id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1407.3685
Anthony Bagnall Dr
Anthony Bagnall, Jon Hills and Jason Lines
Finding Motif Sets in Time Series
null
null
null
CMPC14-03
cs.LG cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-series motifs are representative subsequences that occur frequently in a time series; a motif set is the set of subsequences deemed to be instances of a given motif. We focus on finding motif sets. Our motivation is to detect motif sets in household electricity-usage profiles, representing repeated patterns of household usage. We propose three algorithms for finding motif sets. Two are greedy algorithms based on pairwise comparison, and the third uses a heuristic measure of set quality to find the motif set directly. We compare these algorithms on simulated datasets and on electricity-usage data. We show that Scan MK, the simplest way of using the best-matching pair to find motif sets, is less accurate on our synthetic data than Set Finder and Cluster MK, although the latter is very sensitive to parameter settings. We qualitatively analyse the outputs for the electricity-usage data and demonstrate that both Scan MK and Set Finder can discover useful motif sets in such data.
[ { "version": "v1", "created": "Mon, 14 Jul 2014 15:01:57 GMT" } ]
2014-07-15T00:00:00
[ [ "Bagnall", "Anthony", "" ], [ "Hills", "Jon", "" ], [ "Lines", "Jason", "" ] ]
TITLE: Finding Motif Sets in Time Series ABSTRACT: Time-series motifs are representative subsequences that occur frequently in a time series; a motif set is the set of subsequences deemed to be instances of a given motif. We focus on finding motif sets. Our motivation is to detect motif sets in household electricity-usage profiles, representing repeated patterns of household usage. We propose three algorithms for finding motif sets. Two are greedy algorithms based on pairwise comparison, and the third uses a heuristic measure of set quality to find the motif set directly. We compare these algorithms on simulated datasets and on electricity-usage data. We show that Scan MK, the simplest way of using the best-matching pair to find motif sets, is less accurate on our synthetic data than Set Finder and Cluster MK, although the latter is very sensitive to parameter settings. We qualitatively analyse the outputs for the electricity-usage data and demonstrate that both Scan MK and Set Finder can discover useful motif sets in such data.
1407.3686
Alejandro Gonz\'alez Alzate
Alejandro Gonz\'alez and Sebastian Ramos and David V\'azquez and Antonio M. L\'opez and Jaume Amores
Spatiotemporal Stacked Sequential Learning for Pedestrian Detection
8 pages, 5 figure, 1 table
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pedestrian classifiers decide which image windows contain a pedestrian. In practice, such classifiers provide a relatively high response at neighbor windows overlapping a pedestrian, while the responses around potential false positives are expected to be lower. An analogous reasoning applies for image sequences. If there is a pedestrian located within a frame, the same pedestrian is expected to appear close to the same location in neighbor frames. Therefore, such a location has chances of receiving high classification scores during several frames, while false positives are expected to be more spurious. In this paper we propose to exploit such correlations for improving the accuracy of base pedestrian classifiers. In particular, we propose to use two-stage classifiers which not only rely on the image descriptors required by the base classifiers but also on the response of such base classifiers in a given spatiotemporal neighborhood. More specifically, we train pedestrian classifiers using a stacked sequential learning (SSL) paradigm. We use a new pedestrian dataset we have acquired from a car to evaluate our proposal at different frame rates. We also test on a well known dataset: Caltech. The obtained results show that our SSL proposal boosts detection accuracy significantly with a minimal impact on the computational cost. Interestingly, SSL improves more the accuracy at the most dangerous situations, i.e. when a pedestrian is close to the camera.
[ { "version": "v1", "created": "Mon, 14 Jul 2014 15:03:01 GMT" } ]
2014-07-15T00:00:00
[ [ "González", "Alejandro", "" ], [ "Ramos", "Sebastian", "" ], [ "Vázquez", "David", "" ], [ "López", "Antonio M.", "" ], [ "Amores", "Jaume", "" ] ]
TITLE: Spatiotemporal Stacked Sequential Learning for Pedestrian Detection ABSTRACT: Pedestrian classifiers decide which image windows contain a pedestrian. In practice, such classifiers provide a relatively high response at neighbor windows overlapping a pedestrian, while the responses around potential false positives are expected to be lower. An analogous reasoning applies for image sequences. If there is a pedestrian located within a frame, the same pedestrian is expected to appear close to the same location in neighbor frames. Therefore, such a location has chances of receiving high classification scores during several frames, while false positives are expected to be more spurious. In this paper we propose to exploit such correlations for improving the accuracy of base pedestrian classifiers. In particular, we propose to use two-stage classifiers which not only rely on the image descriptors required by the base classifiers but also on the response of such base classifiers in a given spatiotemporal neighborhood. More specifically, we train pedestrian classifiers using a stacked sequential learning (SSL) paradigm. We use a new pedestrian dataset we have acquired from a car to evaluate our proposal at different frame rates. We also test on a well known dataset: Caltech. The obtained results show that our SSL proposal boosts detection accuracy significantly with a minimal impact on the computational cost. Interestingly, SSL improves more the accuracy at the most dangerous situations, i.e. when a pedestrian is close to the camera.
1407.3745
Sutanay Choudhury
Sutanay Choudhury, Lawrence Holder, George Chin, Patrick Mackey, Khushbu Agarwal, John Feo
Query Optimization for Dynamic Graphs
null
null
null
PNNL-SA-103238, Pacific Northwest National Laboratory, Richland, WA
cs.DB
http://creativecommons.org/licenses/publicdomain/
Given a query graph that represents a pattern of interest, the emerging pattern detection problem can be viewed as a continuous query problem on a dynamic graph. We present an incremental algorithm for continuous query processing on dynamic graphs. The algorithm is based on the concept of query decomposition; we decompose a query graph into smaller subgraphs and assemble the result of sub-queries to find complete matches with the specified query. The novelty of our work lies in using the subgraph distributional statistics collected from the dynamic graph to generate the decomposition. We introduce a "Lazy Search" algorithm where the search strategy is decided on a vertex-to-vertex basis depending on the likelihood of a match in the vertex neighborhood. We also propose a metric named "Relative Selectivity" that is used to select between different query decomposition strategies. Our experiments performed on real online news, network traffic stream and a synthetic social network benchmark demonstrate 10-100x speedups over competing approaches.
[ { "version": "v1", "created": "Mon, 14 Jul 2014 17:53:30 GMT" } ]
2014-07-15T00:00:00
[ [ "Choudhury", "Sutanay", "" ], [ "Holder", "Lawrence", "" ], [ "Chin", "George", "" ], [ "Mackey", "Patrick", "" ], [ "Agarwal", "Khushbu", "" ], [ "Feo", "John", "" ] ]
TITLE: Query Optimization for Dynamic Graphs ABSTRACT: Given a query graph that represents a pattern of interest, the emerging pattern detection problem can be viewed as a continuous query problem on a dynamic graph. We present an incremental algorithm for continuous query processing on dynamic graphs. The algorithm is based on the concept of query decomposition; we decompose a query graph into smaller subgraphs and assemble the result of sub-queries to find complete matches with the specified query. The novelty of our work lies in using the subgraph distributional statistics collected from the dynamic graph to generate the decomposition. We introduce a "Lazy Search" algorithm where the search strategy is decided on a vertex-to-vertex basis depending on the likelihood of a match in the vertex neighborhood. We also propose a metric named "Relative Selectivity" that is used to select between different query decomposition strategies. Our experiments performed on real online news, network traffic stream and a synthetic social network benchmark demonstrate 10-100x speedups over competing approaches.
1407.3751
Sutanay Choudhury
Sutanay Choudhury, Chase Dowling
Benchmarking Named Entity Disambiguation approaches for Streaming Graphs
null
null
null
PNNL-23455 2014-05, Pacific Northwest National Laboratory, Richland, WA
cs.CL cs.IR
http://creativecommons.org/licenses/publicdomain/
Named Entity Disambiaguation (NED) is a central task for applications dealing with natural language text. Assume that we have a graph based knowledge base (subsequently referred as Knowledge Graph) where nodes represent various real world entities such as people, location, organization and concepts. Given data sources such as social media streams and web pages Entity Linking is the task of mapping named entities that are extracted from the data to those present in the Knowledge Graph. This is an inherently difficult task due to several reasons. Almost all these data sources are generated without any formal ontology; the unstructured nature of the input, limited context and the ambiguity involved when multiple entities are mapped to the same name make this a hard task. This report looks at two state of the art systems employing two distinctive approaches: graph based Accurate Online Disambiguation of Entities (AIDA) and Mined Evidence Named Entity Disambiguation (MENED), which employs a statistical inference approach. We compare both approaches using the data set and queries provided by the Knowledge Base Population (KBP) track at 2011 NIST Text Analytics Conference (TAC). This report begins with an overview of the respective approaches, followed by detailed description of the experimental setup. It concludes with our findings from the benchmarking exercise.
[ { "version": "v1", "created": "Mon, 14 Jul 2014 18:01:08 GMT" } ]
2014-07-15T00:00:00
[ [ "Choudhury", "Sutanay", "" ], [ "Dowling", "Chase", "" ] ]
TITLE: Benchmarking Named Entity Disambiguation approaches for Streaming Graphs ABSTRACT: Named Entity Disambiaguation (NED) is a central task for applications dealing with natural language text. Assume that we have a graph based knowledge base (subsequently referred as Knowledge Graph) where nodes represent various real world entities such as people, location, organization and concepts. Given data sources such as social media streams and web pages Entity Linking is the task of mapping named entities that are extracted from the data to those present in the Knowledge Graph. This is an inherently difficult task due to several reasons. Almost all these data sources are generated without any formal ontology; the unstructured nature of the input, limited context and the ambiguity involved when multiple entities are mapped to the same name make this a hard task. This report looks at two state of the art systems employing two distinctive approaches: graph based Accurate Online Disambiguation of Entities (AIDA) and Mined Evidence Named Entity Disambiguation (MENED), which employs a statistical inference approach. We compare both approaches using the data set and queries provided by the Knowledge Base Population (KBP) track at 2011 NIST Text Analytics Conference (TAC). This report begins with an overview of the respective approaches, followed by detailed description of the experimental setup. It concludes with our findings from the benchmarking exercise.
1306.5794
Zohar Nussinov
Richard K. Darst, David R. Reichman, Peter Ronhovde, Zohar Nussinov
Algorithm independent bounds on community detection problems and associated transitions in stochastic block model graphs
21 pages, 9 figures
null
null
null
cond-mat.stat-mech cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive rigorous bounds for well-defined community structure in complex networks for a stochastic block model (SBM) benchmark. In particular, we analyze the effect of inter-community "noise" (inter-community edges) on any "community detection" algorithm's ability to correctly group nodes assigned to a planted partition, a problem which has been proven to be NP complete in a standard rendition. Our result does not rely on the use of any one particular algorithm nor on the analysis of the limitations of inference. Rather, we turn the problem on its head and work backwards to examine when, in the first place, well defined structure may exist in SBMs.The method that we introduce here could potentially be applied to other computational problems. The objective of community detection algorithms is to partition a given network into optimally disjoint subgraphs (or communities). Similar to k-SAT and other combinatorial optimization problems, "community detection" exhibits different phases. Networks that lie in the "unsolvable phase" lack well-defined structure and thus have no partition that is meaningful. Solvable systems splinter into two disparate phases: those in the "hard" phase and those in the "easy" phase. As befits its name, within the easy phase, a partition is easy to achieve by known algorithms. When a network lies in the hard phase, it still has an underlying structure yet finding a meaningful partition which can be checked in polynomial time requires an exhaustive computational effort that rapidly increases with the size of the graph. When taken together, (i) the rigorous results that we report here on when graphs have an underlying structure and (ii) recent results concerning the limits of rather general algorithms, suggest bounds on the hard phase.
[ { "version": "v1", "created": "Mon, 24 Jun 2013 22:10:50 GMT" }, { "version": "v2", "created": "Fri, 28 Jun 2013 00:39:44 GMT" }, { "version": "v3", "created": "Thu, 10 Jul 2014 21:20:32 GMT" } ]
2014-07-14T00:00:00
[ [ "Darst", "Richard K.", "" ], [ "Reichman", "David R.", "" ], [ "Ronhovde", "Peter", "" ], [ "Nussinov", "Zohar", "" ] ]
TITLE: Algorithm independent bounds on community detection problems and associated transitions in stochastic block model graphs ABSTRACT: We derive rigorous bounds for well-defined community structure in complex networks for a stochastic block model (SBM) benchmark. In particular, we analyze the effect of inter-community "noise" (inter-community edges) on any "community detection" algorithm's ability to correctly group nodes assigned to a planted partition, a problem which has been proven to be NP complete in a standard rendition. Our result does not rely on the use of any one particular algorithm nor on the analysis of the limitations of inference. Rather, we turn the problem on its head and work backwards to examine when, in the first place, well defined structure may exist in SBMs.The method that we introduce here could potentially be applied to other computational problems. The objective of community detection algorithms is to partition a given network into optimally disjoint subgraphs (or communities). Similar to k-SAT and other combinatorial optimization problems, "community detection" exhibits different phases. Networks that lie in the "unsolvable phase" lack well-defined structure and thus have no partition that is meaningful. Solvable systems splinter into two disparate phases: those in the "hard" phase and those in the "easy" phase. As befits its name, within the easy phase, a partition is easy to achieve by known algorithms. When a network lies in the hard phase, it still has an underlying structure yet finding a meaningful partition which can be checked in polynomial time requires an exhaustive computational effort that rapidly increases with the size of the graph. When taken together, (i) the rigorous results that we report here on when graphs have an underlying structure and (ii) recent results concerning the limits of rather general algorithms, suggest bounds on the hard phase.
1407.2987
Eren Golge
Eren Golge and Pinar Duygulu
FAME: Face Association through Model Evolution
Draft version of the study
null
null
null
cs.CV cs.AI cs.IR cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
We attack the problem of learning face models for public faces from weakly-labelled images collected from web through querying a name. The data is very noisy even after face detection, with several irrelevant faces corresponding to other people. We propose a novel method, Face Association through Model Evolution (FAME), that is able to prune the data in an iterative way, for the face models associated to a name to evolve. The idea is based on capturing discriminativeness and representativeness of each instance and eliminating the outliers. The final models are used to classify faces on novel datasets with possibly different characteristics. On benchmark datasets, our results are comparable to or better than state-of-the-art studies for the task of face identification.
[ { "version": "v1", "created": "Thu, 10 Jul 2014 23:52:44 GMT" } ]
2014-07-14T00:00:00
[ [ "Golge", "Eren", "" ], [ "Duygulu", "Pinar", "" ] ]
TITLE: FAME: Face Association through Model Evolution ABSTRACT: We attack the problem of learning face models for public faces from weakly-labelled images collected from web through querying a name. The data is very noisy even after face detection, with several irrelevant faces corresponding to other people. We propose a novel method, Face Association through Model Evolution (FAME), that is able to prune the data in an iterative way, for the face models associated to a name to evolve. The idea is based on capturing discriminativeness and representativeness of each instance and eliminating the outliers. The final models are used to classify faces on novel datasets with possibly different characteristics. On benchmark datasets, our results are comparable to or better than state-of-the-art studies for the task of face identification.
1407.3262
Brice Boyer
Brice Boyer, Jean-Guillaume Dumas (LJK), Pascal Giorgi (LIRMM), Cl\'ement Pernet (INRIA Grenoble Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble), B. David Saunders (CIS)
Elements of Design for Containers and Solutions in the LinBox Library
8 pages, 4th International Congress on Mathematical Software, Seoul : Korea, Republic Of (2014)
null
null
null
cs.MS cs.SC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe in this paper new design techniques used in the \cpp exact linear algebra library \linbox, intended to make the library safer and easier to use, while keeping it generic and efficient. First, we review the new simplified structure for containers, based on our \emph{founding scope allocation} model. We explain design choices and their impact on coding: unification of our matrix classes, clearer model for matrices and submatrices, \etc Then we present a variation of the \emph{strategy} design pattern that is comprised of a controller--plugin system: the controller (solution) chooses among plug-ins (algorithms) that always call back the controllers for subtasks. We give examples using the solution \mul. Finally we present a benchmark architecture that serves two purposes: Providing the user with easier ways to produce graphs; Creating a framework for automatically tuning the library and supporting regression testing.
[ { "version": "v1", "created": "Wed, 25 Jun 2014 19:38:09 GMT" } ]
2014-07-14T00:00:00
[ [ "Boyer", "Brice", "", "LJK" ], [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Giorgi", "Pascal", "", "LIRMM" ], [ "Pernet", "Clément", "", "INRIA Grenoble Rhône-Alpes / LIG Laboratoire\n d'Informatique de Grenoble" ], [ "Saunders", "B. David", "", "CIS" ] ]
TITLE: Elements of Design for Containers and Solutions in the LinBox Library ABSTRACT: We describe in this paper new design techniques used in the \cpp exact linear algebra library \linbox, intended to make the library safer and easier to use, while keeping it generic and efficient. First, we review the new simplified structure for containers, based on our \emph{founding scope allocation} model. We explain design choices and their impact on coding: unification of our matrix classes, clearer model for matrices and submatrices, \etc Then we present a variation of the \emph{strategy} design pattern that is comprised of a controller--plugin system: the controller (solution) chooses among plug-ins (algorithms) that always call back the controllers for subtasks. We give examples using the solution \mul. Finally we present a benchmark architecture that serves two purposes: Providing the user with easier ways to produce graphs; Creating a framework for automatically tuning the library and supporting regression testing.
1407.2649
Alican Bozkurt
Alican Bozkurt, Pinar Duygulu, A. Enis Cetin
Classifying Fonts and Calligraphy Styles Using Complex Wavelet Transform
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
Recognizing fonts has become an important task in document analysis, due to the increasing number of available digital documents in different fonts and emphases. A generic font-recognition system independent of language, script and content is desirable for processing various types of documents. At the same time, categorizing calligraphy styles in handwritten manuscripts is important for palaeographic analysis, but has not been studied sufficiently in the literature. We address the font-recognition problem as analysis and categorization of textures. We extract features using complex wavelet transform and use support vector machines for classification. Extensive experimental evaluations on different datasets in four languages and comparisons with state-of-the-art studies show that our proposed method achieves higher recognition accuracy while being computationally simpler. Furthermore, on a new dataset generated from Ottoman manuscripts, we show that the proposed method can also be used for categorizing Ottoman calligraphy with high accuracy.
[ { "version": "v1", "created": "Wed, 9 Jul 2014 22:25:32 GMT" } ]
2014-07-11T00:00:00
[ [ "Bozkurt", "Alican", "" ], [ "Duygulu", "Pinar", "" ], [ "Cetin", "A. Enis", "" ] ]
TITLE: Classifying Fonts and Calligraphy Styles Using Complex Wavelet Transform ABSTRACT: Recognizing fonts has become an important task in document analysis, due to the increasing number of available digital documents in different fonts and emphases. A generic font-recognition system independent of language, script and content is desirable for processing various types of documents. At the same time, categorizing calligraphy styles in handwritten manuscripts is important for palaeographic analysis, but has not been studied sufficiently in the literature. We address the font-recognition problem as analysis and categorization of textures. We extract features using complex wavelet transform and use support vector machines for classification. Extensive experimental evaluations on different datasets in four languages and comparisons with state-of-the-art studies show that our proposed method achieves higher recognition accuracy while being computationally simpler. Furthermore, on a new dataset generated from Ottoman manuscripts, we show that the proposed method can also be used for categorizing Ottoman calligraphy with high accuracy.
1407.2683
Jiaxing Shang
Jiaxing Shang, Lianchen Liu, Feng Xie, Zhen Chen, Jiajia Miao, Xuelin Fang, Cheng Wu
A Real-Time Detecting Algorithm for Tracking Community Structure of Dynamic Networks
9 pages, 6 figures, 3 tables, 6th SNA-KDD Workshop (2012)
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a simple but efficient real-time detecting algorithm is proposed for tracking community structure of dynamic networks. Community structure is intuitively characterized as divisions of network nodes into subgroups, within which nodes are densely connected while between which they are sparsely connected. To evaluate the quality of community structure of a network, a metric called modularity is proposed and many algorithms are developed on optimizing it. However, most of the modularity based algorithms deal with static networks and cannot be performed frequently, due to their high computing complexity. In order to track the community structure of dynamic networks in a fine-grained way, we propose a modularity based algorithm that is incremental and has very low computing complexity. In our algorithm we adopt a two-step approach. Firstly we apply the algorithm of Blondel et al for detecting static communities to obtain an initial community structure. Then, apply our incremental updating strategies to track the dynamic communities. The performance of our algorithm is measured in terms of the modularity. We test the algorithm on tracking community structure of Enron Email and three other real world datasets. The experimental results show that our algorithm can keep track of community structure in time and outperform the well known CNM algorithm in terms of modularity.
[ { "version": "v1", "created": "Thu, 10 Jul 2014 04:08:29 GMT" } ]
2014-07-11T00:00:00
[ [ "Shang", "Jiaxing", "" ], [ "Liu", "Lianchen", "" ], [ "Xie", "Feng", "" ], [ "Chen", "Zhen", "" ], [ "Miao", "Jiajia", "" ], [ "Fang", "Xuelin", "" ], [ "Wu", "Cheng", "" ] ]
TITLE: A Real-Time Detecting Algorithm for Tracking Community Structure of Dynamic Networks ABSTRACT: In this paper a simple but efficient real-time detecting algorithm is proposed for tracking community structure of dynamic networks. Community structure is intuitively characterized as divisions of network nodes into subgroups, within which nodes are densely connected while between which they are sparsely connected. To evaluate the quality of community structure of a network, a metric called modularity is proposed and many algorithms are developed on optimizing it. However, most of the modularity based algorithms deal with static networks and cannot be performed frequently, due to their high computing complexity. In order to track the community structure of dynamic networks in a fine-grained way, we propose a modularity based algorithm that is incremental and has very low computing complexity. In our algorithm we adopt a two-step approach. Firstly we apply the algorithm of Blondel et al for detecting static communities to obtain an initial community structure. Then, apply our incremental updating strategies to track the dynamic communities. The performance of our algorithm is measured in terms of the modularity. We test the algorithm on tracking community structure of Enron Email and three other real world datasets. The experimental results show that our algorithm can keep track of community structure in time and outperform the well known CNM algorithm in terms of modularity.
1407.2697
Aaron Defazio Mr
Aaron J. Defazio and Tiberio S. Caetano
A Convex Formulation for Learning Scale-Free Networks via Submodular Relaxation
null
Advances in Neural Information Processing Systems 25 (NIPS 2012)
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A key problem in statistics and machine learning is the determination of network structure from data. We consider the case where the structure of the graph to be reconstructed is known to be scale-free. We show that in such cases it is natural to formulate structured sparsity inducing priors using submodular functions, and we use their Lov\'asz extension to obtain a convex relaxation. For tractable classes such as Gaussian graphical models, this leads to a convex optimization problem that can be efficiently solved. We show that our method results in an improvement in the accuracy of reconstructed networks for synthetic data. We also show how our prior encourages scale-free reconstructions on a bioinfomatics dataset.
[ { "version": "v1", "created": "Thu, 10 Jul 2014 05:45:17 GMT" } ]
2014-07-11T00:00:00
[ [ "Defazio", "Aaron J.", "" ], [ "Caetano", "Tiberio S.", "" ] ]
TITLE: A Convex Formulation for Learning Scale-Free Networks via Submodular Relaxation ABSTRACT: A key problem in statistics and machine learning is the determination of network structure from data. We consider the case where the structure of the graph to be reconstructed is known to be scale-free. We show that in such cases it is natural to formulate structured sparsity inducing priors using submodular functions, and we use their Lov\'asz extension to obtain a convex relaxation. For tractable classes such as Gaussian graphical models, this leads to a convex optimization problem that can be efficiently solved. We show that our method results in an improvement in the accuracy of reconstructed networks for synthetic data. We also show how our prior encourages scale-free reconstructions on a bioinfomatics dataset.
1407.2736
Hima Patel
Ramasubramanian Sundararajan, Hima Patel, Manisha Srivastava
A multi-instance learning algorithm based on a stacked ensemble of lazy learners
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/3.0/
This document describes a novel learning algorithm that classifies "bags" of instances rather than individual instances. A bag is labeled positive if it contains at least one positive instance (which may or may not be specifically identified), and negative otherwise. This class of problems is known as multi-instance learning problems, and is useful in situations where the class label at an instance level may be unavailable or imprecise or difficult to obtain, or in situations where the problem is naturally posed as one of classifying instance groups. The algorithm described here is an ensemble-based method, wherein the members of the ensemble are lazy learning classifiers learnt using the Citation Nearest Neighbour method. Diversity among the ensemble members is achieved by optimizing their parameters using a multi-objective optimization method, with the objectives being to maximize Class 1 accuracy and minimize false positive rate. The method has been found to be effective on the Musk1 benchmark dataset.
[ { "version": "v1", "created": "Thu, 10 Jul 2014 09:39:24 GMT" } ]
2014-07-11T00:00:00
[ [ "Sundararajan", "Ramasubramanian", "" ], [ "Patel", "Hima", "" ], [ "Srivastava", "Manisha", "" ] ]
TITLE: A multi-instance learning algorithm based on a stacked ensemble of lazy learners ABSTRACT: This document describes a novel learning algorithm that classifies "bags" of instances rather than individual instances. A bag is labeled positive if it contains at least one positive instance (which may or may not be specifically identified), and negative otherwise. This class of problems is known as multi-instance learning problems, and is useful in situations where the class label at an instance level may be unavailable or imprecise or difficult to obtain, or in situations where the problem is naturally posed as one of classifying instance groups. The algorithm described here is an ensemble-based method, wherein the members of the ensemble are lazy learning classifiers learnt using the Citation Nearest Neighbour method. Diversity among the ensemble members is achieved by optimizing their parameters using a multi-objective optimization method, with the objectives being to maximize Class 1 accuracy and minimize false positive rate. The method has been found to be effective on the Musk1 benchmark dataset.
1407.2806
Preux Philippe
J\'er\'emie Mary (INRIA Lille - Nord Europe, LIFL), Romaric Gaudel (INRIA Lille - Nord Europe, LIFL), Preux Philippe (INRIA Lille - Nord Europe, LIFL)
Bandits Warm-up Cold Recommender Systems
null
null
null
RR-8563
cs.LG cs.IR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the cold start problem in recommendation systems assuming no contextual information is available neither about users, nor items. We consider the case in which we only have access to a set of ratings of items by users. Most of the existing works consider a batch setting, and use cross-validation to tune parameters. The classical method consists in minimizing the root mean square error over a training subset of the ratings which provides a factorization of the matrix of ratings, interpreted as a latent representation of items and users. Our contribution in this paper is 5-fold. First, we explicit the issues raised by this kind of batch setting for users or items with very few ratings. Then, we propose an online setting closer to the actual use of recommender systems; this setting is inspired by the bandit framework. The proposed methodology can be used to turn any recommender system dataset (such as Netflix, MovieLens,...) into a sequential dataset. Then, we explicit a strong and insightful link between contextual bandit algorithms and matrix factorization; this leads us to a new algorithm that tackles the exploration/exploitation dilemma associated to the cold start problem in a strikingly new perspective. Finally, experimental evidence confirm that our algorithm is effective in dealing with the cold start problem on publicly available datasets. Overall, the goal of this paper is to bridge the gap between recommender systems based on matrix factorizations and those based on contextual bandits.
[ { "version": "v1", "created": "Thu, 10 Jul 2014 14:32:37 GMT" } ]
2014-07-11T00:00:00
[ [ "Mary", "Jérémie", "", "INRIA Lille - Nord Europe, LIFL" ], [ "Gaudel", "Romaric", "", "INRIA Lille - Nord Europe, LIFL" ], [ "Philippe", "Preux", "", "INRIA Lille - Nord Europe,\n LIFL" ] ]
TITLE: Bandits Warm-up Cold Recommender Systems ABSTRACT: We address the cold start problem in recommendation systems assuming no contextual information is available neither about users, nor items. We consider the case in which we only have access to a set of ratings of items by users. Most of the existing works consider a batch setting, and use cross-validation to tune parameters. The classical method consists in minimizing the root mean square error over a training subset of the ratings which provides a factorization of the matrix of ratings, interpreted as a latent representation of items and users. Our contribution in this paper is 5-fold. First, we explicit the issues raised by this kind of batch setting for users or items with very few ratings. Then, we propose an online setting closer to the actual use of recommender systems; this setting is inspired by the bandit framework. The proposed methodology can be used to turn any recommender system dataset (such as Netflix, MovieLens,...) into a sequential dataset. Then, we explicit a strong and insightful link between contextual bandit algorithms and matrix factorization; this leads us to a new algorithm that tackles the exploration/exploitation dilemma associated to the cold start problem in a strikingly new perspective. Finally, experimental evidence confirm that our algorithm is effective in dealing with the cold start problem on publicly available datasets. Overall, the goal of this paper is to bridge the gap between recommender systems based on matrix factorizations and those based on contextual bandits.
1407.2889
John-Alexander Assael
Charalampos S. Kouzinopoulos, John-Alexander M. Assael, Themistoklis K. Pyrgiotis, and Konstantinos G. Margaritis
A Hybrid Parallel Implementation of the Aho-Corasick and Wu-Manber Algorithms Using NVIDIA CUDA and MPI Evaluated on a Biological Sequence Database
null
null
null
null
cs.DC cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple matching algorithms are used to locate the occurrences of patterns from a finite pattern set in a large input string. Aho-Corasick and Wu-Manber, two of the most well known algorithms for multiple matching require an increased computing power, particularly in cases where large-size datasets must be processed, as is common in computational biology applications. Over the past years, Graphics Processing Units (GPUs) have evolved to powerful parallel processors outperforming Central Processing Units (CPUs) in scientific calculations. Moreover, multiple GPUs can be used in parallel, forming hybrid computer cluster configurations to achieve an even higher processing throughput. This paper evaluates the speedup of the parallel implementation of the Aho-Corasick and Wu-Manber algorithms on a hybrid GPU cluster, when used to process a snapshot of the Expressed Sequence Tags of the human genome and for different problem parameters.
[ { "version": "v1", "created": "Thu, 10 Jul 2014 18:15:18 GMT" } ]
2014-07-11T00:00:00
[ [ "Kouzinopoulos", "Charalampos S.", "" ], [ "Assael", "John-Alexander M.", "" ], [ "Pyrgiotis", "Themistoklis K.", "" ], [ "Margaritis", "Konstantinos G.", "" ] ]
TITLE: A Hybrid Parallel Implementation of the Aho-Corasick and Wu-Manber Algorithms Using NVIDIA CUDA and MPI Evaluated on a Biological Sequence Database ABSTRACT: Multiple matching algorithms are used to locate the occurrences of patterns from a finite pattern set in a large input string. Aho-Corasick and Wu-Manber, two of the most well known algorithms for multiple matching require an increased computing power, particularly in cases where large-size datasets must be processed, as is common in computational biology applications. Over the past years, Graphics Processing Units (GPUs) have evolved to powerful parallel processors outperforming Central Processing Units (CPUs) in scientific calculations. Moreover, multiple GPUs can be used in parallel, forming hybrid computer cluster configurations to achieve an even higher processing throughput. This paper evaluates the speedup of the parallel implementation of the Aho-Corasick and Wu-Manber algorithms on a hybrid GPU cluster, when used to process a snapshot of the Expressed Sequence Tags of the human genome and for different problem parameters.
1407.2899
Gabriela Montoya
Gabriela Montoya (LINA), Hala Skaf-Molli (LINA), Pascal Molli (LINA), Maria-Esther Vidal
Fedra: Query Processing for SPARQL Federations with Divergence
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data replication and deployment of local SPARQL endpoints improve scalability and availability of public SPARQL endpoints, making the consumption of Linked Data a reality. This solution requires synchronization and specific query processing strategies to take advantage of replication. However, existing replication aware techniques in federations of SPARQL endpoints do not consider data dynamicity. We propose Fedra, an approach for querying federations of endpoints that benefits from replication. Participants in Fedra federations can copy fragments of data from several datasets, and describe them using provenance and views. These descriptions enable Fedra to reduce the number of selected endpoints while satisfying user divergence requirements. Experiments on real-world datasets suggest savings of up to three orders of magnitude.
[ { "version": "v1", "created": "Thu, 10 Jul 2014 18:39:47 GMT" } ]
2014-07-11T00:00:00
[ [ "Montoya", "Gabriela", "", "LINA" ], [ "Skaf-Molli", "Hala", "", "LINA" ], [ "Molli", "Pascal", "", "LINA" ], [ "Vidal", "Maria-Esther", "" ] ]
TITLE: Fedra: Query Processing for SPARQL Federations with Divergence ABSTRACT: Data replication and deployment of local SPARQL endpoints improve scalability and availability of public SPARQL endpoints, making the consumption of Linked Data a reality. This solution requires synchronization and specific query processing strategies to take advantage of replication. However, existing replication aware techniques in federations of SPARQL endpoints do not consider data dynamicity. We propose Fedra, an approach for querying federations of endpoints that benefits from replication. Participants in Fedra federations can copy fragments of data from several datasets, and describe them using provenance and views. These descriptions enable Fedra to reduce the number of selected endpoints while satisfying user divergence requirements. Experiments on real-world datasets suggest savings of up to three orders of magnitude.
1407.2220
Brian Thompson
Graham Cormode, Qiang Ma, S. Muthukrishnan, Brian Thompson
Modeling Collaboration in Academia: A Game Theoretic Approach
Presented at the 1st WWW Workshop on Big Scholarly Data (2014). 6 pages, 5 figures
Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web (WWW 2014), pgs 1177-1182
null
null
cs.SI cs.DL cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we aim to understand the mechanisms driving academic collaboration. We begin by building a model for how researchers split their effort between multiple papers, and how collaboration affects the number of citations a paper receives, supported by observations from a large real-world publication and citation dataset, which we call the h-Reinvestment model. Using tools from the field of Game Theory, we study researchers' collaborative behavior over time under this model, with the premise that each researcher wants to maximize his or her academic success. We find analytically that there is a strong incentive to collaborate rather than work in isolation, and that studying collaborative behavior through a game-theoretic lens is a promising approach to help us better understand the nature and dynamics of academic collaboration.
[ { "version": "v1", "created": "Tue, 8 Jul 2014 19:09:31 GMT" }, { "version": "v2", "created": "Wed, 9 Jul 2014 04:34:58 GMT" } ]
2014-07-10T00:00:00
[ [ "Cormode", "Graham", "" ], [ "Ma", "Qiang", "" ], [ "Muthukrishnan", "S.", "" ], [ "Thompson", "Brian", "" ] ]
TITLE: Modeling Collaboration in Academia: A Game Theoretic Approach ABSTRACT: In this work, we aim to understand the mechanisms driving academic collaboration. We begin by building a model for how researchers split their effort between multiple papers, and how collaboration affects the number of citations a paper receives, supported by observations from a large real-world publication and citation dataset, which we call the h-Reinvestment model. Using tools from the field of Game Theory, we study researchers' collaborative behavior over time under this model, with the premise that each researcher wants to maximize his or her academic success. We find analytically that there is a strong incentive to collaborate rather than work in isolation, and that studying collaborative behavior through a game-theoretic lens is a promising approach to help us better understand the nature and dynamics of academic collaboration.
1402.6882
Lu Lu
Minglong Zhang and Lu Lu and Soung-Chang Liew
An Optimal Decoding Strategy for Physical-layer Network Coding over Multipath Fading Channels
Submitted to IEEE Transactions on Vehicular Technology
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an optimal decoder for physical-layer network coding (PNC) in a multipath fading channels. Previous studies on PNC have largely focused on the single path case. For PNC, multipath not only introduces inter-symbol interference (ISI), but also cross-symbol interference (Cross-SI) between signals simultaneously transmitted by multiple users. In this paper, we assume the transmitters do not have channel state information (CSI). The relay in the PNC system, however, has CSI. The relay makes use of a belief propagation (BP) algorithm to decode the multipath-distorted signals received from multiple users into a network-coded packet. We refer to our multipath decoding algorithm as MP-PNC. Our simulation results show that, benchmarked against synchronous PNC over a one-path channel, the bit error rate (BER) performance penalty of MP-PNC under a two-tap ITU channel model can be kept within 0.5dB. Moreover, it outperforms a MUD-XOR algorithm by 3dB -- MUD-XOR decodes the individual information from both users explicitly before performing the XOR network-coding mapping. Although the framework of fading-channel PNC presented in this paper is demonstrated based on two-path and three-path channel models, our algorithm can be easily extended to cases with more than three paths.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 12:22:38 GMT" }, { "version": "v2", "created": "Tue, 8 Jul 2014 06:06:36 GMT" } ]
2014-07-09T00:00:00
[ [ "Zhang", "Minglong", "" ], [ "Lu", "Lu", "" ], [ "Liew", "Soung-Chang", "" ] ]
TITLE: An Optimal Decoding Strategy for Physical-layer Network Coding over Multipath Fading Channels ABSTRACT: We present an optimal decoder for physical-layer network coding (PNC) in a multipath fading channels. Previous studies on PNC have largely focused on the single path case. For PNC, multipath not only introduces inter-symbol interference (ISI), but also cross-symbol interference (Cross-SI) between signals simultaneously transmitted by multiple users. In this paper, we assume the transmitters do not have channel state information (CSI). The relay in the PNC system, however, has CSI. The relay makes use of a belief propagation (BP) algorithm to decode the multipath-distorted signals received from multiple users into a network-coded packet. We refer to our multipath decoding algorithm as MP-PNC. Our simulation results show that, benchmarked against synchronous PNC over a one-path channel, the bit error rate (BER) performance penalty of MP-PNC under a two-tap ITU channel model can be kept within 0.5dB. Moreover, it outperforms a MUD-XOR algorithm by 3dB -- MUD-XOR decodes the individual information from both users explicitly before performing the XOR network-coding mapping. Although the framework of fading-channel PNC presented in this paper is demonstrated based on two-path and three-path channel models, our algorithm can be easily extended to cases with more than three paths.
1407.1976
Shanta Phani
Shanta Phani, Shibamouli Lahiri and Arindam Biswas
Inter-Rater Agreement Study on Readability Assessment in Bengali
6 pages, 4 tables, Accepted in ICCONAC, 2014
International Journal on Natural Language Computing (IJNLC), 3(3), 2014
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An inter-rater agreement study is performed for readability assessment in Bengali. A 1-7 rating scale was used to indicate different levels of readability. We obtained moderate to fair agreement among seven independent annotators on 30 text passages written by four eminent Bengali authors. As a by product of our study, we obtained a readability-annotated ground truth dataset in Bengali. .
[ { "version": "v1", "created": "Tue, 8 Jul 2014 07:35:16 GMT" } ]
2014-07-09T00:00:00
[ [ "Phani", "Shanta", "" ], [ "Lahiri", "Shibamouli", "" ], [ "Biswas", "Arindam", "" ] ]
TITLE: Inter-Rater Agreement Study on Readability Assessment in Bengali ABSTRACT: An inter-rater agreement study is performed for readability assessment in Bengali. A 1-7 rating scale was used to indicate different levels of readability. We obtained moderate to fair agreement among seven independent annotators on 30 text passages written by four eminent Bengali authors. As a by product of our study, we obtained a readability-annotated ground truth dataset in Bengali. .
1407.2107
Raghu Machiraju
Hao Ding, Chao Wang, Kun Huang and Raghu Machiraju
iGPSe: A Visual Analytic System for Integrative Genomic Based Cancer Patient Stratification
BioVis 2014 conference
null
null
null
cs.GR cs.HC q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: Cancers are highly heterogeneous with different subtypes. These subtypes often possess different genetic variants, present different pathological phenotypes, and most importantly, show various clinical outcomes such as varied prognosis and response to treatment and likelihood for recurrence and metastasis. Recently, integrative genomics (or panomics) approaches are often adopted with the goal of combining multiple types of omics data to identify integrative biomarkers for stratification of patients into groups with different clinical outcomes. Results: In this paper we present a visual analytic system called Interactive Genomics Patient Stratification explorer (iGPSe) which significantly reduces the computing burden for biomedical researchers in the process of exploring complicated integrative genomics data. Our system integrates unsupervised clustering with graph and parallel sets visualization and allows direct comparison of clinical outcomes via survival analysis. Using a breast cancer dataset obtained from the The Cancer Genome Atlas (TCGA) project, we are able to quickly explore different combinations of gene expression (mRNA) and microRNA features and identify potential combined markers for survival prediction. Conclusions: Visualization plays an important role in the process of stratifying given population patients. Visual tools allowed for the selection of possibly features across various datasets for the given patient population. We essentially made a case for visualization for a very important problem in translational informatics.
[ { "version": "v1", "created": "Tue, 8 Jul 2014 14:30:15 GMT" } ]
2014-07-09T00:00:00
[ [ "Ding", "Hao", "" ], [ "Wang", "Chao", "" ], [ "Huang", "Kun", "" ], [ "Machiraju", "Raghu", "" ] ]
TITLE: iGPSe: A Visual Analytic System for Integrative Genomic Based Cancer Patient Stratification ABSTRACT: Background: Cancers are highly heterogeneous with different subtypes. These subtypes often possess different genetic variants, present different pathological phenotypes, and most importantly, show various clinical outcomes such as varied prognosis and response to treatment and likelihood for recurrence and metastasis. Recently, integrative genomics (or panomics) approaches are often adopted with the goal of combining multiple types of omics data to identify integrative biomarkers for stratification of patients into groups with different clinical outcomes. Results: In this paper we present a visual analytic system called Interactive Genomics Patient Stratification explorer (iGPSe) which significantly reduces the computing burden for biomedical researchers in the process of exploring complicated integrative genomics data. Our system integrates unsupervised clustering with graph and parallel sets visualization and allows direct comparison of clinical outcomes via survival analysis. Using a breast cancer dataset obtained from the The Cancer Genome Atlas (TCGA) project, we are able to quickly explore different combinations of gene expression (mRNA) and microRNA features and identify potential combined markers for survival prediction. Conclusions: Visualization plays an important role in the process of stratifying given population patients. Visual tools allowed for the selection of possibly features across various datasets for the given patient population. We essentially made a case for visualization for a very important problem in translational informatics.
1404.1777
Victor Lempitsky
Artem Babenko, Anton Slesarev, Alexandr Chigorin and Victor Lempitsky
Neural Codes for Image Retrieval
to appear at ECCV 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It has been shown that the activations invoked by an image within the top layers of a large convolutional neural network provide a high-level descriptor of the visual content of the image. In this paper, we investigate the use of such descriptors (neural codes) within the image retrieval application. In the experiments with several standard retrieval benchmarks, we establish that neural codes perform competitively even when the convolutional neural network has been trained for an unrelated classification task (e.g.\ Image-Net). We also evaluate the improvement in the retrieval performance of neural codes, when the network is retrained on a dataset of images that are similar to images encountered at test time. We further evaluate the performance of the compressed neural codes and show that a simple PCA compression provides very good short codes that give state-of-the-art accuracy on a number of datasets. In general, neural codes turn out to be much more resilient to such compression in comparison other state-of-the-art descriptors. Finally, we show that discriminative dimensionality reduction trained on a dataset of pairs of matched photographs improves the performance of PCA-compressed neural codes even further. Overall, our quantitative experiments demonstrate the promise of neural codes as visual descriptors for image retrieval.
[ { "version": "v1", "created": "Mon, 7 Apr 2014 13:08:08 GMT" }, { "version": "v2", "created": "Mon, 7 Jul 2014 07:51:04 GMT" } ]
2014-07-08T00:00:00
[ [ "Babenko", "Artem", "" ], [ "Slesarev", "Anton", "" ], [ "Chigorin", "Alexandr", "" ], [ "Lempitsky", "Victor", "" ] ]
TITLE: Neural Codes for Image Retrieval ABSTRACT: It has been shown that the activations invoked by an image within the top layers of a large convolutional neural network provide a high-level descriptor of the visual content of the image. In this paper, we investigate the use of such descriptors (neural codes) within the image retrieval application. In the experiments with several standard retrieval benchmarks, we establish that neural codes perform competitively even when the convolutional neural network has been trained for an unrelated classification task (e.g.\ Image-Net). We also evaluate the improvement in the retrieval performance of neural codes, when the network is retrained on a dataset of images that are similar to images encountered at test time. We further evaluate the performance of the compressed neural codes and show that a simple PCA compression provides very good short codes that give state-of-the-art accuracy on a number of datasets. In general, neural codes turn out to be much more resilient to such compression in comparison other state-of-the-art descriptors. Finally, we show that discriminative dimensionality reduction trained on a dataset of pairs of matched photographs improves the performance of PCA-compressed neural codes even further. Overall, our quantitative experiments demonstrate the promise of neural codes as visual descriptors for image retrieval.
1407.0386
Daniel Schall
Daniel Schall and Theo H\"arder
Energy and Performance-Can a Wimpy-Node Cluster Challenge a Brawny Server?
arXiv admin note: substantial text overlap with arXiv:1407.0120
null
null
null
cs.DB cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional DBMS servers are usually over-provisioned for most of their daily workloads and, because they do not show good energy proportionality, waste a lot of energy while underutilized. A cluster of small (wimpy) servers, where the number of nodes can dynamically adjust to the current workload, might offer better energy characteristics for these workloads. Yet, clusters suffer from "friction losses" and may not be able to quickly adapt to the workload, whereas a single, brawny server delivers performance instantaneously. In this paper, we compare a small cluster of lightweight nodes to a single server in terms of performance and energy efficiency. We run several benchmarks, consisting of OLTP and OLAP queries at variable utilization to test the system's ability to adjust to the workloads. To quantify possible energy saving and its conceivable drawback on query runtime, we evaluate our implementation on a cluster as well as on a single, brawny server and compare the results w.r.t. performance and energy consumption. Our findings confirm that - based on the workload - energy can be saved without sacrificing too much performance.
[ { "version": "v1", "created": "Tue, 1 Jul 2014 07:29:37 GMT" }, { "version": "v2", "created": "Mon, 7 Jul 2014 07:32:53 GMT" } ]
2014-07-08T00:00:00
[ [ "Schall", "Daniel", "" ], [ "Härder", "Theo", "" ] ]
TITLE: Energy and Performance-Can a Wimpy-Node Cluster Challenge a Brawny Server? ABSTRACT: Traditional DBMS servers are usually over-provisioned for most of their daily workloads and, because they do not show good energy proportionality, waste a lot of energy while underutilized. A cluster of small (wimpy) servers, where the number of nodes can dynamically adjust to the current workload, might offer better energy characteristics for these workloads. Yet, clusters suffer from "friction losses" and may not be able to quickly adapt to the workload, whereas a single, brawny server delivers performance instantaneously. In this paper, we compare a small cluster of lightweight nodes to a single server in terms of performance and energy efficiency. We run several benchmarks, consisting of OLTP and OLAP queries at variable utilization to test the system's ability to adjust to the workloads. To quantify possible energy saving and its conceivable drawback on query runtime, we evaluate our implementation on a cluster as well as on a single, brawny server and compare the results w.r.t. performance and energy consumption. Our findings confirm that - based on the workload - energy can be saved without sacrificing too much performance.
1407.1538
Xiangnan Kong
Xiangnan Kong and Zhaoming Wu and Li-Jia Li and Ruofei Zhang and Philip S. Yu and Hang Wu and Wei Fan
Large-Scale Multi-Label Learning with Incomplete Label Assignments
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-label learning deals with the classification problems where each instance can be assigned with multiple labels simultaneously. Conventional multi-label learning approaches mainly focus on exploiting label correlations. It is usually assumed, explicitly or implicitly, that the label sets for training instances are fully labeled without any missing labels. However, in many real-world multi-label datasets, the label assignments for training instances can be incomplete. Some ground-truth labels can be missed by the labeler from the label set. This problem is especially typical when the number instances is very large, and the labeling cost is very high, which makes it almost impossible to get a fully labeled training set. In this paper, we study the problem of large-scale multi-label learning with incomplete label assignments. We propose an approach, called MPU, based upon positive and unlabeled stochastic gradient descent and stacked models. Unlike prior works, our method can effectively and efficiently consider missing labels and label correlations simultaneously, and is very scalable, that has linear time complexities over the size of the data. Extensive experiments on two real-world multi-label datasets show that our MPU model consistently outperform other commonly-used baselines.
[ { "version": "v1", "created": "Sun, 6 Jul 2014 20:13:48 GMT" } ]
2014-07-08T00:00:00
[ [ "Kong", "Xiangnan", "" ], [ "Wu", "Zhaoming", "" ], [ "Li", "Li-Jia", "" ], [ "Zhang", "Ruofei", "" ], [ "Yu", "Philip S.", "" ], [ "Wu", "Hang", "" ], [ "Fan", "Wei", "" ] ]
TITLE: Large-Scale Multi-Label Learning with Incomplete Label Assignments ABSTRACT: Multi-label learning deals with the classification problems where each instance can be assigned with multiple labels simultaneously. Conventional multi-label learning approaches mainly focus on exploiting label correlations. It is usually assumed, explicitly or implicitly, that the label sets for training instances are fully labeled without any missing labels. However, in many real-world multi-label datasets, the label assignments for training instances can be incomplete. Some ground-truth labels can be missed by the labeler from the label set. This problem is especially typical when the number instances is very large, and the labeling cost is very high, which makes it almost impossible to get a fully labeled training set. In this paper, we study the problem of large-scale multi-label learning with incomplete label assignments. We propose an approach, called MPU, based upon positive and unlabeled stochastic gradient descent and stacked models. Unlike prior works, our method can effectively and efficiently consider missing labels and label correlations simultaneously, and is very scalable, that has linear time complexities over the size of the data. Extensive experiments on two real-world multi-label datasets show that our MPU model consistently outperform other commonly-used baselines.
1407.1572
Sivaram Ambikasaran
Sivaram Ambikasaran and Eric Darve
The Inverse Fast Multipole Method
25 pages, 28 figures
null
null
null
math.NA cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a new fast direct solver for linear systems arising out of wide range of applications, integral equations, multivariate statistics, radial basis interpolation, etc., to name a few. \emph{The highlight of this new fast direct solver is that the solver scales linearly in the number of unknowns in all dimensions.} The solver, termed as Inverse Fast Multipole Method (abbreviated as IFMM), works on the same data-structure as the Fast Multipole Method (abbreviated as FMM). More generally, the solver can be immediately extended to the class of hierarchical matrices, denoted as $\mathcal{H}^2$ matrices with strong admissibility criteria (weak low-rank structure), i.e., \emph{the interaction between neighboring cluster of particles is full-rank whereas the interaction between particles corresponding to well-separated clusters can be efficiently represented as a low-rank matrix}. The algorithm departs from existing approaches in the fact that throughout the algorithm the interaction corresponding to neighboring clusters are always treated as full-rank interactions. Our approach relies on two major ideas: (i) The $N \times N$ matrix arising out of FMM (from now on termed as FMM matrix) can be represented as an extended sparser matrix of size $M \times M$, where $M \approx 3N$. (ii) While solving the larger extended sparser matrix, \emph{the fill-in's that arise in the matrix blocks corresponding to well-separated clusters are hierarchically compressed}. The ordering of the equations and the unknowns in the extended sparser matrix is strongly related to the local and multipole coefficients in the FMM~\cite{greengard1987fast} and \emph{the order of elimination is different from the usual nested dissection approach}. Numerical benchmarks on $2$D manifold confirm the linear scaling of the algorithm.
[ { "version": "v1", "created": "Mon, 7 Jul 2014 03:16:40 GMT" } ]
2014-07-08T00:00:00
[ [ "Ambikasaran", "Sivaram", "" ], [ "Darve", "Eric", "" ] ]
TITLE: The Inverse Fast Multipole Method ABSTRACT: This article introduces a new fast direct solver for linear systems arising out of wide range of applications, integral equations, multivariate statistics, radial basis interpolation, etc., to name a few. \emph{The highlight of this new fast direct solver is that the solver scales linearly in the number of unknowns in all dimensions.} The solver, termed as Inverse Fast Multipole Method (abbreviated as IFMM), works on the same data-structure as the Fast Multipole Method (abbreviated as FMM). More generally, the solver can be immediately extended to the class of hierarchical matrices, denoted as $\mathcal{H}^2$ matrices with strong admissibility criteria (weak low-rank structure), i.e., \emph{the interaction between neighboring cluster of particles is full-rank whereas the interaction between particles corresponding to well-separated clusters can be efficiently represented as a low-rank matrix}. The algorithm departs from existing approaches in the fact that throughout the algorithm the interaction corresponding to neighboring clusters are always treated as full-rank interactions. Our approach relies on two major ideas: (i) The $N \times N$ matrix arising out of FMM (from now on termed as FMM matrix) can be represented as an extended sparser matrix of size $M \times M$, where $M \approx 3N$. (ii) While solving the larger extended sparser matrix, \emph{the fill-in's that arise in the matrix blocks corresponding to well-separated clusters are hierarchically compressed}. The ordering of the equations and the unknowns in the extended sparser matrix is strongly related to the local and multipole coefficients in the FMM~\cite{greengard1987fast} and \emph{the order of elimination is different from the usual nested dissection approach}. Numerical benchmarks on $2$D manifold confirm the linear scaling of the algorithm.
1407.1640
Bin Gao
Bin Gao, Jiang Bian, and Tie-Yan Liu
WordRep: A Benchmark for Research on Learning Word Representations
null
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by/3.0/
WordRep is a benchmark collection for the research on learning distributed word representations (or word embeddings), released by Microsoft Research. In this paper, we describe the details of the WordRep collection and show how to use it in different types of machine learning research related to word embedding. Specifically, we describe how the evaluation tasks in WordRep are selected, how the data are sampled, and how the evaluation tool is built. We then compare several state-of-the-art word representations on WordRep, report their evaluation performance, and make discussions on the results. After that, we discuss new potential research topics that can be supported by WordRep, in addition to algorithm comparison. We hope that this paper can help people gain deeper understanding of WordRep, and enable more interesting research on learning distributed word representations and related topics.
[ { "version": "v1", "created": "Mon, 7 Jul 2014 09:31:21 GMT" } ]
2014-07-08T00:00:00
[ [ "Gao", "Bin", "" ], [ "Bian", "Jiang", "" ], [ "Liu", "Tie-Yan", "" ] ]
TITLE: WordRep: A Benchmark for Research on Learning Word Representations ABSTRACT: WordRep is a benchmark collection for the research on learning distributed word representations (or word embeddings), released by Microsoft Research. In this paper, we describe the details of the WordRep collection and show how to use it in different types of machine learning research related to word embedding. Specifically, we describe how the evaluation tasks in WordRep are selected, how the data are sampled, and how the evaluation tool is built. We then compare several state-of-the-art word representations on WordRep, report their evaluation performance, and make discussions on the results. After that, we discuss new potential research topics that can be supported by WordRep, in addition to algorithm comparison. We hope that this paper can help people gain deeper understanding of WordRep, and enable more interesting research on learning distributed word representations and related topics.
1407.1772
Senzhang Wang
Senzhang Wang and Sihong Xie and Xiaoming Zhang and Zhoujun Li and Philip S. Yu and Xinyu Shu
Future Influence Ranking of Scientific Literature
9 pages, Proceedings of the 2014 SIAM International Conference on Data Mining
null
10.1137/1.9781611973440.86
null
cs.SI cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Researchers or students entering a emerging research area are particularly interested in what newly published papers will be most cited and which young researchers will become influential in the future, so that they can catch the most recent advances and find valuable research directions. However, predicting the future importance of scientific articles and authors is challenging due to the dynamic nature of literature networks and evolving research topics. Different from most previous studies aiming to rank the current importance of literatures and authors, we focus on \emph{ranking the future popularity of new publications and young researchers} by proposing a unified ranking model to combine various available information. Specifically, we first propose to extract two kinds of text features, words and words co-occurrence to characterize innovative papers and authors. Then, instead of using static and un-weighted graphs, we construct time-aware weighted graphs to distinguish the various importance of links established at different time. Finally, by leveraging both the constructed text features and graphs, we propose a mutual reinforcement ranking framework called \emph{MRFRank} to rank the future importance of papers and authors simultaneously. Experimental results on the ArnetMiner dataset show that the proposed approach significantly outperforms the baselines on the metric \emph{recommendation intensity}.
[ { "version": "v1", "created": "Mon, 7 Jul 2014 17:00:34 GMT" } ]
2014-07-08T00:00:00
[ [ "Wang", "Senzhang", "" ], [ "Xie", "Sihong", "" ], [ "Zhang", "Xiaoming", "" ], [ "Li", "Zhoujun", "" ], [ "Yu", "Philip S.", "" ], [ "Shu", "Xinyu", "" ] ]
TITLE: Future Influence Ranking of Scientific Literature ABSTRACT: Researchers or students entering a emerging research area are particularly interested in what newly published papers will be most cited and which young researchers will become influential in the future, so that they can catch the most recent advances and find valuable research directions. However, predicting the future importance of scientific articles and authors is challenging due to the dynamic nature of literature networks and evolving research topics. Different from most previous studies aiming to rank the current importance of literatures and authors, we focus on \emph{ranking the future popularity of new publications and young researchers} by proposing a unified ranking model to combine various available information. Specifically, we first propose to extract two kinds of text features, words and words co-occurrence to characterize innovative papers and authors. Then, instead of using static and un-weighted graphs, we construct time-aware weighted graphs to distinguish the various importance of links established at different time. Finally, by leveraging both the constructed text features and graphs, we propose a mutual reinforcement ranking framework called \emph{MRFRank} to rank the future importance of papers and authors simultaneously. Experimental results on the ArnetMiner dataset show that the proposed approach significantly outperforms the baselines on the metric \emph{recommendation intensity}.
1407.1165
Prashant Borde
Prashant Bordea, Amarsinh Varpeb, Ramesh Manzac, Pravin Yannawara
Recognition of Isolated Words using Zernike and MFCC features for Audio Visual Speech Recognition
null
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic Speech Recognition (ASR) by machine is an attractive research topic in signal processing domain and has attracted many researchers to contribute in this area. In recent year, there have been many advances in automatic speech reading system with the inclusion of audio and visual speech features to recognize words under noisy conditions. The objective of audio-visual speech recognition system is to improve recognition accuracy. In this paper we computed visual features using Zernike moments and audio feature using Mel Frequency Cepstral Coefficients (MFCC) on vVISWa (Visual Vocabulary of Independent Standard Words) dataset which contains collection of isolated set of city names of 10 speakers. The visual features were normalized and dimension of features set was reduced by Principal Component Analysis (PCA) in order to recognize the isolated word utterance on PCA space.The performance of recognition of isolated words based on visual only and audio only features results in 63.88 and 100 respectively.
[ { "version": "v1", "created": "Fri, 4 Jul 2014 09:32:10 GMT" } ]
2014-07-07T00:00:00
[ [ "Bordea", "Prashant", "" ], [ "Varpeb", "Amarsinh", "" ], [ "Manzac", "Ramesh", "" ], [ "Yannawara", "Pravin", "" ] ]
TITLE: Recognition of Isolated Words using Zernike and MFCC features for Audio Visual Speech Recognition ABSTRACT: Automatic Speech Recognition (ASR) by machine is an attractive research topic in signal processing domain and has attracted many researchers to contribute in this area. In recent year, there have been many advances in automatic speech reading system with the inclusion of audio and visual speech features to recognize words under noisy conditions. The objective of audio-visual speech recognition system is to improve recognition accuracy. In this paper we computed visual features using Zernike moments and audio feature using Mel Frequency Cepstral Coefficients (MFCC) on vVISWa (Visual Vocabulary of Independent Standard Words) dataset which contains collection of isolated set of city names of 10 speakers. The visual features were normalized and dimension of features set was reduced by Principal Component Analysis (PCA) in order to recognize the isolated word utterance on PCA space.The performance of recognition of isolated words based on visual only and audio only features results in 63.88 and 100 respectively.
1407.1176
Felipe Llinares
Felipe Llinares, Mahito Sugiyama, Karsten M. Borgwardt
Identifying Higher-order Combinations of Binary Features
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding statistically significant interactions between binary variables is computationally and statistically challenging in high-dimensional settings, due to the combinatorial explosion in the number of hypotheses. Terada et al. recently showed how to elegantly address this multiple testing problem by excluding non-testable hypotheses. Still, it remains unclear how their approach scales to large datasets. We here proposed strategies to speed up the approach by Terada et al. and evaluate them thoroughly in 11 real-world benchmark datasets. We observe that one approach, incremental search with early stopping, is orders of magnitude faster than the current state-of-the-art approach.
[ { "version": "v1", "created": "Fri, 4 Jul 2014 10:17:43 GMT" } ]
2014-07-07T00:00:00
[ [ "Llinares", "Felipe", "" ], [ "Sugiyama", "Mahito", "" ], [ "Borgwardt", "Karsten M.", "" ] ]
TITLE: Identifying Higher-order Combinations of Binary Features ABSTRACT: Finding statistically significant interactions between binary variables is computationally and statistically challenging in high-dimensional settings, due to the combinatorial explosion in the number of hypotheses. Terada et al. recently showed how to elegantly address this multiple testing problem by excluding non-testable hypotheses. Still, it remains unclear how their approach scales to large datasets. We here proposed strategies to speed up the approach by Terada et al. and evaluate them thoroughly in 11 real-world benchmark datasets. We observe that one approach, incremental search with early stopping, is orders of magnitude faster than the current state-of-the-art approach.
1407.1208
Piotr Bojanowski
Piotr Bojanowski, R\'emi Lajugie, Francis Bach, Ivan Laptev, Jean Ponce, Cordelia Schmid, Josef Sivic
Weakly Supervised Action Labeling in Videos Under Ordering Constraints
17 pages, completed version of a ECCV2014 conference paper
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are given a set of video clips, each one annotated with an {\em ordered} list of actions, such as "walk" then "sit" then "answer phone" extracted from, for example, the associated text script. We seek to temporally localize the individual actions in each clip as well as to learn a discriminative classifier for each action. We formulate the problem as a weakly supervised temporal assignment with ordering constraints. Each video clip is divided into small time intervals and each time interval of each video clip is assigned one action label, while respecting the order in which the action labels appear in the given annotations. We show that the action label assignment can be determined together with learning a classifier for each action in a discriminative manner. We evaluate the proposed model on a new and challenging dataset of 937 video clips with a total of 787720 frames containing sequences of 16 different actions from 69 Hollywood movies.
[ { "version": "v1", "created": "Fri, 4 Jul 2014 12:53:15 GMT" } ]
2014-07-07T00:00:00
[ [ "Bojanowski", "Piotr", "" ], [ "Lajugie", "Rémi", "" ], [ "Bach", "Francis", "" ], [ "Laptev", "Ivan", "" ], [ "Ponce", "Jean", "" ], [ "Schmid", "Cordelia", "" ], [ "Sivic", "Josef", "" ] ]
TITLE: Weakly Supervised Action Labeling in Videos Under Ordering Constraints ABSTRACT: We are given a set of video clips, each one annotated with an {\em ordered} list of actions, such as "walk" then "sit" then "answer phone" extracted from, for example, the associated text script. We seek to temporally localize the individual actions in each clip as well as to learn a discriminative classifier for each action. We formulate the problem as a weakly supervised temporal assignment with ordering constraints. Each video clip is divided into small time intervals and each time interval of each video clip is assigned one action label, while respecting the order in which the action labels appear in the given annotations. We show that the action label assignment can be determined together with learning a classifier for each action in a discriminative manner. We evaluate the proposed model on a new and challenging dataset of 937 video clips with a total of 787720 frames containing sequences of 16 different actions from 69 Hollywood movies.
1406.6558
Yaroslav Ganin
Yaroslav Ganin, Victor Lempitsky
$ N^4 $-Fields: Neural Network Nearest Neighbor Fields for Image Transforms
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new architecture for difficult image processing operations, such as natural edge detection or thin object segmentation. The architecture is based on a simple combination of convolutional neural networks with the nearest neighbor search. We focus our attention on the situations when the desired image transformation is too hard for a neural network to learn explicitly. We show that in such situations, the use of the nearest neighbor search on top of the network output allows to improve the results considerably and to account for the underfitting effect during the neural network training. The approach is validated on three challenging benchmarks, where the performance of the proposed architecture matches or exceeds the state-of-the-art.
[ { "version": "v1", "created": "Wed, 25 Jun 2014 13:10:56 GMT" }, { "version": "v2", "created": "Thu, 3 Jul 2014 08:07:52 GMT" } ]
2014-07-04T00:00:00
[ [ "Ganin", "Yaroslav", "" ], [ "Lempitsky", "Victor", "" ] ]
TITLE: $ N^4 $-Fields: Neural Network Nearest Neighbor Fields for Image Transforms ABSTRACT: We propose a new architecture for difficult image processing operations, such as natural edge detection or thin object segmentation. The architecture is based on a simple combination of convolutional neural networks with the nearest neighbor search. We focus our attention on the situations when the desired image transformation is too hard for a neural network to learn explicitly. We show that in such situations, the use of the nearest neighbor search on top of the network output allows to improve the results considerably and to account for the underfitting effect during the neural network training. The approach is validated on three challenging benchmarks, where the performance of the proposed architecture matches or exceeds the state-of-the-art.
1407.0717
Lubomir Bourdev
Lubomir Bourdev, Fei Yang, Rob Fergus
Deep Poselets for Human Detection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of detecting people in natural scenes using a part approach based on poselets. We propose a bootstrapping method that allows us to collect millions of weakly labeled examples for each poselet type. We use these examples to train a Convolutional Neural Net to discriminate different poselet types and separate them from the background class. We then use the trained CNN as a way to represent poselet patches with a Pose Discriminative Feature (PDF) vector -- a compact 256-dimensional feature vector that is effective at discriminating pose from appearance. We train the poselet model on top of PDF features and combine them with object-level CNNs for detection and bounding box prediction. The resulting model leads to state-of-the-art performance for human detection on the PASCAL datasets.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 20:28:22 GMT" } ]
2014-07-04T00:00:00
[ [ "Bourdev", "Lubomir", "" ], [ "Yang", "Fei", "" ], [ "Fergus", "Rob", "" ] ]
TITLE: Deep Poselets for Human Detection ABSTRACT: We address the problem of detecting people in natural scenes using a part approach based on poselets. We propose a bootstrapping method that allows us to collect millions of weakly labeled examples for each poselet type. We use these examples to train a Convolutional Neural Net to discriminate different poselet types and separate them from the background class. We then use the trained CNN as a way to represent poselet patches with a Pose Discriminative Feature (PDF) vector -- a compact 256-dimensional feature vector that is effective at discriminating pose from appearance. We train the poselet model on top of PDF features and combine them with object-level CNNs for detection and bounding box prediction. The resulting model leads to state-of-the-art performance for human detection on the PASCAL datasets.
1407.0786
Chunhua Shen
Sakrapee Paisitkriangkrai, Chunhua Shen, Anton van den Hengel
Strengthening the Effectiveness of Pedestrian Detection with Spatially Pooled Features
16 pages. Appearing in Proc. European Conf. Computer Vision (ECCV) 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a simple yet effective approach to the problem of pedestrian detection which outperforms the current state-of-the-art. Our new features are built on the basis of low-level visual features and spatial pooling. Incorporating spatial pooling improves the translational invariance and thus the robustness of the detection process. We then directly optimise the partial area under the ROC curve (\pAUC) measure, which concentrates detection performance in the range of most practical importance. The combination of these factors leads to a pedestrian detector which outperforms all competitors on all of the standard benchmark datasets. We advance state-of-the-art results by lowering the average miss rate from $13\%$ to $11\%$ on the INRIA benchmark, $41\%$ to $37\%$ on the ETH benchmark, $51\%$ to $42\%$ on the TUD-Brussels benchmark and $36\%$ to $29\%$ on the Caltech-USA benchmark.
[ { "version": "v1", "created": "Thu, 3 Jul 2014 05:39:30 GMT" } ]
2014-07-04T00:00:00
[ [ "Paisitkriangkrai", "Sakrapee", "" ], [ "Shen", "Chunhua", "" ], [ "Hengel", "Anton van den", "" ] ]
TITLE: Strengthening the Effectiveness of Pedestrian Detection with Spatially Pooled Features ABSTRACT: We propose a simple yet effective approach to the problem of pedestrian detection which outperforms the current state-of-the-art. Our new features are built on the basis of low-level visual features and spatial pooling. Incorporating spatial pooling improves the translational invariance and thus the robustness of the detection process. We then directly optimise the partial area under the ROC curve (\pAUC) measure, which concentrates detection performance in the range of most practical importance. The combination of these factors leads to a pedestrian detector which outperforms all competitors on all of the standard benchmark datasets. We advance state-of-the-art results by lowering the average miss rate from $13\%$ to $11\%$ on the INRIA benchmark, $41\%$ to $37\%$ on the ETH benchmark, $51\%$ to $42\%$ on the TUD-Brussels benchmark and $36\%$ to $29\%$ on the Caltech-USA benchmark.
1407.0927
Dominique Mery
Dominique M\'ery (LORIA), Neeraj Kumar Singh (McMaster University)
Modelling an Aircraft Landing System in Event-B (Full Report)
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The failure of hardware or software in a critical system can lead to loss of lives. The design errors can be main source of the failures that can be introduced during system development process. Formal techniques are an alternative approach to verify the correctness of critical systems, overcoming limitations of the traditional validation techniques such as simulation and testing. The increasing complexity and failure rate brings new challenges in the area of verification and validation of avionic systems. Since the reliability of the software cannot be quantified, the \textit{correct by construction} approach can implement a reliable system. Refinement plays a major role to build a large system incrementally from an abstract specification to a concrete system. This paper contributes as a stepwise formal development of the landing system of an aircraft. The formal models include the complex behaviour, temporal behaviour and sequence of operations of the landing gear system. The models are formalized in Event-B modelling language, which supports stepwise refinement. This case study is considered as a benchmark for techniques and tools dedicated to the verification of behavioural properties of systems. The report is the full version of a paper published for the ABZ 2014 Case Study. is
[ { "version": "v1", "created": "Thu, 3 Jul 2014 14:08:57 GMT" } ]
2014-07-04T00:00:00
[ [ "Méry", "Dominique", "", "LORIA" ], [ "Singh", "Neeraj Kumar", "", "McMaster University" ] ]
TITLE: Modelling an Aircraft Landing System in Event-B (Full Report) ABSTRACT: The failure of hardware or software in a critical system can lead to loss of lives. The design errors can be main source of the failures that can be introduced during system development process. Formal techniques are an alternative approach to verify the correctness of critical systems, overcoming limitations of the traditional validation techniques such as simulation and testing. The increasing complexity and failure rate brings new challenges in the area of verification and validation of avionic systems. Since the reliability of the software cannot be quantified, the \textit{correct by construction} approach can implement a reliable system. Refinement plays a major role to build a large system incrementally from an abstract specification to a concrete system. This paper contributes as a stepwise formal development of the landing system of an aircraft. The formal models include the complex behaviour, temporal behaviour and sequence of operations of the landing gear system. The models are formalized in Event-B modelling language, which supports stepwise refinement. This case study is considered as a benchmark for techniques and tools dedicated to the verification of behavioural properties of systems. The report is the full version of a paper published for the ABZ 2014 Case Study. is
1407.0935
Gopalkrishna MT
M. T Gopalakrishna, M. Ravishankar and D. R Rameshbabu
Multiple Moving Object Recognitions in video based on Log Gabor-PCA Approach
8,26,conference
null
10.1007/978-3-319-01778-5_10
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object recognition in the video sequence or images is one of the sub-field of computer vision. Moving object recognition from a video sequence is an appealing topic with applications in various areas such as airport safety, intrusion surveillance, video monitoring, intelligent highway, etc. Moving object recognition is the most challenging task in intelligent video surveillance system. In this regard, many techniques have been proposed based on different methods. Despite of its importance, moving object recognition in complex environments is still far from being completely solved for low resolution videos, foggy videos, and also dim video sequences. All in all, these make it necessary to develop exceedingly robust techniques. This paper introduces multiple moving object recognition in the video sequence based on LoG Gabor-PCA approach and Angle based distance Similarity measures techniques used to recognize the object as a human, vehicle etc. Number of experiments are conducted for indoor and outdoor video sequences of standard datasets and also our own collection of video sequences comprising of partial night vision video sequences. Experimental results show that our proposed approach achieves an excellent recognition rate. Results obtained are satisfactory and competent.
[ { "version": "v1", "created": "Thu, 3 Jul 2014 14:52:56 GMT" } ]
2014-07-04T00:00:00
[ [ "Gopalakrishna", "M. T", "" ], [ "Ravishankar", "M.", "" ], [ "Rameshbabu", "D. R", "" ] ]
TITLE: Multiple Moving Object Recognitions in video based on Log Gabor-PCA Approach ABSTRACT: Object recognition in the video sequence or images is one of the sub-field of computer vision. Moving object recognition from a video sequence is an appealing topic with applications in various areas such as airport safety, intrusion surveillance, video monitoring, intelligent highway, etc. Moving object recognition is the most challenging task in intelligent video surveillance system. In this regard, many techniques have been proposed based on different methods. Despite of its importance, moving object recognition in complex environments is still far from being completely solved for low resolution videos, foggy videos, and also dim video sequences. All in all, these make it necessary to develop exceedingly robust techniques. This paper introduces multiple moving object recognition in the video sequence based on LoG Gabor-PCA approach and Angle based distance Similarity measures techniques used to recognize the object as a human, vehicle etc. Number of experiments are conducted for indoor and outdoor video sequences of standard datasets and also our own collection of video sequences comprising of partial night vision video sequences. Experimental results show that our proposed approach achieves an excellent recognition rate. Results obtained are satisfactory and competent.
1407.0977
Robert Nowotniak
Robert Nowotniak and Jacek Kucharski
Higher-Order Quantum-Inspired Genetic Algorithms
null
null
null
null
cs.NE quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a theory and an empirical evaluation of Higher-Order Quantum-Inspired Genetic Algorithms. Fundamental notions of the theory have been introduced, and a novel Order-2 Quantum-Inspired Genetic Algorithm (QIGA2) has been presented. Contrary to all QIGA algorithms which represent quantum genes as independent qubits, in higher-order QIGAs quantum registers are used to represent genes strings which allows modelling of genes relations using quantum phenomena. Performance comparison has been conducted on a benchmark of 20 deceptive combinatorial optimization problems. It has been presented that using higher quantum orders is beneficial for genetic algorithm efficiency, and the new QIGA2 algorithm outperforms the old QIGA algorithm which was tuned in highly compute intensive metaoptimization process.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 15:22:11 GMT" } ]
2014-07-04T00:00:00
[ [ "Nowotniak", "Robert", "" ], [ "Kucharski", "Jacek", "" ] ]
TITLE: Higher-Order Quantum-Inspired Genetic Algorithms ABSTRACT: This paper presents a theory and an empirical evaluation of Higher-Order Quantum-Inspired Genetic Algorithms. Fundamental notions of the theory have been introduced, and a novel Order-2 Quantum-Inspired Genetic Algorithm (QIGA2) has been presented. Contrary to all QIGA algorithms which represent quantum genes as independent qubits, in higher-order QIGAs quantum registers are used to represent genes strings which allows modelling of genes relations using quantum phenomena. Performance comparison has been conducted on a benchmark of 20 deceptive combinatorial optimization problems. It has been presented that using higher quantum orders is beneficial for genetic algorithm efficiency, and the new QIGA2 algorithm outperforms the old QIGA algorithm which was tuned in highly compute intensive metaoptimization process.
1407.0455
Yingyi Bu
Yingyi Bu, Vinayak Borkar, Jianfeng Jia, Michael J. Carey, Tyson Condie
Pregelix: Big(ger) Graph Analytics on A Dataflow Engine
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a growing need for distributed graph processing systems that are capable of gracefully scaling to very large graph datasets. Unfortunately, this challenge has not been easily met due to the intense memory pressure imposed by process-centric, message passing designs that many graph processing systems follow. Pregelix is a new open source distributed graph processing system that is based on an iterative dataflow design that is better tuned to handle both in-memory and out-of-core workloads. As such, Pregelix offers improved performance characteristics and scaling properties over current open source systems (e.g., we have seen up to 15x speedup compared to Apache Giraph and up to 35x speedup compared to distributed GraphLab), and makes more effective use of available machine resources to support Big(ger) Graph Analytics.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 05:04:28 GMT" } ]
2014-07-03T00:00:00
[ [ "Bu", "Yingyi", "" ], [ "Borkar", "Vinayak", "" ], [ "Jia", "Jianfeng", "" ], [ "Carey", "Michael J.", "" ], [ "Condie", "Tyson", "" ] ]
TITLE: Pregelix: Big(ger) Graph Analytics on A Dataflow Engine ABSTRACT: There is a growing need for distributed graph processing systems that are capable of gracefully scaling to very large graph datasets. Unfortunately, this challenge has not been easily met due to the intense memory pressure imposed by process-centric, message passing designs that many graph processing systems follow. Pregelix is a new open source distributed graph processing system that is based on an iterative dataflow design that is better tuned to handle both in-memory and out-of-core workloads. As such, Pregelix offers improved performance characteristics and scaling properties over current open source systems (e.g., we have seen up to 15x speedup compared to Apache Giraph and up to 35x speedup compared to distributed GraphLab), and makes more effective use of available machine resources to support Big(ger) Graph Analytics.
1407.0547
Mark Phillips
Mark Phillips, Lauren Ko
Understanding Repository Growth at the University of North Texas: A Case Study
5 pages
null
null
null
cs.DL
http://creativecommons.org/licenses/by/3.0/
Over the past decade the University of North Texas Libraries (UNTL) has developed a sizable digital library infrastructure for use in carrying out its core mission to the students, faculty, staff and associated communities of the university. This repository of content offers countless research possibilities for end users across the Internet when it is discovered and used in research, scholarship, entertainment, and lifelong learning. The characteristics of the repository itself provide insight into the workings of a modern digital library infrastructure, how it was created, how often it is updated, or how often it is modified. In that vein, the authors created a dataset comprised of information extracted from the UNT Libraries' archival repository Coda and analyzed this dataset in order to demonstrate the value and insights that can be gained from sharing repository characteristics more broadly. This case study presents the findings from an analysis of this dataset.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 12:55:49 GMT" } ]
2014-07-03T00:00:00
[ [ "Phillips", "Mark", "" ], [ "Ko", "Lauren", "" ] ]
TITLE: Understanding Repository Growth at the University of North Texas: A Case Study ABSTRACT: Over the past decade the University of North Texas Libraries (UNTL) has developed a sizable digital library infrastructure for use in carrying out its core mission to the students, faculty, staff and associated communities of the university. This repository of content offers countless research possibilities for end users across the Internet when it is discovered and used in research, scholarship, entertainment, and lifelong learning. The characteristics of the repository itself provide insight into the workings of a modern digital library infrastructure, how it was created, how often it is updated, or how often it is modified. In that vein, the authors created a dataset comprised of information extracted from the UNT Libraries' archival repository Coda and analyzed this dataset in order to demonstrate the value and insights that can be gained from sharing repository characteristics more broadly. This case study presents the findings from an analysis of this dataset.
1209.5429
Yasser Gonzalez Fernandez
Yasser Gonzalez-Fernandez, Marta Soto
copulaedas: An R Package for Estimation of Distribution Algorithms Based on Copulas
null
Yasser Gonzalez-Fernandez, Marta Soto (2014). copulaedas: An R Package for Estimation of Distribution Algorithms Based on Copulas. Journal of Statistical Software, 58(9), 1-34. URL http://www.jstatsoft.org/v58/i09/
null
null
cs.NE cs.MS
http://creativecommons.org/licenses/by/3.0/
The use of copula-based models in EDAs (estimation of distribution algorithms) is currently an active area of research. In this context, the copulaedas package for R provides a platform where EDAs based on copulas can be implemented and studied. The package offers complete implementations of various EDAs based on copulas and vines, a group of well-known optimization problems, and utility functions to study the performance of the algorithms. Newly developed EDAs can be easily integrated into the package by extending an S4 class with generic functions for their main components. This paper presents copulaedas by providing an overview of EDAs based on copulas, a description of the implementation of the package, and an illustration of its use through examples. The examples include running the EDAs defined in the package, implementing new algorithms, and performing an empirical study to compare the behavior of different algorithms on benchmark functions and a real-world problem.
[ { "version": "v1", "created": "Mon, 24 Sep 2012 21:24:17 GMT" }, { "version": "v2", "created": "Tue, 30 Apr 2013 18:33:27 GMT" }, { "version": "v3", "created": "Sat, 17 May 2014 20:52:15 GMT" }, { "version": "v4", "created": "Tue, 1 Jul 2014 19:08:59 GMT" } ]
2014-07-02T00:00:00
[ [ "Gonzalez-Fernandez", "Yasser", "" ], [ "Soto", "Marta", "" ] ]
TITLE: copulaedas: An R Package for Estimation of Distribution Algorithms Based on Copulas ABSTRACT: The use of copula-based models in EDAs (estimation of distribution algorithms) is currently an active area of research. In this context, the copulaedas package for R provides a platform where EDAs based on copulas can be implemented and studied. The package offers complete implementations of various EDAs based on copulas and vines, a group of well-known optimization problems, and utility functions to study the performance of the algorithms. Newly developed EDAs can be easily integrated into the package by extending an S4 class with generic functions for their main components. This paper presents copulaedas by providing an overview of EDAs based on copulas, a description of the implementation of the package, and an illustration of its use through examples. The examples include running the EDAs defined in the package, implementing new algorithms, and performing an empirical study to compare the behavior of different algorithms on benchmark functions and a real-world problem.
1407.0179
Novi Quadrianto
Daniel Hern\'andez-Lobato, Viktoriia Sharmanska, Kristian Kersting, Christoph H. Lampert, Novi Quadrianto
Mind the Nuisance: Gaussian Process Classification using Privileged Noise
14 pages with figures
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The learning with privileged information setting has recently attracted a lot of attention within the machine learning community, as it allows the integration of additional knowledge into the training process of a classifier, even when this comes in the form of a data modality that is not available at test time. Here, we show that privileged information can naturally be treated as noise in the latent function of a Gaussian Process classifier (GPC). That is, in contrast to the standard GPC setting, the latent function is not just a nuisance but a feature: it becomes a natural measure of confidence about the training data by modulating the slope of the GPC sigmoid likelihood function. Extensive experiments on public datasets show that the proposed GPC method using privileged noise, called GPC+, improves over a standard GPC without privileged knowledge, and also over the current state-of-the-art SVM-based method, SVM+. Moreover, we show that advanced neural networks and deep learning methods can be compressed as privileged information.
[ { "version": "v1", "created": "Tue, 1 Jul 2014 10:44:49 GMT" } ]
2014-07-02T00:00:00
[ [ "Hernández-Lobato", "Daniel", "" ], [ "Sharmanska", "Viktoriia", "" ], [ "Kersting", "Kristian", "" ], [ "Lampert", "Christoph H.", "" ], [ "Quadrianto", "Novi", "" ] ]
TITLE: Mind the Nuisance: Gaussian Process Classification using Privileged Noise ABSTRACT: The learning with privileged information setting has recently attracted a lot of attention within the machine learning community, as it allows the integration of additional knowledge into the training process of a classifier, even when this comes in the form of a data modality that is not available at test time. Here, we show that privileged information can naturally be treated as noise in the latent function of a Gaussian Process classifier (GPC). That is, in contrast to the standard GPC setting, the latent function is not just a nuisance but a feature: it becomes a natural measure of confidence about the training data by modulating the slope of the GPC sigmoid likelihood function. Extensive experiments on public datasets show that the proposed GPC method using privileged noise, called GPC+, improves over a standard GPC without privileged knowledge, and also over the current state-of-the-art SVM-based method, SVM+. Moreover, we show that advanced neural networks and deep learning methods can be compressed as privileged information.
1210.3456
Mingjun Zhong
Mingjun Zhong, Rong Liu, Bo Liu
Bayesian Analysis for miRNA and mRNA Interactions Using Expression Data
21 pages, 11 figures, 8 tables
null
null
null
stat.AP cs.LG q-bio.GN q-bio.MN stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MicroRNAs (miRNAs) are small RNA molecules composed of 19-22 nt, which play important regulatory roles in post-transcriptional gene regulation by inhibiting the translation of the mRNA into proteins or otherwise cleaving the target mRNA. Inferring miRNA targets provides useful information for understanding the roles of miRNA in biological processes that are potentially involved in complex diseases. Statistical methodologies for point estimation, such as the Least Absolute Shrinkage and Selection Operator (LASSO) algorithm, have been proposed to identify the interactions of miRNA and mRNA based on sequence and expression data. In this paper, we propose using the Bayesian LASSO (BLASSO) and the non-negative Bayesian LASSO (nBLASSO) to analyse the interactions between miRNA and mRNA using expression data. The proposed Bayesian methods explore the posterior distributions for those parameters required to model the miRNA-mRNA interactions. These approaches can be used to observe the inferred effects of the miRNAs on the targets by plotting the posterior distributions of those parameters. For comparison purposes, the Least Squares Regression (LSR), Ridge Regression (RR), LASSO, non-negative LASSO (nLASSO), and the proposed Bayesian approaches were applied to four public datasets. We concluded that nLASSO and nBLASSO perform best in terms of sensitivity and specificity. Compared to the point estimate algorithms, which only provide single estimates for those parameters, the Bayesian methods are more meaningful and provide credible intervals, which take into account the uncertainty of the inferred interactions of the miRNA and mRNA. Furthermore, Bayesian methods naturally provide statistical significance to select convincing inferred interactions, while point estimate algorithms require a manually chosen threshold, which is less meaningful, to choose the possible interactions.
[ { "version": "v1", "created": "Fri, 12 Oct 2012 09:03:14 GMT" }, { "version": "v2", "created": "Mon, 30 Jun 2014 10:16:51 GMT" } ]
2014-07-01T00:00:00
[ [ "Zhong", "Mingjun", "" ], [ "Liu", "Rong", "" ], [ "Liu", "Bo", "" ] ]
TITLE: Bayesian Analysis for miRNA and mRNA Interactions Using Expression Data ABSTRACT: MicroRNAs (miRNAs) are small RNA molecules composed of 19-22 nt, which play important regulatory roles in post-transcriptional gene regulation by inhibiting the translation of the mRNA into proteins or otherwise cleaving the target mRNA. Inferring miRNA targets provides useful information for understanding the roles of miRNA in biological processes that are potentially involved in complex diseases. Statistical methodologies for point estimation, such as the Least Absolute Shrinkage and Selection Operator (LASSO) algorithm, have been proposed to identify the interactions of miRNA and mRNA based on sequence and expression data. In this paper, we propose using the Bayesian LASSO (BLASSO) and the non-negative Bayesian LASSO (nBLASSO) to analyse the interactions between miRNA and mRNA using expression data. The proposed Bayesian methods explore the posterior distributions for those parameters required to model the miRNA-mRNA interactions. These approaches can be used to observe the inferred effects of the miRNAs on the targets by plotting the posterior distributions of those parameters. For comparison purposes, the Least Squares Regression (LSR), Ridge Regression (RR), LASSO, non-negative LASSO (nLASSO), and the proposed Bayesian approaches were applied to four public datasets. We concluded that nLASSO and nBLASSO perform best in terms of sensitivity and specificity. Compared to the point estimate algorithms, which only provide single estimates for those parameters, the Bayesian methods are more meaningful and provide credible intervals, which take into account the uncertainty of the inferred interactions of the miRNA and mRNA. Furthermore, Bayesian methods naturally provide statistical significance to select convincing inferred interactions, while point estimate algorithms require a manually chosen threshold, which is less meaningful, to choose the possible interactions.
1307.1424
Phillippe Samer
Phillippe Samer, Sebasti\'an Urrutia
A branch and cut algorithm for minimum spanning trees under conflict constraints
null
null
10.1007/s11590-014-0750-x
null
cs.DS math.CO math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study approaches for the exact solution of the \NP--hard minimum spanning tree problem under conflict constraints. Given a graph $G(V,E)$ and a set $C \subset E \times E$ of conflicting edge pairs, the problem consists of finding a conflict-free minimum spanning tree, i.e. feasible solutions are allowed to include at most one of the edges from each pair in $C$. The problem was introduced recently in the literature, with several results on its complexity and approximability. Some formulations and both exact and heuristic algorithms were also discussed, but computational results indicate considerably large duality gaps and a lack of optimality certificates for benchmark instances. In this paper, we build on the representation of conflict constraints using an auxiliary conflict graph $\hat{G}(E,C)$, where stable sets correspond to conflict-free subsets of $E$. We introduce a general preprocessing method and a branch and cut algorithm using an IP formulation with exponentially sized classes of valid inequalities for both the spanning tree and the stable set polytopes. Encouraging computational results indicate that the dual bounds of our approach are significantly stronger than those previously available, already in the initial LP relaxation, and we are able to provide new feasibility and optimality certificates.
[ { "version": "v1", "created": "Thu, 4 Jul 2013 17:47:09 GMT" }, { "version": "v2", "created": "Mon, 16 Dec 2013 18:08:25 GMT" }, { "version": "v3", "created": "Mon, 30 Jun 2014 13:36:45 GMT" } ]
2014-07-01T00:00:00
[ [ "Samer", "Phillippe", "" ], [ "Urrutia", "Sebastián", "" ] ]
TITLE: A branch and cut algorithm for minimum spanning trees under conflict constraints ABSTRACT: We study approaches for the exact solution of the \NP--hard minimum spanning tree problem under conflict constraints. Given a graph $G(V,E)$ and a set $C \subset E \times E$ of conflicting edge pairs, the problem consists of finding a conflict-free minimum spanning tree, i.e. feasible solutions are allowed to include at most one of the edges from each pair in $C$. The problem was introduced recently in the literature, with several results on its complexity and approximability. Some formulations and both exact and heuristic algorithms were also discussed, but computational results indicate considerably large duality gaps and a lack of optimality certificates for benchmark instances. In this paper, we build on the representation of conflict constraints using an auxiliary conflict graph $\hat{G}(E,C)$, where stable sets correspond to conflict-free subsets of $E$. We introduce a general preprocessing method and a branch and cut algorithm using an IP formulation with exponentially sized classes of valid inequalities for both the spanning tree and the stable set polytopes. Encouraging computational results indicate that the dual bounds of our approach are significantly stronger than those previously available, already in the initial LP relaxation, and we are able to provide new feasibility and optimality certificates.
1405.3518
Yoon Kim
Yoon Kim, Owen Zhang
Credibility Adjusted Term Frequency: A Supervised Term Weighting Scheme for Sentiment Analysis and Text Classification
null
Proceedings of the 5th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis. June, 2014. 79--83
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a simple but novel supervised weighting scheme for adjusting term frequency in tf-idf for sentiment analysis and text classification. We compare our method to baseline weighting schemes and find that it outperforms them on multiple benchmarks. The method is robust and works well on both snippets and longer documents.
[ { "version": "v1", "created": "Wed, 14 May 2014 14:50:59 GMT" }, { "version": "v2", "created": "Sat, 28 Jun 2014 17:18:54 GMT" } ]
2014-07-01T00:00:00
[ [ "Kim", "Yoon", "" ], [ "Zhang", "Owen", "" ] ]
TITLE: Credibility Adjusted Term Frequency: A Supervised Term Weighting Scheme for Sentiment Analysis and Text Classification ABSTRACT: We provide a simple but novel supervised weighting scheme for adjusting term frequency in tf-idf for sentiment analysis and text classification. We compare our method to baseline weighting schemes and find that it outperforms them on multiple benchmarks. The method is robust and works well on both snippets and longer documents.
1406.7362
KyungHyun Cho
Kyunghyun Cho and Yoshua Bengio
Exponentially Increasing the Capacity-to-Computation Ratio for Conditional Computation in Deep Learning
null
null
null
null
stat.ML cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many state-of-the-art results obtained with deep networks are achieved with the largest models that could be trained, and if more computation power was available, we might be able to exploit much larger datasets in order to improve generalization ability. Whereas in learning algorithms such as decision trees the ratio of capacity (e.g., the number of parameters) to computation is very favorable (up to exponentially more parameters than computation), the ratio is essentially 1 for deep neural networks. Conditional computation has been proposed as a way to increase the capacity of a deep neural network without increasing the amount of computation required, by activating some parameters and computation "on-demand", on a per-example basis. In this note, we propose a novel parametrization of weight matrices in neural networks which has the potential to increase up to exponentially the ratio of the number of parameters to computation. The proposed approach is based on turning on some parameters (weight matrices) when specific bit patterns of hidden unit activations are obtained. In order to better control for the overfitting that might result, we propose a parametrization that is tree-structured, where each node of the tree corresponds to a prefix of a sequence of sign bits, or gating units, associated with hidden units.
[ { "version": "v1", "created": "Sat, 28 Jun 2014 06:45:51 GMT" } ]
2014-07-01T00:00:00
[ [ "Cho", "Kyunghyun", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Exponentially Increasing the Capacity-to-Computation Ratio for Conditional Computation in Deep Learning ABSTRACT: Many state-of-the-art results obtained with deep networks are achieved with the largest models that could be trained, and if more computation power was available, we might be able to exploit much larger datasets in order to improve generalization ability. Whereas in learning algorithms such as decision trees the ratio of capacity (e.g., the number of parameters) to computation is very favorable (up to exponentially more parameters than computation), the ratio is essentially 1 for deep neural networks. Conditional computation has been proposed as a way to increase the capacity of a deep neural network without increasing the amount of computation required, by activating some parameters and computation "on-demand", on a per-example basis. In this note, we propose a novel parametrization of weight matrices in neural networks which has the potential to increase up to exponentially the ratio of the number of parameters to computation. The proposed approach is based on turning on some parameters (weight matrices) when specific bit patterns of hidden unit activations are obtained. In order to better control for the overfitting that might result, we propose a parametrization that is tree-structured, where each node of the tree corresponds to a prefix of a sequence of sign bits, or gating units, associated with hidden units.
1406.7429
Jonathan Katzman
Jonathan Katzman and Diane Duros
Comparison of SVM Optimization Techniques in the Primal
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines the efficacy of different optimization techniques in a primal formulation of a support vector machine (SVM). Three main techniques are compared. The dataset used to compare all three techniques was the Sentiment Analysis on Movie Reviews dataset, from kaggle.com.
[ { "version": "v1", "created": "Sat, 28 Jun 2014 18:59:44 GMT" } ]
2014-07-01T00:00:00
[ [ "Katzman", "Jonathan", "" ], [ "Duros", "Diane", "" ] ]
TITLE: Comparison of SVM Optimization Techniques in the Primal ABSTRACT: This paper examines the efficacy of different optimization techniques in a primal formulation of a support vector machine (SVM). Three main techniques are compared. The dataset used to compare all three techniques was the Sentiment Analysis on Movie Reviews dataset, from kaggle.com.
1406.7525
Wenqi Huang
Wenqi Huang, Xiaojin Gong
Fusion Based Holistic Road Scene Understanding
14 pages,11 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of holistic road scene understanding based on the integration of visual and range data. To achieve the grand goal, we propose an approach that jointly tackles object-level image segmentation and semantic region labeling within a conditional random field (CRF) framework. Specifically, we first generate semantic object hypotheses by clustering 3D points, learning their prior appearance models, and using a deep learning method for reasoning their semantic categories. The learned priors, together with spatial and geometric contexts, are incorporated in CRF. With this formulation, visual and range data are fused thoroughly, and moreover, the coupled segmentation and semantic labeling problem can be inferred via Graph Cuts. Our approach is validated on the challenging KITTI dataset that contains diverse complicated road scenarios. Both quantitative and qualitative evaluations demonstrate its effectiveness.
[ { "version": "v1", "created": "Sun, 29 Jun 2014 17:11:25 GMT" } ]
2014-07-01T00:00:00
[ [ "Huang", "Wenqi", "" ], [ "Gong", "Xiaojin", "" ] ]
TITLE: Fusion Based Holistic Road Scene Understanding ABSTRACT: This paper addresses the problem of holistic road scene understanding based on the integration of visual and range data. To achieve the grand goal, we propose an approach that jointly tackles object-level image segmentation and semantic region labeling within a conditional random field (CRF) framework. Specifically, we first generate semantic object hypotheses by clustering 3D points, learning their prior appearance models, and using a deep learning method for reasoning their semantic categories. The learned priors, together with spatial and geometric contexts, are incorporated in CRF. With this formulation, visual and range data are fused thoroughly, and moreover, the coupled segmentation and semantic labeling problem can be inferred via Graph Cuts. Our approach is validated on the challenging KITTI dataset that contains diverse complicated road scenarios. Both quantitative and qualitative evaluations demonstrate its effectiveness.
1406.7738
Walter Lasecki
Sanmay Das, and Allen Lavoie
Home Is Where the Up-Votes Are: Behavior Changes in Response to Feedback in Social Media
null
null
null
ci-2014/93
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent research shows that humans are heavily influenced by online social interactions: We are more likely to perform actions which, in the past, have led to positive social feedback. We introduce a quantitative model of behavior changes in response to such feedback, drawing on inverse reinforcement learning and studies of human game playing. The model allows us to make predictions, particularly in the context of social media, about which community a user will select, and to quantify how future selections change based on the feedback a user receives. We show that our model predicts real-world changes in behavior on a dataset gathered from reddit. We also explore how this relatively simple model of individual behavior can lead to complex collective dynamics when there is a population of users, each individual learning in response to feedback and in turn providing feedback to others.
[ { "version": "v1", "created": "Mon, 30 Jun 2014 13:51:23 GMT" } ]
2014-07-01T00:00:00
[ [ "Das", "Sanmay", "" ], [ "Lavoie", "Allen", "" ] ]
TITLE: Home Is Where the Up-Votes Are: Behavior Changes in Response to Feedback in Social Media ABSTRACT: Recent research shows that humans are heavily influenced by online social interactions: We are more likely to perform actions which, in the past, have led to positive social feedback. We introduce a quantitative model of behavior changes in response to such feedback, drawing on inverse reinforcement learning and studies of human game playing. The model allows us to make predictions, particularly in the context of social media, about which community a user will select, and to quantify how future selections change based on the feedback a user receives. We show that our model predicts real-world changes in behavior on a dataset gathered from reddit. We also explore how this relatively simple model of individual behavior can lead to complex collective dynamics when there is a population of users, each individual learning in response to feedback and in turn providing feedback to others.
1406.7799
Pedram Mohammadi Mr.
Pedram Mohammadi, Abbas Ebrahimi-Moghadam, and Shahram Shirani
Subjective and Objective Quality Assessment of Image: A Survey
50 pages, 12 figures, and 3 Tables. This work has been submitted to Elsevier Journal of Visual Communication and Image Representation
null
null
null
cs.MM cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the increasing demand for image-based applications, the efficient and reliable evaluation of image quality has increased in importance. Measuring the image quality is of fundamental importance for numerous image processing applications, where the goal of image quality assessment (IQA) methods is to automatically evaluate the quality of images in agreement with human quality judgments. Numerous IQA methods have been proposed over the past years to fulfill this goal. In this paper, a survey of the quality assessment methods for conventional image signals, as well as the newly emerged ones, which includes the high dynamic range (HDR) and 3-D images, is presented. A comprehensive explanation of the subjective and objective IQA and their classification is provided. Six widely used subjective quality datasets, and performance measures are reviewed. Emphasis is given to the full-reference image quality assessment (FR-IQA) methods, and 9 often-used quality measures (including mean squared error (MSE), structural similarity index (SSIM), multi-scale structural similarity index (MS-SSIM), visual information fidelity (VIF), most apparent distortion (MAD), feature similarity measure (FSIM), feature similarity measure for color images (FSIMC), dynamic range independent measure (DRIM), and tone-mapped images quality index (TMQI)) are carefully described, and their performance and computation time on four subjective quality datasets are evaluated. Furthermore, a brief introduction to 3-D IQA is provided and the issues related to this area of research are reviewed.
[ { "version": "v1", "created": "Mon, 30 Jun 2014 16:25:00 GMT" } ]
2014-07-01T00:00:00
[ [ "Mohammadi", "Pedram", "" ], [ "Ebrahimi-Moghadam", "Abbas", "" ], [ "Shirani", "Shahram", "" ] ]
TITLE: Subjective and Objective Quality Assessment of Image: A Survey ABSTRACT: With the increasing demand for image-based applications, the efficient and reliable evaluation of image quality has increased in importance. Measuring the image quality is of fundamental importance for numerous image processing applications, where the goal of image quality assessment (IQA) methods is to automatically evaluate the quality of images in agreement with human quality judgments. Numerous IQA methods have been proposed over the past years to fulfill this goal. In this paper, a survey of the quality assessment methods for conventional image signals, as well as the newly emerged ones, which includes the high dynamic range (HDR) and 3-D images, is presented. A comprehensive explanation of the subjective and objective IQA and their classification is provided. Six widely used subjective quality datasets, and performance measures are reviewed. Emphasis is given to the full-reference image quality assessment (FR-IQA) methods, and 9 often-used quality measures (including mean squared error (MSE), structural similarity index (SSIM), multi-scale structural similarity index (MS-SSIM), visual information fidelity (VIF), most apparent distortion (MAD), feature similarity measure (FSIM), feature similarity measure for color images (FSIMC), dynamic range independent measure (DRIM), and tone-mapped images quality index (TMQI)) are carefully described, and their performance and computation time on four subjective quality datasets are evaluated. Furthermore, a brief introduction to 3-D IQA is provided and the issues related to this area of research are reviewed.
1406.7811
Erik Cuevas
Erik Cuevas and Mauricio Gonzalez
An optimization algorithm for multimodal functions inspired by collective animal behavior
18 Pages. arXiv admin note: text overlap with arXiv:1405.5164
Soft Computing 17 (3) , (2013), pp. 489-502
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interest in multimodal function optimization is expanding rapidly since real world optimization problems often demand locating multiple optima within a search space. This article presents a new multimodal optimization algorithm named as the Collective Animal Behavior (CAB). Animal groups, such as schools of fish, flocks of birds, swarms of locusts and herds of wildebeest, exhibit a variety of behaviors including swarming about a food source, milling around a central location or migrating over large distances in aligned groups. These collective behaviors are often advantageous to groups, allowing them to increase their harvesting efficiency to follow better migration routes, to improve their aerodynamic and to avoid predation. In the proposed algorithm, searcher agents are a group of animals which interact to each other based on the biological laws of collective motion. Experimental results demonstrate that the proposed algorithm is capable of finding global and local optima of benchmark multimodal optimization problems with a higher efficiency in comparison to other methods reported in the literature.
[ { "version": "v1", "created": "Mon, 30 Jun 2014 16:48:05 GMT" } ]
2014-07-01T00:00:00
[ [ "Cuevas", "Erik", "" ], [ "Gonzalez", "Mauricio", "" ] ]
TITLE: An optimization algorithm for multimodal functions inspired by collective animal behavior ABSTRACT: Interest in multimodal function optimization is expanding rapidly since real world optimization problems often demand locating multiple optima within a search space. This article presents a new multimodal optimization algorithm named as the Collective Animal Behavior (CAB). Animal groups, such as schools of fish, flocks of birds, swarms of locusts and herds of wildebeest, exhibit a variety of behaviors including swarming about a food source, milling around a central location or migrating over large distances in aligned groups. These collective behaviors are often advantageous to groups, allowing them to increase their harvesting efficiency to follow better migration routes, to improve their aerodynamic and to avoid predation. In the proposed algorithm, searcher agents are a group of animals which interact to each other based on the biological laws of collective motion. Experimental results demonstrate that the proposed algorithm is capable of finding global and local optima of benchmark multimodal optimization problems with a higher efficiency in comparison to other methods reported in the literature.
1312.0363
Yuanming Shi
Yuanming Shi, Jun Zhang, Khaled B. Letaief
Optimal Stochastic Coordinated Beamforming for Wireless Cooperative Networks with CSI Uncertainty
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transmit optimization and resource allocation for wireless cooperative networks with channel state information (CSI) uncertainty are important but challenging problems in terms of both the uncertainty modeling and performance op- timization. In this paper, we establish a generic stochastic coordinated beamforming (SCB) framework that provides flex- ibility in the channel uncertainty modeling, while guaranteeing optimality in the transmission strategies. We adopt a general stochastic model for the CSI uncertainty, which is applicable for various practical scenarios. The SCB problem turns out to be a joint chance constrained program (JCCP) and is known to be highly intractable. In contrast to all the previous algo- rithms for JCCP that can only find feasible but sub-optimal solutions, we propose a novel stochastic DC (difference-of-convex) programming algorithm with optimality guarantee, which can serve as the benchmark for evaluating heuristic and sub-optimal algorithms. The key observation is that the highly intractable probability constraint can be equivalently reformulated as a DC constraint. This further enables efficient algorithms to achieve optimality. Simulation results will illustrate the convergence, conservativeness, stability and performance gains of the proposed algorithm.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 07:42:06 GMT" }, { "version": "v2", "created": "Fri, 27 Jun 2014 01:19:50 GMT" } ]
2014-06-30T00:00:00
[ [ "Shi", "Yuanming", "" ], [ "Zhang", "Jun", "" ], [ "Letaief", "Khaled B.", "" ] ]
TITLE: Optimal Stochastic Coordinated Beamforming for Wireless Cooperative Networks with CSI Uncertainty ABSTRACT: Transmit optimization and resource allocation for wireless cooperative networks with channel state information (CSI) uncertainty are important but challenging problems in terms of both the uncertainty modeling and performance op- timization. In this paper, we establish a generic stochastic coordinated beamforming (SCB) framework that provides flex- ibility in the channel uncertainty modeling, while guaranteeing optimality in the transmission strategies. We adopt a general stochastic model for the CSI uncertainty, which is applicable for various practical scenarios. The SCB problem turns out to be a joint chance constrained program (JCCP) and is known to be highly intractable. In contrast to all the previous algo- rithms for JCCP that can only find feasible but sub-optimal solutions, we propose a novel stochastic DC (difference-of-convex) programming algorithm with optimality guarantee, which can serve as the benchmark for evaluating heuristic and sub-optimal algorithms. The key observation is that the highly intractable probability constraint can be equivalently reformulated as a DC constraint. This further enables efficient algorithms to achieve optimality. Simulation results will illustrate the convergence, conservativeness, stability and performance gains of the proposed algorithm.
1406.7075
\"Omer Faruk Ertu\u{g}rul
Omer Faruk Ertugrul
Adaptive texture energy measure method
null
International Journal of Intelligent Information Systems. Vol. 3, No. 2, 2014, pp. 13-18
10.11648/j.ijiis.20140302.11
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent developments in image quality, data storage, and computational capacity have heightened the need for texture analysis in image process. To date various methods have been developed and introduced for assessing textures in images. One of the most popular texture analysis methods is the Texture Energy Measure (TEM) and it has been used for detecting edges, levels, waves, spots and ripples by employing predefined TEM masks to images. Despite several success- ful studies, TEM has a number of serious weaknesses in use. The major drawback is; the masks are predefined therefore they cannot be adapted to image. A new method, Adaptive Texture Energy Measure Method (aTEM), was offered to over- come this disadvantage of TEM by using adaptive masks by adjusting the contrast, sharpening and orientation angle of the mask. To assess the applicability of aTEM, it is compared with TEM. The accuracy of the classification of butterfly, flower seed and Brodatz datasets are 0.08, 0.3292 and 0.3343, respectively by TEM and 0.0053, 0.2417 and 0.3153, respectively by aTEM. The results of this study indicate that aTEM is a successful method for texture analysis.
[ { "version": "v1", "created": "Fri, 27 Jun 2014 06:00:17 GMT" } ]
2014-06-30T00:00:00
[ [ "Ertugrul", "Omer Faruk", "" ] ]
TITLE: Adaptive texture energy measure method ABSTRACT: Recent developments in image quality, data storage, and computational capacity have heightened the need for texture analysis in image process. To date various methods have been developed and introduced for assessing textures in images. One of the most popular texture analysis methods is the Texture Energy Measure (TEM) and it has been used for detecting edges, levels, waves, spots and ripples by employing predefined TEM masks to images. Despite several success- ful studies, TEM has a number of serious weaknesses in use. The major drawback is; the masks are predefined therefore they cannot be adapted to image. A new method, Adaptive Texture Energy Measure Method (aTEM), was offered to over- come this disadvantage of TEM by using adaptive masks by adjusting the contrast, sharpening and orientation angle of the mask. To assess the applicability of aTEM, it is compared with TEM. The accuracy of the classification of butterfly, flower seed and Brodatz datasets are 0.08, 0.3292 and 0.3343, respectively by TEM and 0.0053, 0.2417 and 0.3153, respectively by aTEM. The results of this study indicate that aTEM is a successful method for texture analysis.
1309.3132
Xiao-Bo Jin
Xiao-Bo Jin, Guang-Gang Geng, Dexian Zhang
Combination of Multiple Bipartite Ranking for Web Content Quality Evaluation
17 pages, 8 figures, 2 tables
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web content quality estimation is crucial to various web content processing applications. Our previous work applied Bagging + C4.5 to achive the best results on the ECML/PKDD Discovery Challenge 2010, which is the comibination of many point-wise rankinig models. In this paper, we combine multiple pair-wise bipartite ranking learner to solve the multi-partite ranking problems for the web quality estimation. In encoding stage, we present the ternary encoding and the binary coding extending each rank value to $L - 1$ (L is the number of the different ranking value). For the decoding, we discuss the combination of multiple ranking results from multiple bipartite ranking models with the predefined weighting and the adaptive weighting. The experiments on ECML/PKDD 2010 Discovery Challenge datasets show that \textit{binary coding} + \textit{predefined weighting} yields the highest performance in all four combinations and furthermore it is better than the best results reported in ECML/PKDD 2010 Discovery Challenge competition.
[ { "version": "v1", "created": "Thu, 12 Sep 2013 12:15:51 GMT" }, { "version": "v2", "created": "Thu, 26 Jun 2014 03:01:13 GMT" } ]
2014-06-27T00:00:00
[ [ "Jin", "Xiao-Bo", "" ], [ "Geng", "Guang-Gang", "" ], [ "Zhang", "Dexian", "" ] ]
TITLE: Combination of Multiple Bipartite Ranking for Web Content Quality Evaluation ABSTRACT: Web content quality estimation is crucial to various web content processing applications. Our previous work applied Bagging + C4.5 to achive the best results on the ECML/PKDD Discovery Challenge 2010, which is the comibination of many point-wise rankinig models. In this paper, we combine multiple pair-wise bipartite ranking learner to solve the multi-partite ranking problems for the web quality estimation. In encoding stage, we present the ternary encoding and the binary coding extending each rank value to $L - 1$ (L is the number of the different ranking value). For the decoding, we discuss the combination of multiple ranking results from multiple bipartite ranking models with the predefined weighting and the adaptive weighting. The experiments on ECML/PKDD 2010 Discovery Challenge datasets show that \textit{binary coding} + \textit{predefined weighting} yields the highest performance in all four combinations and furthermore it is better than the best results reported in ECML/PKDD 2010 Discovery Challenge competition.
1405.1328
Emiliano De Cristofaro
Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, and Ersin Uzun
What's the Gist? Privacy-Preserving Aggregation of User Profiles
To appear in the Proceedings of ESORICS 2014
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past few years, online service providers have started gathering increasing amounts of personal information to build user profiles and monetize them with advertisers and data brokers. Users have little control of what information is processed and are often left with an all-or-nothing decision between receiving free services or refusing to be profiled. This paper explores an alternative approach where users only disclose an aggregate model -- the "gist" -- of their data. We aim to preserve data utility and simultaneously provide user privacy. We show that this approach can be efficiently supported by letting users contribute encrypted and differentially-private data to an aggregator. The aggregator combines encrypted contributions and can only extract an aggregate model of the underlying data. We evaluate our framework on a dataset of 100,000 U.S. users obtained from the U.S. Census Bureau and show that (i) it provides accurate aggregates with as little as 100 users, (ii) it generates revenue for both users and data brokers, and (iii) its overhead is appreciably low.
[ { "version": "v1", "created": "Tue, 6 May 2014 15:49:48 GMT" }, { "version": "v2", "created": "Wed, 25 Jun 2014 21:01:41 GMT" } ]
2014-06-27T00:00:00
[ [ "Bilogrevic", "Igor", "" ], [ "Freudiger", "Julien", "" ], [ "De Cristofaro", "Emiliano", "" ], [ "Uzun", "Ersin", "" ] ]
TITLE: What's the Gist? Privacy-Preserving Aggregation of User Profiles ABSTRACT: Over the past few years, online service providers have started gathering increasing amounts of personal information to build user profiles and monetize them with advertisers and data brokers. Users have little control of what information is processed and are often left with an all-or-nothing decision between receiving free services or refusing to be profiled. This paper explores an alternative approach where users only disclose an aggregate model -- the "gist" -- of their data. We aim to preserve data utility and simultaneously provide user privacy. We show that this approach can be efficiently supported by letting users contribute encrypted and differentially-private data to an aggregator. The aggregator combines encrypted contributions and can only extract an aggregate model of the underlying data. We evaluate our framework on a dataset of 100,000 U.S. users obtained from the U.S. Census Bureau and show that (i) it provides accurate aggregates with as little as 100 users, (ii) it generates revenue for both users and data brokers, and (iii) its overhead is appreciably low.
1406.6832
Michel Plantie
Michel Crampes and Michel Planti\'e
Overlapping Community Detection Optimization and Nash Equilibrium
Submitted to KDD
null
null
null
cs.SI physics.soc-ph stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community detection using both graphs and social networks is the focus of many algorithms. Recent methods aimed at optimizing the so-called modularity function proceed by maximizing relations within communities while minimizing inter-community relations. However, given the NP-completeness of the problem, these algorithms are heuristics that do not guarantee an optimum. In this paper, we introduce a new algorithm along with a function that takes an approximate solution and modifies it in order to reach an optimum. This reassignment function is considered a 'potential function' and becomes a necessary condition to asserting that the computed optimum is indeed a Nash Equilibrium. We also use this function to simultaneously show partitioning and overlapping communities, two detection and visualization modes of great value in revealing interesting features of a social network. Our approach is successfully illustrated through several experiments on either real unipartite, multipartite or directed graphs of medium and large-sized datasets.
[ { "version": "v1", "created": "Thu, 26 Jun 2014 10:28:36 GMT" } ]
2014-06-27T00:00:00
[ [ "Crampes", "Michel", "" ], [ "Plantié", "Michel", "" ] ]
TITLE: Overlapping Community Detection Optimization and Nash Equilibrium ABSTRACT: Community detection using both graphs and social networks is the focus of many algorithms. Recent methods aimed at optimizing the so-called modularity function proceed by maximizing relations within communities while minimizing inter-community relations. However, given the NP-completeness of the problem, these algorithms are heuristics that do not guarantee an optimum. In this paper, we introduce a new algorithm along with a function that takes an approximate solution and modifies it in order to reach an optimum. This reassignment function is considered a 'potential function' and becomes a necessary condition to asserting that the computed optimum is indeed a Nash Equilibrium. We also use this function to simultaneously show partitioning and overlapping communities, two detection and visualization modes of great value in revealing interesting features of a social network. Our approach is successfully illustrated through several experiments on either real unipartite, multipartite or directed graphs of medium and large-sized datasets.
1406.6947
Ping Luo
Zhenyao Zhu and Ping Luo and Xiaogang Wang and Xiaoou Tang
Deep Learning Multi-View Representation for Face Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Various factors, such as identities, views (poses), and illuminations, are coupled in face images. Disentangling the identity and view representations is a major challenge in face recognition. Existing face recognition systems either use handcrafted features or learn features discriminatively to improve recognition accuracy. This is different from the behavior of human brain. Intriguingly, even without accessing 3D data, human not only can recognize face identity, but can also imagine face images of a person under different viewpoints given a single 2D image, making face perception in the brain robust to view changes. In this sense, human brain has learned and encoded 3D face models from 2D images. To take into account this instinct, this paper proposes a novel deep neural net, named multi-view perceptron (MVP), which can untangle the identity and view features, and infer a full spectrum of multi-view images in the meanwhile, given a single 2D face image. The identity features of MVP achieve superior performance on the MultiPIE dataset. MVP is also capable to interpolate and predict images under viewpoints that are unobserved in the training data.
[ { "version": "v1", "created": "Thu, 26 Jun 2014 17:09:25 GMT" } ]
2014-06-27T00:00:00
[ [ "Zhu", "Zhenyao", "" ], [ "Luo", "Ping", "" ], [ "Wang", "Xiaogang", "" ], [ "Tang", "Xiaoou", "" ] ]
TITLE: Deep Learning Multi-View Representation for Face Recognition ABSTRACT: Various factors, such as identities, views (poses), and illuminations, are coupled in face images. Disentangling the identity and view representations is a major challenge in face recognition. Existing face recognition systems either use handcrafted features or learn features discriminatively to improve recognition accuracy. This is different from the behavior of human brain. Intriguingly, even without accessing 3D data, human not only can recognize face identity, but can also imagine face images of a person under different viewpoints given a single 2D image, making face perception in the brain robust to view changes. In this sense, human brain has learned and encoded 3D face models from 2D images. To take into account this instinct, this paper proposes a novel deep neural net, named multi-view perceptron (MVP), which can untangle the identity and view features, and infer a full spectrum of multi-view images in the meanwhile, given a single 2D face image. The identity features of MVP achieve superior performance on the MultiPIE dataset. MVP is also capable to interpolate and predict images under viewpoints that are unobserved in the training data.
1305.0763
Matthew Crossley
Matthew Crossley, Andy Nisbet, Martyn Amos
Quantifying the Impact of Parameter Tuning on Nature-Inspired Algorithms
8 pages, 7 figures. Accepted at the European Conference on Artificial Life (ECAL) 2013, Taormina, Italy
null
10.7551/978-0-262-31709-2-ch138
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of parameterization is often central to the effective deployment of nature-inspired algorithms. However, finding the optimal set of parameter values for a combination of problem instance and solution method is highly challenging, and few concrete guidelines exist on how and when such tuning may be performed. Previous work tends to either focus on a specific algorithm or use benchmark problems, and both of these restrictions limit the applicability of any findings. Here, we examine a number of different algorithms, and study them in a "problem agnostic" fashion (i.e., one that is not tied to specific instances) by considering their performance on fitness landscapes with varying characteristics. Using this approach, we make a number of observations on which algorithms may (or may not) benefit from tuning, and in which specific circumstances.
[ { "version": "v1", "created": "Fri, 3 May 2013 16:15:20 GMT" }, { "version": "v2", "created": "Mon, 1 Jul 2013 13:04:10 GMT" } ]
2014-06-26T00:00:00
[ [ "Crossley", "Matthew", "" ], [ "Nisbet", "Andy", "" ], [ "Amos", "Martyn", "" ] ]
TITLE: Quantifying the Impact of Parameter Tuning on Nature-Inspired Algorithms ABSTRACT: The problem of parameterization is often central to the effective deployment of nature-inspired algorithms. However, finding the optimal set of parameter values for a combination of problem instance and solution method is highly challenging, and few concrete guidelines exist on how and when such tuning may be performed. Previous work tends to either focus on a specific algorithm or use benchmark problems, and both of these restrictions limit the applicability of any findings. Here, we examine a number of different algorithms, and study them in a "problem agnostic" fashion (i.e., one that is not tied to specific instances) by considering their performance on fitness landscapes with varying characteristics. Using this approach, we make a number of observations on which algorithms may (or may not) benefit from tuning, and in which specific circumstances.
1406.6507
Hyun Oh Song
Hyun Oh Song, Yong Jae Lee, Stefanie Jegelka, Trevor Darrell
Weakly-supervised Discovery of Visual Pattern Configurations
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing prominence of weakly labeled data nurtures a growing demand for object detection methods that can cope with minimal supervision. We propose an approach that automatically identifies discriminative configurations of visual patterns that are characteristic of a given object class. We formulate the problem as a constrained submodular optimization problem and demonstrate the benefits of the discovered configurations in remedying mislocalizations and finding informative positive and negative training examples. Together, these lead to state-of-the-art weakly-supervised detection results on the challenging PASCAL VOC dataset.
[ { "version": "v1", "created": "Wed, 25 Jun 2014 09:35:40 GMT" } ]
2014-06-26T00:00:00
[ [ "Song", "Hyun Oh", "" ], [ "Lee", "Yong Jae", "" ], [ "Jegelka", "Stefanie", "" ], [ "Darrell", "Trevor", "" ] ]
TITLE: Weakly-supervised Discovery of Visual Pattern Configurations ABSTRACT: The increasing prominence of weakly labeled data nurtures a growing demand for object detection methods that can cope with minimal supervision. We propose an approach that automatically identifies discriminative configurations of visual patterns that are characteristic of a given object class. We formulate the problem as a constrained submodular optimization problem and demonstrate the benefits of the discovered configurations in remedying mislocalizations and finding informative positive and negative training examples. Together, these lead to state-of-the-art weakly-supervised detection results on the challenging PASCAL VOC dataset.
1406.6568
Victor Miller
V. A. Miller, S. Erlien, J. Piersol
Support vector machine classification of dimensionally reduced structural MRI images for dementia
technical note
null
null
null
cs.CV cs.LG physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We classify very-mild to moderate dementia in patients (CDR ranging from 0 to 2) using a support vector machine classifier acting on dimensionally reduced feature set derived from MRI brain scans of the 416 subjects available in the OASIS-Brains dataset. We use image segmentation and principal component analysis to reduce the dimensionality of the data. Our resulting feature set contains 11 features for each subject. Performance of the classifiers is evaluated using 10-fold cross-validation. Using linear and (gaussian) kernels, we obtain a training classification accuracy of 86.4% (90.1%), test accuracy of 85.0% (85.7%), test precision of 68.7% (68.5%), test recall of 68.0% (74.0%), and test Matthews correlation coefficient of 0.594 (0.616).
[ { "version": "v1", "created": "Wed, 25 Jun 2014 13:50:18 GMT" } ]
2014-06-26T00:00:00
[ [ "Miller", "V. A.", "" ], [ "Erlien", "S.", "" ], [ "Piersol", "J.", "" ] ]
TITLE: Support vector machine classification of dimensionally reduced structural MRI images for dementia ABSTRACT: We classify very-mild to moderate dementia in patients (CDR ranging from 0 to 2) using a support vector machine classifier acting on dimensionally reduced feature set derived from MRI brain scans of the 416 subjects available in the OASIS-Brains dataset. We use image segmentation and principal component analysis to reduce the dimensionality of the data. Our resulting feature set contains 11 features for each subject. Performance of the classifiers is evaluated using 10-fold cross-validation. Using linear and (gaussian) kernels, we obtain a training classification accuracy of 86.4% (90.1%), test accuracy of 85.0% (85.7%), test precision of 68.7% (68.5%), test recall of 68.0% (74.0%), and test Matthews correlation coefficient of 0.594 (0.616).
1406.6651
Ishanu Chattopadhyay
Ishanu Chattopadhyay
Causality Networks
22 pages, 8 figures
null
null
null
cs.LG cs.IT math.IT q-fin.ST stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While correlation measures are used to discern statistical relationships between observed variables in almost all branches of data-driven scientific inquiry, what we are really interested in is the existence of causal dependence. Designing an efficient causality test, that may be carried out in the absence of restrictive pre-suppositions on the underlying dynamical structure of the data at hand, is non-trivial. Nevertheless, ability to computationally infer statistical prima facie evidence of causal dependence may yield a far more discriminative tool for data analysis compared to the calculation of simple correlations. In the present work, we present a new non-parametric test of Granger causality for quantized or symbolic data streams generated by ergodic stationary sources. In contrast to state-of-art binary tests, our approach makes precise and computes the degree of causal dependence between data streams, without making any restrictive assumptions, linearity or otherwise. Additionally, without any a priori imposition of specific dynamical structure, we infer explicit generative models of causal cross-dependence, which may be then used for prediction. These explicit models are represented as generalized probabilistic automata, referred to crossed automata, and are shown to be sufficient to capture a fairly general class of causal dependence. The proposed algorithms are computationally efficient in the PAC sense; $i.e.$, we find good models of cross-dependence with high probability, with polynomial run-times and sample complexities. The theoretical results are applied to weekly search-frequency data from Google Trends API for a chosen set of socially "charged" keywords. The causality network inferred from this dataset reveals, quite expectedly, the causal importance of certain keywords. It is also illustrated that correlation analysis fails to gather such insight.
[ { "version": "v1", "created": "Wed, 25 Jun 2014 17:46:32 GMT" } ]
2014-06-26T00:00:00
[ [ "Chattopadhyay", "Ishanu", "" ] ]
TITLE: Causality Networks ABSTRACT: While correlation measures are used to discern statistical relationships between observed variables in almost all branches of data-driven scientific inquiry, what we are really interested in is the existence of causal dependence. Designing an efficient causality test, that may be carried out in the absence of restrictive pre-suppositions on the underlying dynamical structure of the data at hand, is non-trivial. Nevertheless, ability to computationally infer statistical prima facie evidence of causal dependence may yield a far more discriminative tool for data analysis compared to the calculation of simple correlations. In the present work, we present a new non-parametric test of Granger causality for quantized or symbolic data streams generated by ergodic stationary sources. In contrast to state-of-art binary tests, our approach makes precise and computes the degree of causal dependence between data streams, without making any restrictive assumptions, linearity or otherwise. Additionally, without any a priori imposition of specific dynamical structure, we infer explicit generative models of causal cross-dependence, which may be then used for prediction. These explicit models are represented as generalized probabilistic automata, referred to crossed automata, and are shown to be sufficient to capture a fairly general class of causal dependence. The proposed algorithms are computationally efficient in the PAC sense; $i.e.$, we find good models of cross-dependence with high probability, with polynomial run-times and sample complexities. The theoretical results are applied to weekly search-frequency data from Google Trends API for a chosen set of socially "charged" keywords. The causality network inferred from this dataset reveals, quite expectedly, the causal importance of certain keywords. It is also illustrated that correlation analysis fails to gather such insight.
1406.6037
Sreepathi Pai
Sreepathi Pai, R. Govindarajan, Matthew J. Thazhuthaveetil
Preemptive Thread Block Scheduling with Online Structural Runtime Prediction for Concurrent GPGPU Kernels
14 pages, full pre-review version of PACT 2014 poster
null
null
null
cs.AR cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent NVIDIA Graphics Processing Units (GPUs) can execute multiple kernels concurrently. On these GPUs, the thread block scheduler (TBS) uses the FIFO policy to schedule their thread blocks. We show that FIFO leaves performance to chance, resulting in significant loss of performance and fairness. To improve performance and fairness, we propose use of the preemptive Shortest Remaining Time First (SRTF) policy instead. Although SRTF requires an estimate of runtime of GPU kernels, we show that such an estimate of the runtime can be easily obtained using online profiling and exploiting a simple observation on GPU kernels' grid structure. Specifically, we propose a novel Structural Runtime Predictor. Using a simple Staircase model of GPU kernel execution, we show that the runtime of a kernel can be predicted by profiling only the first few thread blocks. We evaluate an online predictor based on this model on benchmarks from ERCBench, and find that it can estimate the actual runtime reasonably well after the execution of only a single thread block. Next, we design a thread block scheduler that is both concurrent kernel-aware and uses this predictor. We implement the SRTF policy and evaluate it on two-program workloads from ERCBench. SRTF improves STP by 1.18x and ANTT by 2.25x over FIFO. When compared to MPMax, a state-of-the-art resource allocation policy for concurrent kernels, SRTF improves STP by 1.16x and ANTT by 1.3x. To improve fairness, we also propose SRTF/Adaptive which controls resource usage of concurrently executing kernels to maximize fairness. SRTF/Adaptive improves STP by 1.12x, ANTT by 2.23x and Fairness by 2.95x compared to FIFO. Overall, our implementation of SRTF achieves system throughput to within 12.64% of Shortest Job First (SJF, an oracle optimal scheduling policy), bridging 49% of the gap between FIFO and SJF.
[ { "version": "v1", "created": "Mon, 23 Jun 2014 19:44:03 GMT" } ]
2014-06-25T00:00:00
[ [ "Pai", "Sreepathi", "" ], [ "Govindarajan", "R.", "" ], [ "Thazhuthaveetil", "Matthew J.", "" ] ]
TITLE: Preemptive Thread Block Scheduling with Online Structural Runtime Prediction for Concurrent GPGPU Kernels ABSTRACT: Recent NVIDIA Graphics Processing Units (GPUs) can execute multiple kernels concurrently. On these GPUs, the thread block scheduler (TBS) uses the FIFO policy to schedule their thread blocks. We show that FIFO leaves performance to chance, resulting in significant loss of performance and fairness. To improve performance and fairness, we propose use of the preemptive Shortest Remaining Time First (SRTF) policy instead. Although SRTF requires an estimate of runtime of GPU kernels, we show that such an estimate of the runtime can be easily obtained using online profiling and exploiting a simple observation on GPU kernels' grid structure. Specifically, we propose a novel Structural Runtime Predictor. Using a simple Staircase model of GPU kernel execution, we show that the runtime of a kernel can be predicted by profiling only the first few thread blocks. We evaluate an online predictor based on this model on benchmarks from ERCBench, and find that it can estimate the actual runtime reasonably well after the execution of only a single thread block. Next, we design a thread block scheduler that is both concurrent kernel-aware and uses this predictor. We implement the SRTF policy and evaluate it on two-program workloads from ERCBench. SRTF improves STP by 1.18x and ANTT by 2.25x over FIFO. When compared to MPMax, a state-of-the-art resource allocation policy for concurrent kernels, SRTF improves STP by 1.16x and ANTT by 1.3x. To improve fairness, we also propose SRTF/Adaptive which controls resource usage of concurrently executing kernels to maximize fairness. SRTF/Adaptive improves STP by 1.12x, ANTT by 2.23x and Fairness by 2.95x compared to FIFO. Overall, our implementation of SRTF achieves system throughput to within 12.64% of Shortest Job First (SJF, an oracle optimal scheduling policy), bridging 49% of the gap between FIFO and SJF.
1106.2229
Fionn Murtagh
Pedro Contreras and Fionn Murtagh
Fast, Linear Time Hierarchical Clustering using the Baire Metric
27 pages, 6 tables, 10 figures
Journal of Classification, July 2012, Volume 29, Issue 2, pp 118-143
10.1007/s00357-012-9106-3
null
stat.ML cs.IR stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Baire metric induces an ultrametric on a dataset and is of linear computational complexity, contrasted with the standard quadratic time agglomerative hierarchical clustering algorithm. In this work we evaluate empirically this new approach to hierarchical clustering. We compare hierarchical clustering based on the Baire metric with (i) agglomerative hierarchical clustering, in terms of algorithm properties; (ii) generalized ultrametrics, in terms of definition; and (iii) fast clustering through k-means partititioning, in terms of quality of results. For the latter, we carry out an in depth astronomical study. We apply the Baire distance to spectrometric and photometric redshifts from the Sloan Digital Sky Survey using, in this work, about half a million astronomical objects. We want to know how well the (more costly to determine) spectrometric redshifts can predict the (more easily obtained) photometric redshifts, i.e. we seek to regress the spectrometric on the photometric redshifts, and we use clusterwise regression for this.
[ { "version": "v1", "created": "Sat, 11 Jun 2011 12:05:43 GMT" } ]
2014-06-24T00:00:00
[ [ "Contreras", "Pedro", "" ], [ "Murtagh", "Fionn", "" ] ]
TITLE: Fast, Linear Time Hierarchical Clustering using the Baire Metric ABSTRACT: The Baire metric induces an ultrametric on a dataset and is of linear computational complexity, contrasted with the standard quadratic time agglomerative hierarchical clustering algorithm. In this work we evaluate empirically this new approach to hierarchical clustering. We compare hierarchical clustering based on the Baire metric with (i) agglomerative hierarchical clustering, in terms of algorithm properties; (ii) generalized ultrametrics, in terms of definition; and (iii) fast clustering through k-means partititioning, in terms of quality of results. For the latter, we carry out an in depth astronomical study. We apply the Baire distance to spectrometric and photometric redshifts from the Sloan Digital Sky Survey using, in this work, about half a million astronomical objects. We want to know how well the (more costly to determine) spectrometric redshifts can predict the (more easily obtained) photometric redshifts, i.e. we seek to regress the spectrometric on the photometric redshifts, and we use clusterwise regression for this.
1312.3913
Xi He
Xi He and Ashwin Machanavajjhala and Bolin Ding
Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies
Full version of the paper at SIGMOD'14 Snowbird, Utah USA
null
10.1145/2588555.2588581
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Privacy definitions provide ways for trading-off the privacy of individuals in a statistical database for the utility of downstream analysis of the data. In this paper, we present Blowfish, a class of privacy definitions inspired by the Pufferfish framework, that provides a rich interface for this trade-off. In particular, we allow data publishers to extend differential privacy using a policy, which specifies (a) secrets, or information that must be kept secret, and (b) constraints that may be known about the data. While the secret specification allows increased utility by lessening protection for certain individual properties, the constraint specification provides added protection against an adversary who knows correlations in the data (arising from constraints). We formalize policies and present novel algorithms that can handle general specifications of sensitive information and certain count constraints. We show that there are reasonable policies under which our privacy mechanisms for k-means clustering, histograms and range queries introduce significantly lesser noise than their differentially private counterparts. We quantify the privacy-utility trade-offs for various policies analytically and empirically on real datasets.
[ { "version": "v1", "created": "Fri, 13 Dec 2013 19:23:12 GMT" }, { "version": "v2", "created": "Sat, 28 Dec 2013 06:49:22 GMT" }, { "version": "v3", "created": "Tue, 11 Feb 2014 15:55:15 GMT" }, { "version": "v4", "created": "Tue, 8 Apr 2014 16:13:26 GMT" }, { "version": "v5", "created": "Mon, 23 Jun 2014 05:09:12 GMT" } ]
2014-06-24T00:00:00
[ [ "He", "Xi", "" ], [ "Machanavajjhala", "Ashwin", "" ], [ "Ding", "Bolin", "" ] ]
TITLE: Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies ABSTRACT: Privacy definitions provide ways for trading-off the privacy of individuals in a statistical database for the utility of downstream analysis of the data. In this paper, we present Blowfish, a class of privacy definitions inspired by the Pufferfish framework, that provides a rich interface for this trade-off. In particular, we allow data publishers to extend differential privacy using a policy, which specifies (a) secrets, or information that must be kept secret, and (b) constraints that may be known about the data. While the secret specification allows increased utility by lessening protection for certain individual properties, the constraint specification provides added protection against an adversary who knows correlations in the data (arising from constraints). We formalize policies and present novel algorithms that can handle general specifications of sensitive information and certain count constraints. We show that there are reasonable policies under which our privacy mechanisms for k-means clustering, histograms and range queries introduce significantly lesser noise than their differentially private counterparts. We quantify the privacy-utility trade-offs for various policies analytically and empirically on real datasets.
1402.4238
Shixin Luo
Shixin Luo, Rui Zhang, Teng Joon Lim
Downlink and Uplink Energy Minimization Through User Association and Beamforming in Cloud RAN
29 pages, 4 figures, submitted for possible journal publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cloud radio access network (C-RAN) concept, in which densely deployed access points (APs) are empowered by cloud computing to cooperatively support mobile users (MUs), to improve mobile data rates, has been recently proposed. However, the high density of active ("on") APs results in severe interference and also inefficient energy consumption. Moreover, the growing popularity of highly interactive applications with stringent uplink (UL) requirements, e.g. network gaming and real-time broadcasting by wireless users, means that the UL transmission is becoming more crucial and requires special attention. Therefore in this paper, we propose a joint downlink (DL) and UL MU-AP association and beamforming design to coordinate interference in the C-RAN for energy minimization, a problem which is shown to be NP hard. Due to the new consideration of UL transmission, it is shown that the two state-of-the-art approaches for finding computationally efficient solutions of joint MU-AP association and beamforming considering only the DL, i.e., group-sparse optimization and relaxed-integer programming, cannot be modified in a straightforward way to solve our problem. Leveraging on the celebrated UL-DL duality result, we show that by establishing a virtual DL transmission for the original UL transmission, the joint DL and UL optimization problem can be converted to an equivalent DL problem in C-RAN with two inter-related subproblems for the original and virtual DL transmissions, respectively. Based on this transformation, two efficient algorithms for joint DL and UL MU-AP association and beamforming design are proposed, whose performances are evaluated and compared with other benchmarking schemes through extensive simulations.
[ { "version": "v1", "created": "Tue, 18 Feb 2014 07:17:39 GMT" }, { "version": "v2", "created": "Mon, 23 Jun 2014 02:14:51 GMT" } ]
2014-06-24T00:00:00
[ [ "Luo", "Shixin", "" ], [ "Zhang", "Rui", "" ], [ "Lim", "Teng Joon", "" ] ]
TITLE: Downlink and Uplink Energy Minimization Through User Association and Beamforming in Cloud RAN ABSTRACT: The cloud radio access network (C-RAN) concept, in which densely deployed access points (APs) are empowered by cloud computing to cooperatively support mobile users (MUs), to improve mobile data rates, has been recently proposed. However, the high density of active ("on") APs results in severe interference and also inefficient energy consumption. Moreover, the growing popularity of highly interactive applications with stringent uplink (UL) requirements, e.g. network gaming and real-time broadcasting by wireless users, means that the UL transmission is becoming more crucial and requires special attention. Therefore in this paper, we propose a joint downlink (DL) and UL MU-AP association and beamforming design to coordinate interference in the C-RAN for energy minimization, a problem which is shown to be NP hard. Due to the new consideration of UL transmission, it is shown that the two state-of-the-art approaches for finding computationally efficient solutions of joint MU-AP association and beamforming considering only the DL, i.e., group-sparse optimization and relaxed-integer programming, cannot be modified in a straightforward way to solve our problem. Leveraging on the celebrated UL-DL duality result, we show that by establishing a virtual DL transmission for the original UL transmission, the joint DL and UL optimization problem can be converted to an equivalent DL problem in C-RAN with two inter-related subproblems for the original and virtual DL transmissions, respectively. Based on this transformation, two efficient algorithms for joint DL and UL MU-AP association and beamforming design are proposed, whose performances are evaluated and compared with other benchmarking schemes through extensive simulations.
1403.1528
Andre Luckow
Shantenu Jha, Judy Qiu, Andre Luckow, Pradeep Mantha, Geoffrey C.Fox
A Tale of Two Data-Intensive Paradigms: Applications, Abstractions, and Architectures
8 pages, 2 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scientific problems that depend on processing large amounts of data require overcoming challenges in multiple areas: managing large-scale data distribution, co-placement and scheduling of data with compute resources, and storing and transferring large volumes of data. We analyze the ecosystems of the two prominent paradigms for data-intensive applications, hereafter referred to as the high-performance computing and the Apache-Hadoop paradigm. We propose a basis, common terminology and functional factors upon which to analyze the two approaches of both paradigms. We discuss the concept of "Big Data Ogres" and their facets as means of understanding and characterizing the most common application workloads found across the two paradigms. We then discuss the salient features of the two paradigms, and compare and contrast the two approaches. Specifically, we examine common implementation/approaches of these paradigms, shed light upon the reasons for their current "architecture" and discuss some typical workloads that utilize them. In spite of the significant software distinctions, we believe there is architectural similarity. We discuss the potential integration of different implementations, across the different levels and components. Our comparison progresses from a fully qualitative examination of the two paradigms, to a semi-quantitative methodology. We use a simple and broadly used Ogre (K-means clustering), characterize its performance on a range of representative platforms, covering several implementations from both paradigms. Our experiments provide an insight into the relative strengths of the two paradigms. We propose that the set of Ogres will serve as a benchmark to evaluate the two paradigms along different dimensions.
[ { "version": "v1", "created": "Thu, 6 Mar 2014 18:48:55 GMT" }, { "version": "v2", "created": "Mon, 23 Jun 2014 01:56:34 GMT" } ]
2014-06-24T00:00:00
[ [ "Jha", "Shantenu", "" ], [ "Qiu", "Judy", "" ], [ "Luckow", "Andre", "" ], [ "Mantha", "Pradeep", "" ], [ "Fox", "Geoffrey C.", "" ] ]
TITLE: A Tale of Two Data-Intensive Paradigms: Applications, Abstractions, and Architectures ABSTRACT: Scientific problems that depend on processing large amounts of data require overcoming challenges in multiple areas: managing large-scale data distribution, co-placement and scheduling of data with compute resources, and storing and transferring large volumes of data. We analyze the ecosystems of the two prominent paradigms for data-intensive applications, hereafter referred to as the high-performance computing and the Apache-Hadoop paradigm. We propose a basis, common terminology and functional factors upon which to analyze the two approaches of both paradigms. We discuss the concept of "Big Data Ogres" and their facets as means of understanding and characterizing the most common application workloads found across the two paradigms. We then discuss the salient features of the two paradigms, and compare and contrast the two approaches. Specifically, we examine common implementation/approaches of these paradigms, shed light upon the reasons for their current "architecture" and discuss some typical workloads that utilize them. In spite of the significant software distinctions, we believe there is architectural similarity. We discuss the potential integration of different implementations, across the different levels and components. Our comparison progresses from a fully qualitative examination of the two paradigms, to a semi-quantitative methodology. We use a simple and broadly used Ogre (K-means clustering), characterize its performance on a range of representative platforms, covering several implementations from both paradigms. Our experiments provide an insight into the relative strengths of the two paradigms. We propose that the set of Ogres will serve as a benchmark to evaluate the two paradigms along different dimensions.
1405.1459
Flavio Figueiredo
Flavio Figueiredo, Jussara M. Almeida, Yasuko Matsubara, Bruno Ribeiro, Christos Faloutsos
Revisit Behavior in Social Media: The Phoenix-R Model and Discoveries
To appear on European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases 2014
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How many listens will an artist receive on a online radio? How about plays on a YouTube video? How many of these visits are new or returning users? Modeling and mining popularity dynamics of social activity has important implications for researchers, content creators and providers. We here investigate the effect of revisits (successive visits from a single user) on content popularity. Using four datasets of social activity, with up to tens of millions media objects (e.g., YouTube videos, Twitter hashtags or LastFM artists), we show the effect of revisits in the popularity evolution of such objects. Secondly, we propose the Phoenix-R model which captures the popularity dynamics of individual objects. Phoenix-R has the desired properties of being: (1) parsimonious, being based on the minimum description length principle, and achieving lower root mean squared error than state-of-the-art baselines; (2) applicable, the model is effective for predicting future popularity values of objects.
[ { "version": "v1", "created": "Tue, 6 May 2014 21:37:06 GMT" }, { "version": "v2", "created": "Sun, 22 Jun 2014 19:13:29 GMT" } ]
2014-06-24T00:00:00
[ [ "Figueiredo", "Flavio", "" ], [ "Almeida", "Jussara M.", "" ], [ "Matsubara", "Yasuko", "" ], [ "Ribeiro", "Bruno", "" ], [ "Faloutsos", "Christos", "" ] ]
TITLE: Revisit Behavior in Social Media: The Phoenix-R Model and Discoveries ABSTRACT: How many listens will an artist receive on a online radio? How about plays on a YouTube video? How many of these visits are new or returning users? Modeling and mining popularity dynamics of social activity has important implications for researchers, content creators and providers. We here investigate the effect of revisits (successive visits from a single user) on content popularity. Using four datasets of social activity, with up to tens of millions media objects (e.g., YouTube videos, Twitter hashtags or LastFM artists), we show the effect of revisits in the popularity evolution of such objects. Secondly, we propose the Phoenix-R model which captures the popularity dynamics of individual objects. Phoenix-R has the desired properties of being: (1) parsimonious, being based on the minimum description length principle, and achieving lower root mean squared error than state-of-the-art baselines; (2) applicable, the model is effective for predicting future popularity values of objects.
1406.5565
Sam Keene
Kenneth D. Morton Jr., Peter Torrione, Leslie Collins, Sam Keene
An Open Source Pattern Recognition Toolbox for MATLAB
null
null
null
null
stat.ML cs.CV cs.LG cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pattern recognition and machine learning are becoming integral parts of algorithms in a wide range of applications. Different algorithms and approaches for machine learning include different tradeoffs between performance and computation, so during algorithm development it is often necessary to explore a variety of different approaches to a given task. A toolbox with a unified framework across multiple pattern recognition techniques enables algorithm developers the ability to rapidly evaluate different choices prior to deployment. MATLAB is a widely used environment for algorithm development and prototyping, and although several MATLAB toolboxes for pattern recognition are currently available these are either incomplete, expensive, or restrictively licensed. In this work we describe a MATLAB toolbox for pattern recognition and machine learning known as the PRT (Pattern Recognition Toolbox), licensed under the permissive MIT license. The PRT includes many popular techniques for data preprocessing, supervised learning, clustering, regression and feature selection, as well as a methodology for combining these components using a simple, uniform syntax. The resulting algorithms can be evaluated using cross-validation and a variety of scoring metrics to ensure robust performance when the algorithm is deployed. This paper presents an overview of the PRT as well as an example of usage on Fisher's Iris dataset.
[ { "version": "v1", "created": "Sat, 21 Jun 2014 01:50:54 GMT" } ]
2014-06-24T00:00:00
[ [ "Morton", "Kenneth D.", "Jr." ], [ "Torrione", "Peter", "" ], [ "Collins", "Leslie", "" ], [ "Keene", "Sam", "" ] ]
TITLE: An Open Source Pattern Recognition Toolbox for MATLAB ABSTRACT: Pattern recognition and machine learning are becoming integral parts of algorithms in a wide range of applications. Different algorithms and approaches for machine learning include different tradeoffs between performance and computation, so during algorithm development it is often necessary to explore a variety of different approaches to a given task. A toolbox with a unified framework across multiple pattern recognition techniques enables algorithm developers the ability to rapidly evaluate different choices prior to deployment. MATLAB is a widely used environment for algorithm development and prototyping, and although several MATLAB toolboxes for pattern recognition are currently available these are either incomplete, expensive, or restrictively licensed. In this work we describe a MATLAB toolbox for pattern recognition and machine learning known as the PRT (Pattern Recognition Toolbox), licensed under the permissive MIT license. The PRT includes many popular techniques for data preprocessing, supervised learning, clustering, regression and feature selection, as well as a methodology for combining these components using a simple, uniform syntax. The resulting algorithms can be evaluated using cross-validation and a variety of scoring metrics to ensure robust performance when the algorithm is deployed. This paper presents an overview of the PRT as well as an example of usage on Fisher's Iris dataset.
1406.5617
S. K. Sahay
R.K. Roul, O. R. Devanand and S.K. Sahay
Web Document Clustering and Ranking using Tf-Idf based Apriori Approach
5 Pages
IJCA Proceedings on ICACEA, No. 2, p. 34 (2014)
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamic web has increased exponentially over the past few years with more than thousands of documents related to a subject available to the user now. Most of the web documents are unstructured and not in an organized manner and hence user facing more difficult to find relevant documents. A more useful and efficient mechanism is combining clustering with ranking, where clustering can group the similar documents in one place and ranking can be applied to each cluster for viewing the top documents at the beginning.. Besides the particular clustering algorithm, the different term weighting functions applied to the selected features to represent web document is a main aspect in clustering task. Keeping this approach in mind, here we proposed a new mechanism called Tf-Idf based Apriori for clustering the web documents. We then rank the documents in each cluster using Tf-Idf and similarity factor of documents based on the user query. This approach will helps the user to get all his relevant documents in one place and can restrict his search to some top documents of his choice. For experimental purpose, we have taken the Classic3 and Classic4 datasets of Cornell University having more than 10,000 documents and use gensim toolkit to carry out our work. We have compared our approach with traditional apriori algorithm and found that our approach is giving better results for higher minimum support. Our ranking mechanism is also giving a good F-measure of 78%.
[ { "version": "v1", "created": "Sat, 21 Jun 2014 14:38:21 GMT" } ]
2014-06-24T00:00:00
[ [ "Roul", "R. K.", "" ], [ "Devanand", "O. R.", "" ], [ "Sahay", "S. K.", "" ] ]
TITLE: Web Document Clustering and Ranking using Tf-Idf based Apriori Approach ABSTRACT: The dynamic web has increased exponentially over the past few years with more than thousands of documents related to a subject available to the user now. Most of the web documents are unstructured and not in an organized manner and hence user facing more difficult to find relevant documents. A more useful and efficient mechanism is combining clustering with ranking, where clustering can group the similar documents in one place and ranking can be applied to each cluster for viewing the top documents at the beginning.. Besides the particular clustering algorithm, the different term weighting functions applied to the selected features to represent web document is a main aspect in clustering task. Keeping this approach in mind, here we proposed a new mechanism called Tf-Idf based Apriori for clustering the web documents. We then rank the documents in each cluster using Tf-Idf and similarity factor of documents based on the user query. This approach will helps the user to get all his relevant documents in one place and can restrict his search to some top documents of his choice. For experimental purpose, we have taken the Classic3 and Classic4 datasets of Cornell University having more than 10,000 documents and use gensim toolkit to carry out our work. We have compared our approach with traditional apriori algorithm and found that our approach is giving better results for higher minimum support. Our ranking mechanism is also giving a good F-measure of 78%.
1406.5653
Rushil Anirudh
Rushil Anirudh and Pavan Turaga
Interactively Test Driving an Object Detector: Estimating Performance on Unlabeled Data
Published at Winter Conference on Applications of Computer Vision, 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the problem of `test-driving' a detector, i.e. allowing a human user to get a quick sense of how well the detector generalizes to their specific requirement. To this end, we present the first system that estimates detector performance interactively without extensive ground truthing using a human in the loop. We approach this as a problem of estimating proportions and show that it is possible to make accurate inferences on the proportion of classes or groups within a large data collection by observing only $5-10\%$ of samples from the data. In estimating the false detections (for precision), the samples are chosen carefully such that the overall characteristics of the data collection are preserved. Next, inspired by its use in estimating disease propagation we apply pooled testing approaches to estimate missed detections (for recall) from the dataset. The estimates thus obtained are close to the ones obtained using ground truth, thus reducing the need for extensive labeling which is expensive and time consuming.
[ { "version": "v1", "created": "Sat, 21 Jun 2014 21:37:30 GMT" } ]
2014-06-24T00:00:00
[ [ "Anirudh", "Rushil", "" ], [ "Turaga", "Pavan", "" ] ]
TITLE: Interactively Test Driving an Object Detector: Estimating Performance on Unlabeled Data ABSTRACT: In this paper, we study the problem of `test-driving' a detector, i.e. allowing a human user to get a quick sense of how well the detector generalizes to their specific requirement. To this end, we present the first system that estimates detector performance interactively without extensive ground truthing using a human in the loop. We approach this as a problem of estimating proportions and show that it is possible to make accurate inferences on the proportion of classes or groups within a large data collection by observing only $5-10\%$ of samples from the data. In estimating the false detections (for precision), the samples are chosen carefully such that the overall characteristics of the data collection are preserved. Next, inspired by its use in estimating disease propagation we apply pooled testing approaches to estimate missed detections (for recall) from the dataset. The estimates thus obtained are close to the ones obtained using ground truth, thus reducing the need for extensive labeling which is expensive and time consuming.
1406.5708
Ylies Falcone
Hadil Charafeddine, Khalil El-Harake, Yli\`es Falcone, and Mohamad Jaber
Runtime Enforcement for Component-Based Systems
arXiv admin note: text overlap with arXiv:1109.5505 by other authors
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Runtime enforcement is an increasingly popular and effective dynamic validation technique aiming to ensure the correct runtime behavior (w.r.t. a formal specification) of systems using a so-called enforcement monitor. In this paper we introduce runtime enforcement of specifications on component-based systems (CBS) modeled in the BIP (Behavior, Interaction and Priority) framework. BIP is a powerful and expressive component-based framework for formal construction of heterogeneous systems. However, because of BIP expressiveness, it remains difficult to enforce at design-time complex behavioral properties. First we propose a theoretical runtime enforcement framework for CBS where we delineate a hierarchy of sets of enforceable properties (i.e., properties that can be enforced) according to the number of observational steps a system is allowed to deviate from the property (i.e., the notion of k-step enforceability). To ensure the observational equivalence between the correct executions of the initial system and the monitored system, we show that i) only stutter-invariant properties should be enforced on CBS with our monitors, ii) safety properties are 1-step enforceable. Given an abstract enforcement monitor (as a finite-state machine) for some 1-step enforceable specification, we formally instrument (at relevant locations) a given BIP system to integrate the monitor. At runtime, the monitor observes and automatically avoids any error in the behavior of the system w.r.t. the specification. Our approach is fully implemented in an available tool that we used to i) avoid deadlock occurrences on a dining philosophers benchmark, and ii) ensure the correct placement of robots on a map.
[ { "version": "v1", "created": "Sun, 22 Jun 2014 11:49:11 GMT" } ]
2014-06-24T00:00:00
[ [ "Charafeddine", "Hadil", "" ], [ "El-Harake", "Khalil", "" ], [ "Falcone", "Yliès", "" ], [ "Jaber", "Mohamad", "" ] ]
TITLE: Runtime Enforcement for Component-Based Systems ABSTRACT: Runtime enforcement is an increasingly popular and effective dynamic validation technique aiming to ensure the correct runtime behavior (w.r.t. a formal specification) of systems using a so-called enforcement monitor. In this paper we introduce runtime enforcement of specifications on component-based systems (CBS) modeled in the BIP (Behavior, Interaction and Priority) framework. BIP is a powerful and expressive component-based framework for formal construction of heterogeneous systems. However, because of BIP expressiveness, it remains difficult to enforce at design-time complex behavioral properties. First we propose a theoretical runtime enforcement framework for CBS where we delineate a hierarchy of sets of enforceable properties (i.e., properties that can be enforced) according to the number of observational steps a system is allowed to deviate from the property (i.e., the notion of k-step enforceability). To ensure the observational equivalence between the correct executions of the initial system and the monitored system, we show that i) only stutter-invariant properties should be enforced on CBS with our monitors, ii) safety properties are 1-step enforceable. Given an abstract enforcement monitor (as a finite-state machine) for some 1-step enforceable specification, we formally instrument (at relevant locations) a given BIP system to integrate the monitor. At runtime, the monitor observes and automatically avoids any error in the behavior of the system w.r.t. the specification. Our approach is fully implemented in an available tool that we used to i) avoid deadlock occurrences on a dining philosophers benchmark, and ii) ensure the correct placement of robots on a map.
1406.5752
Tianyi Zhou
Tianyi Zhou and Jeff Bilmes and Carlos Guestrin
Divide-and-Conquer Learning by Anchoring a Conical Hull
26 pages, long version, in updating
null
null
null
stat.ML cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
We reduce a broad class of machine learning problems, usually addressed by EM or sampling, to the problem of finding the $k$ extremal rays spanning the conical hull of a data point set. These $k$ "anchors" lead to a global solution and a more interpretable model that can even outperform EM and sampling on generalization error. To find the $k$ anchors, we propose a novel divide-and-conquer learning scheme "DCA" that distributes the problem to $\mathcal O(k\log k)$ same-type sub-problems on different low-D random hyperplanes, each can be solved by any solver. For the 2D sub-problem, we present a non-iterative solver that only needs to compute an array of cosine values and its max/min entries. DCA also provides a faster subroutine for other methods to check whether a point is covered in a conical hull, which improves algorithm design in multiple dimensions and brings significant speedup to learning. We apply our method to GMM, HMM, LDA, NMF and subspace clustering, then show its competitive performance and scalability over other methods on rich datasets.
[ { "version": "v1", "created": "Sun, 22 Jun 2014 19:16:20 GMT" } ]
2014-06-24T00:00:00
[ [ "Zhou", "Tianyi", "" ], [ "Bilmes", "Jeff", "" ], [ "Guestrin", "Carlos", "" ] ]
TITLE: Divide-and-Conquer Learning by Anchoring a Conical Hull ABSTRACT: We reduce a broad class of machine learning problems, usually addressed by EM or sampling, to the problem of finding the $k$ extremal rays spanning the conical hull of a data point set. These $k$ "anchors" lead to a global solution and a more interpretable model that can even outperform EM and sampling on generalization error. To find the $k$ anchors, we propose a novel divide-and-conquer learning scheme "DCA" that distributes the problem to $\mathcal O(k\log k)$ same-type sub-problems on different low-D random hyperplanes, each can be solved by any solver. For the 2D sub-problem, we present a non-iterative solver that only needs to compute an array of cosine values and its max/min entries. DCA also provides a faster subroutine for other methods to check whether a point is covered in a conical hull, which improves algorithm design in multiple dimensions and brings significant speedup to learning. We apply our method to GMM, HMM, LDA, NMF and subspace clustering, then show its competitive performance and scalability over other methods on rich datasets.
1406.5824
Serena Yeung
Serena Yeung, Alireza Fathi, and Li Fei-Fei
VideoSET: Video Summary Evaluation through Text
null
null
null
null
cs.CV cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present VideoSET, a method for Video Summary Evaluation through Text that can evaluate how well a video summary is able to retain the semantic information contained in its original video. We observe that semantics is most easily expressed in words, and develop a text-based approach for the evaluation. Given a video summary, a text representation of the video summary is first generated, and an NLP-based metric is then used to measure its semantic distance to ground-truth text summaries written by humans. We show that our technique has higher agreement with human judgment than pixel-based distance metrics. We also release text annotations and ground-truth text summaries for a number of publicly available video datasets, for use by the computer vision community.
[ { "version": "v1", "created": "Mon, 23 Jun 2014 07:56:23 GMT" } ]
2014-06-24T00:00:00
[ [ "Yeung", "Serena", "" ], [ "Fathi", "Alireza", "" ], [ "Fei-Fei", "Li", "" ] ]
TITLE: VideoSET: Video Summary Evaluation through Text ABSTRACT: In this paper we present VideoSET, a method for Video Summary Evaluation through Text that can evaluate how well a video summary is able to retain the semantic information contained in its original video. We observe that semantics is most easily expressed in words, and develop a text-based approach for the evaluation. Given a video summary, a text representation of the video summary is first generated, and an NLP-based metric is then used to measure its semantic distance to ground-truth text summaries written by humans. We show that our technique has higher agreement with human judgment than pixel-based distance metrics. We also release text annotations and ground-truth text summaries for a number of publicly available video datasets, for use by the computer vision community.
1406.5910
Roman Shapovalov
Roman Shapovalov, Dmitry Vetrov, Anton Osokin, Pushmeet Kohli
Multi-utility Learning: Structured-output Learning with Multiple Annotation-specific Loss Functions
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Structured-output learning is a challenging problem; particularly so because of the difficulty in obtaining large datasets of fully labelled instances for training. In this paper we try to overcome this difficulty by presenting a multi-utility learning framework for structured prediction that can learn from training instances with different forms of supervision. We propose a unified technique for inferring the loss functions most suitable for quantifying the consistency of solutions with the given weak annotation. We demonstrate the effectiveness of our framework on the challenging semantic image segmentation problem for which a wide variety of annotations can be used. For instance, the popular training datasets for semantic segmentation are composed of images with hard-to-generate full pixel labellings, as well as images with easy-to-obtain weak annotations, such as bounding boxes around objects, or image-level labels that specify which object categories are present in an image. Experimental evaluation shows that the use of annotation-specific loss functions dramatically improves segmentation accuracy compared to the baseline system where only one type of weak annotation is used.
[ { "version": "v1", "created": "Mon, 23 Jun 2014 14:06:24 GMT" } ]
2014-06-24T00:00:00
[ [ "Shapovalov", "Roman", "" ], [ "Vetrov", "Dmitry", "" ], [ "Osokin", "Anton", "" ], [ "Kohli", "Pushmeet", "" ] ]
TITLE: Multi-utility Learning: Structured-output Learning with Multiple Annotation-specific Loss Functions ABSTRACT: Structured-output learning is a challenging problem; particularly so because of the difficulty in obtaining large datasets of fully labelled instances for training. In this paper we try to overcome this difficulty by presenting a multi-utility learning framework for structured prediction that can learn from training instances with different forms of supervision. We propose a unified technique for inferring the loss functions most suitable for quantifying the consistency of solutions with the given weak annotation. We demonstrate the effectiveness of our framework on the challenging semantic image segmentation problem for which a wide variety of annotations can be used. For instance, the popular training datasets for semantic segmentation are composed of images with hard-to-generate full pixel labellings, as well as images with easy-to-obtain weak annotations, such as bounding boxes around objects, or image-level labels that specify which object categories are present in an image. Experimental evaluation shows that the use of annotation-specific loss functions dramatically improves segmentation accuracy compared to the baseline system where only one type of weak annotation is used.
1406.5947
Thomas Martinetz
Bogdan Miclut, Thomas Kaester, Thomas Martinetz, Erhardt Barth
Committees of deep feedforward networks trained with few data
null
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep convolutional neural networks are known to give good results on image classification tasks. In this paper we present a method to improve the classification result by combining multiple such networks in a committee. We adopt the STL-10 dataset which has very few training examples and show that our method can achieve results that are better than the state of the art. The networks are trained layer-wise and no backpropagation is used. We also explore the effects of dataset augmentation by mirroring, rotation, and scaling.
[ { "version": "v1", "created": "Mon, 23 Jun 2014 15:34:54 GMT" } ]
2014-06-24T00:00:00
[ [ "Miclut", "Bogdan", "" ], [ "Kaester", "Thomas", "" ], [ "Martinetz", "Thomas", "" ], [ "Barth", "Erhardt", "" ] ]
TITLE: Committees of deep feedforward networks trained with few data ABSTRACT: Deep convolutional neural networks are known to give good results on image classification tasks. In this paper we present a method to improve the classification result by combining multiple such networks in a committee. We adopt the STL-10 dataset which has very few training examples and show that our method can achieve results that are better than the state of the art. The networks are trained layer-wise and no backpropagation is used. We also explore the effects of dataset augmentation by mirroring, rotation, and scaling.
1301.2628
Xu-Cheng Yin
Xu-Cheng Yin, Xuwang Yin, Kaizhu Huang, Hong-Wei Hao
Robust Text Detection in Natural Scene Images
A Draft Version (Submitted to IEEE TPAMI)
IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 36, no. 5, pp. 970-983, 2014
10.1109/TPAMI.2013.182
null
cs.CV cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text detection in natural scene images is an important prerequisite for many content-based image analysis tasks. In this paper, we propose an accurate and robust method for detecting texts in natural scene images. A fast and effective pruning algorithm is designed to extract Maximally Stable Extremal Regions (MSERs) as character candidates using the strategy of minimizing regularized variations. Character candidates are grouped into text candidates by the ingle-link clustering algorithm, where distance weights and threshold of the clustering algorithm are learned automatically by a novel self-training distance metric learning algorithm. The posterior probabilities of text candidates corresponding to non-text are estimated with an character classifier; text candidates with high probabilities are then eliminated and finally texts are identified with a text classifier. The proposed system is evaluated on the ICDAR 2011 Robust Reading Competition dataset; the f measure is over 76% and is significantly better than the state-of-the-art performance of 71%. Experimental results on a publicly available multilingual dataset also show that our proposed method can outperform the other competitive method with the f measure increase of over 9 percent. Finally, we have setup an online demo of our proposed scene text detection system at http://kems.ustb.edu.cn/learning/yin/dtext.
[ { "version": "v1", "created": "Fri, 11 Jan 2013 23:08:15 GMT" }, { "version": "v2", "created": "Wed, 23 Jan 2013 19:57:46 GMT" }, { "version": "v3", "created": "Sun, 2 Jun 2013 16:27:49 GMT" } ]
2014-06-23T00:00:00
[ [ "Yin", "Xu-Cheng", "" ], [ "Yin", "Xuwang", "" ], [ "Huang", "Kaizhu", "" ], [ "Hao", "Hong-Wei", "" ] ]
TITLE: Robust Text Detection in Natural Scene Images ABSTRACT: Text detection in natural scene images is an important prerequisite for many content-based image analysis tasks. In this paper, we propose an accurate and robust method for detecting texts in natural scene images. A fast and effective pruning algorithm is designed to extract Maximally Stable Extremal Regions (MSERs) as character candidates using the strategy of minimizing regularized variations. Character candidates are grouped into text candidates by the ingle-link clustering algorithm, where distance weights and threshold of the clustering algorithm are learned automatically by a novel self-training distance metric learning algorithm. The posterior probabilities of text candidates corresponding to non-text are estimated with an character classifier; text candidates with high probabilities are then eliminated and finally texts are identified with a text classifier. The proposed system is evaluated on the ICDAR 2011 Robust Reading Competition dataset; the f measure is over 76% and is significantly better than the state-of-the-art performance of 71%. Experimental results on a publicly available multilingual dataset also show that our proposed method can outperform the other competitive method with the f measure increase of over 9 percent. Finally, we have setup an online demo of our proposed scene text detection system at http://kems.ustb.edu.cn/learning/yin/dtext.
1406.4966
Jingdong Wang
Chao Du, Jingdong Wang
Inner Product Similarity Search using Compositional Codes
The approach presented in this paper (ECCV14 submission) is closely related to multi-stage vector quantization and residual quantization. Thanks the reviewers (CVPR14 and ECCV14) for pointing out the relationship to the two algorithms. Related paper: http://sites.skoltech.ru/app/data/uploads/sites/2/2013/09/CVPR14.pdf, which also adopts the summation of vectors for vector approximation
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the nearest neighbor search problem under inner product similarity and introduces a compact code-based approach. The idea is to approximate a vector using the composition of several elements selected from a source dictionary and to represent this vector by a short code composed of the indices of the selected elements. The inner product between a query vector and a database vector is efficiently estimated from the query vector and the short code of the database vector. We show the superior performance of the proposed group $M$-selection algorithm that selects $M$ elements from $M$ source dictionaries for vector approximation in terms of search accuracy and efficiency for compact codes of the same length via theoretical and empirical analysis. Experimental results on large-scale datasets ($1M$ and $1B$ SIFT features, $1M$ linear models and Netflix) demonstrate the superiority of the proposed approach.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 07:42:05 GMT" }, { "version": "v2", "created": "Fri, 20 Jun 2014 02:13:56 GMT" } ]
2014-06-23T00:00:00
[ [ "Du", "Chao", "" ], [ "Wang", "Jingdong", "" ] ]
TITLE: Inner Product Similarity Search using Compositional Codes ABSTRACT: This paper addresses the nearest neighbor search problem under inner product similarity and introduces a compact code-based approach. The idea is to approximate a vector using the composition of several elements selected from a source dictionary and to represent this vector by a short code composed of the indices of the selected elements. The inner product between a query vector and a database vector is efficiently estimated from the query vector and the short code of the database vector. We show the superior performance of the proposed group $M$-selection algorithm that selects $M$ elements from $M$ source dictionaries for vector approximation in terms of search accuracy and efficiency for compact codes of the same length via theoretical and empirical analysis. Experimental results on large-scale datasets ($1M$ and $1B$ SIFT features, $1M$ linear models and Netflix) demonstrate the superiority of the proposed approach.
1406.5212
Georgia Gkioxari
Georgia Gkioxari, Bharath Hariharan, Ross Girshick, Jitendra Malik
R-CNNs for Pose Estimation and Action Detection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present convolutional neural networks for the tasks of keypoint (pose) prediction and action classification of people in unconstrained images. Our approach involves training an R-CNN detector with loss functions depending on the task being tackled. We evaluate our method on the challenging PASCAL VOC dataset and compare it to previous leading approaches. Our method gives state-of-the-art results for keypoint and action prediction. Additionally, we introduce a new dataset for action detection, the task of simultaneously localizing people and classifying their actions, and present results using our approach.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 20:56:08 GMT" } ]
2014-06-23T00:00:00
[ [ "Gkioxari", "Georgia", "" ], [ "Hariharan", "Bharath", "" ], [ "Girshick", "Ross", "" ], [ "Malik", "Jitendra", "" ] ]
TITLE: R-CNNs for Pose Estimation and Action Detection ABSTRACT: We present convolutional neural networks for the tasks of keypoint (pose) prediction and action classification of people in unconstrained images. Our approach involves training an R-CNN detector with loss functions depending on the task being tackled. We evaluate our method on the challenging PASCAL VOC dataset and compare it to previous leading approaches. Our method gives state-of-the-art results for keypoint and action prediction. Additionally, we introduce a new dataset for action detection, the task of simultaneously localizing people and classifying their actions, and present results using our approach.
1404.7796
Emilie Morvant
Emilie Morvant (IST Austria), Amaury Habrard (LHC), St\'ephane Ayache (LIF)
Majority Vote of Diverse Classifiers for Late Fusion
IAPR Joint International Workshops on Statistical Techniques in Pattern Recognition and Structural and Syntactic Pattern Recignition, Joensuu : Finland (2014)
null
null
null
stat.ML cs.LG cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past few years, a lot of attention has been devoted to multimedia indexing by fusing multimodal informations. Two kinds of fusion schemes are generally considered: The early fusion and the late fusion. We focus on late classifier fusion, where one combines the scores of each modality at the decision level. To tackle this problem, we investigate a recent and elegant well-founded quadratic program named MinCq coming from the machine learning PAC-Bayesian theory. MinCq looks for the weighted combination, over a set of real-valued functions seen as voters, leading to the lowest misclassification rate, while maximizing the voters' diversity. We propose an extension of MinCq tailored to multimedia indexing. Our method is based on an order-preserving pairwise loss adapted to ranking that allows us to improve Mean Averaged Precision measure while taking into account the diversity of the voters that we want to fuse. We provide evidence that this method is naturally adapted to late fusion procedures and confirm the good behavior of our approach on the challenging PASCAL VOC'07 benchmark.
[ { "version": "v1", "created": "Wed, 30 Apr 2014 16:55:00 GMT" }, { "version": "v2", "created": "Thu, 19 Jun 2014 08:06:24 GMT" } ]
2014-06-20T00:00:00
[ [ "Morvant", "Emilie", "", "IST Austria" ], [ "Habrard", "Amaury", "", "LHC" ], [ "Ayache", "Stéphane", "", "LIF" ] ]
TITLE: Majority Vote of Diverse Classifiers for Late Fusion ABSTRACT: In the past few years, a lot of attention has been devoted to multimedia indexing by fusing multimodal informations. Two kinds of fusion schemes are generally considered: The early fusion and the late fusion. We focus on late classifier fusion, where one combines the scores of each modality at the decision level. To tackle this problem, we investigate a recent and elegant well-founded quadratic program named MinCq coming from the machine learning PAC-Bayesian theory. MinCq looks for the weighted combination, over a set of real-valued functions seen as voters, leading to the lowest misclassification rate, while maximizing the voters' diversity. We propose an extension of MinCq tailored to multimedia indexing. Our method is based on an order-preserving pairwise loss adapted to ranking that allows us to improve Mean Averaged Precision measure while taking into account the diversity of the voters that we want to fuse. We provide evidence that this method is naturally adapted to late fusion procedures and confirm the good behavior of our approach on the challenging PASCAL VOC'07 benchmark.
1406.4973
Gaetan Marceau
Ga\'etan Marceau (LRI, INRIA Saclay - Ile de France), Marc Schoenauer (LRI, INRIA Saclay - Ile de France)
Racing Multi-Objective Selection Probabilities
null
13th International Conference on Parallel Problem Solving from Nature, Ljubljana : France (2014)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the context of Noisy Multi-Objective Optimization, dealing with uncertainties requires the decision maker to define some preferences about how to handle them, through some statistics (e.g., mean, median) to be used to evaluate the qualities of the solutions, and define the corresponding Pareto set. Approximating these statistics requires repeated samplings of the population, drastically increasing the overall computational cost. To tackle this issue, this paper proposes to directly estimate the probability of each individual to be selected, using some Hoeffding races to dynamically assign the estimation budget during the selection step. The proposed racing approach is validated against static budget approaches with NSGA-II on noisy versions of the ZDT benchmark functions.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 08:07:47 GMT" } ]
2014-06-20T00:00:00
[ [ "Marceau", "Gaétan", "", "LRI, INRIA Saclay - Ile de France" ], [ "Schoenauer", "Marc", "", "LRI, INRIA Saclay - Ile de France" ] ]
TITLE: Racing Multi-Objective Selection Probabilities ABSTRACT: In the context of Noisy Multi-Objective Optimization, dealing with uncertainties requires the decision maker to define some preferences about how to handle them, through some statistics (e.g., mean, median) to be used to evaluate the qualities of the solutions, and define the corresponding Pareto set. Approximating these statistics requires repeated samplings of the population, drastically increasing the overall computational cost. To tackle this issue, this paper proposes to directly estimate the probability of each individual to be selected, using some Hoeffding races to dynamically assign the estimation budget during the selection step. The proposed racing approach is validated against static budget approaches with NSGA-II on noisy versions of the ZDT benchmark functions.
1406.5059
Abhishek Bhola
Abhishek Bhola
Twitter and Polls: Analyzing and estimating political orientation of Twitter users in India General #Elections2014
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This year (2014) in the month of May, the tenure of the 15th Lok Sabha was to end and the elections to the 543 parliamentary seats were to be held. A whooping $5 billion were spent on these elections, which made us stand second only to the US Presidential elections in terms of money spent. Swelling number of Internet users and Online Social Media (OSM) users could effect 3-4% of urban population votes as per a report of IAMAI (Internet & Mobile Association of India). Our count of tweets related to elections from September 2013 to May 2014, was close to 18.21 million. We analyzed the complete dataset and found that the activity on Twitter peaked during important events. It was evident from our data that the political behavior of the politicians affected their followers count. Yet another aim of our work was to find an efficient way to classify the political orientation of the users on Twitter. We used four different techniques: two were based on the content of the tweets, one on the user based features and another based on community detection algorithm on the retweet and user mention networks. We found that the community detection algorithm worked best. We built a portal to show the analysis of the tweets of the last 24 hours. To the best of our knowledge, this is the first academic pursuit to analyze the elections data and classify the users in the India General Elections 2014.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 14:27:09 GMT" } ]
2014-06-20T00:00:00
[ [ "Bhola", "Abhishek", "" ] ]
TITLE: Twitter and Polls: Analyzing and estimating political orientation of Twitter users in India General #Elections2014 ABSTRACT: This year (2014) in the month of May, the tenure of the 15th Lok Sabha was to end and the elections to the 543 parliamentary seats were to be held. A whooping $5 billion were spent on these elections, which made us stand second only to the US Presidential elections in terms of money spent. Swelling number of Internet users and Online Social Media (OSM) users could effect 3-4% of urban population votes as per a report of IAMAI (Internet & Mobile Association of India). Our count of tweets related to elections from September 2013 to May 2014, was close to 18.21 million. We analyzed the complete dataset and found that the activity on Twitter peaked during important events. It was evident from our data that the political behavior of the politicians affected their followers count. Yet another aim of our work was to find an efficient way to classify the political orientation of the users on Twitter. We used four different techniques: two were based on the content of the tweets, one on the user based features and another based on community detection algorithm on the retweet and user mention networks. We found that the community detection algorithm worked best. We built a portal to show the analysis of the tweets of the last 24 hours. To the best of our knowledge, this is the first academic pursuit to analyze the elections data and classify the users in the India General Elections 2014.
1406.5074
Vijendra Singh
Singh Vijendra and Pathak Shivani
Robust Outlier Detection Technique in Data Mining: A Univariate Approach
arXiv admin note: text overlap with arXiv:1402.6859 by other authors without attribution
null
null
MT CS 2011
cs.CV
http://creativecommons.org/licenses/by/3.0/
Outliers are the points which are different from or inconsistent with the rest of the data. They can be novel, new, abnormal, unusual or noisy information. Outliers are sometimes more interesting than the majority of the data. The main challenges of outlier detection with the increasing complexity, size and variety of datasets, are how to catch similar outliers as a group, and how to evaluate the outliers. This paper describes an approach which uses Univariate outlier detection as a pre-processing step to detect the outlier and then applies K-means algorithm hence to analyse the effects of the outliers on the cluster analysis of dataset.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 15:12:49 GMT" } ]
2014-06-20T00:00:00
[ [ "Vijendra", "Singh", "" ], [ "Shivani", "Pathak", "" ] ]
TITLE: Robust Outlier Detection Technique in Data Mining: A Univariate Approach ABSTRACT: Outliers are the points which are different from or inconsistent with the rest of the data. They can be novel, new, abnormal, unusual or noisy information. Outliers are sometimes more interesting than the majority of the data. The main challenges of outlier detection with the increasing complexity, size and variety of datasets, are how to catch similar outliers as a group, and how to evaluate the outliers. This paper describes an approach which uses Univariate outlier detection as a pre-processing step to detect the outlier and then applies K-means algorithm hence to analyse the effects of the outliers on the cluster analysis of dataset.
1406.5095
Conrad Sanderson
Vikas Reddy, Conrad Sanderson, Andres Sanin, Brian C. Lovell
MRF-based Background Initialisation for Improved Foreground Detection in Cluttered Surveillance Videos
arXiv admin note: substantial text overlap with arXiv:1303.2465
null
10.1007/978-3-642-19318-7_43
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robust foreground object segmentation via background modelling is a difficult problem in cluttered environments, where obtaining a clear view of the background to model is almost impossible. In this paper, we propose a method capable of robustly estimating the background and detecting regions of interest in such environments. In particular, we propose to extend the background initialisation component of a recent patch-based foreground detection algorithm with an elaborate technique based on Markov Random Fields, where the optimal labelling solution is computed using iterated conditional modes. Rather than relying purely on local temporal statistics, the proposed technique takes into account the spatial continuity of the entire background. Experiments with several tracking algorithms on the CAVIAR dataset indicate that the proposed method leads to considerable improvements in object tracking accuracy, when compared to methods based on Gaussian mixture models and feature histograms.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 16:06:53 GMT" } ]
2014-06-20T00:00:00
[ [ "Reddy", "Vikas", "" ], [ "Sanderson", "Conrad", "" ], [ "Sanin", "Andres", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: MRF-based Background Initialisation for Improved Foreground Detection in Cluttered Surveillance Videos ABSTRACT: Robust foreground object segmentation via background modelling is a difficult problem in cluttered environments, where obtaining a clear view of the background to model is almost impossible. In this paper, we propose a method capable of robustly estimating the background and detecting regions of interest in such environments. In particular, we propose to extend the background initialisation component of a recent patch-based foreground detection algorithm with an elaborate technique based on Markov Random Fields, where the optimal labelling solution is computed using iterated conditional modes. Rather than relying purely on local temporal statistics, the proposed technique takes into account the spatial continuity of the entire background. Experiments with several tracking algorithms on the CAVIAR dataset indicate that the proposed method leads to considerable improvements in object tracking accuracy, when compared to methods based on Gaussian mixture models and feature histograms.
1406.5106
David Van Horn
J. Ian Johnson, Ilya Sergey, Christopher Earl, Matthew Might, David Van Horn
Pushdown flow analysis with abstract garbage collection
null
Journal of Functional Programming, Volume 24, Special Issue 2-3, May 2014, pp 218-283
10.1017/S0956796814000100 10.1017/S0956796814000100 10.1017/S0956796814000100 10.1017/S0956796814000100 10.1017/S0956796814000100
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the static analysis of functional programs, pushdown flow analysis and abstract garbage collection push the boundaries of what we can learn about programs statically. This work illuminates and poses solutions to theoretical and practical challenges that stand in the way of combining the power of these techniques. Pushdown flow analysis grants unbounded yet computable polyvariance to the analysis of return-flow in higher-order programs. Abstract garbage collection grants unbounded polyvariance to abstract addresses which become unreachable between invocations of the abstract contexts in which they were created. Pushdown analysis solves the problem of precisely analyzing recursion in higher-order languages; abstract garbage collection is essential in solving the "stickiness" problem. Alone, our benchmarks demonstrate that each method can reduce analysis times and boost precision by orders of magnitude. We combine these methods. The challenge in marrying these techniques is not subtle: computing the reachable control states of a pushdown system relies on limiting access during transition to the top of the stack; abstract garbage collection, on the other hand, needs full access to the entire stack to compute a root set, just as concrete collection does. Conditional pushdown systems were developed for just such a conundrum, but existing methods are ill-suited for the dynamic nature of garbage collection. We show fully precise and approximate solutions to the feasible paths problem for pushdown garbage-collecting control-flow analysis. Experiments reveal synergistic interplay between garbage collection and pushdown techniques, and the fusion demonstrates "better-than-both-worlds" precision.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 16:51:12 GMT" } ]
2014-06-20T00:00:00
[ [ "Johnson", "J. Ian", "" ], [ "Sergey", "Ilya", "" ], [ "Earl", "Christopher", "" ], [ "Might", "Matthew", "" ], [ "Van Horn", "David", "" ] ]
TITLE: Pushdown flow analysis with abstract garbage collection ABSTRACT: In the static analysis of functional programs, pushdown flow analysis and abstract garbage collection push the boundaries of what we can learn about programs statically. This work illuminates and poses solutions to theoretical and practical challenges that stand in the way of combining the power of these techniques. Pushdown flow analysis grants unbounded yet computable polyvariance to the analysis of return-flow in higher-order programs. Abstract garbage collection grants unbounded polyvariance to abstract addresses which become unreachable between invocations of the abstract contexts in which they were created. Pushdown analysis solves the problem of precisely analyzing recursion in higher-order languages; abstract garbage collection is essential in solving the "stickiness" problem. Alone, our benchmarks demonstrate that each method can reduce analysis times and boost precision by orders of magnitude. We combine these methods. The challenge in marrying these techniques is not subtle: computing the reachable control states of a pushdown system relies on limiting access during transition to the top of the stack; abstract garbage collection, on the other hand, needs full access to the entire stack to compute a root set, just as concrete collection does. Conditional pushdown systems were developed for just such a conundrum, but existing methods are ill-suited for the dynamic nature of garbage collection. We show fully precise and approximate solutions to the feasible paths problem for pushdown garbage-collecting control-flow analysis. Experiments reveal synergistic interplay between garbage collection and pushdown techniques, and the fusion demonstrates "better-than-both-worlds" precision.
1406.5161
Jeyanthi Salem Narasimhan
Jeyanthi Narasimhan, Abhinav Vishnu, Lawrence Holder, Adolfy Hoisie
Fast Support Vector Machines Using Parallel Adaptive Shrinking on Distributed Systems
10 pages, 9 figures, 3 tables
null
null
null
cs.DC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Support Vector Machines (SVM), a popular machine learning technique, has been applied to a wide range of domains such as science, finance, and social networks for supervised learning. Whether it is identifying high-risk patients by health-care professionals, or potential high-school students to enroll in college by school districts, SVMs can play a major role for social good. This paper undertakes the challenge of designing a scalable parallel SVM training algorithm for large scale systems, which includes commodity multi-core machines, tightly connected supercomputers and cloud computing systems. Intuitive techniques for improving the time-space complexity including adaptive elimination of samples for faster convergence and sparse format representation are proposed. Under sample elimination, several heuristics for {\em earliest possible} to {\em lazy} elimination of non-contributing samples are proposed. In several cases, where an early sample elimination might result in a false positive, low overhead mechanisms for reconstruction of key data structures are proposed. The algorithm and heuristics are implemented and evaluated on various publicly available datasets. Empirical evaluation shows up to 26x speed improvement on some datasets against the sequential baseline, when evaluated on multiple compute nodes, and an improvement in execution time up to 30-60\% is readily observed on a number of other datasets against our parallel baseline.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 19:22:28 GMT" } ]
2014-06-20T00:00:00
[ [ "Narasimhan", "Jeyanthi", "" ], [ "Vishnu", "Abhinav", "" ], [ "Holder", "Lawrence", "" ], [ "Hoisie", "Adolfy", "" ] ]
TITLE: Fast Support Vector Machines Using Parallel Adaptive Shrinking on Distributed Systems ABSTRACT: Support Vector Machines (SVM), a popular machine learning technique, has been applied to a wide range of domains such as science, finance, and social networks for supervised learning. Whether it is identifying high-risk patients by health-care professionals, or potential high-school students to enroll in college by school districts, SVMs can play a major role for social good. This paper undertakes the challenge of designing a scalable parallel SVM training algorithm for large scale systems, which includes commodity multi-core machines, tightly connected supercomputers and cloud computing systems. Intuitive techniques for improving the time-space complexity including adaptive elimination of samples for faster convergence and sparse format representation are proposed. Under sample elimination, several heuristics for {\em earliest possible} to {\em lazy} elimination of non-contributing samples are proposed. In several cases, where an early sample elimination might result in a false positive, low overhead mechanisms for reconstruction of key data structures are proposed. The algorithm and heuristics are implemented and evaluated on various publicly available datasets. Empirical evaluation shows up to 26x speed improvement on some datasets against the sequential baseline, when evaluated on multiple compute nodes, and an improvement in execution time up to 30-60\% is readily observed on a number of other datasets against our parallel baseline.
1311.4336
Junming Huang
Junming Huang, Chao Li, Wen-Qiang Wang, Hua-Wei Shen, Guojie Li, Xue-Qi Cheng
Temporal scaling in information propagation
13 pages, 2 figures. published on Scientific Reports
Scientific Reports 4, 5334, (2014)
10.1038/srep05334
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the study of information propagation, one fundamental problem is uncovering universal laws governing the dynamics of information propagation. This problem, from the microscopic perspective, is formulated as estimating the propagation probability that a piece of information propagates from one individual to another. Such a propagation probability generally depends on two major classes of factors: the intrinsic attractiveness of information and the interactions between individuals. Despite the fact that the temporal effect of attractiveness is widely studied, temporal laws underlying individual interactions remain unclear, causing inaccurate prediction of information propagation on evolving social networks. In this report, we empirically study the dynamics of information propagation, using the dataset from a population-scale social media website. We discover a temporal scaling in information propagation: the probability a message propagates between two individuals decays with the length of time latency since their latest interaction, obeying a power-law rule. Leveraging the scaling law, we further propose a temporal model to estimate future propagation probabilities between individuals, reducing the error rate of information propagation prediction from 6.7% to 2.6% and improving viral marketing with 9.7% incremental customers.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 11:15:26 GMT" }, { "version": "v2", "created": "Fri, 22 Nov 2013 02:15:14 GMT" }, { "version": "v3", "created": "Wed, 18 Jun 2014 09:55:29 GMT" } ]
2014-06-19T00:00:00
[ [ "Huang", "Junming", "" ], [ "Li", "Chao", "" ], [ "Wang", "Wen-Qiang", "" ], [ "Shen", "Hua-Wei", "" ], [ "Li", "Guojie", "" ], [ "Cheng", "Xue-Qi", "" ] ]
TITLE: Temporal scaling in information propagation ABSTRACT: For the study of information propagation, one fundamental problem is uncovering universal laws governing the dynamics of information propagation. This problem, from the microscopic perspective, is formulated as estimating the propagation probability that a piece of information propagates from one individual to another. Such a propagation probability generally depends on two major classes of factors: the intrinsic attractiveness of information and the interactions between individuals. Despite the fact that the temporal effect of attractiveness is widely studied, temporal laws underlying individual interactions remain unclear, causing inaccurate prediction of information propagation on evolving social networks. In this report, we empirically study the dynamics of information propagation, using the dataset from a population-scale social media website. We discover a temporal scaling in information propagation: the probability a message propagates between two individuals decays with the length of time latency since their latest interaction, obeying a power-law rule. Leveraging the scaling law, we further propose a temporal model to estimate future propagation probabilities between individuals, reducing the error rate of information propagation prediction from 6.7% to 2.6% and improving viral marketing with 9.7% incremental customers.
1402.5516
Peng Zhang
Peng Zhang, Wei Chen, Xiaoming Sun, Yajun Wang, Jialin Zhang
Minimizing Seed Set Selection with Probabilistic Coverage Guarantee in a Social Network
Conference version will appear in KDD 2014
null
null
null
cs.SI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A topic propagating in a social network reaches its tipping point if the number of users discussing it in the network exceeds a critical threshold such that a wide cascade on the topic is likely to occur. In this paper, we consider the task of selecting initial seed users of a topic with minimum size so that with a guaranteed probability the number of users discussing the topic would reach a given threshold. We formulate the task as an optimization problem called seed minimization with probabilistic coverage guarantee (SM-PCG). This problem departs from the previous studies on social influence maximization or seed minimization because it considers influence coverage with probabilistic guarantees instead of guarantees on expected influence coverage. We show that the problem is not submodular, and thus is harder than previously studied problems based on submodular function optimization. We provide an approximation algorithm and show that it approximates the optimal solution with both a multiplicative ratio and an additive error. The multiplicative ratio is tight while the additive error would be small if influence coverage distributions of certain seed sets are well concentrated. For one-way bipartite graphs we analytically prove the concentration condition and obtain an approximation algorithm with an $O(\log n)$ multiplicative ratio and an $O(\sqrt{n})$ additive error, where $n$ is the total number of nodes in the social graph. Moreover, we empirically verify the concentration condition in real-world networks and experimentally demonstrate the effectiveness of our proposed algorithm comparing to commonly adopted benchmark algorithms.
[ { "version": "v1", "created": "Sat, 22 Feb 2014 15:24:12 GMT" }, { "version": "v2", "created": "Wed, 18 Jun 2014 17:41:41 GMT" } ]
2014-06-19T00:00:00
[ [ "Zhang", "Peng", "" ], [ "Chen", "Wei", "" ], [ "Sun", "Xiaoming", "" ], [ "Wang", "Yajun", "" ], [ "Zhang", "Jialin", "" ] ]
TITLE: Minimizing Seed Set Selection with Probabilistic Coverage Guarantee in a Social Network ABSTRACT: A topic propagating in a social network reaches its tipping point if the number of users discussing it in the network exceeds a critical threshold such that a wide cascade on the topic is likely to occur. In this paper, we consider the task of selecting initial seed users of a topic with minimum size so that with a guaranteed probability the number of users discussing the topic would reach a given threshold. We formulate the task as an optimization problem called seed minimization with probabilistic coverage guarantee (SM-PCG). This problem departs from the previous studies on social influence maximization or seed minimization because it considers influence coverage with probabilistic guarantees instead of guarantees on expected influence coverage. We show that the problem is not submodular, and thus is harder than previously studied problems based on submodular function optimization. We provide an approximation algorithm and show that it approximates the optimal solution with both a multiplicative ratio and an additive error. The multiplicative ratio is tight while the additive error would be small if influence coverage distributions of certain seed sets are well concentrated. For one-way bipartite graphs we analytically prove the concentration condition and obtain an approximation algorithm with an $O(\log n)$ multiplicative ratio and an $O(\sqrt{n})$ additive error, where $n$ is the total number of nodes in the social graph. Moreover, we empirically verify the concentration condition in real-world networks and experimentally demonstrate the effectiveness of our proposed algorithm comparing to commonly adopted benchmark algorithms.
1406.4296
Adrien Gaidon
Adrien Gaidon (Xerox Research Center Europe, France), Gloria Zen (University of Trento, Italy), Jose A. Rodriguez-Serrano (Xerox Research Center Europe, France)
Self-Learning Camera: Autonomous Adaptation of Object Detectors to Unlabeled Video Streams
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning object detectors requires massive amounts of labeled training samples from the specific data source of interest. This is impractical when dealing with many different sources (e.g., in camera networks), or constantly changing ones such as mobile cameras (e.g., in robotics or driving assistant systems). In this paper, we address the problem of self-learning detectors in an autonomous manner, i.e. (i) detectors continuously updating themselves to efficiently adapt to streaming data sources (contrary to transductive algorithms), (ii) without any labeled data strongly related to the target data stream (contrary to self-paced learning), and (iii) without manual intervention to set and update hyper-parameters. To that end, we propose an unsupervised, on-line, and self-tuning learning algorithm to optimize a multi-task learning convex objective. Our method uses confident but laconic oracles (high-precision but low-recall off-the-shelf generic detectors), and exploits the structure of the problem to jointly learn on-line an ensemble of instance-level trackers, from which we derive an adapted category-level object detector. Our approach is validated on real-world publicly available video object datasets.
[ { "version": "v1", "created": "Tue, 17 Jun 2014 09:51:18 GMT" }, { "version": "v2", "created": "Wed, 18 Jun 2014 12:33:22 GMT" } ]
2014-06-19T00:00:00
[ [ "Gaidon", "Adrien", "", "Xerox Research Center Europe, France" ], [ "Zen", "Gloria", "", "University of Trento, Italy" ], [ "Rodriguez-Serrano", "Jose A.", "", "Xerox Research\n Center Europe, France" ] ]
TITLE: Self-Learning Camera: Autonomous Adaptation of Object Detectors to Unlabeled Video Streams ABSTRACT: Learning object detectors requires massive amounts of labeled training samples from the specific data source of interest. This is impractical when dealing with many different sources (e.g., in camera networks), or constantly changing ones such as mobile cameras (e.g., in robotics or driving assistant systems). In this paper, we address the problem of self-learning detectors in an autonomous manner, i.e. (i) detectors continuously updating themselves to efficiently adapt to streaming data sources (contrary to transductive algorithms), (ii) without any labeled data strongly related to the target data stream (contrary to self-paced learning), and (iii) without manual intervention to set and update hyper-parameters. To that end, we propose an unsupervised, on-line, and self-tuning learning algorithm to optimize a multi-task learning convex objective. Our method uses confident but laconic oracles (high-precision but low-recall off-the-shelf generic detectors), and exploits the structure of the problem to jointly learn on-line an ensemble of instance-level trackers, from which we derive an adapted category-level object detector. Our approach is validated on real-world publicly available video object datasets.
1406.4518
Erfan Khaji Mr.
Erfan Khaji, Amin Satlikh Mohammadi
A Heuristic Method to Generate Better Initial Population for Evolutionary Methods
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Initial population plays an important role in heuristic algorithms such as GA as it help to decrease the time those algorithms need to achieve an acceptable result. Furthermore, it may influence the quality of the final answer given by evolutionary algorithms. In this paper, we shall introduce a heuristic method to generate a target based initial population which possess two mentioned characteristics. The efficiency of the proposed method has been shown by presenting the results of our tests on the benchmarks.
[ { "version": "v1", "created": "Sun, 15 Jun 2014 15:20:17 GMT" } ]
2014-06-19T00:00:00
[ [ "Khaji", "Erfan", "" ], [ "Mohammadi", "Amin Satlikh", "" ] ]
TITLE: A Heuristic Method to Generate Better Initial Population for Evolutionary Methods ABSTRACT: Initial population plays an important role in heuristic algorithms such as GA as it help to decrease the time those algorithms need to achieve an acceptable result. Furthermore, it may influence the quality of the final answer given by evolutionary algorithms. In this paper, we shall introduce a heuristic method to generate a target based initial population which possess two mentioned characteristics. The efficiency of the proposed method has been shown by presenting the results of our tests on the benchmarks.
1406.4773
Yi Sun
Yi Sun, Xiaogang Wang, Xiaoou Tang
Deep Learning Face Representation by Joint Identification-Verification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The key challenge of face recognition is to develop effective feature representations for reducing intra-personal variations while enlarging inter-personal differences. In this paper, we show that it can be well solved with deep learning and using both face identification and verification signals as supervision. The Deep IDentification-verification features (DeepID2) are learned with carefully designed deep convolutional networks. The face identification task increases the inter-personal variations by drawing DeepID2 extracted from different identities apart, while the face verification task reduces the intra-personal variations by pulling DeepID2 extracted from the same identity together, both of which are essential to face recognition. The learned DeepID2 features can be well generalized to new identities unseen in the training data. On the challenging LFW dataset, 99.15% face verification accuracy is achieved. Compared with the best deep learning result on LFW, the error rate has been significantly reduced by 67%.
[ { "version": "v1", "created": "Wed, 18 Jun 2014 15:42:16 GMT" } ]
2014-06-19T00:00:00
[ [ "Sun", "Yi", "" ], [ "Wang", "Xiaogang", "" ], [ "Tang", "Xiaoou", "" ] ]
TITLE: Deep Learning Face Representation by Joint Identification-Verification ABSTRACT: The key challenge of face recognition is to develop effective feature representations for reducing intra-personal variations while enlarging inter-personal differences. In this paper, we show that it can be well solved with deep learning and using both face identification and verification signals as supervision. The Deep IDentification-verification features (DeepID2) are learned with carefully designed deep convolutional networks. The face identification task increases the inter-personal variations by drawing DeepID2 extracted from different identities apart, while the face verification task reduces the intra-personal variations by pulling DeepID2 extracted from the same identity together, both of which are essential to face recognition. The learned DeepID2 features can be well generalized to new identities unseen in the training data. On the challenging LFW dataset, 99.15% face verification accuracy is achieved. Compared with the best deep learning result on LFW, the error rate has been significantly reduced by 67%.
1406.4775
Andrea Montanari
Andrea Montanari and Emile Richard
Non-negative Principal Component Analysis: Message Passing Algorithms and Sharp Asymptotics
51 pages, 7 pdf figures
null
null
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Principal component analysis (PCA) aims at estimating the direction of maximal variability of a high-dimensional dataset. A natural question is: does this task become easier, and estimation more accurate, when we exploit additional knowledge on the principal vector? We study the case in which the principal vector is known to lie in the positive orthant. Similar constraints arise in a number of applications, ranging from analysis of gene expression data to spike sorting in neural signal processing. In the unconstrained case, the estimation performances of PCA has been precisely characterized using random matrix theory, under a statistical model known as the `spiked model.' It is known that the estimation error undergoes a phase transition as the signal-to-noise ratio crosses a certain threshold. Unfortunately, tools from random matrix theory have no bearing on the constrained problem. Despite this challenge, we develop an analogous characterization in the constrained case, within a one-spike model. In particular: $(i)$~We prove that the estimation error undergoes a similar phase transition, albeit at a different threshold in signal-to-noise ratio that we determine exactly; $(ii)$~We prove that --unlike in the unconstrained case-- estimation error depends on the spike vector, and characterize the least favorable vectors; $(iii)$~We show that a non-negative principal component can be approximately computed --under the spiked model-- in nearly linear time. This despite the fact that the problem is non-convex and, in general, NP-hard to solve exactly.
[ { "version": "v1", "created": "Wed, 18 Jun 2014 15:47:33 GMT" } ]
2014-06-19T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Richard", "Emile", "" ] ]
TITLE: Non-negative Principal Component Analysis: Message Passing Algorithms and Sharp Asymptotics ABSTRACT: Principal component analysis (PCA) aims at estimating the direction of maximal variability of a high-dimensional dataset. A natural question is: does this task become easier, and estimation more accurate, when we exploit additional knowledge on the principal vector? We study the case in which the principal vector is known to lie in the positive orthant. Similar constraints arise in a number of applications, ranging from analysis of gene expression data to spike sorting in neural signal processing. In the unconstrained case, the estimation performances of PCA has been precisely characterized using random matrix theory, under a statistical model known as the `spiked model.' It is known that the estimation error undergoes a phase transition as the signal-to-noise ratio crosses a certain threshold. Unfortunately, tools from random matrix theory have no bearing on the constrained problem. Despite this challenge, we develop an analogous characterization in the constrained case, within a one-spike model. In particular: $(i)$~We prove that the estimation error undergoes a similar phase transition, albeit at a different threshold in signal-to-noise ratio that we determine exactly; $(ii)$~We prove that --unlike in the unconstrained case-- estimation error depends on the spike vector, and characterize the least favorable vectors; $(iii)$~We show that a non-negative principal component can be approximately computed --under the spiked model-- in nearly linear time. This despite the fact that the problem is non-convex and, in general, NP-hard to solve exactly.
1406.4784
Ping Li
Anshumali Shrivastava and Ping Li
Improved Densification of One Permutation Hashing
null
null
null
null
stat.ME cs.DS cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The existing work on densification of one permutation hashing reduces the query processing cost of the $(K,L)$-parameterized Locality Sensitive Hashing (LSH) algorithm with minwise hashing, from $O(dKL)$ to merely $O(d + KL)$, where $d$ is the number of nonzeros of the data vector, $K$ is the number of hashes in each hash table, and $L$ is the number of hash tables. While that is a substantial improvement, our analysis reveals that the existing densification scheme is sub-optimal. In particular, there is no enough randomness in that procedure, which affects its accuracy on very sparse datasets. In this paper, we provide a new densification procedure which is provably better than the existing scheme. This improvement is more significant for very sparse datasets which are common over the web. The improved technique has the same cost of $O(d + KL)$ for query processing, thereby making it strictly preferable over the existing procedure. Experimental evaluations on public datasets, in the task of hashing based near neighbor search, support our theoretical findings.
[ { "version": "v1", "created": "Wed, 18 Jun 2014 16:16:22 GMT" } ]
2014-06-19T00:00:00
[ [ "Shrivastava", "Anshumali", "" ], [ "Li", "Ping", "" ] ]
TITLE: Improved Densification of One Permutation Hashing ABSTRACT: The existing work on densification of one permutation hashing reduces the query processing cost of the $(K,L)$-parameterized Locality Sensitive Hashing (LSH) algorithm with minwise hashing, from $O(dKL)$ to merely $O(d + KL)$, where $d$ is the number of nonzeros of the data vector, $K$ is the number of hashes in each hash table, and $L$ is the number of hash tables. While that is a substantial improvement, our analysis reveals that the existing densification scheme is sub-optimal. In particular, there is no enough randomness in that procedure, which affects its accuracy on very sparse datasets. In this paper, we provide a new densification procedure which is provably better than the existing scheme. This improvement is more significant for very sparse datasets which are common over the web. The improved technique has the same cost of $O(d + KL)$ for query processing, thereby making it strictly preferable over the existing procedure. Experimental evaluations on public datasets, in the task of hashing based near neighbor search, support our theoretical findings.
1012.3951
Alex Bronstein
Roee Litman, Alex M. Bronstein, Michael M. Bronstein
Diffusion-geometric maximally stable component detection in deformable shapes
null
null
10.1016/j.cag.2011.03.011
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximally stable component detection is a very popular method for feature analysis in images, mainly due to its low computation cost and high repeatability. With the recent advance of feature-based methods in geometric shape analysis, there is significant interest in finding analogous approaches in the 3D world. In this paper, we formulate a diffusion-geometric framework for stable component detection in non-rigid 3D shapes, which can be used for geometric feature detection and description. A quantitative evaluation of our method on the SHREC'10 feature detection benchmark shows its potential as a source of high-quality features.
[ { "version": "v1", "created": "Fri, 17 Dec 2010 18:23:35 GMT" } ]
2014-06-18T00:00:00
[ [ "Litman", "Roee", "" ], [ "Bronstein", "Alex M.", "" ], [ "Bronstein", "Michael M.", "" ] ]
TITLE: Diffusion-geometric maximally stable component detection in deformable shapes ABSTRACT: Maximally stable component detection is a very popular method for feature analysis in images, mainly due to its low computation cost and high repeatability. With the recent advance of feature-based methods in geometric shape analysis, there is significant interest in finding analogous approaches in the 3D world. In this paper, we formulate a diffusion-geometric framework for stable component detection in non-rigid 3D shapes, which can be used for geometric feature detection and description. A quantitative evaluation of our method on the SHREC'10 feature detection benchmark shows its potential as a source of high-quality features.
1103.5188
Catuscia Palamidessi
M\'ario S. Alvim, Miguel E. Andr\'es, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi
Differential Privacy: on the trade-off between Utility and Information Leakage
30 pages; HAL repository
Proceedings of the 8th International Workshop on Formal Aspects of Security & Trust (FAST'11), Springer, LNCS 7140, pp. 39-54, 2011
10.1007/978-3-642-29420-4_3
inria-00580122
cs.CR cs.DB cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent datasets give the same answer is bound by e^epsilon. In the field of information flow there is a similar concern for controlling information leakage, i.e. limiting the possibility of inferring the secret information from the observables. In recent years, researchers have proposed to quantify the leakage in terms of R\'enyi min mutual information, a notion strictly related to the Bayes risk. In this paper, we show how to model the query system in terms of an information-theoretic channel, and we compare the notion of differential privacy with that of mutual information. We show that differential privacy implies a bound on the mutual information (but not vice-versa). Furthermore, we show that our bound is tight. Then, we consider the utility of the randomization mechanism, which represents how close the randomized answers are, in average, to the real ones. We show that the notion of differential privacy implies a bound on utility, also tight, and we propose a method that under certain conditions builds an optimal randomization mechanism, i.e. a mechanism which provides the best utility while guaranteeing differential privacy.
[ { "version": "v1", "created": "Sun, 27 Mar 2011 06:41:12 GMT" }, { "version": "v2", "created": "Mon, 9 May 2011 00:04:26 GMT" }, { "version": "v3", "created": "Thu, 25 Aug 2011 04:12:17 GMT" } ]
2014-06-18T00:00:00
[ [ "Alvim", "Mário S.", "" ], [ "Andrés", "Miguel E.", "" ], [ "Chatzikokolakis", "Konstantinos", "" ], [ "Degano", "Pierpaolo", "" ], [ "Palamidessi", "Catuscia", "" ] ]
TITLE: Differential Privacy: on the trade-off between Utility and Information Leakage ABSTRACT: Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent datasets give the same answer is bound by e^epsilon. In the field of information flow there is a similar concern for controlling information leakage, i.e. limiting the possibility of inferring the secret information from the observables. In recent years, researchers have proposed to quantify the leakage in terms of R\'enyi min mutual information, a notion strictly related to the Bayes risk. In this paper, we show how to model the query system in terms of an information-theoretic channel, and we compare the notion of differential privacy with that of mutual information. We show that differential privacy implies a bound on the mutual information (but not vice-versa). Furthermore, we show that our bound is tight. Then, we consider the utility of the randomization mechanism, which represents how close the randomized answers are, in average, to the real ones. We show that the notion of differential privacy implies a bound on utility, also tight, and we propose a method that under certain conditions builds an optimal randomization mechanism, i.e. a mechanism which provides the best utility while guaranteeing differential privacy.
1307.0345
Tobias Sutter
Peyman Mohajerin Esfahani, Tobias Sutter, John Lygeros
Performance Bounds for the Scenario Approach and an Extension to a Class of Non-convex Programs
19 pages, revised version
null
10.1109/TAC.2014.2330702
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the Scenario Convex Program (SCP) for two classes of optimization problems that are not tractable in general: Robust Convex Programs (RCPs) and Chance-Constrained Programs (CCPs). We establish a probabilistic bridge from the optimal value of SCP to the optimal values of RCP and CCP in which the uncertainty takes values in a general, possibly infinite dimensional, metric space. We then extend our results to a certain class of non-convex problems that includes, for example, binary decision variables. In the process, we also settle a measurability issue for a general class of scenario programs, which to date has been addressed by an assumption. Finally, we demonstrate the applicability of our results on a benchmark problem and a problem in fault detection and isolation.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 12:30:58 GMT" }, { "version": "v2", "created": "Fri, 6 Dec 2013 11:27:53 GMT" } ]
2014-06-18T00:00:00
[ [ "Esfahani", "Peyman Mohajerin", "" ], [ "Sutter", "Tobias", "" ], [ "Lygeros", "John", "" ] ]
TITLE: Performance Bounds for the Scenario Approach and an Extension to a Class of Non-convex Programs ABSTRACT: We consider the Scenario Convex Program (SCP) for two classes of optimization problems that are not tractable in general: Robust Convex Programs (RCPs) and Chance-Constrained Programs (CCPs). We establish a probabilistic bridge from the optimal value of SCP to the optimal values of RCP and CCP in which the uncertainty takes values in a general, possibly infinite dimensional, metric space. We then extend our results to a certain class of non-convex problems that includes, for example, binary decision variables. In the process, we also settle a measurability issue for a general class of scenario programs, which to date has been addressed by an assumption. Finally, we demonstrate the applicability of our results on a benchmark problem and a problem in fault detection and isolation.
1405.5047
Michael Burke Mr
Michael Burke and Joan Lasenby
Single camera pose estimation using Bayesian filtering and Kinect motion priors
25 pages, Technical report, related to Burke and Lasenby, AMDO 2014 conference paper. Code sample: https://github.com/mgb45/SignerBodyPose Video: https://www.youtube.com/watch?v=dJMTSo7-uFE
null
null
null
cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional approaches to upper body pose estimation using monocular vision rely on complex body models and a large variety of geometric constraints. We argue that this is not ideal and somewhat inelegant as it results in large processing burdens, and instead attempt to incorporate these constraints through priors obtained directly from training data. A prior distribution covering the probability of a human pose occurring is used to incorporate likely human poses. This distribution is obtained offline, by fitting a Gaussian mixture model to a large dataset of recorded human body poses, tracked using a Kinect sensor. We combine this prior information with a random walk transition model to obtain an upper body model, suitable for use within a recursive Bayesian filtering framework. Our model can be viewed as a mixture of discrete Ornstein-Uhlenbeck processes, in that states behave as random walks, but drift towards a set of typically observed poses. This model is combined with measurements of the human head and hand positions, using recursive Bayesian estimation to incorporate temporal information. Measurements are obtained using face detection and a simple skin colour hand detector, trained using the detected face. The suggested model is designed with analytical tractability in mind and we show that the pose tracking can be Rao-Blackwellised using the mixture Kalman filter, allowing for computational efficiency while still incorporating bio-mechanical properties of the upper body. In addition, the use of the proposed upper body model allows reliable three-dimensional pose estimates to be obtained indirectly for a number of joints that are often difficult to detect using traditional object recognition strategies. Comparisons with Kinect sensor results and the state of the art in 2D pose estimation highlight the efficacy of the proposed approach.
[ { "version": "v1", "created": "Tue, 20 May 2014 11:54:04 GMT" }, { "version": "v2", "created": "Tue, 17 Jun 2014 12:15:42 GMT" } ]
2014-06-18T00:00:00
[ [ "Burke", "Michael", "" ], [ "Lasenby", "Joan", "" ] ]
TITLE: Single camera pose estimation using Bayesian filtering and Kinect motion priors ABSTRACT: Traditional approaches to upper body pose estimation using monocular vision rely on complex body models and a large variety of geometric constraints. We argue that this is not ideal and somewhat inelegant as it results in large processing burdens, and instead attempt to incorporate these constraints through priors obtained directly from training data. A prior distribution covering the probability of a human pose occurring is used to incorporate likely human poses. This distribution is obtained offline, by fitting a Gaussian mixture model to a large dataset of recorded human body poses, tracked using a Kinect sensor. We combine this prior information with a random walk transition model to obtain an upper body model, suitable for use within a recursive Bayesian filtering framework. Our model can be viewed as a mixture of discrete Ornstein-Uhlenbeck processes, in that states behave as random walks, but drift towards a set of typically observed poses. This model is combined with measurements of the human head and hand positions, using recursive Bayesian estimation to incorporate temporal information. Measurements are obtained using face detection and a simple skin colour hand detector, trained using the detected face. The suggested model is designed with analytical tractability in mind and we show that the pose tracking can be Rao-Blackwellised using the mixture Kalman filter, allowing for computational efficiency while still incorporating bio-mechanical properties of the upper body. In addition, the use of the proposed upper body model allows reliable three-dimensional pose estimates to be obtained indirectly for a number of joints that are often difficult to detect using traditional object recognition strategies. Comparisons with Kinect sensor results and the state of the art in 2D pose estimation highlight the efficacy of the proposed approach.
1406.4462
Erfan Khaji Mr.
Erfan Khaji
Soccer League Optimization: A heuristic Algorithm Inspired by the Football System in European Countries
6 Pages, 12 Figures, 4 Tables, Accepted in GEM 2014, but rejected due to lack of money
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a new heuristic optimization algorithm has been introduced based on the performance of the major football leagues within each season in EU countries. The algorithm starts with an initial population including three different groups of teams: the wealthiest (strongest), the regular, the poorest (weakest). Each individual of population constitute a football team while each player is an indication of a player in a post. The optimization can hopefully occurs when the competition among the teams in all the leagues is imitated as the strongest teams usually purchase the best players of the regular teams and in turn, regular teams purchase the best players of the weakest who should always discover young players instead of buying professionals. It has been shown that the algorithm can hopefully converge to an acceptable solution solving various benchmarks. Key words: Heuristic Algorithms
[ { "version": "v1", "created": "Sun, 15 Jun 2014 15:10:20 GMT" } ]
2014-06-18T00:00:00
[ [ "Khaji", "Erfan", "" ] ]
TITLE: Soccer League Optimization: A heuristic Algorithm Inspired by the Football System in European Countries ABSTRACT: In this paper a new heuristic optimization algorithm has been introduced based on the performance of the major football leagues within each season in EU countries. The algorithm starts with an initial population including three different groups of teams: the wealthiest (strongest), the regular, the poorest (weakest). Each individual of population constitute a football team while each player is an indication of a player in a post. The optimization can hopefully occurs when the competition among the teams in all the leagues is imitated as the strongest teams usually purchase the best players of the regular teams and in turn, regular teams purchase the best players of the weakest who should always discover young players instead of buying professionals. It has been shown that the algorithm can hopefully converge to an acceptable solution solving various benchmarks. Key words: Heuristic Algorithms
1209.0738
Bernardino Romera Paredes
Andreas Maurer, Massimiliano Pontil, Bernardino Romera-Paredes
Sparse coding for multitask and transfer learning
International Conference on Machine Learning 2013
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the use of sparse coding and dictionary learning in the context of multitask and transfer learning. The central assumption of our learning method is that the tasks parameters are well approximated by sparse linear combinations of the atoms of a dictionary on a high or infinite dimensional space. This assumption, together with the large quantity of available data in the multitask and transfer learning settings, allows a principled choice of the dictionary. We provide bounds on the generalization error of this approach, for both settings. Numerical experiments on one synthetic and two real datasets show the advantage of our method over single task learning, a previous method based on orthogonal and dense representation of the tasks and a related method learning task grouping.
[ { "version": "v1", "created": "Tue, 4 Sep 2012 19:06:51 GMT" }, { "version": "v2", "created": "Sat, 23 Mar 2013 19:35:27 GMT" }, { "version": "v3", "created": "Mon, 16 Jun 2014 15:06:48 GMT" } ]
2014-06-17T00:00:00
[ [ "Maurer", "Andreas", "" ], [ "Pontil", "Massimiliano", "" ], [ "Romera-Paredes", "Bernardino", "" ] ]
TITLE: Sparse coding for multitask and transfer learning ABSTRACT: We investigate the use of sparse coding and dictionary learning in the context of multitask and transfer learning. The central assumption of our learning method is that the tasks parameters are well approximated by sparse linear combinations of the atoms of a dictionary on a high or infinite dimensional space. This assumption, together with the large quantity of available data in the multitask and transfer learning settings, allows a principled choice of the dictionary. We provide bounds on the generalization error of this approach, for both settings. Numerical experiments on one synthetic and two real datasets show the advantage of our method over single task learning, a previous method based on orthogonal and dense representation of the tasks and a related method learning task grouping.
1307.6239
David Van Horn
Phuc C. Nguyen, Sam Tobin-Hochstadt, David Van Horn
Soft Contract Verification
ICFP '14, September 1-6, 2014, Gothenburg, Sweden
null
10.1145/2628136.2628156
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Behavioral software contracts are a widely used mechanism for governing the flow of values between components. However, run-time monitoring and enforcement of contracts imposes significant overhead and delays discovery of faulty components to run-time. To overcome these issues, we present soft contract verification, which aims to statically prove either complete or partial contract correctness of components, written in an untyped, higher-order language with first-class contracts. Our approach uses higher-order symbolic execution, leveraging contracts as a source of symbolic values including unknown behavioral values, and employs an updatable heap of contract invariants to reason about flow-sensitive facts. We prove the symbolic execution soundly approximates the dynamic semantics and that verified programs can't be blamed. The approach is able to analyze first-class contracts, recursive data structures, unknown functions, and control-flow-sensitive refinements of values, which are all idiomatic in dynamic languages. It makes effective use of an off-the-shelf solver to decide problems without heavy encodings. The approach is competitive with a wide range of existing tools---including type systems, flow analyzers, and model checkers---on their own benchmarks.
[ { "version": "v1", "created": "Tue, 23 Jul 2013 20:30:46 GMT" }, { "version": "v2", "created": "Sun, 17 Nov 2013 19:55:36 GMT" }, { "version": "v3", "created": "Mon, 3 Mar 2014 21:40:18 GMT" }, { "version": "v4", "created": "Mon, 16 Jun 2014 18:57:38 GMT" } ]
2014-06-17T00:00:00
[ [ "Nguyen", "Phuc C.", "" ], [ "Tobin-Hochstadt", "Sam", "" ], [ "Van Horn", "David", "" ] ]
TITLE: Soft Contract Verification ABSTRACT: Behavioral software contracts are a widely used mechanism for governing the flow of values between components. However, run-time monitoring and enforcement of contracts imposes significant overhead and delays discovery of faulty components to run-time. To overcome these issues, we present soft contract verification, which aims to statically prove either complete or partial contract correctness of components, written in an untyped, higher-order language with first-class contracts. Our approach uses higher-order symbolic execution, leveraging contracts as a source of symbolic values including unknown behavioral values, and employs an updatable heap of contract invariants to reason about flow-sensitive facts. We prove the symbolic execution soundly approximates the dynamic semantics and that verified programs can't be blamed. The approach is able to analyze first-class contracts, recursive data structures, unknown functions, and control-flow-sensitive refinements of values, which are all idiomatic in dynamic languages. It makes effective use of an off-the-shelf solver to decide problems without heavy encodings. The approach is competitive with a wide range of existing tools---including type systems, flow analyzers, and model checkers---on their own benchmarks.
1405.1131
Ali Bou Nassif
Ali Bou Nassif, Luiz Fernando Capretz, Danny Ho
Analyzing the Non-Functional Requirements in the Desharnais Dataset for Software Effort Estimation
6 pages
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Studying the quality requirements (aka Non-Functional Requirements (NFR)) of a system is crucial in Requirements Engineering. Many software projects fail because of neglecting or failing to incorporate the NFR during the software life development cycle. This paper focuses on analyzing the importance of the quality requirements attributes in software effort estimation models based on the Desharnais dataset. The Desharnais dataset is a collection of eighty one software projects of twelve attributes developed by a Canadian software house. The analysis includes studying the influence of each of the quality requirements attributes, as well as the influence of all quality requirements attributes combined when calculating software effort using regression and Artificial Neural Network (ANN) models. The evaluation criteria used in this investigation include the Mean of the Magnitude of Relative Error (MMRE), the Prediction Level (PRED), Root Mean Squared Error (RMSE), Mean Error and the Coefficient of determination (R2). Results show that the quality attribute Language is the most statistically significant when calculating software effort. Moreover, if all quality requirements attributes are eliminated in the training stage and software effort is predicted based on software size only, the value of the error (MMRE) is doubled.
[ { "version": "v1", "created": "Tue, 6 May 2014 02:32:41 GMT" }, { "version": "v2", "created": "Sat, 14 Jun 2014 03:19:18 GMT" } ]
2014-06-17T00:00:00
[ [ "Nassif", "Ali Bou", "" ], [ "Capretz", "Luiz Fernando", "" ], [ "Ho", "Danny", "" ] ]
TITLE: Analyzing the Non-Functional Requirements in the Desharnais Dataset for Software Effort Estimation ABSTRACT: Studying the quality requirements (aka Non-Functional Requirements (NFR)) of a system is crucial in Requirements Engineering. Many software projects fail because of neglecting or failing to incorporate the NFR during the software life development cycle. This paper focuses on analyzing the importance of the quality requirements attributes in software effort estimation models based on the Desharnais dataset. The Desharnais dataset is a collection of eighty one software projects of twelve attributes developed by a Canadian software house. The analysis includes studying the influence of each of the quality requirements attributes, as well as the influence of all quality requirements attributes combined when calculating software effort using regression and Artificial Neural Network (ANN) models. The evaluation criteria used in this investigation include the Mean of the Magnitude of Relative Error (MMRE), the Prediction Level (PRED), Root Mean Squared Error (RMSE), Mean Error and the Coefficient of determination (R2). Results show that the quality attribute Language is the most statistically significant when calculating software effort. Moreover, if all quality requirements attributes are eliminated in the training stage and software effort is predicted based on software size only, the value of the error (MMRE) is doubled.
1405.7452
Tim Althoff
Tim Althoff, Damian Borth, J\"orn Hees, Andreas Dengel
Analysis and Forecasting of Trending Topics in Online Media Streams
ACM Multimedia 2013
null
null
null
cs.SI cs.MM physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Among the vast information available on the web, social media streams capture what people currently pay attention to and how they feel about certain topics. Awareness of such trending topics plays a crucial role in multimedia systems such as trend aware recommendation and automatic vocabulary selection for video concept detection systems. Correctly utilizing trending topics requires a better understanding of their various characteristics in different social media streams. To this end, we present the first comprehensive study across three major online and social media streams, Twitter, Google, and Wikipedia, covering thousands of trending topics during an observation period of an entire year. Our results indicate that depending on one's requirements one does not necessarily have to turn to Twitter for information about current events and that some media streams strongly emphasize content of specific categories. As our second key contribution, we further present a novel approach for the challenging task of forecasting the life cycle of trending topics in the very moment they emerge. Our fully automated approach is based on a nearest neighbor forecasting technique exploiting our assumption that semantically similar topics exhibit similar behavior. We demonstrate on a large-scale dataset of Wikipedia page view statistics that forecasts by the proposed approach are about 9-48k views closer to the actual viewing statistics compared to baseline methods and achieve a mean average percentage error of 45-19% for time periods of up to 14 days.
[ { "version": "v1", "created": "Thu, 29 May 2014 03:43:41 GMT" }, { "version": "v2", "created": "Sat, 14 Jun 2014 20:14:07 GMT" } ]
2014-06-17T00:00:00
[ [ "Althoff", "Tim", "" ], [ "Borth", "Damian", "" ], [ "Hees", "Jörn", "" ], [ "Dengel", "Andreas", "" ] ]
TITLE: Analysis and Forecasting of Trending Topics in Online Media Streams ABSTRACT: Among the vast information available on the web, social media streams capture what people currently pay attention to and how they feel about certain topics. Awareness of such trending topics plays a crucial role in multimedia systems such as trend aware recommendation and automatic vocabulary selection for video concept detection systems. Correctly utilizing trending topics requires a better understanding of their various characteristics in different social media streams. To this end, we present the first comprehensive study across three major online and social media streams, Twitter, Google, and Wikipedia, covering thousands of trending topics during an observation period of an entire year. Our results indicate that depending on one's requirements one does not necessarily have to turn to Twitter for information about current events and that some media streams strongly emphasize content of specific categories. As our second key contribution, we further present a novel approach for the challenging task of forecasting the life cycle of trending topics in the very moment they emerge. Our fully automated approach is based on a nearest neighbor forecasting technique exploiting our assumption that semantically similar topics exhibit similar behavior. We demonstrate on a large-scale dataset of Wikipedia page view statistics that forecasts by the proposed approach are about 9-48k views closer to the actual viewing statistics compared to baseline methods and achieve a mean average percentage error of 45-19% for time periods of up to 14 days.
1406.1774
Toufiq Parag
Toufiq Parag, Stephen Plaza, Louis Scheffer (Janelia Farm Research Campus- HHMI)
Small Sample Learning of Superpixel Classifiers for EM Segmentation- Extended Version
Accepted for MICCAI 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pixel and superpixel classifiers have become essential tools for EM segmentation algorithms. Training these classifiers remains a major bottleneck primarily due to the requirement of completely annotating the dataset which is tedious, error-prone and costly. In this paper, we propose an interactive learning scheme for the superpixel classifier for EM segmentation. Our algorithm is "active semi-supervised" because it requests the labels of a small number of examples from user and applies label propagation technique to generate these queries. Using only a small set ($<20\%$) of all datapoints, the proposed algorithm consistently generates a classifier almost as accurate as that estimated from a complete groundtruth. We provide segmentation results on multiple datasets to show the strength of these classifiers.
[ { "version": "v1", "created": "Fri, 6 Jun 2014 18:59:58 GMT" }, { "version": "v2", "created": "Fri, 13 Jun 2014 22:05:57 GMT" } ]
2014-06-17T00:00:00
[ [ "Parag", "Toufiq", "", "Janelia Farm Research\n Campus- HHMI" ], [ "Plaza", "Stephen", "", "Janelia Farm Research\n Campus- HHMI" ], [ "Scheffer", "Louis", "", "Janelia Farm Research\n Campus- HHMI" ] ]
TITLE: Small Sample Learning of Superpixel Classifiers for EM Segmentation- Extended Version ABSTRACT: Pixel and superpixel classifiers have become essential tools for EM segmentation algorithms. Training these classifiers remains a major bottleneck primarily due to the requirement of completely annotating the dataset which is tedious, error-prone and costly. In this paper, we propose an interactive learning scheme for the superpixel classifier for EM segmentation. Our algorithm is "active semi-supervised" because it requests the labels of a small number of examples from user and applies label propagation technique to generate these queries. Using only a small set ($<20\%$) of all datapoints, the proposed algorithm consistently generates a classifier almost as accurate as that estimated from a complete groundtruth. We provide segmentation results on multiple datasets to show the strength of these classifiers.
1406.3682
Srishti Gupta
Srishti Gupta, Ponnurangam Kumaraguru
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information. Phishing costs Internet users billions of dollars every year. Researchers at Carnegie Mellon University (CMU) created an anti-phishing landing page supported by Anti-Phishing Working Group (APWG) with the aim to train users on how to prevent themselves from phishing attacks. It is used by financial institutions, phish site take down vendors, government organizations, and online merchants. When a potential victim clicks on a phishing link that has been taken down, he / she is redirected to the landing page. In this paper, we present the comparative analysis on two datasets that we obtained from APWG's landing page log files; one, from September 7, 2008 - November 11, 2009, and other from January 1, 2014 - April 30, 2014. We found that the landing page has been successful in training users against phishing. Forty six percent users clicked lesser number of phishing URLs from January 2014 to April 2014 which shows that training from the landing page helped users not to fall for phishing attacks. Our analysis shows that phishers have started to modify their techniques by creating more legitimate looking URLs and buying large number of domains to increase their activity. We observed that phishers are exploiting ICANN accredited registrars to launch their attacks even after strict surveillance. We saw that phishers are trying to exploit free subdomain registration services to carry out attacks. In this paper, we also compared the phishing e-mails used by phishers to lure victims in 2008 and 2014. We found that the phishing e-mails have changed considerably over time. Phishers have adopted new techniques like sending promotional e-mails and emotionally targeting users in clicking phishing URLs.
[ { "version": "v1", "created": "Sat, 14 Jun 2014 04:19:16 GMT" } ]
2014-06-17T00:00:00
[ [ "Gupta", "Srishti", "" ], [ "Kumaraguru", "Ponnurangam", "" ] ]
TITLE: Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page ABSTRACT: Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information. Phishing costs Internet users billions of dollars every year. Researchers at Carnegie Mellon University (CMU) created an anti-phishing landing page supported by Anti-Phishing Working Group (APWG) with the aim to train users on how to prevent themselves from phishing attacks. It is used by financial institutions, phish site take down vendors, government organizations, and online merchants. When a potential victim clicks on a phishing link that has been taken down, he / she is redirected to the landing page. In this paper, we present the comparative analysis on two datasets that we obtained from APWG's landing page log files; one, from September 7, 2008 - November 11, 2009, and other from January 1, 2014 - April 30, 2014. We found that the landing page has been successful in training users against phishing. Forty six percent users clicked lesser number of phishing URLs from January 2014 to April 2014 which shows that training from the landing page helped users not to fall for phishing attacks. Our analysis shows that phishers have started to modify their techniques by creating more legitimate looking URLs and buying large number of domains to increase their activity. We observed that phishers are exploiting ICANN accredited registrars to launch their attacks even after strict surveillance. We saw that phishers are trying to exploit free subdomain registration services to carry out attacks. In this paper, we also compared the phishing e-mails used by phishers to lure victims in 2008 and 2014. We found that the phishing e-mails have changed considerably over time. Phishers have adopted new techniques like sending promotional e-mails and emotionally targeting users in clicking phishing URLs.
1406.3687
Neha Gupta
Neha Gupta, Anupama Aggarwal, Ponnurangam Kumaraguru
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
arXiv admin note: substantial text overlap with arXiv:1405.1511
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained a lot of traction. URL shorteners take as input a long URL and output a short URL with the same landing page (as in the long URL) in return. With their immense popularity over time, URL shorteners have become a prime target for the attackers giving them an advantage to conceal malicious content. Bitly, a leading service among all shortening services is being exploited heavily to carry out phishing attacks, work-from-home scams, pornographic content propagation, etc. This imposes additional performance pressure on Bitly and other URL shorteners to be able to detect and take a timely action against the illegitimate content. In this study, we analyzed a dataset of 763,160 short URLs marked suspicious by Bitly in the month of October 2013. Our results reveal that Bitly is not using its claimed spam detection services very effectively. We also show how a suspicious Bitly account goes unnoticed despite of a prolonged recurrent illegitimate activity. Bitly displays a warning page on identification of suspicious links, but we observed this approach to be weak in controlling the overall propagation of spam. We also identified some short URL based features and coupled them with two domain specific features to classify a Bitly URL as malicious or benign and achieved an accuracy of 86.41%. The feature set identified can be generalized to other URL shortening services as well. To the best of our knowledge, this is the first large scale study to highlight the issues with the implementation of Bitly's spam detection policies and proposing suitable countermeasures.
[ { "version": "v1", "created": "Sat, 14 Jun 2014 06:22:16 GMT" } ]
2014-06-17T00:00:00
[ [ "Gupta", "Neha", "" ], [ "Aggarwal", "Anupama", "" ], [ "Kumaraguru", "Ponnurangam", "" ] ]
TITLE: bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection ABSTRACT: Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained a lot of traction. URL shorteners take as input a long URL and output a short URL with the same landing page (as in the long URL) in return. With their immense popularity over time, URL shorteners have become a prime target for the attackers giving them an advantage to conceal malicious content. Bitly, a leading service among all shortening services is being exploited heavily to carry out phishing attacks, work-from-home scams, pornographic content propagation, etc. This imposes additional performance pressure on Bitly and other URL shorteners to be able to detect and take a timely action against the illegitimate content. In this study, we analyzed a dataset of 763,160 short URLs marked suspicious by Bitly in the month of October 2013. Our results reveal that Bitly is not using its claimed spam detection services very effectively. We also show how a suspicious Bitly account goes unnoticed despite of a prolonged recurrent illegitimate activity. Bitly displays a warning page on identification of suspicious links, but we observed this approach to be weak in controlling the overall propagation of spam. We also identified some short URL based features and coupled them with two domain specific features to classify a Bitly URL as malicious or benign and achieved an accuracy of 86.41%. The feature set identified can be generalized to other URL shortening services as well. To the best of our knowledge, this is the first large scale study to highlight the issues with the implementation of Bitly's spam detection policies and proposing suitable countermeasures.
1406.3692
Prateek Dewan
Prateek Dewan and Anand Kashyap and Ponnurangam Kumaraguru
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Detection of spear phishing using social media features
null
null
null
cs.CY cs.LG cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise confidential information. What makes spear phishing different, and more powerful than normal phishing, is this contextual information about the victim. Online social media services can be one such source for gathering vital information about an individual. In this paper, we characterize and examine a true positive dataset of spear phishing, spam, and normal phishing emails from Symantec's enterprise email scanning service. We then present a model to detect spear phishing emails sent to employees of 14 international organizations, by using social features extracted from LinkedIn. Our dataset consists of 4,742 targeted attack emails sent to 2,434 victims, and 9,353 non targeted attack emails sent to 5,912 non victims; and publicly available information from their LinkedIn profiles. We applied various machine learning algorithms to this labeled data, and achieved an overall maximum accuracy of 97.76% in identifying spear phishing emails. We used a combination of social features from LinkedIn profiles, and stylometric features extracted from email subjects, bodies, and attachments. However, we achieved a slightly better accuracy of 98.28% without the social features. Our analysis revealed that social features extracted from LinkedIn do not help in identifying spear phishing emails. To the best of our knowledge, this is one of the first attempts to make use of a combination of stylometric features extracted from emails, and social features extracted from an online social network to detect targeted spear phishing emails.
[ { "version": "v1", "created": "Sat, 14 Jun 2014 07:01:03 GMT" } ]
2014-06-17T00:00:00
[ [ "Dewan", "Prateek", "" ], [ "Kashyap", "Anand", "" ], [ "Kumaraguru", "Ponnurangam", "" ] ]
TITLE: Analyzing Social and Stylometric Features to Identify Spear phishing Emails ABSTRACT: Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise confidential information. What makes spear phishing different, and more powerful than normal phishing, is this contextual information about the victim. Online social media services can be one such source for gathering vital information about an individual. In this paper, we characterize and examine a true positive dataset of spear phishing, spam, and normal phishing emails from Symantec's enterprise email scanning service. We then present a model to detect spear phishing emails sent to employees of 14 international organizations, by using social features extracted from LinkedIn. Our dataset consists of 4,742 targeted attack emails sent to 2,434 victims, and 9,353 non targeted attack emails sent to 5,912 non victims; and publicly available information from their LinkedIn profiles. We applied various machine learning algorithms to this labeled data, and achieved an overall maximum accuracy of 97.76% in identifying spear phishing emails. We used a combination of social features from LinkedIn profiles, and stylometric features extracted from email subjects, bodies, and attachments. However, we achieved a slightly better accuracy of 98.28% without the social features. Our analysis revealed that social features extracted from LinkedIn do not help in identifying spear phishing emails. To the best of our knowledge, this is one of the first attempts to make use of a combination of stylometric features extracted from emails, and social features extracted from an online social network to detect targeted spear phishing emails.