2006 and EEMBC among others by more than a factor of 2
automatically. It can also reduce development and testing time considerably.
Together with the first production quality machine learning enabled interactive
research compiler (MILEPOST GCC) this infrastructure opens up many research
opportunities to study and develop future realistic self-tuning and
self-organizing adaptive intelligent computing systems based on systematic
statistical performance evaluation and benchmarking. Finally, using common
optimization repository is intended to improve the quality and reproducibility
of the research on architecture and code optimization.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.