id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1403.6382 | Hossein Azizpour | Ali Sharif Razavian, Hossein Azizpour, Josephine Sullivan, Stefan
Carlsson | CNN Features off-the-shelf: an Astounding Baseline for Recognition | version 3 revisions: 1)Added results using feature processing and
data augmentation 2)Referring to most recent efforts of using CNN for
different visual recognition tasks 3) updated text/caption | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent results indicate that the generic descriptors extracted from the
convolutional neural networks are very powerful. This paper adds to the
mounting evidence that this is indeed the case. We report on a series of
experiments conducted for different recognition tasks using the publicly
available code and model of the \overfeat network which was trained to perform
object classification on ILSVRC13. We use features extracted from the \overfeat
network as a generic image representation to tackle the diverse range of
recognition tasks of object image classification, scene recognition, fine
grained recognition, attribute detection and image retrieval applied to a
diverse set of datasets. We selected these tasks and datasets as they gradually
move further away from the original task and data the \overfeat network was
trained to solve. Astonishingly, we report consistent superior results compared
to the highly tuned state-of-the-art systems in all the visual classification
tasks on various datasets. For instance retrieval it consistently outperforms
low memory footprint methods except for sculptures dataset. The results are
achieved using a linear SVM classifier (or $L2$ distance in case of retrieval)
applied to a feature representation of size 4096 extracted from a layer in the
net. The representations are further modified using simple augmentation
techniques e.g. jittering. The results strongly suggest that features obtained
from deep learning with convolutional nets should be the primary candidate in
most visual recognition tasks.
| [
{
"version": "v1",
"created": "Sun, 23 Mar 2014 13:42:03 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Apr 2014 12:43:13 GMT"
},
{
"version": "v3",
"created": "Mon, 12 May 2014 08:53:31 GMT"
}
] | 2014-05-13T00:00:00 | [
[
"Razavian",
"Ali Sharif",
""
],
[
"Azizpour",
"Hossein",
""
],
[
"Sullivan",
"Josephine",
""
],
[
"Carlsson",
"Stefan",
""
]
] | TITLE: CNN Features off-the-shelf: an Astounding Baseline for Recognition
ABSTRACT: Recent results indicate that the generic descriptors extracted from the
convolutional neural networks are very powerful. This paper adds to the
mounting evidence that this is indeed the case. We report on a series of
experiments conducted for different recognition tasks using the publicly
available code and model of the \overfeat network which was trained to perform
object classification on ILSVRC13. We use features extracted from the \overfeat
network as a generic image representation to tackle the diverse range of
recognition tasks of object image classification, scene recognition, fine
grained recognition, attribute detection and image retrieval applied to a
diverse set of datasets. We selected these tasks and datasets as they gradually
move further away from the original task and data the \overfeat network was
trained to solve. Astonishingly, we report consistent superior results compared
to the highly tuned state-of-the-art systems in all the visual classification
tasks on various datasets. For instance retrieval it consistently outperforms
low memory footprint methods except for sculptures dataset. The results are
achieved using a linear SVM classifier (or $L2$ distance in case of retrieval)
applied to a feature representation of size 4096 extracted from a layer in the
net. The representations are further modified using simple augmentation
techniques e.g. jittering. The results strongly suggest that features obtained
from deep learning with convolutional nets should be the primary candidate in
most visual recognition tasks.
|
1405.2517 | Zubair Nabi Zubair Nabi | Zubair Nabi | A $35 Firewall for the Developing World | null | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A number of recent efforts aim to bridge the global digital divide,
particularly with respect to Internet access. We take this endeavor one step
further and argue that Internet access and web security go hand in glove in the
developing world. To remedy the situation, we explore whether low-cost
platforms, such as Raspberry Pi (\$35) and Cubieboard (\$59), can be used to
implement security mechanisms. Using a firewall as a motivating security
application we benchmark its performance on these platforms to test our thesis.
Our results show that these platforms can indeed serve as enablers of security
functions for small sized deployments in the developing world, while only
consuming less than $2.5 worth of electricity per device per annum. In
addition, we argue that the use of these platforms also addresses maintenance
challenges such as update roll-out and distribution. Furthermore, a number of
additional network functions, such as caching and WAN acceleration can also be
implemented atop this simple infrastructure. Finally, we posit that this
deployment can be used for in-network monitoring to facilitate ICT4D research.
| [
{
"version": "v1",
"created": "Sun, 11 May 2014 10:38:06 GMT"
}
] | 2014-05-13T00:00:00 | [
[
"Nabi",
"Zubair",
""
]
] | TITLE: A $35 Firewall for the Developing World
ABSTRACT: A number of recent efforts aim to bridge the global digital divide,
particularly with respect to Internet access. We take this endeavor one step
further and argue that Internet access and web security go hand in glove in the
developing world. To remedy the situation, we explore whether low-cost
platforms, such as Raspberry Pi (\$35) and Cubieboard (\$59), can be used to
implement security mechanisms. Using a firewall as a motivating security
application we benchmark its performance on these platforms to test our thesis.
Our results show that these platforms can indeed serve as enablers of security
functions for small sized deployments in the developing world, while only
consuming less than $2.5 worth of electricity per device per annum. In
addition, we argue that the use of these platforms also addresses maintenance
challenges such as update roll-out and distribution. Furthermore, a number of
additional network functions, such as caching and WAN acceleration can also be
implemented atop this simple infrastructure. Finally, we posit that this
deployment can be used for in-network monitoring to facilitate ICT4D research.
|
1405.2538 | Neng-Fa Zhou | Neng-Fa Zhou | Combinatorial Search With Picat | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Picat, a new member of the logic programming family, follows a different
doctrine than Prolog in offering the core logic programming concepts: arrays
and maps as built-in data types; implicit pattern matching with explicit
unification and explicit non-determinism; functions for deterministic
computations; and loops for convenient scripting and modeling purposes. Picat
provides facilities for solving combinatorial search problems, including a
common interface with CP, SAT, and MIP solvers, tabling for dynamic
programming, and a module for planning. Picat's planner module, which is
implemented by the use of tabling, has produced surprising and encouraging
results. Thanks to term-sharing and resource-bounded tabled search, Picat
overwhelmingly outperforms the cutting-edge ASP and PDDL planners on the
planning benchmarks used in recent ASP competitions.
| [
{
"version": "v1",
"created": "Sun, 11 May 2014 14:45:07 GMT"
}
] | 2014-05-13T00:00:00 | [
[
"Zhou",
"Neng-Fa",
""
]
] | TITLE: Combinatorial Search With Picat
ABSTRACT: Picat, a new member of the logic programming family, follows a different
doctrine than Prolog in offering the core logic programming concepts: arrays
and maps as built-in data types; implicit pattern matching with explicit
unification and explicit non-determinism; functions for deterministic
computations; and loops for convenient scripting and modeling purposes. Picat
provides facilities for solving combinatorial search problems, including a
common interface with CP, SAT, and MIP solvers, tabling for dynamic
programming, and a module for planning. Picat's planner module, which is
implemented by the use of tabling, has produced surprising and encouraging
results. Thanks to term-sharing and resource-bounded tabled search, Picat
overwhelmingly outperforms the cutting-edge ASP and PDDL planners on the
planning benchmarks used in recent ASP competitions.
|
1405.2220 | Li-Xin Wang | Li-Xin Wang | Gaussian-Chain Filters for Heavy-Tailed Noise with Application to
Detecting Big Buyers and Big Sellers in Stock Market | null | null | null | null | q-fin.TR cs.CE cs.CV cs.SY q-fin.ST | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new heavy-tailed distribution --- Gaussian-Chain (GC)
distribution, which is inspirited by the hierarchical structures prevailing in
social organizations. We determine the mean, variance and kurtosis of the
Gaussian-Chain distribution to show its heavy-tailed property, and compute the
tail distribution table to give specific numbers showing how heavy is the
heavy-tails. To filter out the heavy-tailed noise, we construct two filters ---
2nd and 3rd-order GC filters --- based on the maximum likelihood principle.
Simulation results show that the GC filters perform much better than the
benchmark least-squares algorithm when the noise is heavy-tail distributed.
Using the GC filters, we propose a trading strategy, named Ride-the-Mood, to
follow the mood of the market by detecting the actions of the big buyers and
the big sellers in the market based on the noisy, heavy-tailed price data.
Application of the Ride-the-Mood strategy to five blue-chip Hong Kong stocks
over the recent two-year period from April 2, 2012 to March 31, 2014 shows that
their returns are higher than the returns of the benchmark Buy-and-Hold
strategy and the Hang Seng Index Fund.
| [
{
"version": "v1",
"created": "Fri, 9 May 2014 13:06:27 GMT"
}
] | 2014-05-12T00:00:00 | [
[
"Wang",
"Li-Xin",
""
]
] | TITLE: Gaussian-Chain Filters for Heavy-Tailed Noise with Application to
Detecting Big Buyers and Big Sellers in Stock Market
ABSTRACT: We propose a new heavy-tailed distribution --- Gaussian-Chain (GC)
distribution, which is inspirited by the hierarchical structures prevailing in
social organizations. We determine the mean, variance and kurtosis of the
Gaussian-Chain distribution to show its heavy-tailed property, and compute the
tail distribution table to give specific numbers showing how heavy is the
heavy-tails. To filter out the heavy-tailed noise, we construct two filters ---
2nd and 3rd-order GC filters --- based on the maximum likelihood principle.
Simulation results show that the GC filters perform much better than the
benchmark least-squares algorithm when the noise is heavy-tail distributed.
Using the GC filters, we propose a trading strategy, named Ride-the-Mood, to
follow the mood of the market by detecting the actions of the big buyers and
the big sellers in the market based on the noisy, heavy-tailed price data.
Application of the Ride-the-Mood strategy to five blue-chip Hong Kong stocks
over the recent two-year period from April 2, 2012 to March 31, 2014 shows that
their returns are higher than the returns of the benchmark Buy-and-Hold
strategy and the Hang Seng Index Fund.
|
1307.6373 | Ralph Tanbourgi | Ralph Tanbourgi, Harpreet S. Dhillon, Jeffrey G. Andrews, Friedrich K.
Jondral | Effect of Spatial Interference Correlation on the Performance of Maximum
Ratio Combining | to appear in IEEE Transactions on Wireless Communications | null | 10.1109/TWC.2014.041714.131330 | null | cs.IT cs.NI cs.PF math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While the performance of maximum ratio combining (MRC) is well understood for
a single isolated link, the same is not true in the presence of interference,
which is typically correlated across antennas due to the common locations of
interferers. For tractability, prior work focuses on the two extreme cases
where the interference power across antennas is either assumed to be fully
correlated or fully uncorrelated. In this paper, we address this shortcoming
and characterize the performance of MRC in the presence of spatially-correlated
interference across antennas. Modeling the interference field as a Poisson
point process, we derive the exact distribution of the signal-to-interference
ratio (SIR) for the case of two receive antennas, and upper and lower bounds
for the general case. Using these results, we study the diversity behavior of
MRC and characterize the critical density of simultaneous transmissions for a
given outage constraint. The exact SIR distribution is also useful in
benchmarking simpler correlation models. We show that the full-correlation
assumption is considerably pessimistic (up to 30% higher outage probability for
typical values) and the no-correlation assumption is significantly optimistic
compared to the true performance.
| [
{
"version": "v1",
"created": "Wed, 24 Jul 2013 10:39:58 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2014 09:42:39 GMT"
}
] | 2014-05-09T00:00:00 | [
[
"Tanbourgi",
"Ralph",
""
],
[
"Dhillon",
"Harpreet S.",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Jondral",
"Friedrich K.",
""
]
] | TITLE: Effect of Spatial Interference Correlation on the Performance of Maximum
Ratio Combining
ABSTRACT: While the performance of maximum ratio combining (MRC) is well understood for
a single isolated link, the same is not true in the presence of interference,
which is typically correlated across antennas due to the common locations of
interferers. For tractability, prior work focuses on the two extreme cases
where the interference power across antennas is either assumed to be fully
correlated or fully uncorrelated. In this paper, we address this shortcoming
and characterize the performance of MRC in the presence of spatially-correlated
interference across antennas. Modeling the interference field as a Poisson
point process, we derive the exact distribution of the signal-to-interference
ratio (SIR) for the case of two receive antennas, and upper and lower bounds
for the general case. Using these results, we study the diversity behavior of
MRC and characterize the critical density of simultaneous transmissions for a
given outage constraint. The exact SIR distribution is also useful in
benchmarking simpler correlation models. We show that the full-correlation
assumption is considerably pessimistic (up to 30% higher outage probability for
typical values) and the no-correlation assumption is significantly optimistic
compared to the true performance.
|
1402.0728 | Dominik Kowald | Dominik Kowald, Paul Seitlinger, Christoph Trattner, Tobias Ley | Forgetting the Words but Remembering the Meaning: Modeling Forgetting in
a Verbal and Semantic Tag Recommender | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We assume that recommender systems are more successful, when they are based
on a thorough understanding of how people process information. In the current
paper we test this assumption in the context of social tagging systems.
Cognitive research on how people assign tags has shown that they draw on two
interconnected levels of knowledge in their memory: on a conceptual level of
semantic fields or topics, and on a lexical level that turns patterns on the
semantic level into words. Another strand of tagging research reveals a strong
impact of time dependent forgetting on users' tag choices, such that recently
used tags have a higher probability being reused than "older" tags. In this
paper, we align both strands by implementing a computational theory of human
memory that integrates the two-level conception and the process of forgetting
in form of a tag recommender and test it in three large-scale social tagging
datasets (drawn from BibSonomy, CiteULike and Flickr).
As expected, our results reveal a selective effect of time: forgetting is
much more pronounced on the lexical level of tags. Second, an extensive
evaluation based on this observation shows that a tag recommender
interconnecting both levels and integrating time dependent forgetting on the
lexical level results in high accuracy predictions and outperforms other
well-established algorithms, such as Collaborative Filtering, Pairwise
Interaction Tensor Factorization, FolkRank and two alternative time dependent
approaches. We conclude that tag recommenders can benefit from going beyond the
manifest level of word co-occurrences, and from including forgetting processes
on the lexical level.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 13:31:10 GMT"
},
{
"version": "v2",
"created": "Thu, 8 May 2014 08:37:04 GMT"
}
] | 2014-05-09T00:00:00 | [
[
"Kowald",
"Dominik",
""
],
[
"Seitlinger",
"Paul",
""
],
[
"Trattner",
"Christoph",
""
],
[
"Ley",
"Tobias",
""
]
] | TITLE: Forgetting the Words but Remembering the Meaning: Modeling Forgetting in
a Verbal and Semantic Tag Recommender
ABSTRACT: We assume that recommender systems are more successful, when they are based
on a thorough understanding of how people process information. In the current
paper we test this assumption in the context of social tagging systems.
Cognitive research on how people assign tags has shown that they draw on two
interconnected levels of knowledge in their memory: on a conceptual level of
semantic fields or topics, and on a lexical level that turns patterns on the
semantic level into words. Another strand of tagging research reveals a strong
impact of time dependent forgetting on users' tag choices, such that recently
used tags have a higher probability being reused than "older" tags. In this
paper, we align both strands by implementing a computational theory of human
memory that integrates the two-level conception and the process of forgetting
in form of a tag recommender and test it in three large-scale social tagging
datasets (drawn from BibSonomy, CiteULike and Flickr).
As expected, our results reveal a selective effect of time: forgetting is
much more pronounced on the lexical level of tags. Second, an extensive
evaluation based on this observation shows that a tag recommender
interconnecting both levels and integrating time dependent forgetting on the
lexical level results in high accuracy predictions and outperforms other
well-established algorithms, such as Collaborative Filtering, Pairwise
Interaction Tensor Factorization, FolkRank and two alternative time dependent
approaches. We conclude that tag recommenders can benefit from going beyond the
manifest level of word co-occurrences, and from including forgetting processes
on the lexical level.
|
1405.1511 | Neha Gupta | Neha Gupta, Ponnurangam Kumaraguru | Exploration of gaps in Bitly's spam detection and relevant counter
measures | null | null | null | null | cs.SI cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existence of spam URLs over emails and Online Social Media (OSM) has become a
growing phenomenon. To counter the dissemination issues associated with long
complex URLs in emails and character limit imposed on various OSM (like
Twitter), the concept of URL shortening gained a lot of traction. URL
shorteners take as input a long URL and give a short URL with the same landing
page in return. With its immense popularity over time, it has become a prime
target for the attackers giving them an advantage to conceal malicious content.
Bitly, a leading service in this domain is being exploited heavily to carry out
phishing attacks, work from home scams, pornographic content propagation, etc.
This imposes additional performance pressure on Bitly and other URL shorteners
to be able to detect and take a timely action against the illegitimate content.
In this study, we analyzed a dataset marked as suspicious by Bitly in the month
of October 2013 to highlight some ground issues in their spam detection
mechanism. In addition, we identified some short URL based features and coupled
them with two domain specific features to classify a Bitly URL as malicious /
benign and achieved a maximum accuracy of 86.41%. To the best of our knowledge,
this is the first large scale study to highlight the issues with Bitly's spam
detection policies and proposing a suitable countermeasure.
| [
{
"version": "v1",
"created": "Wed, 7 May 2014 06:02:40 GMT"
}
] | 2014-05-08T00:00:00 | [
[
"Gupta",
"Neha",
""
],
[
"Kumaraguru",
"Ponnurangam",
""
]
] | TITLE: Exploration of gaps in Bitly's spam detection and relevant counter
measures
ABSTRACT: Existence of spam URLs over emails and Online Social Media (OSM) has become a
growing phenomenon. To counter the dissemination issues associated with long
complex URLs in emails and character limit imposed on various OSM (like
Twitter), the concept of URL shortening gained a lot of traction. URL
shorteners take as input a long URL and give a short URL with the same landing
page in return. With its immense popularity over time, it has become a prime
target for the attackers giving them an advantage to conceal malicious content.
Bitly, a leading service in this domain is being exploited heavily to carry out
phishing attacks, work from home scams, pornographic content propagation, etc.
This imposes additional performance pressure on Bitly and other URL shorteners
to be able to detect and take a timely action against the illegitimate content.
In this study, we analyzed a dataset marked as suspicious by Bitly in the month
of October 2013 to highlight some ground issues in their spam detection
mechanism. In addition, we identified some short URL based features and coupled
them with two domain specific features to classify a Bitly URL as malicious /
benign and achieved a maximum accuracy of 86.41%. To the best of our knowledge,
this is the first large scale study to highlight the issues with Bitly's spam
detection policies and proposing a suitable countermeasure.
|
1405.1705 | Raman Grover | Raman Grover, Michael J. Carey | Scalable Fault-Tolerant Data Feeds in AsterixDB | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe the support for data feed ingestion in AsterixDB,
an open-source Big Data Management System (BDMS) that provides a platform for
storage and analysis of large volumes of semi-structured data. Data feeds are a
mechanism for having continuous data arrive into a BDMS from external sources
and incrementally populate a persisted dataset and associated indexes. The need
to persist and index "fast-flowing" high-velocity data (and support ad hoc
analytical queries) is ubiquitous. However, the state of the art today involves
'gluing' together different systems. AsterixDB is different in being a unified
system with "native support" for data feed ingestion.
We discuss the challenges and present the design and implementation of the
concepts involved in modeling and managing data feeds in AsterixDB. AsterixDB
allows the runtime behavior, allocation of resources and the offered degree of
robustness to be customized to suit the high-level application(s) that wish to
consume the ingested data. Initial experiments that evaluate scalability and
fault-tolerance of AsterixDB data feeds facility are reported.
| [
{
"version": "v1",
"created": "Wed, 7 May 2014 19:14:42 GMT"
}
] | 2014-05-08T00:00:00 | [
[
"Grover",
"Raman",
""
],
[
"Carey",
"Michael J.",
""
]
] | TITLE: Scalable Fault-Tolerant Data Feeds in AsterixDB
ABSTRACT: In this paper we describe the support for data feed ingestion in AsterixDB,
an open-source Big Data Management System (BDMS) that provides a platform for
storage and analysis of large volumes of semi-structured data. Data feeds are a
mechanism for having continuous data arrive into a BDMS from external sources
and incrementally populate a persisted dataset and associated indexes. The need
to persist and index "fast-flowing" high-velocity data (and support ad hoc
analytical queries) is ubiquitous. However, the state of the art today involves
'gluing' together different systems. AsterixDB is different in being a unified
system with "native support" for data feed ingestion.
We discuss the challenges and present the design and implementation of the
concepts involved in modeling and managing data feeds in AsterixDB. AsterixDB
allows the runtime behavior, allocation of resources and the offered degree of
robustness to be customized to suit the high-level application(s) that wish to
consume the ingested data. Initial experiments that evaluate scalability and
fault-tolerance of AsterixDB data feeds facility are reported.
|
1311.5591 | Ning Zhang | Ning Zhang, Manohar Paluri, Marc'Aurelio Ranzato, Trevor Darrell,
Lubomir Bourdev | PANDA: Pose Aligned Networks for Deep Attribute Modeling | 8 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method for inferring human attributes (such as gender, hair
style, clothes style, expression, action) from images of people under large
variation of viewpoint, pose, appearance, articulation and occlusion.
Convolutional Neural Nets (CNN) have been shown to perform very well on large
scale object recognition problems. In the context of attribute classification,
however, the signal is often subtle and it may cover only a small part of the
image, while the image is dominated by the effects of pose and viewpoint.
Discounting for pose variation would require training on very large labeled
datasets which are not presently available. Part-based models, such as poselets
and DPM have been shown to perform well for this problem but they are limited
by shallow low-level features. We propose a new method which combines
part-based models and deep learning by training pose-normalized CNNs. We show
substantial improvement vs. state-of-the-art methods on challenging attribute
classification tasks in unconstrained settings. Experiments confirm that our
method outperforms both the best part-based methods on this problem and
conventional CNNs trained on the full bounding box of the person.
| [
{
"version": "v1",
"created": "Thu, 21 Nov 2013 21:43:12 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2014 21:32:36 GMT"
}
] | 2014-05-07T00:00:00 | [
[
"Zhang",
"Ning",
""
],
[
"Paluri",
"Manohar",
""
],
[
"Ranzato",
"Marc'Aurelio",
""
],
[
"Darrell",
"Trevor",
""
],
[
"Bourdev",
"Lubomir",
""
]
] | TITLE: PANDA: Pose Aligned Networks for Deep Attribute Modeling
ABSTRACT: We propose a method for inferring human attributes (such as gender, hair
style, clothes style, expression, action) from images of people under large
variation of viewpoint, pose, appearance, articulation and occlusion.
Convolutional Neural Nets (CNN) have been shown to perform very well on large
scale object recognition problems. In the context of attribute classification,
however, the signal is often subtle and it may cover only a small part of the
image, while the image is dominated by the effects of pose and viewpoint.
Discounting for pose variation would require training on very large labeled
datasets which are not presently available. Part-based models, such as poselets
and DPM have been shown to perform well for this problem but they are limited
by shallow low-level features. We propose a new method which combines
part-based models and deep learning by training pose-normalized CNNs. We show
substantial improvement vs. state-of-the-art methods on challenging attribute
classification tasks in unconstrained settings. Experiments confirm that our
method outperforms both the best part-based methods on this problem and
conventional CNNs trained on the full bounding box of the person.
|
1405.1183 | Daniel Le Berre | Daniel Le Berre | Some thoughts about benchmarks for NMR | Proceedings of the 15th International Workshop on Non-Monotonic
Reasoning (NMR 2014) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The NMR community would like to build a repository of benchmarks to push
forward the design of systems implementing NMR as it has been the case for many
other areas in AI. There are a number of lessons which can be learned from the
experience of other communi- ties. Here are a few thoughts about the
requirements and choices to make before building such a repository.
| [
{
"version": "v1",
"created": "Tue, 6 May 2014 08:09:13 GMT"
}
] | 2014-05-07T00:00:00 | [
[
"Berre",
"Daniel Le",
""
]
] | TITLE: Some thoughts about benchmarks for NMR
ABSTRACT: The NMR community would like to build a repository of benchmarks to push
forward the design of systems implementing NMR as it has been the case for many
other areas in AI. There are a number of lessons which can be learned from the
experience of other communi- ties. Here are a few thoughts about the
requirements and choices to make before building such a repository.
|
1405.1234 | Abhishek Awasthi M.Sc. | Abhishek Awasthi, J\"org L\"assig and Oliver Kramer | A Novel Approach to the Common Due-Date Problem on Single and Parallel
Machines | Book Chapter 22 pages | null | null | null | cs.DS math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel idea for the general case of the Common Due-Date
(CDD) scheduling problem. The problem is about scheduling a certain number of
jobs on a single or parallel machines where all the jobs possess different
processing times but a common due-date. The objective of the problem is to
minimize the total penalty incurred due to earliness or tardiness of the job
completions. This work presents exact polynomial algorithms for optimizing a
given job sequence for single and identical parallel machines with the run-time
complexities of $O(n \log n)$ for both cases, where $n$ is the number of jobs.
Besides, we show that our approach for the parallel machine case is also
suitable for non-identical parallel machines. We prove the optimality for the
single machine case and the runtime complexities of both. Henceforth, we extend
our approach to one particular dynamic case of the CDD and conclude the chapter
with our results for the benchmark instances provided in the OR-library.
| [
{
"version": "v1",
"created": "Tue, 6 May 2014 11:40:02 GMT"
}
] | 2014-05-07T00:00:00 | [
[
"Awasthi",
"Abhishek",
""
],
[
"Lässig",
"Jörg",
""
],
[
"Kramer",
"Oliver",
""
]
] | TITLE: A Novel Approach to the Common Due-Date Problem on Single and Parallel
Machines
ABSTRACT: This paper presents a novel idea for the general case of the Common Due-Date
(CDD) scheduling problem. The problem is about scheduling a certain number of
jobs on a single or parallel machines where all the jobs possess different
processing times but a common due-date. The objective of the problem is to
minimize the total penalty incurred due to earliness or tardiness of the job
completions. This work presents exact polynomial algorithms for optimizing a
given job sequence for single and identical parallel machines with the run-time
complexities of $O(n \log n)$ for both cases, where $n$ is the number of jobs.
Besides, we show that our approach for the parallel machine case is also
suitable for non-identical parallel machines. We prove the optimality for the
single machine case and the runtime complexities of both. Henceforth, we extend
our approach to one particular dynamic case of the CDD and conclude the chapter
with our results for the benchmark instances provided in the OR-library.
|
1405.1392 | Shamanth Kumar | Shamanth Kumar, Huan Liu, Sameep Mehta, and L. Venkata Subramaniam | From Tweets to Events: Exploring a Scalable Solution for Twitter Streams | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The unprecedented use of social media through smartphones and other
web-enabled mobile devices has enabled the rapid adoption of platforms like
Twitter. Event detection has found many applications on the web, including
breaking news identification and summarization. The recent increase in the
usage of Twitter during crises has attracted researchers to focus on detecting
events in tweets. However, current solutions have focused on static Twitter
data. The necessity to detect events in a streaming environment during fast
paced events such as a crisis presents new opportunities and challenges. In
this paper, we investigate event detection in the context of real-time Twitter
streams as observed in real-world crises. We highlight the key challenges in
this problem: the informal nature of text, and the high volume and high
velocity characteristics of Twitter streams. We present a novel approach to
address these challenges using single-pass clustering and the compression
distance to efficiently detect events in Twitter streams. Through experiments
on large Twitter datasets, we demonstrate that the proposed framework is able
to detect events in near real-time and can scale to large and noisy Twitter
streams.
| [
{
"version": "v1",
"created": "Tue, 6 May 2014 18:35:18 GMT"
}
] | 2014-05-07T00:00:00 | [
[
"Kumar",
"Shamanth",
""
],
[
"Liu",
"Huan",
""
],
[
"Mehta",
"Sameep",
""
],
[
"Subramaniam",
"L. Venkata",
""
]
] | TITLE: From Tweets to Events: Exploring a Scalable Solution for Twitter Streams
ABSTRACT: The unprecedented use of social media through smartphones and other
web-enabled mobile devices has enabled the rapid adoption of platforms like
Twitter. Event detection has found many applications on the web, including
breaking news identification and summarization. The recent increase in the
usage of Twitter during crises has attracted researchers to focus on detecting
events in tweets. However, current solutions have focused on static Twitter
data. The necessity to detect events in a streaming environment during fast
paced events such as a crisis presents new opportunities and challenges. In
this paper, we investigate event detection in the context of real-time Twitter
streams as observed in real-world crises. We highlight the key challenges in
this problem: the informal nature of text, and the high volume and high
velocity characteristics of Twitter streams. We present a novel approach to
address these challenges using single-pass clustering and the compression
distance to efficiently detect events in Twitter streams. Through experiments
on large Twitter datasets, we demonstrate that the proposed framework is able
to detect events in near real-time and can scale to large and noisy Twitter
streams.
|
1405.1403 | Hyunsuk Ko | Rui Song, Hyunsuk Ko and C.C. Jay Kuo | MCL-3D: a database for stereoscopic image quality assessment using
2D-image-plus-depth source | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new stereoscopic image quality assessment database rendered using the
2D-image-plus-depth source, called MCL-3D, is described and the performance
benchmarking of several known 2D and 3D image quality metrics using the MCL-3D
database is presented in this work. Nine image-plus-depth sources are first
selected, and a depth image-based rendering (DIBR) technique is used to render
stereoscopic image pairs. Distortions applied to either the texture image or
the depth image before stereoscopic image rendering include: Gaussian blur,
additive white noise, down-sampling blur, JPEG and JPEG-2000 (JP2K) compression
and transmission error. Furthermore, the distortion caused by imperfect
rendering is also examined. The MCL-3D database contains 693 stereoscopic image
pairs, where one third of them are of resolution 1024x728 and two thirds are of
resolution 1920x1080. The pair-wise comparison was adopted in the subjective
test for user friendliness, and the Mean Opinion Score (MOS) can be computed
accordingly. Finally, we evaluate the performance of several 2D and 3D image
quality metrics applied to MCL-3D. All texture images, depth images, rendered
image pairs in MCL-3D and their MOS values obtained in the subjective test are
available to the public (http://mcl.usc.edu/mcl-3d-database/) for future
research and development.
| [
{
"version": "v1",
"created": "Sun, 23 Mar 2014 23:31:49 GMT"
}
] | 2014-05-07T00:00:00 | [
[
"Song",
"Rui",
""
],
[
"Ko",
"Hyunsuk",
""
],
[
"Kuo",
"C. C. Jay",
""
]
] | TITLE: MCL-3D: a database for stereoscopic image quality assessment using
2D-image-plus-depth source
ABSTRACT: A new stereoscopic image quality assessment database rendered using the
2D-image-plus-depth source, called MCL-3D, is described and the performance
benchmarking of several known 2D and 3D image quality metrics using the MCL-3D
database is presented in this work. Nine image-plus-depth sources are first
selected, and a depth image-based rendering (DIBR) technique is used to render
stereoscopic image pairs. Distortions applied to either the texture image or
the depth image before stereoscopic image rendering include: Gaussian blur,
additive white noise, down-sampling blur, JPEG and JPEG-2000 (JP2K) compression
and transmission error. Furthermore, the distortion caused by imperfect
rendering is also examined. The MCL-3D database contains 693 stereoscopic image
pairs, where one third of them are of resolution 1024x728 and two thirds are of
resolution 1920x1080. The pair-wise comparison was adopted in the subjective
test for user friendliness, and the Mean Opinion Score (MOS) can be computed
accordingly. Finally, we evaluate the performance of several 2D and 3D image
quality metrics applied to MCL-3D. All texture images, depth images, rendered
image pairs in MCL-3D and their MOS values obtained in the subjective test are
available to the public (http://mcl.usc.edu/mcl-3d-database/) for future
research and development.
|
1405.1406 | Sallam Abualhaija | Sallam Abualhaija, Karl-Heinz Zimmermann | D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving
Word Sense Disambiguation | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Word sense disambiguation (WSD) is a problem in the field of computational
linguistics given as finding the intended sense of a word (or a set of words)
when it is activated within a certain context. WSD was recently addressed as a
combinatorial optimization problem in which the goal is to find a sequence of
senses that maximize the semantic relatedness among the target words. In this
article, a novel algorithm for solving the WSD problem called D-Bees is
proposed which is inspired by bee colony optimization (BCO)where artificial bee
agents collaborate to solve the problem. The D-Bees algorithm is evaluated on a
standard dataset (SemEval 2007 coarse-grained English all-words task corpus)and
is compared to simulated annealing, genetic algorithms, and two ant colony
optimization techniques (ACO). It will be observed that the BCO and ACO
approaches are on par.
| [
{
"version": "v1",
"created": "Tue, 6 May 2014 19:26:35 GMT"
}
] | 2014-05-07T00:00:00 | [
[
"Abualhaija",
"Sallam",
""
],
[
"Zimmermann",
"Karl-Heinz",
""
]
] | TITLE: D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving
Word Sense Disambiguation
ABSTRACT: Word sense disambiguation (WSD) is a problem in the field of computational
linguistics given as finding the intended sense of a word (or a set of words)
when it is activated within a certain context. WSD was recently addressed as a
combinatorial optimization problem in which the goal is to find a sequence of
senses that maximize the semantic relatedness among the target words. In this
article, a novel algorithm for solving the WSD problem called D-Bees is
proposed which is inspired by bee colony optimization (BCO)where artificial bee
agents collaborate to solve the problem. The D-Bees algorithm is evaluated on a
standard dataset (SemEval 2007 coarse-grained English all-words task corpus)and
is compared to simulated annealing, genetic algorithms, and two ant colony
optimization techniques (ACO). It will be observed that the BCO and ACO
approaches are on par.
|
1402.0108 | Eric Strobl | Eric V. Strobl, Shyam Visweswaran | Markov Blanket Ranking using Kernel-based Conditional Dependence
Measures | 10 pages, 4 figures, 2 algorithms, NIPS 2013 Workshop on Causality,
code: github.com/ericstrobl/ | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Developing feature selection algorithms that move beyond a pure correlational
to a more causal analysis of observational data is an important problem in the
sciences. Several algorithms attempt to do so by discovering the Markov blanket
of a target, but they all contain a forward selection step which variables must
pass in order to be included in the conditioning set. As a result, these
algorithms may not consider all possible conditional multivariate combinations.
We improve on this limitation by proposing a backward elimination method that
uses a kernel-based conditional dependence measure to identify the Markov
blanket in a fully multivariate fashion. The algorithm is easy to implement and
compares favorably to other methods on synthetic and real datasets.
| [
{
"version": "v1",
"created": "Sat, 1 Feb 2014 17:51:54 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Feb 2014 22:16:00 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2014 01:07:49 GMT"
}
] | 2014-05-06T00:00:00 | [
[
"Strobl",
"Eric V.",
""
],
[
"Visweswaran",
"Shyam",
""
]
] | TITLE: Markov Blanket Ranking using Kernel-based Conditional Dependence
Measures
ABSTRACT: Developing feature selection algorithms that move beyond a pure correlational
to a more causal analysis of observational data is an important problem in the
sciences. Several algorithms attempt to do so by discovering the Markov blanket
of a target, but they all contain a forward selection step which variables must
pass in order to be included in the conditioning set. As a result, these
algorithms may not consider all possible conditional multivariate combinations.
We improve on this limitation by proposing a backward elimination method that
uses a kernel-based conditional dependence measure to identify the Markov
blanket in a fully multivariate fashion. The algorithm is easy to implement and
compares favorably to other methods on synthetic and real datasets.
|
1404.7287 | Sameer Qazi | Sameer Qazi and Tim Moors | Disjoint-Path Selection in Internet: What traceroutes tell us? | 9 pages, 9 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Routing policies used in the Internet can be restrictive, limiting
communication between source-destination pairs to one path, when often better
alternatives exist. To avoid route flapping, recovery mechanisms may be
dampened, making adaptation slow. Unstructured overlays have been proposed to
mitigate the issues of path and performance failures in the Internet by routing
through an indirect-path via overlay peer(s). Choosing alternate-paths in
overlay networks is a challenging issue. Ensuring both availability and
performance guarantees on alternate paths requires aggressive monitoring of all
overlay paths using active probing; this limits scalability. An alternate
technique to select an overlay-path is to bias its selection based on physical
disjointness criteria to bypass the failure on the primary-path. Recently,
several techniques have emerged which can optimize the selection of a
disjoint-path without incurring the high costs associated with probing paths.
In this paper, we show that using only commodity approaches, i.e. running
infrequent traceroutes between overlay hosts, a lot of information can be
revealed about the underlying physical path diversity in the overlay network
which can be used to make informed-guesses for alternate-path selection. We
test our approach using datasets between real-world hosts in AMP and RIPE
networks.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2014 09:28:41 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2014 05:27:39 GMT"
}
] | 2014-05-06T00:00:00 | [
[
"Qazi",
"Sameer",
""
],
[
"Moors",
"Tim",
""
]
] | TITLE: Disjoint-Path Selection in Internet: What traceroutes tell us?
ABSTRACT: Routing policies used in the Internet can be restrictive, limiting
communication between source-destination pairs to one path, when often better
alternatives exist. To avoid route flapping, recovery mechanisms may be
dampened, making adaptation slow. Unstructured overlays have been proposed to
mitigate the issues of path and performance failures in the Internet by routing
through an indirect-path via overlay peer(s). Choosing alternate-paths in
overlay networks is a challenging issue. Ensuring both availability and
performance guarantees on alternate paths requires aggressive monitoring of all
overlay paths using active probing; this limits scalability. An alternate
technique to select an overlay-path is to bias its selection based on physical
disjointness criteria to bypass the failure on the primary-path. Recently,
several techniques have emerged which can optimize the selection of a
disjoint-path without incurring the high costs associated with probing paths.
In this paper, we show that using only commodity approaches, i.e. running
infrequent traceroutes between overlay hosts, a lot of information can be
revealed about the underlying physical path diversity in the overlay network
which can be used to make informed-guesses for alternate-path selection. We
test our approach using datasets between real-world hosts in AMP and RIPE
networks.
|
1405.0641 | Xiaojun Wan | Xiaojun Wan | x-index: a fantastic new indicator for quantifying a scientist's
scientific impact | null | null | null | null | cs.DL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | h-index has become the most popular indicator for quantifying a scientist's
scientific impact in various scientific fields. h-index is defined as the
largest number of papers with citation number larger than or equal to h and it
treats each citation equally. However, different citations usually come from
different papers with different influence and quality, and a citation from a
highly influential paper is a greater recognition of the target paper than a
citation from an ordinary paper. Based on this assumption, we proposed a new
indicator named x-index to quantify a scientist's scientific impact by
considering only the citations coming from influential papers. x-index is
defined as the largest number of papers with influential citation number larger
than or equal to x, where each influential citation comes from a paper for
which the average ACNPP (Average Citation Number Per Paper) of its authors
larger than or equal to x . Through analysis on the APS dataset, we find that
the proposed x-index has much better ability to discriminate between Physics
Prize Winners and ordinary physicists.
| [
{
"version": "v1",
"created": "Sun, 4 May 2014 02:26:52 GMT"
}
] | 2014-05-06T00:00:00 | [
[
"Wan",
"Xiaojun",
""
]
] | TITLE: x-index: a fantastic new indicator for quantifying a scientist's
scientific impact
ABSTRACT: h-index has become the most popular indicator for quantifying a scientist's
scientific impact in various scientific fields. h-index is defined as the
largest number of papers with citation number larger than or equal to h and it
treats each citation equally. However, different citations usually come from
different papers with different influence and quality, and a citation from a
highly influential paper is a greater recognition of the target paper than a
citation from an ordinary paper. Based on this assumption, we proposed a new
indicator named x-index to quantify a scientist's scientific impact by
considering only the citations coming from influential papers. x-index is
defined as the largest number of papers with influential citation number larger
than or equal to x, where each influential citation comes from a paper for
which the average ACNPP (Average Citation Number Per Paper) of its authors
larger than or equal to x . Through analysis on the APS dataset, we find that
the proposed x-index has much better ability to discriminate between Physics
Prize Winners and ordinary physicists.
|
1405.0700 | Abdou M. Abdel-Rehim | A. Abdel-Rehim, C. Alexandrou, N. Anastopoulos, G. Koutsou, I.
Liabotis and N. Papadopoulou | PLQCD library for Lattice QCD on multi-core machines | 7 pages, presented at the 31st International Symposium on Lattice
Field Theory (Lattice 2013), 29 July - 3 August 2013, Mainz, Germany | null | null | null | hep-lat cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | PLQCD is a stand-alone software library developed under PRACE for lattice
QCD. It provides an implementation of the Dirac operator for Wilson type
fermions and few efficient linear solvers. The library is optimized for
multi-core machines using a hybrid parallelization with OpenMP+MPI. The main
objectives of the library is to provide a scalable implementation of the Dirac
operator for efficient computation of the quark propagator. In this
contribution, a description of the PLQCD library is given together with some
benchmark results.
| [
{
"version": "v1",
"created": "Sun, 4 May 2014 14:12:53 GMT"
}
] | 2014-05-06T00:00:00 | [
[
"Abdel-Rehim",
"A.",
""
],
[
"Alexandrou",
"C.",
""
],
[
"Anastopoulos",
"N.",
""
],
[
"Koutsou",
"G.",
""
],
[
"Liabotis",
"I.",
""
],
[
"Papadopoulou",
"N.",
""
]
] | TITLE: PLQCD library for Lattice QCD on multi-core machines
ABSTRACT: PLQCD is a stand-alone software library developed under PRACE for lattice
QCD. It provides an implementation of the Dirac operator for Wilson type
fermions and few efficient linear solvers. The library is optimized for
multi-core machines using a hybrid parallelization with OpenMP+MPI. The main
objectives of the library is to provide a scalable implementation of the Dirac
operator for efficient computation of the quark propagator. In this
contribution, a description of the PLQCD library is given together with some
benchmark results.
|
1405.0868 | Zhana Bao | Zhana Bao | Finding Inner Outliers in High Dimensional Space | 9 pages, 9 Figures, 3 tables | null | null | null | cs.AI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Outlier detection in a large-scale database is a significant and complex
issue in knowledge discovering field. As the data distributions are obscure and
uncertain in high dimensional space, most existing solutions try to solve the
issue taking into account the two intuitive points: first, outliers are
extremely far away from other points in high dimensional space; second,
outliers are detected obviously different in projected-dimensional subspaces.
However, for a complicated case that outliers are hidden inside the normal
points in all dimensions, existing detection methods fail to find such inner
outliers. In this paper, we propose a method with twice dimension-projections,
which integrates primary subspace outlier detection and secondary
point-projection between subspaces, and sums up the multiple weight values for
each point. The points are computed with local density ratio separately in
twice-projected dimensions. After the process, outliers are those points
scoring the largest values of weight. The proposed method succeeds to find all
inner outliers on the synthetic test datasets with the dimension varying from
100 to 10000. The experimental results also show that the proposed algorithm
can work in low dimensional space and can achieve perfect performance in high
dimensional space. As for this reason, our proposed approach has considerable
potential to apply it in multimedia applications helping to process images or
video with large-scale attributes.
| [
{
"version": "v1",
"created": "Mon, 5 May 2014 12:01:14 GMT"
}
] | 2014-05-06T00:00:00 | [
[
"Bao",
"Zhana",
""
]
] | TITLE: Finding Inner Outliers in High Dimensional Space
ABSTRACT: Outlier detection in a large-scale database is a significant and complex
issue in knowledge discovering field. As the data distributions are obscure and
uncertain in high dimensional space, most existing solutions try to solve the
issue taking into account the two intuitive points: first, outliers are
extremely far away from other points in high dimensional space; second,
outliers are detected obviously different in projected-dimensional subspaces.
However, for a complicated case that outliers are hidden inside the normal
points in all dimensions, existing detection methods fail to find such inner
outliers. In this paper, we propose a method with twice dimension-projections,
which integrates primary subspace outlier detection and secondary
point-projection between subspaces, and sums up the multiple weight values for
each point. The points are computed with local density ratio separately in
twice-projected dimensions. After the process, outliers are those points
scoring the largest values of weight. The proposed method succeeds to find all
inner outliers on the synthetic test datasets with the dimension varying from
100 to 10000. The experimental results also show that the proposed algorithm
can work in low dimensional space and can achieve perfect performance in high
dimensional space. As for this reason, our proposed approach has considerable
potential to apply it in multimedia applications helping to process images or
video with large-scale attributes.
|
1405.0869 | Zhana Bao | Zhana Bao | Robust Subspace Outlier Detection in High Dimensional Space | 10 pages, 6 figures, 4 tables | null | null | null | cs.AI cs.LG stat.ML | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Rare data in a large-scale database are called outliers that reveal
significant information in the real world. The subspace-based outlier detection
is regarded as a feasible approach in very high dimensional space. However, the
outliers found in subspaces are only part of the true outliers in high
dimensional space, indeed. The outliers hidden in normal-clustered points are
sometimes neglected in the projected dimensional subspace. In this paper, we
propose a robust subspace method for detecting such inner outliers in a given
dataset, which uses two dimensional-projections: detecting outliers in
subspaces with local density ratio in the first projected dimensions; finding
outliers by comparing neighbor's positions in the second projected dimensions.
Each point's weight is calculated by summing up all related values got in the
two steps projected dimensions, and then the points scoring the largest weight
values are taken as outliers. By taking a series of experiments with the number
of dimensions from 10 to 10000, the results show that our proposed method
achieves high precision in the case of extremely high dimensional space, and
works well in low dimensional space.
| [
{
"version": "v1",
"created": "Mon, 5 May 2014 12:01:24 GMT"
}
] | 2014-05-06T00:00:00 | [
[
"Bao",
"Zhana",
""
]
] | TITLE: Robust Subspace Outlier Detection in High Dimensional Space
ABSTRACT: Rare data in a large-scale database are called outliers that reveal
significant information in the real world. The subspace-based outlier detection
is regarded as a feasible approach in very high dimensional space. However, the
outliers found in subspaces are only part of the true outliers in high
dimensional space, indeed. The outliers hidden in normal-clustered points are
sometimes neglected in the projected dimensional subspace. In this paper, we
propose a robust subspace method for detecting such inner outliers in a given
dataset, which uses two dimensional-projections: detecting outliers in
subspaces with local density ratio in the first projected dimensions; finding
outliers by comparing neighbor's positions in the second projected dimensions.
Each point's weight is calculated by summing up all related values got in the
two steps projected dimensions, and then the points scoring the largest weight
values are taken as outliers. By taking a series of experiments with the number
of dimensions from 10 to 10000, the results show that our proposed method
achieves high precision in the case of extremely high dimensional space, and
works well in low dimensional space.
|
1405.0941 | Serena Villata | Elena Cabrio and Serena Villata | Towards a Benchmark of Natural Language Arguments | null | Proceedings of the 15th International Workshop on Non-Monotonic
Reasoning (NMR 2014) | null | null | cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The connections among natural language processing and argumentation theory
are becoming stronger in the latest years, with a growing amount of works going
in this direction, in different scenarios and applying heterogeneous
techniques. In this paper, we present two datasets we built to cope with the
combination of the Textual Entailment framework and bipolar abstract
argumentation. In our approach, such datasets are used to automatically
identify through a Textual Entailment system the relations among the arguments
(i.e., attack, support), and then the resulting bipolar argumentation graphs
are analyzed to compute the accepted arguments.
| [
{
"version": "v1",
"created": "Mon, 5 May 2014 16:03:04 GMT"
}
] | 2014-05-06T00:00:00 | [
[
"Cabrio",
"Elena",
""
],
[
"Villata",
"Serena",
""
]
] | TITLE: Towards a Benchmark of Natural Language Arguments
ABSTRACT: The connections among natural language processing and argumentation theory
are becoming stronger in the latest years, with a growing amount of works going
in this direction, in different scenarios and applying heterogeneous
techniques. In this paper, we present two datasets we built to cope with the
combination of the Textual Entailment framework and bipolar abstract
argumentation. In our approach, such datasets are used to automatically
identify through a Textual Entailment system the relations among the arguments
(i.e., attack, support), and then the resulting bipolar argumentation graphs
are analyzed to compute the accepted arguments.
|
1405.0320 | Jan Verschelde | Danko Adrovic and Jan Verschelde | Computing all Affine Solution Sets of Binomial Systems | 4 page extended abstract accepted by EACA 2014, a conference on
Computer Algebra and its Applications | null | null | null | cs.SC cs.MS math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To compute solutions of sparse polynomial systems efficiently we have to
exploit the structure of their Newton polytopes. While the application of
polyhedral methods naturally excludes solutions with zero components, an
irreducible decomposition of a variety is typically understood in affine space,
including also those components with zero coordinates. For the problem of
computing solution sets in the intersection of some coordinate planes, the
direct application of a polyhedral method fails, because the original facial
structure of the Newton polytopes may alter completely when selected variables
become zero. Our new proposed method enumerates all factors contributing to a
generalized permanent and toric solutions as a special case of this
enumeration. For benchmark problems such as the adjacent 2-by-2 minors of a
general matrix, our methods scale much better than the witness set
representations of numerical algebraic geometry.
| [
{
"version": "v1",
"created": "Thu, 1 May 2014 23:00:24 GMT"
}
] | 2014-05-05T00:00:00 | [
[
"Adrovic",
"Danko",
""
],
[
"Verschelde",
"Jan",
""
]
] | TITLE: Computing all Affine Solution Sets of Binomial Systems
ABSTRACT: To compute solutions of sparse polynomial systems efficiently we have to
exploit the structure of their Newton polytopes. While the application of
polyhedral methods naturally excludes solutions with zero components, an
irreducible decomposition of a variety is typically understood in affine space,
including also those components with zero coordinates. For the problem of
computing solution sets in the intersection of some coordinate planes, the
direct application of a polyhedral method fails, because the original facial
structure of the Newton polytopes may alter completely when selected variables
become zero. Our new proposed method enumerates all factors contributing to a
generalized permanent and toric solutions as a special case of this
enumeration. For benchmark problems such as the adjacent 2-by-2 minors of a
general matrix, our methods scale much better than the witness set
representations of numerical algebraic geometry.
|
1404.0900 | Xiaokui Xiao | Youze Tang, Xiaokui Xiao, Yanchen Shi | Influence Maximization: Near-Optimal Time Complexity Meets Practical
Efficiency | Revised Sections 1, 2.3, and 5 to remove incorrect claims about
reference [3]. Updated experiments accordingly. A shorter version of the
paper will appear in SIGMOD 2014 | null | null | null | cs.SI cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a social network G and a constant k, the influence maximization problem
asks for k nodes in G that (directly and indirectly) influence the largest
number of nodes under a pre-defined diffusion model. This problem finds
important applications in viral marketing, and has been extensively studied in
the literature. Existing algorithms for influence maximization, however, either
trade approximation guarantees for practical efficiency, or vice versa. In
particular, among the algorithms that achieve constant factor approximations
under the prominent independent cascade (IC) model or linear threshold (LT)
model, none can handle a million-node graph without incurring prohibitive
overheads.
This paper presents TIM, an algorithm that aims to bridge the theory and
practice in influence maximization. On the theory side, we show that TIM runs
in O((k+\ell) (n+m) \log n / \epsilon^2) expected time and returns a
(1-1/e-\epsilon)-approximate solution with at least 1 - n^{-\ell} probability.
The time complexity of TIM is near-optimal under the IC model, as it is only a
\log n factor larger than the \Omega(m + n) lower-bound established in previous
work (for fixed k, \ell, and \epsilon). Moreover, TIM supports the triggering
model, which is a general diffusion model that includes both IC and LT as
special cases. On the practice side, TIM incorporates novel heuristics that
significantly improve its empirical efficiency without compromising its
asymptotic performance. We experimentally evaluate TIM with the largest
datasets ever tested in the literature, and show that it outperforms the
state-of-the-art solutions (with approximation guarantees) by up to four orders
of magnitude in terms of running time. In particular, when k = 50, \epsilon =
0.2, and \ell = 1, TIM requires less than one hour on a commodity machine to
process a network with 41.6 million nodes and 1.4 billion edges.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2014 13:23:10 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Apr 2014 03:40:36 GMT"
}
] | 2014-05-02T00:00:00 | [
[
"Tang",
"Youze",
""
],
[
"Xiao",
"Xiaokui",
""
],
[
"Shi",
"Yanchen",
""
]
] | TITLE: Influence Maximization: Near-Optimal Time Complexity Meets Practical
Efficiency
ABSTRACT: Given a social network G and a constant k, the influence maximization problem
asks for k nodes in G that (directly and indirectly) influence the largest
number of nodes under a pre-defined diffusion model. This problem finds
important applications in viral marketing, and has been extensively studied in
the literature. Existing algorithms for influence maximization, however, either
trade approximation guarantees for practical efficiency, or vice versa. In
particular, among the algorithms that achieve constant factor approximations
under the prominent independent cascade (IC) model or linear threshold (LT)
model, none can handle a million-node graph without incurring prohibitive
overheads.
This paper presents TIM, an algorithm that aims to bridge the theory and
practice in influence maximization. On the theory side, we show that TIM runs
in O((k+\ell) (n+m) \log n / \epsilon^2) expected time and returns a
(1-1/e-\epsilon)-approximate solution with at least 1 - n^{-\ell} probability.
The time complexity of TIM is near-optimal under the IC model, as it is only a
\log n factor larger than the \Omega(m + n) lower-bound established in previous
work (for fixed k, \ell, and \epsilon). Moreover, TIM supports the triggering
model, which is a general diffusion model that includes both IC and LT as
special cases. On the practice side, TIM incorporates novel heuristics that
significantly improve its empirical efficiency without compromising its
asymptotic performance. We experimentally evaluate TIM with the largest
datasets ever tested in the literature, and show that it outperforms the
state-of-the-art solutions (with approximation guarantees) by up to four orders
of magnitude in terms of running time. In particular, when k = 50, \epsilon =
0.2, and \ell = 1, TIM requires less than one hour on a commodity machine to
process a network with 41.6 million nodes and 1.4 billion edges.
|
1405.0085 | Mahmoud Khademi | Mahmoud Khademi and Louis-Philippe Morency | Relative Facial Action Unit Detection | Accepted at IEEE Winter Conference on Applications of Computer
Vision, Steamboat Springs Colorado, USA, 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a subject-independent facial action unit (AU) detection
method by introducing the concept of relative AU detection, for scenarios where
the neutral face is not provided. We propose a new classification objective
function which analyzes the temporal neighborhood of the current frame to
decide if the expression recently increased, decreased or showed no change.
This approach is a significant change from the conventional absolute method
which decides about AU classification using the current frame, without an
explicit comparison with its neighboring frames. Our proposed method improves
robustness to individual differences such as face scale and shape, age-related
wrinkles, and transitions among expressions (e.g., lower intensity of
expressions). Our experiments on three publicly available datasets (Extended
Cohn-Kanade (CK+), Bosphorus, and DISFA databases) show significant improvement
of our approach over conventional absolute techniques. Keywords: facial action
coding system (FACS); relative facial action unit detection; temporal
information;
| [
{
"version": "v1",
"created": "Thu, 1 May 2014 03:53:36 GMT"
}
] | 2014-05-02T00:00:00 | [
[
"Khademi",
"Mahmoud",
""
],
[
"Morency",
"Louis-Philippe",
""
]
] | TITLE: Relative Facial Action Unit Detection
ABSTRACT: This paper presents a subject-independent facial action unit (AU) detection
method by introducing the concept of relative AU detection, for scenarios where
the neutral face is not provided. We propose a new classification objective
function which analyzes the temporal neighborhood of the current frame to
decide if the expression recently increased, decreased or showed no change.
This approach is a significant change from the conventional absolute method
which decides about AU classification using the current frame, without an
explicit comparison with its neighboring frames. Our proposed method improves
robustness to individual differences such as face scale and shape, age-related
wrinkles, and transitions among expressions (e.g., lower intensity of
expressions). Our experiments on three publicly available datasets (Extended
Cohn-Kanade (CK+), Bosphorus, and DISFA databases) show significant improvement
of our approach over conventional absolute techniques. Keywords: facial action
coding system (FACS); relative facial action unit detection; temporal
information;
|
1405.0109 | Vaibhav Jha | Vaibhav Jha, Mohit Jha, GK Sharma | Estimation of Optimized Energy and Latency Constraints for Task
Allocation in 3d Network on Chip | 20 Pages,17 Figure, International Journal of Computer Science &
Information Technology. arXiv admin note: substantial text overlap with
arXiv:1404.2512 | International Journal of Computer Science & Information Technology
Vol 6,No 2,pp 67-86 April 2014 | 10.5121/ijcsit.2014.6205 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In Network on Chip (NoC) rooted system, energy consumption is affected by
task scheduling and allocation schemes which affect the performance of the
system. In this paper we test the pre-existing proposed algorithms and
introduced a new energy skilled algorithm for 3D NoC architecture. An efficient
dynamic and cluster approaches are proposed along with the optimization using
bio-inspired algorithm. The proposed algorithm has been implemented and
evaluated on randomly generated benchmark and real life application such as
MMS, Telecom and VOPD. The algorithm has also been tested with the E3S
benchmark and has been compared with the existing mapping algorithm spiral and
crinkle and has shown better reduction in the communication energy consumption
and shows improvement in the performance of the system. On performing
experimental analysis of proposed algorithm results shows that average
reduction in energy consumption is 49%, reduction in communication cost is 48%
and average latency is 34%. Cluster based approach is mapped onto NoC using
Dynamic Diagonal Mapping (DDMap), Crinkle and Spiral algorithms and found DDmap
provides improved result. On analysis and comparison of mapping of cluster
using DDmap approach the average energy reduction is 14% and 9% with crinkle
and spiral.
| [
{
"version": "v1",
"created": "Thu, 1 May 2014 07:38:46 GMT"
}
] | 2014-05-02T00:00:00 | [
[
"Jha",
"Vaibhav",
""
],
[
"Jha",
"Mohit",
""
],
[
"Sharma",
"GK",
""
]
] | TITLE: Estimation of Optimized Energy and Latency Constraints for Task
Allocation in 3d Network on Chip
ABSTRACT: In Network on Chip (NoC) rooted system, energy consumption is affected by
task scheduling and allocation schemes which affect the performance of the
system. In this paper we test the pre-existing proposed algorithms and
introduced a new energy skilled algorithm for 3D NoC architecture. An efficient
dynamic and cluster approaches are proposed along with the optimization using
bio-inspired algorithm. The proposed algorithm has been implemented and
evaluated on randomly generated benchmark and real life application such as
MMS, Telecom and VOPD. The algorithm has also been tested with the E3S
benchmark and has been compared with the existing mapping algorithm spiral and
crinkle and has shown better reduction in the communication energy consumption
and shows improvement in the performance of the system. On performing
experimental analysis of proposed algorithm results shows that average
reduction in energy consumption is 49%, reduction in communication cost is 48%
and average latency is 34%. Cluster based approach is mapped onto NoC using
Dynamic Diagonal Mapping (DDMap), Crinkle and Spiral algorithms and found DDmap
provides improved result. On analysis and comparison of mapping of cluster
using DDmap approach the average energy reduction is 14% and 9% with crinkle
and spiral.
|
1305.5029 | Yuchen Zhang | Yuchen Zhang and John C. Duchi and Martin J. Wainwright | Divide and Conquer Kernel Ridge Regression: A Distributed Algorithm with
Minimax Optimal Rates | null | null | null | null | math.ST cs.LG stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish optimal convergence rates for a decomposition-based scalable
approach to kernel ridge regression. The method is simple to describe: it
randomly partitions a dataset of size N into m subsets of equal size, computes
an independent kernel ridge regression estimator for each subset, then averages
the local solutions into a global predictor. This partitioning leads to a
substantial reduction in computation time versus the standard approach of
performing kernel ridge regression on all N samples. Our two main theorems
establish that despite the computational speed-up, statistical optimality is
retained: as long as m is not too large, the partition-based estimator achieves
the statistical minimax rate over all estimators using the set of N samples. As
concrete examples, our theory guarantees that the number of processors m may
grow nearly linearly for finite-rank kernels and Gaussian kernels and
polynomially in N for Sobolev spaces, which in turn allows for substantial
reductions in computational cost. We conclude with experiments on both
simulated data and a music-prediction task that complement our theoretical
results, exhibiting the computational and statistical benefits of our approach.
| [
{
"version": "v1",
"created": "Wed, 22 May 2013 06:30:46 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2014 22:02:35 GMT"
}
] | 2014-05-01T00:00:00 | [
[
"Zhang",
"Yuchen",
""
],
[
"Duchi",
"John C.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | TITLE: Divide and Conquer Kernel Ridge Regression: A Distributed Algorithm with
Minimax Optimal Rates
ABSTRACT: We establish optimal convergence rates for a decomposition-based scalable
approach to kernel ridge regression. The method is simple to describe: it
randomly partitions a dataset of size N into m subsets of equal size, computes
an independent kernel ridge regression estimator for each subset, then averages
the local solutions into a global predictor. This partitioning leads to a
substantial reduction in computation time versus the standard approach of
performing kernel ridge regression on all N samples. Our two main theorems
establish that despite the computational speed-up, statistical optimality is
retained: as long as m is not too large, the partition-based estimator achieves
the statistical minimax rate over all estimators using the set of N samples. As
concrete examples, our theory guarantees that the number of processors m may
grow nearly linearly for finite-rank kernels and Gaussian kernels and
polynomially in N for Sobolev spaces, which in turn allows for substantial
reductions in computational cost. We conclude with experiments on both
simulated data and a music-prediction task that complement our theoretical
results, exhibiting the computational and statistical benefits of our approach.
|
1311.0041 | Sparsh Mittal | Sparsh Mittal | A Technique for Write-endurance aware Management of Resistive RAM Last
Level Caches | This paper has been withdrawn by the author for revising the
experiments | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to increasing cache sizes and large leakage consumption of SRAM device,
conventional SRAM caches contribute significantly to the processor power
consumption. Recently researchers have used non-volatile memory devices to
design caches, since they provide high density, comparable read latency and low
leakage power dissipation. However, their high write latency may increase the
execution time and hence, leakage energy consumption. Also, since their write
endurance is small, a conventional energy saving technique may further
aggravate the problem of write-variations, thus reducing their lifetime. In
this paper, we present a cache energy saving technique for non-volatile caches,
which also attempts to improve their lifetime by making writes equally
distributed to the cache. Our technique uses dynamic cache reconfiguration to
adjust the cache size to meet program requirement and turns off the remaining
cache to save energy. Microarchitectural simulations performed using an x86-64
simulator, SPEC2006 benchmarks and a resistive-RAM LLC (last level cache) show
that over an 8MB baseline cache, our technique saves 17.55% memory subsystem
(last level cache + main memory) energy and improves the lifetime by 1.33X.
Over the same resistive-RAM baseline, an SRAM of similar area with no cache
reconfiguration leads to an energy loss of 186.13%.
| [
{
"version": "v1",
"created": "Thu, 31 Oct 2013 21:41:18 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Apr 2014 10:35:11 GMT"
}
] | 2014-05-01T00:00:00 | [
[
"Mittal",
"Sparsh",
""
]
] | TITLE: A Technique for Write-endurance aware Management of Resistive RAM Last
Level Caches
ABSTRACT: Due to increasing cache sizes and large leakage consumption of SRAM device,
conventional SRAM caches contribute significantly to the processor power
consumption. Recently researchers have used non-volatile memory devices to
design caches, since they provide high density, comparable read latency and low
leakage power dissipation. However, their high write latency may increase the
execution time and hence, leakage energy consumption. Also, since their write
endurance is small, a conventional energy saving technique may further
aggravate the problem of write-variations, thus reducing their lifetime. In
this paper, we present a cache energy saving technique for non-volatile caches,
which also attempts to improve their lifetime by making writes equally
distributed to the cache. Our technique uses dynamic cache reconfiguration to
adjust the cache size to meet program requirement and turns off the remaining
cache to save energy. Microarchitectural simulations performed using an x86-64
simulator, SPEC2006 benchmarks and a resistive-RAM LLC (last level cache) show
that over an 8MB baseline cache, our technique saves 17.55% memory subsystem
(last level cache + main memory) energy and improves the lifetime by 1.33X.
Over the same resistive-RAM baseline, an SRAM of similar area with no cache
reconfiguration leads to an energy loss of 186.13%.
|
1404.7571 | Mina Ghashami | Mina Ghashami, Jeff M. Phillips and Feifei Li | Continuous Matrix Approximation on Distributed Data | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tracking and approximating data matrices in streaming fashion is a
fundamental challenge. The problem requires more care and attention when data
comes from multiple distributed sites, each receiving a stream of data. This
paper considers the problem of "tracking approximations to a matrix" in the
distributed streaming model. In this model, there are m distributed sites each
observing a distinct stream of data (where each element is a row of a
distributed matrix) and has a communication channel with a coordinator, and the
goal is to track an eps-approximation to the norm of the matrix along any
direction. To that end, we present novel algorithms to address the matrix
approximation problem. Our algorithms maintain a smaller matrix B, as an
approximation to a distributed streaming matrix A, such that for any unit
vector x: | ||A x||^2 - ||B x||^2 | <= eps ||A||_F^2. Our algorithms work in
streaming fashion and incur small communication, which is critical for
distributed computation. Our best method is deterministic and uses only
O((m/eps) log(beta N)) communication, where N is the size of stream (at the
time of the query) and beta is an upper-bound on the squared norm of any row of
the matrix. In addition to proving all algorithmic properties theoretically,
extensive experiments with real large datasets demonstrate the efficiency of
these protocols.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2014 01:57:40 GMT"
}
] | 2014-05-01T00:00:00 | [
[
"Ghashami",
"Mina",
""
],
[
"Phillips",
"Jeff M.",
""
],
[
"Li",
"Feifei",
""
]
] | TITLE: Continuous Matrix Approximation on Distributed Data
ABSTRACT: Tracking and approximating data matrices in streaming fashion is a
fundamental challenge. The problem requires more care and attention when data
comes from multiple distributed sites, each receiving a stream of data. This
paper considers the problem of "tracking approximations to a matrix" in the
distributed streaming model. In this model, there are m distributed sites each
observing a distinct stream of data (where each element is a row of a
distributed matrix) and has a communication channel with a coordinator, and the
goal is to track an eps-approximation to the norm of the matrix along any
direction. To that end, we present novel algorithms to address the matrix
approximation problem. Our algorithms maintain a smaller matrix B, as an
approximation to a distributed streaming matrix A, such that for any unit
vector x: | ||A x||^2 - ||B x||^2 | <= eps ||A||_F^2. Our algorithms work in
streaming fashion and incur small communication, which is critical for
distributed computation. Our best method is deterministic and uses only
O((m/eps) log(beta N)) communication, where N is the size of stream (at the
time of the query) and beta is an upper-bound on the squared norm of any row of
the matrix. In addition to proving all algorithmic properties theoretically,
extensive experiments with real large datasets demonstrate the efficiency of
these protocols.
|
1305.4987 | Julie Tibshirani | Julie Tibshirani and Christopher D. Manning | Robust Logistic Regression using Shift Parameters (Long Version) | null | null | null | null | cs.AI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Annotation errors can significantly hurt classifier performance, yet datasets
are only growing noisier with the increased use of Amazon Mechanical Turk and
techniques like distant supervision that automatically generate labels. In this
paper, we present a robust extension of logistic regression that incorporates
the possibility of mislabelling directly into the objective. Our model can be
trained through nearly the same means as logistic regression, and retains its
efficiency on high-dimensional datasets. Through named entity recognition
experiments, we demonstrate that our approach can provide a significant
improvement over the standard model when annotation errors are present.
| [
{
"version": "v1",
"created": "Tue, 21 May 2013 23:36:18 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2014 07:32:58 GMT"
}
] | 2014-04-30T00:00:00 | [
[
"Tibshirani",
"Julie",
""
],
[
"Manning",
"Christopher D.",
""
]
] | TITLE: Robust Logistic Regression using Shift Parameters (Long Version)
ABSTRACT: Annotation errors can significantly hurt classifier performance, yet datasets
are only growing noisier with the increased use of Amazon Mechanical Turk and
techniques like distant supervision that automatically generate labels. In this
paper, we present a robust extension of logistic regression that incorporates
the possibility of mislabelling directly into the objective. Our model can be
trained through nearly the same means as logistic regression, and retains its
efficiency on high-dimensional datasets. Through named entity recognition
experiments, we demonstrate that our approach can provide a significant
improvement over the standard model when annotation errors are present.
|
1404.6383 | Pierre de Buyl | Valentin Haenel | Bloscpack: a compressed lightweight serialization format for numerical
data | Part of the Proceedings of the 6th European Conference on Python in
Science (EuroSciPy 2013), Pierre de Buyl and Nelle Varoquaux editors, (2014) | null | null | euroscipy-proceedings2013-02 | cs.MS cs.PL | http://creativecommons.org/licenses/by/3.0/ | This paper introduces the Bloscpack file format and the accompanying Python
reference implementation. Bloscpack is a lightweight, compressed binary
file-format based on the Blosc codec and is designed for lightweight, fast
serialization of numerical data. This article presents the features of the
file-format and some some API aspects of the reference implementation, in
particular the ability to handle Numpy ndarrays. Furthermore, in order to
demonstrate its utility, the format is compared both feature- and
performance-wise to a few alternative lightweight serialization solutions for
Numpy ndarrays. The performance comparisons take the form of some comprehensive
benchmarks over a range of different artificial datasets with varying size and
complexity, the results of which are presented as the last section of this
article.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2014 10:53:23 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2014 14:16:55 GMT"
}
] | 2014-04-30T00:00:00 | [
[
"Haenel",
"Valentin",
""
]
] | TITLE: Bloscpack: a compressed lightweight serialization format for numerical
data
ABSTRACT: This paper introduces the Bloscpack file format and the accompanying Python
reference implementation. Bloscpack is a lightweight, compressed binary
file-format based on the Blosc codec and is designed for lightweight, fast
serialization of numerical data. This article presents the features of the
file-format and some some API aspects of the reference implementation, in
particular the ability to handle Numpy ndarrays. Furthermore, in order to
demonstrate its utility, the format is compared both feature- and
performance-wise to a few alternative lightweight serialization solutions for
Numpy ndarrays. The performance comparisons take the form of some comprehensive
benchmarks over a range of different artificial datasets with varying size and
complexity, the results of which are presented as the last section of this
article.
|
1305.0062 | Zeinab Taghavi | Zeinab Taghavi, Narjes S. Movahedi, Sorin Draghici, Hamidreza Chitsaz | Distilled Single Cell Genome Sequencing and De Novo Assembly for Sparse
Microbial Communities | null | null | 10.1093/bioinformatics/btt420 | null | q-bio.GN cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Identification of every single genome present in a microbial sample is an
important and challenging task with crucial applications. It is challenging
because there are typically millions of cells in a microbial sample, the vast
majority of which elude cultivation. The most accurate method to date is
exhaustive single cell sequencing using multiple displacement amplification,
which is simply intractable for a large number of cells. However, there is hope
for breaking this barrier as the number of different cell types with distinct
genome sequences is usually much smaller than the number of cells.
Here, we present a novel divide and conquer method to sequence and de novo
assemble all distinct genomes present in a microbial sample with a sequencing
cost and computational complexity proportional to the number of genome types,
rather than the number of cells. The method is implemented in a tool called
Squeezambler. We evaluated Squeezambler on simulated data. The proposed divide
and conquer method successfully reduces the cost of sequencing in comparison
with the naive exhaustive approach.
Availability: Squeezambler and datasets are available under
http://compbio.cs.wayne.edu/software/squeezambler/.
| [
{
"version": "v1",
"created": "Wed, 1 May 2013 00:49:29 GMT"
},
{
"version": "v2",
"created": "Wed, 22 May 2013 21:39:04 GMT"
}
] | 2014-04-29T00:00:00 | [
[
"Taghavi",
"Zeinab",
""
],
[
"Movahedi",
"Narjes S.",
""
],
[
"Draghici",
"Sorin",
""
],
[
"Chitsaz",
"Hamidreza",
""
]
] | TITLE: Distilled Single Cell Genome Sequencing and De Novo Assembly for Sparse
Microbial Communities
ABSTRACT: Identification of every single genome present in a microbial sample is an
important and challenging task with crucial applications. It is challenging
because there are typically millions of cells in a microbial sample, the vast
majority of which elude cultivation. The most accurate method to date is
exhaustive single cell sequencing using multiple displacement amplification,
which is simply intractable for a large number of cells. However, there is hope
for breaking this barrier as the number of different cell types with distinct
genome sequences is usually much smaller than the number of cells.
Here, we present a novel divide and conquer method to sequence and de novo
assemble all distinct genomes present in a microbial sample with a sequencing
cost and computational complexity proportional to the number of genome types,
rather than the number of cells. The method is implemented in a tool called
Squeezambler. We evaluated Squeezambler on simulated data. The proposed divide
and conquer method successfully reduces the cost of sequencing in comparison
with the naive exhaustive approach.
Availability: Squeezambler and datasets are available under
http://compbio.cs.wayne.edu/software/squeezambler/.
|
1403.4118 | Michael Helmling | Michael Helmling and Eirik Rosnes and Stefan Ruzika and Stefan Scholl | Efficient Maximum-Likelihood Decoding of Linear Block Codes on Binary
Memoryless Channels | Submitted to 2014 International Symposium on Information Theory. 5
Pages. Accepted | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we consider efficient maximum-likelihood decoding of linear
block codes for small-to-moderate block lengths. The presented approach is a
branch-and-bound algorithm using the cutting-plane approach of Zhang and Siegel
(IEEE Trans. Inf. Theory, 2012) for obtaining lower bounds. We have compared
our proposed algorithm to the state-of-the-art commercial integer program
solver CPLEX, and for all considered codes our approach is faster for both low
and high signal-to-noise ratios. For instance, for the benchmark (155,64)
Tanner code our algorithm is more than 11 times as fast as CPLEX for an SNR of
1.0 dB on the additive white Gaussian noise channel. By a small modification,
our algorithm can be used to calculate the minimum distance, which we have
again verified to be much faster than using the CPLEX solver.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2014 14:55:42 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Apr 2014 08:00:48 GMT"
}
] | 2014-04-29T00:00:00 | [
[
"Helmling",
"Michael",
""
],
[
"Rosnes",
"Eirik",
""
],
[
"Ruzika",
"Stefan",
""
],
[
"Scholl",
"Stefan",
""
]
] | TITLE: Efficient Maximum-Likelihood Decoding of Linear Block Codes on Binary
Memoryless Channels
ABSTRACT: In this work, we consider efficient maximum-likelihood decoding of linear
block codes for small-to-moderate block lengths. The presented approach is a
branch-and-bound algorithm using the cutting-plane approach of Zhang and Siegel
(IEEE Trans. Inf. Theory, 2012) for obtaining lower bounds. We have compared
our proposed algorithm to the state-of-the-art commercial integer program
solver CPLEX, and for all considered codes our approach is faster for both low
and high signal-to-noise ratios. For instance, for the benchmark (155,64)
Tanner code our algorithm is more than 11 times as fast as CPLEX for an SNR of
1.0 dB on the additive white Gaussian noise channel. By a small modification,
our algorithm can be used to calculate the minimum distance, which we have
again verified to be much faster than using the CPLEX solver.
|
1404.6682 | Kuldeep Meel | Kuldeep S. Meel | Sampling Techniques for Boolean Satisfiability | MS Thesis submitted to Rice University | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Boolean satisfiability ({\SAT}) has played a key role in diverse areas
spanning testing, formal verification, planning, optimization, inferencing and
the like. Apart from the classical problem of checking boolean satisfiability,
the problems of generating satisfying uniformly at random, and of counting the
total number of satisfying assignments have also attracted significant
theoretical and practical interest over the years. Prior work offered heuristic
approaches with very weak or no guarantee of performance, and theoretical
approaches with proven guarantees, but poor performance in practice.
We propose a novel approach based on limited-independence hashing that allows
us to design algorithms for both problems, with strong theoretical guarantees
and scalability extending to thousands of variables. Based on this approach, we
present two practical algorithms, {\UniformWitness}: a near uniform generator
and {\approxMC}: the first scalable approximate model counter, along with
reference implementations. Our algorithms work by issuing polynomial calls to
{\SAT} solver. We demonstrate scalability of our algorithms over a large set of
benchmarks arising from different application domains.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2014 21:08:07 GMT"
}
] | 2014-04-29T00:00:00 | [
[
"Meel",
"Kuldeep S.",
""
]
] | TITLE: Sampling Techniques for Boolean Satisfiability
ABSTRACT: Boolean satisfiability ({\SAT}) has played a key role in diverse areas
spanning testing, formal verification, planning, optimization, inferencing and
the like. Apart from the classical problem of checking boolean satisfiability,
the problems of generating satisfying uniformly at random, and of counting the
total number of satisfying assignments have also attracted significant
theoretical and practical interest over the years. Prior work offered heuristic
approaches with very weak or no guarantee of performance, and theoretical
approaches with proven guarantees, but poor performance in practice.
We propose a novel approach based on limited-independence hashing that allows
us to design algorithms for both problems, with strong theoretical guarantees
and scalability extending to thousands of variables. Based on this approach, we
present two practical algorithms, {\UniformWitness}: a near uniform generator
and {\approxMC}: the first scalable approximate model counter, along with
reference implementations. Our algorithms work by issuing polynomial calls to
{\SAT} solver. We demonstrate scalability of our algorithms over a large set of
benchmarks arising from different application domains.
|
1404.6696 | Thibaut Vidal | Thibaut Vidal, Maria Battarra, Anand Subramanian, G\"une\c{s}
Erdo\v{g}an | Hybrid Metaheuristics for the Clustered Vehicle Routing Problem | Working Paper, MIT -- 22 pages | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Clustered Vehicle Routing Problem (CluVRP) is a variant of the
Capacitated Vehicle Routing Problem in which customers are grouped into
clusters. Each cluster has to be visited once, and a vehicle entering a cluster
cannot leave it until all customers have been visited. This article presents
two alternative hybrid metaheuristic algorithms for the CluVRP. The first
algorithm is based on an Iterated Local Search algorithm, in which only
feasible solutions are explored and problem-specific local search moves are
utilized. The second algorithm is a Hybrid Genetic Search, for which the
shortest Hamiltonian path between each pair of vertices within each cluster
should be precomputed. Using this information, a sequence of clusters can be
used as a solution representation and large neighborhoods can be efficiently
explored by means of bi-directional dynamic programming, sequence
concatenations, by using appropriate data structures. Extensive computational
experiments are performed on benchmark instances from the literature, as well
as new large scale ones. Recommendations on promising algorithm choices are
provided relatively to average cluster size.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2014 23:52:47 GMT"
}
] | 2014-04-29T00:00:00 | [
[
"Vidal",
"Thibaut",
""
],
[
"Battarra",
"Maria",
""
],
[
"Subramanian",
"Anand",
""
],
[
"Erdoǧan",
"Güneş",
""
]
] | TITLE: Hybrid Metaheuristics for the Clustered Vehicle Routing Problem
ABSTRACT: The Clustered Vehicle Routing Problem (CluVRP) is a variant of the
Capacitated Vehicle Routing Problem in which customers are grouped into
clusters. Each cluster has to be visited once, and a vehicle entering a cluster
cannot leave it until all customers have been visited. This article presents
two alternative hybrid metaheuristic algorithms for the CluVRP. The first
algorithm is based on an Iterated Local Search algorithm, in which only
feasible solutions are explored and problem-specific local search moves are
utilized. The second algorithm is a Hybrid Genetic Search, for which the
shortest Hamiltonian path between each pair of vertices within each cluster
should be precomputed. Using this information, a sequence of clusters can be
used as a solution representation and large neighborhoods can be efficiently
explored by means of bi-directional dynamic programming, sequence
concatenations, by using appropriate data structures. Extensive computational
experiments are performed on benchmark instances from the literature, as well
as new large scale ones. Recommendations on promising algorithm choices are
provided relatively to average cluster size.
|
1404.6727 | Sam Chiu-wai Wong | MohammadHossein Bateni, Jon Feldman, Vahab Mirrokni, Sam Chiu-wai Wong | Multiplicative Bidding in Online Advertising | 25 pages; accepted to EC'14 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we initiate the study of the multiplicative bidding language
adopted by major Internet search companies. In multiplicative bidding, the
effective bid on a particular search auction is the product of a base bid and
bid adjustments that are dependent on features of the search (for example, the
geographic location of the user, or the platform on which the search is
conducted). We consider the task faced by the advertiser when setting these bid
adjustments, and establish a foundational optimization problem that captures
the core difficulty of bidding under this language. We give matching
algorithmic and approximation hardness results for this problem; these results
are against an information-theoretic bound, and thus have implications on the
power of the multiplicative bidding language itself. Inspired by empirical
studies of search engine price data, we then codify the relevant restrictions
of the problem, and give further algorithmic and hardness results. Our main
technical contribution is an $O(\log n)$-approximation for the case of
multiplicative prices and monotone values. We also provide empirical
validations of our problem restrictions, and test our algorithms on real data
against natural benchmarks. Our experiments show that they perform favorably
compared with the baseline.
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2014 08:25:12 GMT"
}
] | 2014-04-29T00:00:00 | [
[
"Bateni",
"MohammadHossein",
""
],
[
"Feldman",
"Jon",
""
],
[
"Mirrokni",
"Vahab",
""
],
[
"Wong",
"Sam Chiu-wai",
""
]
] | TITLE: Multiplicative Bidding in Online Advertising
ABSTRACT: In this paper, we initiate the study of the multiplicative bidding language
adopted by major Internet search companies. In multiplicative bidding, the
effective bid on a particular search auction is the product of a base bid and
bid adjustments that are dependent on features of the search (for example, the
geographic location of the user, or the platform on which the search is
conducted). We consider the task faced by the advertiser when setting these bid
adjustments, and establish a foundational optimization problem that captures
the core difficulty of bidding under this language. We give matching
algorithmic and approximation hardness results for this problem; these results
are against an information-theoretic bound, and thus have implications on the
power of the multiplicative bidding language itself. Inspired by empirical
studies of search engine price data, we then codify the relevant restrictions
of the problem, and give further algorithmic and hardness results. Our main
technical contribution is an $O(\log n)$-approximation for the case of
multiplicative prices and monotone values. We also provide empirical
validations of our problem restrictions, and test our algorithms on real data
against natural benchmarks. Our experiments show that they perform favorably
compared with the baseline.
|
1404.6876 | Voot Tangkaratt | Voot Tangkaratt, Ning Xie, and Masashi Sugiyama | Conditional Density Estimation with Dimensionality Reduction via
Squared-Loss Conditional Entropy Minimization | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Regression aims at estimating the conditional mean of output given input.
However, regression is not informative enough if the conditional density is
multimodal, heteroscedastic, and asymmetric. In such a case, estimating the
conditional density itself is preferable, but conditional density estimation
(CDE) is challenging in high-dimensional space. A naive approach to coping with
high-dimensionality is to first perform dimensionality reduction (DR) and then
execute CDE. However, such a two-step process does not perform well in practice
because the error incurred in the first DR step can be magnified in the second
CDE step. In this paper, we propose a novel single-shot procedure that performs
CDE and DR simultaneously in an integrated way. Our key idea is to formulate DR
as the problem of minimizing a squared-loss variant of conditional entropy, and
this is solved via CDE. Thus, an additional CDE step is not needed after DR. We
demonstrate the usefulness of the proposed method through extensive experiments
on various datasets including humanoid robot transition and computer art.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2014 06:30:39 GMT"
}
] | 2014-04-29T00:00:00 | [
[
"Tangkaratt",
"Voot",
""
],
[
"Xie",
"Ning",
""
],
[
"Sugiyama",
"Masashi",
""
]
] | TITLE: Conditional Density Estimation with Dimensionality Reduction via
Squared-Loss Conditional Entropy Minimization
ABSTRACT: Regression aims at estimating the conditional mean of output given input.
However, regression is not informative enough if the conditional density is
multimodal, heteroscedastic, and asymmetric. In such a case, estimating the
conditional density itself is preferable, but conditional density estimation
(CDE) is challenging in high-dimensional space. A naive approach to coping with
high-dimensionality is to first perform dimensionality reduction (DR) and then
execute CDE. However, such a two-step process does not perform well in practice
because the error incurred in the first DR step can be magnified in the second
CDE step. In this paper, we propose a novel single-shot procedure that performs
CDE and DR simultaneously in an integrated way. Our key idea is to formulate DR
as the problem of minimizing a squared-loss variant of conditional entropy, and
this is solved via CDE. Thus, an additional CDE step is not needed after DR. We
demonstrate the usefulness of the proposed method through extensive experiments
on various datasets including humanoid robot transition and computer art.
|
1404.6999 | Carmine Dodaro | Mario Alviano, Carmine Dodaro and Francesco Ricca | Preliminary Report on WASP 2.0 | The paper appears in the Proceedings of the 15th International
Workshop on Non-Monotonic Reasoning (NMR 2014) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Answer Set Programming (ASP) is a declarative programming paradigm. The
intrinsic complexity of the evaluation of ASP programs makes the development of
more effective and faster systems a challenging research topic. This paper
reports on the recent improvements of the ASP solver WASP. WASP is undergoing a
refactoring process which will end up in the release of a new and more
performant version of the software. In particular the paper focus on the
improvements to the core evaluation algorithms working on normal programs. A
preliminary experiment on benchmarks from the 3rd ASP competition belonging to
the NP class is reported. The previous version of WASP was often not
competitive with alternative solutions on this class. The new version of WASP
shows a substantial increase in performance.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2014 14:26:12 GMT"
}
] | 2014-04-29T00:00:00 | [
[
"Alviano",
"Mario",
""
],
[
"Dodaro",
"Carmine",
""
],
[
"Ricca",
"Francesco",
""
]
] | TITLE: Preliminary Report on WASP 2.0
ABSTRACT: Answer Set Programming (ASP) is a declarative programming paradigm. The
intrinsic complexity of the evaluation of ASP programs makes the development of
more effective and faster systems a challenging research topic. This paper
reports on the recent improvements of the ASP solver WASP. WASP is undergoing a
refactoring process which will end up in the release of a new and more
performant version of the software. In particular the paper focus on the
improvements to the core evaluation algorithms working on normal programs. A
preliminary experiment on benchmarks from the 3rd ASP competition belonging to
the NP class is reported. The previous version of WASP was often not
competitive with alternative solutions on this class. The new version of WASP
shows a substantial increase in performance.
|
1108.0404 | Frans A. Oliehoek | Frans A. Oliehoek, Shimon Whiteson, Matthijs T.J. Spaan | Exploiting Agent and Type Independence in Collaborative Graphical
Bayesian Games | null | null | null | null | cs.AI cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient collaborative decision making is an important challenge for
multiagent systems. Finding optimal joint actions is especially challenging
when each agent has only imperfect information about the state of its
environment. Such problems can be modeled as collaborative Bayesian games in
which each agent receives private information in the form of its type. However,
representing and solving such games requires space and computation time
exponential in the number of agents. This article introduces collaborative
graphical Bayesian games (CGBGs), which facilitate more efficient collaborative
decision making by decomposing the global payoff function as the sum of local
payoff functions that depend on only a few agents. We propose a framework for
the efficient solution of CGBGs based on the insight that they posses two
different types of independence, which we call agent independence and type
independence. In particular, we present a factor graph representation that
captures both forms of independence and thus enables efficient solutions. In
addition, we show how this representation can provide leverage in sequential
tasks by using it to construct a novel method for decentralized partially
observable Markov decision processes. Experimental results in both random and
benchmark tasks demonstrate the improved scalability of our methods compared to
several existing alternatives.
| [
{
"version": "v1",
"created": "Mon, 1 Aug 2011 19:51:53 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Apr 2014 15:19:22 GMT"
}
] | 2014-04-28T00:00:00 | [
[
"Oliehoek",
"Frans A.",
""
],
[
"Whiteson",
"Shimon",
""
],
[
"Spaan",
"Matthijs T. J.",
""
]
] | TITLE: Exploiting Agent and Type Independence in Collaborative Graphical
Bayesian Games
ABSTRACT: Efficient collaborative decision making is an important challenge for
multiagent systems. Finding optimal joint actions is especially challenging
when each agent has only imperfect information about the state of its
environment. Such problems can be modeled as collaborative Bayesian games in
which each agent receives private information in the form of its type. However,
representing and solving such games requires space and computation time
exponential in the number of agents. This article introduces collaborative
graphical Bayesian games (CGBGs), which facilitate more efficient collaborative
decision making by decomposing the global payoff function as the sum of local
payoff functions that depend on only a few agents. We propose a framework for
the efficient solution of CGBGs based on the insight that they posses two
different types of independence, which we call agent independence and type
independence. In particular, we present a factor graph representation that
captures both forms of independence and thus enables efficient solutions. In
addition, we show how this representation can provide leverage in sequential
tasks by using it to construct a novel method for decentralized partially
observable Markov decision processes. Experimental results in both random and
benchmark tasks demonstrate the improved scalability of our methods compared to
several existing alternatives.
|
1307.2982 | Mohammad Norouzi | Mohammad Norouzi, Ali Punjani, David J. Fleet | Fast Exact Search in Hamming Space with Multi-Index Hashing | null | null | null | null | cs.CV cs.AI cs.DS cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is growing interest in representing image data and feature descriptors
using compact binary codes for fast near neighbor search. Although binary codes
are motivated by their use as direct indices (addresses) into a hash table,
codes longer than 32 bits are not being used as such, as it was thought to be
ineffective. We introduce a rigorous way to build multiple hash tables on
binary code substrings that enables exact k-nearest neighbor search in Hamming
space. The approach is storage efficient and straightforward to implement.
Theoretical analysis shows that the algorithm exhibits sub-linear run-time
behavior for uniformly distributed codes. Empirical results show dramatic
speedups over a linear scan baseline for datasets of up to one billion codes of
64, 128, or 256 bits.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2013 05:52:21 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Dec 2013 02:36:21 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Apr 2014 01:31:55 GMT"
}
] | 2014-04-28T00:00:00 | [
[
"Norouzi",
"Mohammad",
""
],
[
"Punjani",
"Ali",
""
],
[
"Fleet",
"David J.",
""
]
] | TITLE: Fast Exact Search in Hamming Space with Multi-Index Hashing
ABSTRACT: There is growing interest in representing image data and feature descriptors
using compact binary codes for fast near neighbor search. Although binary codes
are motivated by their use as direct indices (addresses) into a hash table,
codes longer than 32 bits are not being used as such, as it was thought to be
ineffective. We introduce a rigorous way to build multiple hash tables on
binary code substrings that enables exact k-nearest neighbor search in Hamming
space. The approach is storage efficient and straightforward to implement.
Theoretical analysis shows that the algorithm exhibits sub-linear run-time
behavior for uniformly distributed codes. Empirical results show dramatic
speedups over a linear scan baseline for datasets of up to one billion codes of
64, 128, or 256 bits.
|
1311.0202 | Diego Amancio Raphael | D. R. Amancio, C. H. Comin, D. Casanova, G. Travieso, O. M. Bruno, F.
A. Rodrigues and L. da F. Costa | A systematic comparison of supervised classifiers | null | PLoS ONE 9 (4): e94137, 2014 | 10.1371/journal.pone.0094137 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pattern recognition techniques have been employed in a myriad of industrial,
medical, commercial and academic applications. To tackle such a diversity of
data, many techniques have been devised. However, despite the long tradition of
pattern recognition research, there is no technique that yields the best
classification in all scenarios. Therefore, the consideration of as many as
possible techniques presents itself as an fundamental practice in applications
aiming at high accuracy. Typical works comparing methods either emphasize the
performance of a given algorithm in validation tests or systematically compare
various algorithms, assuming that the practical use of these methods is done by
experts. In many occasions, however, researchers have to deal with their
practical classification tasks without an in-depth knowledge about the
underlying mechanisms behind parameters. Actually, the adequate choice of
classifiers and parameters alike in such practical circumstances constitutes a
long-standing problem and is the subject of the current paper. We carried out a
study on the performance of nine well-known classifiers implemented by the Weka
framework and compared the dependence of the accuracy with their configuration
parameter configurations. The analysis of performance with default parameters
revealed that the k-nearest neighbors method exceeds by a large margin the
other methods when high dimensional datasets are considered. When other
configuration of parameters were allowed, we found that it is possible to
improve the quality of SVM in more than 20% even if parameters are set
randomly. Taken together, the investigation conducted in this paper suggests
that, apart from the SVM implementation, Weka's default configuration of
parameters provides an performance close the one achieved with the optimal
configuration.
| [
{
"version": "v1",
"created": "Thu, 17 Oct 2013 03:44:18 GMT"
}
] | 2014-04-28T00:00:00 | [
[
"Amancio",
"D. R.",
""
],
[
"Comin",
"C. H.",
""
],
[
"Casanova",
"D.",
""
],
[
"Travieso",
"G.",
""
],
[
"Bruno",
"O. M.",
""
],
[
"Rodrigues",
"F. A.",
""
],
[
"Costa",
"L. da F.",
""
]
] | TITLE: A systematic comparison of supervised classifiers
ABSTRACT: Pattern recognition techniques have been employed in a myriad of industrial,
medical, commercial and academic applications. To tackle such a diversity of
data, many techniques have been devised. However, despite the long tradition of
pattern recognition research, there is no technique that yields the best
classification in all scenarios. Therefore, the consideration of as many as
possible techniques presents itself as an fundamental practice in applications
aiming at high accuracy. Typical works comparing methods either emphasize the
performance of a given algorithm in validation tests or systematically compare
various algorithms, assuming that the practical use of these methods is done by
experts. In many occasions, however, researchers have to deal with their
practical classification tasks without an in-depth knowledge about the
underlying mechanisms behind parameters. Actually, the adequate choice of
classifiers and parameters alike in such practical circumstances constitutes a
long-standing problem and is the subject of the current paper. We carried out a
study on the performance of nine well-known classifiers implemented by the Weka
framework and compared the dependence of the accuracy with their configuration
parameter configurations. The analysis of performance with default parameters
revealed that the k-nearest neighbors method exceeds by a large margin the
other methods when high dimensional datasets are considered. When other
configuration of parameters were allowed, we found that it is possible to
improve the quality of SVM in more than 20% even if parameters are set
randomly. Taken together, the investigation conducted in this paper suggests
that, apart from the SVM implementation, Weka's default configuration of
parameters provides an performance close the one achieved with the optimal
configuration.
|
1404.6351 | Harald Ganster | Harald Ganster, Martina Uray, Sylwia Steginska, Gerardus Croonen,
Rudolf Kaltenb\"ock, Karin Hennermann | Improving weather radar by fusion and classification | Part of the OAGM 2014 proceedings (arXiv:1404.3538) | null | null | OAGM/2014/04 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In air traffic management (ATM) all necessary operations (tactical planing,
sector configuration, required staffing, runway configuration, routing of
approaching aircrafts) rely on accurate measurements and predictions of the
current weather situation. An essential basis of information is delivered by
weather radar images (WXR), which, unfortunately, exhibit a vast amount of
disturbances. Thus, the improvement of these datasets is the key factor for
more accurate predictions of weather phenomena and weather conditions. Image
processing methods based on texture analysis and geometric operators allow to
identify regions including artefacts as well as zones of missing information.
Correction of these zones is implemented by exploiting multi-spectral satellite
data (Meteosat Second Generation). Results prove that the proposed system for
artefact detection and data correction significantly improves the quality of
WXR data and, thus, enables more reliable weather now- and forecast leading to
increased ATM safety.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2014 08:32:51 GMT"
}
] | 2014-04-28T00:00:00 | [
[
"Ganster",
"Harald",
""
],
[
"Uray",
"Martina",
""
],
[
"Steginska",
"Sylwia",
""
],
[
"Croonen",
"Gerardus",
""
],
[
"Kaltenböck",
"Rudolf",
""
],
[
"Hennermann",
"Karin",
""
]
] | TITLE: Improving weather radar by fusion and classification
ABSTRACT: In air traffic management (ATM) all necessary operations (tactical planing,
sector configuration, required staffing, runway configuration, routing of
approaching aircrafts) rely on accurate measurements and predictions of the
current weather situation. An essential basis of information is delivered by
weather radar images (WXR), which, unfortunately, exhibit a vast amount of
disturbances. Thus, the improvement of these datasets is the key factor for
more accurate predictions of weather phenomena and weather conditions. Image
processing methods based on texture analysis and geometric operators allow to
identify regions including artefacts as well as zones of missing information.
Correction of these zones is implemented by exploiting multi-spectral satellite
data (Meteosat Second Generation). Results prove that the proposed system for
artefact detection and data correction significantly improves the quality of
WXR data and, thus, enables more reliable weather now- and forecast leading to
increased ATM safety.
|
1404.6413 | Georg Waltner | Georg Waltner and Thomas Mauthner and Horst Bischof | Indoor Activity Detection and Recognition for Sport Games Analysis | Part of the OAGM 2014 proceedings (arXiv:1404.3538) | null | null | OAGM/2014/03 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Activity recognition in sport is an attractive field for computer vision
research. Game, player and team analysis are of great interest and research
topics within this field emerge with the goal of automated analysis. The very
specific underlying rules of sports can be used as prior knowledge for the
recognition task and present a constrained environment for evaluation. This
paper describes recognition of single player activities in sport with special
emphasis on volleyball. Starting from a per-frame player-centered activity
recognition, we incorporate geometry and contextual information via an activity
context descriptor that collects information about all player's activities over
a certain timespan relative to the investigated player. The benefit of this
context information on single player activity recognition is evaluated on our
new real-life dataset presenting a total amount of almost 36k annotated frames
containing 7 activity classes within 6 videos of professional volleyball games.
Our incorporation of the contextual information improves the average
player-centered classification performance of 77.56% by up to 18.35% on
specific classes, proving that spatio-temporal context is an important clue for
activity recognition.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2014 13:25:09 GMT"
}
] | 2014-04-28T00:00:00 | [
[
"Waltner",
"Georg",
""
],
[
"Mauthner",
"Thomas",
""
],
[
"Bischof",
"Horst",
""
]
] | TITLE: Indoor Activity Detection and Recognition for Sport Games Analysis
ABSTRACT: Activity recognition in sport is an attractive field for computer vision
research. Game, player and team analysis are of great interest and research
topics within this field emerge with the goal of automated analysis. The very
specific underlying rules of sports can be used as prior knowledge for the
recognition task and present a constrained environment for evaluation. This
paper describes recognition of single player activities in sport with special
emphasis on volleyball. Starting from a per-frame player-centered activity
recognition, we incorporate geometry and contextual information via an activity
context descriptor that collects information about all player's activities over
a certain timespan relative to the investigated player. The benefit of this
context information on single player activity recognition is evaluated on our
new real-life dataset presenting a total amount of almost 36k annotated frames
containing 7 activity classes within 6 videos of professional volleyball games.
Our incorporation of the contextual information improves the average
player-centered classification performance of 77.56% by up to 18.35% on
specific classes, proving that spatio-temporal context is an important clue for
activity recognition.
|
1404.6039 | Nicolas Charon | Benjamin Charlier (UM2), Nicolas Charon (DIKU, CMLA), Alain Trouv\'e
(CMLA) | The fshape framework for the variability analysis of functional shapes | null | null | null | null | cs.CG cs.CV math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces a full mathematical and numerical framework for
treating functional shapes (or fshapes) following the landmarks of shape spaces
and shape analysis. Functional shapes can be described as signal functions
supported on varying geometrical supports. Analysing variability of fshapes'
ensembles require the modelling and quantification of joint variations in
geometry and signal, which have been treated separately in previous approaches.
Instead, building on the ideas of shape spaces for purely geometrical objects,
we propose the extended concept of fshape bundles and define Riemannian metrics
for fshape metamorphoses to model geometrico-functional transformations within
these bundles. We also generalize previous works on data attachment terms based
on the notion of varifolds and demonstrate the utility of these distances.
Based on these, we propose variational formulations of the atlas estimation
problem on populations of fshapes and prove existence of solutions for the
different models. The second part of the article examines the numerical
implementation of the models by detailing discrete expressions for the metrics
and gradients and proposing an optimization scheme for the atlas estimation
problem. We present a few results of the methodology on a synthetic dataset as
well as on a population of retinal membranes with thickness maps.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2014 06:23:30 GMT"
}
] | 2014-04-25T00:00:00 | [
[
"Charlier",
"Benjamin",
"",
"UM2"
],
[
"Charon",
"Nicolas",
"",
"DIKU, CMLA"
],
[
"Trouvé",
"Alain",
"",
"CMLA"
]
] | TITLE: The fshape framework for the variability analysis of functional shapes
ABSTRACT: This article introduces a full mathematical and numerical framework for
treating functional shapes (or fshapes) following the landmarks of shape spaces
and shape analysis. Functional shapes can be described as signal functions
supported on varying geometrical supports. Analysing variability of fshapes'
ensembles require the modelling and quantification of joint variations in
geometry and signal, which have been treated separately in previous approaches.
Instead, building on the ideas of shape spaces for purely geometrical objects,
we propose the extended concept of fshape bundles and define Riemannian metrics
for fshape metamorphoses to model geometrico-functional transformations within
these bundles. We also generalize previous works on data attachment terms based
on the notion of varifolds and demonstrate the utility of these distances.
Based on these, we propose variational formulations of the atlas estimation
problem on populations of fshapes and prove existence of solutions for the
different models. The second part of the article examines the numerical
implementation of the models by detailing discrete expressions for the metrics
and gradients and proposing an optimization scheme for the atlas estimation
problem. We present a few results of the methodology on a synthetic dataset as
well as on a population of retinal membranes with thickness maps.
|
1404.6103 | Avinatan Hassidim | Avinatan Hassidim and Assaf Romm | An Approximate "Law of One Price" in Random Assignment Games | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Assignment games represent a tractable yet versatile model of two-sided
markets with transfers. We study the likely properties of the core of randomly
generated assignment games. If the joint productivities of every firm and
worker are i.i.d bounded random variables, then with high probability all
workers are paid roughly equal wages, and all firms make similar profits. This
implies that core allocations vary significantly in balanced markets, but that
there is core convergence in even slightly unbalanced markets. For the
benchmark case of uniform distribution, we provide a tight bound for the
workers' share of the surplus under the firm-optimal core allocation. We
present simulation results suggesting that the phenomena analyzed appear even
in medium-sized markets. Finally, we briefly discuss the effects of unbounded
distributions and the ways in which they may affect wage dispersion.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2014 12:26:04 GMT"
}
] | 2014-04-25T00:00:00 | [
[
"Hassidim",
"Avinatan",
""
],
[
"Romm",
"Assaf",
""
]
] | TITLE: An Approximate "Law of One Price" in Random Assignment Games
ABSTRACT: Assignment games represent a tractable yet versatile model of two-sided
markets with transfers. We study the likely properties of the core of randomly
generated assignment games. If the joint productivities of every firm and
worker are i.i.d bounded random variables, then with high probability all
workers are paid roughly equal wages, and all firms make similar profits. This
implies that core allocations vary significantly in balanced markets, but that
there is core convergence in even slightly unbalanced markets. For the
benchmark case of uniform distribution, we provide a tight bound for the
workers' share of the surplus under the firm-optimal core allocation. We
present simulation results suggesting that the phenomena analyzed appear even
in medium-sized markets. Finally, we briefly discuss the effects of unbounded
distributions and the ways in which they may affect wage dispersion.
|
1404.6151 | Rajib Rana | Rajib Rana, Mingrui Yang, Tim Wark, Chun Tung Chou, Wen Hu | SimpleTrack:Adaptive Trajectory Compression with Deterministic
Projection Matrix for Mobile Sensor Networks | null | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Some mobile sensor network applications require the sensor nodes to transfer
their trajectories to a data sink. This paper proposes an adaptive trajectory
(lossy) compression algorithm based on compressive sensing. The algorithm has
two innovative elements. First, we propose a method to compute a deterministic
projection matrix from a learnt dictionary. Second, we propose a method for the
mobile nodes to adaptively predict the number of projections needed based on
the speed of the mobile nodes. Extensive evaluation of the proposed algorithm
using 6 datasets shows that our proposed algorithm can achieve sub-metre
accuracy. In addition, our method of computing projection matrices outperforms
two existing methods. Finally, comparison of our algorithm against a
state-of-the-art trajectory compression algorithm show that our algorithm can
reduce the error by 10-60 cm for the same compression ratio.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2014 04:30:33 GMT"
}
] | 2014-04-25T00:00:00 | [
[
"Rana",
"Rajib",
""
],
[
"Yang",
"Mingrui",
""
],
[
"Wark",
"Tim",
""
],
[
"Chou",
"Chun Tung",
""
],
[
"Hu",
"Wen",
""
]
] | TITLE: SimpleTrack:Adaptive Trajectory Compression with Deterministic
Projection Matrix for Mobile Sensor Networks
ABSTRACT: Some mobile sensor network applications require the sensor nodes to transfer
their trajectories to a data sink. This paper proposes an adaptive trajectory
(lossy) compression algorithm based on compressive sensing. The algorithm has
two innovative elements. First, we propose a method to compute a deterministic
projection matrix from a learnt dictionary. Second, we propose a method for the
mobile nodes to adaptively predict the number of projections needed based on
the speed of the mobile nodes. Extensive evaluation of the proposed algorithm
using 6 datasets shows that our proposed algorithm can achieve sub-metre
accuracy. In addition, our method of computing projection matrices outperforms
two existing methods. Finally, comparison of our algorithm against a
state-of-the-art trajectory compression algorithm show that our algorithm can
reduce the error by 10-60 cm for the same compression ratio.
|
1303.2132 | Xiao-Lei Zhang | Xiao-Lei Zhang | Heuristic Ternary Error-Correcting Output Codes Via Weight Optimization
and Layered Clustering-Based Approach | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One important classifier ensemble for multiclass classification problems is
Error-Correcting Output Codes (ECOCs). It bridges multiclass problems and
binary-class classifiers by decomposing multiclass problems to a serial
binary-class problems. In this paper, we present a heuristic ternary code,
named Weight Optimization and Layered Clustering-based ECOC (WOLC-ECOC). It
starts with an arbitrary valid ECOC and iterates the following two steps until
the training risk converges. The first step, named Layered Clustering based
ECOC (LC-ECOC), constructs multiple strong classifiers on the most confusing
binary-class problem. The second step adds the new classifiers to ECOC by a
novel Optimized Weighted (OW) decoding algorithm, where the optimization
problem of the decoding is solved by the cutting plane algorithm. Technically,
LC-ECOC makes the heuristic training process not blocked by some difficult
binary-class problem. OW decoding guarantees the non-increase of the training
risk for ensuring a small code length. Results on 14 UCI datasets and a music
genre classification problem demonstrate the effectiveness of WOLC-ECOC.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2013 21:40:42 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Apr 2014 00:59:58 GMT"
}
] | 2014-04-24T00:00:00 | [
[
"Zhang",
"Xiao-Lei",
""
]
] | TITLE: Heuristic Ternary Error-Correcting Output Codes Via Weight Optimization
and Layered Clustering-Based Approach
ABSTRACT: One important classifier ensemble for multiclass classification problems is
Error-Correcting Output Codes (ECOCs). It bridges multiclass problems and
binary-class classifiers by decomposing multiclass problems to a serial
binary-class problems. In this paper, we present a heuristic ternary code,
named Weight Optimization and Layered Clustering-based ECOC (WOLC-ECOC). It
starts with an arbitrary valid ECOC and iterates the following two steps until
the training risk converges. The first step, named Layered Clustering based
ECOC (LC-ECOC), constructs multiple strong classifiers on the most confusing
binary-class problem. The second step adds the new classifiers to ECOC by a
novel Optimized Weighted (OW) decoding algorithm, where the optimization
problem of the decoding is solved by the cutting plane algorithm. Technically,
LC-ECOC makes the heuristic training process not blocked by some difficult
binary-class problem. OW decoding guarantees the non-increase of the training
risk for ensuring a small code length. Results on 14 UCI datasets and a music
genre classification problem demonstrate the effectiveness of WOLC-ECOC.
|
1305.4076 | Fuqiang Chen | Fu-qiang Chen, Yan Wu, Guo-dong Zhao, Jun-ming Zhang, Ming Zhu, Jing
Bai | Contractive De-noising Auto-encoder | Figures edited | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Auto-encoder is a special kind of neural network based on reconstruction.
De-noising auto-encoder (DAE) is an improved auto-encoder which is robust to
the input by corrupting the original data first and then reconstructing the
original input by minimizing the reconstruction error function. And contractive
auto-encoder (CAE) is another kind of improved auto-encoder to learn robust
feature by introducing the Frobenius norm of the Jacobean matrix of the learned
feature with respect to the original input. In this paper, we combine
de-noising auto-encoder and contractive auto- encoder, and propose another
improved auto-encoder, contractive de-noising auto- encoder (CDAE), which is
robust to both the original input and the learned feature. We stack CDAE to
extract more abstract features and apply SVM for classification. The experiment
result on benchmark dataset MNIST shows that our proposed CDAE performed better
than both DAE and CAE, proving the effective of our method.
| [
{
"version": "v1",
"created": "Fri, 17 May 2013 13:42:49 GMT"
},
{
"version": "v2",
"created": "Thu, 23 May 2013 04:22:44 GMT"
},
{
"version": "v3",
"created": "Thu, 30 May 2013 00:01:45 GMT"
},
{
"version": "v4",
"created": "Mon, 10 Mar 2014 13:41:32 GMT"
},
{
"version": "v5",
"created": "Wed, 23 Apr 2014 11:40:12 GMT"
}
] | 2014-04-24T00:00:00 | [
[
"Chen",
"Fu-qiang",
""
],
[
"Wu",
"Yan",
""
],
[
"Zhao",
"Guo-dong",
""
],
[
"Zhang",
"Jun-ming",
""
],
[
"Zhu",
"Ming",
""
],
[
"Bai",
"Jing",
""
]
] | TITLE: Contractive De-noising Auto-encoder
ABSTRACT: Auto-encoder is a special kind of neural network based on reconstruction.
De-noising auto-encoder (DAE) is an improved auto-encoder which is robust to
the input by corrupting the original data first and then reconstructing the
original input by minimizing the reconstruction error function. And contractive
auto-encoder (CAE) is another kind of improved auto-encoder to learn robust
feature by introducing the Frobenius norm of the Jacobean matrix of the learned
feature with respect to the original input. In this paper, we combine
de-noising auto-encoder and contractive auto- encoder, and propose another
improved auto-encoder, contractive de-noising auto- encoder (CDAE), which is
robust to both the original input and the learned feature. We stack CDAE to
extract more abstract features and apply SVM for classification. The experiment
result on benchmark dataset MNIST shows that our proposed CDAE performed better
than both DAE and CAE, proving the effective of our method.
|
1404.5765 | Daniel Wolf | Daniel Wolf, Markus Bajones, Johann Prankl, Markus Vincze | Find my mug: Efficient object search with a mobile robot using semantic
segmentation | Part of the OAGM 2014 proceedings (arXiv:1404.3538) | null | null | OAGM/2014/14 | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose an efficient semantic segmentation framework for
indoor scenes, tailored to the application on a mobile robot. Semantic
segmentation can help robots to gain a reasonable understanding of their
environment, but to reach this goal, the algorithms not only need to be
accurate, but also fast and robust. Therefore, we developed an optimized 3D
point cloud processing framework based on a Randomized Decision Forest,
achieving competitive results at sufficiently high frame rates. We evaluate the
capabilities of our method on the popular NYU depth dataset and our own data
and demonstrate its feasibility by deploying it on a mobile service robot, for
which we could optimize an object search procedure using our results.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2014 09:48:30 GMT"
}
] | 2014-04-24T00:00:00 | [
[
"Wolf",
"Daniel",
""
],
[
"Bajones",
"Markus",
""
],
[
"Prankl",
"Johann",
""
],
[
"Vincze",
"Markus",
""
]
] | TITLE: Find my mug: Efficient object search with a mobile robot using semantic
segmentation
ABSTRACT: In this paper, we propose an efficient semantic segmentation framework for
indoor scenes, tailored to the application on a mobile robot. Semantic
segmentation can help robots to gain a reasonable understanding of their
environment, but to reach this goal, the algorithms not only need to be
accurate, but also fast and robust. Therefore, we developed an optimized 3D
point cloud processing framework based on a Randomized Decision Forest,
achieving competitive results at sufficiently high frame rates. We evaluate the
capabilities of our method on the popular NYU depth dataset and our own data
and demonstrate its feasibility by deploying it on a mobile service robot, for
which we could optimize an object search procedure using our results.
|
1212.4898 | Baosen Zhang | Baosen Zhang and Ram Rajagopal and David Tse | Network Risk Limiting Dispatch: Optimal Control and Price of Uncertainty | To Appear in IEEE transaction on automatic control, shorter version
presented in Allerton | null | null | null | math.OC cs.IT cs.SY math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Increased uncertainty due to high penetration of renewables imposes
significant costs to the system operators. The added costs depend on several
factors including market design, performance of renewable generation
forecasting and the specific dispatch procedure. Quantifying these costs has
been limited to small sample Monte Carlo approaches applied specific dispatch
algorithms. The computational complexity and accuracy of these approaches has
limited the understanding of tradeoffs between different factors. {In this work
we consider a two-stage stochastic economic dispatch problem. Our goal is to
provide an analytical quantification and an intuitive understanding of the
effects of uncertainties and network congestion on the dispatch procedure and
the optimal cost.} We first consider an uncongested network and calculate the
risk limiting dispatch. In addition, we derive the price of uncertainty, a
number that characterizes the intrinsic impact of uncertainty on the
integration cost of renewables. Then we extend the results to a network where
one link can become congested. Under mild conditions, we calculate price of
uncertainty even in this case. We show that risk limiting dispatch is given by
a set of deterministic equilibrium equations. The dispatch solution yields an
important insight: congested links do not create isolated nodes, even in a
two-node network. In fact, the network can support backflows in congested
links, that are useful to reduce the uncertainty by averaging supply across the
network. We demonstrate the performance of our approach in standard IEEE
benchmark networks.
| [
{
"version": "v1",
"created": "Thu, 20 Dec 2012 01:13:20 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2014 17:21:27 GMT"
}
] | 2014-04-23T00:00:00 | [
[
"Zhang",
"Baosen",
""
],
[
"Rajagopal",
"Ram",
""
],
[
"Tse",
"David",
""
]
] | TITLE: Network Risk Limiting Dispatch: Optimal Control and Price of Uncertainty
ABSTRACT: Increased uncertainty due to high penetration of renewables imposes
significant costs to the system operators. The added costs depend on several
factors including market design, performance of renewable generation
forecasting and the specific dispatch procedure. Quantifying these costs has
been limited to small sample Monte Carlo approaches applied specific dispatch
algorithms. The computational complexity and accuracy of these approaches has
limited the understanding of tradeoffs between different factors. {In this work
we consider a two-stage stochastic economic dispatch problem. Our goal is to
provide an analytical quantification and an intuitive understanding of the
effects of uncertainties and network congestion on the dispatch procedure and
the optimal cost.} We first consider an uncongested network and calculate the
risk limiting dispatch. In addition, we derive the price of uncertainty, a
number that characterizes the intrinsic impact of uncertainty on the
integration cost of renewables. Then we extend the results to a network where
one link can become congested. Under mild conditions, we calculate price of
uncertainty even in this case. We show that risk limiting dispatch is given by
a set of deterministic equilibrium equations. The dispatch solution yields an
important insight: congested links do not create isolated nodes, even in a
two-node network. In fact, the network can support backflows in congested
links, that are useful to reduce the uncertainty by averaging supply across the
network. We demonstrate the performance of our approach in standard IEEE
benchmark networks.
|
1302.0948 | Piotr Skowron | Piotr Skowron, Krzysztof Rzadca | Non-monetary fair scheduling---a cooperative game theory approach | null | null | null | null | cs.DC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a multi-organizational system in which each organization
contributes processors to the global pool but also jobs to be processed on the
common resources. The fairness of the scheduling algorithm is essential for the
stability and even for the existence of such systems (as organizations may
refuse to join an unfair system).
We consider on-line, non-clairvoyant scheduling of sequential jobs. The
started jobs cannot be stopped, canceled, preempted, or moved to other
processors. We consider identical processors, but most of our results can be
extended to related or unrelated processors.
We model the fair scheduling problem as a cooperative game and we use the
Shapley value to determine the ideal fair schedule. In contrast to the current
literature, we do not use money to assess the relative utilities of jobs.
Instead, to calculate the contribution of an organization, we determine how the
presence of this organization influences the performance of other
organizations. Our approach can be used with arbitrary utility function (e.g.,
flow time, tardiness, resource utilization), but we argue that the utility
function should be strategy resilient. The organizations should be discouraged
from splitting, merging or delaying their jobs. We present the unique (to
within a multiplicative and additive constants) strategy resilient utility
function.
We show that the problem of fair scheduling is NP-hard and hard to
approximate. However, for unit-size jobs, we present an FPRAS. Also, we show
that the problem parametrized with the number of organizations is FPT. Although
for the large number of the organizations the problem is computationally hard,
the presented exponential algorithm can be used as a fairness benchmark.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2013 06:59:03 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2014 17:37:13 GMT"
}
] | 2014-04-23T00:00:00 | [
[
"Skowron",
"Piotr",
""
],
[
"Rzadca",
"Krzysztof",
""
]
] | TITLE: Non-monetary fair scheduling---a cooperative game theory approach
ABSTRACT: We consider a multi-organizational system in which each organization
contributes processors to the global pool but also jobs to be processed on the
common resources. The fairness of the scheduling algorithm is essential for the
stability and even for the existence of such systems (as organizations may
refuse to join an unfair system).
We consider on-line, non-clairvoyant scheduling of sequential jobs. The
started jobs cannot be stopped, canceled, preempted, or moved to other
processors. We consider identical processors, but most of our results can be
extended to related or unrelated processors.
We model the fair scheduling problem as a cooperative game and we use the
Shapley value to determine the ideal fair schedule. In contrast to the current
literature, we do not use money to assess the relative utilities of jobs.
Instead, to calculate the contribution of an organization, we determine how the
presence of this organization influences the performance of other
organizations. Our approach can be used with arbitrary utility function (e.g.,
flow time, tardiness, resource utilization), but we argue that the utility
function should be strategy resilient. The organizations should be discouraged
from splitting, merging or delaying their jobs. We present the unique (to
within a multiplicative and additive constants) strategy resilient utility
function.
We show that the problem of fair scheduling is NP-hard and hard to
approximate. However, for unit-size jobs, we present an FPRAS. Also, we show
that the problem parametrized with the number of organizations is FPT. Although
for the large number of the organizations the problem is computationally hard,
the presented exponential algorithm can be used as a fairness benchmark.
|
1404.5165 | Kian Hsiang Low | Nuo Xu, Kian Hsiang Low, Jie Chen, Keng Kiat Lim, Etkin Baris Ozgul | GP-Localize: Persistent Mobile Robot Localization using Online Sparse
Gaussian Process Observation Model | 28th AAAI Conference on Artificial Intelligence (AAAI 2014), Extended
version with proofs, 10 pages | null | null | null | cs.RO cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Central to robot exploration and mapping is the task of persistent
localization in environmental fields characterized by spatially correlated
measurements. This paper presents a Gaussian process localization (GP-Localize)
algorithm that, in contrast to existing works, can exploit the spatially
correlated field measurements taken during a robot's exploration (instead of
relying on prior training data) for efficiently and scalably learning the GP
observation model online through our proposed novel online sparse GP. As a
result, GP-Localize is capable of achieving constant time and memory (i.e.,
independent of the size of the data) per filtering step, which demonstrates the
practical feasibility of using GPs for persistent robot localization and
autonomy. Empirical evaluation via simulated experiments with real-world
datasets and a real robot experiment shows that GP-Localize outperforms
existing GP localization algorithms.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2014 10:28:00 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2014 08:03:33 GMT"
}
] | 2014-04-23T00:00:00 | [
[
"Xu",
"Nuo",
""
],
[
"Low",
"Kian Hsiang",
""
],
[
"Chen",
"Jie",
""
],
[
"Lim",
"Keng Kiat",
""
],
[
"Ozgul",
"Etkin Baris",
""
]
] | TITLE: GP-Localize: Persistent Mobile Robot Localization using Online Sparse
Gaussian Process Observation Model
ABSTRACT: Central to robot exploration and mapping is the task of persistent
localization in environmental fields characterized by spatially correlated
measurements. This paper presents a Gaussian process localization (GP-Localize)
algorithm that, in contrast to existing works, can exploit the spatially
correlated field measurements taken during a robot's exploration (instead of
relying on prior training data) for efficiently and scalably learning the GP
observation model online through our proposed novel online sparse GP. As a
result, GP-Localize is capable of achieving constant time and memory (i.e.,
independent of the size of the data) per filtering step, which demonstrates the
practical feasibility of using GPs for persistent robot localization and
autonomy. Empirical evaluation via simulated experiments with real-world
datasets and a real robot experiment shows that GP-Localize outperforms
existing GP localization algorithms.
|
1210.5288 | C. Seshadhri | Nurcan Durak and Tamara G. Kolda and Ali Pinar and C. Seshadhri | A Scalable Null Model for Directed Graphs Matching All Degree
Distributions: In, Out, and Reciprocal | Camera ready version for IEEE Workshop on Network Science; fixed some
typos in table | Proceedings of IEEE 2013 2nd International Network Science
Workshop (NSW 2013), pp. 22--30 | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Degree distributions are arguably the most important property of real world
networks. The classic edge configuration model or Chung-Lu model can generate
an undirected graph with any desired degree distribution. This serves as a good
null model to compare algorithms or perform experimental studies. Furthermore,
there are scalable algorithms that implement these models and they are
invaluable in the study of graphs. However, networks in the real-world are
often directed, and have a significant proportion of reciprocal edges. A
stronger relation exists between two nodes when they each point to one another
(reciprocal edge) as compared to when only one points to the other (one-way
edge). Despite their importance, reciprocal edges have been disregarded by most
directed graph models.
We propose a null model for directed graphs inspired by the Chung-Lu model
that matches the in-, out-, and reciprocal-degree distributions of the real
graphs. Our algorithm is scalable and requires $O(m)$ random numbers to
generate a graph with $m$ edges. We perform a series of experiments on real
datasets and compare with existing graph models.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2012 00:28:05 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Feb 2013 23:28:49 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Mar 2013 19:41:43 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Apr 2013 22:46:06 GMT"
}
] | 2014-04-22T00:00:00 | [
[
"Durak",
"Nurcan",
""
],
[
"Kolda",
"Tamara G.",
""
],
[
"Pinar",
"Ali",
""
],
[
"Seshadhri",
"C.",
""
]
] | TITLE: A Scalable Null Model for Directed Graphs Matching All Degree
Distributions: In, Out, and Reciprocal
ABSTRACT: Degree distributions are arguably the most important property of real world
networks. The classic edge configuration model or Chung-Lu model can generate
an undirected graph with any desired degree distribution. This serves as a good
null model to compare algorithms or perform experimental studies. Furthermore,
there are scalable algorithms that implement these models and they are
invaluable in the study of graphs. However, networks in the real-world are
often directed, and have a significant proportion of reciprocal edges. A
stronger relation exists between two nodes when they each point to one another
(reciprocal edge) as compared to when only one points to the other (one-way
edge). Despite their importance, reciprocal edges have been disregarded by most
directed graph models.
We propose a null model for directed graphs inspired by the Chung-Lu model
that matches the in-, out-, and reciprocal-degree distributions of the real
graphs. Our algorithm is scalable and requires $O(m)$ random numbers to
generate a graph with $m$ edges. We perform a series of experiments on real
datasets and compare with existing graph models.
|
1404.4865 | Huangxin Wang | Huangxin Wang and Jean X. Zhang and Fei Li | On Time-Sensitive Revenue Management and Energy Scheduling in Green Data
Centers | null | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we design an analytically and experimentally better online
energy and job scheduling algorithm with the objective of maximizing net profit
for a service provider in green data centers. We first study the previously
known algorithms and conclude that these online algorithms have provable poor
performance against their worst-case scenarios. To guarantee an online
algorithm's performance in hindsight, we design a randomized algorithm to
schedule energy and jobs in the data centers and prove the algorithm's expected
competitive ratio in various settings. Our algorithm is theoretical-sound and
it outperforms the previously known algorithms in many settings using both real
traces and simulated data. An optimal offline algorithm is also implemented as
an empirical benchmark.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2014 19:34:24 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2014 15:09:46 GMT"
}
] | 2014-04-22T00:00:00 | [
[
"Wang",
"Huangxin",
""
],
[
"Zhang",
"Jean X.",
""
],
[
"Li",
"Fei",
""
]
] | TITLE: On Time-Sensitive Revenue Management and Energy Scheduling in Green Data
Centers
ABSTRACT: In this paper, we design an analytically and experimentally better online
energy and job scheduling algorithm with the objective of maximizing net profit
for a service provider in green data centers. We first study the previously
known algorithms and conclude that these online algorithms have provable poor
performance against their worst-case scenarios. To guarantee an online
algorithm's performance in hindsight, we design a randomized algorithm to
schedule energy and jobs in the data centers and prove the algorithm's expected
competitive ratio in various settings. Our algorithm is theoretical-sound and
it outperforms the previously known algorithms in many settings using both real
traces and simulated data. An optimal offline algorithm is also implemented as
an empirical benchmark.
|
1404.4944 | Jo\~ao Pedro Pedroso | Jo\~ao Pedro Pedroso and Mikio Kubo and Ana Viana | Unit commitment with valve-point loading effect | null | null | null | DCC-2014-05 | math.OC cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Valve-point loading affects the input-output characteristics of generating
units, bringing the fuel costs nonlinear and nonsmooth. This has been
considered in the solution of load dispatch problems, but not in the planning
phase of unit commitment. This paper presents a mathematical optimization model
for the thermal unit commitment problem considering valve-point loading. The
formulation is based on a careful linearization of the fuel cost function,
which is modeled with great detail on power regions being used in the current
solution, and roughly on other regions. A set of benchmark instances for this
problem is used for analyzing the method, with recourse to a general-purpose
mixed-integer optimization solver.
| [
{
"version": "v1",
"created": "Sat, 19 Apr 2014 10:50:16 GMT"
}
] | 2014-04-22T00:00:00 | [
[
"Pedroso",
"João Pedro",
""
],
[
"Kubo",
"Mikio",
""
],
[
"Viana",
"Ana",
""
]
] | TITLE: Unit commitment with valve-point loading effect
ABSTRACT: Valve-point loading affects the input-output characteristics of generating
units, bringing the fuel costs nonlinear and nonsmooth. This has been
considered in the solution of load dispatch problems, but not in the planning
phase of unit commitment. This paper presents a mathematical optimization model
for the thermal unit commitment problem considering valve-point loading. The
formulation is based on a careful linearization of the fuel cost function,
which is modeled with great detail on power regions being used in the current
solution, and roughly on other regions. A set of benchmark instances for this
problem is used for analyzing the method, with recourse to a general-purpose
mixed-integer optimization solver.
|
1404.5002 | Iraj Saniee | Deepak Ajwani, W. Sean Kennedy, Alessandra Sala, Iraj Saniee | A Geometric Distance Oracle for Large Real-World Graphs | 15 pages, 9 figures, 3 tables | null | null | null | cs.SI cs.DS | http://creativecommons.org/licenses/publicdomain/ | Many graph processing algorithms require determination of shortest-path
distances between arbitrary numbers of node pairs. Since computation of exact
distances between all node-pairs of a large graph, e.g., 10M nodes and up, is
prohibitively expensive both in computational time and storage space, distance
approximation is often used in place of exact computation. In this paper, we
present a novel and scalable distance oracle that leverages the hyperbolic core
of real-world large graphs for fast and scalable distance approximation. We
show empirically that the proposed oracle significantly outperforms prior
oracles on a random set of test cases drawn from public domain graph libraries.
There are two sets of prior work against which we benchmark our approach. The
first set, which often outperforms other oracles, employs embedding of the
graph into low dimensional Euclidean spaces with carefully constructed
hyperbolic distances, but provides no guarantees on the distance estimation
error. The second set leverages Gromov-type tree contraction of the graph with
the additive error guaranteed not to exceed $2\delta\log{n}$, where $\delta$ is
the hyperbolic constant of the graph. We show that our proposed oracle 1) is
significantly faster than those oracles that use hyperbolic embedding (first
set) with similar approximation error and, perhaps surprisingly, 2) exhibits
substantially lower average estimation error compared to Gromov-like tree
contractions (second set). We substantiate our claims through numerical
computations on a collection of a dozen real world networks and synthetic test
cases from multiple domains, ranging in size from 10s of thousand to 10s of
millions of nodes.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2014 02:05:34 GMT"
}
] | 2014-04-22T00:00:00 | [
[
"Ajwani",
"Deepak",
""
],
[
"Kennedy",
"W. Sean",
""
],
[
"Sala",
"Alessandra",
""
],
[
"Saniee",
"Iraj",
""
]
] | TITLE: A Geometric Distance Oracle for Large Real-World Graphs
ABSTRACT: Many graph processing algorithms require determination of shortest-path
distances between arbitrary numbers of node pairs. Since computation of exact
distances between all node-pairs of a large graph, e.g., 10M nodes and up, is
prohibitively expensive both in computational time and storage space, distance
approximation is often used in place of exact computation. In this paper, we
present a novel and scalable distance oracle that leverages the hyperbolic core
of real-world large graphs for fast and scalable distance approximation. We
show empirically that the proposed oracle significantly outperforms prior
oracles on a random set of test cases drawn from public domain graph libraries.
There are two sets of prior work against which we benchmark our approach. The
first set, which often outperforms other oracles, employs embedding of the
graph into low dimensional Euclidean spaces with carefully constructed
hyperbolic distances, but provides no guarantees on the distance estimation
error. The second set leverages Gromov-type tree contraction of the graph with
the additive error guaranteed not to exceed $2\delta\log{n}$, where $\delta$ is
the hyperbolic constant of the graph. We show that our proposed oracle 1) is
significantly faster than those oracles that use hyperbolic embedding (first
set) with similar approximation error and, perhaps surprisingly, 2) exhibits
substantially lower average estimation error compared to Gromov-like tree
contractions (second set). We substantiate our claims through numerical
computations on a collection of a dozen real world networks and synthetic test
cases from multiple domains, ranging in size from 10s of thousand to 10s of
millions of nodes.
|
1404.5214 | Ping Li | Anshumali Shrivastava and Ping Li | Graph Kernels via Functional Embedding | null | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a representation of graph as a functional object derived from the
power iteration of the underlying adjacency matrix. The proposed functional
representation is a graph invariant, i.e., the functional remains unchanged
under any reordering of the vertices. This property eliminates the difficulty
of handling exponentially many isomorphic forms. Bhattacharyya kernel
constructed between these functionals significantly outperforms the
state-of-the-art graph kernels on 3 out of the 4 standard benchmark graph
classification datasets, demonstrating the superiority of our approach. The
proposed methodology is simple and runs in time linear in the number of edges,
which makes our kernel more efficient and scalable compared to many widely
adopted graph kernels with running time cubic in the number of vertices.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2014 14:56:17 GMT"
}
] | 2014-04-22T00:00:00 | [
[
"Shrivastava",
"Anshumali",
""
],
[
"Li",
"Ping",
""
]
] | TITLE: Graph Kernels via Functional Embedding
ABSTRACT: We propose a representation of graph as a functional object derived from the
power iteration of the underlying adjacency matrix. The proposed functional
representation is a graph invariant, i.e., the functional remains unchanged
under any reordering of the vertices. This property eliminates the difficulty
of handling exponentially many isomorphic forms. Bhattacharyya kernel
constructed between these functionals significantly outperforms the
state-of-the-art graph kernels on 3 out of the 4 standard benchmark graph
classification datasets, demonstrating the superiority of our approach. The
proposed methodology is simple and runs in time linear in the number of edges,
which makes our kernel more efficient and scalable compared to many widely
adopted graph kernels with running time cubic in the number of vertices.
|
1404.4644 | Ping Li | Anshumali Shrivastava and Ping Li | A New Space for Comparing Graphs | null | null | null | null | stat.ME cs.IR cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finding a new mathematical representations for graph, which allows direct
comparison between different graph structures, is an open-ended research
direction. Having such a representation is the first prerequisite for a variety
of machine learning algorithms like classification, clustering, etc., over
graph datasets. In this paper, we propose a symmetric positive semidefinite
matrix with the $(i,j)$-{th} entry equal to the covariance between normalized
vectors $A^ie$ and $A^je$ ($e$ being vector of all ones) as a representation
for graph with adjacency matrix $A$. We show that the proposed matrix
representation encodes the spectrum of the underlying adjacency matrix and it
also contains information about the counts of small sub-structures present in
the graph such as triangles and small paths. In addition, we show that this
matrix is a \emph{"graph invariant"}. All these properties make the proposed
matrix a suitable object for representing graphs.
The representation, being a covariance matrix in a fixed dimensional metric
space, gives a mathematical embedding for graphs. This naturally leads to a
measure of similarity on graph objects. We define similarity between two given
graphs as a Bhattacharya similarity measure between their corresponding
covariance matrix representations. As shown in our experimental study on the
task of social network classification, such a similarity measure outperforms
other widely used state-of-the-art methodologies. Our proposed method is also
computationally efficient. The computation of both the matrix representation
and the similarity value can be performed in operations linear in the number of
edges. This makes our method scalable in practice.
We believe our theoretical and empirical results provide evidence for
studying truncated power iterations, of the adjacency matrix, to characterize
social networks.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2014 20:39:24 GMT"
}
] | 2014-04-21T00:00:00 | [
[
"Shrivastava",
"Anshumali",
""
],
[
"Li",
"Ping",
""
]
] | TITLE: A New Space for Comparing Graphs
ABSTRACT: Finding a new mathematical representations for graph, which allows direct
comparison between different graph structures, is an open-ended research
direction. Having such a representation is the first prerequisite for a variety
of machine learning algorithms like classification, clustering, etc., over
graph datasets. In this paper, we propose a symmetric positive semidefinite
matrix with the $(i,j)$-{th} entry equal to the covariance between normalized
vectors $A^ie$ and $A^je$ ($e$ being vector of all ones) as a representation
for graph with adjacency matrix $A$. We show that the proposed matrix
representation encodes the spectrum of the underlying adjacency matrix and it
also contains information about the counts of small sub-structures present in
the graph such as triangles and small paths. In addition, we show that this
matrix is a \emph{"graph invariant"}. All these properties make the proposed
matrix a suitable object for representing graphs.
The representation, being a covariance matrix in a fixed dimensional metric
space, gives a mathematical embedding for graphs. This naturally leads to a
measure of similarity on graph objects. We define similarity between two given
graphs as a Bhattacharya similarity measure between their corresponding
covariance matrix representations. As shown in our experimental study on the
task of social network classification, such a similarity measure outperforms
other widely used state-of-the-art methodologies. Our proposed method is also
computationally efficient. The computation of both the matrix representation
and the similarity value can be performed in operations linear in the number of
edges. This makes our method scalable in practice.
We believe our theoretical and empirical results provide evidence for
studying truncated power iterations, of the adjacency matrix, to characterize
social networks.
|
1404.4800 | Ayushi Sinha | Ayushi Sinha, William Gray Roncal, Narayanan Kasthuri, Ming Chuang,
Priya Manavalan, Dean M. Kleissas, Joshua T. Vogelstein, R. Jacob Vogelstein,
Randal Burns, Jeff W. Lichtman, Michael Kazhdan | Automatic Annotation of Axoplasmic Reticula in Pursuit of Connectomes | 2 pages, 1 figure | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a new pipeline which automatically identifies and
annotates axoplasmic reticula, which are small subcellular structures present
only in axons. We run our algorithm on the Kasthuri11 dataset, which was color
corrected using gradient-domain techniques to adjust contrast. We use a
bilateral filter to smooth out the noise in this data while preserving edges,
which highlights axoplasmic reticula. These axoplasmic reticula are then
annotated using a morphological region growing algorithm. Additionally, we
perform Laplacian sharpening on the bilaterally filtered data to enhance edges,
and repeat the morphological region growing algorithm to annotate more
axoplasmic reticula. We track our annotations through the slices to improve
precision, and to create long objects to aid in segment merging. This method
annotates axoplasmic reticula with high precision. Our algorithm can easily be
adapted to annotate axoplasmic reticula in different sets of brain data by
changing a few thresholds. The contribution of this work is the introduction of
a straightforward and robust pipeline which annotates axoplasmic reticula with
high precision, contributing towards advancements in automatic feature
annotations in neural EM data.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2014 20:09:37 GMT"
}
] | 2014-04-21T00:00:00 | [
[
"Sinha",
"Ayushi",
""
],
[
"Roncal",
"William Gray",
""
],
[
"Kasthuri",
"Narayanan",
""
],
[
"Chuang",
"Ming",
""
],
[
"Manavalan",
"Priya",
""
],
[
"Kleissas",
"Dean M.",
""
],
[
"Vogelstein",
"Joshua T.",
""
],
[
"Vogelstein",
"R. Jacob",
""
],
[
"Burns",
"Randal",
""
],
[
"Lichtman",
"Jeff W.",
""
],
[
"Kazhdan",
"Michael",
""
]
] | TITLE: Automatic Annotation of Axoplasmic Reticula in Pursuit of Connectomes
ABSTRACT: In this paper, we present a new pipeline which automatically identifies and
annotates axoplasmic reticula, which are small subcellular structures present
only in axons. We run our algorithm on the Kasthuri11 dataset, which was color
corrected using gradient-domain techniques to adjust contrast. We use a
bilateral filter to smooth out the noise in this data while preserving edges,
which highlights axoplasmic reticula. These axoplasmic reticula are then
annotated using a morphological region growing algorithm. Additionally, we
perform Laplacian sharpening on the bilaterally filtered data to enhance edges,
and repeat the morphological region growing algorithm to annotate more
axoplasmic reticula. We track our annotations through the slices to improve
precision, and to create long objects to aid in segment merging. This method
annotates axoplasmic reticula with high precision. Our algorithm can easily be
adapted to annotate axoplasmic reticula in different sets of brain data by
changing a few thresholds. The contribution of this work is the introduction of
a straightforward and robust pipeline which annotates axoplasmic reticula with
high precision, contributing towards advancements in automatic feature
annotations in neural EM data.
|
1404.4038 | Grigorios Tsoumakas | Christina Papagiannopoulou, Grigorios Tsoumakas, Ioannis Tsamardinos | Discovering and Exploiting Entailment Relationships in Multi-Label
Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work presents a sound probabilistic method for enforcing adherence of
the marginal probabilities of a multi-label model to automatically discovered
deterministic relationships among labels. In particular we focus on discovering
two kinds of relationships among the labels. The first one concerns pairwise
positive entailement: pairs of labels, where the presence of one implies the
presence of the other in all instances of a dataset. The second concerns
exclusion: sets of labels that do not coexist in the same instances of the
dataset. These relationships are represented with a Bayesian network. Marginal
probabilities are entered as soft evidence in the network and adjusted through
probabilistic inference. Our approach offers robust improvements in mean
average precision compared to the standard binary relavance approach across all
12 datasets involved in our experiments. The discovery process helps
interesting implicit knowledge to emerge, which could be useful in itself.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2014 19:47:15 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Apr 2014 16:05:57 GMT"
}
] | 2014-04-18T00:00:00 | [
[
"Papagiannopoulou",
"Christina",
""
],
[
"Tsoumakas",
"Grigorios",
""
],
[
"Tsamardinos",
"Ioannis",
""
]
] | TITLE: Discovering and Exploiting Entailment Relationships in Multi-Label
Learning
ABSTRACT: This work presents a sound probabilistic method for enforcing adherence of
the marginal probabilities of a multi-label model to automatically discovered
deterministic relationships among labels. In particular we focus on discovering
two kinds of relationships among the labels. The first one concerns pairwise
positive entailement: pairs of labels, where the presence of one implies the
presence of the other in all instances of a dataset. The second concerns
exclusion: sets of labels that do not coexist in the same instances of the
dataset. These relationships are represented with a Bayesian network. Marginal
probabilities are entered as soft evidence in the network and adjusted through
probabilistic inference. Our approach offers robust improvements in mean
average precision compared to the standard binary relavance approach across all
12 datasets involved in our experiments. The discovery process helps
interesting implicit knowledge to emerge, which could be useful in itself.
|
1311.2012 | Wei Yang | Wei Yang and Giuseppe Durisi and Tobias Koch and Yury Polyanskiy | Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength | To appear in the IEEE Transactions on Information Theory. The
conditions under which Theorem 9 holds are now milder | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the maximal achievable rate for a given blocklength
and error probability over quasi-static multiple-input multiple-output (MIMO)
fading channels, with and without channel state information (CSI) at the
transmitter and/or the receiver. The principal finding is that outage capacity,
despite being an asymptotic quantity, is a sharp proxy for the
finite-blocklength fundamental limits of slow-fading channels. Specifically,
the channel dispersion is shown to be zero regardless of whether the fading
realizations are available at both transmitter and receiver, at only one of
them, or at neither of them. These results follow from analytically tractable
converse and achievability bounds. Numerical evaluation of these bounds
verifies that zero dispersion may indeed imply fast convergence to the outage
capacity as the blocklength increases. In the example of a particular $1 \times
2$ single-input multiple-output (SIMO) Rician fading channel, the blocklength
required to achieve $90\%$ of capacity is about an order of magnitude smaller
compared to the blocklength required for an AWGN channel with the same
capacity. For this specific scenario, the coding/decoding schemes adopted in
the LTE-Advanced standard are benchmarked against the finite-blocklength
achievability and converse bounds.
| [
{
"version": "v1",
"created": "Fri, 8 Nov 2013 16:13:43 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Apr 2014 12:21:52 GMT"
}
] | 2014-04-17T00:00:00 | [
[
"Yang",
"Wei",
""
],
[
"Durisi",
"Giuseppe",
""
],
[
"Koch",
"Tobias",
""
],
[
"Polyanskiy",
"Yury",
""
]
] | TITLE: Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength
ABSTRACT: This paper investigates the maximal achievable rate for a given blocklength
and error probability over quasi-static multiple-input multiple-output (MIMO)
fading channels, with and without channel state information (CSI) at the
transmitter and/or the receiver. The principal finding is that outage capacity,
despite being an asymptotic quantity, is a sharp proxy for the
finite-blocklength fundamental limits of slow-fading channels. Specifically,
the channel dispersion is shown to be zero regardless of whether the fading
realizations are available at both transmitter and receiver, at only one of
them, or at neither of them. These results follow from analytically tractable
converse and achievability bounds. Numerical evaluation of these bounds
verifies that zero dispersion may indeed imply fast convergence to the outage
capacity as the blocklength increases. In the example of a particular $1 \times
2$ single-input multiple-output (SIMO) Rician fading channel, the blocklength
required to achieve $90\%$ of capacity is about an order of magnitude smaller
compared to the blocklength required for an AWGN channel with the same
capacity. For this specific scenario, the coding/decoding schemes adopted in
the LTE-Advanced standard are benchmarked against the finite-blocklength
achievability and converse bounds.
|
1403.4640 | Nabeel Gillani | Nabeel Gillani, Rebecca Eynon, Michael Osborne, Isis Hjorth, Stephen
Roberts | Communication Communities in MOOCs | 10 pages, 3 figures, 1 table. Submitted for review to UAI 2014 | null | null | null | cs.CY cs.SI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Massive Open Online Courses (MOOCs) bring together thousands of people from
different geographies and demographic backgrounds -- but to date, little is
known about how they learn or communicate. We introduce a new content-analysed
MOOC dataset and use Bayesian Non-negative Matrix Factorization (BNMF) to
extract communities of learners based on the nature of their online forum
posts. We see that BNMF yields a superior probabilistic generative model for
online discussions when compared to other models, and that the communities it
learns are differentiated by their composite students' demographic and course
performance indicators. These findings suggest that computationally efficient
probabilistic generative modelling of MOOCs can reveal important insights for
educational researchers and practitioners and help to develop more intelligent
and responsive online learning environments.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2014 22:57:24 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Apr 2014 15:50:48 GMT"
}
] | 2014-04-17T00:00:00 | [
[
"Gillani",
"Nabeel",
""
],
[
"Eynon",
"Rebecca",
""
],
[
"Osborne",
"Michael",
""
],
[
"Hjorth",
"Isis",
""
],
[
"Roberts",
"Stephen",
""
]
] | TITLE: Communication Communities in MOOCs
ABSTRACT: Massive Open Online Courses (MOOCs) bring together thousands of people from
different geographies and demographic backgrounds -- but to date, little is
known about how they learn or communicate. We introduce a new content-analysed
MOOC dataset and use Bayesian Non-negative Matrix Factorization (BNMF) to
extract communities of learners based on the nature of their online forum
posts. We see that BNMF yields a superior probabilistic generative model for
online discussions when compared to other models, and that the communities it
learns are differentiated by their composite students' demographic and course
performance indicators. These findings suggest that computationally efficient
probabilistic generative modelling of MOOCs can reveal important insights for
educational researchers and practitioners and help to develop more intelligent
and responsive online learning environments.
|
1404.1377 | Zheng Wang | Zheng Wang, Ming-Jun Lai, Zhaosong Lu, Wei Fan, Hasan Davulcu and
Jieping Ye | Orthogonal Rank-One Matrix Pursuit for Low Rank Matrix Completion | null | null | null | null | cs.LG math.NA stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose an efficient and scalable low rank matrix
completion algorithm. The key idea is to extend orthogonal matching pursuit
method from the vector case to the matrix case. We further propose an economic
version of our algorithm by introducing a novel weight updating rule to reduce
the time and storage complexity. Both versions are computationally inexpensive
for each matrix pursuit iteration, and find satisfactory results in a few
iterations. Another advantage of our proposed algorithm is that it has only one
tunable parameter, which is the rank. It is easy to understand and to use by
the user. This becomes especially important in large-scale learning problems.
In addition, we rigorously show that both versions achieve a linear convergence
rate, which is significantly better than the previous known results. We also
empirically compare the proposed algorithms with several state-of-the-art
matrix completion algorithms on many real-world datasets, including the
large-scale recommendation dataset Netflix as well as the MovieLens datasets.
Numerical results show that our proposed algorithm is more efficient than
competing algorithms while achieving similar or better prediction performance.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2014 20:00:30 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Apr 2014 19:09:09 GMT"
}
] | 2014-04-17T00:00:00 | [
[
"Wang",
"Zheng",
""
],
[
"Lai",
"Ming-Jun",
""
],
[
"Lu",
"Zhaosong",
""
],
[
"Fan",
"Wei",
""
],
[
"Davulcu",
"Hasan",
""
],
[
"Ye",
"Jieping",
""
]
] | TITLE: Orthogonal Rank-One Matrix Pursuit for Low Rank Matrix Completion
ABSTRACT: In this paper, we propose an efficient and scalable low rank matrix
completion algorithm. The key idea is to extend orthogonal matching pursuit
method from the vector case to the matrix case. We further propose an economic
version of our algorithm by introducing a novel weight updating rule to reduce
the time and storage complexity. Both versions are computationally inexpensive
for each matrix pursuit iteration, and find satisfactory results in a few
iterations. Another advantage of our proposed algorithm is that it has only one
tunable parameter, which is the rank. It is easy to understand and to use by
the user. This becomes especially important in large-scale learning problems.
In addition, we rigorously show that both versions achieve a linear convergence
rate, which is significantly better than the previous known results. We also
empirically compare the proposed algorithms with several state-of-the-art
matrix completion algorithms on many real-world datasets, including the
large-scale recommendation dataset Netflix as well as the MovieLens datasets.
Numerical results show that our proposed algorithm is more efficient than
competing algorithms while achieving similar or better prediction performance.
|
1404.3543 | Ping Luo | Zhenyao Zhu and Ping Luo and Xiaogang Wang and Xiaoou Tang | Recover Canonical-View Faces in the Wild with Deep Neural Networks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Face images in the wild undergo large intra-personal variations, such as
poses, illuminations, occlusions, and low resolutions, which cause great
challenges to face-related applications. This paper addresses this challenge by
proposing a new deep learning framework that can recover the canonical view of
face images. It dramatically reduces the intra-person variances, while
maintaining the inter-person discriminativeness. Unlike the existing face
reconstruction methods that were either evaluated in controlled 2D environment
or employed 3D information, our approach directly learns the transformation
from the face images with a complex set of variations to their canonical views.
At the training stage, to avoid the costly process of labeling canonical-view
images from the training set by hand, we have devised a new measurement to
automatically select or synthesize a canonical-view image for each identity. As
an application, this face recovery approach is used for face verification.
Facial features are learned from the recovered canonical-view face images by
using a facial component-based convolutional neural network. Our approach
achieves the state-of-the-art performance on the LFW dataset.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2014 11:32:17 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Apr 2014 04:35:34 GMT"
}
] | 2014-04-17T00:00:00 | [
[
"Zhu",
"Zhenyao",
""
],
[
"Luo",
"Ping",
""
],
[
"Wang",
"Xiaogang",
""
],
[
"Tang",
"Xiaoou",
""
]
] | TITLE: Recover Canonical-View Faces in the Wild with Deep Neural Networks
ABSTRACT: Face images in the wild undergo large intra-personal variations, such as
poses, illuminations, occlusions, and low resolutions, which cause great
challenges to face-related applications. This paper addresses this challenge by
proposing a new deep learning framework that can recover the canonical view of
face images. It dramatically reduces the intra-person variances, while
maintaining the inter-person discriminativeness. Unlike the existing face
reconstruction methods that were either evaluated in controlled 2D environment
or employed 3D information, our approach directly learns the transformation
from the face images with a complex set of variations to their canonical views.
At the training stage, to avoid the costly process of labeling canonical-view
images from the training set by hand, we have devised a new measurement to
automatically select or synthesize a canonical-view image for each identity. As
an application, this face recovery approach is used for face verification.
Facial features are learned from the recovered canonical-view face images by
using a facial component-based convolutional neural network. Our approach
achieves the state-of-the-art performance on the LFW dataset.
|
1404.4171 | Ning Chen | Ning Chen, Jun Zhu, Jianfei Chen, Bo Zhang | Dropout Training for Support Vector Machines | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dropout and other feature noising schemes have shown promising results in
controlling over-fitting by artificially corrupting the training data. Though
extensive theoretical and empirical studies have been performed for generalized
linear models, little work has been done for support vector machines (SVMs),
one of the most successful approaches for supervised learning. This paper
presents dropout training for linear SVMs. To deal with the intractable
expectation of the non-smooth hinge loss under corrupting distributions, we
develop an iteratively re-weighted least square (IRLS) algorithm by exploring
data augmentation techniques. Our algorithm iteratively minimizes the
expectation of a re-weighted least square problem, where the re-weights have
closed-form solutions. The similar ideas are applied to develop a new IRLS
algorithm for the expected logistic loss under corrupting distributions. Our
algorithms offer insights on the connection and difference between the hinge
loss and logistic loss in dropout training. Empirical results on several real
datasets demonstrate the effectiveness of dropout training on significantly
boosting the classification accuracy of linear SVMs.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2014 08:54:01 GMT"
}
] | 2014-04-17T00:00:00 | [
[
"Chen",
"Ning",
""
],
[
"Zhu",
"Jun",
""
],
[
"Chen",
"Jianfei",
""
],
[
"Zhang",
"Bo",
""
]
] | TITLE: Dropout Training for Support Vector Machines
ABSTRACT: Dropout and other feature noising schemes have shown promising results in
controlling over-fitting by artificially corrupting the training data. Though
extensive theoretical and empirical studies have been performed for generalized
linear models, little work has been done for support vector machines (SVMs),
one of the most successful approaches for supervised learning. This paper
presents dropout training for linear SVMs. To deal with the intractable
expectation of the non-smooth hinge loss under corrupting distributions, we
develop an iteratively re-weighted least square (IRLS) algorithm by exploring
data augmentation techniques. Our algorithm iteratively minimizes the
expectation of a re-weighted least square problem, where the re-weights have
closed-form solutions. The similar ideas are applied to develop a new IRLS
algorithm for the expected logistic loss under corrupting distributions. Our
algorithms offer insights on the connection and difference between the hinge
loss and logistic loss in dropout training. Empirical results on several real
datasets demonstrate the effectiveness of dropout training on significantly
boosting the classification accuracy of linear SVMs.
|
1404.4175 | Emanuele Olivetti | Emanuele Olivetti, Seyed Mostafa Kia, Paolo Avesani | MEG Decoding Across Subjects | null | null | null | null | stat.ML cs.LG q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Brain decoding is a data analysis paradigm for neuroimaging experiments that
is based on predicting the stimulus presented to the subject from the
concurrent brain activity. In order to make inference at the group level, a
straightforward but sometimes unsuccessful approach is to train a classifier on
the trials of a group of subjects and then to test it on unseen trials from new
subjects. The extreme difficulty is related to the structural and functional
variability across the subjects. We call this approach "decoding across
subjects". In this work, we address the problem of decoding across subjects for
magnetoencephalographic (MEG) experiments and we provide the following
contributions: first, we formally describe the problem and show that it belongs
to a machine learning sub-field called transductive transfer learning (TTL).
Second, we propose to use a simple TTL technique that accounts for the
differences between train data and test data. Third, we propose the use of
ensemble learning, and specifically of stacked generalization, to address the
variability across subjects within train data, with the aim of producing more
stable classifiers. On a face vs. scramble task MEG dataset of 16 subjects, we
compare the standard approach of not modelling the differences across subjects,
to the proposed one of combining TTL and ensemble learning. We show that the
proposed approach is consistently more accurate than the standard one.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2014 09:21:26 GMT"
}
] | 2014-04-17T00:00:00 | [
[
"Olivetti",
"Emanuele",
""
],
[
"Kia",
"Seyed Mostafa",
""
],
[
"Avesani",
"Paolo",
""
]
] | TITLE: MEG Decoding Across Subjects
ABSTRACT: Brain decoding is a data analysis paradigm for neuroimaging experiments that
is based on predicting the stimulus presented to the subject from the
concurrent brain activity. In order to make inference at the group level, a
straightforward but sometimes unsuccessful approach is to train a classifier on
the trials of a group of subjects and then to test it on unseen trials from new
subjects. The extreme difficulty is related to the structural and functional
variability across the subjects. We call this approach "decoding across
subjects". In this work, we address the problem of decoding across subjects for
magnetoencephalographic (MEG) experiments and we provide the following
contributions: first, we formally describe the problem and show that it belongs
to a machine learning sub-field called transductive transfer learning (TTL).
Second, we propose to use a simple TTL technique that accounts for the
differences between train data and test data. Third, we propose the use of
ensemble learning, and specifically of stacked generalization, to address the
variability across subjects within train data, with the aim of producing more
stable classifiers. On a face vs. scramble task MEG dataset of 16 subjects, we
compare the standard approach of not modelling the differences across subjects,
to the proposed one of combining TTL and ensemble learning. We show that the
proposed approach is consistently more accurate than the standard one.
|
1404.4316 | Xiaoyu Wang | Will Y. Zou, Xiaoyu Wang, Miao Sun, Yuanqing Lin | Generic Object Detection With Dense Neural Patterns and Regionlets | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the challenge of establishing a bridge between deep
convolutional neural networks and conventional object detection frameworks for
accurate and efficient generic object detection. We introduce Dense Neural
Patterns, short for DNPs, which are dense local features derived from
discriminatively trained deep convolutional neural networks. DNPs can be easily
plugged into conventional detection frameworks in the same way as other dense
local features(like HOG or LBP). The effectiveness of the proposed approach is
demonstrated with the Regionlets object detection framework. It achieved 46.1%
mean average precision on the PASCAL VOC 2007 dataset, and 44.1% on the PASCAL
VOC 2010 dataset, which dramatically improves the original Regionlets approach
without DNPs.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2014 17:23:47 GMT"
}
] | 2014-04-17T00:00:00 | [
[
"Zou",
"Will Y.",
""
],
[
"Wang",
"Xiaoyu",
""
],
[
"Sun",
"Miao",
""
],
[
"Lin",
"Yuanqing",
""
]
] | TITLE: Generic Object Detection With Dense Neural Patterns and Regionlets
ABSTRACT: This paper addresses the challenge of establishing a bridge between deep
convolutional neural networks and conventional object detection frameworks for
accurate and efficient generic object detection. We introduce Dense Neural
Patterns, short for DNPs, which are dense local features derived from
discriminatively trained deep convolutional neural networks. DNPs can be easily
plugged into conventional detection frameworks in the same way as other dense
local features(like HOG or LBP). The effectiveness of the proposed approach is
demonstrated with the Regionlets object detection framework. It achieved 46.1%
mean average precision on the PASCAL VOC 2007 dataset, and 44.1% on the PASCAL
VOC 2010 dataset, which dramatically improves the original Regionlets approach
without DNPs.
|
1404.4351 | Navodit Misra | Navodit Misra and Ercan E. Kuruoglu | Stable Graphical Models | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stable random variables are motivated by the central limit theorem for
densities with (potentially) unbounded variance and can be thought of as
natural generalizations of the Gaussian distribution to skewed and heavy-tailed
phenomenon. In this paper, we introduce stable graphical (SG) models, a class
of multivariate stable densities that can also be represented as Bayesian
networks whose edges encode linear dependencies between random variables. One
major hurdle to the extensive use of stable distributions is the lack of a
closed-form analytical expression for their densities. This makes penalized
maximum-likelihood based learning computationally demanding. We establish
theoretically that the Bayesian information criterion (BIC) can asymptotically
be reduced to the computationally more tractable minimum dispersion criterion
(MDC) and develop StabLe, a structure learning algorithm based on MDC. We use
simulated datasets for five benchmark network topologies to empirically
demonstrate how StabLe improves upon ordinary least squares (OLS) regression.
We also apply StabLe to microarray gene expression data for lymphoblastoid
cells from 727 individuals belonging to eight global population groups. We
establish that StabLe improves test set performance relative to OLS via
ten-fold cross-validation. Finally, we develop SGEX, a method for quantifying
differential expression of genes between different population groups.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2014 19:12:47 GMT"
}
] | 2014-04-17T00:00:00 | [
[
"Misra",
"Navodit",
""
],
[
"Kuruoglu",
"Ercan E.",
""
]
] | TITLE: Stable Graphical Models
ABSTRACT: Stable random variables are motivated by the central limit theorem for
densities with (potentially) unbounded variance and can be thought of as
natural generalizations of the Gaussian distribution to skewed and heavy-tailed
phenomenon. In this paper, we introduce stable graphical (SG) models, a class
of multivariate stable densities that can also be represented as Bayesian
networks whose edges encode linear dependencies between random variables. One
major hurdle to the extensive use of stable distributions is the lack of a
closed-form analytical expression for their densities. This makes penalized
maximum-likelihood based learning computationally demanding. We establish
theoretically that the Bayesian information criterion (BIC) can asymptotically
be reduced to the computationally more tractable minimum dispersion criterion
(MDC) and develop StabLe, a structure learning algorithm based on MDC. We use
simulated datasets for five benchmark network topologies to empirically
demonstrate how StabLe improves upon ordinary least squares (OLS) regression.
We also apply StabLe to microarray gene expression data for lymphoblastoid
cells from 727 individuals belonging to eight global population groups. We
establish that StabLe improves test set performance relative to OLS via
ten-fold cross-validation. Finally, we develop SGEX, a method for quantifying
differential expression of genes between different population groups.
|
1302.6309 | Neil Zhenqiang Gong | Neil Zhenqiang Gong and Wenchang Xu | Reciprocal versus Parasocial Relationships in Online Social Networks | Social Network Analysis and Mining, Springer, 2014 | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many online social networks are fundamentally directed, i.e., they consist of
both reciprocal edges (i.e., edges that have already been linked back) and
parasocial edges (i.e., edges that haven't been linked back). Thus,
understanding the structures and evolutions of reciprocal edges and parasocial
ones, exploring the factors that influence parasocial edges to become
reciprocal ones, and predicting whether a parasocial edge will turn into a
reciprocal one are basic research problems.
However, there have been few systematic studies about such problems. In this
paper, we bridge this gap using a novel large-scale Google+ dataset crawled by
ourselves as well as one publicly available social network dataset. First, we
compare the structures and evolutions of reciprocal edges and those of
parasocial edges. For instance, we find that reciprocal edges are more likely
to connect users with similar degrees while parasocial edges are more likely to
link ordinary users (e.g., users with low degrees) and popular users (e.g.,
celebrities). However, the impacts of reciprocal edges linking ordinary and
popular users on the network structures increase slowly as the social networks
evolve. Second, we observe that factors including user behaviors, node
attributes, and edge attributes all have significant impacts on the formation
of reciprocal edges. Third, in contrast to previous studies that treat
reciprocal edge prediction as either a supervised or a semi-supervised learning
problem, we identify that reciprocal edge prediction is better modeled as an
outlier detection problem. Finally, we perform extensive evaluations with the
two datasets, and we show that our proposal outperforms previous reciprocal
edge prediction approaches.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2013 04:18:21 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Dec 2013 14:31:22 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Mar 2014 03:06:02 GMT"
},
{
"version": "v4",
"created": "Tue, 15 Apr 2014 03:38:46 GMT"
}
] | 2014-04-16T00:00:00 | [
[
"Gong",
"Neil Zhenqiang",
""
],
[
"Xu",
"Wenchang",
""
]
] | TITLE: Reciprocal versus Parasocial Relationships in Online Social Networks
ABSTRACT: Many online social networks are fundamentally directed, i.e., they consist of
both reciprocal edges (i.e., edges that have already been linked back) and
parasocial edges (i.e., edges that haven't been linked back). Thus,
understanding the structures and evolutions of reciprocal edges and parasocial
ones, exploring the factors that influence parasocial edges to become
reciprocal ones, and predicting whether a parasocial edge will turn into a
reciprocal one are basic research problems.
However, there have been few systematic studies about such problems. In this
paper, we bridge this gap using a novel large-scale Google+ dataset crawled by
ourselves as well as one publicly available social network dataset. First, we
compare the structures and evolutions of reciprocal edges and those of
parasocial edges. For instance, we find that reciprocal edges are more likely
to connect users with similar degrees while parasocial edges are more likely to
link ordinary users (e.g., users with low degrees) and popular users (e.g.,
celebrities). However, the impacts of reciprocal edges linking ordinary and
popular users on the network structures increase slowly as the social networks
evolve. Second, we observe that factors including user behaviors, node
attributes, and edge attributes all have significant impacts on the formation
of reciprocal edges. Third, in contrast to previous studies that treat
reciprocal edge prediction as either a supervised or a semi-supervised learning
problem, we identify that reciprocal edge prediction is better modeled as an
outlier detection problem. Finally, we perform extensive evaluations with the
two datasets, and we show that our proposal outperforms previous reciprocal
edge prediction approaches.
|
1404.3759 | Bogdan Babych | Bogdan Babych and Anthony Hartley | Meta-evaluation of comparability metrics using parallel corpora | 10 pages, 3 figures, 12th International Conference on Intelligent
Text Processing and Computational Linguistics CICLing 2011. February 20 to
26, 2011, Tokyo, Japan. International Journal of Computational Linguistics
and Applications, Proceedings volume of CICLing-2011 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metrics for measuring the comparability of corpora or texts need to be
developed and evaluated systematically. Applications based on a corpus, such as
training Statistical MT systems in specialised narrow domains, require finding
a reasonable balance between the size of the corpus and its consistency, with
controlled and benchmarked levels of comparability for any newly added
sections. In this article we propose a method that can meta-evaluate
comparability metrics by calculating monolingual comparability scores
separately on the 'source' and 'target' sides of parallel corpora. The range of
scores on the source side is then correlated (using Pearson's r coefficient)
with the range of 'target' scores; the higher the correlation - the more
reliable is the metric. The intuition is that a good metric should yield the
same distance between different domains in different languages. Our method
gives consistent results for the same metrics on different data sets, which
indicates that it is reliable and can be used for metric comparison or for
optimising settings of parametrised metrics.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2014 21:33:42 GMT"
}
] | 2014-04-16T00:00:00 | [
[
"Babych",
"Bogdan",
""
],
[
"Hartley",
"Anthony",
""
]
] | TITLE: Meta-evaluation of comparability metrics using parallel corpora
ABSTRACT: Metrics for measuring the comparability of corpora or texts need to be
developed and evaluated systematically. Applications based on a corpus, such as
training Statistical MT systems in specialised narrow domains, require finding
a reasonable balance between the size of the corpus and its consistency, with
controlled and benchmarked levels of comparability for any newly added
sections. In this article we propose a method that can meta-evaluate
comparability metrics by calculating monolingual comparability scores
separately on the 'source' and 'target' sides of parallel corpora. The range of
scores on the source side is then correlated (using Pearson's r coefficient)
with the range of 'target' scores; the higher the correlation - the more
reliable is the metric. The intuition is that a good metric should yield the
same distance between different domains in different languages. Our method
gives consistent results for the same metrics on different data sets, which
indicates that it is reliable and can be used for metric comparison or for
optimising settings of parametrised metrics.
|
1404.3881 | Hamid Ramezani | Hamid Ramezani, Fatemeh Fazel, Milica Stojanovic, and Geert Leus | Collision Tolerant Packet Scheduling for Underwater Acoustic
Localization | null | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article considers the joint problem of packet scheduling and
self-localization in an underwater acoustic sensor network where sensor nodes
are distributed randomly in an operating area. In terms of packet scheduling,
our goal is to minimize the localization time, and to do so we consider two
packet transmission schemes, namely a collision-free scheme (CFS), and a
collision-tolerant scheme (CTS). The required localization time is formulated
for these schemes, and through analytical results and numerical examples their
performances are shown to be generally comparable. However, when the packet
duration is short (as is the case for a localization packet), and the operating
area is large (above 3km in at least one dimension), the collision-tolerant
scheme requires a smaller localization time than the collision-free scheme.
After gathering enough measurements, an iterative Gauss-Newton algorithm is
employed by each sensor node for self-localization, and the Cramer Rao lower
bound is evaluated as a benchmark. Although CTS consumes more energy for packet
transmission, it provides a better localization accuracy. Additionally, in this
scheme the anchor nodes work independently of each other, and can operate
asynchronously which leads to a simplified implementation.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2014 11:59:03 GMT"
}
] | 2014-04-16T00:00:00 | [
[
"Ramezani",
"Hamid",
""
],
[
"Fazel",
"Fatemeh",
""
],
[
"Stojanovic",
"Milica",
""
],
[
"Leus",
"Geert",
""
]
] | TITLE: Collision Tolerant Packet Scheduling for Underwater Acoustic
Localization
ABSTRACT: This article considers the joint problem of packet scheduling and
self-localization in an underwater acoustic sensor network where sensor nodes
are distributed randomly in an operating area. In terms of packet scheduling,
our goal is to minimize the localization time, and to do so we consider two
packet transmission schemes, namely a collision-free scheme (CFS), and a
collision-tolerant scheme (CTS). The required localization time is formulated
for these schemes, and through analytical results and numerical examples their
performances are shown to be generally comparable. However, when the packet
duration is short (as is the case for a localization packet), and the operating
area is large (above 3km in at least one dimension), the collision-tolerant
scheme requires a smaller localization time than the collision-free scheme.
After gathering enough measurements, an iterative Gauss-Newton algorithm is
employed by each sensor node for self-localization, and the Cramer Rao lower
bound is evaluated as a benchmark. Although CTS consumes more energy for packet
transmission, it provides a better localization accuracy. Additionally, in this
scheme the anchor nodes work independently of each other, and can operate
asynchronously which leads to a simplified implementation.
|
1310.8478 | Pier Stanislao Paolucci | Pier Stanislao Paolucci, Roberto Ammendola, Andrea Biagioni, Ottorino
Frezza, Francesca Lo Cicero, Alessandro Lonardo, Elena Pastorelli, Francesco
Simula, Laura Tosoratto, Piero Vicini | Distributed simulation of polychronous and plastic spiking neural
networks: strong and weak scaling of a representative mini-application
benchmark executed on a small-scale commodity cluster | Added detailed profiling of computational and communication
components. Improved speed and size of simulated networks. 15 pages, 5
figures, 3 tables | null | null | null | cs.DC q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a natively distributed mini-application benchmark representative
of plastic spiking neural network simulators. It can be used to measure
performances of existing computing platforms and to drive the development of
future parallel/distributed computing systems dedicated to the simulation of
plastic spiking networks. The mini-application is designed to generate spiking
behaviors and synaptic connectivity that do not change when the number of
hardware processing nodes is varied, simplifying the quantitative study of
scalability on commodity and custom architectures. Here, we present the strong
and weak scaling and the profiling of the computational/communication
components of the DPSNN-STDP benchmark (Distributed Simulation of Polychronous
Spiking Neural Network with synaptic Spike-Timing Dependent Plasticity). In
this first test, we used the benchmark to exercise a small-scale cluster of
commodity processors (varying the number of used physical cores from 1 to 128).
The cluster was interconnected through a commodity network. Bidimensional grids
of columns composed of Izhikevich neurons projected synapses locally and toward
first, second and third neighboring columns. The size of the simulated network
varied from 6.6 Giga synapses down to 200 K synapses. The code demonstrated to
be fast and scalable: 10 wall clock seconds were required to simulate one
second of activity and plasticity (per Hertz of average firing rate) of a
network composed by 3.2 G synapses running on 128 hardware cores clocked @ 2.4
GHz. The mini-application has been designed to be easily interfaced with
standard and custom software and hardware communication interfaces. It has been
designed from its foundation to be natively distributed and parallel, and
should not pose major obstacles against distribution and parallelization on
several platforms.
| [
{
"version": "v1",
"created": "Thu, 31 Oct 2013 12:44:20 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2014 14:01:42 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Paolucci",
"Pier Stanislao",
""
],
[
"Ammendola",
"Roberto",
""
],
[
"Biagioni",
"Andrea",
""
],
[
"Frezza",
"Ottorino",
""
],
[
"Cicero",
"Francesca Lo",
""
],
[
"Lonardo",
"Alessandro",
""
],
[
"Pastorelli",
"Elena",
""
],
[
"Simula",
"Francesco",
""
],
[
"Tosoratto",
"Laura",
""
],
[
"Vicini",
"Piero",
""
]
] | TITLE: Distributed simulation of polychronous and plastic spiking neural
networks: strong and weak scaling of a representative mini-application
benchmark executed on a small-scale commodity cluster
ABSTRACT: We introduce a natively distributed mini-application benchmark representative
of plastic spiking neural network simulators. It can be used to measure
performances of existing computing platforms and to drive the development of
future parallel/distributed computing systems dedicated to the simulation of
plastic spiking networks. The mini-application is designed to generate spiking
behaviors and synaptic connectivity that do not change when the number of
hardware processing nodes is varied, simplifying the quantitative study of
scalability on commodity and custom architectures. Here, we present the strong
and weak scaling and the profiling of the computational/communication
components of the DPSNN-STDP benchmark (Distributed Simulation of Polychronous
Spiking Neural Network with synaptic Spike-Timing Dependent Plasticity). In
this first test, we used the benchmark to exercise a small-scale cluster of
commodity processors (varying the number of used physical cores from 1 to 128).
The cluster was interconnected through a commodity network. Bidimensional grids
of columns composed of Izhikevich neurons projected synapses locally and toward
first, second and third neighboring columns. The size of the simulated network
varied from 6.6 Giga synapses down to 200 K synapses. The code demonstrated to
be fast and scalable: 10 wall clock seconds were required to simulate one
second of activity and plasticity (per Hertz of average firing rate) of a
network composed by 3.2 G synapses running on 128 hardware cores clocked @ 2.4
GHz. The mini-application has been designed to be easily interfaced with
standard and custom software and hardware communication interfaces. It has been
designed from its foundation to be natively distributed and parallel, and
should not pose major obstacles against distribution and parallelization on
several platforms.
|
1312.4894 | Yangqing Jia | Yunchao Gong, Yangqing Jia, Thomas Leung, Alexander Toshev, Sergey
Ioffe | Deep Convolutional Ranking for Multilabel Image Annotation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multilabel image annotation is one of the most important challenges in
computer vision with many real-world applications. While existing work usually
use conventional visual features for multilabel annotation, features based on
Deep Neural Networks have shown potential to significantly boost performance.
In this work, we propose to leverage the advantage of such features and analyze
key components that lead to better performances. Specifically, we show that a
significant performance gain could be obtained by combining convolutional
architectures with approximate top-$k$ ranking objectives, as thye naturally
fit the multilabel tagging problem. Our experiments on the NUS-WIDE dataset
outperforms the conventional visual features by about 10%, obtaining the best
reported performance in the literature.
| [
{
"version": "v1",
"created": "Tue, 17 Dec 2013 19:00:50 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2014 19:21:13 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Gong",
"Yunchao",
""
],
[
"Jia",
"Yangqing",
""
],
[
"Leung",
"Thomas",
""
],
[
"Toshev",
"Alexander",
""
],
[
"Ioffe",
"Sergey",
""
]
] | TITLE: Deep Convolutional Ranking for Multilabel Image Annotation
ABSTRACT: Multilabel image annotation is one of the most important challenges in
computer vision with many real-world applications. While existing work usually
use conventional visual features for multilabel annotation, features based on
Deep Neural Networks have shown potential to significantly boost performance.
In this work, we propose to leverage the advantage of such features and analyze
key components that lead to better performances. Specifically, we show that a
significant performance gain could be obtained by combining convolutional
architectures with approximate top-$k$ ranking objectives, as thye naturally
fit the multilabel tagging problem. Our experiments on the NUS-WIDE dataset
outperforms the conventional visual features by about 10%, obtaining the best
reported performance in the literature.
|
1312.6082 | Julian Ibarz | Ian J. Goodfellow, Yaroslav Bulatov, Julian Ibarz, Sacha Arnoud, Vinay
Shet | Multi-digit Number Recognition from Street View Imagery using Deep
Convolutional Neural Networks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recognizing arbitrary multi-character text in unconstrained natural
photographs is a hard problem. In this paper, we address an equally hard
sub-problem in this domain viz. recognizing arbitrary multi-digit numbers from
Street View imagery. Traditional approaches to solve this problem typically
separate out the localization, segmentation, and recognition steps. In this
paper we propose a unified approach that integrates these three steps via the
use of a deep convolutional neural network that operates directly on the image
pixels. We employ the DistBelief implementation of deep neural networks in
order to train large, distributed neural networks on high quality images. We
find that the performance of this approach increases with the depth of the
convolutional network, with the best performance occurring in the deepest
architecture we trained, with eleven hidden layers. We evaluate this approach
on the publicly available SVHN dataset and achieve over $96\%$ accuracy in
recognizing complete street numbers. We show that on a per-digit recognition
task, we improve upon the state-of-the-art, achieving $97.84\%$ accuracy. We
also evaluate this approach on an even more challenging dataset generated from
Street View imagery containing several tens of millions of street number
annotations and achieve over $90\%$ accuracy. To further explore the
applicability of the proposed system to broader text recognition tasks, we
apply it to synthetic distorted text from reCAPTCHA. reCAPTCHA is one of the
most secure reverse turing tests that uses distorted text to distinguish humans
from bots. We report a $99.8\%$ accuracy on the hardest category of reCAPTCHA.
Our evaluations on both tasks indicate that at specific operating thresholds,
the performance of the proposed system is comparable to, and in some cases
exceeds, that of human operators.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 19:25:44 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Jan 2014 14:29:59 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Mar 2014 22:40:47 GMT"
},
{
"version": "v4",
"created": "Mon, 14 Apr 2014 05:25:54 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Goodfellow",
"Ian J.",
""
],
[
"Bulatov",
"Yaroslav",
""
],
[
"Ibarz",
"Julian",
""
],
[
"Arnoud",
"Sacha",
""
],
[
"Shet",
"Vinay",
""
]
] | TITLE: Multi-digit Number Recognition from Street View Imagery using Deep
Convolutional Neural Networks
ABSTRACT: Recognizing arbitrary multi-character text in unconstrained natural
photographs is a hard problem. In this paper, we address an equally hard
sub-problem in this domain viz. recognizing arbitrary multi-digit numbers from
Street View imagery. Traditional approaches to solve this problem typically
separate out the localization, segmentation, and recognition steps. In this
paper we propose a unified approach that integrates these three steps via the
use of a deep convolutional neural network that operates directly on the image
pixels. We employ the DistBelief implementation of deep neural networks in
order to train large, distributed neural networks on high quality images. We
find that the performance of this approach increases with the depth of the
convolutional network, with the best performance occurring in the deepest
architecture we trained, with eleven hidden layers. We evaluate this approach
on the publicly available SVHN dataset and achieve over $96\%$ accuracy in
recognizing complete street numbers. We show that on a per-digit recognition
task, we improve upon the state-of-the-art, achieving $97.84\%$ accuracy. We
also evaluate this approach on an even more challenging dataset generated from
Street View imagery containing several tens of millions of street number
annotations and achieve over $90\%$ accuracy. To further explore the
applicability of the proposed system to broader text recognition tasks, we
apply it to synthetic distorted text from reCAPTCHA. reCAPTCHA is one of the
most secure reverse turing tests that uses distorted text to distinguish humans
from bots. We report a $99.8\%$ accuracy on the hardest category of reCAPTCHA.
Our evaluations on both tasks indicate that at specific operating thresholds,
the performance of the proposed system is comparable to, and in some cases
exceeds, that of human operators.
|
1401.0355 | Liya Fan | Liya Fan, Bo Gao, Xi Sun, Fa Zhang and Zhiyong Liu | Improving the Load Balance of MapReduce Operations based on the Key
Distribution of Pairs | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Load balance is important for MapReduce to reduce job duration, increase
parallel efficiency, etc. Previous work focuses on coarse-grained scheduling.
This study concerns fine-grained scheduling on MapReduce operations. Each
operation represents one invocation of the Map or Reduce function. Scheduling
MapReduce operations is difficult due to highly screwed operation loads, no
support to collect workload statistics, and high complexity of the scheduling
problem. So current implementations adopt simple strategies, leading to poor
load balance. To address these difficulties, we design an algorithm to schedule
operations based on the key distribution of intermediate pairs. The algorithm
involves a sub-program for selecting operations for task slots, and we name it
the Balanced Subset Sum (BSS) problem. We discuss properties of BSS and design
exact and approximation algorithms for it. To transparently incorporate these
algorithms into MapReduce, we design a communication mechanism to collect
statistics, and a pipeline within Reduce tasks to increase resource
utilization. To the best of our knowledge, this is the first work on scheduling
MapReduce workload at this fine-grained level. Experiments on PUMA [T+12]
benchmarks show consistent performance improvement. The job duration can be
reduced by up to 37%, compared with standard MapReduce.
| [
{
"version": "v1",
"created": "Thu, 2 Jan 2014 01:42:23 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2014 03:35:22 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Fan",
"Liya",
""
],
[
"Gao",
"Bo",
""
],
[
"Sun",
"Xi",
""
],
[
"Zhang",
"Fa",
""
],
[
"Liu",
"Zhiyong",
""
]
] | TITLE: Improving the Load Balance of MapReduce Operations based on the Key
Distribution of Pairs
ABSTRACT: Load balance is important for MapReduce to reduce job duration, increase
parallel efficiency, etc. Previous work focuses on coarse-grained scheduling.
This study concerns fine-grained scheduling on MapReduce operations. Each
operation represents one invocation of the Map or Reduce function. Scheduling
MapReduce operations is difficult due to highly screwed operation loads, no
support to collect workload statistics, and high complexity of the scheduling
problem. So current implementations adopt simple strategies, leading to poor
load balance. To address these difficulties, we design an algorithm to schedule
operations based on the key distribution of intermediate pairs. The algorithm
involves a sub-program for selecting operations for task slots, and we name it
the Balanced Subset Sum (BSS) problem. We discuss properties of BSS and design
exact and approximation algorithms for it. To transparently incorporate these
algorithms into MapReduce, we design a communication mechanism to collect
statistics, and a pipeline within Reduce tasks to increase resource
utilization. To the best of our knowledge, this is the first work on scheduling
MapReduce workload at this fine-grained level. Experiments on PUMA [T+12]
benchmarks show consistent performance improvement. The job duration can be
reduced by up to 37%, compared with standard MapReduce.
|
1402.2681 | Liang Zheng | Liang Zheng, Shengjin Wang, Ziqiong Liu, Qi Tian | Packing and Padding: Coupled Multi-index for Accurate Image Retrieval | 8 pages, 7 figures, 6 tables. Accepted to CVPR 2014 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In Bag-of-Words (BoW) based image retrieval, the SIFT visual word has a low
discriminative power, so false positive matches occur prevalently. Apart from
the information loss during quantization, another cause is that the SIFT
feature only describes the local gradient distribution. To address this
problem, this paper proposes a coupled Multi-Index (c-MI) framework to perform
feature fusion at indexing level. Basically, complementary features are coupled
into a multi-dimensional inverted index. Each dimension of c-MI corresponds to
one kind of feature, and the retrieval process votes for images similar in both
SIFT and other feature spaces. Specifically, we exploit the fusion of local
color feature into c-MI. While the precision of visual match is greatly
enhanced, we adopt Multiple Assignment to improve recall. The joint cooperation
of SIFT and color features significantly reduces the impact of false positive
matches.
Extensive experiments on several benchmark datasets demonstrate that c-MI
improves the retrieval accuracy significantly, while consuming only half of the
query time compared to the baseline. Importantly, we show that c-MI is well
complementary to many prior techniques. Assembling these methods, we have
obtained an mAP of 85.8% and N-S score of 3.85 on Holidays and Ukbench
datasets, respectively, which compare favorably with the state-of-the-arts.
| [
{
"version": "v1",
"created": "Tue, 11 Feb 2014 22:00:31 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Apr 2014 09:51:54 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Zheng",
"Liang",
""
],
[
"Wang",
"Shengjin",
""
],
[
"Liu",
"Ziqiong",
""
],
[
"Tian",
"Qi",
""
]
] | TITLE: Packing and Padding: Coupled Multi-index for Accurate Image Retrieval
ABSTRACT: In Bag-of-Words (BoW) based image retrieval, the SIFT visual word has a low
discriminative power, so false positive matches occur prevalently. Apart from
the information loss during quantization, another cause is that the SIFT
feature only describes the local gradient distribution. To address this
problem, this paper proposes a coupled Multi-Index (c-MI) framework to perform
feature fusion at indexing level. Basically, complementary features are coupled
into a multi-dimensional inverted index. Each dimension of c-MI corresponds to
one kind of feature, and the retrieval process votes for images similar in both
SIFT and other feature spaces. Specifically, we exploit the fusion of local
color feature into c-MI. While the precision of visual match is greatly
enhanced, we adopt Multiple Assignment to improve recall. The joint cooperation
of SIFT and color features significantly reduces the impact of false positive
matches.
Extensive experiments on several benchmark datasets demonstrate that c-MI
improves the retrieval accuracy significantly, while consuming only half of the
query time compared to the baseline. Importantly, we show that c-MI is well
complementary to many prior techniques. Assembling these methods, we have
obtained an mAP of 85.8% and N-S score of 3.85 on Holidays and Ukbench
datasets, respectively, which compare favorably with the state-of-the-arts.
|
1403.0284 | Liang Zheng | Liang Zheng and Shengjin Wang and Wengang Zhou and Qi Tian | Bayes Merging of Multiple Vocabularies for Scalable Image Retrieval | 8 pages, 7 figures, 6 tables, accepted to CVPR 2014 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The Bag-of-Words (BoW) representation is well applied to recent
state-of-the-art image retrieval works. Typically, multiple vocabularies are
generated to correct quantization artifacts and improve recall. However, this
routine is corrupted by vocabulary correlation, i.e., overlapping among
different vocabularies. Vocabulary correlation leads to an over-counting of the
indexed features in the overlapped area, or the intersection set, thus
compromising the retrieval accuracy. In order to address the correlation
problem while preserve the benefit of high recall, this paper proposes a Bayes
merging approach to down-weight the indexed features in the intersection set.
Through explicitly modeling the correlation problem in a probabilistic view, a
joint similarity on both image- and feature-level is estimated for the indexed
features in the intersection set.
We evaluate our method through extensive experiments on three benchmark
datasets. Albeit simple, Bayes merging can be well applied in various merging
tasks, and consistently improves the baselines on multi-vocabulary merging.
Moreover, Bayes merging is efficient in terms of both time and memory cost, and
yields competitive performance compared with the state-of-the-art methods.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 00:51:29 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Apr 2014 10:14:54 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Zheng",
"Liang",
""
],
[
"Wang",
"Shengjin",
""
],
[
"Zhou",
"Wengang",
""
],
[
"Tian",
"Qi",
""
]
] | TITLE: Bayes Merging of Multiple Vocabularies for Scalable Image Retrieval
ABSTRACT: The Bag-of-Words (BoW) representation is well applied to recent
state-of-the-art image retrieval works. Typically, multiple vocabularies are
generated to correct quantization artifacts and improve recall. However, this
routine is corrupted by vocabulary correlation, i.e., overlapping among
different vocabularies. Vocabulary correlation leads to an over-counting of the
indexed features in the overlapped area, or the intersection set, thus
compromising the retrieval accuracy. In order to address the correlation
problem while preserve the benefit of high recall, this paper proposes a Bayes
merging approach to down-weight the indexed features in the intersection set.
Through explicitly modeling the correlation problem in a probabilistic view, a
joint similarity on both image- and feature-level is estimated for the indexed
features in the intersection set.
We evaluate our method through extensive experiments on three benchmark
datasets. Albeit simple, Bayes merging can be well applied in various merging
tasks, and consistently improves the baselines on multi-vocabulary merging.
Moreover, Bayes merging is efficient in terms of both time and memory cost, and
yields competitive performance compared with the state-of-the-art methods.
|
1403.3780 | Conrad Sanderson | Arnold Wiliem, Conrad Sanderson, Yongkang Wong, Peter Hobson, Rodney
F. Minchin, Brian C. Lovell | Automatic Classification of Human Epithelial Type 2 Cell Indirect
Immunofluorescence Images using Cell Pyramid Matching | arXiv admin note: substantial text overlap with arXiv:1304.1262 | Pattern Recognition, Vol. 47, No. 7, pp. 2315-2324, 2014 | 10.1016/j.patcog.2013.10.014 | null | q-bio.CB cs.CV q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a novel system for automatic classification of images
obtained from Anti-Nuclear Antibody (ANA) pathology tests on Human Epithelial
type 2 (HEp-2) cells using the Indirect Immunofluorescence (IIF) protocol. The
IIF protocol on HEp-2 cells has been the hallmark method to identify the
presence of ANAs, due to its high sensitivity and the large range of antigens
that can be detected. However, it suffers from numerous shortcomings, such as
being subjective as well as time and labour intensive. Computer Aided
Diagnostic (CAD) systems have been developed to address these problems, which
automatically classify a HEp-2 cell image into one of its known patterns (eg.
speckled, homogeneous). Most of the existing CAD systems use handpicked
features to represent a HEp-2 cell image, which may only work in limited
scenarios. We propose a novel automatic cell image classification method termed
Cell Pyramid Matching (CPM), which is comprised of regional histograms of
visual words coupled with the Multiple Kernel Learning framework. We present a
study of several variations of generating histograms and show the efficacy of
the system on two publicly available datasets: the ICPR HEp-2 cell
classification contest dataset and the SNPHEp-2 dataset.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2014 10:15:25 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Wiliem",
"Arnold",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Wong",
"Yongkang",
""
],
[
"Hobson",
"Peter",
""
],
[
"Minchin",
"Rodney F.",
""
],
[
"Lovell",
"Brian C.",
""
]
] | TITLE: Automatic Classification of Human Epithelial Type 2 Cell Indirect
Immunofluorescence Images using Cell Pyramid Matching
ABSTRACT: This paper describes a novel system for automatic classification of images
obtained from Anti-Nuclear Antibody (ANA) pathology tests on Human Epithelial
type 2 (HEp-2) cells using the Indirect Immunofluorescence (IIF) protocol. The
IIF protocol on HEp-2 cells has been the hallmark method to identify the
presence of ANAs, due to its high sensitivity and the large range of antigens
that can be detected. However, it suffers from numerous shortcomings, such as
being subjective as well as time and labour intensive. Computer Aided
Diagnostic (CAD) systems have been developed to address these problems, which
automatically classify a HEp-2 cell image into one of its known patterns (eg.
speckled, homogeneous). Most of the existing CAD systems use handpicked
features to represent a HEp-2 cell image, which may only work in limited
scenarios. We propose a novel automatic cell image classification method termed
Cell Pyramid Matching (CPM), which is comprised of regional histograms of
visual words coupled with the Multiple Kernel Learning framework. We present a
study of several variations of generating histograms and show the efficacy of
the system on two publicly available datasets: the ICPR HEp-2 cell
classification contest dataset and the SNPHEp-2 dataset.
|
1404.3291 | Michael Wilber | Michael J. Wilber and Iljung S. Kwak and Serge J. Belongie | Cost-Effective HITs for Relative Similarity Comparisons | 7 pages, 7 figures | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Similarity comparisons of the form "Is object a more similar to b than to c?"
are useful for computer vision and machine learning applications.
Unfortunately, an embedding of $n$ points is specified by $n^3$ triplets,
making collecting every triplet an expensive task. In noticing this difficulty,
other researchers have investigated more intelligent triplet sampling
techniques, but they do not study their effectiveness or their potential
drawbacks. Although it is important to reduce the number of collected triplets,
it is also important to understand how best to display a triplet collection
task to a user. In this work we explore an alternative display for collecting
triplets and analyze the monetary cost and speed of the display. We propose
best practices for creating cost effective human intelligence tasks for
collecting triplets. We show that rather than changing the sampling algorithm,
simple changes to the crowdsourcing UI can lead to much higher quality
embeddings. We also provide a dataset as well as the labels collected from
crowd workers.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2014 14:33:18 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Wilber",
"Michael J.",
""
],
[
"Kwak",
"Iljung S.",
""
],
[
"Belongie",
"Serge J.",
""
]
] | TITLE: Cost-Effective HITs for Relative Similarity Comparisons
ABSTRACT: Similarity comparisons of the form "Is object a more similar to b than to c?"
are useful for computer vision and machine learning applications.
Unfortunately, an embedding of $n$ points is specified by $n^3$ triplets,
making collecting every triplet an expensive task. In noticing this difficulty,
other researchers have investigated more intelligent triplet sampling
techniques, but they do not study their effectiveness or their potential
drawbacks. Although it is important to reduce the number of collected triplets,
it is also important to understand how best to display a triplet collection
task to a user. In this work we explore an alternative display for collecting
triplets and analyze the monetary cost and speed of the display. We propose
best practices for creating cost effective human intelligence tasks for
collecting triplets. We show that rather than changing the sampling algorithm,
simple changes to the crowdsourcing UI can lead to much higher quality
embeddings. We also provide a dataset as well as the labels collected from
crowd workers.
|
1404.3312 | Xu Chen | Xu Chen, Alfred Hero, Silvio Savarese | Shrinkage Optimized Directed Information using Pictorial Structures for
Action Recognition | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, we propose a novel action recognition framework. The method
uses pictorial structures and shrinkage optimized directed information
assessment (SODA) coupled with Markov Random Fields called SODA+MRF to model
the directional temporal dependency and bidirectional spatial dependency. As a
variant of mutual information, directional information captures the directional
information flow and temporal structure of video sequences across frames.
Meanwhile, within each frame, Markov random fields are utilized to model the
spatial relations among different parts of a human body and the body parts of
different people. The proposed SODA+MRF model is robust to view point
transformations and detect complex interactions accurately. We compare the
proposed method against several baseline methods to highlight the effectiveness
of the SODA+MRF model. We demonstrate that our algorithm has superior action
recognition performance on the UCF action recognition dataset, the Olympic
sports dataset and the collective activity dataset over several
state-of-the-art methods.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2014 19:01:36 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Chen",
"Xu",
""
],
[
"Hero",
"Alfred",
""
],
[
"Savarese",
"Silvio",
""
]
] | TITLE: Shrinkage Optimized Directed Information using Pictorial Structures for
Action Recognition
ABSTRACT: In this paper, we propose a novel action recognition framework. The method
uses pictorial structures and shrinkage optimized directed information
assessment (SODA) coupled with Markov Random Fields called SODA+MRF to model
the directional temporal dependency and bidirectional spatial dependency. As a
variant of mutual information, directional information captures the directional
information flow and temporal structure of video sequences across frames.
Meanwhile, within each frame, Markov random fields are utilized to model the
spatial relations among different parts of a human body and the body parts of
different people. The proposed SODA+MRF model is robust to view point
transformations and detect complex interactions accurately. We compare the
proposed method against several baseline methods to highlight the effectiveness
of the SODA+MRF model. We demonstrate that our algorithm has superior action
recognition performance on the UCF action recognition dataset, the Olympic
sports dataset and the collective activity dataset over several
state-of-the-art methods.
|
1404.3381 | Karel De Vogeleer | Karel De Vogeleer, Gerard Memmi, Pierre Jouvelot and Fabien Coelho | Modeling the Temperature Bias of Power Consumption for Nanometer-Scale
CPUs in Application Processors | Submitted to SAMOS 2014; International Conference on Embedded
Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV) | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce and experimentally validate a new macro-level model of the CPU
temperature/power relationship within nanometer-scale application processors or
system-on-chips. By adopting a holistic view, this model is able to take into
account many of the physical effects that occur within such systems. Together
with two algorithms described in the paper, our results can be used, for
instance by engineers designing power or thermal management units, to cancel
the temperature-induced bias on power measurements. This will help them gather
temperature-neutral power data while running multiple instance of their
benchmarks. Also power requirements and system failure rates can be decreased
by controlling the CPU's thermal behavior.
Even though it is usually assumed that the temperature/power relationship is
exponentially related, there is however a lack of publicly available physical
temperature/power measurements to back up this assumption, something our paper
corrects. Via measurements on two pertinent platforms sporting nanometer-scale
application processors, we show that the power/temperature relationship is
indeed very likely exponential over a 20{\deg}C to 85{\deg}C temperature range.
Our data suggest that, for application processors operating between 20{\deg}C
and 50{\deg}C, a quadratic model is still accurate and a linear approximation
is acceptable.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2014 13:07:36 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"De Vogeleer",
"Karel",
""
],
[
"Memmi",
"Gerard",
""
],
[
"Jouvelot",
"Pierre",
""
],
[
"Coelho",
"Fabien",
""
]
] | TITLE: Modeling the Temperature Bias of Power Consumption for Nanometer-Scale
CPUs in Application Processors
ABSTRACT: We introduce and experimentally validate a new macro-level model of the CPU
temperature/power relationship within nanometer-scale application processors or
system-on-chips. By adopting a holistic view, this model is able to take into
account many of the physical effects that occur within such systems. Together
with two algorithms described in the paper, our results can be used, for
instance by engineers designing power or thermal management units, to cancel
the temperature-induced bias on power measurements. This will help them gather
temperature-neutral power data while running multiple instance of their
benchmarks. Also power requirements and system failure rates can be decreased
by controlling the CPU's thermal behavior.
Even though it is usually assumed that the temperature/power relationship is
exponentially related, there is however a lack of publicly available physical
temperature/power measurements to back up this assumption, something our paper
corrects. Via measurements on two pertinent platforms sporting nanometer-scale
application processors, we show that the power/temperature relationship is
indeed very likely exponential over a 20{\deg}C to 85{\deg}C temperature range.
Our data suggest that, for application processors operating between 20{\deg}C
and 50{\deg}C, a quadratic model is still accurate and a linear approximation
is acceptable.
|
1404.3461 | Xiaolu Lu | Xiaolu Lu, Dongxu Li, Xiang Li, Ling Feng | A 2D based Partition Strategy for Solving Ranking under Team Context
(RTP) | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a 2D based partition method for solving the problem
of Ranking under Team Context(RTC) on datasets without a priori. We first map
the data into 2D space using its minimum and maximum value among all
dimensions. Then we construct window queries with consideration of current team
context. Besides, during the query mapping procedure, we can pre-prune some
tuples which are not top ranked ones. This pre-classified step will defer
processing those tuples and can save cost while providing solutions for the
problem. Experiments show that our algorithm performs well especially on large
datasets with correctness.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2014 05:20:48 GMT"
}
] | 2014-04-15T00:00:00 | [
[
"Lu",
"Xiaolu",
""
],
[
"Li",
"Dongxu",
""
],
[
"Li",
"Xiang",
""
],
[
"Feng",
"Ling",
""
]
] | TITLE: A 2D based Partition Strategy for Solving Ranking under Team Context
(RTP)
ABSTRACT: In this paper, we propose a 2D based partition method for solving the problem
of Ranking under Team Context(RTC) on datasets without a priori. We first map
the data into 2D space using its minimum and maximum value among all
dimensions. Then we construct window queries with consideration of current team
context. Besides, during the query mapping procedure, we can pre-prune some
tuples which are not top ranked ones. This pre-classified step will defer
processing those tuples and can save cost while providing solutions for the
problem. Experiments show that our algorithm performs well especially on large
datasets with correctness.
|
1404.2948 | Anna Goldenberg | Bo Wang and Anna Goldenberg | Gradient-based Laplacian Feature Selection | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analysis of high dimensional noisy data is of essence across a variety of
research fields. Feature selection techniques are designed to find the relevant
feature subset that can facilitate classification or pattern detection.
Traditional (supervised) feature selection methods utilize label information to
guide the identification of relevant feature subsets. In this paper, however,
we consider the unsupervised feature selection problem. Without the label
information, it is particularly difficult to identify a small set of relevant
features due to the noisy nature of real-world data which corrupts the
intrinsic structure of the data. Our Gradient-based Laplacian Feature Selection
(GLFS) selects important features by minimizing the variance of the Laplacian
regularized least squares regression model. With $\ell_1$ relaxation, GLFS can
find a sparse subset of features that is relevant to the Laplacian manifolds.
Extensive experiments on simulated, three real-world object recognition and two
computational biology datasets, have illustrated the power and superior
performance of our approach over multiple state-of-the-art unsupervised feature
selection methods. Additionally, we show that GLFS selects a sparser set of
more relevant features in a supervised setting outperforming the popular
elastic net methodology.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2014 20:49:35 GMT"
}
] | 2014-04-14T00:00:00 | [
[
"Wang",
"Bo",
""
],
[
"Goldenberg",
"Anna",
""
]
] | TITLE: Gradient-based Laplacian Feature Selection
ABSTRACT: Analysis of high dimensional noisy data is of essence across a variety of
research fields. Feature selection techniques are designed to find the relevant
feature subset that can facilitate classification or pattern detection.
Traditional (supervised) feature selection methods utilize label information to
guide the identification of relevant feature subsets. In this paper, however,
we consider the unsupervised feature selection problem. Without the label
information, it is particularly difficult to identify a small set of relevant
features due to the noisy nature of real-world data which corrupts the
intrinsic structure of the data. Our Gradient-based Laplacian Feature Selection
(GLFS) selects important features by minimizing the variance of the Laplacian
regularized least squares regression model. With $\ell_1$ relaxation, GLFS can
find a sparse subset of features that is relevant to the Laplacian manifolds.
Extensive experiments on simulated, three real-world object recognition and two
computational biology datasets, have illustrated the power and superior
performance of our approach over multiple state-of-the-art unsupervised feature
selection methods. Additionally, we show that GLFS selects a sparser set of
more relevant features in a supervised setting outperforming the popular
elastic net methodology.
|
1301.2995 | David Garcia | David Garc\'ia, Dorian Tanase | Measuring Cultural Dynamics Through the Eurovision Song Contest | Submitted to Advances in Complex Systems | Advances in Complex Systems, Vol 16, No 8 (2013) pp 33 | 10.1142/S0219525913500379 | null | physics.soc-ph cs.SI physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Measuring culture and its dynamics through surveys has important limitations,
but the emerging field of computational social science allows us to overcome
them by analyzing large-scale datasets. In this article, we study cultural
dynamics through the votes in the Eurovision song contest, which are decided by
a crowd-based scheme in which viewers vote through mobile phone messages.
Taking into account asymmetries and imperfect perception of culture, we measure
cultural relations among European countries in terms of cultural affinity. We
propose the Friend-or-Foe coefficient, a metric to measure voting biases among
participants of a Eurovision contest. We validate how this metric represents
cultural affinity through its relation with known cultural distances, and
through numerical analysis of biased Eurovision contests. We apply this metric
to the historical set of Eurovision contests from 1975 to 2012, finding new
patterns of stronger modularity than using votes alone. Furthermore, we define
a measure of polarization that, when applied to empirical data, shows a sharp
increase within EU countries during 2010 and 2011. We empirically validate the
relation between this polarization and economic indicators in the EU, showing
how political decisions influence both the economy and the way citizens relate
to the culture of other EU members.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2013 14:55:15 GMT"
},
{
"version": "v2",
"created": "Fri, 10 May 2013 11:41:36 GMT"
}
] | 2014-04-11T00:00:00 | [
[
"García",
"David",
""
],
[
"Tanase",
"Dorian",
""
]
] | TITLE: Measuring Cultural Dynamics Through the Eurovision Song Contest
ABSTRACT: Measuring culture and its dynamics through surveys has important limitations,
but the emerging field of computational social science allows us to overcome
them by analyzing large-scale datasets. In this article, we study cultural
dynamics through the votes in the Eurovision song contest, which are decided by
a crowd-based scheme in which viewers vote through mobile phone messages.
Taking into account asymmetries and imperfect perception of culture, we measure
cultural relations among European countries in terms of cultural affinity. We
propose the Friend-or-Foe coefficient, a metric to measure voting biases among
participants of a Eurovision contest. We validate how this metric represents
cultural affinity through its relation with known cultural distances, and
through numerical analysis of biased Eurovision contests. We apply this metric
to the historical set of Eurovision contests from 1975 to 2012, finding new
patterns of stronger modularity than using votes alone. Furthermore, we define
a measure of polarization that, when applied to empirical data, shows a sharp
increase within EU countries during 2010 and 2011. We empirically validate the
relation between this polarization and economic indicators in the EU, showing
how political decisions influence both the economy and the way citizens relate
to the culture of other EU members.
|
1404.2843 | Anil Aswani | Anil Aswani, Patrick Bouffard, Xiaojing Zhang, Claire Tomlin | Practical Comparison of Optimization Algorithms for Learning-Based MPC
with Linear Models | null | null | null | null | math.OC cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning-based control methods are an attractive approach for addressing
performance and efficiency challenges in robotics and automation systems. One
such technique that has found application in these domains is learning-based
model predictive control (LBMPC). An important novelty of LBMPC lies in the
fact that its robustness and stability properties are independent of the type
of online learning used. This allows the use of advanced statistical or machine
learning methods to provide the adaptation for the controller. This paper is
concerned with providing practical comparisons of different optimization
algorithms for implementing the LBMPC method, for the special case where the
dynamic model of the system is linear and the online learning provides linear
updates to the dynamic model. For comparison purposes, we have implemented a
primal-dual infeasible start interior point method that exploits the sparsity
structure of LBMPC. Our open source implementation (called LBmpcIPM) is
available through a BSD license and is provided freely to enable the rapid
implementation of LBMPC on other platforms. This solver is compared to the
dense active set solvers LSSOL and qpOASES using a quadrotor helicopter
platform. Two scenarios are considered: The first is a simulation comparing
hovering control for the quadrotor, and the second is on-board control
experiments of dynamic quadrotor flight. Though the LBmpcIPM method has better
asymptotic computational complexity than LSSOL and qpOASES, we find that for
certain integrated systems (like our quadrotor testbed) these methods can
outperform LBmpcIPM. This suggests that actual benchmarks should be used when
choosing which algorithm is used to implement LBMPC on practical systems.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2014 15:12:20 GMT"
}
] | 2014-04-11T00:00:00 | [
[
"Aswani",
"Anil",
""
],
[
"Bouffard",
"Patrick",
""
],
[
"Zhang",
"Xiaojing",
""
],
[
"Tomlin",
"Claire",
""
]
] | TITLE: Practical Comparison of Optimization Algorithms for Learning-Based MPC
with Linear Models
ABSTRACT: Learning-based control methods are an attractive approach for addressing
performance and efficiency challenges in robotics and automation systems. One
such technique that has found application in these domains is learning-based
model predictive control (LBMPC). An important novelty of LBMPC lies in the
fact that its robustness and stability properties are independent of the type
of online learning used. This allows the use of advanced statistical or machine
learning methods to provide the adaptation for the controller. This paper is
concerned with providing practical comparisons of different optimization
algorithms for implementing the LBMPC method, for the special case where the
dynamic model of the system is linear and the online learning provides linear
updates to the dynamic model. For comparison purposes, we have implemented a
primal-dual infeasible start interior point method that exploits the sparsity
structure of LBMPC. Our open source implementation (called LBmpcIPM) is
available through a BSD license and is provided freely to enable the rapid
implementation of LBMPC on other platforms. This solver is compared to the
dense active set solvers LSSOL and qpOASES using a quadrotor helicopter
platform. Two scenarios are considered: The first is a simulation comparing
hovering control for the quadrotor, and the second is on-board control
experiments of dynamic quadrotor flight. Though the LBmpcIPM method has better
asymptotic computational complexity than LSSOL and qpOASES, we find that for
certain integrated systems (like our quadrotor testbed) these methods can
outperform LBmpcIPM. This suggests that actual benchmarks should be used when
choosing which algorithm is used to implement LBMPC on practical systems.
|
1404.2872 | Md Pavel Mahmud | Md Pavel Mahmud and Alexander Schliep | TreQ-CG: Clustering Accelerates High-Throughput Sequencing Read Mapping | null | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As high-throughput sequencers become standard equipment outside of sequencing
centers, there is an increasing need for efficient methods for pre-processing
and primary analysis. While a vast literature proposes methods for HTS data
analysis, we argue that significant improvements can still be gained by
exploiting expensive pre-processing steps which can be amortized with savings
from later stages. We propose a method to accelerate and improve read mapping
based on an initial clustering of possibly billions of high-throughput
sequencing reads, yielding clusters of high stringency and a high degree of
overlap. This clustering improves on the state-of-the-art in running time for
small datasets and, for the first time, makes clustering high-coverage human
libraries feasible. Given the efficiently computed clusters, only one
representative read from each cluster needs to be mapped using a traditional
readmapper such as BWA, instead of individually mapping all reads. On human
reads, all processing steps, including clustering and mapping, only require
11%-59% of the time for individually mapping all reads, achieving speed-ups for
all readmappers, while minimally affecting mapping quality. This accelerates a
highly sensitive readmapper such as Stampy to be competitive with a fast
readmapper such as BWA on unclustered reads.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2014 16:29:09 GMT"
}
] | 2014-04-11T00:00:00 | [
[
"Mahmud",
"Md Pavel",
""
],
[
"Schliep",
"Alexander",
""
]
] | TITLE: TreQ-CG: Clustering Accelerates High-Throughput Sequencing Read Mapping
ABSTRACT: As high-throughput sequencers become standard equipment outside of sequencing
centers, there is an increasing need for efficient methods for pre-processing
and primary analysis. While a vast literature proposes methods for HTS data
analysis, we argue that significant improvements can still be gained by
exploiting expensive pre-processing steps which can be amortized with savings
from later stages. We propose a method to accelerate and improve read mapping
based on an initial clustering of possibly billions of high-throughput
sequencing reads, yielding clusters of high stringency and a high degree of
overlap. This clustering improves on the state-of-the-art in running time for
small datasets and, for the first time, makes clustering high-coverage human
libraries feasible. Given the efficiently computed clusters, only one
representative read from each cluster needs to be mapped using a traditional
readmapper such as BWA, instead of individually mapping all reads. On human
reads, all processing steps, including clustering and mapping, only require
11%-59% of the time for individually mapping all reads, achieving speed-ups for
all readmappers, while minimally affecting mapping quality. This accelerates a
highly sensitive readmapper such as Stampy to be competitive with a fast
readmapper such as BWA on unclustered reads.
|
1404.2268 | Junyan Wang | Junyan Wang and Sai-Kit Yeung | A Compact Linear Programming Relaxation for Binary Sub-modular MRF | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel compact linear programming (LP) relaxation for binary
sub-modular MRF in the context of object segmentation. Our model is obtained by
linearizing an $l_1^+$-norm derived from the quadratic programming (QP) form of
the MRF energy. The resultant LP model contains significantly fewer variables
and constraints compared to the conventional LP relaxation of the MRF energy.
In addition, unlike QP which can produce ambiguous labels, our model can be
viewed as a quasi-total-variation minimization problem, and it can therefore
preserve the discontinuities in the labels. We further establish a relaxation
bound between our LP model and the conventional LP model. In the experiments,
we demonstrate our method for the task of interactive object segmentation. Our
LP model outperforms QP when converting the continuous labels to binary labels
using different threshold values on the entire Oxford interactive segmentation
dataset. The computational complexity of our LP is of the same order as that of
the QP, and it is significantly lower than the conventional LP relaxation.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2014 16:33:44 GMT"
}
] | 2014-04-10T00:00:00 | [
[
"Wang",
"Junyan",
""
],
[
"Yeung",
"Sai-Kit",
""
]
] | TITLE: A Compact Linear Programming Relaxation for Binary Sub-modular MRF
ABSTRACT: We propose a novel compact linear programming (LP) relaxation for binary
sub-modular MRF in the context of object segmentation. Our model is obtained by
linearizing an $l_1^+$-norm derived from the quadratic programming (QP) form of
the MRF energy. The resultant LP model contains significantly fewer variables
and constraints compared to the conventional LP relaxation of the MRF energy.
In addition, unlike QP which can produce ambiguous labels, our model can be
viewed as a quasi-total-variation minimization problem, and it can therefore
preserve the discontinuities in the labels. We further establish a relaxation
bound between our LP model and the conventional LP model. In the experiments,
we demonstrate our method for the task of interactive object segmentation. Our
LP model outperforms QP when converting the continuous labels to binary labels
using different threshold values on the entire Oxford interactive segmentation
dataset. The computational complexity of our LP is of the same order as that of
the QP, and it is significantly lower than the conventional LP relaxation.
|
1404.2512 | Vaibhav Jha | Vaibhav Jha, Sunny Deol, Mohit Jha and GK Sharma | Energy and Latency Aware Application Mapping Algorithm & Optimization
for Homogeneous 3D Network on Chip | 15 pages, 11 figure, CCSEA 2014 | null | 10.5121/csit.2014.4302 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy efficiency is one of the most critical issue in design of System on
Chip. In Network On Chip (NoC) based system, energy consumption is influenced
dramatically by mapping of Intellectual Property (IP) which affect the
performance of the system. In this paper we test the antecedently extant
proposed algorithms and introduced a new energy proficient algorithm stand for
3D NoC architecture. In addition a hybrid method has also been implemented
using bioinspired optimization (particle swarm optimization) technique. The
proposed algorithm has been implemented and evaluated on randomly generated
benchmark and real life application such as MMS, Telecom and VOPD. The
algorithm has also been tested with the E3S benchmark and has been compared
with the existing algorithm (spiral and crinkle) and has shown better reduction
in the communication energy consumption and shows improvement in the
performance of the system. Comparing our work with spiral and crinkle,
experimental result shows that the average reduction in communication energy
consumption is 19% with spiral and 17% with crinkle mapping algorithms, while
reduction in communication cost is 24% and 21% whereas reduction in latency is
of 24% and 22% with spiral and crinkle. Optimizing our work and the existing
methods using bio-inspired technique and having the comparison among them an
average energy reduction is found to be of 18% and 24%.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2014 15:10:08 GMT"
}
] | 2014-04-10T00:00:00 | [
[
"Jha",
"Vaibhav",
""
],
[
"Deol",
"Sunny",
""
],
[
"Jha",
"Mohit",
""
],
[
"Sharma",
"GK",
""
]
] | TITLE: Energy and Latency Aware Application Mapping Algorithm & Optimization
for Homogeneous 3D Network on Chip
ABSTRACT: Energy efficiency is one of the most critical issue in design of System on
Chip. In Network On Chip (NoC) based system, energy consumption is influenced
dramatically by mapping of Intellectual Property (IP) which affect the
performance of the system. In this paper we test the antecedently extant
proposed algorithms and introduced a new energy proficient algorithm stand for
3D NoC architecture. In addition a hybrid method has also been implemented
using bioinspired optimization (particle swarm optimization) technique. The
proposed algorithm has been implemented and evaluated on randomly generated
benchmark and real life application such as MMS, Telecom and VOPD. The
algorithm has also been tested with the E3S benchmark and has been compared
with the existing algorithm (spiral and crinkle) and has shown better reduction
in the communication energy consumption and shows improvement in the
performance of the system. Comparing our work with spiral and crinkle,
experimental result shows that the average reduction in communication energy
consumption is 19% with spiral and 17% with crinkle mapping algorithms, while
reduction in communication cost is 24% and 21% whereas reduction in latency is
of 24% and 22% with spiral and crinkle. Optimizing our work and the existing
methods using bio-inspired technique and having the comparison among them an
average energy reduction is found to be of 18% and 24%.
|
1404.1911 | Bahador Saket | Bahador Saket, Paolo Simonetto, Stephen Kobourov and Katy Borner | Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Effectively showing the relationships between objects in a dataset is one of
the main tasks in information visualization. Typically there is a well-defined
notion of distance between pairs of objects, and traditional approaches such as
principal component analysis or multi-dimensional scaling are used to place the
objects as points in 2D space, so that similar objects are close to each other.
In another typical setting, the dataset is visualized as a network graph, where
related nodes are connected by links. More recently, datasets are also
visualized as maps, where in addition to nodes and links, there is an explicit
representation of groups and clusters. We consider these three Techniques,
characterized by a progressive increase of the amount of encoded information:
node diagrams, node-link diagrams and node-link-group diagrams. We assess these
three types of diagrams with a controlled experiment that covers nine different
tasks falling broadly in three categories: node-based tasks, network-based
tasks and group-based tasks. Our findings indicate that adding links, or links
and group representations, does not negatively impact performance (time and
accuracy) of node-based tasks. Similarly, adding group representations does not
negatively impact the performance of network-based tasks. Node-link-group
diagrams outperform the others on group-based tasks. These conclusions
contradict results in other studies, in similar but subtly different settings.
Taken together, however, such results can have significant implications for the
design of standard and domain specific visualizations tools.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2014 20:01:40 GMT"
}
] | 2014-04-09T00:00:00 | [
[
"Saket",
"Bahador",
""
],
[
"Simonetto",
"Paolo",
""
],
[
"Kobourov",
"Stephen",
""
],
[
"Borner",
"Katy",
""
]
] | TITLE: Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation
ABSTRACT: Effectively showing the relationships between objects in a dataset is one of
the main tasks in information visualization. Typically there is a well-defined
notion of distance between pairs of objects, and traditional approaches such as
principal component analysis or multi-dimensional scaling are used to place the
objects as points in 2D space, so that similar objects are close to each other.
In another typical setting, the dataset is visualized as a network graph, where
related nodes are connected by links. More recently, datasets are also
visualized as maps, where in addition to nodes and links, there is an explicit
representation of groups and clusters. We consider these three Techniques,
characterized by a progressive increase of the amount of encoded information:
node diagrams, node-link diagrams and node-link-group diagrams. We assess these
three types of diagrams with a controlled experiment that covers nine different
tasks falling broadly in three categories: node-based tasks, network-based
tasks and group-based tasks. Our findings indicate that adding links, or links
and group representations, does not negatively impact performance (time and
accuracy) of node-based tasks. Similarly, adding group representations does not
negatively impact the performance of network-based tasks. Node-link-group
diagrams outperform the others on group-based tasks. These conclusions
contradict results in other studies, in similar but subtly different settings.
Taken together, however, such results can have significant implications for the
design of standard and domain specific visualizations tools.
|
1404.2005 | Duc Phu Chau | Duc Phu Chau (INRIA Sophia Antipolis), Fran\c{c}ois Bremond (INRIA
Sophia Antipolis), Monique Thonnat (INRIA Sophia Antipolis), Slawomir Bak
(INRIA Sophia Antipolis) | Automatic Tracker Selection w.r.t Object Detection Performance | IEEE Winter Conference on Applications of Computer Vision (WACV 2014)
(2014) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The tracking algorithm performance depends on video content. This paper
presents a new multi-object tracking approach which is able to cope with video
content variations. First the object detection is improved using Kanade-
Lucas-Tomasi (KLT) feature tracking. Second, for each mobile object, an
appropriate tracker is selected among a KLT-based tracker and a discriminative
appearance-based tracker. This selection is supported by an online tracking
evaluation. The approach has been experimented on three public video datasets.
The experimental results show a better performance of the proposed approach
compared to recent state of the art trackers.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2014 04:09:32 GMT"
}
] | 2014-04-09T00:00:00 | [
[
"Chau",
"Duc Phu",
"",
"INRIA Sophia Antipolis"
],
[
"Bremond",
"François",
"",
"INRIA\n Sophia Antipolis"
],
[
"Thonnat",
"Monique",
"",
"INRIA Sophia Antipolis"
],
[
"Bak",
"Slawomir",
"",
"INRIA Sophia Antipolis"
]
] | TITLE: Automatic Tracker Selection w.r.t Object Detection Performance
ABSTRACT: The tracking algorithm performance depends on video content. This paper
presents a new multi-object tracking approach which is able to cope with video
content variations. First the object detection is improved using Kanade-
Lucas-Tomasi (KLT) feature tracking. Second, for each mobile object, an
appropriate tracker is selected among a KLT-based tracker and a discriminative
appearance-based tracker. This selection is supported by an online tracking
evaluation. The approach has been experimented on three public video datasets.
The experimental results show a better performance of the proposed approach
compared to recent state of the art trackers.
|
1305.4014 | Agata Fronczak | Piotr Fronczak, Agata Fronczak, Maksymilian Bujok | Exponential random graph models for networks with community structure | 8 pages, 2 figures | Phys. Rev. E 88, 032810 (2013) | 10.1103/PhysRevE.88.032810 | null | physics.soc-ph cond-mat.dis-nn cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although the community structure organization is one of the most important
characteristics of real-world networks, the traditional network models fail to
reproduce the feature. Therefore, the models are useless as benchmark graphs
for testing community detection algorithms. They are also inadequate to predict
various properties of real networks. With this paper we intend to fill the gap.
We develop an exponential random graph approach to networks with community
structure. To this end we mainly built upon the idea of blockmodels. We
consider both, the classical blockmodel and its degree-corrected counterpart,
and study many of their properties analytically. We show that in the
degree-corrected blockmodel, node degrees display an interesting scaling
property, which is reminiscent of what is observed in real-world fractal
networks. The scaling feature comes as a surprise, especially that in this
study, contrary to what is suggested in the literature, the scaling property is
not attributed to any specific network construction procedure. It is an
intrinsic feature of the degree-corrected blockmodel. A short description of
Monte Carlo simulations of the models is also given in the hope of being useful
to others working in the field.
| [
{
"version": "v1",
"created": "Fri, 17 May 2013 08:40:15 GMT"
}
] | 2014-04-08T00:00:00 | [
[
"Fronczak",
"Piotr",
""
],
[
"Fronczak",
"Agata",
""
],
[
"Bujok",
"Maksymilian",
""
]
] | TITLE: Exponential random graph models for networks with community structure
ABSTRACT: Although the community structure organization is one of the most important
characteristics of real-world networks, the traditional network models fail to
reproduce the feature. Therefore, the models are useless as benchmark graphs
for testing community detection algorithms. They are also inadequate to predict
various properties of real networks. With this paper we intend to fill the gap.
We develop an exponential random graph approach to networks with community
structure. To this end we mainly built upon the idea of blockmodels. We
consider both, the classical blockmodel and its degree-corrected counterpart,
and study many of their properties analytically. We show that in the
degree-corrected blockmodel, node degrees display an interesting scaling
property, which is reminiscent of what is observed in real-world fractal
networks. The scaling feature comes as a surprise, especially that in this
study, contrary to what is suggested in the literature, the scaling property is
not attributed to any specific network construction procedure. It is an
intrinsic feature of the degree-corrected blockmodel. A short description of
Monte Carlo simulations of the models is also given in the hope of being useful
to others working in the field.
|
1307.7751 | Guoming Tang | Guoming Tang, Kui Wu, Jingsheng Lei, Zhongqin Bi and Jiuyang Tang | From Landscape to Portrait: A New Approach for Outlier Detection in Load
Curve Data | 10 pages, 9 figures | null | null | null | cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In power systems, load curve data is one of the most important datasets that
are collected and retained by utilities. The quality of load curve data,
however, is hard to guarantee since the data is subject to communication
losses, meter malfunctions, and many other impacts. In this paper, a new
approach to analyzing load curve data is presented. The method adopts a new
view, termed \textit{portrait}, on the load curve data by analyzing the
periodic patterns in the data and re-organizing the data for ease of analysis.
Furthermore, we introduce algorithms to build the virtual portrait load curve
data, and demonstrate its application on load curve data cleansing. Compared to
existing regression-based methods, our method is much faster and more accurate
for both small-scale and large-scale real-world datasets.
| [
{
"version": "v1",
"created": "Mon, 29 Jul 2013 21:59:30 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Jul 2013 17:22:07 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Apr 2014 19:17:23 GMT"
}
] | 2014-04-08T00:00:00 | [
[
"Tang",
"Guoming",
""
],
[
"Wu",
"Kui",
""
],
[
"Lei",
"Jingsheng",
""
],
[
"Bi",
"Zhongqin",
""
],
[
"Tang",
"Jiuyang",
""
]
] | TITLE: From Landscape to Portrait: A New Approach for Outlier Detection in Load
Curve Data
ABSTRACT: In power systems, load curve data is one of the most important datasets that
are collected and retained by utilities. The quality of load curve data,
however, is hard to guarantee since the data is subject to communication
losses, meter malfunctions, and many other impacts. In this paper, a new
approach to analyzing load curve data is presented. The method adopts a new
view, termed \textit{portrait}, on the load curve data by analyzing the
periodic patterns in the data and re-organizing the data for ease of analysis.
Furthermore, we introduce algorithms to build the virtual portrait load curve
data, and demonstrate its application on load curve data cleansing. Compared to
existing regression-based methods, our method is much faster and more accurate
for both small-scale and large-scale real-world datasets.
|
1312.0803 | Amir Najafi | Amir Najafi, Amir Joudaki, and Emad Fatemizadeh | Nonlinear Dimensionality Reduction via Path-Based Isometric Mapping | (29) pages, (12) figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nonlinear dimensionality reduction methods have demonstrated top-notch
performance in many pattern recognition and image classification tasks. Despite
their popularity, they suffer from highly expensive time and memory
requirements, which render them inapplicable to large-scale datasets. To
leverage such cases we propose a new method called "Path-Based Isomap". Similar
to Isomap, we exploit geodesic paths to find the low-dimensional embedding.
However, instead of preserving pairwise geodesic distances, the low-dimensional
embedding is computed via a path-mapping algorithm. Due to the much fewer
number of paths compared to number of data points, a significant improvement in
time and memory complexity without any decline in performance is achieved. The
method demonstrates state-of-the-art performance on well-known synthetic and
real-world datasets, as well as in the presence of noise.
| [
{
"version": "v1",
"created": "Tue, 3 Dec 2013 12:56:46 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Dec 2013 15:05:53 GMT"
},
{
"version": "v3",
"created": "Sun, 6 Apr 2014 13:38:32 GMT"
}
] | 2014-04-08T00:00:00 | [
[
"Najafi",
"Amir",
""
],
[
"Joudaki",
"Amir",
""
],
[
"Fatemizadeh",
"Emad",
""
]
] | TITLE: Nonlinear Dimensionality Reduction via Path-Based Isometric Mapping
ABSTRACT: Nonlinear dimensionality reduction methods have demonstrated top-notch
performance in many pattern recognition and image classification tasks. Despite
their popularity, they suffer from highly expensive time and memory
requirements, which render them inapplicable to large-scale datasets. To
leverage such cases we propose a new method called "Path-Based Isomap". Similar
to Isomap, we exploit geodesic paths to find the low-dimensional embedding.
However, instead of preserving pairwise geodesic distances, the low-dimensional
embedding is computed via a path-mapping algorithm. Due to the much fewer
number of paths compared to number of data points, a significant improvement in
time and memory complexity without any decline in performance is achieved. The
method demonstrates state-of-the-art performance on well-known synthetic and
real-world datasets, as well as in the presence of noise.
|
1404.1831 | Artem Babenko | Artem Babenko and Victor Lempitsky | Improving Bilayer Product Quantization for Billion-Scale Approximate
Nearest Neighbors in High Dimensions | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The top-performing systems for billion-scale high-dimensional approximate
nearest neighbor (ANN) search are all based on two-layer architectures that
include an indexing structure and a compressed datapoints layer. An indexing
structure is crucial as it allows to avoid exhaustive search, while the lossy
data compression is needed to fit the dataset into RAM. Several of the most
successful systems use product quantization (PQ) for both the indexing and the
dataset compression layers. These systems are however limited in the way they
exploit the interaction of product quantization processes that happen at
different stages of these systems.
Here we introduce and evaluate two approximate nearest neighbor search
systems that both exploit the synergy of product quantization processes in a
more efficient way. The first system, called Fast Bilayer Product Quantization
(FBPQ), speeds up the runtime of the baseline system (Multi-D-ADC) by several
times, while achieving the same accuracy. The second system, Hierarchical
Bilayer Product Quantization (HBPQ) provides a significantly better recall for
the same runtime at a cost of small memory footprint increase. For the BIGANN
dataset of billion SIFT descriptors, the 10% increase in Recall@1 and the 17%
increase in Recall@10 is observed.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2014 16:08:13 GMT"
}
] | 2014-04-08T00:00:00 | [
[
"Babenko",
"Artem",
""
],
[
"Lempitsky",
"Victor",
""
]
] | TITLE: Improving Bilayer Product Quantization for Billion-Scale Approximate
Nearest Neighbors in High Dimensions
ABSTRACT: The top-performing systems for billion-scale high-dimensional approximate
nearest neighbor (ANN) search are all based on two-layer architectures that
include an indexing structure and a compressed datapoints layer. An indexing
structure is crucial as it allows to avoid exhaustive search, while the lossy
data compression is needed to fit the dataset into RAM. Several of the most
successful systems use product quantization (PQ) for both the indexing and the
dataset compression layers. These systems are however limited in the way they
exploit the interaction of product quantization processes that happen at
different stages of these systems.
Here we introduce and evaluate two approximate nearest neighbor search
systems that both exploit the synergy of product quantization processes in a
more efficient way. The first system, called Fast Bilayer Product Quantization
(FBPQ), speeds up the runtime of the baseline system (Multi-D-ADC) by several
times, while achieving the same accuracy. The second system, Hierarchical
Bilayer Product Quantization (HBPQ) provides a significantly better recall for
the same runtime at a cost of small memory footprint increase. For the BIGANN
dataset of billion SIFT descriptors, the 10% increase in Recall@1 and the 17%
increase in Recall@10 is observed.
|
1404.1355 | Maksym Gabielkov | Maksym Gabielkov (Inria Sophia Antipolis), Ashwin Rao (Inria Sophia
Antipolis), Arnaud Legout (Inria Sophia Antipolis) | Studying Social Networks at Scale: Macroscopic Anatomy of the Twitter
Social Graph | ACM Sigmetrics 2014 (2014) | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Twitter is one of the largest social networks using exclusively directed
links among accounts. This makes the Twitter social graph much closer to the
social graph supporting real life communications than, for instance, Facebook.
Therefore, understanding the structure of the Twitter social graph is
interesting not only for computer scientists, but also for researchers in other
fields, such as sociologists. However, little is known about how the
information propagation in Twitter is constrained by its inner structure. In
this paper, we present an in-depth study of the macroscopic structure of the
Twitter social graph unveiling the highways on which tweets propagate, the
specific user activity associated with each component of this macroscopic
structure, and the evolution of this macroscopic structure with time for the
past 6 years. For this study, we crawled Twitter to retrieve all accounts and
all social relationships (follow links) among accounts; the crawl completed in
July 2012 with 505 million accounts interconnected by 23 billion links. Then,
we present a methodology to unveil the macroscopic structure of the Twitter
social graph. This macroscopic structure consists of 8 components defined by
their connectivity characteristics. Each component group users with a specific
usage of Twitter. For instance, we identified components gathering together
spammers, or celebrities. Finally, we present a method to approximate the
macroscopic structure of the Twitter social graph in the past, validate this
method using old datasets, and discuss the evolution of the macroscopic
structure of the Twitter social graph during the past 6 years.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2014 19:33:22 GMT"
}
] | 2014-04-07T00:00:00 | [
[
"Gabielkov",
"Maksym",
"",
"Inria Sophia Antipolis"
],
[
"Rao",
"Ashwin",
"",
"Inria Sophia\n Antipolis"
],
[
"Legout",
"Arnaud",
"",
"Inria Sophia Antipolis"
]
] | TITLE: Studying Social Networks at Scale: Macroscopic Anatomy of the Twitter
Social Graph
ABSTRACT: Twitter is one of the largest social networks using exclusively directed
links among accounts. This makes the Twitter social graph much closer to the
social graph supporting real life communications than, for instance, Facebook.
Therefore, understanding the structure of the Twitter social graph is
interesting not only for computer scientists, but also for researchers in other
fields, such as sociologists. However, little is known about how the
information propagation in Twitter is constrained by its inner structure. In
this paper, we present an in-depth study of the macroscopic structure of the
Twitter social graph unveiling the highways on which tweets propagate, the
specific user activity associated with each component of this macroscopic
structure, and the evolution of this macroscopic structure with time for the
past 6 years. For this study, we crawled Twitter to retrieve all accounts and
all social relationships (follow links) among accounts; the crawl completed in
July 2012 with 505 million accounts interconnected by 23 billion links. Then,
we present a methodology to unveil the macroscopic structure of the Twitter
social graph. This macroscopic structure consists of 8 components defined by
their connectivity characteristics. Each component group users with a specific
usage of Twitter. For instance, we identified components gathering together
spammers, or celebrities. Finally, we present a method to approximate the
macroscopic structure of the Twitter social graph in the past, validate this
method using old datasets, and discuss the evolution of the macroscopic
structure of the Twitter social graph during the past 6 years.
|
1404.1066 | Stephen Tyree | Stephen Tyree, Jacob R. Gardner, Kilian Q. Weinberger, Kunal Agrawal,
John Tran | Parallel Support Vector Machines in Practice | 10 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we evaluate the performance of various parallel optimization
methods for Kernel Support Vector Machines on multicore CPUs and GPUs. In
particular, we provide the first comparison of algorithms with explicit and
implicit parallelization. Most existing parallel implementations for multi-core
or GPU architectures are based on explicit parallelization of Sequential
Minimal Optimization (SMO)---the programmers identified parallelizable
components and hand-parallelized them, specifically tuned for a particular
architecture. We compare these approaches with each other and with implicitly
parallelized algorithms---where the algorithm is expressed such that most of
the work is done within few iterations with large dense linear algebra
operations. These can be computed with highly-optimized libraries, that are
carefully parallelized for a large variety of parallel platforms. We highlight
the advantages and disadvantages of both approaches and compare them on various
benchmark data sets. We find an approximate implicitly parallel algorithm which
is surprisingly efficient, permits a much simpler implementation, and leads to
unprecedented speedups in SVM training.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2014 19:49:57 GMT"
}
] | 2014-04-04T00:00:00 | [
[
"Tyree",
"Stephen",
""
],
[
"Gardner",
"Jacob R.",
""
],
[
"Weinberger",
"Kilian Q.",
""
],
[
"Agrawal",
"Kunal",
""
],
[
"Tran",
"John",
""
]
] | TITLE: Parallel Support Vector Machines in Practice
ABSTRACT: In this paper, we evaluate the performance of various parallel optimization
methods for Kernel Support Vector Machines on multicore CPUs and GPUs. In
particular, we provide the first comparison of algorithms with explicit and
implicit parallelization. Most existing parallel implementations for multi-core
or GPU architectures are based on explicit parallelization of Sequential
Minimal Optimization (SMO)---the programmers identified parallelizable
components and hand-parallelized them, specifically tuned for a particular
architecture. We compare these approaches with each other and with implicitly
parallelized algorithms---where the algorithm is expressed such that most of
the work is done within few iterations with large dense linear algebra
operations. These can be computed with highly-optimized libraries, that are
carefully parallelized for a large variety of parallel platforms. We highlight
the advantages and disadvantages of both approaches and compare them on various
benchmark data sets. We find an approximate implicitly parallel algorithm which
is surprisingly efficient, permits a much simpler implementation, and leads to
unprecedented speedups in SVM training.
|
1404.0334 | Menglong Zhu | Menglong Zhu, Nikolay Atanasov, George J. Pappas, Kostas Daniilidis | Active Deformable Part Models | 9 pages | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an active approach for part-based object detection, which
optimizes the order of part filter evaluations and the time at which to stop
and make a prediction. Statistics, describing the part responses, are learned
from training data and are used to formalize the part scheduling problem as an
offline optimization. Dynamic programming is applied to obtain a policy, which
balances the number of part evaluations with the classification accuracy.
During inference, the policy is used as a look-up table to choose the part
order and the stopping time based on the observed filter responses. The method
is faster than cascade detection with deformable part models (which does not
optimize the part order) with negligible loss in accuracy when evaluated on the
PASCAL VOC 2007 and 2010 datasets.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2014 18:07:58 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Apr 2014 19:00:29 GMT"
}
] | 2014-04-03T00:00:00 | [
[
"Zhu",
"Menglong",
""
],
[
"Atanasov",
"Nikolay",
""
],
[
"Pappas",
"George J.",
""
],
[
"Daniilidis",
"Kostas",
""
]
] | TITLE: Active Deformable Part Models
ABSTRACT: This paper presents an active approach for part-based object detection, which
optimizes the order of part filter evaluations and the time at which to stop
and make a prediction. Statistics, describing the part responses, are learned
from training data and are used to formalize the part scheduling problem as an
offline optimization. Dynamic programming is applied to obtain a policy, which
balances the number of part evaluations with the classification accuracy.
During inference, the policy is used as a look-up table to choose the part
order and the stopping time based on the observed filter responses. The method
is faster than cascade detection with deformable part models (which does not
optimize the part order) with negligible loss in accuracy when evaluated on the
PASCAL VOC 2007 and 2010 datasets.
|
1404.0404 | Xu Chen | Xu Chen, Zeeshan Syed, Alfred Hero | EEG Spatial Decoding and Classification with Logit Shrinkage Regularized
Directed Information Assessment (L-SODA) | null | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | There is an increasing interest in studying the neural interaction mechanisms
behind patterns of cognitive brain activity. This paper proposes a new approach
to infer such interaction mechanisms from electroencephalographic (EEG) data
using a new estimator of directed information (DI) called logit shrinkage
optimized directed information assessment (L-SODA). Unlike previous directed
information measures applied to neural decoding, L-SODA uses shrinkage
regularization on multinomial logistic regression to deal with the high
dimensionality of multi-channel EEG signals and the small sizes of many
real-world datasets. It is designed to make few a priori assumptions and can
handle both non-linear and non-Gaussian flows among electrodes. Our L-SODA
estimator of the DI is accompanied by robust statistical confidence intervals
on the true DI that make it especially suitable for hypothesis testing on the
information flow patterns. We evaluate our work in the context of two different
problems where interaction localization is used to determine highly interactive
areas for EEG signals spatially and temporally. First, by mapping the areas
that have high DI into Brodmann area, we identify that the areas with high DI
are associated with motor-related functions. We demonstrate that L-SODA
provides better accuracy for neural decoding of EEG signals as compared to
several state-of-the-art approaches on the Brain Computer Interface (BCI) EEG
motor activity dataset. Second, the proposed L-SODA estimator is evaluated on
the CHB-MIT Scalp EEG database. We demonstrate that compared to the
state-of-the-art approaches, the proposed method provides better performance in
detecting the epileptic seizure.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2014 21:43:13 GMT"
}
] | 2014-04-03T00:00:00 | [
[
"Chen",
"Xu",
""
],
[
"Syed",
"Zeeshan",
""
],
[
"Hero",
"Alfred",
""
]
] | TITLE: EEG Spatial Decoding and Classification with Logit Shrinkage Regularized
Directed Information Assessment (L-SODA)
ABSTRACT: There is an increasing interest in studying the neural interaction mechanisms
behind patterns of cognitive brain activity. This paper proposes a new approach
to infer such interaction mechanisms from electroencephalographic (EEG) data
using a new estimator of directed information (DI) called logit shrinkage
optimized directed information assessment (L-SODA). Unlike previous directed
information measures applied to neural decoding, L-SODA uses shrinkage
regularization on multinomial logistic regression to deal with the high
dimensionality of multi-channel EEG signals and the small sizes of many
real-world datasets. It is designed to make few a priori assumptions and can
handle both non-linear and non-Gaussian flows among electrodes. Our L-SODA
estimator of the DI is accompanied by robust statistical confidence intervals
on the true DI that make it especially suitable for hypothesis testing on the
information flow patterns. We evaluate our work in the context of two different
problems where interaction localization is used to determine highly interactive
areas for EEG signals spatially and temporally. First, by mapping the areas
that have high DI into Brodmann area, we identify that the areas with high DI
are associated with motor-related functions. We demonstrate that L-SODA
provides better accuracy for neural decoding of EEG signals as compared to
several state-of-the-art approaches on the Brain Computer Interface (BCI) EEG
motor activity dataset. Second, the proposed L-SODA estimator is evaluated on
the CHB-MIT Scalp EEG database. We demonstrate that compared to the
state-of-the-art approaches, the proposed method provides better performance in
detecting the epileptic seizure.
|
1312.4476 | Philipp Mayr | Lars Kaczmirek, Philipp Mayr, Ravi Vatrapu, Arnim Bleier, Manuela
Blumenberg, Tobias Gummer, Abid Hussain, Katharina Kinder-Kurlanda, Kaveh
Manshaei, Mark Thamm, Katrin Weller, Alexander Wenz, Christof Wolf | Social Media Monitoring of the Campaigns for the 2013 German Bundestag
Elections on Facebook and Twitter | 29 pages, 2 figures, GESIS-Working Papers No. 31 | null | null | null | cs.SI cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As more and more people use social media to communicate their view and
perception of elections, researchers have increasingly been collecting and
analyzing data from social media platforms. Our research focuses on social
media communication related to the 2013 election of the German parlia-ment
[translation: Bundestagswahl 2013]. We constructed several social media
datasets using data from Facebook and Twitter. First, we identified the most
relevant candidates (n=2,346) and checked whether they maintained social media
accounts. The Facebook data was collected in November 2013 for the period of
January 2009 to October 2013. On Facebook we identified 1,408 Facebook walls
containing approximately 469,000 posts. Twitter data was collected between June
and December 2013 finishing with the constitution of the government. On Twitter
we identified 1,009 candidates and 76 other agents, for example, journalists.
We estimated the number of relevant tweets to exceed eight million for the
period from July 27 to September 27 alone. In this document we summarize past
research in the literature, discuss possibilities for research with our data
set, explain the data collection procedures, and provide a description of the
data and a discussion of issues for archiving and dissemination of social media
data.
| [
{
"version": "v1",
"created": "Mon, 16 Dec 2013 19:32:39 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Apr 2014 09:59:24 GMT"
}
] | 2014-04-02T00:00:00 | [
[
"Kaczmirek",
"Lars",
""
],
[
"Mayr",
"Philipp",
""
],
[
"Vatrapu",
"Ravi",
""
],
[
"Bleier",
"Arnim",
""
],
[
"Blumenberg",
"Manuela",
""
],
[
"Gummer",
"Tobias",
""
],
[
"Hussain",
"Abid",
""
],
[
"Kinder-Kurlanda",
"Katharina",
""
],
[
"Manshaei",
"Kaveh",
""
],
[
"Thamm",
"Mark",
""
],
[
"Weller",
"Katrin",
""
],
[
"Wenz",
"Alexander",
""
],
[
"Wolf",
"Christof",
""
]
] | TITLE: Social Media Monitoring of the Campaigns for the 2013 German Bundestag
Elections on Facebook and Twitter
ABSTRACT: As more and more people use social media to communicate their view and
perception of elections, researchers have increasingly been collecting and
analyzing data from social media platforms. Our research focuses on social
media communication related to the 2013 election of the German parlia-ment
[translation: Bundestagswahl 2013]. We constructed several social media
datasets using data from Facebook and Twitter. First, we identified the most
relevant candidates (n=2,346) and checked whether they maintained social media
accounts. The Facebook data was collected in November 2013 for the period of
January 2009 to October 2013. On Facebook we identified 1,408 Facebook walls
containing approximately 469,000 posts. Twitter data was collected between June
and December 2013 finishing with the constitution of the government. On Twitter
we identified 1,009 candidates and 76 other agents, for example, journalists.
We estimated the number of relevant tweets to exceed eight million for the
period from July 27 to September 27 alone. In this document we summarize past
research in the literature, discuss possibilities for research with our data
set, explain the data collection procedures, and provide a description of the
data and a discussion of issues for archiving and dissemination of social media
data.
|
1404.0163 | David Garcia | David Garcia, Ingmar Weber, Venkata Rama Kiran Garimella | Gender Asymmetries in Reality and Fiction: The Bechdel Test of Social
Media | To appear in Proceedings of the 8th International AAAI Conference on
Weblogs and Social Media (ICWSM '14) | null | null | null | cs.SI cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The subjective nature of gender inequality motivates the analysis and
comparison of data from real and fictional human interaction. We present a
computational extension of the Bechdel test: A popular tool to assess if a
movie contains a male gender bias, by looking for two female characters who
discuss about something besides a man. We provide the tools to quantify Bechdel
scores for both genders, and we measure them in movie scripts and large
datasets of dialogues between users of MySpace and Twitter. Comparing movies
and users of social media, we find that movies and Twitter conversations have a
consistent male bias, which does not appear when analyzing MySpace.
Furthermore, the narrative of Twitter is closer to the movies that do not pass
the Bechdel test than to those that pass it.
We link the properties of movies and the users that share trailers of those
movies. Our analysis reveals some particularities of movies that pass the
Bechdel test: Their trailers are less popular, female users are more likely to
share them than male users, and users that share them tend to interact less
with male users. Based on our datasets, we define gender independence
measurements to analyze the gender biases of a society, as manifested through
digital traces of online behavior. Using the profile information of Twitter
users, we find larger gender independence for urban users in comparison to
rural ones. Additionally, the asymmetry between genders is larger for parents
and lower for students. Gender asymmetry varies across US states, increasing
with higher average income and latitude. This points to the relation between
gender inequality and social, economical, and cultural factors of a society,
and how gender roles exist in both fictional narratives and public online
dialogues.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2014 08:40:28 GMT"
}
] | 2014-04-02T00:00:00 | [
[
"Garcia",
"David",
""
],
[
"Weber",
"Ingmar",
""
],
[
"Garimella",
"Venkata Rama Kiran",
""
]
] | TITLE: Gender Asymmetries in Reality and Fiction: The Bechdel Test of Social
Media
ABSTRACT: The subjective nature of gender inequality motivates the analysis and
comparison of data from real and fictional human interaction. We present a
computational extension of the Bechdel test: A popular tool to assess if a
movie contains a male gender bias, by looking for two female characters who
discuss about something besides a man. We provide the tools to quantify Bechdel
scores for both genders, and we measure them in movie scripts and large
datasets of dialogues between users of MySpace and Twitter. Comparing movies
and users of social media, we find that movies and Twitter conversations have a
consistent male bias, which does not appear when analyzing MySpace.
Furthermore, the narrative of Twitter is closer to the movies that do not pass
the Bechdel test than to those that pass it.
We link the properties of movies and the users that share trailers of those
movies. Our analysis reveals some particularities of movies that pass the
Bechdel test: Their trailers are less popular, female users are more likely to
share them than male users, and users that share them tend to interact less
with male users. Based on our datasets, we define gender independence
measurements to analyze the gender biases of a society, as manifested through
digital traces of online behavior. Using the profile information of Twitter
users, we find larger gender independence for urban users in comparison to
rural ones. Additionally, the asymmetry between genders is larger for parents
and lower for students. Gender asymmetry varies across US states, increasing
with higher average income and latitude. This points to the relation between
gender inequality and social, economical, and cultural factors of a society,
and how gender roles exist in both fictional narratives and public online
dialogues.
|
1404.0200 | Andreas Veit | Andreas Veit, Christoph Goebel, Rohit Tidke, Christoph Doblander and
Hans-Arno Jacobsen | Household Electricity Demand Forecasting -- Benchmarking
State-of-the-Art Methods | Technical Report | null | null | null | cs.LG stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing use of renewable energy sources with variable output, such as
solar photovoltaic and wind power generation, calls for Smart Grids that
effectively manage flexible loads and energy storage. The ability to forecast
consumption at different locations in distribution systems will be a key
capability of Smart Grids. The goal of this paper is to benchmark
state-of-the-art methods for forecasting electricity demand on the household
level across different granularities and time scales in an explorative way,
thereby revealing potential shortcomings and find promising directions for
future research in this area. We apply a number of forecasting methods
including ARIMA, neural networks, and exponential smoothening using several
strategies for training data selection, in particular day type and sliding
window based strategies. We consider forecasting horizons ranging between 15
minutes and 24 hours. Our evaluation is based on two data sets containing the
power usage of individual appliances at second time granularity collected over
the course of several months. The results indicate that forecasting accuracy
varies significantly depending on the choice of forecasting methods/strategy
and the parameter configuration. Measured by the Mean Absolute Percentage Error
(MAPE), the considered state-of-the-art forecasting methods rarely beat
corresponding persistence forecasts. Overall, we observed MAPEs in the range
between 5 and >100%. The average MAPE for the first data set was ~30%, while it
was ~85% for the other data set. These results show big room for improvement.
Based on the identified trends and experiences from our experiments, we
contribute a detailed discussion of promising future research.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2014 11:32:53 GMT"
}
] | 2014-04-02T00:00:00 | [
[
"Veit",
"Andreas",
""
],
[
"Goebel",
"Christoph",
""
],
[
"Tidke",
"Rohit",
""
],
[
"Doblander",
"Christoph",
""
],
[
"Jacobsen",
"Hans-Arno",
""
]
] | TITLE: Household Electricity Demand Forecasting -- Benchmarking
State-of-the-Art Methods
ABSTRACT: The increasing use of renewable energy sources with variable output, such as
solar photovoltaic and wind power generation, calls for Smart Grids that
effectively manage flexible loads and energy storage. The ability to forecast
consumption at different locations in distribution systems will be a key
capability of Smart Grids. The goal of this paper is to benchmark
state-of-the-art methods for forecasting electricity demand on the household
level across different granularities and time scales in an explorative way,
thereby revealing potential shortcomings and find promising directions for
future research in this area. We apply a number of forecasting methods
including ARIMA, neural networks, and exponential smoothening using several
strategies for training data selection, in particular day type and sliding
window based strategies. We consider forecasting horizons ranging between 15
minutes and 24 hours. Our evaluation is based on two data sets containing the
power usage of individual appliances at second time granularity collected over
the course of several months. The results indicate that forecasting accuracy
varies significantly depending on the choice of forecasting methods/strategy
and the parameter configuration. Measured by the Mean Absolute Percentage Error
(MAPE), the considered state-of-the-art forecasting methods rarely beat
corresponding persistence forecasts. Overall, we observed MAPEs in the range
between 5 and >100%. The average MAPE for the first data set was ~30%, while it
was ~85% for the other data set. These results show big room for improvement.
Based on the identified trends and experiences from our experiments, we
contribute a detailed discussion of promising future research.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.