id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1403.6382
Hossein Azizpour
Ali Sharif Razavian, Hossein Azizpour, Josephine Sullivan, Stefan Carlsson
CNN Features off-the-shelf: an Astounding Baseline for Recognition
version 3 revisions: 1)Added results using feature processing and data augmentation 2)Referring to most recent efforts of using CNN for different visual recognition tasks 3) updated text/caption
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent results indicate that the generic descriptors extracted from the convolutional neural networks are very powerful. This paper adds to the mounting evidence that this is indeed the case. We report on a series of experiments conducted for different recognition tasks using the publicly available code and model of the \overfeat network which was trained to perform object classification on ILSVRC13. We use features extracted from the \overfeat network as a generic image representation to tackle the diverse range of recognition tasks of object image classification, scene recognition, fine grained recognition, attribute detection and image retrieval applied to a diverse set of datasets. We selected these tasks and datasets as they gradually move further away from the original task and data the \overfeat network was trained to solve. Astonishingly, we report consistent superior results compared to the highly tuned state-of-the-art systems in all the visual classification tasks on various datasets. For instance retrieval it consistently outperforms low memory footprint methods except for sculptures dataset. The results are achieved using a linear SVM classifier (or $L2$ distance in case of retrieval) applied to a feature representation of size 4096 extracted from a layer in the net. The representations are further modified using simple augmentation techniques e.g. jittering. The results strongly suggest that features obtained from deep learning with convolutional nets should be the primary candidate in most visual recognition tasks.
[ { "version": "v1", "created": "Sun, 23 Mar 2014 13:42:03 GMT" }, { "version": "v2", "created": "Wed, 16 Apr 2014 12:43:13 GMT" }, { "version": "v3", "created": "Mon, 12 May 2014 08:53:31 GMT" } ]
2014-05-13T00:00:00
[ [ "Razavian", "Ali Sharif", "" ], [ "Azizpour", "Hossein", "" ], [ "Sullivan", "Josephine", "" ], [ "Carlsson", "Stefan", "" ] ]
TITLE: CNN Features off-the-shelf: an Astounding Baseline for Recognition ABSTRACT: Recent results indicate that the generic descriptors extracted from the convolutional neural networks are very powerful. This paper adds to the mounting evidence that this is indeed the case. We report on a series of experiments conducted for different recognition tasks using the publicly available code and model of the \overfeat network which was trained to perform object classification on ILSVRC13. We use features extracted from the \overfeat network as a generic image representation to tackle the diverse range of recognition tasks of object image classification, scene recognition, fine grained recognition, attribute detection and image retrieval applied to a diverse set of datasets. We selected these tasks and datasets as they gradually move further away from the original task and data the \overfeat network was trained to solve. Astonishingly, we report consistent superior results compared to the highly tuned state-of-the-art systems in all the visual classification tasks on various datasets. For instance retrieval it consistently outperforms low memory footprint methods except for sculptures dataset. The results are achieved using a linear SVM classifier (or $L2$ distance in case of retrieval) applied to a feature representation of size 4096 extracted from a layer in the net. The representations are further modified using simple augmentation techniques e.g. jittering. The results strongly suggest that features obtained from deep learning with convolutional nets should be the primary candidate in most visual recognition tasks.
1405.2517
Zubair Nabi Zubair Nabi
Zubair Nabi
A $35 Firewall for the Developing World
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A number of recent efforts aim to bridge the global digital divide, particularly with respect to Internet access. We take this endeavor one step further and argue that Internet access and web security go hand in glove in the developing world. To remedy the situation, we explore whether low-cost platforms, such as Raspberry Pi (\$35) and Cubieboard (\$59), can be used to implement security mechanisms. Using a firewall as a motivating security application we benchmark its performance on these platforms to test our thesis. Our results show that these platforms can indeed serve as enablers of security functions for small sized deployments in the developing world, while only consuming less than $2.5 worth of electricity per device per annum. In addition, we argue that the use of these platforms also addresses maintenance challenges such as update roll-out and distribution. Furthermore, a number of additional network functions, such as caching and WAN acceleration can also be implemented atop this simple infrastructure. Finally, we posit that this deployment can be used for in-network monitoring to facilitate ICT4D research.
[ { "version": "v1", "created": "Sun, 11 May 2014 10:38:06 GMT" } ]
2014-05-13T00:00:00
[ [ "Nabi", "Zubair", "" ] ]
TITLE: A $35 Firewall for the Developing World ABSTRACT: A number of recent efforts aim to bridge the global digital divide, particularly with respect to Internet access. We take this endeavor one step further and argue that Internet access and web security go hand in glove in the developing world. To remedy the situation, we explore whether low-cost platforms, such as Raspberry Pi (\$35) and Cubieboard (\$59), can be used to implement security mechanisms. Using a firewall as a motivating security application we benchmark its performance on these platforms to test our thesis. Our results show that these platforms can indeed serve as enablers of security functions for small sized deployments in the developing world, while only consuming less than $2.5 worth of electricity per device per annum. In addition, we argue that the use of these platforms also addresses maintenance challenges such as update roll-out and distribution. Furthermore, a number of additional network functions, such as caching and WAN acceleration can also be implemented atop this simple infrastructure. Finally, we posit that this deployment can be used for in-network monitoring to facilitate ICT4D research.
1405.2538
Neng-Fa Zhou
Neng-Fa Zhou
Combinatorial Search With Picat
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Picat, a new member of the logic programming family, follows a different doctrine than Prolog in offering the core logic programming concepts: arrays and maps as built-in data types; implicit pattern matching with explicit unification and explicit non-determinism; functions for deterministic computations; and loops for convenient scripting and modeling purposes. Picat provides facilities for solving combinatorial search problems, including a common interface with CP, SAT, and MIP solvers, tabling for dynamic programming, and a module for planning. Picat's planner module, which is implemented by the use of tabling, has produced surprising and encouraging results. Thanks to term-sharing and resource-bounded tabled search, Picat overwhelmingly outperforms the cutting-edge ASP and PDDL planners on the planning benchmarks used in recent ASP competitions.
[ { "version": "v1", "created": "Sun, 11 May 2014 14:45:07 GMT" } ]
2014-05-13T00:00:00
[ [ "Zhou", "Neng-Fa", "" ] ]
TITLE: Combinatorial Search With Picat ABSTRACT: Picat, a new member of the logic programming family, follows a different doctrine than Prolog in offering the core logic programming concepts: arrays and maps as built-in data types; implicit pattern matching with explicit unification and explicit non-determinism; functions for deterministic computations; and loops for convenient scripting and modeling purposes. Picat provides facilities for solving combinatorial search problems, including a common interface with CP, SAT, and MIP solvers, tabling for dynamic programming, and a module for planning. Picat's planner module, which is implemented by the use of tabling, has produced surprising and encouraging results. Thanks to term-sharing and resource-bounded tabled search, Picat overwhelmingly outperforms the cutting-edge ASP and PDDL planners on the planning benchmarks used in recent ASP competitions.
1405.2220
Li-Xin Wang
Li-Xin Wang
Gaussian-Chain Filters for Heavy-Tailed Noise with Application to Detecting Big Buyers and Big Sellers in Stock Market
null
null
null
null
q-fin.TR cs.CE cs.CV cs.SY q-fin.ST
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new heavy-tailed distribution --- Gaussian-Chain (GC) distribution, which is inspirited by the hierarchical structures prevailing in social organizations. We determine the mean, variance and kurtosis of the Gaussian-Chain distribution to show its heavy-tailed property, and compute the tail distribution table to give specific numbers showing how heavy is the heavy-tails. To filter out the heavy-tailed noise, we construct two filters --- 2nd and 3rd-order GC filters --- based on the maximum likelihood principle. Simulation results show that the GC filters perform much better than the benchmark least-squares algorithm when the noise is heavy-tail distributed. Using the GC filters, we propose a trading strategy, named Ride-the-Mood, to follow the mood of the market by detecting the actions of the big buyers and the big sellers in the market based on the noisy, heavy-tailed price data. Application of the Ride-the-Mood strategy to five blue-chip Hong Kong stocks over the recent two-year period from April 2, 2012 to March 31, 2014 shows that their returns are higher than the returns of the benchmark Buy-and-Hold strategy and the Hang Seng Index Fund.
[ { "version": "v1", "created": "Fri, 9 May 2014 13:06:27 GMT" } ]
2014-05-12T00:00:00
[ [ "Wang", "Li-Xin", "" ] ]
TITLE: Gaussian-Chain Filters for Heavy-Tailed Noise with Application to Detecting Big Buyers and Big Sellers in Stock Market ABSTRACT: We propose a new heavy-tailed distribution --- Gaussian-Chain (GC) distribution, which is inspirited by the hierarchical structures prevailing in social organizations. We determine the mean, variance and kurtosis of the Gaussian-Chain distribution to show its heavy-tailed property, and compute the tail distribution table to give specific numbers showing how heavy is the heavy-tails. To filter out the heavy-tailed noise, we construct two filters --- 2nd and 3rd-order GC filters --- based on the maximum likelihood principle. Simulation results show that the GC filters perform much better than the benchmark least-squares algorithm when the noise is heavy-tail distributed. Using the GC filters, we propose a trading strategy, named Ride-the-Mood, to follow the mood of the market by detecting the actions of the big buyers and the big sellers in the market based on the noisy, heavy-tailed price data. Application of the Ride-the-Mood strategy to five blue-chip Hong Kong stocks over the recent two-year period from April 2, 2012 to March 31, 2014 shows that their returns are higher than the returns of the benchmark Buy-and-Hold strategy and the Hang Seng Index Fund.
1307.6373
Ralph Tanbourgi
Ralph Tanbourgi, Harpreet S. Dhillon, Jeffrey G. Andrews, Friedrich K. Jondral
Effect of Spatial Interference Correlation on the Performance of Maximum Ratio Combining
to appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2014.041714.131330
null
cs.IT cs.NI cs.PF math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While the performance of maximum ratio combining (MRC) is well understood for a single isolated link, the same is not true in the presence of interference, which is typically correlated across antennas due to the common locations of interferers. For tractability, prior work focuses on the two extreme cases where the interference power across antennas is either assumed to be fully correlated or fully uncorrelated. In this paper, we address this shortcoming and characterize the performance of MRC in the presence of spatially-correlated interference across antennas. Modeling the interference field as a Poisson point process, we derive the exact distribution of the signal-to-interference ratio (SIR) for the case of two receive antennas, and upper and lower bounds for the general case. Using these results, we study the diversity behavior of MRC and characterize the critical density of simultaneous transmissions for a given outage constraint. The exact SIR distribution is also useful in benchmarking simpler correlation models. We show that the full-correlation assumption is considerably pessimistic (up to 30% higher outage probability for typical values) and the no-correlation assumption is significantly optimistic compared to the true performance.
[ { "version": "v1", "created": "Wed, 24 Jul 2013 10:39:58 GMT" }, { "version": "v2", "created": "Tue, 25 Mar 2014 09:42:39 GMT" } ]
2014-05-09T00:00:00
[ [ "Tanbourgi", "Ralph", "" ], [ "Dhillon", "Harpreet S.", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Jondral", "Friedrich K.", "" ] ]
TITLE: Effect of Spatial Interference Correlation on the Performance of Maximum Ratio Combining ABSTRACT: While the performance of maximum ratio combining (MRC) is well understood for a single isolated link, the same is not true in the presence of interference, which is typically correlated across antennas due to the common locations of interferers. For tractability, prior work focuses on the two extreme cases where the interference power across antennas is either assumed to be fully correlated or fully uncorrelated. In this paper, we address this shortcoming and characterize the performance of MRC in the presence of spatially-correlated interference across antennas. Modeling the interference field as a Poisson point process, we derive the exact distribution of the signal-to-interference ratio (SIR) for the case of two receive antennas, and upper and lower bounds for the general case. Using these results, we study the diversity behavior of MRC and characterize the critical density of simultaneous transmissions for a given outage constraint. The exact SIR distribution is also useful in benchmarking simpler correlation models. We show that the full-correlation assumption is considerably pessimistic (up to 30% higher outage probability for typical values) and the no-correlation assumption is significantly optimistic compared to the true performance.
1402.0728
Dominik Kowald
Dominik Kowald, Paul Seitlinger, Christoph Trattner, Tobias Ley
Forgetting the Words but Remembering the Meaning: Modeling Forgetting in a Verbal and Semantic Tag Recommender
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We assume that recommender systems are more successful, when they are based on a thorough understanding of how people process information. In the current paper we test this assumption in the context of social tagging systems. Cognitive research on how people assign tags has shown that they draw on two interconnected levels of knowledge in their memory: on a conceptual level of semantic fields or topics, and on a lexical level that turns patterns on the semantic level into words. Another strand of tagging research reveals a strong impact of time dependent forgetting on users' tag choices, such that recently used tags have a higher probability being reused than "older" tags. In this paper, we align both strands by implementing a computational theory of human memory that integrates the two-level conception and the process of forgetting in form of a tag recommender and test it in three large-scale social tagging datasets (drawn from BibSonomy, CiteULike and Flickr). As expected, our results reveal a selective effect of time: forgetting is much more pronounced on the lexical level of tags. Second, an extensive evaluation based on this observation shows that a tag recommender interconnecting both levels and integrating time dependent forgetting on the lexical level results in high accuracy predictions and outperforms other well-established algorithms, such as Collaborative Filtering, Pairwise Interaction Tensor Factorization, FolkRank and two alternative time dependent approaches. We conclude that tag recommenders can benefit from going beyond the manifest level of word co-occurrences, and from including forgetting processes on the lexical level.
[ { "version": "v1", "created": "Tue, 4 Feb 2014 13:31:10 GMT" }, { "version": "v2", "created": "Thu, 8 May 2014 08:37:04 GMT" } ]
2014-05-09T00:00:00
[ [ "Kowald", "Dominik", "" ], [ "Seitlinger", "Paul", "" ], [ "Trattner", "Christoph", "" ], [ "Ley", "Tobias", "" ] ]
TITLE: Forgetting the Words but Remembering the Meaning: Modeling Forgetting in a Verbal and Semantic Tag Recommender ABSTRACT: We assume that recommender systems are more successful, when they are based on a thorough understanding of how people process information. In the current paper we test this assumption in the context of social tagging systems. Cognitive research on how people assign tags has shown that they draw on two interconnected levels of knowledge in their memory: on a conceptual level of semantic fields or topics, and on a lexical level that turns patterns on the semantic level into words. Another strand of tagging research reveals a strong impact of time dependent forgetting on users' tag choices, such that recently used tags have a higher probability being reused than "older" tags. In this paper, we align both strands by implementing a computational theory of human memory that integrates the two-level conception and the process of forgetting in form of a tag recommender and test it in three large-scale social tagging datasets (drawn from BibSonomy, CiteULike and Flickr). As expected, our results reveal a selective effect of time: forgetting is much more pronounced on the lexical level of tags. Second, an extensive evaluation based on this observation shows that a tag recommender interconnecting both levels and integrating time dependent forgetting on the lexical level results in high accuracy predictions and outperforms other well-established algorithms, such as Collaborative Filtering, Pairwise Interaction Tensor Factorization, FolkRank and two alternative time dependent approaches. We conclude that tag recommenders can benefit from going beyond the manifest level of word co-occurrences, and from including forgetting processes on the lexical level.
1405.1511
Neha Gupta
Neha Gupta, Ponnurangam Kumaraguru
Exploration of gaps in Bitly's spam detection and relevant counter measures
null
null
null
null
cs.SI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening gained a lot of traction. URL shorteners take as input a long URL and give a short URL with the same landing page in return. With its immense popularity over time, it has become a prime target for the attackers giving them an advantage to conceal malicious content. Bitly, a leading service in this domain is being exploited heavily to carry out phishing attacks, work from home scams, pornographic content propagation, etc. This imposes additional performance pressure on Bitly and other URL shorteners to be able to detect and take a timely action against the illegitimate content. In this study, we analyzed a dataset marked as suspicious by Bitly in the month of October 2013 to highlight some ground issues in their spam detection mechanism. In addition, we identified some short URL based features and coupled them with two domain specific features to classify a Bitly URL as malicious / benign and achieved a maximum accuracy of 86.41%. To the best of our knowledge, this is the first large scale study to highlight the issues with Bitly's spam detection policies and proposing a suitable countermeasure.
[ { "version": "v1", "created": "Wed, 7 May 2014 06:02:40 GMT" } ]
2014-05-08T00:00:00
[ [ "Gupta", "Neha", "" ], [ "Kumaraguru", "Ponnurangam", "" ] ]
TITLE: Exploration of gaps in Bitly's spam detection and relevant counter measures ABSTRACT: Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening gained a lot of traction. URL shorteners take as input a long URL and give a short URL with the same landing page in return. With its immense popularity over time, it has become a prime target for the attackers giving them an advantage to conceal malicious content. Bitly, a leading service in this domain is being exploited heavily to carry out phishing attacks, work from home scams, pornographic content propagation, etc. This imposes additional performance pressure on Bitly and other URL shorteners to be able to detect and take a timely action against the illegitimate content. In this study, we analyzed a dataset marked as suspicious by Bitly in the month of October 2013 to highlight some ground issues in their spam detection mechanism. In addition, we identified some short URL based features and coupled them with two domain specific features to classify a Bitly URL as malicious / benign and achieved a maximum accuracy of 86.41%. To the best of our knowledge, this is the first large scale study to highlight the issues with Bitly's spam detection policies and proposing a suitable countermeasure.
1405.1705
Raman Grover
Raman Grover, Michael J. Carey
Scalable Fault-Tolerant Data Feeds in AsterixDB
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe the support for data feed ingestion in AsterixDB, an open-source Big Data Management System (BDMS) that provides a platform for storage and analysis of large volumes of semi-structured data. Data feeds are a mechanism for having continuous data arrive into a BDMS from external sources and incrementally populate a persisted dataset and associated indexes. The need to persist and index "fast-flowing" high-velocity data (and support ad hoc analytical queries) is ubiquitous. However, the state of the art today involves 'gluing' together different systems. AsterixDB is different in being a unified system with "native support" for data feed ingestion. We discuss the challenges and present the design and implementation of the concepts involved in modeling and managing data feeds in AsterixDB. AsterixDB allows the runtime behavior, allocation of resources and the offered degree of robustness to be customized to suit the high-level application(s) that wish to consume the ingested data. Initial experiments that evaluate scalability and fault-tolerance of AsterixDB data feeds facility are reported.
[ { "version": "v1", "created": "Wed, 7 May 2014 19:14:42 GMT" } ]
2014-05-08T00:00:00
[ [ "Grover", "Raman", "" ], [ "Carey", "Michael J.", "" ] ]
TITLE: Scalable Fault-Tolerant Data Feeds in AsterixDB ABSTRACT: In this paper we describe the support for data feed ingestion in AsterixDB, an open-source Big Data Management System (BDMS) that provides a platform for storage and analysis of large volumes of semi-structured data. Data feeds are a mechanism for having continuous data arrive into a BDMS from external sources and incrementally populate a persisted dataset and associated indexes. The need to persist and index "fast-flowing" high-velocity data (and support ad hoc analytical queries) is ubiquitous. However, the state of the art today involves 'gluing' together different systems. AsterixDB is different in being a unified system with "native support" for data feed ingestion. We discuss the challenges and present the design and implementation of the concepts involved in modeling and managing data feeds in AsterixDB. AsterixDB allows the runtime behavior, allocation of resources and the offered degree of robustness to be customized to suit the high-level application(s) that wish to consume the ingested data. Initial experiments that evaluate scalability and fault-tolerance of AsterixDB data feeds facility are reported.
1311.5591
Ning Zhang
Ning Zhang, Manohar Paluri, Marc'Aurelio Ranzato, Trevor Darrell, Lubomir Bourdev
PANDA: Pose Aligned Networks for Deep Attribute Modeling
8 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for inferring human attributes (such as gender, hair style, clothes style, expression, action) from images of people under large variation of viewpoint, pose, appearance, articulation and occlusion. Convolutional Neural Nets (CNN) have been shown to perform very well on large scale object recognition problems. In the context of attribute classification, however, the signal is often subtle and it may cover only a small part of the image, while the image is dominated by the effects of pose and viewpoint. Discounting for pose variation would require training on very large labeled datasets which are not presently available. Part-based models, such as poselets and DPM have been shown to perform well for this problem but they are limited by shallow low-level features. We propose a new method which combines part-based models and deep learning by training pose-normalized CNNs. We show substantial improvement vs. state-of-the-art methods on challenging attribute classification tasks in unconstrained settings. Experiments confirm that our method outperforms both the best part-based methods on this problem and conventional CNNs trained on the full bounding box of the person.
[ { "version": "v1", "created": "Thu, 21 Nov 2013 21:43:12 GMT" }, { "version": "v2", "created": "Mon, 5 May 2014 21:32:36 GMT" } ]
2014-05-07T00:00:00
[ [ "Zhang", "Ning", "" ], [ "Paluri", "Manohar", "" ], [ "Ranzato", "Marc'Aurelio", "" ], [ "Darrell", "Trevor", "" ], [ "Bourdev", "Lubomir", "" ] ]
TITLE: PANDA: Pose Aligned Networks for Deep Attribute Modeling ABSTRACT: We propose a method for inferring human attributes (such as gender, hair style, clothes style, expression, action) from images of people under large variation of viewpoint, pose, appearance, articulation and occlusion. Convolutional Neural Nets (CNN) have been shown to perform very well on large scale object recognition problems. In the context of attribute classification, however, the signal is often subtle and it may cover only a small part of the image, while the image is dominated by the effects of pose and viewpoint. Discounting for pose variation would require training on very large labeled datasets which are not presently available. Part-based models, such as poselets and DPM have been shown to perform well for this problem but they are limited by shallow low-level features. We propose a new method which combines part-based models and deep learning by training pose-normalized CNNs. We show substantial improvement vs. state-of-the-art methods on challenging attribute classification tasks in unconstrained settings. Experiments confirm that our method outperforms both the best part-based methods on this problem and conventional CNNs trained on the full bounding box of the person.
1405.1183
Daniel Le Berre
Daniel Le Berre
Some thoughts about benchmarks for NMR
Proceedings of the 15th International Workshop on Non-Monotonic Reasoning (NMR 2014)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The NMR community would like to build a repository of benchmarks to push forward the design of systems implementing NMR as it has been the case for many other areas in AI. There are a number of lessons which can be learned from the experience of other communi- ties. Here are a few thoughts about the requirements and choices to make before building such a repository.
[ { "version": "v1", "created": "Tue, 6 May 2014 08:09:13 GMT" } ]
2014-05-07T00:00:00
[ [ "Berre", "Daniel Le", "" ] ]
TITLE: Some thoughts about benchmarks for NMR ABSTRACT: The NMR community would like to build a repository of benchmarks to push forward the design of systems implementing NMR as it has been the case for many other areas in AI. There are a number of lessons which can be learned from the experience of other communi- ties. Here are a few thoughts about the requirements and choices to make before building such a repository.
1405.1234
Abhishek Awasthi M.Sc.
Abhishek Awasthi, J\"org L\"assig and Oliver Kramer
A Novel Approach to the Common Due-Date Problem on Single and Parallel Machines
Book Chapter 22 pages
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel idea for the general case of the Common Due-Date (CDD) scheduling problem. The problem is about scheduling a certain number of jobs on a single or parallel machines where all the jobs possess different processing times but a common due-date. The objective of the problem is to minimize the total penalty incurred due to earliness or tardiness of the job completions. This work presents exact polynomial algorithms for optimizing a given job sequence for single and identical parallel machines with the run-time complexities of $O(n \log n)$ for both cases, where $n$ is the number of jobs. Besides, we show that our approach for the parallel machine case is also suitable for non-identical parallel machines. We prove the optimality for the single machine case and the runtime complexities of both. Henceforth, we extend our approach to one particular dynamic case of the CDD and conclude the chapter with our results for the benchmark instances provided in the OR-library.
[ { "version": "v1", "created": "Tue, 6 May 2014 11:40:02 GMT" } ]
2014-05-07T00:00:00
[ [ "Awasthi", "Abhishek", "" ], [ "Lässig", "Jörg", "" ], [ "Kramer", "Oliver", "" ] ]
TITLE: A Novel Approach to the Common Due-Date Problem on Single and Parallel Machines ABSTRACT: This paper presents a novel idea for the general case of the Common Due-Date (CDD) scheduling problem. The problem is about scheduling a certain number of jobs on a single or parallel machines where all the jobs possess different processing times but a common due-date. The objective of the problem is to minimize the total penalty incurred due to earliness or tardiness of the job completions. This work presents exact polynomial algorithms for optimizing a given job sequence for single and identical parallel machines with the run-time complexities of $O(n \log n)$ for both cases, where $n$ is the number of jobs. Besides, we show that our approach for the parallel machine case is also suitable for non-identical parallel machines. We prove the optimality for the single machine case and the runtime complexities of both. Henceforth, we extend our approach to one particular dynamic case of the CDD and conclude the chapter with our results for the benchmark instances provided in the OR-library.
1405.1392
Shamanth Kumar
Shamanth Kumar, Huan Liu, Sameep Mehta, and L. Venkata Subramaniam
From Tweets to Events: Exploring a Scalable Solution for Twitter Streams
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The unprecedented use of social media through smartphones and other web-enabled mobile devices has enabled the rapid adoption of platforms like Twitter. Event detection has found many applications on the web, including breaking news identification and summarization. The recent increase in the usage of Twitter during crises has attracted researchers to focus on detecting events in tweets. However, current solutions have focused on static Twitter data. The necessity to detect events in a streaming environment during fast paced events such as a crisis presents new opportunities and challenges. In this paper, we investigate event detection in the context of real-time Twitter streams as observed in real-world crises. We highlight the key challenges in this problem: the informal nature of text, and the high volume and high velocity characteristics of Twitter streams. We present a novel approach to address these challenges using single-pass clustering and the compression distance to efficiently detect events in Twitter streams. Through experiments on large Twitter datasets, we demonstrate that the proposed framework is able to detect events in near real-time and can scale to large and noisy Twitter streams.
[ { "version": "v1", "created": "Tue, 6 May 2014 18:35:18 GMT" } ]
2014-05-07T00:00:00
[ [ "Kumar", "Shamanth", "" ], [ "Liu", "Huan", "" ], [ "Mehta", "Sameep", "" ], [ "Subramaniam", "L. Venkata", "" ] ]
TITLE: From Tweets to Events: Exploring a Scalable Solution for Twitter Streams ABSTRACT: The unprecedented use of social media through smartphones and other web-enabled mobile devices has enabled the rapid adoption of platforms like Twitter. Event detection has found many applications on the web, including breaking news identification and summarization. The recent increase in the usage of Twitter during crises has attracted researchers to focus on detecting events in tweets. However, current solutions have focused on static Twitter data. The necessity to detect events in a streaming environment during fast paced events such as a crisis presents new opportunities and challenges. In this paper, we investigate event detection in the context of real-time Twitter streams as observed in real-world crises. We highlight the key challenges in this problem: the informal nature of text, and the high volume and high velocity characteristics of Twitter streams. We present a novel approach to address these challenges using single-pass clustering and the compression distance to efficiently detect events in Twitter streams. Through experiments on large Twitter datasets, we demonstrate that the proposed framework is able to detect events in near real-time and can scale to large and noisy Twitter streams.
1405.1403
Hyunsuk Ko
Rui Song, Hyunsuk Ko and C.C. Jay Kuo
MCL-3D: a database for stereoscopic image quality assessment using 2D-image-plus-depth source
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new stereoscopic image quality assessment database rendered using the 2D-image-plus-depth source, called MCL-3D, is described and the performance benchmarking of several known 2D and 3D image quality metrics using the MCL-3D database is presented in this work. Nine image-plus-depth sources are first selected, and a depth image-based rendering (DIBR) technique is used to render stereoscopic image pairs. Distortions applied to either the texture image or the depth image before stereoscopic image rendering include: Gaussian blur, additive white noise, down-sampling blur, JPEG and JPEG-2000 (JP2K) compression and transmission error. Furthermore, the distortion caused by imperfect rendering is also examined. The MCL-3D database contains 693 stereoscopic image pairs, where one third of them are of resolution 1024x728 and two thirds are of resolution 1920x1080. The pair-wise comparison was adopted in the subjective test for user friendliness, and the Mean Opinion Score (MOS) can be computed accordingly. Finally, we evaluate the performance of several 2D and 3D image quality metrics applied to MCL-3D. All texture images, depth images, rendered image pairs in MCL-3D and their MOS values obtained in the subjective test are available to the public (http://mcl.usc.edu/mcl-3d-database/) for future research and development.
[ { "version": "v1", "created": "Sun, 23 Mar 2014 23:31:49 GMT" } ]
2014-05-07T00:00:00
[ [ "Song", "Rui", "" ], [ "Ko", "Hyunsuk", "" ], [ "Kuo", "C. C. Jay", "" ] ]
TITLE: MCL-3D: a database for stereoscopic image quality assessment using 2D-image-plus-depth source ABSTRACT: A new stereoscopic image quality assessment database rendered using the 2D-image-plus-depth source, called MCL-3D, is described and the performance benchmarking of several known 2D and 3D image quality metrics using the MCL-3D database is presented in this work. Nine image-plus-depth sources are first selected, and a depth image-based rendering (DIBR) technique is used to render stereoscopic image pairs. Distortions applied to either the texture image or the depth image before stereoscopic image rendering include: Gaussian blur, additive white noise, down-sampling blur, JPEG and JPEG-2000 (JP2K) compression and transmission error. Furthermore, the distortion caused by imperfect rendering is also examined. The MCL-3D database contains 693 stereoscopic image pairs, where one third of them are of resolution 1024x728 and two thirds are of resolution 1920x1080. The pair-wise comparison was adopted in the subjective test for user friendliness, and the Mean Opinion Score (MOS) can be computed accordingly. Finally, we evaluate the performance of several 2D and 3D image quality metrics applied to MCL-3D. All texture images, depth images, rendered image pairs in MCL-3D and their MOS values obtained in the subjective test are available to the public (http://mcl.usc.edu/mcl-3d-database/) for future research and development.
1405.1406
Sallam Abualhaija
Sallam Abualhaija, Karl-Heinz Zimmermann
D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving Word Sense Disambiguation
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Word sense disambiguation (WSD) is a problem in the field of computational linguistics given as finding the intended sense of a word (or a set of words) when it is activated within a certain context. WSD was recently addressed as a combinatorial optimization problem in which the goal is to find a sequence of senses that maximize the semantic relatedness among the target words. In this article, a novel algorithm for solving the WSD problem called D-Bees is proposed which is inspired by bee colony optimization (BCO)where artificial bee agents collaborate to solve the problem. The D-Bees algorithm is evaluated on a standard dataset (SemEval 2007 coarse-grained English all-words task corpus)and is compared to simulated annealing, genetic algorithms, and two ant colony optimization techniques (ACO). It will be observed that the BCO and ACO approaches are on par.
[ { "version": "v1", "created": "Tue, 6 May 2014 19:26:35 GMT" } ]
2014-05-07T00:00:00
[ [ "Abualhaija", "Sallam", "" ], [ "Zimmermann", "Karl-Heinz", "" ] ]
TITLE: D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving Word Sense Disambiguation ABSTRACT: Word sense disambiguation (WSD) is a problem in the field of computational linguistics given as finding the intended sense of a word (or a set of words) when it is activated within a certain context. WSD was recently addressed as a combinatorial optimization problem in which the goal is to find a sequence of senses that maximize the semantic relatedness among the target words. In this article, a novel algorithm for solving the WSD problem called D-Bees is proposed which is inspired by bee colony optimization (BCO)where artificial bee agents collaborate to solve the problem. The D-Bees algorithm is evaluated on a standard dataset (SemEval 2007 coarse-grained English all-words task corpus)and is compared to simulated annealing, genetic algorithms, and two ant colony optimization techniques (ACO). It will be observed that the BCO and ACO approaches are on par.
1402.0108
Eric Strobl
Eric V. Strobl, Shyam Visweswaran
Markov Blanket Ranking using Kernel-based Conditional Dependence Measures
10 pages, 4 figures, 2 algorithms, NIPS 2013 Workshop on Causality, code: github.com/ericstrobl/
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Developing feature selection algorithms that move beyond a pure correlational to a more causal analysis of observational data is an important problem in the sciences. Several algorithms attempt to do so by discovering the Markov blanket of a target, but they all contain a forward selection step which variables must pass in order to be included in the conditioning set. As a result, these algorithms may not consider all possible conditional multivariate combinations. We improve on this limitation by proposing a backward elimination method that uses a kernel-based conditional dependence measure to identify the Markov blanket in a fully multivariate fashion. The algorithm is easy to implement and compares favorably to other methods on synthetic and real datasets.
[ { "version": "v1", "created": "Sat, 1 Feb 2014 17:51:54 GMT" }, { "version": "v2", "created": "Tue, 4 Feb 2014 22:16:00 GMT" }, { "version": "v3", "created": "Sat, 3 May 2014 01:07:49 GMT" } ]
2014-05-06T00:00:00
[ [ "Strobl", "Eric V.", "" ], [ "Visweswaran", "Shyam", "" ] ]
TITLE: Markov Blanket Ranking using Kernel-based Conditional Dependence Measures ABSTRACT: Developing feature selection algorithms that move beyond a pure correlational to a more causal analysis of observational data is an important problem in the sciences. Several algorithms attempt to do so by discovering the Markov blanket of a target, but they all contain a forward selection step which variables must pass in order to be included in the conditioning set. As a result, these algorithms may not consider all possible conditional multivariate combinations. We improve on this limitation by proposing a backward elimination method that uses a kernel-based conditional dependence measure to identify the Markov blanket in a fully multivariate fashion. The algorithm is easy to implement and compares favorably to other methods on synthetic and real datasets.
1404.7287
Sameer Qazi
Sameer Qazi and Tim Moors
Disjoint-Path Selection in Internet: What traceroutes tell us?
9 pages, 9 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Routing policies used in the Internet can be restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid route flapping, recovery mechanisms may be dampened, making adaptation slow. Unstructured overlays have been proposed to mitigate the issues of path and performance failures in the Internet by routing through an indirect-path via overlay peer(s). Choosing alternate-paths in overlay networks is a challenging issue. Ensuring both availability and performance guarantees on alternate paths requires aggressive monitoring of all overlay paths using active probing; this limits scalability. An alternate technique to select an overlay-path is to bias its selection based on physical disjointness criteria to bypass the failure on the primary-path. Recently, several techniques have emerged which can optimize the selection of a disjoint-path without incurring the high costs associated with probing paths. In this paper, we show that using only commodity approaches, i.e. running infrequent traceroutes between overlay hosts, a lot of information can be revealed about the underlying physical path diversity in the overlay network which can be used to make informed-guesses for alternate-path selection. We test our approach using datasets between real-world hosts in AMP and RIPE networks.
[ { "version": "v1", "created": "Tue, 29 Apr 2014 09:28:41 GMT" }, { "version": "v2", "created": "Mon, 5 May 2014 05:27:39 GMT" } ]
2014-05-06T00:00:00
[ [ "Qazi", "Sameer", "" ], [ "Moors", "Tim", "" ] ]
TITLE: Disjoint-Path Selection in Internet: What traceroutes tell us? ABSTRACT: Routing policies used in the Internet can be restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid route flapping, recovery mechanisms may be dampened, making adaptation slow. Unstructured overlays have been proposed to mitigate the issues of path and performance failures in the Internet by routing through an indirect-path via overlay peer(s). Choosing alternate-paths in overlay networks is a challenging issue. Ensuring both availability and performance guarantees on alternate paths requires aggressive monitoring of all overlay paths using active probing; this limits scalability. An alternate technique to select an overlay-path is to bias its selection based on physical disjointness criteria to bypass the failure on the primary-path. Recently, several techniques have emerged which can optimize the selection of a disjoint-path without incurring the high costs associated with probing paths. In this paper, we show that using only commodity approaches, i.e. running infrequent traceroutes between overlay hosts, a lot of information can be revealed about the underlying physical path diversity in the overlay network which can be used to make informed-guesses for alternate-path selection. We test our approach using datasets between real-world hosts in AMP and RIPE networks.
1405.0641
Xiaojun Wan
Xiaojun Wan
x-index: a fantastic new indicator for quantifying a scientist's scientific impact
null
null
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
h-index has become the most popular indicator for quantifying a scientist's scientific impact in various scientific fields. h-index is defined as the largest number of papers with citation number larger than or equal to h and it treats each citation equally. However, different citations usually come from different papers with different influence and quality, and a citation from a highly influential paper is a greater recognition of the target paper than a citation from an ordinary paper. Based on this assumption, we proposed a new indicator named x-index to quantify a scientist's scientific impact by considering only the citations coming from influential papers. x-index is defined as the largest number of papers with influential citation number larger than or equal to x, where each influential citation comes from a paper for which the average ACNPP (Average Citation Number Per Paper) of its authors larger than or equal to x . Through analysis on the APS dataset, we find that the proposed x-index has much better ability to discriminate between Physics Prize Winners and ordinary physicists.
[ { "version": "v1", "created": "Sun, 4 May 2014 02:26:52 GMT" } ]
2014-05-06T00:00:00
[ [ "Wan", "Xiaojun", "" ] ]
TITLE: x-index: a fantastic new indicator for quantifying a scientist's scientific impact ABSTRACT: h-index has become the most popular indicator for quantifying a scientist's scientific impact in various scientific fields. h-index is defined as the largest number of papers with citation number larger than or equal to h and it treats each citation equally. However, different citations usually come from different papers with different influence and quality, and a citation from a highly influential paper is a greater recognition of the target paper than a citation from an ordinary paper. Based on this assumption, we proposed a new indicator named x-index to quantify a scientist's scientific impact by considering only the citations coming from influential papers. x-index is defined as the largest number of papers with influential citation number larger than or equal to x, where each influential citation comes from a paper for which the average ACNPP (Average Citation Number Per Paper) of its authors larger than or equal to x . Through analysis on the APS dataset, we find that the proposed x-index has much better ability to discriminate between Physics Prize Winners and ordinary physicists.
1405.0700
Abdou M. Abdel-Rehim
A. Abdel-Rehim, C. Alexandrou, N. Anastopoulos, G. Koutsou, I. Liabotis and N. Papadopoulou
PLQCD library for Lattice QCD on multi-core machines
7 pages, presented at the 31st International Symposium on Lattice Field Theory (Lattice 2013), 29 July - 3 August 2013, Mainz, Germany
null
null
null
hep-lat cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
PLQCD is a stand-alone software library developed under PRACE for lattice QCD. It provides an implementation of the Dirac operator for Wilson type fermions and few efficient linear solvers. The library is optimized for multi-core machines using a hybrid parallelization with OpenMP+MPI. The main objectives of the library is to provide a scalable implementation of the Dirac operator for efficient computation of the quark propagator. In this contribution, a description of the PLQCD library is given together with some benchmark results.
[ { "version": "v1", "created": "Sun, 4 May 2014 14:12:53 GMT" } ]
2014-05-06T00:00:00
[ [ "Abdel-Rehim", "A.", "" ], [ "Alexandrou", "C.", "" ], [ "Anastopoulos", "N.", "" ], [ "Koutsou", "G.", "" ], [ "Liabotis", "I.", "" ], [ "Papadopoulou", "N.", "" ] ]
TITLE: PLQCD library for Lattice QCD on multi-core machines ABSTRACT: PLQCD is a stand-alone software library developed under PRACE for lattice QCD. It provides an implementation of the Dirac operator for Wilson type fermions and few efficient linear solvers. The library is optimized for multi-core machines using a hybrid parallelization with OpenMP+MPI. The main objectives of the library is to provide a scalable implementation of the Dirac operator for efficient computation of the quark propagator. In this contribution, a description of the PLQCD library is given together with some benchmark results.
1405.0868
Zhana Bao
Zhana Bao
Finding Inner Outliers in High Dimensional Space
9 pages, 9 Figures, 3 tables
null
null
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
Outlier detection in a large-scale database is a significant and complex issue in knowledge discovering field. As the data distributions are obscure and uncertain in high dimensional space, most existing solutions try to solve the issue taking into account the two intuitive points: first, outliers are extremely far away from other points in high dimensional space; second, outliers are detected obviously different in projected-dimensional subspaces. However, for a complicated case that outliers are hidden inside the normal points in all dimensions, existing detection methods fail to find such inner outliers. In this paper, we propose a method with twice dimension-projections, which integrates primary subspace outlier detection and secondary point-projection between subspaces, and sums up the multiple weight values for each point. The points are computed with local density ratio separately in twice-projected dimensions. After the process, outliers are those points scoring the largest values of weight. The proposed method succeeds to find all inner outliers on the synthetic test datasets with the dimension varying from 100 to 10000. The experimental results also show that the proposed algorithm can work in low dimensional space and can achieve perfect performance in high dimensional space. As for this reason, our proposed approach has considerable potential to apply it in multimedia applications helping to process images or video with large-scale attributes.
[ { "version": "v1", "created": "Mon, 5 May 2014 12:01:14 GMT" } ]
2014-05-06T00:00:00
[ [ "Bao", "Zhana", "" ] ]
TITLE: Finding Inner Outliers in High Dimensional Space ABSTRACT: Outlier detection in a large-scale database is a significant and complex issue in knowledge discovering field. As the data distributions are obscure and uncertain in high dimensional space, most existing solutions try to solve the issue taking into account the two intuitive points: first, outliers are extremely far away from other points in high dimensional space; second, outliers are detected obviously different in projected-dimensional subspaces. However, for a complicated case that outliers are hidden inside the normal points in all dimensions, existing detection methods fail to find such inner outliers. In this paper, we propose a method with twice dimension-projections, which integrates primary subspace outlier detection and secondary point-projection between subspaces, and sums up the multiple weight values for each point. The points are computed with local density ratio separately in twice-projected dimensions. After the process, outliers are those points scoring the largest values of weight. The proposed method succeeds to find all inner outliers on the synthetic test datasets with the dimension varying from 100 to 10000. The experimental results also show that the proposed algorithm can work in low dimensional space and can achieve perfect performance in high dimensional space. As for this reason, our proposed approach has considerable potential to apply it in multimedia applications helping to process images or video with large-scale attributes.
1405.0869
Zhana Bao
Zhana Bao
Robust Subspace Outlier Detection in High Dimensional Space
10 pages, 6 figures, 4 tables
null
null
null
cs.AI cs.LG stat.ML
http://creativecommons.org/licenses/by-nc-sa/3.0/
Rare data in a large-scale database are called outliers that reveal significant information in the real world. The subspace-based outlier detection is regarded as a feasible approach in very high dimensional space. However, the outliers found in subspaces are only part of the true outliers in high dimensional space, indeed. The outliers hidden in normal-clustered points are sometimes neglected in the projected dimensional subspace. In this paper, we propose a robust subspace method for detecting such inner outliers in a given dataset, which uses two dimensional-projections: detecting outliers in subspaces with local density ratio in the first projected dimensions; finding outliers by comparing neighbor's positions in the second projected dimensions. Each point's weight is calculated by summing up all related values got in the two steps projected dimensions, and then the points scoring the largest weight values are taken as outliers. By taking a series of experiments with the number of dimensions from 10 to 10000, the results show that our proposed method achieves high precision in the case of extremely high dimensional space, and works well in low dimensional space.
[ { "version": "v1", "created": "Mon, 5 May 2014 12:01:24 GMT" } ]
2014-05-06T00:00:00
[ [ "Bao", "Zhana", "" ] ]
TITLE: Robust Subspace Outlier Detection in High Dimensional Space ABSTRACT: Rare data in a large-scale database are called outliers that reveal significant information in the real world. The subspace-based outlier detection is regarded as a feasible approach in very high dimensional space. However, the outliers found in subspaces are only part of the true outliers in high dimensional space, indeed. The outliers hidden in normal-clustered points are sometimes neglected in the projected dimensional subspace. In this paper, we propose a robust subspace method for detecting such inner outliers in a given dataset, which uses two dimensional-projections: detecting outliers in subspaces with local density ratio in the first projected dimensions; finding outliers by comparing neighbor's positions in the second projected dimensions. Each point's weight is calculated by summing up all related values got in the two steps projected dimensions, and then the points scoring the largest weight values are taken as outliers. By taking a series of experiments with the number of dimensions from 10 to 10000, the results show that our proposed method achieves high precision in the case of extremely high dimensional space, and works well in low dimensional space.
1405.0941
Serena Villata
Elena Cabrio and Serena Villata
Towards a Benchmark of Natural Language Arguments
null
Proceedings of the 15th International Workshop on Non-Monotonic Reasoning (NMR 2014)
null
null
cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The connections among natural language processing and argumentation theory are becoming stronger in the latest years, with a growing amount of works going in this direction, in different scenarios and applying heterogeneous techniques. In this paper, we present two datasets we built to cope with the combination of the Textual Entailment framework and bipolar abstract argumentation. In our approach, such datasets are used to automatically identify through a Textual Entailment system the relations among the arguments (i.e., attack, support), and then the resulting bipolar argumentation graphs are analyzed to compute the accepted arguments.
[ { "version": "v1", "created": "Mon, 5 May 2014 16:03:04 GMT" } ]
2014-05-06T00:00:00
[ [ "Cabrio", "Elena", "" ], [ "Villata", "Serena", "" ] ]
TITLE: Towards a Benchmark of Natural Language Arguments ABSTRACT: The connections among natural language processing and argumentation theory are becoming stronger in the latest years, with a growing amount of works going in this direction, in different scenarios and applying heterogeneous techniques. In this paper, we present two datasets we built to cope with the combination of the Textual Entailment framework and bipolar abstract argumentation. In our approach, such datasets are used to automatically identify through a Textual Entailment system the relations among the arguments (i.e., attack, support), and then the resulting bipolar argumentation graphs are analyzed to compute the accepted arguments.
1405.0320
Jan Verschelde
Danko Adrovic and Jan Verschelde
Computing all Affine Solution Sets of Binomial Systems
4 page extended abstract accepted by EACA 2014, a conference on Computer Algebra and its Applications
null
null
null
cs.SC cs.MS math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To compute solutions of sparse polynomial systems efficiently we have to exploit the structure of their Newton polytopes. While the application of polyhedral methods naturally excludes solutions with zero components, an irreducible decomposition of a variety is typically understood in affine space, including also those components with zero coordinates. For the problem of computing solution sets in the intersection of some coordinate planes, the direct application of a polyhedral method fails, because the original facial structure of the Newton polytopes may alter completely when selected variables become zero. Our new proposed method enumerates all factors contributing to a generalized permanent and toric solutions as a special case of this enumeration. For benchmark problems such as the adjacent 2-by-2 minors of a general matrix, our methods scale much better than the witness set representations of numerical algebraic geometry.
[ { "version": "v1", "created": "Thu, 1 May 2014 23:00:24 GMT" } ]
2014-05-05T00:00:00
[ [ "Adrovic", "Danko", "" ], [ "Verschelde", "Jan", "" ] ]
TITLE: Computing all Affine Solution Sets of Binomial Systems ABSTRACT: To compute solutions of sparse polynomial systems efficiently we have to exploit the structure of their Newton polytopes. While the application of polyhedral methods naturally excludes solutions with zero components, an irreducible decomposition of a variety is typically understood in affine space, including also those components with zero coordinates. For the problem of computing solution sets in the intersection of some coordinate planes, the direct application of a polyhedral method fails, because the original facial structure of the Newton polytopes may alter completely when selected variables become zero. Our new proposed method enumerates all factors contributing to a generalized permanent and toric solutions as a special case of this enumeration. For benchmark problems such as the adjacent 2-by-2 minors of a general matrix, our methods scale much better than the witness set representations of numerical algebraic geometry.
1404.0900
Xiaokui Xiao
Youze Tang, Xiaokui Xiao, Yanchen Shi
Influence Maximization: Near-Optimal Time Complexity Meets Practical Efficiency
Revised Sections 1, 2.3, and 5 to remove incorrect claims about reference [3]. Updated experiments accordingly. A shorter version of the paper will appear in SIGMOD 2014
null
null
null
cs.SI cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a social network G and a constant k, the influence maximization problem asks for k nodes in G that (directly and indirectly) influence the largest number of nodes under a pre-defined diffusion model. This problem finds important applications in viral marketing, and has been extensively studied in the literature. Existing algorithms for influence maximization, however, either trade approximation guarantees for practical efficiency, or vice versa. In particular, among the algorithms that achieve constant factor approximations under the prominent independent cascade (IC) model or linear threshold (LT) model, none can handle a million-node graph without incurring prohibitive overheads. This paper presents TIM, an algorithm that aims to bridge the theory and practice in influence maximization. On the theory side, we show that TIM runs in O((k+\ell) (n+m) \log n / \epsilon^2) expected time and returns a (1-1/e-\epsilon)-approximate solution with at least 1 - n^{-\ell} probability. The time complexity of TIM is near-optimal under the IC model, as it is only a \log n factor larger than the \Omega(m + n) lower-bound established in previous work (for fixed k, \ell, and \epsilon). Moreover, TIM supports the triggering model, which is a general diffusion model that includes both IC and LT as special cases. On the practice side, TIM incorporates novel heuristics that significantly improve its empirical efficiency without compromising its asymptotic performance. We experimentally evaluate TIM with the largest datasets ever tested in the literature, and show that it outperforms the state-of-the-art solutions (with approximation guarantees) by up to four orders of magnitude in terms of running time. In particular, when k = 50, \epsilon = 0.2, and \ell = 1, TIM requires less than one hour on a commodity machine to process a network with 41.6 million nodes and 1.4 billion edges.
[ { "version": "v1", "created": "Thu, 3 Apr 2014 13:23:10 GMT" }, { "version": "v2", "created": "Wed, 30 Apr 2014 03:40:36 GMT" } ]
2014-05-02T00:00:00
[ [ "Tang", "Youze", "" ], [ "Xiao", "Xiaokui", "" ], [ "Shi", "Yanchen", "" ] ]
TITLE: Influence Maximization: Near-Optimal Time Complexity Meets Practical Efficiency ABSTRACT: Given a social network G and a constant k, the influence maximization problem asks for k nodes in G that (directly and indirectly) influence the largest number of nodes under a pre-defined diffusion model. This problem finds important applications in viral marketing, and has been extensively studied in the literature. Existing algorithms for influence maximization, however, either trade approximation guarantees for practical efficiency, or vice versa. In particular, among the algorithms that achieve constant factor approximations under the prominent independent cascade (IC) model or linear threshold (LT) model, none can handle a million-node graph without incurring prohibitive overheads. This paper presents TIM, an algorithm that aims to bridge the theory and practice in influence maximization. On the theory side, we show that TIM runs in O((k+\ell) (n+m) \log n / \epsilon^2) expected time and returns a (1-1/e-\epsilon)-approximate solution with at least 1 - n^{-\ell} probability. The time complexity of TIM is near-optimal under the IC model, as it is only a \log n factor larger than the \Omega(m + n) lower-bound established in previous work (for fixed k, \ell, and \epsilon). Moreover, TIM supports the triggering model, which is a general diffusion model that includes both IC and LT as special cases. On the practice side, TIM incorporates novel heuristics that significantly improve its empirical efficiency without compromising its asymptotic performance. We experimentally evaluate TIM with the largest datasets ever tested in the literature, and show that it outperforms the state-of-the-art solutions (with approximation guarantees) by up to four orders of magnitude in terms of running time. In particular, when k = 50, \epsilon = 0.2, and \ell = 1, TIM requires less than one hour on a commodity machine to process a network with 41.6 million nodes and 1.4 billion edges.
1405.0085
Mahmoud Khademi
Mahmoud Khademi and Louis-Philippe Morency
Relative Facial Action Unit Detection
Accepted at IEEE Winter Conference on Applications of Computer Vision, Steamboat Springs Colorado, USA, 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a subject-independent facial action unit (AU) detection method by introducing the concept of relative AU detection, for scenarios where the neutral face is not provided. We propose a new classification objective function which analyzes the temporal neighborhood of the current frame to decide if the expression recently increased, decreased or showed no change. This approach is a significant change from the conventional absolute method which decides about AU classification using the current frame, without an explicit comparison with its neighboring frames. Our proposed method improves robustness to individual differences such as face scale and shape, age-related wrinkles, and transitions among expressions (e.g., lower intensity of expressions). Our experiments on three publicly available datasets (Extended Cohn-Kanade (CK+), Bosphorus, and DISFA databases) show significant improvement of our approach over conventional absolute techniques. Keywords: facial action coding system (FACS); relative facial action unit detection; temporal information;
[ { "version": "v1", "created": "Thu, 1 May 2014 03:53:36 GMT" } ]
2014-05-02T00:00:00
[ [ "Khademi", "Mahmoud", "" ], [ "Morency", "Louis-Philippe", "" ] ]
TITLE: Relative Facial Action Unit Detection ABSTRACT: This paper presents a subject-independent facial action unit (AU) detection method by introducing the concept of relative AU detection, for scenarios where the neutral face is not provided. We propose a new classification objective function which analyzes the temporal neighborhood of the current frame to decide if the expression recently increased, decreased or showed no change. This approach is a significant change from the conventional absolute method which decides about AU classification using the current frame, without an explicit comparison with its neighboring frames. Our proposed method improves robustness to individual differences such as face scale and shape, age-related wrinkles, and transitions among expressions (e.g., lower intensity of expressions). Our experiments on three publicly available datasets (Extended Cohn-Kanade (CK+), Bosphorus, and DISFA databases) show significant improvement of our approach over conventional absolute techniques. Keywords: facial action coding system (FACS); relative facial action unit detection; temporal information;
1405.0109
Vaibhav Jha
Vaibhav Jha, Mohit Jha, GK Sharma
Estimation of Optimized Energy and Latency Constraints for Task Allocation in 3d Network on Chip
20 Pages,17 Figure, International Journal of Computer Science & Information Technology. arXiv admin note: substantial text overlap with arXiv:1404.2512
International Journal of Computer Science & Information Technology Vol 6,No 2,pp 67-86 April 2014
10.5121/ijcsit.2014.6205
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Network on Chip (NoC) rooted system, energy consumption is affected by task scheduling and allocation schemes which affect the performance of the system. In this paper we test the pre-existing proposed algorithms and introduced a new energy skilled algorithm for 3D NoC architecture. An efficient dynamic and cluster approaches are proposed along with the optimization using bio-inspired algorithm. The proposed algorithm has been implemented and evaluated on randomly generated benchmark and real life application such as MMS, Telecom and VOPD. The algorithm has also been tested with the E3S benchmark and has been compared with the existing mapping algorithm spiral and crinkle and has shown better reduction in the communication energy consumption and shows improvement in the performance of the system. On performing experimental analysis of proposed algorithm results shows that average reduction in energy consumption is 49%, reduction in communication cost is 48% and average latency is 34%. Cluster based approach is mapped onto NoC using Dynamic Diagonal Mapping (DDMap), Crinkle and Spiral algorithms and found DDmap provides improved result. On analysis and comparison of mapping of cluster using DDmap approach the average energy reduction is 14% and 9% with crinkle and spiral.
[ { "version": "v1", "created": "Thu, 1 May 2014 07:38:46 GMT" } ]
2014-05-02T00:00:00
[ [ "Jha", "Vaibhav", "" ], [ "Jha", "Mohit", "" ], [ "Sharma", "GK", "" ] ]
TITLE: Estimation of Optimized Energy and Latency Constraints for Task Allocation in 3d Network on Chip ABSTRACT: In Network on Chip (NoC) rooted system, energy consumption is affected by task scheduling and allocation schemes which affect the performance of the system. In this paper we test the pre-existing proposed algorithms and introduced a new energy skilled algorithm for 3D NoC architecture. An efficient dynamic and cluster approaches are proposed along with the optimization using bio-inspired algorithm. The proposed algorithm has been implemented and evaluated on randomly generated benchmark and real life application such as MMS, Telecom and VOPD. The algorithm has also been tested with the E3S benchmark and has been compared with the existing mapping algorithm spiral and crinkle and has shown better reduction in the communication energy consumption and shows improvement in the performance of the system. On performing experimental analysis of proposed algorithm results shows that average reduction in energy consumption is 49%, reduction in communication cost is 48% and average latency is 34%. Cluster based approach is mapped onto NoC using Dynamic Diagonal Mapping (DDMap), Crinkle and Spiral algorithms and found DDmap provides improved result. On analysis and comparison of mapping of cluster using DDmap approach the average energy reduction is 14% and 9% with crinkle and spiral.
1305.5029
Yuchen Zhang
Yuchen Zhang and John C. Duchi and Martin J. Wainwright
Divide and Conquer Kernel Ridge Regression: A Distributed Algorithm with Minimax Optimal Rates
null
null
null
null
math.ST cs.LG stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish optimal convergence rates for a decomposition-based scalable approach to kernel ridge regression. The method is simple to describe: it randomly partitions a dataset of size N into m subsets of equal size, computes an independent kernel ridge regression estimator for each subset, then averages the local solutions into a global predictor. This partitioning leads to a substantial reduction in computation time versus the standard approach of performing kernel ridge regression on all N samples. Our two main theorems establish that despite the computational speed-up, statistical optimality is retained: as long as m is not too large, the partition-based estimator achieves the statistical minimax rate over all estimators using the set of N samples. As concrete examples, our theory guarantees that the number of processors m may grow nearly linearly for finite-rank kernels and Gaussian kernels and polynomially in N for Sobolev spaces, which in turn allows for substantial reductions in computational cost. We conclude with experiments on both simulated data and a music-prediction task that complement our theoretical results, exhibiting the computational and statistical benefits of our approach.
[ { "version": "v1", "created": "Wed, 22 May 2013 06:30:46 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2014 22:02:35 GMT" } ]
2014-05-01T00:00:00
[ [ "Zhang", "Yuchen", "" ], [ "Duchi", "John C.", "" ], [ "Wainwright", "Martin J.", "" ] ]
TITLE: Divide and Conquer Kernel Ridge Regression: A Distributed Algorithm with Minimax Optimal Rates ABSTRACT: We establish optimal convergence rates for a decomposition-based scalable approach to kernel ridge regression. The method is simple to describe: it randomly partitions a dataset of size N into m subsets of equal size, computes an independent kernel ridge regression estimator for each subset, then averages the local solutions into a global predictor. This partitioning leads to a substantial reduction in computation time versus the standard approach of performing kernel ridge regression on all N samples. Our two main theorems establish that despite the computational speed-up, statistical optimality is retained: as long as m is not too large, the partition-based estimator achieves the statistical minimax rate over all estimators using the set of N samples. As concrete examples, our theory guarantees that the number of processors m may grow nearly linearly for finite-rank kernels and Gaussian kernels and polynomially in N for Sobolev spaces, which in turn allows for substantial reductions in computational cost. We conclude with experiments on both simulated data and a music-prediction task that complement our theoretical results, exhibiting the computational and statistical benefits of our approach.
1311.0041
Sparsh Mittal
Sparsh Mittal
A Technique for Write-endurance aware Management of Resistive RAM Last Level Caches
This paper has been withdrawn by the author for revising the experiments
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to increasing cache sizes and large leakage consumption of SRAM device, conventional SRAM caches contribute significantly to the processor power consumption. Recently researchers have used non-volatile memory devices to design caches, since they provide high density, comparable read latency and low leakage power dissipation. However, their high write latency may increase the execution time and hence, leakage energy consumption. Also, since their write endurance is small, a conventional energy saving technique may further aggravate the problem of write-variations, thus reducing their lifetime. In this paper, we present a cache energy saving technique for non-volatile caches, which also attempts to improve their lifetime by making writes equally distributed to the cache. Our technique uses dynamic cache reconfiguration to adjust the cache size to meet program requirement and turns off the remaining cache to save energy. Microarchitectural simulations performed using an x86-64 simulator, SPEC2006 benchmarks and a resistive-RAM LLC (last level cache) show that over an 8MB baseline cache, our technique saves 17.55% memory subsystem (last level cache + main memory) energy and improves the lifetime by 1.33X. Over the same resistive-RAM baseline, an SRAM of similar area with no cache reconfiguration leads to an energy loss of 186.13%.
[ { "version": "v1", "created": "Thu, 31 Oct 2013 21:41:18 GMT" }, { "version": "v2", "created": "Wed, 30 Apr 2014 10:35:11 GMT" } ]
2014-05-01T00:00:00
[ [ "Mittal", "Sparsh", "" ] ]
TITLE: A Technique for Write-endurance aware Management of Resistive RAM Last Level Caches ABSTRACT: Due to increasing cache sizes and large leakage consumption of SRAM device, conventional SRAM caches contribute significantly to the processor power consumption. Recently researchers have used non-volatile memory devices to design caches, since they provide high density, comparable read latency and low leakage power dissipation. However, their high write latency may increase the execution time and hence, leakage energy consumption. Also, since their write endurance is small, a conventional energy saving technique may further aggravate the problem of write-variations, thus reducing their lifetime. In this paper, we present a cache energy saving technique for non-volatile caches, which also attempts to improve their lifetime by making writes equally distributed to the cache. Our technique uses dynamic cache reconfiguration to adjust the cache size to meet program requirement and turns off the remaining cache to save energy. Microarchitectural simulations performed using an x86-64 simulator, SPEC2006 benchmarks and a resistive-RAM LLC (last level cache) show that over an 8MB baseline cache, our technique saves 17.55% memory subsystem (last level cache + main memory) energy and improves the lifetime by 1.33X. Over the same resistive-RAM baseline, an SRAM of similar area with no cache reconfiguration leads to an energy loss of 186.13%.
1404.7571
Mina Ghashami
Mina Ghashami, Jeff M. Phillips and Feifei Li
Continuous Matrix Approximation on Distributed Data
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tracking and approximating data matrices in streaming fashion is a fundamental challenge. The problem requires more care and attention when data comes from multiple distributed sites, each receiving a stream of data. This paper considers the problem of "tracking approximations to a matrix" in the distributed streaming model. In this model, there are m distributed sites each observing a distinct stream of data (where each element is a row of a distributed matrix) and has a communication channel with a coordinator, and the goal is to track an eps-approximation to the norm of the matrix along any direction. To that end, we present novel algorithms to address the matrix approximation problem. Our algorithms maintain a smaller matrix B, as an approximation to a distributed streaming matrix A, such that for any unit vector x: | ||A x||^2 - ||B x||^2 | <= eps ||A||_F^2. Our algorithms work in streaming fashion and incur small communication, which is critical for distributed computation. Our best method is deterministic and uses only O((m/eps) log(beta N)) communication, where N is the size of stream (at the time of the query) and beta is an upper-bound on the squared norm of any row of the matrix. In addition to proving all algorithmic properties theoretically, extensive experiments with real large datasets demonstrate the efficiency of these protocols.
[ { "version": "v1", "created": "Wed, 30 Apr 2014 01:57:40 GMT" } ]
2014-05-01T00:00:00
[ [ "Ghashami", "Mina", "" ], [ "Phillips", "Jeff M.", "" ], [ "Li", "Feifei", "" ] ]
TITLE: Continuous Matrix Approximation on Distributed Data ABSTRACT: Tracking and approximating data matrices in streaming fashion is a fundamental challenge. The problem requires more care and attention when data comes from multiple distributed sites, each receiving a stream of data. This paper considers the problem of "tracking approximations to a matrix" in the distributed streaming model. In this model, there are m distributed sites each observing a distinct stream of data (where each element is a row of a distributed matrix) and has a communication channel with a coordinator, and the goal is to track an eps-approximation to the norm of the matrix along any direction. To that end, we present novel algorithms to address the matrix approximation problem. Our algorithms maintain a smaller matrix B, as an approximation to a distributed streaming matrix A, such that for any unit vector x: | ||A x||^2 - ||B x||^2 | <= eps ||A||_F^2. Our algorithms work in streaming fashion and incur small communication, which is critical for distributed computation. Our best method is deterministic and uses only O((m/eps) log(beta N)) communication, where N is the size of stream (at the time of the query) and beta is an upper-bound on the squared norm of any row of the matrix. In addition to proving all algorithmic properties theoretically, extensive experiments with real large datasets demonstrate the efficiency of these protocols.
1305.4987
Julie Tibshirani
Julie Tibshirani and Christopher D. Manning
Robust Logistic Regression using Shift Parameters (Long Version)
null
null
null
null
cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Annotation errors can significantly hurt classifier performance, yet datasets are only growing noisier with the increased use of Amazon Mechanical Turk and techniques like distant supervision that automatically generate labels. In this paper, we present a robust extension of logistic regression that incorporates the possibility of mislabelling directly into the objective. Our model can be trained through nearly the same means as logistic regression, and retains its efficiency on high-dimensional datasets. Through named entity recognition experiments, we demonstrate that our approach can provide a significant improvement over the standard model when annotation errors are present.
[ { "version": "v1", "created": "Tue, 21 May 2013 23:36:18 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2014 07:32:58 GMT" } ]
2014-04-30T00:00:00
[ [ "Tibshirani", "Julie", "" ], [ "Manning", "Christopher D.", "" ] ]
TITLE: Robust Logistic Regression using Shift Parameters (Long Version) ABSTRACT: Annotation errors can significantly hurt classifier performance, yet datasets are only growing noisier with the increased use of Amazon Mechanical Turk and techniques like distant supervision that automatically generate labels. In this paper, we present a robust extension of logistic regression that incorporates the possibility of mislabelling directly into the objective. Our model can be trained through nearly the same means as logistic regression, and retains its efficiency on high-dimensional datasets. Through named entity recognition experiments, we demonstrate that our approach can provide a significant improvement over the standard model when annotation errors are present.
1404.6383
Pierre de Buyl
Valentin Haenel
Bloscpack: a compressed lightweight serialization format for numerical data
Part of the Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2013-02
cs.MS cs.PL
http://creativecommons.org/licenses/by/3.0/
This paper introduces the Bloscpack file format and the accompanying Python reference implementation. Bloscpack is a lightweight, compressed binary file-format based on the Blosc codec and is designed for lightweight, fast serialization of numerical data. This article presents the features of the file-format and some some API aspects of the reference implementation, in particular the ability to handle Numpy ndarrays. Furthermore, in order to demonstrate its utility, the format is compared both feature- and performance-wise to a few alternative lightweight serialization solutions for Numpy ndarrays. The performance comparisons take the form of some comprehensive benchmarks over a range of different artificial datasets with varying size and complexity, the results of which are presented as the last section of this article.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 10:53:23 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2014 14:16:55 GMT" } ]
2014-04-30T00:00:00
[ [ "Haenel", "Valentin", "" ] ]
TITLE: Bloscpack: a compressed lightweight serialization format for numerical data ABSTRACT: This paper introduces the Bloscpack file format and the accompanying Python reference implementation. Bloscpack is a lightweight, compressed binary file-format based on the Blosc codec and is designed for lightweight, fast serialization of numerical data. This article presents the features of the file-format and some some API aspects of the reference implementation, in particular the ability to handle Numpy ndarrays. Furthermore, in order to demonstrate its utility, the format is compared both feature- and performance-wise to a few alternative lightweight serialization solutions for Numpy ndarrays. The performance comparisons take the form of some comprehensive benchmarks over a range of different artificial datasets with varying size and complexity, the results of which are presented as the last section of this article.
1305.0062
Zeinab Taghavi
Zeinab Taghavi, Narjes S. Movahedi, Sorin Draghici, Hamidreza Chitsaz
Distilled Single Cell Genome Sequencing and De Novo Assembly for Sparse Microbial Communities
null
null
10.1093/bioinformatics/btt420
null
q-bio.GN cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identification of every single genome present in a microbial sample is an important and challenging task with crucial applications. It is challenging because there are typically millions of cells in a microbial sample, the vast majority of which elude cultivation. The most accurate method to date is exhaustive single cell sequencing using multiple displacement amplification, which is simply intractable for a large number of cells. However, there is hope for breaking this barrier as the number of different cell types with distinct genome sequences is usually much smaller than the number of cells. Here, we present a novel divide and conquer method to sequence and de novo assemble all distinct genomes present in a microbial sample with a sequencing cost and computational complexity proportional to the number of genome types, rather than the number of cells. The method is implemented in a tool called Squeezambler. We evaluated Squeezambler on simulated data. The proposed divide and conquer method successfully reduces the cost of sequencing in comparison with the naive exhaustive approach. Availability: Squeezambler and datasets are available under http://compbio.cs.wayne.edu/software/squeezambler/.
[ { "version": "v1", "created": "Wed, 1 May 2013 00:49:29 GMT" }, { "version": "v2", "created": "Wed, 22 May 2013 21:39:04 GMT" } ]
2014-04-29T00:00:00
[ [ "Taghavi", "Zeinab", "" ], [ "Movahedi", "Narjes S.", "" ], [ "Draghici", "Sorin", "" ], [ "Chitsaz", "Hamidreza", "" ] ]
TITLE: Distilled Single Cell Genome Sequencing and De Novo Assembly for Sparse Microbial Communities ABSTRACT: Identification of every single genome present in a microbial sample is an important and challenging task with crucial applications. It is challenging because there are typically millions of cells in a microbial sample, the vast majority of which elude cultivation. The most accurate method to date is exhaustive single cell sequencing using multiple displacement amplification, which is simply intractable for a large number of cells. However, there is hope for breaking this barrier as the number of different cell types with distinct genome sequences is usually much smaller than the number of cells. Here, we present a novel divide and conquer method to sequence and de novo assemble all distinct genomes present in a microbial sample with a sequencing cost and computational complexity proportional to the number of genome types, rather than the number of cells. The method is implemented in a tool called Squeezambler. We evaluated Squeezambler on simulated data. The proposed divide and conquer method successfully reduces the cost of sequencing in comparison with the naive exhaustive approach. Availability: Squeezambler and datasets are available under http://compbio.cs.wayne.edu/software/squeezambler/.
1403.4118
Michael Helmling
Michael Helmling and Eirik Rosnes and Stefan Ruzika and Stefan Scholl
Efficient Maximum-Likelihood Decoding of Linear Block Codes on Binary Memoryless Channels
Submitted to 2014 International Symposium on Information Theory. 5 Pages. Accepted
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we consider efficient maximum-likelihood decoding of linear block codes for small-to-moderate block lengths. The presented approach is a branch-and-bound algorithm using the cutting-plane approach of Zhang and Siegel (IEEE Trans. Inf. Theory, 2012) for obtaining lower bounds. We have compared our proposed algorithm to the state-of-the-art commercial integer program solver CPLEX, and for all considered codes our approach is faster for both low and high signal-to-noise ratios. For instance, for the benchmark (155,64) Tanner code our algorithm is more than 11 times as fast as CPLEX for an SNR of 1.0 dB on the additive white Gaussian noise channel. By a small modification, our algorithm can be used to calculate the minimum distance, which we have again verified to be much faster than using the CPLEX solver.
[ { "version": "v1", "created": "Mon, 17 Mar 2014 14:55:42 GMT" }, { "version": "v2", "created": "Mon, 28 Apr 2014 08:00:48 GMT" } ]
2014-04-29T00:00:00
[ [ "Helmling", "Michael", "" ], [ "Rosnes", "Eirik", "" ], [ "Ruzika", "Stefan", "" ], [ "Scholl", "Stefan", "" ] ]
TITLE: Efficient Maximum-Likelihood Decoding of Linear Block Codes on Binary Memoryless Channels ABSTRACT: In this work, we consider efficient maximum-likelihood decoding of linear block codes for small-to-moderate block lengths. The presented approach is a branch-and-bound algorithm using the cutting-plane approach of Zhang and Siegel (IEEE Trans. Inf. Theory, 2012) for obtaining lower bounds. We have compared our proposed algorithm to the state-of-the-art commercial integer program solver CPLEX, and for all considered codes our approach is faster for both low and high signal-to-noise ratios. For instance, for the benchmark (155,64) Tanner code our algorithm is more than 11 times as fast as CPLEX for an SNR of 1.0 dB on the additive white Gaussian noise channel. By a small modification, our algorithm can be used to calculate the minimum distance, which we have again verified to be much faster than using the CPLEX solver.
1404.6682
Kuldeep Meel
Kuldeep S. Meel
Sampling Techniques for Boolean Satisfiability
MS Thesis submitted to Rice University
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Boolean satisfiability ({\SAT}) has played a key role in diverse areas spanning testing, formal verification, planning, optimization, inferencing and the like. Apart from the classical problem of checking boolean satisfiability, the problems of generating satisfying uniformly at random, and of counting the total number of satisfying assignments have also attracted significant theoretical and practical interest over the years. Prior work offered heuristic approaches with very weak or no guarantee of performance, and theoretical approaches with proven guarantees, but poor performance in practice. We propose a novel approach based on limited-independence hashing that allows us to design algorithms for both problems, with strong theoretical guarantees and scalability extending to thousands of variables. Based on this approach, we present two practical algorithms, {\UniformWitness}: a near uniform generator and {\approxMC}: the first scalable approximate model counter, along with reference implementations. Our algorithms work by issuing polynomial calls to {\SAT} solver. We demonstrate scalability of our algorithms over a large set of benchmarks arising from different application domains.
[ { "version": "v1", "created": "Sat, 26 Apr 2014 21:08:07 GMT" } ]
2014-04-29T00:00:00
[ [ "Meel", "Kuldeep S.", "" ] ]
TITLE: Sampling Techniques for Boolean Satisfiability ABSTRACT: Boolean satisfiability ({\SAT}) has played a key role in diverse areas spanning testing, formal verification, planning, optimization, inferencing and the like. Apart from the classical problem of checking boolean satisfiability, the problems of generating satisfying uniformly at random, and of counting the total number of satisfying assignments have also attracted significant theoretical and practical interest over the years. Prior work offered heuristic approaches with very weak or no guarantee of performance, and theoretical approaches with proven guarantees, but poor performance in practice. We propose a novel approach based on limited-independence hashing that allows us to design algorithms for both problems, with strong theoretical guarantees and scalability extending to thousands of variables. Based on this approach, we present two practical algorithms, {\UniformWitness}: a near uniform generator and {\approxMC}: the first scalable approximate model counter, along with reference implementations. Our algorithms work by issuing polynomial calls to {\SAT} solver. We demonstrate scalability of our algorithms over a large set of benchmarks arising from different application domains.
1404.6696
Thibaut Vidal
Thibaut Vidal, Maria Battarra, Anand Subramanian, G\"une\c{s} Erdo\v{g}an
Hybrid Metaheuristics for the Clustered Vehicle Routing Problem
Working Paper, MIT -- 22 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Clustered Vehicle Routing Problem (CluVRP) is a variant of the Capacitated Vehicle Routing Problem in which customers are grouped into clusters. Each cluster has to be visited once, and a vehicle entering a cluster cannot leave it until all customers have been visited. This article presents two alternative hybrid metaheuristic algorithms for the CluVRP. The first algorithm is based on an Iterated Local Search algorithm, in which only feasible solutions are explored and problem-specific local search moves are utilized. The second algorithm is a Hybrid Genetic Search, for which the shortest Hamiltonian path between each pair of vertices within each cluster should be precomputed. Using this information, a sequence of clusters can be used as a solution representation and large neighborhoods can be efficiently explored by means of bi-directional dynamic programming, sequence concatenations, by using appropriate data structures. Extensive computational experiments are performed on benchmark instances from the literature, as well as new large scale ones. Recommendations on promising algorithm choices are provided relatively to average cluster size.
[ { "version": "v1", "created": "Sat, 26 Apr 2014 23:52:47 GMT" } ]
2014-04-29T00:00:00
[ [ "Vidal", "Thibaut", "" ], [ "Battarra", "Maria", "" ], [ "Subramanian", "Anand", "" ], [ "Erdoǧan", "Güneş", "" ] ]
TITLE: Hybrid Metaheuristics for the Clustered Vehicle Routing Problem ABSTRACT: The Clustered Vehicle Routing Problem (CluVRP) is a variant of the Capacitated Vehicle Routing Problem in which customers are grouped into clusters. Each cluster has to be visited once, and a vehicle entering a cluster cannot leave it until all customers have been visited. This article presents two alternative hybrid metaheuristic algorithms for the CluVRP. The first algorithm is based on an Iterated Local Search algorithm, in which only feasible solutions are explored and problem-specific local search moves are utilized. The second algorithm is a Hybrid Genetic Search, for which the shortest Hamiltonian path between each pair of vertices within each cluster should be precomputed. Using this information, a sequence of clusters can be used as a solution representation and large neighborhoods can be efficiently explored by means of bi-directional dynamic programming, sequence concatenations, by using appropriate data structures. Extensive computational experiments are performed on benchmark instances from the literature, as well as new large scale ones. Recommendations on promising algorithm choices are provided relatively to average cluster size.
1404.6727
Sam Chiu-wai Wong
MohammadHossein Bateni, Jon Feldman, Vahab Mirrokni, Sam Chiu-wai Wong
Multiplicative Bidding in Online Advertising
25 pages; accepted to EC'14
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we initiate the study of the multiplicative bidding language adopted by major Internet search companies. In multiplicative bidding, the effective bid on a particular search auction is the product of a base bid and bid adjustments that are dependent on features of the search (for example, the geographic location of the user, or the platform on which the search is conducted). We consider the task faced by the advertiser when setting these bid adjustments, and establish a foundational optimization problem that captures the core difficulty of bidding under this language. We give matching algorithmic and approximation hardness results for this problem; these results are against an information-theoretic bound, and thus have implications on the power of the multiplicative bidding language itself. Inspired by empirical studies of search engine price data, we then codify the relevant restrictions of the problem, and give further algorithmic and hardness results. Our main technical contribution is an $O(\log n)$-approximation for the case of multiplicative prices and monotone values. We also provide empirical validations of our problem restrictions, and test our algorithms on real data against natural benchmarks. Our experiments show that they perform favorably compared with the baseline.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 08:25:12 GMT" } ]
2014-04-29T00:00:00
[ [ "Bateni", "MohammadHossein", "" ], [ "Feldman", "Jon", "" ], [ "Mirrokni", "Vahab", "" ], [ "Wong", "Sam Chiu-wai", "" ] ]
TITLE: Multiplicative Bidding in Online Advertising ABSTRACT: In this paper, we initiate the study of the multiplicative bidding language adopted by major Internet search companies. In multiplicative bidding, the effective bid on a particular search auction is the product of a base bid and bid adjustments that are dependent on features of the search (for example, the geographic location of the user, or the platform on which the search is conducted). We consider the task faced by the advertiser when setting these bid adjustments, and establish a foundational optimization problem that captures the core difficulty of bidding under this language. We give matching algorithmic and approximation hardness results for this problem; these results are against an information-theoretic bound, and thus have implications on the power of the multiplicative bidding language itself. Inspired by empirical studies of search engine price data, we then codify the relevant restrictions of the problem, and give further algorithmic and hardness results. Our main technical contribution is an $O(\log n)$-approximation for the case of multiplicative prices and monotone values. We also provide empirical validations of our problem restrictions, and test our algorithms on real data against natural benchmarks. Our experiments show that they perform favorably compared with the baseline.
1404.6876
Voot Tangkaratt
Voot Tangkaratt, Ning Xie, and Masashi Sugiyama
Conditional Density Estimation with Dimensionality Reduction via Squared-Loss Conditional Entropy Minimization
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Regression aims at estimating the conditional mean of output given input. However, regression is not informative enough if the conditional density is multimodal, heteroscedastic, and asymmetric. In such a case, estimating the conditional density itself is preferable, but conditional density estimation (CDE) is challenging in high-dimensional space. A naive approach to coping with high-dimensionality is to first perform dimensionality reduction (DR) and then execute CDE. However, such a two-step process does not perform well in practice because the error incurred in the first DR step can be magnified in the second CDE step. In this paper, we propose a novel single-shot procedure that performs CDE and DR simultaneously in an integrated way. Our key idea is to formulate DR as the problem of minimizing a squared-loss variant of conditional entropy, and this is solved via CDE. Thus, an additional CDE step is not needed after DR. We demonstrate the usefulness of the proposed method through extensive experiments on various datasets including humanoid robot transition and computer art.
[ { "version": "v1", "created": "Mon, 28 Apr 2014 06:30:39 GMT" } ]
2014-04-29T00:00:00
[ [ "Tangkaratt", "Voot", "" ], [ "Xie", "Ning", "" ], [ "Sugiyama", "Masashi", "" ] ]
TITLE: Conditional Density Estimation with Dimensionality Reduction via Squared-Loss Conditional Entropy Minimization ABSTRACT: Regression aims at estimating the conditional mean of output given input. However, regression is not informative enough if the conditional density is multimodal, heteroscedastic, and asymmetric. In such a case, estimating the conditional density itself is preferable, but conditional density estimation (CDE) is challenging in high-dimensional space. A naive approach to coping with high-dimensionality is to first perform dimensionality reduction (DR) and then execute CDE. However, such a two-step process does not perform well in practice because the error incurred in the first DR step can be magnified in the second CDE step. In this paper, we propose a novel single-shot procedure that performs CDE and DR simultaneously in an integrated way. Our key idea is to formulate DR as the problem of minimizing a squared-loss variant of conditional entropy, and this is solved via CDE. Thus, an additional CDE step is not needed after DR. We demonstrate the usefulness of the proposed method through extensive experiments on various datasets including humanoid robot transition and computer art.
1404.6999
Carmine Dodaro
Mario Alviano, Carmine Dodaro and Francesco Ricca
Preliminary Report on WASP 2.0
The paper appears in the Proceedings of the 15th International Workshop on Non-Monotonic Reasoning (NMR 2014)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Answer Set Programming (ASP) is a declarative programming paradigm. The intrinsic complexity of the evaluation of ASP programs makes the development of more effective and faster systems a challenging research topic. This paper reports on the recent improvements of the ASP solver WASP. WASP is undergoing a refactoring process which will end up in the release of a new and more performant version of the software. In particular the paper focus on the improvements to the core evaluation algorithms working on normal programs. A preliminary experiment on benchmarks from the 3rd ASP competition belonging to the NP class is reported. The previous version of WASP was often not competitive with alternative solutions on this class. The new version of WASP shows a substantial increase in performance.
[ { "version": "v1", "created": "Mon, 28 Apr 2014 14:26:12 GMT" } ]
2014-04-29T00:00:00
[ [ "Alviano", "Mario", "" ], [ "Dodaro", "Carmine", "" ], [ "Ricca", "Francesco", "" ] ]
TITLE: Preliminary Report on WASP 2.0 ABSTRACT: Answer Set Programming (ASP) is a declarative programming paradigm. The intrinsic complexity of the evaluation of ASP programs makes the development of more effective and faster systems a challenging research topic. This paper reports on the recent improvements of the ASP solver WASP. WASP is undergoing a refactoring process which will end up in the release of a new and more performant version of the software. In particular the paper focus on the improvements to the core evaluation algorithms working on normal programs. A preliminary experiment on benchmarks from the 3rd ASP competition belonging to the NP class is reported. The previous version of WASP was often not competitive with alternative solutions on this class. The new version of WASP shows a substantial increase in performance.
1108.0404
Frans A. Oliehoek
Frans A. Oliehoek, Shimon Whiteson, Matthijs T.J. Spaan
Exploiting Agent and Type Independence in Collaborative Graphical Bayesian Games
null
null
null
null
cs.AI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient collaborative decision making is an important challenge for multiagent systems. Finding optimal joint actions is especially challenging when each agent has only imperfect information about the state of its environment. Such problems can be modeled as collaborative Bayesian games in which each agent receives private information in the form of its type. However, representing and solving such games requires space and computation time exponential in the number of agents. This article introduces collaborative graphical Bayesian games (CGBGs), which facilitate more efficient collaborative decision making by decomposing the global payoff function as the sum of local payoff functions that depend on only a few agents. We propose a framework for the efficient solution of CGBGs based on the insight that they posses two different types of independence, which we call agent independence and type independence. In particular, we present a factor graph representation that captures both forms of independence and thus enables efficient solutions. In addition, we show how this representation can provide leverage in sequential tasks by using it to construct a novel method for decentralized partially observable Markov decision processes. Experimental results in both random and benchmark tasks demonstrate the improved scalability of our methods compared to several existing alternatives.
[ { "version": "v1", "created": "Mon, 1 Aug 2011 19:51:53 GMT" }, { "version": "v2", "created": "Fri, 25 Apr 2014 15:19:22 GMT" } ]
2014-04-28T00:00:00
[ [ "Oliehoek", "Frans A.", "" ], [ "Whiteson", "Shimon", "" ], [ "Spaan", "Matthijs T. J.", "" ] ]
TITLE: Exploiting Agent and Type Independence in Collaborative Graphical Bayesian Games ABSTRACT: Efficient collaborative decision making is an important challenge for multiagent systems. Finding optimal joint actions is especially challenging when each agent has only imperfect information about the state of its environment. Such problems can be modeled as collaborative Bayesian games in which each agent receives private information in the form of its type. However, representing and solving such games requires space and computation time exponential in the number of agents. This article introduces collaborative graphical Bayesian games (CGBGs), which facilitate more efficient collaborative decision making by decomposing the global payoff function as the sum of local payoff functions that depend on only a few agents. We propose a framework for the efficient solution of CGBGs based on the insight that they posses two different types of independence, which we call agent independence and type independence. In particular, we present a factor graph representation that captures both forms of independence and thus enables efficient solutions. In addition, we show how this representation can provide leverage in sequential tasks by using it to construct a novel method for decentralized partially observable Markov decision processes. Experimental results in both random and benchmark tasks demonstrate the improved scalability of our methods compared to several existing alternatives.
1307.2982
Mohammad Norouzi
Mohammad Norouzi, Ali Punjani, David J. Fleet
Fast Exact Search in Hamming Space with Multi-Index Hashing
null
null
null
null
cs.CV cs.AI cs.DS cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is growing interest in representing image data and feature descriptors using compact binary codes for fast near neighbor search. Although binary codes are motivated by their use as direct indices (addresses) into a hash table, codes longer than 32 bits are not being used as such, as it was thought to be ineffective. We introduce a rigorous way to build multiple hash tables on binary code substrings that enables exact k-nearest neighbor search in Hamming space. The approach is storage efficient and straightforward to implement. Theoretical analysis shows that the algorithm exhibits sub-linear run-time behavior for uniformly distributed codes. Empirical results show dramatic speedups over a linear scan baseline for datasets of up to one billion codes of 64, 128, or 256 bits.
[ { "version": "v1", "created": "Thu, 11 Jul 2013 05:52:21 GMT" }, { "version": "v2", "created": "Sun, 15 Dec 2013 02:36:21 GMT" }, { "version": "v3", "created": "Fri, 25 Apr 2014 01:31:55 GMT" } ]
2014-04-28T00:00:00
[ [ "Norouzi", "Mohammad", "" ], [ "Punjani", "Ali", "" ], [ "Fleet", "David J.", "" ] ]
TITLE: Fast Exact Search in Hamming Space with Multi-Index Hashing ABSTRACT: There is growing interest in representing image data and feature descriptors using compact binary codes for fast near neighbor search. Although binary codes are motivated by their use as direct indices (addresses) into a hash table, codes longer than 32 bits are not being used as such, as it was thought to be ineffective. We introduce a rigorous way to build multiple hash tables on binary code substrings that enables exact k-nearest neighbor search in Hamming space. The approach is storage efficient and straightforward to implement. Theoretical analysis shows that the algorithm exhibits sub-linear run-time behavior for uniformly distributed codes. Empirical results show dramatic speedups over a linear scan baseline for datasets of up to one billion codes of 64, 128, or 256 bits.
1311.0202
Diego Amancio Raphael
D. R. Amancio, C. H. Comin, D. Casanova, G. Travieso, O. M. Bruno, F. A. Rodrigues and L. da F. Costa
A systematic comparison of supervised classifiers
null
PLoS ONE 9 (4): e94137, 2014
10.1371/journal.pone.0094137
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pattern recognition techniques have been employed in a myriad of industrial, medical, commercial and academic applications. To tackle such a diversity of data, many techniques have been devised. However, despite the long tradition of pattern recognition research, there is no technique that yields the best classification in all scenarios. Therefore, the consideration of as many as possible techniques presents itself as an fundamental practice in applications aiming at high accuracy. Typical works comparing methods either emphasize the performance of a given algorithm in validation tests or systematically compare various algorithms, assuming that the practical use of these methods is done by experts. In many occasions, however, researchers have to deal with their practical classification tasks without an in-depth knowledge about the underlying mechanisms behind parameters. Actually, the adequate choice of classifiers and parameters alike in such practical circumstances constitutes a long-standing problem and is the subject of the current paper. We carried out a study on the performance of nine well-known classifiers implemented by the Weka framework and compared the dependence of the accuracy with their configuration parameter configurations. The analysis of performance with default parameters revealed that the k-nearest neighbors method exceeds by a large margin the other methods when high dimensional datasets are considered. When other configuration of parameters were allowed, we found that it is possible to improve the quality of SVM in more than 20% even if parameters are set randomly. Taken together, the investigation conducted in this paper suggests that, apart from the SVM implementation, Weka's default configuration of parameters provides an performance close the one achieved with the optimal configuration.
[ { "version": "v1", "created": "Thu, 17 Oct 2013 03:44:18 GMT" } ]
2014-04-28T00:00:00
[ [ "Amancio", "D. R.", "" ], [ "Comin", "C. H.", "" ], [ "Casanova", "D.", "" ], [ "Travieso", "G.", "" ], [ "Bruno", "O. M.", "" ], [ "Rodrigues", "F. A.", "" ], [ "Costa", "L. da F.", "" ] ]
TITLE: A systematic comparison of supervised classifiers ABSTRACT: Pattern recognition techniques have been employed in a myriad of industrial, medical, commercial and academic applications. To tackle such a diversity of data, many techniques have been devised. However, despite the long tradition of pattern recognition research, there is no technique that yields the best classification in all scenarios. Therefore, the consideration of as many as possible techniques presents itself as an fundamental practice in applications aiming at high accuracy. Typical works comparing methods either emphasize the performance of a given algorithm in validation tests or systematically compare various algorithms, assuming that the practical use of these methods is done by experts. In many occasions, however, researchers have to deal with their practical classification tasks without an in-depth knowledge about the underlying mechanisms behind parameters. Actually, the adequate choice of classifiers and parameters alike in such practical circumstances constitutes a long-standing problem and is the subject of the current paper. We carried out a study on the performance of nine well-known classifiers implemented by the Weka framework and compared the dependence of the accuracy with their configuration parameter configurations. The analysis of performance with default parameters revealed that the k-nearest neighbors method exceeds by a large margin the other methods when high dimensional datasets are considered. When other configuration of parameters were allowed, we found that it is possible to improve the quality of SVM in more than 20% even if parameters are set randomly. Taken together, the investigation conducted in this paper suggests that, apart from the SVM implementation, Weka's default configuration of parameters provides an performance close the one achieved with the optimal configuration.
1404.6351
Harald Ganster
Harald Ganster, Martina Uray, Sylwia Steginska, Gerardus Croonen, Rudolf Kaltenb\"ock, Karin Hennermann
Improving weather radar by fusion and classification
Part of the OAGM 2014 proceedings (arXiv:1404.3538)
null
null
OAGM/2014/04
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In air traffic management (ATM) all necessary operations (tactical planing, sector configuration, required staffing, runway configuration, routing of approaching aircrafts) rely on accurate measurements and predictions of the current weather situation. An essential basis of information is delivered by weather radar images (WXR), which, unfortunately, exhibit a vast amount of disturbances. Thus, the improvement of these datasets is the key factor for more accurate predictions of weather phenomena and weather conditions. Image processing methods based on texture analysis and geometric operators allow to identify regions including artefacts as well as zones of missing information. Correction of these zones is implemented by exploiting multi-spectral satellite data (Meteosat Second Generation). Results prove that the proposed system for artefact detection and data correction significantly improves the quality of WXR data and, thus, enables more reliable weather now- and forecast leading to increased ATM safety.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 08:32:51 GMT" } ]
2014-04-28T00:00:00
[ [ "Ganster", "Harald", "" ], [ "Uray", "Martina", "" ], [ "Steginska", "Sylwia", "" ], [ "Croonen", "Gerardus", "" ], [ "Kaltenböck", "Rudolf", "" ], [ "Hennermann", "Karin", "" ] ]
TITLE: Improving weather radar by fusion and classification ABSTRACT: In air traffic management (ATM) all necessary operations (tactical planing, sector configuration, required staffing, runway configuration, routing of approaching aircrafts) rely on accurate measurements and predictions of the current weather situation. An essential basis of information is delivered by weather radar images (WXR), which, unfortunately, exhibit a vast amount of disturbances. Thus, the improvement of these datasets is the key factor for more accurate predictions of weather phenomena and weather conditions. Image processing methods based on texture analysis and geometric operators allow to identify regions including artefacts as well as zones of missing information. Correction of these zones is implemented by exploiting multi-spectral satellite data (Meteosat Second Generation). Results prove that the proposed system for artefact detection and data correction significantly improves the quality of WXR data and, thus, enables more reliable weather now- and forecast leading to increased ATM safety.
1404.6413
Georg Waltner
Georg Waltner and Thomas Mauthner and Horst Bischof
Indoor Activity Detection and Recognition for Sport Games Analysis
Part of the OAGM 2014 proceedings (arXiv:1404.3538)
null
null
OAGM/2014/03
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Activity recognition in sport is an attractive field for computer vision research. Game, player and team analysis are of great interest and research topics within this field emerge with the goal of automated analysis. The very specific underlying rules of sports can be used as prior knowledge for the recognition task and present a constrained environment for evaluation. This paper describes recognition of single player activities in sport with special emphasis on volleyball. Starting from a per-frame player-centered activity recognition, we incorporate geometry and contextual information via an activity context descriptor that collects information about all player's activities over a certain timespan relative to the investigated player. The benefit of this context information on single player activity recognition is evaluated on our new real-life dataset presenting a total amount of almost 36k annotated frames containing 7 activity classes within 6 videos of professional volleyball games. Our incorporation of the contextual information improves the average player-centered classification performance of 77.56% by up to 18.35% on specific classes, proving that spatio-temporal context is an important clue for activity recognition.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 13:25:09 GMT" } ]
2014-04-28T00:00:00
[ [ "Waltner", "Georg", "" ], [ "Mauthner", "Thomas", "" ], [ "Bischof", "Horst", "" ] ]
TITLE: Indoor Activity Detection and Recognition for Sport Games Analysis ABSTRACT: Activity recognition in sport is an attractive field for computer vision research. Game, player and team analysis are of great interest and research topics within this field emerge with the goal of automated analysis. The very specific underlying rules of sports can be used as prior knowledge for the recognition task and present a constrained environment for evaluation. This paper describes recognition of single player activities in sport with special emphasis on volleyball. Starting from a per-frame player-centered activity recognition, we incorporate geometry and contextual information via an activity context descriptor that collects information about all player's activities over a certain timespan relative to the investigated player. The benefit of this context information on single player activity recognition is evaluated on our new real-life dataset presenting a total amount of almost 36k annotated frames containing 7 activity classes within 6 videos of professional volleyball games. Our incorporation of the contextual information improves the average player-centered classification performance of 77.56% by up to 18.35% on specific classes, proving that spatio-temporal context is an important clue for activity recognition.
1404.6039
Nicolas Charon
Benjamin Charlier (UM2), Nicolas Charon (DIKU, CMLA), Alain Trouv\'e (CMLA)
The fshape framework for the variability analysis of functional shapes
null
null
null
null
cs.CG cs.CV math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a full mathematical and numerical framework for treating functional shapes (or fshapes) following the landmarks of shape spaces and shape analysis. Functional shapes can be described as signal functions supported on varying geometrical supports. Analysing variability of fshapes' ensembles require the modelling and quantification of joint variations in geometry and signal, which have been treated separately in previous approaches. Instead, building on the ideas of shape spaces for purely geometrical objects, we propose the extended concept of fshape bundles and define Riemannian metrics for fshape metamorphoses to model geometrico-functional transformations within these bundles. We also generalize previous works on data attachment terms based on the notion of varifolds and demonstrate the utility of these distances. Based on these, we propose variational formulations of the atlas estimation problem on populations of fshapes and prove existence of solutions for the different models. The second part of the article examines the numerical implementation of the models by detailing discrete expressions for the metrics and gradients and proposing an optimization scheme for the atlas estimation problem. We present a few results of the methodology on a synthetic dataset as well as on a population of retinal membranes with thickness maps.
[ { "version": "v1", "created": "Thu, 24 Apr 2014 06:23:30 GMT" } ]
2014-04-25T00:00:00
[ [ "Charlier", "Benjamin", "", "UM2" ], [ "Charon", "Nicolas", "", "DIKU, CMLA" ], [ "Trouvé", "Alain", "", "CMLA" ] ]
TITLE: The fshape framework for the variability analysis of functional shapes ABSTRACT: This article introduces a full mathematical and numerical framework for treating functional shapes (or fshapes) following the landmarks of shape spaces and shape analysis. Functional shapes can be described as signal functions supported on varying geometrical supports. Analysing variability of fshapes' ensembles require the modelling and quantification of joint variations in geometry and signal, which have been treated separately in previous approaches. Instead, building on the ideas of shape spaces for purely geometrical objects, we propose the extended concept of fshape bundles and define Riemannian metrics for fshape metamorphoses to model geometrico-functional transformations within these bundles. We also generalize previous works on data attachment terms based on the notion of varifolds and demonstrate the utility of these distances. Based on these, we propose variational formulations of the atlas estimation problem on populations of fshapes and prove existence of solutions for the different models. The second part of the article examines the numerical implementation of the models by detailing discrete expressions for the metrics and gradients and proposing an optimization scheme for the atlas estimation problem. We present a few results of the methodology on a synthetic dataset as well as on a population of retinal membranes with thickness maps.
1404.6103
Avinatan Hassidim
Avinatan Hassidim and Assaf Romm
An Approximate "Law of One Price" in Random Assignment Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Assignment games represent a tractable yet versatile model of two-sided markets with transfers. We study the likely properties of the core of randomly generated assignment games. If the joint productivities of every firm and worker are i.i.d bounded random variables, then with high probability all workers are paid roughly equal wages, and all firms make similar profits. This implies that core allocations vary significantly in balanced markets, but that there is core convergence in even slightly unbalanced markets. For the benchmark case of uniform distribution, we provide a tight bound for the workers' share of the surplus under the firm-optimal core allocation. We present simulation results suggesting that the phenomena analyzed appear even in medium-sized markets. Finally, we briefly discuss the effects of unbounded distributions and the ways in which they may affect wage dispersion.
[ { "version": "v1", "created": "Thu, 24 Apr 2014 12:26:04 GMT" } ]
2014-04-25T00:00:00
[ [ "Hassidim", "Avinatan", "" ], [ "Romm", "Assaf", "" ] ]
TITLE: An Approximate "Law of One Price" in Random Assignment Games ABSTRACT: Assignment games represent a tractable yet versatile model of two-sided markets with transfers. We study the likely properties of the core of randomly generated assignment games. If the joint productivities of every firm and worker are i.i.d bounded random variables, then with high probability all workers are paid roughly equal wages, and all firms make similar profits. This implies that core allocations vary significantly in balanced markets, but that there is core convergence in even slightly unbalanced markets. For the benchmark case of uniform distribution, we provide a tight bound for the workers' share of the surplus under the firm-optimal core allocation. We present simulation results suggesting that the phenomena analyzed appear even in medium-sized markets. Finally, we briefly discuss the effects of unbounded distributions and the ways in which they may affect wage dispersion.
1404.6151
Rajib Rana
Rajib Rana, Mingrui Yang, Tim Wark, Chun Tung Chou, Wen Hu
SimpleTrack:Adaptive Trajectory Compression with Deterministic Projection Matrix for Mobile Sensor Networks
null
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some mobile sensor network applications require the sensor nodes to transfer their trajectories to a data sink. This paper proposes an adaptive trajectory (lossy) compression algorithm based on compressive sensing. The algorithm has two innovative elements. First, we propose a method to compute a deterministic projection matrix from a learnt dictionary. Second, we propose a method for the mobile nodes to adaptively predict the number of projections needed based on the speed of the mobile nodes. Extensive evaluation of the proposed algorithm using 6 datasets shows that our proposed algorithm can achieve sub-metre accuracy. In addition, our method of computing projection matrices outperforms two existing methods. Finally, comparison of our algorithm against a state-of-the-art trajectory compression algorithm show that our algorithm can reduce the error by 10-60 cm for the same compression ratio.
[ { "version": "v1", "created": "Wed, 23 Apr 2014 04:30:33 GMT" } ]
2014-04-25T00:00:00
[ [ "Rana", "Rajib", "" ], [ "Yang", "Mingrui", "" ], [ "Wark", "Tim", "" ], [ "Chou", "Chun Tung", "" ], [ "Hu", "Wen", "" ] ]
TITLE: SimpleTrack:Adaptive Trajectory Compression with Deterministic Projection Matrix for Mobile Sensor Networks ABSTRACT: Some mobile sensor network applications require the sensor nodes to transfer their trajectories to a data sink. This paper proposes an adaptive trajectory (lossy) compression algorithm based on compressive sensing. The algorithm has two innovative elements. First, we propose a method to compute a deterministic projection matrix from a learnt dictionary. Second, we propose a method for the mobile nodes to adaptively predict the number of projections needed based on the speed of the mobile nodes. Extensive evaluation of the proposed algorithm using 6 datasets shows that our proposed algorithm can achieve sub-metre accuracy. In addition, our method of computing projection matrices outperforms two existing methods. Finally, comparison of our algorithm against a state-of-the-art trajectory compression algorithm show that our algorithm can reduce the error by 10-60 cm for the same compression ratio.
1303.2132
Xiao-Lei Zhang
Xiao-Lei Zhang
Heuristic Ternary Error-Correcting Output Codes Via Weight Optimization and Layered Clustering-Based Approach
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One important classifier ensemble for multiclass classification problems is Error-Correcting Output Codes (ECOCs). It bridges multiclass problems and binary-class classifiers by decomposing multiclass problems to a serial binary-class problems. In this paper, we present a heuristic ternary code, named Weight Optimization and Layered Clustering-based ECOC (WOLC-ECOC). It starts with an arbitrary valid ECOC and iterates the following two steps until the training risk converges. The first step, named Layered Clustering based ECOC (LC-ECOC), constructs multiple strong classifiers on the most confusing binary-class problem. The second step adds the new classifiers to ECOC by a novel Optimized Weighted (OW) decoding algorithm, where the optimization problem of the decoding is solved by the cutting plane algorithm. Technically, LC-ECOC makes the heuristic training process not blocked by some difficult binary-class problem. OW decoding guarantees the non-increase of the training risk for ensuring a small code length. Results on 14 UCI datasets and a music genre classification problem demonstrate the effectiveness of WOLC-ECOC.
[ { "version": "v1", "created": "Fri, 8 Mar 2013 21:40:42 GMT" }, { "version": "v2", "created": "Wed, 23 Apr 2014 00:59:58 GMT" } ]
2014-04-24T00:00:00
[ [ "Zhang", "Xiao-Lei", "" ] ]
TITLE: Heuristic Ternary Error-Correcting Output Codes Via Weight Optimization and Layered Clustering-Based Approach ABSTRACT: One important classifier ensemble for multiclass classification problems is Error-Correcting Output Codes (ECOCs). It bridges multiclass problems and binary-class classifiers by decomposing multiclass problems to a serial binary-class problems. In this paper, we present a heuristic ternary code, named Weight Optimization and Layered Clustering-based ECOC (WOLC-ECOC). It starts with an arbitrary valid ECOC and iterates the following two steps until the training risk converges. The first step, named Layered Clustering based ECOC (LC-ECOC), constructs multiple strong classifiers on the most confusing binary-class problem. The second step adds the new classifiers to ECOC by a novel Optimized Weighted (OW) decoding algorithm, where the optimization problem of the decoding is solved by the cutting plane algorithm. Technically, LC-ECOC makes the heuristic training process not blocked by some difficult binary-class problem. OW decoding guarantees the non-increase of the training risk for ensuring a small code length. Results on 14 UCI datasets and a music genre classification problem demonstrate the effectiveness of WOLC-ECOC.
1305.4076
Fuqiang Chen
Fu-qiang Chen, Yan Wu, Guo-dong Zhao, Jun-ming Zhang, Ming Zhu, Jing Bai
Contractive De-noising Auto-encoder
Figures edited
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Auto-encoder is a special kind of neural network based on reconstruction. De-noising auto-encoder (DAE) is an improved auto-encoder which is robust to the input by corrupting the original data first and then reconstructing the original input by minimizing the reconstruction error function. And contractive auto-encoder (CAE) is another kind of improved auto-encoder to learn robust feature by introducing the Frobenius norm of the Jacobean matrix of the learned feature with respect to the original input. In this paper, we combine de-noising auto-encoder and contractive auto- encoder, and propose another improved auto-encoder, contractive de-noising auto- encoder (CDAE), which is robust to both the original input and the learned feature. We stack CDAE to extract more abstract features and apply SVM for classification. The experiment result on benchmark dataset MNIST shows that our proposed CDAE performed better than both DAE and CAE, proving the effective of our method.
[ { "version": "v1", "created": "Fri, 17 May 2013 13:42:49 GMT" }, { "version": "v2", "created": "Thu, 23 May 2013 04:22:44 GMT" }, { "version": "v3", "created": "Thu, 30 May 2013 00:01:45 GMT" }, { "version": "v4", "created": "Mon, 10 Mar 2014 13:41:32 GMT" }, { "version": "v5", "created": "Wed, 23 Apr 2014 11:40:12 GMT" } ]
2014-04-24T00:00:00
[ [ "Chen", "Fu-qiang", "" ], [ "Wu", "Yan", "" ], [ "Zhao", "Guo-dong", "" ], [ "Zhang", "Jun-ming", "" ], [ "Zhu", "Ming", "" ], [ "Bai", "Jing", "" ] ]
TITLE: Contractive De-noising Auto-encoder ABSTRACT: Auto-encoder is a special kind of neural network based on reconstruction. De-noising auto-encoder (DAE) is an improved auto-encoder which is robust to the input by corrupting the original data first and then reconstructing the original input by minimizing the reconstruction error function. And contractive auto-encoder (CAE) is another kind of improved auto-encoder to learn robust feature by introducing the Frobenius norm of the Jacobean matrix of the learned feature with respect to the original input. In this paper, we combine de-noising auto-encoder and contractive auto- encoder, and propose another improved auto-encoder, contractive de-noising auto- encoder (CDAE), which is robust to both the original input and the learned feature. We stack CDAE to extract more abstract features and apply SVM for classification. The experiment result on benchmark dataset MNIST shows that our proposed CDAE performed better than both DAE and CAE, proving the effective of our method.
1404.5765
Daniel Wolf
Daniel Wolf, Markus Bajones, Johann Prankl, Markus Vincze
Find my mug: Efficient object search with a mobile robot using semantic segmentation
Part of the OAGM 2014 proceedings (arXiv:1404.3538)
null
null
OAGM/2014/14
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an efficient semantic segmentation framework for indoor scenes, tailored to the application on a mobile robot. Semantic segmentation can help robots to gain a reasonable understanding of their environment, but to reach this goal, the algorithms not only need to be accurate, but also fast and robust. Therefore, we developed an optimized 3D point cloud processing framework based on a Randomized Decision Forest, achieving competitive results at sufficiently high frame rates. We evaluate the capabilities of our method on the popular NYU depth dataset and our own data and demonstrate its feasibility by deploying it on a mobile service robot, for which we could optimize an object search procedure using our results.
[ { "version": "v1", "created": "Wed, 23 Apr 2014 09:48:30 GMT" } ]
2014-04-24T00:00:00
[ [ "Wolf", "Daniel", "" ], [ "Bajones", "Markus", "" ], [ "Prankl", "Johann", "" ], [ "Vincze", "Markus", "" ] ]
TITLE: Find my mug: Efficient object search with a mobile robot using semantic segmentation ABSTRACT: In this paper, we propose an efficient semantic segmentation framework for indoor scenes, tailored to the application on a mobile robot. Semantic segmentation can help robots to gain a reasonable understanding of their environment, but to reach this goal, the algorithms not only need to be accurate, but also fast and robust. Therefore, we developed an optimized 3D point cloud processing framework based on a Randomized Decision Forest, achieving competitive results at sufficiently high frame rates. We evaluate the capabilities of our method on the popular NYU depth dataset and our own data and demonstrate its feasibility by deploying it on a mobile service robot, for which we could optimize an object search procedure using our results.
1212.4898
Baosen Zhang
Baosen Zhang and Ram Rajagopal and David Tse
Network Risk Limiting Dispatch: Optimal Control and Price of Uncertainty
To Appear in IEEE transaction on automatic control, shorter version presented in Allerton
null
null
null
math.OC cs.IT cs.SY math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Increased uncertainty due to high penetration of renewables imposes significant costs to the system operators. The added costs depend on several factors including market design, performance of renewable generation forecasting and the specific dispatch procedure. Quantifying these costs has been limited to small sample Monte Carlo approaches applied specific dispatch algorithms. The computational complexity and accuracy of these approaches has limited the understanding of tradeoffs between different factors. {In this work we consider a two-stage stochastic economic dispatch problem. Our goal is to provide an analytical quantification and an intuitive understanding of the effects of uncertainties and network congestion on the dispatch procedure and the optimal cost.} We first consider an uncongested network and calculate the risk limiting dispatch. In addition, we derive the price of uncertainty, a number that characterizes the intrinsic impact of uncertainty on the integration cost of renewables. Then we extend the results to a network where one link can become congested. Under mild conditions, we calculate price of uncertainty even in this case. We show that risk limiting dispatch is given by a set of deterministic equilibrium equations. The dispatch solution yields an important insight: congested links do not create isolated nodes, even in a two-node network. In fact, the network can support backflows in congested links, that are useful to reduce the uncertainty by averaging supply across the network. We demonstrate the performance of our approach in standard IEEE benchmark networks.
[ { "version": "v1", "created": "Thu, 20 Dec 2012 01:13:20 GMT" }, { "version": "v2", "created": "Tue, 22 Apr 2014 17:21:27 GMT" } ]
2014-04-23T00:00:00
[ [ "Zhang", "Baosen", "" ], [ "Rajagopal", "Ram", "" ], [ "Tse", "David", "" ] ]
TITLE: Network Risk Limiting Dispatch: Optimal Control and Price of Uncertainty ABSTRACT: Increased uncertainty due to high penetration of renewables imposes significant costs to the system operators. The added costs depend on several factors including market design, performance of renewable generation forecasting and the specific dispatch procedure. Quantifying these costs has been limited to small sample Monte Carlo approaches applied specific dispatch algorithms. The computational complexity and accuracy of these approaches has limited the understanding of tradeoffs between different factors. {In this work we consider a two-stage stochastic economic dispatch problem. Our goal is to provide an analytical quantification and an intuitive understanding of the effects of uncertainties and network congestion on the dispatch procedure and the optimal cost.} We first consider an uncongested network and calculate the risk limiting dispatch. In addition, we derive the price of uncertainty, a number that characterizes the intrinsic impact of uncertainty on the integration cost of renewables. Then we extend the results to a network where one link can become congested. Under mild conditions, we calculate price of uncertainty even in this case. We show that risk limiting dispatch is given by a set of deterministic equilibrium equations. The dispatch solution yields an important insight: congested links do not create isolated nodes, even in a two-node network. In fact, the network can support backflows in congested links, that are useful to reduce the uncertainty by averaging supply across the network. We demonstrate the performance of our approach in standard IEEE benchmark networks.
1302.0948
Piotr Skowron
Piotr Skowron, Krzysztof Rzadca
Non-monetary fair scheduling---a cooperative game theory approach
null
null
null
null
cs.DC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a multi-organizational system in which each organization contributes processors to the global pool but also jobs to be processed on the common resources. The fairness of the scheduling algorithm is essential for the stability and even for the existence of such systems (as organizations may refuse to join an unfair system). We consider on-line, non-clairvoyant scheduling of sequential jobs. The started jobs cannot be stopped, canceled, preempted, or moved to other processors. We consider identical processors, but most of our results can be extended to related or unrelated processors. We model the fair scheduling problem as a cooperative game and we use the Shapley value to determine the ideal fair schedule. In contrast to the current literature, we do not use money to assess the relative utilities of jobs. Instead, to calculate the contribution of an organization, we determine how the presence of this organization influences the performance of other organizations. Our approach can be used with arbitrary utility function (e.g., flow time, tardiness, resource utilization), but we argue that the utility function should be strategy resilient. The organizations should be discouraged from splitting, merging or delaying their jobs. We present the unique (to within a multiplicative and additive constants) strategy resilient utility function. We show that the problem of fair scheduling is NP-hard and hard to approximate. However, for unit-size jobs, we present an FPRAS. Also, we show that the problem parametrized with the number of organizations is FPT. Although for the large number of the organizations the problem is computationally hard, the presented exponential algorithm can be used as a fairness benchmark.
[ { "version": "v1", "created": "Tue, 5 Feb 2013 06:59:03 GMT" }, { "version": "v2", "created": "Tue, 22 Apr 2014 17:37:13 GMT" } ]
2014-04-23T00:00:00
[ [ "Skowron", "Piotr", "" ], [ "Rzadca", "Krzysztof", "" ] ]
TITLE: Non-monetary fair scheduling---a cooperative game theory approach ABSTRACT: We consider a multi-organizational system in which each organization contributes processors to the global pool but also jobs to be processed on the common resources. The fairness of the scheduling algorithm is essential for the stability and even for the existence of such systems (as organizations may refuse to join an unfair system). We consider on-line, non-clairvoyant scheduling of sequential jobs. The started jobs cannot be stopped, canceled, preempted, or moved to other processors. We consider identical processors, but most of our results can be extended to related or unrelated processors. We model the fair scheduling problem as a cooperative game and we use the Shapley value to determine the ideal fair schedule. In contrast to the current literature, we do not use money to assess the relative utilities of jobs. Instead, to calculate the contribution of an organization, we determine how the presence of this organization influences the performance of other organizations. Our approach can be used with arbitrary utility function (e.g., flow time, tardiness, resource utilization), but we argue that the utility function should be strategy resilient. The organizations should be discouraged from splitting, merging or delaying their jobs. We present the unique (to within a multiplicative and additive constants) strategy resilient utility function. We show that the problem of fair scheduling is NP-hard and hard to approximate. However, for unit-size jobs, we present an FPRAS. Also, we show that the problem parametrized with the number of organizations is FPT. Although for the large number of the organizations the problem is computationally hard, the presented exponential algorithm can be used as a fairness benchmark.
1404.5165
Kian Hsiang Low
Nuo Xu, Kian Hsiang Low, Jie Chen, Keng Kiat Lim, Etkin Baris Ozgul
GP-Localize: Persistent Mobile Robot Localization using Online Sparse Gaussian Process Observation Model
28th AAAI Conference on Artificial Intelligence (AAAI 2014), Extended version with proofs, 10 pages
null
null
null
cs.RO cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Central to robot exploration and mapping is the task of persistent localization in environmental fields characterized by spatially correlated measurements. This paper presents a Gaussian process localization (GP-Localize) algorithm that, in contrast to existing works, can exploit the spatially correlated field measurements taken during a robot's exploration (instead of relying on prior training data) for efficiently and scalably learning the GP observation model online through our proposed novel online sparse GP. As a result, GP-Localize is capable of achieving constant time and memory (i.e., independent of the size of the data) per filtering step, which demonstrates the practical feasibility of using GPs for persistent robot localization and autonomy. Empirical evaluation via simulated experiments with real-world datasets and a real robot experiment shows that GP-Localize outperforms existing GP localization algorithms.
[ { "version": "v1", "created": "Mon, 21 Apr 2014 10:28:00 GMT" }, { "version": "v2", "created": "Tue, 22 Apr 2014 08:03:33 GMT" } ]
2014-04-23T00:00:00
[ [ "Xu", "Nuo", "" ], [ "Low", "Kian Hsiang", "" ], [ "Chen", "Jie", "" ], [ "Lim", "Keng Kiat", "" ], [ "Ozgul", "Etkin Baris", "" ] ]
TITLE: GP-Localize: Persistent Mobile Robot Localization using Online Sparse Gaussian Process Observation Model ABSTRACT: Central to robot exploration and mapping is the task of persistent localization in environmental fields characterized by spatially correlated measurements. This paper presents a Gaussian process localization (GP-Localize) algorithm that, in contrast to existing works, can exploit the spatially correlated field measurements taken during a robot's exploration (instead of relying on prior training data) for efficiently and scalably learning the GP observation model online through our proposed novel online sparse GP. As a result, GP-Localize is capable of achieving constant time and memory (i.e., independent of the size of the data) per filtering step, which demonstrates the practical feasibility of using GPs for persistent robot localization and autonomy. Empirical evaluation via simulated experiments with real-world datasets and a real robot experiment shows that GP-Localize outperforms existing GP localization algorithms.
1210.5288
C. Seshadhri
Nurcan Durak and Tamara G. Kolda and Ali Pinar and C. Seshadhri
A Scalable Null Model for Directed Graphs Matching All Degree Distributions: In, Out, and Reciprocal
Camera ready version for IEEE Workshop on Network Science; fixed some typos in table
Proceedings of IEEE 2013 2nd International Network Science Workshop (NSW 2013), pp. 22--30
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Degree distributions are arguably the most important property of real world networks. The classic edge configuration model or Chung-Lu model can generate an undirected graph with any desired degree distribution. This serves as a good null model to compare algorithms or perform experimental studies. Furthermore, there are scalable algorithms that implement these models and they are invaluable in the study of graphs. However, networks in the real-world are often directed, and have a significant proportion of reciprocal edges. A stronger relation exists between two nodes when they each point to one another (reciprocal edge) as compared to when only one points to the other (one-way edge). Despite their importance, reciprocal edges have been disregarded by most directed graph models. We propose a null model for directed graphs inspired by the Chung-Lu model that matches the in-, out-, and reciprocal-degree distributions of the real graphs. Our algorithm is scalable and requires $O(m)$ random numbers to generate a graph with $m$ edges. We perform a series of experiments on real datasets and compare with existing graph models.
[ { "version": "v1", "created": "Fri, 19 Oct 2012 00:28:05 GMT" }, { "version": "v2", "created": "Mon, 11 Feb 2013 23:28:49 GMT" }, { "version": "v3", "created": "Mon, 18 Mar 2013 19:41:43 GMT" }, { "version": "v4", "created": "Thu, 25 Apr 2013 22:46:06 GMT" } ]
2014-04-22T00:00:00
[ [ "Durak", "Nurcan", "" ], [ "Kolda", "Tamara G.", "" ], [ "Pinar", "Ali", "" ], [ "Seshadhri", "C.", "" ] ]
TITLE: A Scalable Null Model for Directed Graphs Matching All Degree Distributions: In, Out, and Reciprocal ABSTRACT: Degree distributions are arguably the most important property of real world networks. The classic edge configuration model or Chung-Lu model can generate an undirected graph with any desired degree distribution. This serves as a good null model to compare algorithms or perform experimental studies. Furthermore, there are scalable algorithms that implement these models and they are invaluable in the study of graphs. However, networks in the real-world are often directed, and have a significant proportion of reciprocal edges. A stronger relation exists between two nodes when they each point to one another (reciprocal edge) as compared to when only one points to the other (one-way edge). Despite their importance, reciprocal edges have been disregarded by most directed graph models. We propose a null model for directed graphs inspired by the Chung-Lu model that matches the in-, out-, and reciprocal-degree distributions of the real graphs. Our algorithm is scalable and requires $O(m)$ random numbers to generate a graph with $m$ edges. We perform a series of experiments on real datasets and compare with existing graph models.
1404.4865
Huangxin Wang
Huangxin Wang and Jean X. Zhang and Fei Li
On Time-Sensitive Revenue Management and Energy Scheduling in Green Data Centers
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we design an analytically and experimentally better online energy and job scheduling algorithm with the objective of maximizing net profit for a service provider in green data centers. We first study the previously known algorithms and conclude that these online algorithms have provable poor performance against their worst-case scenarios. To guarantee an online algorithm's performance in hindsight, we design a randomized algorithm to schedule energy and jobs in the data centers and prove the algorithm's expected competitive ratio in various settings. Our algorithm is theoretical-sound and it outperforms the previously known algorithms in many settings using both real traces and simulated data. An optimal offline algorithm is also implemented as an empirical benchmark.
[ { "version": "v1", "created": "Fri, 18 Apr 2014 19:34:24 GMT" }, { "version": "v2", "created": "Mon, 21 Apr 2014 15:09:46 GMT" } ]
2014-04-22T00:00:00
[ [ "Wang", "Huangxin", "" ], [ "Zhang", "Jean X.", "" ], [ "Li", "Fei", "" ] ]
TITLE: On Time-Sensitive Revenue Management and Energy Scheduling in Green Data Centers ABSTRACT: In this paper, we design an analytically and experimentally better online energy and job scheduling algorithm with the objective of maximizing net profit for a service provider in green data centers. We first study the previously known algorithms and conclude that these online algorithms have provable poor performance against their worst-case scenarios. To guarantee an online algorithm's performance in hindsight, we design a randomized algorithm to schedule energy and jobs in the data centers and prove the algorithm's expected competitive ratio in various settings. Our algorithm is theoretical-sound and it outperforms the previously known algorithms in many settings using both real traces and simulated data. An optimal offline algorithm is also implemented as an empirical benchmark.
1404.4944
Jo\~ao Pedro Pedroso
Jo\~ao Pedro Pedroso and Mikio Kubo and Ana Viana
Unit commitment with valve-point loading effect
null
null
null
DCC-2014-05
math.OC cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Valve-point loading affects the input-output characteristics of generating units, bringing the fuel costs nonlinear and nonsmooth. This has been considered in the solution of load dispatch problems, but not in the planning phase of unit commitment. This paper presents a mathematical optimization model for the thermal unit commitment problem considering valve-point loading. The formulation is based on a careful linearization of the fuel cost function, which is modeled with great detail on power regions being used in the current solution, and roughly on other regions. A set of benchmark instances for this problem is used for analyzing the method, with recourse to a general-purpose mixed-integer optimization solver.
[ { "version": "v1", "created": "Sat, 19 Apr 2014 10:50:16 GMT" } ]
2014-04-22T00:00:00
[ [ "Pedroso", "João Pedro", "" ], [ "Kubo", "Mikio", "" ], [ "Viana", "Ana", "" ] ]
TITLE: Unit commitment with valve-point loading effect ABSTRACT: Valve-point loading affects the input-output characteristics of generating units, bringing the fuel costs nonlinear and nonsmooth. This has been considered in the solution of load dispatch problems, but not in the planning phase of unit commitment. This paper presents a mathematical optimization model for the thermal unit commitment problem considering valve-point loading. The formulation is based on a careful linearization of the fuel cost function, which is modeled with great detail on power regions being used in the current solution, and roughly on other regions. A set of benchmark instances for this problem is used for analyzing the method, with recourse to a general-purpose mixed-integer optimization solver.
1404.5002
Iraj Saniee
Deepak Ajwani, W. Sean Kennedy, Alessandra Sala, Iraj Saniee
A Geometric Distance Oracle for Large Real-World Graphs
15 pages, 9 figures, 3 tables
null
null
null
cs.SI cs.DS
http://creativecommons.org/licenses/publicdomain/
Many graph processing algorithms require determination of shortest-path distances between arbitrary numbers of node pairs. Since computation of exact distances between all node-pairs of a large graph, e.g., 10M nodes and up, is prohibitively expensive both in computational time and storage space, distance approximation is often used in place of exact computation. In this paper, we present a novel and scalable distance oracle that leverages the hyperbolic core of real-world large graphs for fast and scalable distance approximation. We show empirically that the proposed oracle significantly outperforms prior oracles on a random set of test cases drawn from public domain graph libraries. There are two sets of prior work against which we benchmark our approach. The first set, which often outperforms other oracles, employs embedding of the graph into low dimensional Euclidean spaces with carefully constructed hyperbolic distances, but provides no guarantees on the distance estimation error. The second set leverages Gromov-type tree contraction of the graph with the additive error guaranteed not to exceed $2\delta\log{n}$, where $\delta$ is the hyperbolic constant of the graph. We show that our proposed oracle 1) is significantly faster than those oracles that use hyperbolic embedding (first set) with similar approximation error and, perhaps surprisingly, 2) exhibits substantially lower average estimation error compared to Gromov-like tree contractions (second set). We substantiate our claims through numerical computations on a collection of a dozen real world networks and synthetic test cases from multiple domains, ranging in size from 10s of thousand to 10s of millions of nodes.
[ { "version": "v1", "created": "Sun, 20 Apr 2014 02:05:34 GMT" } ]
2014-04-22T00:00:00
[ [ "Ajwani", "Deepak", "" ], [ "Kennedy", "W. Sean", "" ], [ "Sala", "Alessandra", "" ], [ "Saniee", "Iraj", "" ] ]
TITLE: A Geometric Distance Oracle for Large Real-World Graphs ABSTRACT: Many graph processing algorithms require determination of shortest-path distances between arbitrary numbers of node pairs. Since computation of exact distances between all node-pairs of a large graph, e.g., 10M nodes and up, is prohibitively expensive both in computational time and storage space, distance approximation is often used in place of exact computation. In this paper, we present a novel and scalable distance oracle that leverages the hyperbolic core of real-world large graphs for fast and scalable distance approximation. We show empirically that the proposed oracle significantly outperforms prior oracles on a random set of test cases drawn from public domain graph libraries. There are two sets of prior work against which we benchmark our approach. The first set, which often outperforms other oracles, employs embedding of the graph into low dimensional Euclidean spaces with carefully constructed hyperbolic distances, but provides no guarantees on the distance estimation error. The second set leverages Gromov-type tree contraction of the graph with the additive error guaranteed not to exceed $2\delta\log{n}$, where $\delta$ is the hyperbolic constant of the graph. We show that our proposed oracle 1) is significantly faster than those oracles that use hyperbolic embedding (first set) with similar approximation error and, perhaps surprisingly, 2) exhibits substantially lower average estimation error compared to Gromov-like tree contractions (second set). We substantiate our claims through numerical computations on a collection of a dozen real world networks and synthetic test cases from multiple domains, ranging in size from 10s of thousand to 10s of millions of nodes.
1404.5214
Ping Li
Anshumali Shrivastava and Ping Li
Graph Kernels via Functional Embedding
null
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a representation of graph as a functional object derived from the power iteration of the underlying adjacency matrix. The proposed functional representation is a graph invariant, i.e., the functional remains unchanged under any reordering of the vertices. This property eliminates the difficulty of handling exponentially many isomorphic forms. Bhattacharyya kernel constructed between these functionals significantly outperforms the state-of-the-art graph kernels on 3 out of the 4 standard benchmark graph classification datasets, demonstrating the superiority of our approach. The proposed methodology is simple and runs in time linear in the number of edges, which makes our kernel more efficient and scalable compared to many widely adopted graph kernels with running time cubic in the number of vertices.
[ { "version": "v1", "created": "Mon, 21 Apr 2014 14:56:17 GMT" } ]
2014-04-22T00:00:00
[ [ "Shrivastava", "Anshumali", "" ], [ "Li", "Ping", "" ] ]
TITLE: Graph Kernels via Functional Embedding ABSTRACT: We propose a representation of graph as a functional object derived from the power iteration of the underlying adjacency matrix. The proposed functional representation is a graph invariant, i.e., the functional remains unchanged under any reordering of the vertices. This property eliminates the difficulty of handling exponentially many isomorphic forms. Bhattacharyya kernel constructed between these functionals significantly outperforms the state-of-the-art graph kernels on 3 out of the 4 standard benchmark graph classification datasets, demonstrating the superiority of our approach. The proposed methodology is simple and runs in time linear in the number of edges, which makes our kernel more efficient and scalable compared to many widely adopted graph kernels with running time cubic in the number of vertices.
1404.4644
Ping Li
Anshumali Shrivastava and Ping Li
A New Space for Comparing Graphs
null
null
null
null
stat.ME cs.IR cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding a new mathematical representations for graph, which allows direct comparison between different graph structures, is an open-ended research direction. Having such a representation is the first prerequisite for a variety of machine learning algorithms like classification, clustering, etc., over graph datasets. In this paper, we propose a symmetric positive semidefinite matrix with the $(i,j)$-{th} entry equal to the covariance between normalized vectors $A^ie$ and $A^je$ ($e$ being vector of all ones) as a representation for graph with adjacency matrix $A$. We show that the proposed matrix representation encodes the spectrum of the underlying adjacency matrix and it also contains information about the counts of small sub-structures present in the graph such as triangles and small paths. In addition, we show that this matrix is a \emph{"graph invariant"}. All these properties make the proposed matrix a suitable object for representing graphs. The representation, being a covariance matrix in a fixed dimensional metric space, gives a mathematical embedding for graphs. This naturally leads to a measure of similarity on graph objects. We define similarity between two given graphs as a Bhattacharya similarity measure between their corresponding covariance matrix representations. As shown in our experimental study on the task of social network classification, such a similarity measure outperforms other widely used state-of-the-art methodologies. Our proposed method is also computationally efficient. The computation of both the matrix representation and the similarity value can be performed in operations linear in the number of edges. This makes our method scalable in practice. We believe our theoretical and empirical results provide evidence for studying truncated power iterations, of the adjacency matrix, to characterize social networks.
[ { "version": "v1", "created": "Thu, 17 Apr 2014 20:39:24 GMT" } ]
2014-04-21T00:00:00
[ [ "Shrivastava", "Anshumali", "" ], [ "Li", "Ping", "" ] ]
TITLE: A New Space for Comparing Graphs ABSTRACT: Finding a new mathematical representations for graph, which allows direct comparison between different graph structures, is an open-ended research direction. Having such a representation is the first prerequisite for a variety of machine learning algorithms like classification, clustering, etc., over graph datasets. In this paper, we propose a symmetric positive semidefinite matrix with the $(i,j)$-{th} entry equal to the covariance between normalized vectors $A^ie$ and $A^je$ ($e$ being vector of all ones) as a representation for graph with adjacency matrix $A$. We show that the proposed matrix representation encodes the spectrum of the underlying adjacency matrix and it also contains information about the counts of small sub-structures present in the graph such as triangles and small paths. In addition, we show that this matrix is a \emph{"graph invariant"}. All these properties make the proposed matrix a suitable object for representing graphs. The representation, being a covariance matrix in a fixed dimensional metric space, gives a mathematical embedding for graphs. This naturally leads to a measure of similarity on graph objects. We define similarity between two given graphs as a Bhattacharya similarity measure between their corresponding covariance matrix representations. As shown in our experimental study on the task of social network classification, such a similarity measure outperforms other widely used state-of-the-art methodologies. Our proposed method is also computationally efficient. The computation of both the matrix representation and the similarity value can be performed in operations linear in the number of edges. This makes our method scalable in practice. We believe our theoretical and empirical results provide evidence for studying truncated power iterations, of the adjacency matrix, to characterize social networks.
1404.4800
Ayushi Sinha
Ayushi Sinha, William Gray Roncal, Narayanan Kasthuri, Ming Chuang, Priya Manavalan, Dean M. Kleissas, Joshua T. Vogelstein, R. Jacob Vogelstein, Randal Burns, Jeff W. Lichtman, Michael Kazhdan
Automatic Annotation of Axoplasmic Reticula in Pursuit of Connectomes
2 pages, 1 figure
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new pipeline which automatically identifies and annotates axoplasmic reticula, which are small subcellular structures present only in axons. We run our algorithm on the Kasthuri11 dataset, which was color corrected using gradient-domain techniques to adjust contrast. We use a bilateral filter to smooth out the noise in this data while preserving edges, which highlights axoplasmic reticula. These axoplasmic reticula are then annotated using a morphological region growing algorithm. Additionally, we perform Laplacian sharpening on the bilaterally filtered data to enhance edges, and repeat the morphological region growing algorithm to annotate more axoplasmic reticula. We track our annotations through the slices to improve precision, and to create long objects to aid in segment merging. This method annotates axoplasmic reticula with high precision. Our algorithm can easily be adapted to annotate axoplasmic reticula in different sets of brain data by changing a few thresholds. The contribution of this work is the introduction of a straightforward and robust pipeline which annotates axoplasmic reticula with high precision, contributing towards advancements in automatic feature annotations in neural EM data.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 20:09:37 GMT" } ]
2014-04-21T00:00:00
[ [ "Sinha", "Ayushi", "" ], [ "Roncal", "William Gray", "" ], [ "Kasthuri", "Narayanan", "" ], [ "Chuang", "Ming", "" ], [ "Manavalan", "Priya", "" ], [ "Kleissas", "Dean M.", "" ], [ "Vogelstein", "Joshua T.", "" ], [ "Vogelstein", "R. Jacob", "" ], [ "Burns", "Randal", "" ], [ "Lichtman", "Jeff W.", "" ], [ "Kazhdan", "Michael", "" ] ]
TITLE: Automatic Annotation of Axoplasmic Reticula in Pursuit of Connectomes ABSTRACT: In this paper, we present a new pipeline which automatically identifies and annotates axoplasmic reticula, which are small subcellular structures present only in axons. We run our algorithm on the Kasthuri11 dataset, which was color corrected using gradient-domain techniques to adjust contrast. We use a bilateral filter to smooth out the noise in this data while preserving edges, which highlights axoplasmic reticula. These axoplasmic reticula are then annotated using a morphological region growing algorithm. Additionally, we perform Laplacian sharpening on the bilaterally filtered data to enhance edges, and repeat the morphological region growing algorithm to annotate more axoplasmic reticula. We track our annotations through the slices to improve precision, and to create long objects to aid in segment merging. This method annotates axoplasmic reticula with high precision. Our algorithm can easily be adapted to annotate axoplasmic reticula in different sets of brain data by changing a few thresholds. The contribution of this work is the introduction of a straightforward and robust pipeline which annotates axoplasmic reticula with high precision, contributing towards advancements in automatic feature annotations in neural EM data.
1404.4038
Grigorios Tsoumakas
Christina Papagiannopoulou, Grigorios Tsoumakas, Ioannis Tsamardinos
Discovering and Exploiting Entailment Relationships in Multi-Label Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents a sound probabilistic method for enforcing adherence of the marginal probabilities of a multi-label model to automatically discovered deterministic relationships among labels. In particular we focus on discovering two kinds of relationships among the labels. The first one concerns pairwise positive entailement: pairs of labels, where the presence of one implies the presence of the other in all instances of a dataset. The second concerns exclusion: sets of labels that do not coexist in the same instances of the dataset. These relationships are represented with a Bayesian network. Marginal probabilities are entered as soft evidence in the network and adjusted through probabilistic inference. Our approach offers robust improvements in mean average precision compared to the standard binary relavance approach across all 12 datasets involved in our experiments. The discovery process helps interesting implicit knowledge to emerge, which could be useful in itself.
[ { "version": "v1", "created": "Tue, 15 Apr 2014 19:47:15 GMT" }, { "version": "v2", "created": "Thu, 17 Apr 2014 16:05:57 GMT" } ]
2014-04-18T00:00:00
[ [ "Papagiannopoulou", "Christina", "" ], [ "Tsoumakas", "Grigorios", "" ], [ "Tsamardinos", "Ioannis", "" ] ]
TITLE: Discovering and Exploiting Entailment Relationships in Multi-Label Learning ABSTRACT: This work presents a sound probabilistic method for enforcing adherence of the marginal probabilities of a multi-label model to automatically discovered deterministic relationships among labels. In particular we focus on discovering two kinds of relationships among the labels. The first one concerns pairwise positive entailement: pairs of labels, where the presence of one implies the presence of the other in all instances of a dataset. The second concerns exclusion: sets of labels that do not coexist in the same instances of the dataset. These relationships are represented with a Bayesian network. Marginal probabilities are entered as soft evidence in the network and adjusted through probabilistic inference. Our approach offers robust improvements in mean average precision compared to the standard binary relavance approach across all 12 datasets involved in our experiments. The discovery process helps interesting implicit knowledge to emerge, which could be useful in itself.
1311.2012
Wei Yang
Wei Yang and Giuseppe Durisi and Tobias Koch and Yury Polyanskiy
Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength
To appear in the IEEE Transactions on Information Theory. The conditions under which Theorem 9 holds are now milder
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the maximal achievable rate for a given blocklength and error probability over quasi-static multiple-input multiple-output (MIMO) fading channels, with and without channel state information (CSI) at the transmitter and/or the receiver. The principal finding is that outage capacity, despite being an asymptotic quantity, is a sharp proxy for the finite-blocklength fundamental limits of slow-fading channels. Specifically, the channel dispersion is shown to be zero regardless of whether the fading realizations are available at both transmitter and receiver, at only one of them, or at neither of them. These results follow from analytically tractable converse and achievability bounds. Numerical evaluation of these bounds verifies that zero dispersion may indeed imply fast convergence to the outage capacity as the blocklength increases. In the example of a particular $1 \times 2$ single-input multiple-output (SIMO) Rician fading channel, the blocklength required to achieve $90\%$ of capacity is about an order of magnitude smaller compared to the blocklength required for an AWGN channel with the same capacity. For this specific scenario, the coding/decoding schemes adopted in the LTE-Advanced standard are benchmarked against the finite-blocklength achievability and converse bounds.
[ { "version": "v1", "created": "Fri, 8 Nov 2013 16:13:43 GMT" }, { "version": "v2", "created": "Wed, 16 Apr 2014 12:21:52 GMT" } ]
2014-04-17T00:00:00
[ [ "Yang", "Wei", "" ], [ "Durisi", "Giuseppe", "" ], [ "Koch", "Tobias", "" ], [ "Polyanskiy", "Yury", "" ] ]
TITLE: Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength ABSTRACT: This paper investigates the maximal achievable rate for a given blocklength and error probability over quasi-static multiple-input multiple-output (MIMO) fading channels, with and without channel state information (CSI) at the transmitter and/or the receiver. The principal finding is that outage capacity, despite being an asymptotic quantity, is a sharp proxy for the finite-blocklength fundamental limits of slow-fading channels. Specifically, the channel dispersion is shown to be zero regardless of whether the fading realizations are available at both transmitter and receiver, at only one of them, or at neither of them. These results follow from analytically tractable converse and achievability bounds. Numerical evaluation of these bounds verifies that zero dispersion may indeed imply fast convergence to the outage capacity as the blocklength increases. In the example of a particular $1 \times 2$ single-input multiple-output (SIMO) Rician fading channel, the blocklength required to achieve $90\%$ of capacity is about an order of magnitude smaller compared to the blocklength required for an AWGN channel with the same capacity. For this specific scenario, the coding/decoding schemes adopted in the LTE-Advanced standard are benchmarked against the finite-blocklength achievability and converse bounds.
1403.4640
Nabeel Gillani
Nabeel Gillani, Rebecca Eynon, Michael Osborne, Isis Hjorth, Stephen Roberts
Communication Communities in MOOCs
10 pages, 3 figures, 1 table. Submitted for review to UAI 2014
null
null
null
cs.CY cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive Open Online Courses (MOOCs) bring together thousands of people from different geographies and demographic backgrounds -- but to date, little is known about how they learn or communicate. We introduce a new content-analysed MOOC dataset and use Bayesian Non-negative Matrix Factorization (BNMF) to extract communities of learners based on the nature of their online forum posts. We see that BNMF yields a superior probabilistic generative model for online discussions when compared to other models, and that the communities it learns are differentiated by their composite students' demographic and course performance indicators. These findings suggest that computationally efficient probabilistic generative modelling of MOOCs can reveal important insights for educational researchers and practitioners and help to develop more intelligent and responsive online learning environments.
[ { "version": "v1", "created": "Tue, 18 Mar 2014 22:57:24 GMT" }, { "version": "v2", "created": "Wed, 16 Apr 2014 15:50:48 GMT" } ]
2014-04-17T00:00:00
[ [ "Gillani", "Nabeel", "" ], [ "Eynon", "Rebecca", "" ], [ "Osborne", "Michael", "" ], [ "Hjorth", "Isis", "" ], [ "Roberts", "Stephen", "" ] ]
TITLE: Communication Communities in MOOCs ABSTRACT: Massive Open Online Courses (MOOCs) bring together thousands of people from different geographies and demographic backgrounds -- but to date, little is known about how they learn or communicate. We introduce a new content-analysed MOOC dataset and use Bayesian Non-negative Matrix Factorization (BNMF) to extract communities of learners based on the nature of their online forum posts. We see that BNMF yields a superior probabilistic generative model for online discussions when compared to other models, and that the communities it learns are differentiated by their composite students' demographic and course performance indicators. These findings suggest that computationally efficient probabilistic generative modelling of MOOCs can reveal important insights for educational researchers and practitioners and help to develop more intelligent and responsive online learning environments.
1404.1377
Zheng Wang
Zheng Wang, Ming-Jun Lai, Zhaosong Lu, Wei Fan, Hasan Davulcu and Jieping Ye
Orthogonal Rank-One Matrix Pursuit for Low Rank Matrix Completion
null
null
null
null
cs.LG math.NA stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an efficient and scalable low rank matrix completion algorithm. The key idea is to extend orthogonal matching pursuit method from the vector case to the matrix case. We further propose an economic version of our algorithm by introducing a novel weight updating rule to reduce the time and storage complexity. Both versions are computationally inexpensive for each matrix pursuit iteration, and find satisfactory results in a few iterations. Another advantage of our proposed algorithm is that it has only one tunable parameter, which is the rank. It is easy to understand and to use by the user. This becomes especially important in large-scale learning problems. In addition, we rigorously show that both versions achieve a linear convergence rate, which is significantly better than the previous known results. We also empirically compare the proposed algorithms with several state-of-the-art matrix completion algorithms on many real-world datasets, including the large-scale recommendation dataset Netflix as well as the MovieLens datasets. Numerical results show that our proposed algorithm is more efficient than competing algorithms while achieving similar or better prediction performance.
[ { "version": "v1", "created": "Fri, 4 Apr 2014 20:00:30 GMT" }, { "version": "v2", "created": "Wed, 16 Apr 2014 19:09:09 GMT" } ]
2014-04-17T00:00:00
[ [ "Wang", "Zheng", "" ], [ "Lai", "Ming-Jun", "" ], [ "Lu", "Zhaosong", "" ], [ "Fan", "Wei", "" ], [ "Davulcu", "Hasan", "" ], [ "Ye", "Jieping", "" ] ]
TITLE: Orthogonal Rank-One Matrix Pursuit for Low Rank Matrix Completion ABSTRACT: In this paper, we propose an efficient and scalable low rank matrix completion algorithm. The key idea is to extend orthogonal matching pursuit method from the vector case to the matrix case. We further propose an economic version of our algorithm by introducing a novel weight updating rule to reduce the time and storage complexity. Both versions are computationally inexpensive for each matrix pursuit iteration, and find satisfactory results in a few iterations. Another advantage of our proposed algorithm is that it has only one tunable parameter, which is the rank. It is easy to understand and to use by the user. This becomes especially important in large-scale learning problems. In addition, we rigorously show that both versions achieve a linear convergence rate, which is significantly better than the previous known results. We also empirically compare the proposed algorithms with several state-of-the-art matrix completion algorithms on many real-world datasets, including the large-scale recommendation dataset Netflix as well as the MovieLens datasets. Numerical results show that our proposed algorithm is more efficient than competing algorithms while achieving similar or better prediction performance.
1404.3543
Ping Luo
Zhenyao Zhu and Ping Luo and Xiaogang Wang and Xiaoou Tang
Recover Canonical-View Faces in the Wild with Deep Neural Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face images in the wild undergo large intra-personal variations, such as poses, illuminations, occlusions, and low resolutions, which cause great challenges to face-related applications. This paper addresses this challenge by proposing a new deep learning framework that can recover the canonical view of face images. It dramatically reduces the intra-person variances, while maintaining the inter-person discriminativeness. Unlike the existing face reconstruction methods that were either evaluated in controlled 2D environment or employed 3D information, our approach directly learns the transformation from the face images with a complex set of variations to their canonical views. At the training stage, to avoid the costly process of labeling canonical-view images from the training set by hand, we have devised a new measurement to automatically select or synthesize a canonical-view image for each identity. As an application, this face recovery approach is used for face verification. Facial features are learned from the recovered canonical-view face images by using a facial component-based convolutional neural network. Our approach achieves the state-of-the-art performance on the LFW dataset.
[ { "version": "v1", "created": "Mon, 14 Apr 2014 11:32:17 GMT" }, { "version": "v2", "created": "Wed, 16 Apr 2014 04:35:34 GMT" } ]
2014-04-17T00:00:00
[ [ "Zhu", "Zhenyao", "" ], [ "Luo", "Ping", "" ], [ "Wang", "Xiaogang", "" ], [ "Tang", "Xiaoou", "" ] ]
TITLE: Recover Canonical-View Faces in the Wild with Deep Neural Networks ABSTRACT: Face images in the wild undergo large intra-personal variations, such as poses, illuminations, occlusions, and low resolutions, which cause great challenges to face-related applications. This paper addresses this challenge by proposing a new deep learning framework that can recover the canonical view of face images. It dramatically reduces the intra-person variances, while maintaining the inter-person discriminativeness. Unlike the existing face reconstruction methods that were either evaluated in controlled 2D environment or employed 3D information, our approach directly learns the transformation from the face images with a complex set of variations to their canonical views. At the training stage, to avoid the costly process of labeling canonical-view images from the training set by hand, we have devised a new measurement to automatically select or synthesize a canonical-view image for each identity. As an application, this face recovery approach is used for face verification. Facial features are learned from the recovered canonical-view face images by using a facial component-based convolutional neural network. Our approach achieves the state-of-the-art performance on the LFW dataset.
1404.4171
Ning Chen
Ning Chen, Jun Zhu, Jianfei Chen, Bo Zhang
Dropout Training for Support Vector Machines
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dropout and other feature noising schemes have shown promising results in controlling over-fitting by artificially corrupting the training data. Though extensive theoretical and empirical studies have been performed for generalized linear models, little work has been done for support vector machines (SVMs), one of the most successful approaches for supervised learning. This paper presents dropout training for linear SVMs. To deal with the intractable expectation of the non-smooth hinge loss under corrupting distributions, we develop an iteratively re-weighted least square (IRLS) algorithm by exploring data augmentation techniques. Our algorithm iteratively minimizes the expectation of a re-weighted least square problem, where the re-weights have closed-form solutions. The similar ideas are applied to develop a new IRLS algorithm for the expected logistic loss under corrupting distributions. Our algorithms offer insights on the connection and difference between the hinge loss and logistic loss in dropout training. Empirical results on several real datasets demonstrate the effectiveness of dropout training on significantly boosting the classification accuracy of linear SVMs.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 08:54:01 GMT" } ]
2014-04-17T00:00:00
[ [ "Chen", "Ning", "" ], [ "Zhu", "Jun", "" ], [ "Chen", "Jianfei", "" ], [ "Zhang", "Bo", "" ] ]
TITLE: Dropout Training for Support Vector Machines ABSTRACT: Dropout and other feature noising schemes have shown promising results in controlling over-fitting by artificially corrupting the training data. Though extensive theoretical and empirical studies have been performed for generalized linear models, little work has been done for support vector machines (SVMs), one of the most successful approaches for supervised learning. This paper presents dropout training for linear SVMs. To deal with the intractable expectation of the non-smooth hinge loss under corrupting distributions, we develop an iteratively re-weighted least square (IRLS) algorithm by exploring data augmentation techniques. Our algorithm iteratively minimizes the expectation of a re-weighted least square problem, where the re-weights have closed-form solutions. The similar ideas are applied to develop a new IRLS algorithm for the expected logistic loss under corrupting distributions. Our algorithms offer insights on the connection and difference between the hinge loss and logistic loss in dropout training. Empirical results on several real datasets demonstrate the effectiveness of dropout training on significantly boosting the classification accuracy of linear SVMs.
1404.4175
Emanuele Olivetti
Emanuele Olivetti, Seyed Mostafa Kia, Paolo Avesani
MEG Decoding Across Subjects
null
null
null
null
stat.ML cs.LG q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Brain decoding is a data analysis paradigm for neuroimaging experiments that is based on predicting the stimulus presented to the subject from the concurrent brain activity. In order to make inference at the group level, a straightforward but sometimes unsuccessful approach is to train a classifier on the trials of a group of subjects and then to test it on unseen trials from new subjects. The extreme difficulty is related to the structural and functional variability across the subjects. We call this approach "decoding across subjects". In this work, we address the problem of decoding across subjects for magnetoencephalographic (MEG) experiments and we provide the following contributions: first, we formally describe the problem and show that it belongs to a machine learning sub-field called transductive transfer learning (TTL). Second, we propose to use a simple TTL technique that accounts for the differences between train data and test data. Third, we propose the use of ensemble learning, and specifically of stacked generalization, to address the variability across subjects within train data, with the aim of producing more stable classifiers. On a face vs. scramble task MEG dataset of 16 subjects, we compare the standard approach of not modelling the differences across subjects, to the proposed one of combining TTL and ensemble learning. We show that the proposed approach is consistently more accurate than the standard one.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 09:21:26 GMT" } ]
2014-04-17T00:00:00
[ [ "Olivetti", "Emanuele", "" ], [ "Kia", "Seyed Mostafa", "" ], [ "Avesani", "Paolo", "" ] ]
TITLE: MEG Decoding Across Subjects ABSTRACT: Brain decoding is a data analysis paradigm for neuroimaging experiments that is based on predicting the stimulus presented to the subject from the concurrent brain activity. In order to make inference at the group level, a straightforward but sometimes unsuccessful approach is to train a classifier on the trials of a group of subjects and then to test it on unseen trials from new subjects. The extreme difficulty is related to the structural and functional variability across the subjects. We call this approach "decoding across subjects". In this work, we address the problem of decoding across subjects for magnetoencephalographic (MEG) experiments and we provide the following contributions: first, we formally describe the problem and show that it belongs to a machine learning sub-field called transductive transfer learning (TTL). Second, we propose to use a simple TTL technique that accounts for the differences between train data and test data. Third, we propose the use of ensemble learning, and specifically of stacked generalization, to address the variability across subjects within train data, with the aim of producing more stable classifiers. On a face vs. scramble task MEG dataset of 16 subjects, we compare the standard approach of not modelling the differences across subjects, to the proposed one of combining TTL and ensemble learning. We show that the proposed approach is consistently more accurate than the standard one.
1404.4316
Xiaoyu Wang
Will Y. Zou, Xiaoyu Wang, Miao Sun, Yuanqing Lin
Generic Object Detection With Dense Neural Patterns and Regionlets
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the challenge of establishing a bridge between deep convolutional neural networks and conventional object detection frameworks for accurate and efficient generic object detection. We introduce Dense Neural Patterns, short for DNPs, which are dense local features derived from discriminatively trained deep convolutional neural networks. DNPs can be easily plugged into conventional detection frameworks in the same way as other dense local features(like HOG or LBP). The effectiveness of the proposed approach is demonstrated with the Regionlets object detection framework. It achieved 46.1% mean average precision on the PASCAL VOC 2007 dataset, and 44.1% on the PASCAL VOC 2010 dataset, which dramatically improves the original Regionlets approach without DNPs.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 17:23:47 GMT" } ]
2014-04-17T00:00:00
[ [ "Zou", "Will Y.", "" ], [ "Wang", "Xiaoyu", "" ], [ "Sun", "Miao", "" ], [ "Lin", "Yuanqing", "" ] ]
TITLE: Generic Object Detection With Dense Neural Patterns and Regionlets ABSTRACT: This paper addresses the challenge of establishing a bridge between deep convolutional neural networks and conventional object detection frameworks for accurate and efficient generic object detection. We introduce Dense Neural Patterns, short for DNPs, which are dense local features derived from discriminatively trained deep convolutional neural networks. DNPs can be easily plugged into conventional detection frameworks in the same way as other dense local features(like HOG or LBP). The effectiveness of the proposed approach is demonstrated with the Regionlets object detection framework. It achieved 46.1% mean average precision on the PASCAL VOC 2007 dataset, and 44.1% on the PASCAL VOC 2010 dataset, which dramatically improves the original Regionlets approach without DNPs.
1404.4351
Navodit Misra
Navodit Misra and Ercan E. Kuruoglu
Stable Graphical Models
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stable random variables are motivated by the central limit theorem for densities with (potentially) unbounded variance and can be thought of as natural generalizations of the Gaussian distribution to skewed and heavy-tailed phenomenon. In this paper, we introduce stable graphical (SG) models, a class of multivariate stable densities that can also be represented as Bayesian networks whose edges encode linear dependencies between random variables. One major hurdle to the extensive use of stable distributions is the lack of a closed-form analytical expression for their densities. This makes penalized maximum-likelihood based learning computationally demanding. We establish theoretically that the Bayesian information criterion (BIC) can asymptotically be reduced to the computationally more tractable minimum dispersion criterion (MDC) and develop StabLe, a structure learning algorithm based on MDC. We use simulated datasets for five benchmark network topologies to empirically demonstrate how StabLe improves upon ordinary least squares (OLS) regression. We also apply StabLe to microarray gene expression data for lymphoblastoid cells from 727 individuals belonging to eight global population groups. We establish that StabLe improves test set performance relative to OLS via ten-fold cross-validation. Finally, we develop SGEX, a method for quantifying differential expression of genes between different population groups.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 19:12:47 GMT" } ]
2014-04-17T00:00:00
[ [ "Misra", "Navodit", "" ], [ "Kuruoglu", "Ercan E.", "" ] ]
TITLE: Stable Graphical Models ABSTRACT: Stable random variables are motivated by the central limit theorem for densities with (potentially) unbounded variance and can be thought of as natural generalizations of the Gaussian distribution to skewed and heavy-tailed phenomenon. In this paper, we introduce stable graphical (SG) models, a class of multivariate stable densities that can also be represented as Bayesian networks whose edges encode linear dependencies between random variables. One major hurdle to the extensive use of stable distributions is the lack of a closed-form analytical expression for their densities. This makes penalized maximum-likelihood based learning computationally demanding. We establish theoretically that the Bayesian information criterion (BIC) can asymptotically be reduced to the computationally more tractable minimum dispersion criterion (MDC) and develop StabLe, a structure learning algorithm based on MDC. We use simulated datasets for five benchmark network topologies to empirically demonstrate how StabLe improves upon ordinary least squares (OLS) regression. We also apply StabLe to microarray gene expression data for lymphoblastoid cells from 727 individuals belonging to eight global population groups. We establish that StabLe improves test set performance relative to OLS via ten-fold cross-validation. Finally, we develop SGEX, a method for quantifying differential expression of genes between different population groups.
1302.6309
Neil Zhenqiang Gong
Neil Zhenqiang Gong and Wenchang Xu
Reciprocal versus Parasocial Relationships in Online Social Networks
Social Network Analysis and Mining, Springer, 2014
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many online social networks are fundamentally directed, i.e., they consist of both reciprocal edges (i.e., edges that have already been linked back) and parasocial edges (i.e., edges that haven't been linked back). Thus, understanding the structures and evolutions of reciprocal edges and parasocial ones, exploring the factors that influence parasocial edges to become reciprocal ones, and predicting whether a parasocial edge will turn into a reciprocal one are basic research problems. However, there have been few systematic studies about such problems. In this paper, we bridge this gap using a novel large-scale Google+ dataset crawled by ourselves as well as one publicly available social network dataset. First, we compare the structures and evolutions of reciprocal edges and those of parasocial edges. For instance, we find that reciprocal edges are more likely to connect users with similar degrees while parasocial edges are more likely to link ordinary users (e.g., users with low degrees) and popular users (e.g., celebrities). However, the impacts of reciprocal edges linking ordinary and popular users on the network structures increase slowly as the social networks evolve. Second, we observe that factors including user behaviors, node attributes, and edge attributes all have significant impacts on the formation of reciprocal edges. Third, in contrast to previous studies that treat reciprocal edge prediction as either a supervised or a semi-supervised learning problem, we identify that reciprocal edge prediction is better modeled as an outlier detection problem. Finally, we perform extensive evaluations with the two datasets, and we show that our proposal outperforms previous reciprocal edge prediction approaches.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 04:18:21 GMT" }, { "version": "v2", "created": "Mon, 16 Dec 2013 14:31:22 GMT" }, { "version": "v3", "created": "Thu, 20 Mar 2014 03:06:02 GMT" }, { "version": "v4", "created": "Tue, 15 Apr 2014 03:38:46 GMT" } ]
2014-04-16T00:00:00
[ [ "Gong", "Neil Zhenqiang", "" ], [ "Xu", "Wenchang", "" ] ]
TITLE: Reciprocal versus Parasocial Relationships in Online Social Networks ABSTRACT: Many online social networks are fundamentally directed, i.e., they consist of both reciprocal edges (i.e., edges that have already been linked back) and parasocial edges (i.e., edges that haven't been linked back). Thus, understanding the structures and evolutions of reciprocal edges and parasocial ones, exploring the factors that influence parasocial edges to become reciprocal ones, and predicting whether a parasocial edge will turn into a reciprocal one are basic research problems. However, there have been few systematic studies about such problems. In this paper, we bridge this gap using a novel large-scale Google+ dataset crawled by ourselves as well as one publicly available social network dataset. First, we compare the structures and evolutions of reciprocal edges and those of parasocial edges. For instance, we find that reciprocal edges are more likely to connect users with similar degrees while parasocial edges are more likely to link ordinary users (e.g., users with low degrees) and popular users (e.g., celebrities). However, the impacts of reciprocal edges linking ordinary and popular users on the network structures increase slowly as the social networks evolve. Second, we observe that factors including user behaviors, node attributes, and edge attributes all have significant impacts on the formation of reciprocal edges. Third, in contrast to previous studies that treat reciprocal edge prediction as either a supervised or a semi-supervised learning problem, we identify that reciprocal edge prediction is better modeled as an outlier detection problem. Finally, we perform extensive evaluations with the two datasets, and we show that our proposal outperforms previous reciprocal edge prediction approaches.
1404.3759
Bogdan Babych
Bogdan Babych and Anthony Hartley
Meta-evaluation of comparability metrics using parallel corpora
10 pages, 3 figures, 12th International Conference on Intelligent Text Processing and Computational Linguistics CICLing 2011. February 20 to 26, 2011, Tokyo, Japan. International Journal of Computational Linguistics and Applications, Proceedings volume of CICLing-2011
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metrics for measuring the comparability of corpora or texts need to be developed and evaluated systematically. Applications based on a corpus, such as training Statistical MT systems in specialised narrow domains, require finding a reasonable balance between the size of the corpus and its consistency, with controlled and benchmarked levels of comparability for any newly added sections. In this article we propose a method that can meta-evaluate comparability metrics by calculating monolingual comparability scores separately on the 'source' and 'target' sides of parallel corpora. The range of scores on the source side is then correlated (using Pearson's r coefficient) with the range of 'target' scores; the higher the correlation - the more reliable is the metric. The intuition is that a good metric should yield the same distance between different domains in different languages. Our method gives consistent results for the same metrics on different data sets, which indicates that it is reliable and can be used for metric comparison or for optimising settings of parametrised metrics.
[ { "version": "v1", "created": "Mon, 14 Apr 2014 21:33:42 GMT" } ]
2014-04-16T00:00:00
[ [ "Babych", "Bogdan", "" ], [ "Hartley", "Anthony", "" ] ]
TITLE: Meta-evaluation of comparability metrics using parallel corpora ABSTRACT: Metrics for measuring the comparability of corpora or texts need to be developed and evaluated systematically. Applications based on a corpus, such as training Statistical MT systems in specialised narrow domains, require finding a reasonable balance between the size of the corpus and its consistency, with controlled and benchmarked levels of comparability for any newly added sections. In this article we propose a method that can meta-evaluate comparability metrics by calculating monolingual comparability scores separately on the 'source' and 'target' sides of parallel corpora. The range of scores on the source side is then correlated (using Pearson's r coefficient) with the range of 'target' scores; the higher the correlation - the more reliable is the metric. The intuition is that a good metric should yield the same distance between different domains in different languages. Our method gives consistent results for the same metrics on different data sets, which indicates that it is reliable and can be used for metric comparison or for optimising settings of parametrised metrics.
1404.3881
Hamid Ramezani
Hamid Ramezani, Fatemeh Fazel, Milica Stojanovic, and Geert Leus
Collision Tolerant Packet Scheduling for Underwater Acoustic Localization
null
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article considers the joint problem of packet scheduling and self-localization in an underwater acoustic sensor network where sensor nodes are distributed randomly in an operating area. In terms of packet scheduling, our goal is to minimize the localization time, and to do so we consider two packet transmission schemes, namely a collision-free scheme (CFS), and a collision-tolerant scheme (CTS). The required localization time is formulated for these schemes, and through analytical results and numerical examples their performances are shown to be generally comparable. However, when the packet duration is short (as is the case for a localization packet), and the operating area is large (above 3km in at least one dimension), the collision-tolerant scheme requires a smaller localization time than the collision-free scheme. After gathering enough measurements, an iterative Gauss-Newton algorithm is employed by each sensor node for self-localization, and the Cramer Rao lower bound is evaluated as a benchmark. Although CTS consumes more energy for packet transmission, it provides a better localization accuracy. Additionally, in this scheme the anchor nodes work independently of each other, and can operate asynchronously which leads to a simplified implementation.
[ { "version": "v1", "created": "Tue, 15 Apr 2014 11:59:03 GMT" } ]
2014-04-16T00:00:00
[ [ "Ramezani", "Hamid", "" ], [ "Fazel", "Fatemeh", "" ], [ "Stojanovic", "Milica", "" ], [ "Leus", "Geert", "" ] ]
TITLE: Collision Tolerant Packet Scheduling for Underwater Acoustic Localization ABSTRACT: This article considers the joint problem of packet scheduling and self-localization in an underwater acoustic sensor network where sensor nodes are distributed randomly in an operating area. In terms of packet scheduling, our goal is to minimize the localization time, and to do so we consider two packet transmission schemes, namely a collision-free scheme (CFS), and a collision-tolerant scheme (CTS). The required localization time is formulated for these schemes, and through analytical results and numerical examples their performances are shown to be generally comparable. However, when the packet duration is short (as is the case for a localization packet), and the operating area is large (above 3km in at least one dimension), the collision-tolerant scheme requires a smaller localization time than the collision-free scheme. After gathering enough measurements, an iterative Gauss-Newton algorithm is employed by each sensor node for self-localization, and the Cramer Rao lower bound is evaluated as a benchmark. Although CTS consumes more energy for packet transmission, it provides a better localization accuracy. Additionally, in this scheme the anchor nodes work independently of each other, and can operate asynchronously which leads to a simplified implementation.
1310.8478
Pier Stanislao Paolucci
Pier Stanislao Paolucci, Roberto Ammendola, Andrea Biagioni, Ottorino Frezza, Francesca Lo Cicero, Alessandro Lonardo, Elena Pastorelli, Francesco Simula, Laura Tosoratto, Piero Vicini
Distributed simulation of polychronous and plastic spiking neural networks: strong and weak scaling of a representative mini-application benchmark executed on a small-scale commodity cluster
Added detailed profiling of computational and communication components. Improved speed and size of simulated networks. 15 pages, 5 figures, 3 tables
null
null
null
cs.DC q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a natively distributed mini-application benchmark representative of plastic spiking neural network simulators. It can be used to measure performances of existing computing platforms and to drive the development of future parallel/distributed computing systems dedicated to the simulation of plastic spiking networks. The mini-application is designed to generate spiking behaviors and synaptic connectivity that do not change when the number of hardware processing nodes is varied, simplifying the quantitative study of scalability on commodity and custom architectures. Here, we present the strong and weak scaling and the profiling of the computational/communication components of the DPSNN-STDP benchmark (Distributed Simulation of Polychronous Spiking Neural Network with synaptic Spike-Timing Dependent Plasticity). In this first test, we used the benchmark to exercise a small-scale cluster of commodity processors (varying the number of used physical cores from 1 to 128). The cluster was interconnected through a commodity network. Bidimensional grids of columns composed of Izhikevich neurons projected synapses locally and toward first, second and third neighboring columns. The size of the simulated network varied from 6.6 Giga synapses down to 200 K synapses. The code demonstrated to be fast and scalable: 10 wall clock seconds were required to simulate one second of activity and plasticity (per Hertz of average firing rate) of a network composed by 3.2 G synapses running on 128 hardware cores clocked @ 2.4 GHz. The mini-application has been designed to be easily interfaced with standard and custom software and hardware communication interfaces. It has been designed from its foundation to be natively distributed and parallel, and should not pose major obstacles against distribution and parallelization on several platforms.
[ { "version": "v1", "created": "Thu, 31 Oct 2013 12:44:20 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2014 14:01:42 GMT" } ]
2014-04-15T00:00:00
[ [ "Paolucci", "Pier Stanislao", "" ], [ "Ammendola", "Roberto", "" ], [ "Biagioni", "Andrea", "" ], [ "Frezza", "Ottorino", "" ], [ "Cicero", "Francesca Lo", "" ], [ "Lonardo", "Alessandro", "" ], [ "Pastorelli", "Elena", "" ], [ "Simula", "Francesco", "" ], [ "Tosoratto", "Laura", "" ], [ "Vicini", "Piero", "" ] ]
TITLE: Distributed simulation of polychronous and plastic spiking neural networks: strong and weak scaling of a representative mini-application benchmark executed on a small-scale commodity cluster ABSTRACT: We introduce a natively distributed mini-application benchmark representative of plastic spiking neural network simulators. It can be used to measure performances of existing computing platforms and to drive the development of future parallel/distributed computing systems dedicated to the simulation of plastic spiking networks. The mini-application is designed to generate spiking behaviors and synaptic connectivity that do not change when the number of hardware processing nodes is varied, simplifying the quantitative study of scalability on commodity and custom architectures. Here, we present the strong and weak scaling and the profiling of the computational/communication components of the DPSNN-STDP benchmark (Distributed Simulation of Polychronous Spiking Neural Network with synaptic Spike-Timing Dependent Plasticity). In this first test, we used the benchmark to exercise a small-scale cluster of commodity processors (varying the number of used physical cores from 1 to 128). The cluster was interconnected through a commodity network. Bidimensional grids of columns composed of Izhikevich neurons projected synapses locally and toward first, second and third neighboring columns. The size of the simulated network varied from 6.6 Giga synapses down to 200 K synapses. The code demonstrated to be fast and scalable: 10 wall clock seconds were required to simulate one second of activity and plasticity (per Hertz of average firing rate) of a network composed by 3.2 G synapses running on 128 hardware cores clocked @ 2.4 GHz. The mini-application has been designed to be easily interfaced with standard and custom software and hardware communication interfaces. It has been designed from its foundation to be natively distributed and parallel, and should not pose major obstacles against distribution and parallelization on several platforms.
1312.4894
Yangqing Jia
Yunchao Gong, Yangqing Jia, Thomas Leung, Alexander Toshev, Sergey Ioffe
Deep Convolutional Ranking for Multilabel Image Annotation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multilabel image annotation is one of the most important challenges in computer vision with many real-world applications. While existing work usually use conventional visual features for multilabel annotation, features based on Deep Neural Networks have shown potential to significantly boost performance. In this work, we propose to leverage the advantage of such features and analyze key components that lead to better performances. Specifically, we show that a significant performance gain could be obtained by combining convolutional architectures with approximate top-$k$ ranking objectives, as thye naturally fit the multilabel tagging problem. Our experiments on the NUS-WIDE dataset outperforms the conventional visual features by about 10%, obtaining the best reported performance in the literature.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 19:00:50 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2014 19:21:13 GMT" } ]
2014-04-15T00:00:00
[ [ "Gong", "Yunchao", "" ], [ "Jia", "Yangqing", "" ], [ "Leung", "Thomas", "" ], [ "Toshev", "Alexander", "" ], [ "Ioffe", "Sergey", "" ] ]
TITLE: Deep Convolutional Ranking for Multilabel Image Annotation ABSTRACT: Multilabel image annotation is one of the most important challenges in computer vision with many real-world applications. While existing work usually use conventional visual features for multilabel annotation, features based on Deep Neural Networks have shown potential to significantly boost performance. In this work, we propose to leverage the advantage of such features and analyze key components that lead to better performances. Specifically, we show that a significant performance gain could be obtained by combining convolutional architectures with approximate top-$k$ ranking objectives, as thye naturally fit the multilabel tagging problem. Our experiments on the NUS-WIDE dataset outperforms the conventional visual features by about 10%, obtaining the best reported performance in the literature.
1312.6082
Julian Ibarz
Ian J. Goodfellow, Yaroslav Bulatov, Julian Ibarz, Sacha Arnoud, Vinay Shet
Multi-digit Number Recognition from Street View Imagery using Deep Convolutional Neural Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognizing arbitrary multi-character text in unconstrained natural photographs is a hard problem. In this paper, we address an equally hard sub-problem in this domain viz. recognizing arbitrary multi-digit numbers from Street View imagery. Traditional approaches to solve this problem typically separate out the localization, segmentation, and recognition steps. In this paper we propose a unified approach that integrates these three steps via the use of a deep convolutional neural network that operates directly on the image pixels. We employ the DistBelief implementation of deep neural networks in order to train large, distributed neural networks on high quality images. We find that the performance of this approach increases with the depth of the convolutional network, with the best performance occurring in the deepest architecture we trained, with eleven hidden layers. We evaluate this approach on the publicly available SVHN dataset and achieve over $96\%$ accuracy in recognizing complete street numbers. We show that on a per-digit recognition task, we improve upon the state-of-the-art, achieving $97.84\%$ accuracy. We also evaluate this approach on an even more challenging dataset generated from Street View imagery containing several tens of millions of street number annotations and achieve over $90\%$ accuracy. To further explore the applicability of the proposed system to broader text recognition tasks, we apply it to synthetic distorted text from reCAPTCHA. reCAPTCHA is one of the most secure reverse turing tests that uses distorted text to distinguish humans from bots. We report a $99.8\%$ accuracy on the hardest category of reCAPTCHA. Our evaluations on both tasks indicate that at specific operating thresholds, the performance of the proposed system is comparable to, and in some cases exceeds, that of human operators.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 19:25:44 GMT" }, { "version": "v2", "created": "Wed, 1 Jan 2014 14:29:59 GMT" }, { "version": "v3", "created": "Tue, 11 Mar 2014 22:40:47 GMT" }, { "version": "v4", "created": "Mon, 14 Apr 2014 05:25:54 GMT" } ]
2014-04-15T00:00:00
[ [ "Goodfellow", "Ian J.", "" ], [ "Bulatov", "Yaroslav", "" ], [ "Ibarz", "Julian", "" ], [ "Arnoud", "Sacha", "" ], [ "Shet", "Vinay", "" ] ]
TITLE: Multi-digit Number Recognition from Street View Imagery using Deep Convolutional Neural Networks ABSTRACT: Recognizing arbitrary multi-character text in unconstrained natural photographs is a hard problem. In this paper, we address an equally hard sub-problem in this domain viz. recognizing arbitrary multi-digit numbers from Street View imagery. Traditional approaches to solve this problem typically separate out the localization, segmentation, and recognition steps. In this paper we propose a unified approach that integrates these three steps via the use of a deep convolutional neural network that operates directly on the image pixels. We employ the DistBelief implementation of deep neural networks in order to train large, distributed neural networks on high quality images. We find that the performance of this approach increases with the depth of the convolutional network, with the best performance occurring in the deepest architecture we trained, with eleven hidden layers. We evaluate this approach on the publicly available SVHN dataset and achieve over $96\%$ accuracy in recognizing complete street numbers. We show that on a per-digit recognition task, we improve upon the state-of-the-art, achieving $97.84\%$ accuracy. We also evaluate this approach on an even more challenging dataset generated from Street View imagery containing several tens of millions of street number annotations and achieve over $90\%$ accuracy. To further explore the applicability of the proposed system to broader text recognition tasks, we apply it to synthetic distorted text from reCAPTCHA. reCAPTCHA is one of the most secure reverse turing tests that uses distorted text to distinguish humans from bots. We report a $99.8\%$ accuracy on the hardest category of reCAPTCHA. Our evaluations on both tasks indicate that at specific operating thresholds, the performance of the proposed system is comparable to, and in some cases exceeds, that of human operators.
1401.0355
Liya Fan
Liya Fan, Bo Gao, Xi Sun, Fa Zhang and Zhiyong Liu
Improving the Load Balance of MapReduce Operations based on the Key Distribution of Pairs
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Load balance is important for MapReduce to reduce job duration, increase parallel efficiency, etc. Previous work focuses on coarse-grained scheduling. This study concerns fine-grained scheduling on MapReduce operations. Each operation represents one invocation of the Map or Reduce function. Scheduling MapReduce operations is difficult due to highly screwed operation loads, no support to collect workload statistics, and high complexity of the scheduling problem. So current implementations adopt simple strategies, leading to poor load balance. To address these difficulties, we design an algorithm to schedule operations based on the key distribution of intermediate pairs. The algorithm involves a sub-program for selecting operations for task slots, and we name it the Balanced Subset Sum (BSS) problem. We discuss properties of BSS and design exact and approximation algorithms for it. To transparently incorporate these algorithms into MapReduce, we design a communication mechanism to collect statistics, and a pipeline within Reduce tasks to increase resource utilization. To the best of our knowledge, this is the first work on scheduling MapReduce workload at this fine-grained level. Experiments on PUMA [T+12] benchmarks show consistent performance improvement. The job duration can be reduced by up to 37%, compared with standard MapReduce.
[ { "version": "v1", "created": "Thu, 2 Jan 2014 01:42:23 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2014 03:35:22 GMT" } ]
2014-04-15T00:00:00
[ [ "Fan", "Liya", "" ], [ "Gao", "Bo", "" ], [ "Sun", "Xi", "" ], [ "Zhang", "Fa", "" ], [ "Liu", "Zhiyong", "" ] ]
TITLE: Improving the Load Balance of MapReduce Operations based on the Key Distribution of Pairs ABSTRACT: Load balance is important for MapReduce to reduce job duration, increase parallel efficiency, etc. Previous work focuses on coarse-grained scheduling. This study concerns fine-grained scheduling on MapReduce operations. Each operation represents one invocation of the Map or Reduce function. Scheduling MapReduce operations is difficult due to highly screwed operation loads, no support to collect workload statistics, and high complexity of the scheduling problem. So current implementations adopt simple strategies, leading to poor load balance. To address these difficulties, we design an algorithm to schedule operations based on the key distribution of intermediate pairs. The algorithm involves a sub-program for selecting operations for task slots, and we name it the Balanced Subset Sum (BSS) problem. We discuss properties of BSS and design exact and approximation algorithms for it. To transparently incorporate these algorithms into MapReduce, we design a communication mechanism to collect statistics, and a pipeline within Reduce tasks to increase resource utilization. To the best of our knowledge, this is the first work on scheduling MapReduce workload at this fine-grained level. Experiments on PUMA [T+12] benchmarks show consistent performance improvement. The job duration can be reduced by up to 37%, compared with standard MapReduce.
1402.2681
Liang Zheng
Liang Zheng, Shengjin Wang, Ziqiong Liu, Qi Tian
Packing and Padding: Coupled Multi-index for Accurate Image Retrieval
8 pages, 7 figures, 6 tables. Accepted to CVPR 2014
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In Bag-of-Words (BoW) based image retrieval, the SIFT visual word has a low discriminative power, so false positive matches occur prevalently. Apart from the information loss during quantization, another cause is that the SIFT feature only describes the local gradient distribution. To address this problem, this paper proposes a coupled Multi-Index (c-MI) framework to perform feature fusion at indexing level. Basically, complementary features are coupled into a multi-dimensional inverted index. Each dimension of c-MI corresponds to one kind of feature, and the retrieval process votes for images similar in both SIFT and other feature spaces. Specifically, we exploit the fusion of local color feature into c-MI. While the precision of visual match is greatly enhanced, we adopt Multiple Assignment to improve recall. The joint cooperation of SIFT and color features significantly reduces the impact of false positive matches. Extensive experiments on several benchmark datasets demonstrate that c-MI improves the retrieval accuracy significantly, while consuming only half of the query time compared to the baseline. Importantly, we show that c-MI is well complementary to many prior techniques. Assembling these methods, we have obtained an mAP of 85.8% and N-S score of 3.85 on Holidays and Ukbench datasets, respectively, which compare favorably with the state-of-the-arts.
[ { "version": "v1", "created": "Tue, 11 Feb 2014 22:00:31 GMT" }, { "version": "v2", "created": "Sun, 13 Apr 2014 09:51:54 GMT" } ]
2014-04-15T00:00:00
[ [ "Zheng", "Liang", "" ], [ "Wang", "Shengjin", "" ], [ "Liu", "Ziqiong", "" ], [ "Tian", "Qi", "" ] ]
TITLE: Packing and Padding: Coupled Multi-index for Accurate Image Retrieval ABSTRACT: In Bag-of-Words (BoW) based image retrieval, the SIFT visual word has a low discriminative power, so false positive matches occur prevalently. Apart from the information loss during quantization, another cause is that the SIFT feature only describes the local gradient distribution. To address this problem, this paper proposes a coupled Multi-Index (c-MI) framework to perform feature fusion at indexing level. Basically, complementary features are coupled into a multi-dimensional inverted index. Each dimension of c-MI corresponds to one kind of feature, and the retrieval process votes for images similar in both SIFT and other feature spaces. Specifically, we exploit the fusion of local color feature into c-MI. While the precision of visual match is greatly enhanced, we adopt Multiple Assignment to improve recall. The joint cooperation of SIFT and color features significantly reduces the impact of false positive matches. Extensive experiments on several benchmark datasets demonstrate that c-MI improves the retrieval accuracy significantly, while consuming only half of the query time compared to the baseline. Importantly, we show that c-MI is well complementary to many prior techniques. Assembling these methods, we have obtained an mAP of 85.8% and N-S score of 3.85 on Holidays and Ukbench datasets, respectively, which compare favorably with the state-of-the-arts.
1403.0284
Liang Zheng
Liang Zheng and Shengjin Wang and Wengang Zhou and Qi Tian
Bayes Merging of Multiple Vocabularies for Scalable Image Retrieval
8 pages, 7 figures, 6 tables, accepted to CVPR 2014
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
The Bag-of-Words (BoW) representation is well applied to recent state-of-the-art image retrieval works. Typically, multiple vocabularies are generated to correct quantization artifacts and improve recall. However, this routine is corrupted by vocabulary correlation, i.e., overlapping among different vocabularies. Vocabulary correlation leads to an over-counting of the indexed features in the overlapped area, or the intersection set, thus compromising the retrieval accuracy. In order to address the correlation problem while preserve the benefit of high recall, this paper proposes a Bayes merging approach to down-weight the indexed features in the intersection set. Through explicitly modeling the correlation problem in a probabilistic view, a joint similarity on both image- and feature-level is estimated for the indexed features in the intersection set. We evaluate our method through extensive experiments on three benchmark datasets. Albeit simple, Bayes merging can be well applied in various merging tasks, and consistently improves the baselines on multi-vocabulary merging. Moreover, Bayes merging is efficient in terms of both time and memory cost, and yields competitive performance compared with the state-of-the-art methods.
[ { "version": "v1", "created": "Mon, 3 Mar 2014 00:51:29 GMT" }, { "version": "v2", "created": "Sun, 13 Apr 2014 10:14:54 GMT" } ]
2014-04-15T00:00:00
[ [ "Zheng", "Liang", "" ], [ "Wang", "Shengjin", "" ], [ "Zhou", "Wengang", "" ], [ "Tian", "Qi", "" ] ]
TITLE: Bayes Merging of Multiple Vocabularies for Scalable Image Retrieval ABSTRACT: The Bag-of-Words (BoW) representation is well applied to recent state-of-the-art image retrieval works. Typically, multiple vocabularies are generated to correct quantization artifacts and improve recall. However, this routine is corrupted by vocabulary correlation, i.e., overlapping among different vocabularies. Vocabulary correlation leads to an over-counting of the indexed features in the overlapped area, or the intersection set, thus compromising the retrieval accuracy. In order to address the correlation problem while preserve the benefit of high recall, this paper proposes a Bayes merging approach to down-weight the indexed features in the intersection set. Through explicitly modeling the correlation problem in a probabilistic view, a joint similarity on both image- and feature-level is estimated for the indexed features in the intersection set. We evaluate our method through extensive experiments on three benchmark datasets. Albeit simple, Bayes merging can be well applied in various merging tasks, and consistently improves the baselines on multi-vocabulary merging. Moreover, Bayes merging is efficient in terms of both time and memory cost, and yields competitive performance compared with the state-of-the-art methods.
1403.3780
Conrad Sanderson
Arnold Wiliem, Conrad Sanderson, Yongkang Wong, Peter Hobson, Rodney F. Minchin, Brian C. Lovell
Automatic Classification of Human Epithelial Type 2 Cell Indirect Immunofluorescence Images using Cell Pyramid Matching
arXiv admin note: substantial text overlap with arXiv:1304.1262
Pattern Recognition, Vol. 47, No. 7, pp. 2315-2324, 2014
10.1016/j.patcog.2013.10.014
null
q-bio.CB cs.CV q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a novel system for automatic classification of images obtained from Anti-Nuclear Antibody (ANA) pathology tests on Human Epithelial type 2 (HEp-2) cells using the Indirect Immunofluorescence (IIF) protocol. The IIF protocol on HEp-2 cells has been the hallmark method to identify the presence of ANAs, due to its high sensitivity and the large range of antigens that can be detected. However, it suffers from numerous shortcomings, such as being subjective as well as time and labour intensive. Computer Aided Diagnostic (CAD) systems have been developed to address these problems, which automatically classify a HEp-2 cell image into one of its known patterns (eg. speckled, homogeneous). Most of the existing CAD systems use handpicked features to represent a HEp-2 cell image, which may only work in limited scenarios. We propose a novel automatic cell image classification method termed Cell Pyramid Matching (CPM), which is comprised of regional histograms of visual words coupled with the Multiple Kernel Learning framework. We present a study of several variations of generating histograms and show the efficacy of the system on two publicly available datasets: the ICPR HEp-2 cell classification contest dataset and the SNPHEp-2 dataset.
[ { "version": "v1", "created": "Sat, 15 Mar 2014 10:15:25 GMT" } ]
2014-04-15T00:00:00
[ [ "Wiliem", "Arnold", "" ], [ "Sanderson", "Conrad", "" ], [ "Wong", "Yongkang", "" ], [ "Hobson", "Peter", "" ], [ "Minchin", "Rodney F.", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Automatic Classification of Human Epithelial Type 2 Cell Indirect Immunofluorescence Images using Cell Pyramid Matching ABSTRACT: This paper describes a novel system for automatic classification of images obtained from Anti-Nuclear Antibody (ANA) pathology tests on Human Epithelial type 2 (HEp-2) cells using the Indirect Immunofluorescence (IIF) protocol. The IIF protocol on HEp-2 cells has been the hallmark method to identify the presence of ANAs, due to its high sensitivity and the large range of antigens that can be detected. However, it suffers from numerous shortcomings, such as being subjective as well as time and labour intensive. Computer Aided Diagnostic (CAD) systems have been developed to address these problems, which automatically classify a HEp-2 cell image into one of its known patterns (eg. speckled, homogeneous). Most of the existing CAD systems use handpicked features to represent a HEp-2 cell image, which may only work in limited scenarios. We propose a novel automatic cell image classification method termed Cell Pyramid Matching (CPM), which is comprised of regional histograms of visual words coupled with the Multiple Kernel Learning framework. We present a study of several variations of generating histograms and show the efficacy of the system on two publicly available datasets: the ICPR HEp-2 cell classification contest dataset and the SNPHEp-2 dataset.
1404.3291
Michael Wilber
Michael J. Wilber and Iljung S. Kwak and Serge J. Belongie
Cost-Effective HITs for Relative Similarity Comparisons
7 pages, 7 figures
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Similarity comparisons of the form "Is object a more similar to b than to c?" are useful for computer vision and machine learning applications. Unfortunately, an embedding of $n$ points is specified by $n^3$ triplets, making collecting every triplet an expensive task. In noticing this difficulty, other researchers have investigated more intelligent triplet sampling techniques, but they do not study their effectiveness or their potential drawbacks. Although it is important to reduce the number of collected triplets, it is also important to understand how best to display a triplet collection task to a user. In this work we explore an alternative display for collecting triplets and analyze the monetary cost and speed of the display. We propose best practices for creating cost effective human intelligence tasks for collecting triplets. We show that rather than changing the sampling algorithm, simple changes to the crowdsourcing UI can lead to much higher quality embeddings. We also provide a dataset as well as the labels collected from crowd workers.
[ { "version": "v1", "created": "Sat, 12 Apr 2014 14:33:18 GMT" } ]
2014-04-15T00:00:00
[ [ "Wilber", "Michael J.", "" ], [ "Kwak", "Iljung S.", "" ], [ "Belongie", "Serge J.", "" ] ]
TITLE: Cost-Effective HITs for Relative Similarity Comparisons ABSTRACT: Similarity comparisons of the form "Is object a more similar to b than to c?" are useful for computer vision and machine learning applications. Unfortunately, an embedding of $n$ points is specified by $n^3$ triplets, making collecting every triplet an expensive task. In noticing this difficulty, other researchers have investigated more intelligent triplet sampling techniques, but they do not study their effectiveness or their potential drawbacks. Although it is important to reduce the number of collected triplets, it is also important to understand how best to display a triplet collection task to a user. In this work we explore an alternative display for collecting triplets and analyze the monetary cost and speed of the display. We propose best practices for creating cost effective human intelligence tasks for collecting triplets. We show that rather than changing the sampling algorithm, simple changes to the crowdsourcing UI can lead to much higher quality embeddings. We also provide a dataset as well as the labels collected from crowd workers.
1404.3312
Xu Chen
Xu Chen, Alfred Hero, Silvio Savarese
Shrinkage Optimized Directed Information using Pictorial Structures for Action Recognition
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose a novel action recognition framework. The method uses pictorial structures and shrinkage optimized directed information assessment (SODA) coupled with Markov Random Fields called SODA+MRF to model the directional temporal dependency and bidirectional spatial dependency. As a variant of mutual information, directional information captures the directional information flow and temporal structure of video sequences across frames. Meanwhile, within each frame, Markov random fields are utilized to model the spatial relations among different parts of a human body and the body parts of different people. The proposed SODA+MRF model is robust to view point transformations and detect complex interactions accurately. We compare the proposed method against several baseline methods to highlight the effectiveness of the SODA+MRF model. We demonstrate that our algorithm has superior action recognition performance on the UCF action recognition dataset, the Olympic sports dataset and the collective activity dataset over several state-of-the-art methods.
[ { "version": "v1", "created": "Sat, 12 Apr 2014 19:01:36 GMT" } ]
2014-04-15T00:00:00
[ [ "Chen", "Xu", "" ], [ "Hero", "Alfred", "" ], [ "Savarese", "Silvio", "" ] ]
TITLE: Shrinkage Optimized Directed Information using Pictorial Structures for Action Recognition ABSTRACT: In this paper, we propose a novel action recognition framework. The method uses pictorial structures and shrinkage optimized directed information assessment (SODA) coupled with Markov Random Fields called SODA+MRF to model the directional temporal dependency and bidirectional spatial dependency. As a variant of mutual information, directional information captures the directional information flow and temporal structure of video sequences across frames. Meanwhile, within each frame, Markov random fields are utilized to model the spatial relations among different parts of a human body and the body parts of different people. The proposed SODA+MRF model is robust to view point transformations and detect complex interactions accurately. We compare the proposed method against several baseline methods to highlight the effectiveness of the SODA+MRF model. We demonstrate that our algorithm has superior action recognition performance on the UCF action recognition dataset, the Olympic sports dataset and the collective activity dataset over several state-of-the-art methods.
1404.3381
Karel De Vogeleer
Karel De Vogeleer, Gerard Memmi, Pierre Jouvelot and Fabien Coelho
Modeling the Temperature Bias of Power Consumption for Nanometer-Scale CPUs in Application Processors
Submitted to SAMOS 2014; International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV)
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce and experimentally validate a new macro-level model of the CPU temperature/power relationship within nanometer-scale application processors or system-on-chips. By adopting a holistic view, this model is able to take into account many of the physical effects that occur within such systems. Together with two algorithms described in the paper, our results can be used, for instance by engineers designing power or thermal management units, to cancel the temperature-induced bias on power measurements. This will help them gather temperature-neutral power data while running multiple instance of their benchmarks. Also power requirements and system failure rates can be decreased by controlling the CPU's thermal behavior. Even though it is usually assumed that the temperature/power relationship is exponentially related, there is however a lack of publicly available physical temperature/power measurements to back up this assumption, something our paper corrects. Via measurements on two pertinent platforms sporting nanometer-scale application processors, we show that the power/temperature relationship is indeed very likely exponential over a 20{\deg}C to 85{\deg}C temperature range. Our data suggest that, for application processors operating between 20{\deg}C and 50{\deg}C, a quadratic model is still accurate and a linear approximation is acceptable.
[ { "version": "v1", "created": "Sun, 13 Apr 2014 13:07:36 GMT" } ]
2014-04-15T00:00:00
[ [ "De Vogeleer", "Karel", "" ], [ "Memmi", "Gerard", "" ], [ "Jouvelot", "Pierre", "" ], [ "Coelho", "Fabien", "" ] ]
TITLE: Modeling the Temperature Bias of Power Consumption for Nanometer-Scale CPUs in Application Processors ABSTRACT: We introduce and experimentally validate a new macro-level model of the CPU temperature/power relationship within nanometer-scale application processors or system-on-chips. By adopting a holistic view, this model is able to take into account many of the physical effects that occur within such systems. Together with two algorithms described in the paper, our results can be used, for instance by engineers designing power or thermal management units, to cancel the temperature-induced bias on power measurements. This will help them gather temperature-neutral power data while running multiple instance of their benchmarks. Also power requirements and system failure rates can be decreased by controlling the CPU's thermal behavior. Even though it is usually assumed that the temperature/power relationship is exponentially related, there is however a lack of publicly available physical temperature/power measurements to back up this assumption, something our paper corrects. Via measurements on two pertinent platforms sporting nanometer-scale application processors, we show that the power/temperature relationship is indeed very likely exponential over a 20{\deg}C to 85{\deg}C temperature range. Our data suggest that, for application processors operating between 20{\deg}C and 50{\deg}C, a quadratic model is still accurate and a linear approximation is acceptable.
1404.3461
Xiaolu Lu
Xiaolu Lu, Dongxu Li, Xiang Li, Ling Feng
A 2D based Partition Strategy for Solving Ranking under Team Context (RTP)
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a 2D based partition method for solving the problem of Ranking under Team Context(RTC) on datasets without a priori. We first map the data into 2D space using its minimum and maximum value among all dimensions. Then we construct window queries with consideration of current team context. Besides, during the query mapping procedure, we can pre-prune some tuples which are not top ranked ones. This pre-classified step will defer processing those tuples and can save cost while providing solutions for the problem. Experiments show that our algorithm performs well especially on large datasets with correctness.
[ { "version": "v1", "created": "Mon, 14 Apr 2014 05:20:48 GMT" } ]
2014-04-15T00:00:00
[ [ "Lu", "Xiaolu", "" ], [ "Li", "Dongxu", "" ], [ "Li", "Xiang", "" ], [ "Feng", "Ling", "" ] ]
TITLE: A 2D based Partition Strategy for Solving Ranking under Team Context (RTP) ABSTRACT: In this paper, we propose a 2D based partition method for solving the problem of Ranking under Team Context(RTC) on datasets without a priori. We first map the data into 2D space using its minimum and maximum value among all dimensions. Then we construct window queries with consideration of current team context. Besides, during the query mapping procedure, we can pre-prune some tuples which are not top ranked ones. This pre-classified step will defer processing those tuples and can save cost while providing solutions for the problem. Experiments show that our algorithm performs well especially on large datasets with correctness.
1404.2948
Anna Goldenberg
Bo Wang and Anna Goldenberg
Gradient-based Laplacian Feature Selection
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analysis of high dimensional noisy data is of essence across a variety of research fields. Feature selection techniques are designed to find the relevant feature subset that can facilitate classification or pattern detection. Traditional (supervised) feature selection methods utilize label information to guide the identification of relevant feature subsets. In this paper, however, we consider the unsupervised feature selection problem. Without the label information, it is particularly difficult to identify a small set of relevant features due to the noisy nature of real-world data which corrupts the intrinsic structure of the data. Our Gradient-based Laplacian Feature Selection (GLFS) selects important features by minimizing the variance of the Laplacian regularized least squares regression model. With $\ell_1$ relaxation, GLFS can find a sparse subset of features that is relevant to the Laplacian manifolds. Extensive experiments on simulated, three real-world object recognition and two computational biology datasets, have illustrated the power and superior performance of our approach over multiple state-of-the-art unsupervised feature selection methods. Additionally, we show that GLFS selects a sparser set of more relevant features in a supervised setting outperforming the popular elastic net methodology.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 20:49:35 GMT" } ]
2014-04-14T00:00:00
[ [ "Wang", "Bo", "" ], [ "Goldenberg", "Anna", "" ] ]
TITLE: Gradient-based Laplacian Feature Selection ABSTRACT: Analysis of high dimensional noisy data is of essence across a variety of research fields. Feature selection techniques are designed to find the relevant feature subset that can facilitate classification or pattern detection. Traditional (supervised) feature selection methods utilize label information to guide the identification of relevant feature subsets. In this paper, however, we consider the unsupervised feature selection problem. Without the label information, it is particularly difficult to identify a small set of relevant features due to the noisy nature of real-world data which corrupts the intrinsic structure of the data. Our Gradient-based Laplacian Feature Selection (GLFS) selects important features by minimizing the variance of the Laplacian regularized least squares regression model. With $\ell_1$ relaxation, GLFS can find a sparse subset of features that is relevant to the Laplacian manifolds. Extensive experiments on simulated, three real-world object recognition and two computational biology datasets, have illustrated the power and superior performance of our approach over multiple state-of-the-art unsupervised feature selection methods. Additionally, we show that GLFS selects a sparser set of more relevant features in a supervised setting outperforming the popular elastic net methodology.
1301.2995
David Garcia
David Garc\'ia, Dorian Tanase
Measuring Cultural Dynamics Through the Eurovision Song Contest
Submitted to Advances in Complex Systems
Advances in Complex Systems, Vol 16, No 8 (2013) pp 33
10.1142/S0219525913500379
null
physics.soc-ph cs.SI physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Measuring culture and its dynamics through surveys has important limitations, but the emerging field of computational social science allows us to overcome them by analyzing large-scale datasets. In this article, we study cultural dynamics through the votes in the Eurovision song contest, which are decided by a crowd-based scheme in which viewers vote through mobile phone messages. Taking into account asymmetries and imperfect perception of culture, we measure cultural relations among European countries in terms of cultural affinity. We propose the Friend-or-Foe coefficient, a metric to measure voting biases among participants of a Eurovision contest. We validate how this metric represents cultural affinity through its relation with known cultural distances, and through numerical analysis of biased Eurovision contests. We apply this metric to the historical set of Eurovision contests from 1975 to 2012, finding new patterns of stronger modularity than using votes alone. Furthermore, we define a measure of polarization that, when applied to empirical data, shows a sharp increase within EU countries during 2010 and 2011. We empirically validate the relation between this polarization and economic indicators in the EU, showing how political decisions influence both the economy and the way citizens relate to the culture of other EU members.
[ { "version": "v1", "created": "Mon, 14 Jan 2013 14:55:15 GMT" }, { "version": "v2", "created": "Fri, 10 May 2013 11:41:36 GMT" } ]
2014-04-11T00:00:00
[ [ "García", "David", "" ], [ "Tanase", "Dorian", "" ] ]
TITLE: Measuring Cultural Dynamics Through the Eurovision Song Contest ABSTRACT: Measuring culture and its dynamics through surveys has important limitations, but the emerging field of computational social science allows us to overcome them by analyzing large-scale datasets. In this article, we study cultural dynamics through the votes in the Eurovision song contest, which are decided by a crowd-based scheme in which viewers vote through mobile phone messages. Taking into account asymmetries and imperfect perception of culture, we measure cultural relations among European countries in terms of cultural affinity. We propose the Friend-or-Foe coefficient, a metric to measure voting biases among participants of a Eurovision contest. We validate how this metric represents cultural affinity through its relation with known cultural distances, and through numerical analysis of biased Eurovision contests. We apply this metric to the historical set of Eurovision contests from 1975 to 2012, finding new patterns of stronger modularity than using votes alone. Furthermore, we define a measure of polarization that, when applied to empirical data, shows a sharp increase within EU countries during 2010 and 2011. We empirically validate the relation between this polarization and economic indicators in the EU, showing how political decisions influence both the economy and the way citizens relate to the culture of other EU members.
1404.2843
Anil Aswani
Anil Aswani, Patrick Bouffard, Xiaojing Zhang, Claire Tomlin
Practical Comparison of Optimization Algorithms for Learning-Based MPC with Linear Models
null
null
null
null
math.OC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning-based control methods are an attractive approach for addressing performance and efficiency challenges in robotics and automation systems. One such technique that has found application in these domains is learning-based model predictive control (LBMPC). An important novelty of LBMPC lies in the fact that its robustness and stability properties are independent of the type of online learning used. This allows the use of advanced statistical or machine learning methods to provide the adaptation for the controller. This paper is concerned with providing practical comparisons of different optimization algorithms for implementing the LBMPC method, for the special case where the dynamic model of the system is linear and the online learning provides linear updates to the dynamic model. For comparison purposes, we have implemented a primal-dual infeasible start interior point method that exploits the sparsity structure of LBMPC. Our open source implementation (called LBmpcIPM) is available through a BSD license and is provided freely to enable the rapid implementation of LBMPC on other platforms. This solver is compared to the dense active set solvers LSSOL and qpOASES using a quadrotor helicopter platform. Two scenarios are considered: The first is a simulation comparing hovering control for the quadrotor, and the second is on-board control experiments of dynamic quadrotor flight. Though the LBmpcIPM method has better asymptotic computational complexity than LSSOL and qpOASES, we find that for certain integrated systems (like our quadrotor testbed) these methods can outperform LBmpcIPM. This suggests that actual benchmarks should be used when choosing which algorithm is used to implement LBMPC on practical systems.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 15:12:20 GMT" } ]
2014-04-11T00:00:00
[ [ "Aswani", "Anil", "" ], [ "Bouffard", "Patrick", "" ], [ "Zhang", "Xiaojing", "" ], [ "Tomlin", "Claire", "" ] ]
TITLE: Practical Comparison of Optimization Algorithms for Learning-Based MPC with Linear Models ABSTRACT: Learning-based control methods are an attractive approach for addressing performance and efficiency challenges in robotics and automation systems. One such technique that has found application in these domains is learning-based model predictive control (LBMPC). An important novelty of LBMPC lies in the fact that its robustness and stability properties are independent of the type of online learning used. This allows the use of advanced statistical or machine learning methods to provide the adaptation for the controller. This paper is concerned with providing practical comparisons of different optimization algorithms for implementing the LBMPC method, for the special case where the dynamic model of the system is linear and the online learning provides linear updates to the dynamic model. For comparison purposes, we have implemented a primal-dual infeasible start interior point method that exploits the sparsity structure of LBMPC. Our open source implementation (called LBmpcIPM) is available through a BSD license and is provided freely to enable the rapid implementation of LBMPC on other platforms. This solver is compared to the dense active set solvers LSSOL and qpOASES using a quadrotor helicopter platform. Two scenarios are considered: The first is a simulation comparing hovering control for the quadrotor, and the second is on-board control experiments of dynamic quadrotor flight. Though the LBmpcIPM method has better asymptotic computational complexity than LSSOL and qpOASES, we find that for certain integrated systems (like our quadrotor testbed) these methods can outperform LBmpcIPM. This suggests that actual benchmarks should be used when choosing which algorithm is used to implement LBMPC on practical systems.
1404.2872
Md Pavel Mahmud
Md Pavel Mahmud and Alexander Schliep
TreQ-CG: Clustering Accelerates High-Throughput Sequencing Read Mapping
null
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As high-throughput sequencers become standard equipment outside of sequencing centers, there is an increasing need for efficient methods for pre-processing and primary analysis. While a vast literature proposes methods for HTS data analysis, we argue that significant improvements can still be gained by exploiting expensive pre-processing steps which can be amortized with savings from later stages. We propose a method to accelerate and improve read mapping based on an initial clustering of possibly billions of high-throughput sequencing reads, yielding clusters of high stringency and a high degree of overlap. This clustering improves on the state-of-the-art in running time for small datasets and, for the first time, makes clustering high-coverage human libraries feasible. Given the efficiently computed clusters, only one representative read from each cluster needs to be mapped using a traditional readmapper such as BWA, instead of individually mapping all reads. On human reads, all processing steps, including clustering and mapping, only require 11%-59% of the time for individually mapping all reads, achieving speed-ups for all readmappers, while minimally affecting mapping quality. This accelerates a highly sensitive readmapper such as Stampy to be competitive with a fast readmapper such as BWA on unclustered reads.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 16:29:09 GMT" } ]
2014-04-11T00:00:00
[ [ "Mahmud", "Md Pavel", "" ], [ "Schliep", "Alexander", "" ] ]
TITLE: TreQ-CG: Clustering Accelerates High-Throughput Sequencing Read Mapping ABSTRACT: As high-throughput sequencers become standard equipment outside of sequencing centers, there is an increasing need for efficient methods for pre-processing and primary analysis. While a vast literature proposes methods for HTS data analysis, we argue that significant improvements can still be gained by exploiting expensive pre-processing steps which can be amortized with savings from later stages. We propose a method to accelerate and improve read mapping based on an initial clustering of possibly billions of high-throughput sequencing reads, yielding clusters of high stringency and a high degree of overlap. This clustering improves on the state-of-the-art in running time for small datasets and, for the first time, makes clustering high-coverage human libraries feasible. Given the efficiently computed clusters, only one representative read from each cluster needs to be mapped using a traditional readmapper such as BWA, instead of individually mapping all reads. On human reads, all processing steps, including clustering and mapping, only require 11%-59% of the time for individually mapping all reads, achieving speed-ups for all readmappers, while minimally affecting mapping quality. This accelerates a highly sensitive readmapper such as Stampy to be competitive with a fast readmapper such as BWA on unclustered reads.
1404.2268
Junyan Wang
Junyan Wang and Sai-Kit Yeung
A Compact Linear Programming Relaxation for Binary Sub-modular MRF
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel compact linear programming (LP) relaxation for binary sub-modular MRF in the context of object segmentation. Our model is obtained by linearizing an $l_1^+$-norm derived from the quadratic programming (QP) form of the MRF energy. The resultant LP model contains significantly fewer variables and constraints compared to the conventional LP relaxation of the MRF energy. In addition, unlike QP which can produce ambiguous labels, our model can be viewed as a quasi-total-variation minimization problem, and it can therefore preserve the discontinuities in the labels. We further establish a relaxation bound between our LP model and the conventional LP model. In the experiments, we demonstrate our method for the task of interactive object segmentation. Our LP model outperforms QP when converting the continuous labels to binary labels using different threshold values on the entire Oxford interactive segmentation dataset. The computational complexity of our LP is of the same order as that of the QP, and it is significantly lower than the conventional LP relaxation.
[ { "version": "v1", "created": "Wed, 9 Apr 2014 16:33:44 GMT" } ]
2014-04-10T00:00:00
[ [ "Wang", "Junyan", "" ], [ "Yeung", "Sai-Kit", "" ] ]
TITLE: A Compact Linear Programming Relaxation for Binary Sub-modular MRF ABSTRACT: We propose a novel compact linear programming (LP) relaxation for binary sub-modular MRF in the context of object segmentation. Our model is obtained by linearizing an $l_1^+$-norm derived from the quadratic programming (QP) form of the MRF energy. The resultant LP model contains significantly fewer variables and constraints compared to the conventional LP relaxation of the MRF energy. In addition, unlike QP which can produce ambiguous labels, our model can be viewed as a quasi-total-variation minimization problem, and it can therefore preserve the discontinuities in the labels. We further establish a relaxation bound between our LP model and the conventional LP model. In the experiments, we demonstrate our method for the task of interactive object segmentation. Our LP model outperforms QP when converting the continuous labels to binary labels using different threshold values on the entire Oxford interactive segmentation dataset. The computational complexity of our LP is of the same order as that of the QP, and it is significantly lower than the conventional LP relaxation.
1404.2512
Vaibhav Jha
Vaibhav Jha, Sunny Deol, Mohit Jha and GK Sharma
Energy and Latency Aware Application Mapping Algorithm & Optimization for Homogeneous 3D Network on Chip
15 pages, 11 figure, CCSEA 2014
null
10.5121/csit.2014.4302
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficiency is one of the most critical issue in design of System on Chip. In Network On Chip (NoC) based system, energy consumption is influenced dramatically by mapping of Intellectual Property (IP) which affect the performance of the system. In this paper we test the antecedently extant proposed algorithms and introduced a new energy proficient algorithm stand for 3D NoC architecture. In addition a hybrid method has also been implemented using bioinspired optimization (particle swarm optimization) technique. The proposed algorithm has been implemented and evaluated on randomly generated benchmark and real life application such as MMS, Telecom and VOPD. The algorithm has also been tested with the E3S benchmark and has been compared with the existing algorithm (spiral and crinkle) and has shown better reduction in the communication energy consumption and shows improvement in the performance of the system. Comparing our work with spiral and crinkle, experimental result shows that the average reduction in communication energy consumption is 19% with spiral and 17% with crinkle mapping algorithms, while reduction in communication cost is 24% and 21% whereas reduction in latency is of 24% and 22% with spiral and crinkle. Optimizing our work and the existing methods using bio-inspired technique and having the comparison among them an average energy reduction is found to be of 18% and 24%.
[ { "version": "v1", "created": "Mon, 7 Apr 2014 15:10:08 GMT" } ]
2014-04-10T00:00:00
[ [ "Jha", "Vaibhav", "" ], [ "Deol", "Sunny", "" ], [ "Jha", "Mohit", "" ], [ "Sharma", "GK", "" ] ]
TITLE: Energy and Latency Aware Application Mapping Algorithm & Optimization for Homogeneous 3D Network on Chip ABSTRACT: Energy efficiency is one of the most critical issue in design of System on Chip. In Network On Chip (NoC) based system, energy consumption is influenced dramatically by mapping of Intellectual Property (IP) which affect the performance of the system. In this paper we test the antecedently extant proposed algorithms and introduced a new energy proficient algorithm stand for 3D NoC architecture. In addition a hybrid method has also been implemented using bioinspired optimization (particle swarm optimization) technique. The proposed algorithm has been implemented and evaluated on randomly generated benchmark and real life application such as MMS, Telecom and VOPD. The algorithm has also been tested with the E3S benchmark and has been compared with the existing algorithm (spiral and crinkle) and has shown better reduction in the communication energy consumption and shows improvement in the performance of the system. Comparing our work with spiral and crinkle, experimental result shows that the average reduction in communication energy consumption is 19% with spiral and 17% with crinkle mapping algorithms, while reduction in communication cost is 24% and 21% whereas reduction in latency is of 24% and 22% with spiral and crinkle. Optimizing our work and the existing methods using bio-inspired technique and having the comparison among them an average energy reduction is found to be of 18% and 24%.
1404.1911
Bahador Saket
Bahador Saket, Paolo Simonetto, Stephen Kobourov and Katy Borner
Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Effectively showing the relationships between objects in a dataset is one of the main tasks in information visualization. Typically there is a well-defined notion of distance between pairs of objects, and traditional approaches such as principal component analysis or multi-dimensional scaling are used to place the objects as points in 2D space, so that similar objects are close to each other. In another typical setting, the dataset is visualized as a network graph, where related nodes are connected by links. More recently, datasets are also visualized as maps, where in addition to nodes and links, there is an explicit representation of groups and clusters. We consider these three Techniques, characterized by a progressive increase of the amount of encoded information: node diagrams, node-link diagrams and node-link-group diagrams. We assess these three types of diagrams with a controlled experiment that covers nine different tasks falling broadly in three categories: node-based tasks, network-based tasks and group-based tasks. Our findings indicate that adding links, or links and group representations, does not negatively impact performance (time and accuracy) of node-based tasks. Similarly, adding group representations does not negatively impact the performance of network-based tasks. Node-link-group diagrams outperform the others on group-based tasks. These conclusions contradict results in other studies, in similar but subtly different settings. Taken together, however, such results can have significant implications for the design of standard and domain specific visualizations tools.
[ { "version": "v1", "created": "Mon, 7 Apr 2014 20:01:40 GMT" } ]
2014-04-09T00:00:00
[ [ "Saket", "Bahador", "" ], [ "Simonetto", "Paolo", "" ], [ "Kobourov", "Stephen", "" ], [ "Borner", "Katy", "" ] ]
TITLE: Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation ABSTRACT: Effectively showing the relationships between objects in a dataset is one of the main tasks in information visualization. Typically there is a well-defined notion of distance between pairs of objects, and traditional approaches such as principal component analysis or multi-dimensional scaling are used to place the objects as points in 2D space, so that similar objects are close to each other. In another typical setting, the dataset is visualized as a network graph, where related nodes are connected by links. More recently, datasets are also visualized as maps, where in addition to nodes and links, there is an explicit representation of groups and clusters. We consider these three Techniques, characterized by a progressive increase of the amount of encoded information: node diagrams, node-link diagrams and node-link-group diagrams. We assess these three types of diagrams with a controlled experiment that covers nine different tasks falling broadly in three categories: node-based tasks, network-based tasks and group-based tasks. Our findings indicate that adding links, or links and group representations, does not negatively impact performance (time and accuracy) of node-based tasks. Similarly, adding group representations does not negatively impact the performance of network-based tasks. Node-link-group diagrams outperform the others on group-based tasks. These conclusions contradict results in other studies, in similar but subtly different settings. Taken together, however, such results can have significant implications for the design of standard and domain specific visualizations tools.
1404.2005
Duc Phu Chau
Duc Phu Chau (INRIA Sophia Antipolis), Fran\c{c}ois Bremond (INRIA Sophia Antipolis), Monique Thonnat (INRIA Sophia Antipolis), Slawomir Bak (INRIA Sophia Antipolis)
Automatic Tracker Selection w.r.t Object Detection Performance
IEEE Winter Conference on Applications of Computer Vision (WACV 2014) (2014)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The tracking algorithm performance depends on video content. This paper presents a new multi-object tracking approach which is able to cope with video content variations. First the object detection is improved using Kanade- Lucas-Tomasi (KLT) feature tracking. Second, for each mobile object, an appropriate tracker is selected among a KLT-based tracker and a discriminative appearance-based tracker. This selection is supported by an online tracking evaluation. The approach has been experimented on three public video datasets. The experimental results show a better performance of the proposed approach compared to recent state of the art trackers.
[ { "version": "v1", "created": "Tue, 8 Apr 2014 04:09:32 GMT" } ]
2014-04-09T00:00:00
[ [ "Chau", "Duc Phu", "", "INRIA Sophia Antipolis" ], [ "Bremond", "François", "", "INRIA\n Sophia Antipolis" ], [ "Thonnat", "Monique", "", "INRIA Sophia Antipolis" ], [ "Bak", "Slawomir", "", "INRIA Sophia Antipolis" ] ]
TITLE: Automatic Tracker Selection w.r.t Object Detection Performance ABSTRACT: The tracking algorithm performance depends on video content. This paper presents a new multi-object tracking approach which is able to cope with video content variations. First the object detection is improved using Kanade- Lucas-Tomasi (KLT) feature tracking. Second, for each mobile object, an appropriate tracker is selected among a KLT-based tracker and a discriminative appearance-based tracker. This selection is supported by an online tracking evaluation. The approach has been experimented on three public video datasets. The experimental results show a better performance of the proposed approach compared to recent state of the art trackers.
1305.4014
Agata Fronczak
Piotr Fronczak, Agata Fronczak, Maksymilian Bujok
Exponential random graph models for networks with community structure
8 pages, 2 figures
Phys. Rev. E 88, 032810 (2013)
10.1103/PhysRevE.88.032810
null
physics.soc-ph cond-mat.dis-nn cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although the community structure organization is one of the most important characteristics of real-world networks, the traditional network models fail to reproduce the feature. Therefore, the models are useless as benchmark graphs for testing community detection algorithms. They are also inadequate to predict various properties of real networks. With this paper we intend to fill the gap. We develop an exponential random graph approach to networks with community structure. To this end we mainly built upon the idea of blockmodels. We consider both, the classical blockmodel and its degree-corrected counterpart, and study many of their properties analytically. We show that in the degree-corrected blockmodel, node degrees display an interesting scaling property, which is reminiscent of what is observed in real-world fractal networks. The scaling feature comes as a surprise, especially that in this study, contrary to what is suggested in the literature, the scaling property is not attributed to any specific network construction procedure. It is an intrinsic feature of the degree-corrected blockmodel. A short description of Monte Carlo simulations of the models is also given in the hope of being useful to others working in the field.
[ { "version": "v1", "created": "Fri, 17 May 2013 08:40:15 GMT" } ]
2014-04-08T00:00:00
[ [ "Fronczak", "Piotr", "" ], [ "Fronczak", "Agata", "" ], [ "Bujok", "Maksymilian", "" ] ]
TITLE: Exponential random graph models for networks with community structure ABSTRACT: Although the community structure organization is one of the most important characteristics of real-world networks, the traditional network models fail to reproduce the feature. Therefore, the models are useless as benchmark graphs for testing community detection algorithms. They are also inadequate to predict various properties of real networks. With this paper we intend to fill the gap. We develop an exponential random graph approach to networks with community structure. To this end we mainly built upon the idea of blockmodels. We consider both, the classical blockmodel and its degree-corrected counterpart, and study many of their properties analytically. We show that in the degree-corrected blockmodel, node degrees display an interesting scaling property, which is reminiscent of what is observed in real-world fractal networks. The scaling feature comes as a surprise, especially that in this study, contrary to what is suggested in the literature, the scaling property is not attributed to any specific network construction procedure. It is an intrinsic feature of the degree-corrected blockmodel. A short description of Monte Carlo simulations of the models is also given in the hope of being useful to others working in the field.
1307.7751
Guoming Tang
Guoming Tang, Kui Wu, Jingsheng Lei, Zhongqin Bi and Jiuyang Tang
From Landscape to Portrait: A New Approach for Outlier Detection in Load Curve Data
10 pages, 9 figures
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In power systems, load curve data is one of the most important datasets that are collected and retained by utilities. The quality of load curve data, however, is hard to guarantee since the data is subject to communication losses, meter malfunctions, and many other impacts. In this paper, a new approach to analyzing load curve data is presented. The method adopts a new view, termed \textit{portrait}, on the load curve data by analyzing the periodic patterns in the data and re-organizing the data for ease of analysis. Furthermore, we introduce algorithms to build the virtual portrait load curve data, and demonstrate its application on load curve data cleansing. Compared to existing regression-based methods, our method is much faster and more accurate for both small-scale and large-scale real-world datasets.
[ { "version": "v1", "created": "Mon, 29 Jul 2013 21:59:30 GMT" }, { "version": "v2", "created": "Wed, 31 Jul 2013 17:22:07 GMT" }, { "version": "v3", "created": "Mon, 7 Apr 2014 19:17:23 GMT" } ]
2014-04-08T00:00:00
[ [ "Tang", "Guoming", "" ], [ "Wu", "Kui", "" ], [ "Lei", "Jingsheng", "" ], [ "Bi", "Zhongqin", "" ], [ "Tang", "Jiuyang", "" ] ]
TITLE: From Landscape to Portrait: A New Approach for Outlier Detection in Load Curve Data ABSTRACT: In power systems, load curve data is one of the most important datasets that are collected and retained by utilities. The quality of load curve data, however, is hard to guarantee since the data is subject to communication losses, meter malfunctions, and many other impacts. In this paper, a new approach to analyzing load curve data is presented. The method adopts a new view, termed \textit{portrait}, on the load curve data by analyzing the periodic patterns in the data and re-organizing the data for ease of analysis. Furthermore, we introduce algorithms to build the virtual portrait load curve data, and demonstrate its application on load curve data cleansing. Compared to existing regression-based methods, our method is much faster and more accurate for both small-scale and large-scale real-world datasets.
1312.0803
Amir Najafi
Amir Najafi, Amir Joudaki, and Emad Fatemizadeh
Nonlinear Dimensionality Reduction via Path-Based Isometric Mapping
(29) pages, (12) figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nonlinear dimensionality reduction methods have demonstrated top-notch performance in many pattern recognition and image classification tasks. Despite their popularity, they suffer from highly expensive time and memory requirements, which render them inapplicable to large-scale datasets. To leverage such cases we propose a new method called "Path-Based Isomap". Similar to Isomap, we exploit geodesic paths to find the low-dimensional embedding. However, instead of preserving pairwise geodesic distances, the low-dimensional embedding is computed via a path-mapping algorithm. Due to the much fewer number of paths compared to number of data points, a significant improvement in time and memory complexity without any decline in performance is achieved. The method demonstrates state-of-the-art performance on well-known synthetic and real-world datasets, as well as in the presence of noise.
[ { "version": "v1", "created": "Tue, 3 Dec 2013 12:56:46 GMT" }, { "version": "v2", "created": "Thu, 5 Dec 2013 15:05:53 GMT" }, { "version": "v3", "created": "Sun, 6 Apr 2014 13:38:32 GMT" } ]
2014-04-08T00:00:00
[ [ "Najafi", "Amir", "" ], [ "Joudaki", "Amir", "" ], [ "Fatemizadeh", "Emad", "" ] ]
TITLE: Nonlinear Dimensionality Reduction via Path-Based Isometric Mapping ABSTRACT: Nonlinear dimensionality reduction methods have demonstrated top-notch performance in many pattern recognition and image classification tasks. Despite their popularity, they suffer from highly expensive time and memory requirements, which render them inapplicable to large-scale datasets. To leverage such cases we propose a new method called "Path-Based Isomap". Similar to Isomap, we exploit geodesic paths to find the low-dimensional embedding. However, instead of preserving pairwise geodesic distances, the low-dimensional embedding is computed via a path-mapping algorithm. Due to the much fewer number of paths compared to number of data points, a significant improvement in time and memory complexity without any decline in performance is achieved. The method demonstrates state-of-the-art performance on well-known synthetic and real-world datasets, as well as in the presence of noise.
1404.1831
Artem Babenko
Artem Babenko and Victor Lempitsky
Improving Bilayer Product Quantization for Billion-Scale Approximate Nearest Neighbors in High Dimensions
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The top-performing systems for billion-scale high-dimensional approximate nearest neighbor (ANN) search are all based on two-layer architectures that include an indexing structure and a compressed datapoints layer. An indexing structure is crucial as it allows to avoid exhaustive search, while the lossy data compression is needed to fit the dataset into RAM. Several of the most successful systems use product quantization (PQ) for both the indexing and the dataset compression layers. These systems are however limited in the way they exploit the interaction of product quantization processes that happen at different stages of these systems. Here we introduce and evaluate two approximate nearest neighbor search systems that both exploit the synergy of product quantization processes in a more efficient way. The first system, called Fast Bilayer Product Quantization (FBPQ), speeds up the runtime of the baseline system (Multi-D-ADC) by several times, while achieving the same accuracy. The second system, Hierarchical Bilayer Product Quantization (HBPQ) provides a significantly better recall for the same runtime at a cost of small memory footprint increase. For the BIGANN dataset of billion SIFT descriptors, the 10% increase in Recall@1 and the 17% increase in Recall@10 is observed.
[ { "version": "v1", "created": "Mon, 7 Apr 2014 16:08:13 GMT" } ]
2014-04-08T00:00:00
[ [ "Babenko", "Artem", "" ], [ "Lempitsky", "Victor", "" ] ]
TITLE: Improving Bilayer Product Quantization for Billion-Scale Approximate Nearest Neighbors in High Dimensions ABSTRACT: The top-performing systems for billion-scale high-dimensional approximate nearest neighbor (ANN) search are all based on two-layer architectures that include an indexing structure and a compressed datapoints layer. An indexing structure is crucial as it allows to avoid exhaustive search, while the lossy data compression is needed to fit the dataset into RAM. Several of the most successful systems use product quantization (PQ) for both the indexing and the dataset compression layers. These systems are however limited in the way they exploit the interaction of product quantization processes that happen at different stages of these systems. Here we introduce and evaluate two approximate nearest neighbor search systems that both exploit the synergy of product quantization processes in a more efficient way. The first system, called Fast Bilayer Product Quantization (FBPQ), speeds up the runtime of the baseline system (Multi-D-ADC) by several times, while achieving the same accuracy. The second system, Hierarchical Bilayer Product Quantization (HBPQ) provides a significantly better recall for the same runtime at a cost of small memory footprint increase. For the BIGANN dataset of billion SIFT descriptors, the 10% increase in Recall@1 and the 17% increase in Recall@10 is observed.
1404.1355
Maksym Gabielkov
Maksym Gabielkov (Inria Sophia Antipolis), Ashwin Rao (Inria Sophia Antipolis), Arnaud Legout (Inria Sophia Antipolis)
Studying Social Networks at Scale: Macroscopic Anatomy of the Twitter Social Graph
ACM Sigmetrics 2014 (2014)
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Twitter is one of the largest social networks using exclusively directed links among accounts. This makes the Twitter social graph much closer to the social graph supporting real life communications than, for instance, Facebook. Therefore, understanding the structure of the Twitter social graph is interesting not only for computer scientists, but also for researchers in other fields, such as sociologists. However, little is known about how the information propagation in Twitter is constrained by its inner structure. In this paper, we present an in-depth study of the macroscopic structure of the Twitter social graph unveiling the highways on which tweets propagate, the specific user activity associated with each component of this macroscopic structure, and the evolution of this macroscopic structure with time for the past 6 years. For this study, we crawled Twitter to retrieve all accounts and all social relationships (follow links) among accounts; the crawl completed in July 2012 with 505 million accounts interconnected by 23 billion links. Then, we present a methodology to unveil the macroscopic structure of the Twitter social graph. This macroscopic structure consists of 8 components defined by their connectivity characteristics. Each component group users with a specific usage of Twitter. For instance, we identified components gathering together spammers, or celebrities. Finally, we present a method to approximate the macroscopic structure of the Twitter social graph in the past, validate this method using old datasets, and discuss the evolution of the macroscopic structure of the Twitter social graph during the past 6 years.
[ { "version": "v1", "created": "Fri, 4 Apr 2014 19:33:22 GMT" } ]
2014-04-07T00:00:00
[ [ "Gabielkov", "Maksym", "", "Inria Sophia Antipolis" ], [ "Rao", "Ashwin", "", "Inria Sophia\n Antipolis" ], [ "Legout", "Arnaud", "", "Inria Sophia Antipolis" ] ]
TITLE: Studying Social Networks at Scale: Macroscopic Anatomy of the Twitter Social Graph ABSTRACT: Twitter is one of the largest social networks using exclusively directed links among accounts. This makes the Twitter social graph much closer to the social graph supporting real life communications than, for instance, Facebook. Therefore, understanding the structure of the Twitter social graph is interesting not only for computer scientists, but also for researchers in other fields, such as sociologists. However, little is known about how the information propagation in Twitter is constrained by its inner structure. In this paper, we present an in-depth study of the macroscopic structure of the Twitter social graph unveiling the highways on which tweets propagate, the specific user activity associated with each component of this macroscopic structure, and the evolution of this macroscopic structure with time for the past 6 years. For this study, we crawled Twitter to retrieve all accounts and all social relationships (follow links) among accounts; the crawl completed in July 2012 with 505 million accounts interconnected by 23 billion links. Then, we present a methodology to unveil the macroscopic structure of the Twitter social graph. This macroscopic structure consists of 8 components defined by their connectivity characteristics. Each component group users with a specific usage of Twitter. For instance, we identified components gathering together spammers, or celebrities. Finally, we present a method to approximate the macroscopic structure of the Twitter social graph in the past, validate this method using old datasets, and discuss the evolution of the macroscopic structure of the Twitter social graph during the past 6 years.
1404.1066
Stephen Tyree
Stephen Tyree, Jacob R. Gardner, Kilian Q. Weinberger, Kunal Agrawal, John Tran
Parallel Support Vector Machines in Practice
10 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we evaluate the performance of various parallel optimization methods for Kernel Support Vector Machines on multicore CPUs and GPUs. In particular, we provide the first comparison of algorithms with explicit and implicit parallelization. Most existing parallel implementations for multi-core or GPU architectures are based on explicit parallelization of Sequential Minimal Optimization (SMO)---the programmers identified parallelizable components and hand-parallelized them, specifically tuned for a particular architecture. We compare these approaches with each other and with implicitly parallelized algorithms---where the algorithm is expressed such that most of the work is done within few iterations with large dense linear algebra operations. These can be computed with highly-optimized libraries, that are carefully parallelized for a large variety of parallel platforms. We highlight the advantages and disadvantages of both approaches and compare them on various benchmark data sets. We find an approximate implicitly parallel algorithm which is surprisingly efficient, permits a much simpler implementation, and leads to unprecedented speedups in SVM training.
[ { "version": "v1", "created": "Thu, 3 Apr 2014 19:49:57 GMT" } ]
2014-04-04T00:00:00
[ [ "Tyree", "Stephen", "" ], [ "Gardner", "Jacob R.", "" ], [ "Weinberger", "Kilian Q.", "" ], [ "Agrawal", "Kunal", "" ], [ "Tran", "John", "" ] ]
TITLE: Parallel Support Vector Machines in Practice ABSTRACT: In this paper, we evaluate the performance of various parallel optimization methods for Kernel Support Vector Machines on multicore CPUs and GPUs. In particular, we provide the first comparison of algorithms with explicit and implicit parallelization. Most existing parallel implementations for multi-core or GPU architectures are based on explicit parallelization of Sequential Minimal Optimization (SMO)---the programmers identified parallelizable components and hand-parallelized them, specifically tuned for a particular architecture. We compare these approaches with each other and with implicitly parallelized algorithms---where the algorithm is expressed such that most of the work is done within few iterations with large dense linear algebra operations. These can be computed with highly-optimized libraries, that are carefully parallelized for a large variety of parallel platforms. We highlight the advantages and disadvantages of both approaches and compare them on various benchmark data sets. We find an approximate implicitly parallel algorithm which is surprisingly efficient, permits a much simpler implementation, and leads to unprecedented speedups in SVM training.
1404.0334
Menglong Zhu
Menglong Zhu, Nikolay Atanasov, George J. Pappas, Kostas Daniilidis
Active Deformable Part Models
9 pages
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an active approach for part-based object detection, which optimizes the order of part filter evaluations and the time at which to stop and make a prediction. Statistics, describing the part responses, are learned from training data and are used to formalize the part scheduling problem as an offline optimization. Dynamic programming is applied to obtain a policy, which balances the number of part evaluations with the classification accuracy. During inference, the policy is used as a look-up table to choose the part order and the stopping time based on the observed filter responses. The method is faster than cascade detection with deformable part models (which does not optimize the part order) with negligible loss in accuracy when evaluated on the PASCAL VOC 2007 and 2010 datasets.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 18:07:58 GMT" }, { "version": "v2", "created": "Wed, 2 Apr 2014 19:00:29 GMT" } ]
2014-04-03T00:00:00
[ [ "Zhu", "Menglong", "" ], [ "Atanasov", "Nikolay", "" ], [ "Pappas", "George J.", "" ], [ "Daniilidis", "Kostas", "" ] ]
TITLE: Active Deformable Part Models ABSTRACT: This paper presents an active approach for part-based object detection, which optimizes the order of part filter evaluations and the time at which to stop and make a prediction. Statistics, describing the part responses, are learned from training data and are used to formalize the part scheduling problem as an offline optimization. Dynamic programming is applied to obtain a policy, which balances the number of part evaluations with the classification accuracy. During inference, the policy is used as a look-up table to choose the part order and the stopping time based on the observed filter responses. The method is faster than cascade detection with deformable part models (which does not optimize the part order) with negligible loss in accuracy when evaluated on the PASCAL VOC 2007 and 2010 datasets.
1404.0404
Xu Chen
Xu Chen, Zeeshan Syed, Alfred Hero
EEG Spatial Decoding and Classification with Logit Shrinkage Regularized Directed Information Assessment (L-SODA)
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
There is an increasing interest in studying the neural interaction mechanisms behind patterns of cognitive brain activity. This paper proposes a new approach to infer such interaction mechanisms from electroencephalographic (EEG) data using a new estimator of directed information (DI) called logit shrinkage optimized directed information assessment (L-SODA). Unlike previous directed information measures applied to neural decoding, L-SODA uses shrinkage regularization on multinomial logistic regression to deal with the high dimensionality of multi-channel EEG signals and the small sizes of many real-world datasets. It is designed to make few a priori assumptions and can handle both non-linear and non-Gaussian flows among electrodes. Our L-SODA estimator of the DI is accompanied by robust statistical confidence intervals on the true DI that make it especially suitable for hypothesis testing on the information flow patterns. We evaluate our work in the context of two different problems where interaction localization is used to determine highly interactive areas for EEG signals spatially and temporally. First, by mapping the areas that have high DI into Brodmann area, we identify that the areas with high DI are associated with motor-related functions. We demonstrate that L-SODA provides better accuracy for neural decoding of EEG signals as compared to several state-of-the-art approaches on the Brain Computer Interface (BCI) EEG motor activity dataset. Second, the proposed L-SODA estimator is evaluated on the CHB-MIT Scalp EEG database. We demonstrate that compared to the state-of-the-art approaches, the proposed method provides better performance in detecting the epileptic seizure.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 21:43:13 GMT" } ]
2014-04-03T00:00:00
[ [ "Chen", "Xu", "" ], [ "Syed", "Zeeshan", "" ], [ "Hero", "Alfred", "" ] ]
TITLE: EEG Spatial Decoding and Classification with Logit Shrinkage Regularized Directed Information Assessment (L-SODA) ABSTRACT: There is an increasing interest in studying the neural interaction mechanisms behind patterns of cognitive brain activity. This paper proposes a new approach to infer such interaction mechanisms from electroencephalographic (EEG) data using a new estimator of directed information (DI) called logit shrinkage optimized directed information assessment (L-SODA). Unlike previous directed information measures applied to neural decoding, L-SODA uses shrinkage regularization on multinomial logistic regression to deal with the high dimensionality of multi-channel EEG signals and the small sizes of many real-world datasets. It is designed to make few a priori assumptions and can handle both non-linear and non-Gaussian flows among electrodes. Our L-SODA estimator of the DI is accompanied by robust statistical confidence intervals on the true DI that make it especially suitable for hypothesis testing on the information flow patterns. We evaluate our work in the context of two different problems where interaction localization is used to determine highly interactive areas for EEG signals spatially and temporally. First, by mapping the areas that have high DI into Brodmann area, we identify that the areas with high DI are associated with motor-related functions. We demonstrate that L-SODA provides better accuracy for neural decoding of EEG signals as compared to several state-of-the-art approaches on the Brain Computer Interface (BCI) EEG motor activity dataset. Second, the proposed L-SODA estimator is evaluated on the CHB-MIT Scalp EEG database. We demonstrate that compared to the state-of-the-art approaches, the proposed method provides better performance in detecting the epileptic seizure.
1312.4476
Philipp Mayr
Lars Kaczmirek, Philipp Mayr, Ravi Vatrapu, Arnim Bleier, Manuela Blumenberg, Tobias Gummer, Abid Hussain, Katharina Kinder-Kurlanda, Kaveh Manshaei, Mark Thamm, Katrin Weller, Alexander Wenz, Christof Wolf
Social Media Monitoring of the Campaigns for the 2013 German Bundestag Elections on Facebook and Twitter
29 pages, 2 figures, GESIS-Working Papers No. 31
null
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As more and more people use social media to communicate their view and perception of elections, researchers have increasingly been collecting and analyzing data from social media platforms. Our research focuses on social media communication related to the 2013 election of the German parlia-ment [translation: Bundestagswahl 2013]. We constructed several social media datasets using data from Facebook and Twitter. First, we identified the most relevant candidates (n=2,346) and checked whether they maintained social media accounts. The Facebook data was collected in November 2013 for the period of January 2009 to October 2013. On Facebook we identified 1,408 Facebook walls containing approximately 469,000 posts. Twitter data was collected between June and December 2013 finishing with the constitution of the government. On Twitter we identified 1,009 candidates and 76 other agents, for example, journalists. We estimated the number of relevant tweets to exceed eight million for the period from July 27 to September 27 alone. In this document we summarize past research in the literature, discuss possibilities for research with our data set, explain the data collection procedures, and provide a description of the data and a discussion of issues for archiving and dissemination of social media data.
[ { "version": "v1", "created": "Mon, 16 Dec 2013 19:32:39 GMT" }, { "version": "v2", "created": "Tue, 1 Apr 2014 09:59:24 GMT" } ]
2014-04-02T00:00:00
[ [ "Kaczmirek", "Lars", "" ], [ "Mayr", "Philipp", "" ], [ "Vatrapu", "Ravi", "" ], [ "Bleier", "Arnim", "" ], [ "Blumenberg", "Manuela", "" ], [ "Gummer", "Tobias", "" ], [ "Hussain", "Abid", "" ], [ "Kinder-Kurlanda", "Katharina", "" ], [ "Manshaei", "Kaveh", "" ], [ "Thamm", "Mark", "" ], [ "Weller", "Katrin", "" ], [ "Wenz", "Alexander", "" ], [ "Wolf", "Christof", "" ] ]
TITLE: Social Media Monitoring of the Campaigns for the 2013 German Bundestag Elections on Facebook and Twitter ABSTRACT: As more and more people use social media to communicate their view and perception of elections, researchers have increasingly been collecting and analyzing data from social media platforms. Our research focuses on social media communication related to the 2013 election of the German parlia-ment [translation: Bundestagswahl 2013]. We constructed several social media datasets using data from Facebook and Twitter. First, we identified the most relevant candidates (n=2,346) and checked whether they maintained social media accounts. The Facebook data was collected in November 2013 for the period of January 2009 to October 2013. On Facebook we identified 1,408 Facebook walls containing approximately 469,000 posts. Twitter data was collected between June and December 2013 finishing with the constitution of the government. On Twitter we identified 1,009 candidates and 76 other agents, for example, journalists. We estimated the number of relevant tweets to exceed eight million for the period from July 27 to September 27 alone. In this document we summarize past research in the literature, discuss possibilities for research with our data set, explain the data collection procedures, and provide a description of the data and a discussion of issues for archiving and dissemination of social media data.
1404.0163
David Garcia
David Garcia, Ingmar Weber, Venkata Rama Kiran Garimella
Gender Asymmetries in Reality and Fiction: The Bechdel Test of Social Media
To appear in Proceedings of the 8th International AAAI Conference on Weblogs and Social Media (ICWSM '14)
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The subjective nature of gender inequality motivates the analysis and comparison of data from real and fictional human interaction. We present a computational extension of the Bechdel test: A popular tool to assess if a movie contains a male gender bias, by looking for two female characters who discuss about something besides a man. We provide the tools to quantify Bechdel scores for both genders, and we measure them in movie scripts and large datasets of dialogues between users of MySpace and Twitter. Comparing movies and users of social media, we find that movies and Twitter conversations have a consistent male bias, which does not appear when analyzing MySpace. Furthermore, the narrative of Twitter is closer to the movies that do not pass the Bechdel test than to those that pass it. We link the properties of movies and the users that share trailers of those movies. Our analysis reveals some particularities of movies that pass the Bechdel test: Their trailers are less popular, female users are more likely to share them than male users, and users that share them tend to interact less with male users. Based on our datasets, we define gender independence measurements to analyze the gender biases of a society, as manifested through digital traces of online behavior. Using the profile information of Twitter users, we find larger gender independence for urban users in comparison to rural ones. Additionally, the asymmetry between genders is larger for parents and lower for students. Gender asymmetry varies across US states, increasing with higher average income and latitude. This points to the relation between gender inequality and social, economical, and cultural factors of a society, and how gender roles exist in both fictional narratives and public online dialogues.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 08:40:28 GMT" } ]
2014-04-02T00:00:00
[ [ "Garcia", "David", "" ], [ "Weber", "Ingmar", "" ], [ "Garimella", "Venkata Rama Kiran", "" ] ]
TITLE: Gender Asymmetries in Reality and Fiction: The Bechdel Test of Social Media ABSTRACT: The subjective nature of gender inequality motivates the analysis and comparison of data from real and fictional human interaction. We present a computational extension of the Bechdel test: A popular tool to assess if a movie contains a male gender bias, by looking for two female characters who discuss about something besides a man. We provide the tools to quantify Bechdel scores for both genders, and we measure them in movie scripts and large datasets of dialogues between users of MySpace and Twitter. Comparing movies and users of social media, we find that movies and Twitter conversations have a consistent male bias, which does not appear when analyzing MySpace. Furthermore, the narrative of Twitter is closer to the movies that do not pass the Bechdel test than to those that pass it. We link the properties of movies and the users that share trailers of those movies. Our analysis reveals some particularities of movies that pass the Bechdel test: Their trailers are less popular, female users are more likely to share them than male users, and users that share them tend to interact less with male users. Based on our datasets, we define gender independence measurements to analyze the gender biases of a society, as manifested through digital traces of online behavior. Using the profile information of Twitter users, we find larger gender independence for urban users in comparison to rural ones. Additionally, the asymmetry between genders is larger for parents and lower for students. Gender asymmetry varies across US states, increasing with higher average income and latitude. This points to the relation between gender inequality and social, economical, and cultural factors of a society, and how gender roles exist in both fictional narratives and public online dialogues.
1404.0200
Andreas Veit
Andreas Veit, Christoph Goebel, Rohit Tidke, Christoph Doblander and Hans-Arno Jacobsen
Household Electricity Demand Forecasting -- Benchmarking State-of-the-Art Methods
Technical Report
null
null
null
cs.LG stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing use of renewable energy sources with variable output, such as solar photovoltaic and wind power generation, calls for Smart Grids that effectively manage flexible loads and energy storage. The ability to forecast consumption at different locations in distribution systems will be a key capability of Smart Grids. The goal of this paper is to benchmark state-of-the-art methods for forecasting electricity demand on the household level across different granularities and time scales in an explorative way, thereby revealing potential shortcomings and find promising directions for future research in this area. We apply a number of forecasting methods including ARIMA, neural networks, and exponential smoothening using several strategies for training data selection, in particular day type and sliding window based strategies. We consider forecasting horizons ranging between 15 minutes and 24 hours. Our evaluation is based on two data sets containing the power usage of individual appliances at second time granularity collected over the course of several months. The results indicate that forecasting accuracy varies significantly depending on the choice of forecasting methods/strategy and the parameter configuration. Measured by the Mean Absolute Percentage Error (MAPE), the considered state-of-the-art forecasting methods rarely beat corresponding persistence forecasts. Overall, we observed MAPEs in the range between 5 and >100%. The average MAPE for the first data set was ~30%, while it was ~85% for the other data set. These results show big room for improvement. Based on the identified trends and experiences from our experiments, we contribute a detailed discussion of promising future research.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 11:32:53 GMT" } ]
2014-04-02T00:00:00
[ [ "Veit", "Andreas", "" ], [ "Goebel", "Christoph", "" ], [ "Tidke", "Rohit", "" ], [ "Doblander", "Christoph", "" ], [ "Jacobsen", "Hans-Arno", "" ] ]
TITLE: Household Electricity Demand Forecasting -- Benchmarking State-of-the-Art Methods ABSTRACT: The increasing use of renewable energy sources with variable output, such as solar photovoltaic and wind power generation, calls for Smart Grids that effectively manage flexible loads and energy storage. The ability to forecast consumption at different locations in distribution systems will be a key capability of Smart Grids. The goal of this paper is to benchmark state-of-the-art methods for forecasting electricity demand on the household level across different granularities and time scales in an explorative way, thereby revealing potential shortcomings and find promising directions for future research in this area. We apply a number of forecasting methods including ARIMA, neural networks, and exponential smoothening using several strategies for training data selection, in particular day type and sliding window based strategies. We consider forecasting horizons ranging between 15 minutes and 24 hours. Our evaluation is based on two data sets containing the power usage of individual appliances at second time granularity collected over the course of several months. The results indicate that forecasting accuracy varies significantly depending on the choice of forecasting methods/strategy and the parameter configuration. Measured by the Mean Absolute Percentage Error (MAPE), the considered state-of-the-art forecasting methods rarely beat corresponding persistence forecasts. Overall, we observed MAPEs in the range between 5 and >100%. The average MAPE for the first data set was ~30%, while it was ~85% for the other data set. These results show big room for improvement. Based on the identified trends and experiences from our experiments, we contribute a detailed discussion of promising future research.