id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1307.3040 | Mehul Bhatt | Mehul Bhatt | Between Sense and Sensibility: Declarative narrativisation of mental
models as a basis and benchmark for visuo-spatial cognition and computation
focussed collaborative cognitive systems | 5 pages, research statement summarising recent publications | null | null | null | cs.AI cs.CL cs.CV cs.HC cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | What lies between `\emph{sensing}' and `\emph{sensibility}'? In other words,
what kind of cognitive processes mediate sensing capability, and the formation
of sensible impressions ---e.g., abstractions, analogies, hypotheses and theory
formation, beliefs and their revision, argument formation--- in domain-specific
problem solving, or in regular activities of everyday living, working and
simply going around in the environment? How can knowledge and reasoning about
such capabilities, as exhibited by humans in particular problem contexts, be
used as a model and benchmark for the development of collaborative cognitive
(interaction) systems concerned with human assistance, assurance, and
empowerment?
We pose these questions in the context of a range of assistive technologies
concerned with \emph{visuo-spatial perception and cognition} tasks encompassing
aspects such as commonsense, creativity, and the application of specialist
domain knowledge and problem-solving thought processes. Assistive technologies
being considered include: (a) human activity interpretation; (b) high-level
cognitive rovotics; (c) people-centred creative design in domains such as
architecture & digital media creation, and (d) qualitative analyses geographic
information systems. Computational narratives not only provide a rich cognitive
basis, but they also serve as a benchmark of functional performance in our
development of computational cognitive assistance systems. We posit that
computational narrativisation pertaining to space, actions, and change provides
a useful model of \emph{visual} and \emph{spatio-temporal thinking} within a
wide-range of problem-solving tasks and application areas where collaborative
cognitive systems could serve an assistive and empowering function.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2013 10:01:29 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Mar 2014 10:22:29 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Bhatt",
"Mehul",
""
]
] | TITLE: Between Sense and Sensibility: Declarative narrativisation of mental
models as a basis and benchmark for visuo-spatial cognition and computation
focussed collaborative cognitive systems
ABSTRACT: What lies between `\emph{sensing}' and `\emph{sensibility}'? In other words,
what kind of cognitive processes mediate sensing capability, and the formation
of sensible impressions ---e.g., abstractions, analogies, hypotheses and theory
formation, beliefs and their revision, argument formation--- in domain-specific
problem solving, or in regular activities of everyday living, working and
simply going around in the environment? How can knowledge and reasoning about
such capabilities, as exhibited by humans in particular problem contexts, be
used as a model and benchmark for the development of collaborative cognitive
(interaction) systems concerned with human assistance, assurance, and
empowerment?
We pose these questions in the context of a range of assistive technologies
concerned with \emph{visuo-spatial perception and cognition} tasks encompassing
aspects such as commonsense, creativity, and the application of specialist
domain knowledge and problem-solving thought processes. Assistive technologies
being considered include: (a) human activity interpretation; (b) high-level
cognitive rovotics; (c) people-centred creative design in domains such as
architecture & digital media creation, and (d) qualitative analyses geographic
information systems. Computational narratives not only provide a rich cognitive
basis, but they also serve as a benchmark of functional performance in our
development of computational cognitive assistance systems. We posit that
computational narrativisation pertaining to space, actions, and change provides
a useful model of \emph{visual} and \emph{spatio-temporal thinking} within a
wide-range of problem-solving tasks and application areas where collaborative
cognitive systems could serve an assistive and empowering function.
|
1307.7281 | Roopsha Samanta | Roopsha Samanta, Oswaldo Olivo and E. Allen Emerson | Cost-Aware Automatic Program Repair | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a formal framework for repairing infinite-state, imperative,
sequential programs, with (possibly recursive) procedures and multiple
assertions; the framework can generate repaired programs by modifying the
original erroneous program in multiple program locations, and can ensure the
readability of the repaired program using user-defined expression templates;
the framework also generates a set of inductive assertions that serve as a
proof of correctness of the repaired program. As a step toward integrating
programmer intent and intuition in automated program repair, we present a "
cost-aware" formulation - given a cost function associated with permissible
statement modifications, the goal is to ensure that the total program
modification cost does not exceed a given repair budget. As part of our
predicate abstraction-based solution framework, we present a sound and complete
algorithm for repair of Boolean programs. We have developed a prototype tool
based on SMT solving and used it successfully to repair diverse errors in
benchmark C programs.
| [
{
"version": "v1",
"created": "Sat, 27 Jul 2013 16:57:03 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Mar 2014 12:19:40 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Samanta",
"Roopsha",
""
],
[
"Olivo",
"Oswaldo",
""
],
[
"Emerson",
"E. Allen",
""
]
] | TITLE: Cost-Aware Automatic Program Repair
ABSTRACT: We present a formal framework for repairing infinite-state, imperative,
sequential programs, with (possibly recursive) procedures and multiple
assertions; the framework can generate repaired programs by modifying the
original erroneous program in multiple program locations, and can ensure the
readability of the repaired program using user-defined expression templates;
the framework also generates a set of inductive assertions that serve as a
proof of correctness of the repaired program. As a step toward integrating
programmer intent and intuition in automated program repair, we present a "
cost-aware" formulation - given a cost function associated with permissible
statement modifications, the goal is to ensure that the total program
modification cost does not exceed a given repair budget. As part of our
predicate abstraction-based solution framework, we present a sound and complete
algorithm for repair of Boolean programs. We have developed a prototype tool
based on SMT solving and used it successfully to repair diverse errors in
benchmark C programs.
|
1308.3892 | D\'aniel Kondor Mr | D\'aniel Kondor, M\'arton P\'osfai, Istv\'an Csabai and G\'abor Vattay | Do the rich get richer? An empirical analysis of the BitCoin transaction
network | Project website: http://www.vo.elte.hu/bitcoin/; updated after
publication | PLoS ONE 9(2): e86197, 2014 | 10.1371/journal.pone.0086197 | null | physics.soc-ph cs.SI q-fin.GN | http://creativecommons.org/licenses/by/3.0/ | The possibility to analyze everyday monetary transactions is limited by the
scarcity of available data, as this kind of information is usually considered
highly sensitive. Present econophysics models are usually employed on presumed
random networks of interacting agents, and only macroscopic properties (e.g.
the resulting wealth distribution) are compared to real-world data. In this
paper, we analyze BitCoin, which is a novel digital currency system, where the
complete list of transactions is publicly available. Using this dataset, we
reconstruct the network of transactions, and extract the time and amount of
each payment. We analyze the structure of the transaction network by measuring
network characteristics over time, such as the degree distribution, degree
correlations and clustering. We find that linear preferential attachment drives
the growth of the network. We also study the dynamics taking place on the
transaction network, i.e. the flow of money. We measure temporal patterns and
the wealth accumulation. Investigating the microscopic statistics of money
movement, we find that sublinear preferential attachment governs the evolution
of the wealth distribution. We report a scaling relation between the degree and
wealth associated to individual nodes.
| [
{
"version": "v1",
"created": "Sun, 18 Aug 2013 20:02:34 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Feb 2014 10:17:56 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Mar 2014 11:26:54 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Kondor",
"Dániel",
""
],
[
"Pósfai",
"Márton",
""
],
[
"Csabai",
"István",
""
],
[
"Vattay",
"Gábor",
""
]
] | TITLE: Do the rich get richer? An empirical analysis of the BitCoin transaction
network
ABSTRACT: The possibility to analyze everyday monetary transactions is limited by the
scarcity of available data, as this kind of information is usually considered
highly sensitive. Present econophysics models are usually employed on presumed
random networks of interacting agents, and only macroscopic properties (e.g.
the resulting wealth distribution) are compared to real-world data. In this
paper, we analyze BitCoin, which is a novel digital currency system, where the
complete list of transactions is publicly available. Using this dataset, we
reconstruct the network of transactions, and extract the time and amount of
each payment. We analyze the structure of the transaction network by measuring
network characteristics over time, such as the degree distribution, degree
correlations and clustering. We find that linear preferential attachment drives
the growth of the network. We also study the dynamics taking place on the
transaction network, i.e. the flow of money. We measure temporal patterns and
the wealth accumulation. Investigating the microscopic statistics of money
movement, we find that sublinear preferential attachment governs the evolution
of the wealth distribution. We report a scaling relation between the degree and
wealth associated to individual nodes.
|
1403.7654 | Anastasios Noulas Anastasios Noulas | Petko Georgiev, Anastasios Noulas and Cecilia Mascolo | Where Businesses Thrive: Predicting the Impact of the Olympic Games on
Local Retailers through Location-based Services Data | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Olympic Games are an important sporting event with notable consequences
for the general economic landscape of the host city. Traditional economic
assessments focus on the aggregated impact of the event on the national income,
but fail to provide micro-scale insights on why local businesses will benefit
from the increased activity during the Games. In this paper we provide a novel
approach to modeling the impact of the Olympic Games on local retailers by
analyzing a dataset mined from a large location-based social service,
Foursquare. We hypothesize that the spatial positioning of businesses as well
as the mobility trends of visitors are primary indicators of whether retailers
will rise their popularity during the event. To confirm this we formulate a
retail winners prediction task in the context of which we evaluate a set of
geographic and mobility metrics. We find that the proximity to stadiums, the
diversity of activity in the neighborhood, the nearby area sociability, as well
as the probability of customer flows from and to event places such as stadiums
and parks are all vital factors. Through supervised learning techniques we
demonstrate that the success of businesses hinges on a combination of both
geographic and mobility factors. Our results suggest that location-based social
networks, where crowdsourced information about the dynamic interaction of users
with urban spaces becomes publicly available, present an alternative medium to
assess the economic impact of large scale events in a city.
| [
{
"version": "v1",
"created": "Sat, 29 Mar 2014 18:02:42 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Georgiev",
"Petko",
""
],
[
"Noulas",
"Anastasios",
""
],
[
"Mascolo",
"Cecilia",
""
]
] | TITLE: Where Businesses Thrive: Predicting the Impact of the Olympic Games on
Local Retailers through Location-based Services Data
ABSTRACT: The Olympic Games are an important sporting event with notable consequences
for the general economic landscape of the host city. Traditional economic
assessments focus on the aggregated impact of the event on the national income,
but fail to provide micro-scale insights on why local businesses will benefit
from the increased activity during the Games. In this paper we provide a novel
approach to modeling the impact of the Olympic Games on local retailers by
analyzing a dataset mined from a large location-based social service,
Foursquare. We hypothesize that the spatial positioning of businesses as well
as the mobility trends of visitors are primary indicators of whether retailers
will rise their popularity during the event. To confirm this we formulate a
retail winners prediction task in the context of which we evaluate a set of
geographic and mobility metrics. We find that the proximity to stadiums, the
diversity of activity in the neighborhood, the nearby area sociability, as well
as the probability of customer flows from and to event places such as stadiums
and parks are all vital factors. Through supervised learning techniques we
demonstrate that the success of businesses hinges on a combination of both
geographic and mobility factors. Our results suggest that location-based social
networks, where crowdsourced information about the dynamic interaction of users
with urban spaces becomes publicly available, present an alternative medium to
assess the economic impact of large scale events in a city.
|
1403.7726 | Ayman I. Madbouly | Ayman I. Madbouly, Amr M. Gody, Tamer M. Barakat | Relevant Feature Selection Model Using Data Mining for Intrusion
Detection System | 12 Pages, 3 figures, 5 tables, Published with "International Journal
of Engineering Trends and Technology (IJETT)". arXiv admin note: text overlap
with arXiv:1208.5997 by other authors without attribution | International Journal of Engineering Trends and Technology
(IJETT), V9(10),501-512 March 2014 | 10.14445/22315381/IJETT-V9P296 | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network intrusions have become a significant threat in recent years as a
result of the increased demand of computer networks for critical systems.
Intrusion detection system (IDS) has been widely deployed as a defense measure
for computer networks. Features extracted from network traffic can be used as
sign to detect anomalies. However with the huge amount of network traffic,
collected data contains irrelevant and redundant features that affect the
detection rate of the IDS, consumes high amount of system resources, and
slowdown the training and testing process of the IDS. In this paper, a new
feature selection model is proposed; this model can effectively select the most
relevant features for intrusion detection. Our goal is to build a lightweight
intrusion detection system by using a reduced features set. Deleting irrelevant
and redundant features helps to build a faster training and testing process, to
have less resource consumption as well as to maintain high detection rates. The
effectiveness and the feasibility of our feature selection model were verified
by several experiments on KDD intrusion detection dataset. The experimental
results strongly showed that our model is not only able to yield high detection
rates but also to speed up the detection process.
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2014 09:41:17 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Madbouly",
"Ayman I.",
""
],
[
"Gody",
"Amr M.",
""
],
[
"Barakat",
"Tamer M.",
""
]
] | TITLE: Relevant Feature Selection Model Using Data Mining for Intrusion
Detection System
ABSTRACT: Network intrusions have become a significant threat in recent years as a
result of the increased demand of computer networks for critical systems.
Intrusion detection system (IDS) has been widely deployed as a defense measure
for computer networks. Features extracted from network traffic can be used as
sign to detect anomalies. However with the huge amount of network traffic,
collected data contains irrelevant and redundant features that affect the
detection rate of the IDS, consumes high amount of system resources, and
slowdown the training and testing process of the IDS. In this paper, a new
feature selection model is proposed; this model can effectively select the most
relevant features for intrusion detection. Our goal is to build a lightweight
intrusion detection system by using a reduced features set. Deleting irrelevant
and redundant features helps to build a faster training and testing process, to
have less resource consumption as well as to maintain high detection rates. The
effectiveness and the feasibility of our feature selection model were verified
by several experiments on KDD intrusion detection dataset. The experimental
results strongly showed that our model is not only able to yield high detection
rates but also to speed up the detection process.
|
1403.7793 | Xin-She Yang | Xin-She Yang, Christian Huyck, Mehmet Karamanoglu, Nawaz Khan | True Global Optimality of the Pressure Vessel Design Problem: A
Benchmark for Bio-Inspired Optimisation Algorithms | null | X.-S. Yang et al., Int. J. Bio-Inspired Computation, vol. 5, no.
6, pp. 329-335 (2013) | 10.4018/jdsst.2013040103 | null | math.OC cs.NE nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The pressure vessel design problem is a well-known design benchmark for
validating bio-inspired optimization algorithms. However, its global optimality
is not clear and there has been no mathematical proof put forward. In this
paper, a detailed mathematical analysis of this problem is provided that proves
that 6059.714335048436 is the global minimum. The Lagrange multiplier method is
also used as an alternative proof and this method is extended to find the
global optimum of a cantilever beam design problem.
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2014 18:11:44 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Yang",
"Xin-She",
""
],
[
"Huyck",
"Christian",
""
],
[
"Karamanoglu",
"Mehmet",
""
],
[
"Khan",
"Nawaz",
""
]
] | TITLE: True Global Optimality of the Pressure Vessel Design Problem: A
Benchmark for Bio-Inspired Optimisation Algorithms
ABSTRACT: The pressure vessel design problem is a well-known design benchmark for
validating bio-inspired optimization algorithms. However, its global optimality
is not clear and there has been no mathematical proof put forward. In this
paper, a detailed mathematical analysis of this problem is provided that proves
that 6059.714335048436 is the global minimum. The Lagrange multiplier method is
also used as an alternative proof and this method is extended to find the
global optimum of a cantilever beam design problem.
|
1403.7872 | Manzil Zaheer | Chenjie Gu, Manzil Zaheer and Xin Li | Multiple-Population Moment Estimation: Exploiting Inter-Population
Correlation for Efficient Moment Estimation in Analog/Mixed-Signal Validation | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Moment estimation is an important problem during circuit validation, in both
pre-Silicon and post-Silicon stages. From the estimated moments, the
probability of failure and parametric yield can be estimated at each circuit
configuration and corner, and these metrics are used for design optimization
and making product qualification decisions. The problem is especially difficult
if only a very small sample size is allowed for measurement or simulation, as
is the case for complex analog/mixed-signal circuits. In this paper, we propose
an efficient moment estimation method, called Multiple-Population Moment
Estimation (MPME), that significantly improves estimation accuracy under small
sample size. The key idea is to leverage the data collected under different
corners/configurations to improve the accuracy of moment estimation at each
individual corner/configuration. Mathematically, we employ the hierarchical
Bayesian framework to exploit the underlying correlation in the data. We apply
the proposed method to several datasets including post-silicon measurements of
a commercial high-speed I/O link, and demonstrate an average error reduction of
up to 2$\times$, which can be equivalently translated to significant reduction
of validation time and cost.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2014 05:23:09 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Gu",
"Chenjie",
""
],
[
"Zaheer",
"Manzil",
""
],
[
"Li",
"Xin",
""
]
] | TITLE: Multiple-Population Moment Estimation: Exploiting Inter-Population
Correlation for Efficient Moment Estimation in Analog/Mixed-Signal Validation
ABSTRACT: Moment estimation is an important problem during circuit validation, in both
pre-Silicon and post-Silicon stages. From the estimated moments, the
probability of failure and parametric yield can be estimated at each circuit
configuration and corner, and these metrics are used for design optimization
and making product qualification decisions. The problem is especially difficult
if only a very small sample size is allowed for measurement or simulation, as
is the case for complex analog/mixed-signal circuits. In this paper, we propose
an efficient moment estimation method, called Multiple-Population Moment
Estimation (MPME), that significantly improves estimation accuracy under small
sample size. The key idea is to leverage the data collected under different
corners/configurations to improve the accuracy of moment estimation at each
individual corner/configuration. Mathematically, we employ the hierarchical
Bayesian framework to exploit the underlying correlation in the data. We apply
the proposed method to several datasets including post-silicon measurements of
a commercial high-speed I/O link, and demonstrate an average error reduction of
up to 2$\times$, which can be equivalently translated to significant reduction
of validation time and cost.
|
1403.8020 | Ashkan Tousimojarad Mr | Ashkan Tousimojarad and Wim Vanderbauwhede | An Efficient Thread Mapping Strategy for Multiprogramming on Manycore
Processors | ParCo Conference, Munich, Germany, 2013 | Parallel Computing: Accelerating Computational Science and
Engineering (CSE) 25 (2014) 63-71 | 10.3233/978-1-61499-381-0-63 | null | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The emergence of multicore and manycore processors is set to change the
parallel computing world. Applications are shifting towards increased
parallelism in order to utilise these architectures efficiently. This leads to
a situation where every application creates its desirable number of threads,
based on its parallel nature and the system resources allowance. Task
scheduling in such a multithreaded multiprogramming environment is a
significant challenge. In task scheduling, not only the order of the execution,
but also the mapping of threads to the execution resources is of a great
importance. In this paper we state and discuss some fundamental rules based on
results obtained from selected applications of the BOTS benchmarks on the
64-core TILEPro64 processor. We demonstrate how previously efficient mapping
policies such as those of the SMP Linux scheduler become inefficient when the
number of threads and cores grows. We propose a novel, low-overhead technique,
a heuristic based on the amount of time spent by each CPU doing some useful
work, to fairly distribute the workloads amongst the cores in a
multiprogramming environment. Our novel approach could be implemented as a
pragma similar to those in the new task-based OpenMP versions, or can be
incorporated as a distributed thread mapping mechanism in future manycore
programming frameworks. We show that our thread mapping scheme can outperform
the native GNU/Linux thread scheduler in both single-programming and
multiprogramming environments.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2014 14:40:02 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Tousimojarad",
"Ashkan",
""
],
[
"Vanderbauwhede",
"Wim",
""
]
] | TITLE: An Efficient Thread Mapping Strategy for Multiprogramming on Manycore
Processors
ABSTRACT: The emergence of multicore and manycore processors is set to change the
parallel computing world. Applications are shifting towards increased
parallelism in order to utilise these architectures efficiently. This leads to
a situation where every application creates its desirable number of threads,
based on its parallel nature and the system resources allowance. Task
scheduling in such a multithreaded multiprogramming environment is a
significant challenge. In task scheduling, not only the order of the execution,
but also the mapping of threads to the execution resources is of a great
importance. In this paper we state and discuss some fundamental rules based on
results obtained from selected applications of the BOTS benchmarks on the
64-core TILEPro64 processor. We demonstrate how previously efficient mapping
policies such as those of the SMP Linux scheduler become inefficient when the
number of threads and cores grows. We propose a novel, low-overhead technique,
a heuristic based on the amount of time spent by each CPU doing some useful
work, to fairly distribute the workloads amongst the cores in a
multiprogramming environment. Our novel approach could be implemented as a
pragma similar to those in the new task-based OpenMP versions, or can be
incorporated as a distributed thread mapping mechanism in future manycore
programming frameworks. We show that our thread mapping scheme can outperform
the native GNU/Linux thread scheduler in both single-programming and
multiprogramming environments.
|
1403.8084 | Smriti Bhagat | Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat,
Nadia Fawaz, Nina Taft | Privacy Tradeoffs in Predictive Analytics | Extended version of the paper appearing in SIGMETRICS 2014 | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online services routinely mine user data to predict user preferences, make
recommendations, and place targeted ads. Recent research has demonstrated that
several private user attributes (such as political affiliation, sexual
orientation, and gender) can be inferred from such data. Can a
privacy-conscious user benefit from personalization while simultaneously
protecting her private attributes? We study this question in the context of a
rating prediction service based on matrix factorization. We construct a
protocol of interactions between the service and users that has remarkable
optimality properties: it is privacy-preserving, in that no inference algorithm
can succeed in inferring a user's private attribute with a probability better
than random guessing; it has maximal accuracy, in that no other
privacy-preserving protocol improves rating prediction; and, finally, it
involves a minimal disclosure, as the prediction accuracy strictly decreases
when the service reveals less information. We extensively evaluate our protocol
using several rating datasets, demonstrating that it successfully blocks the
inference of gender, age and political affiliation, while incurring less than
5% decrease in the accuracy of rating prediction.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2014 16:53:04 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Ioannidis",
"Stratis",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Weinsberg",
"Udi",
""
],
[
"Bhagat",
"Smriti",
""
],
[
"Fawaz",
"Nadia",
""
],
[
"Taft",
"Nina",
""
]
] | TITLE: Privacy Tradeoffs in Predictive Analytics
ABSTRACT: Online services routinely mine user data to predict user preferences, make
recommendations, and place targeted ads. Recent research has demonstrated that
several private user attributes (such as political affiliation, sexual
orientation, and gender) can be inferred from such data. Can a
privacy-conscious user benefit from personalization while simultaneously
protecting her private attributes? We study this question in the context of a
rating prediction service based on matrix factorization. We construct a
protocol of interactions between the service and users that has remarkable
optimality properties: it is privacy-preserving, in that no inference algorithm
can succeed in inferring a user's private attribute with a probability better
than random guessing; it has maximal accuracy, in that no other
privacy-preserving protocol improves rating prediction; and, finally, it
involves a minimal disclosure, as the prediction accuracy strictly decreases
when the service reveals less information. We extensively evaluate our protocol
using several rating datasets, demonstrating that it successfully blocks the
inference of gender, age and political affiliation, while incurring less than
5% decrease in the accuracy of rating prediction.
|
1403.8105 | Jamie Portsmouth | David Koerner, Jamie Portsmouth, Filip Sadlo, Thomas Ertl, and Bernd
Eberhardt | Flux-Limited Diffusion for Multiple Scattering in Participating Media | Accepted in Computer Graphics Forum | null | 10.1111/cgf.12342 | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the rendering of multiple scattering effects in participating media,
methods based on the diffusion approximation are an extremely efficient
alternative to Monte Carlo path tracing. However, in sufficiently transparent
regions, classical diffusion approximation suffers from non-physical radiative
fluxes which leads to a poor match to correct light transport. In particular,
this prevents the application of classical diffusion approximation to
heterogeneous media, where opaque material is embedded within transparent
regions. To address this limitation, we introduce flux-limited diffusion, a
technique from the astrophysics domain. This method provides a better
approximation to light transport than classical diffusion approximation,
particularly when applied to heterogeneous media, and hence broadens the
applicability of diffusion-based techniques. We provide an algorithm for
flux-limited diffusion, which is validated using the transport theory for a
point light source in an infinite homogeneous medium. We further demonstrate
that our implementation of flux-limited diffusion produces more accurate
renderings of multiple scattering in various heterogeneous datasets than
classical diffusion approximation, by comparing both methods to ground truth
renderings obtained via volumetric path tracing.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2014 17:54:34 GMT"
}
] | 2014-04-01T00:00:00 | [
[
"Koerner",
"David",
""
],
[
"Portsmouth",
"Jamie",
""
],
[
"Sadlo",
"Filip",
""
],
[
"Ertl",
"Thomas",
""
],
[
"Eberhardt",
"Bernd",
""
]
] | TITLE: Flux-Limited Diffusion for Multiple Scattering in Participating Media
ABSTRACT: For the rendering of multiple scattering effects in participating media,
methods based on the diffusion approximation are an extremely efficient
alternative to Monte Carlo path tracing. However, in sufficiently transparent
regions, classical diffusion approximation suffers from non-physical radiative
fluxes which leads to a poor match to correct light transport. In particular,
this prevents the application of classical diffusion approximation to
heterogeneous media, where opaque material is embedded within transparent
regions. To address this limitation, we introduce flux-limited diffusion, a
technique from the astrophysics domain. This method provides a better
approximation to light transport than classical diffusion approximation,
particularly when applied to heterogeneous media, and hence broadens the
applicability of diffusion-based techniques. We provide an algorithm for
flux-limited diffusion, which is validated using the transport theory for a
point light source in an infinite homogeneous medium. We further demonstrate
that our implementation of flux-limited diffusion produces more accurate
renderings of multiple scattering in various heterogeneous datasets than
classical diffusion approximation, by comparing both methods to ground truth
renderings obtained via volumetric path tracing.
|
1307.5161 | Xavier Boix | Gemma Roig, Xavier Boix, Luc Van Gool | Random Binary Mappings for Kernel Learning and Efficient SVM | null | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Support Vector Machines (SVMs) are powerful learners that have led to
state-of-the-art results in various computer vision problems. SVMs suffer from
various drawbacks in terms of selecting the right kernel, which depends on the
image descriptors, as well as computational and memory efficiency. This paper
introduces a novel kernel, which serves such issues well. The kernel is learned
by exploiting a large amount of low-complex, randomized binary mappings of the
input feature. This leads to an efficient SVM, while also alleviating the task
of kernel selection. We demonstrate the capabilities of our kernel on 6
standard vision benchmarks, in which we combine several common image
descriptors, namely histograms (Flowers17 and Daimler), attribute-like
descriptors (UCI, OSR, and a-VOC08), and Sparse Quantization (ImageNet).
Results show that our kernel learning adapts well to the different descriptors
types, achieving the performance of the kernels specifically tuned for each
image descriptor, and with similar evaluation cost as efficient SVM methods.
| [
{
"version": "v1",
"created": "Fri, 19 Jul 2013 08:47:32 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Mar 2014 08:49:17 GMT"
}
] | 2014-03-31T00:00:00 | [
[
"Roig",
"Gemma",
""
],
[
"Boix",
"Xavier",
""
],
[
"Van Gool",
"Luc",
""
]
] | TITLE: Random Binary Mappings for Kernel Learning and Efficient SVM
ABSTRACT: Support Vector Machines (SVMs) are powerful learners that have led to
state-of-the-art results in various computer vision problems. SVMs suffer from
various drawbacks in terms of selecting the right kernel, which depends on the
image descriptors, as well as computational and memory efficiency. This paper
introduces a novel kernel, which serves such issues well. The kernel is learned
by exploiting a large amount of low-complex, randomized binary mappings of the
input feature. This leads to an efficient SVM, while also alleviating the task
of kernel selection. We demonstrate the capabilities of our kernel on 6
standard vision benchmarks, in which we combine several common image
descriptors, namely histograms (Flowers17 and Daimler), attribute-like
descriptors (UCI, OSR, and a-VOC08), and Sparse Quantization (ImageNet).
Results show that our kernel learning adapts well to the different descriptors
types, achieving the performance of the kernels specifically tuned for each
image descriptor, and with similar evaluation cost as efficient SVM methods.
|
1312.5785 | Du Tran | Du Tran and Lorenzo Torresani | EXMOVES: Classifier-based Features for Scalable Action Recognition | In Proceedings of the 2nd International Conference on Learning
Representations, Banff, Canada, 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces EXMOVES, learned exemplar-based features for efficient
recognition of actions in videos. The entries in our descriptor are produced by
evaluating a set of movement classifiers over spatial-temporal volumes of the
input sequence. Each movement classifier is a simple exemplar-SVM trained on
low-level features, i.e., an SVM learned using a single annotated positive
space-time volume and a large number of unannotated videos.
Our representation offers two main advantages. First, since our mid-level
features are learned from individual video exemplars, they require minimal
amount of supervision. Second, we show that simple linear classification models
trained on our global video descriptor yield action recognition accuracy
approaching the state-of-the-art but at orders of magnitude lower cost, since
at test-time no sliding window is necessary and linear models are efficient to
train and test. This enables scalable action recognition, i.e., efficient
classification of a large number of different actions even in large video
databases. We show the generality of our approach by building our mid-level
descriptors from two different low-level feature representations. The accuracy
and efficiency of the approach are demonstrated on several large-scale action
recognition benchmarks.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 00:37:16 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Dec 2013 19:58:48 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Mar 2014 01:55:14 GMT"
}
] | 2014-03-31T00:00:00 | [
[
"Tran",
"Du",
""
],
[
"Torresani",
"Lorenzo",
""
]
] | TITLE: EXMOVES: Classifier-based Features for Scalable Action Recognition
ABSTRACT: This paper introduces EXMOVES, learned exemplar-based features for efficient
recognition of actions in videos. The entries in our descriptor are produced by
evaluating a set of movement classifiers over spatial-temporal volumes of the
input sequence. Each movement classifier is a simple exemplar-SVM trained on
low-level features, i.e., an SVM learned using a single annotated positive
space-time volume and a large number of unannotated videos.
Our representation offers two main advantages. First, since our mid-level
features are learned from individual video exemplars, they require minimal
amount of supervision. Second, we show that simple linear classification models
trained on our global video descriptor yield action recognition accuracy
approaching the state-of-the-art but at orders of magnitude lower cost, since
at test-time no sliding window is necessary and linear models are efficient to
train and test. This enables scalable action recognition, i.e., efficient
classification of a large number of different actions even in large video
databases. We show the generality of our approach by building our mid-level
descriptors from two different low-level feature representations. The accuracy
and efficiency of the approach are demonstrated on several large-scale action
recognition benchmarks.
|
1403.7291 | Roshan Ragel | R. G. Ragel, Swarnalatha Radhakrishnan and Angelo Ambrose | Instruction-set Selection for Multi-application based ASIP Design: An
Instruction-level Study | null | Information and Automation for Sustainability (ICIAfS), 2012 IEEE
6th International Conference on, 27-29 Sept 2012, pp 141-146, Beijing | 10.1109/ICIAFS.2012.6419895 | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficiency in embedded systems is paramount to achieve high performance while
consuming less area and power. Processors in embedded systems have to be
designed carefully to achieve such design constraints. Application Specific
Instruction set Processors (ASIPs) exploit the nature of applications to design
an optimal instruction set. Despite being not general to execute any
application, ASIPs are highly preferred in the embedded systems industry where
the devices are produced to satisfy a certain type of application domain/s
(either intra-domain or inter-domain). Typically, ASIPs are designed from a
base-processor and functionalities are added for applications. This paper
studies the multi-application ASIPs and their instruction sets, extensively
analysing the instructions for inter-domain and intra-domain designs. Metrics
analysed are the reusable instructions and the extra cost to add a certain
application. A wide range of applications from various application benchmarks
(MiBench, MediaBench and SPEC2006) and domains are analysed for two different
architectures (ARM-Thumb and PISA). Our study shows that the intra-domain
applications contain larger number of common instructions, whereas the
inter-domain applications have very less common instructions, regardless of the
architecture (and therefore the ISA).
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2014 07:35:09 GMT"
}
] | 2014-03-31T00:00:00 | [
[
"Ragel",
"R. G.",
""
],
[
"Radhakrishnan",
"Swarnalatha",
""
],
[
"Ambrose",
"Angelo",
""
]
] | TITLE: Instruction-set Selection for Multi-application based ASIP Design: An
Instruction-level Study
ABSTRACT: Efficiency in embedded systems is paramount to achieve high performance while
consuming less area and power. Processors in embedded systems have to be
designed carefully to achieve such design constraints. Application Specific
Instruction set Processors (ASIPs) exploit the nature of applications to design
an optimal instruction set. Despite being not general to execute any
application, ASIPs are highly preferred in the embedded systems industry where
the devices are produced to satisfy a certain type of application domain/s
(either intra-domain or inter-domain). Typically, ASIPs are designed from a
base-processor and functionalities are added for applications. This paper
studies the multi-application ASIPs and their instruction sets, extensively
analysing the instructions for inter-domain and intra-domain designs. Metrics
analysed are the reusable instructions and the extra cost to add a certain
application. A wide range of applications from various application benchmarks
(MiBench, MediaBench and SPEC2006) and domains are analysed for two different
architectures (ARM-Thumb and PISA). Our study shows that the intra-domain
applications contain larger number of common instructions, whereas the
inter-domain applications have very less common instructions, regardless of the
architecture (and therefore the ISA).
|
1403.7315 | Chuan Shi | Yitong Li, Chuan Shi, Philip S. Yu, and Qing Chen | HRank: A Path based Ranking Framework in Heterogeneous Information
Network | 12 pages, 11 figures | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, there is a surge of interests on heterogeneous information network
analysis. As a newly emerging network model, heterogeneous information networks
have many unique features (e.g., complex structure and rich semantics) and a
number of interesting data mining tasks have been exploited in this kind of
networks, such as similarity measure, clustering, and classification. Although
evaluating the importance of objects has been well studied in homogeneous
networks, it is not yet exploited in heterogeneous networks. In this paper, we
study the ranking problem in heterogeneous networks and propose the HRank
framework to evaluate the importance of multiple types of objects and meta
paths. Since the importance of objects depends upon the meta paths in
heterogeneous networks, HRank develops a path based random walk process.
Moreover, a constrained meta path is proposed to subtly capture the rich
semantics in heterogeneous networks. Furthermore, HRank can simultaneously
determine the importance of objects and meta paths through applying the tensor
analysis. Extensive experiments on three real datasets show that HRank can
effectively evaluate the importance of objects and paths together. Moreover,
the constrained meta path shows its potential on mining subtle semantics by
obtaining more accurate ranking results.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2014 09:31:43 GMT"
}
] | 2014-03-31T00:00:00 | [
[
"Li",
"Yitong",
""
],
[
"Shi",
"Chuan",
""
],
[
"Yu",
"Philip S.",
""
],
[
"Chen",
"Qing",
""
]
] | TITLE: HRank: A Path based Ranking Framework in Heterogeneous Information
Network
ABSTRACT: Recently, there is a surge of interests on heterogeneous information network
analysis. As a newly emerging network model, heterogeneous information networks
have many unique features (e.g., complex structure and rich semantics) and a
number of interesting data mining tasks have been exploited in this kind of
networks, such as similarity measure, clustering, and classification. Although
evaluating the importance of objects has been well studied in homogeneous
networks, it is not yet exploited in heterogeneous networks. In this paper, we
study the ranking problem in heterogeneous networks and propose the HRank
framework to evaluate the importance of multiple types of objects and meta
paths. Since the importance of objects depends upon the meta paths in
heterogeneous networks, HRank develops a path based random walk process.
Moreover, a constrained meta path is proposed to subtly capture the rich
semantics in heterogeneous networks. Furthermore, HRank can simultaneously
determine the importance of objects and meta paths through applying the tensor
analysis. Extensive experiments on three real datasets show that HRank can
effectively evaluate the importance of objects and paths together. Moreover,
the constrained meta path shows its potential on mining subtle semantics by
obtaining more accurate ranking results.
|
1403.7373 | Radek Pel\'anek | Radek Pel\'anek | Difficulty Rating of Sudoku Puzzles: An Overview and Evaluation | 24 pages | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How can we predict the difficulty of a Sudoku puzzle? We give an overview of
difficulty rating metrics and evaluate them on extensive dataset on human
problem solving (more then 1700 Sudoku puzzles, hundreds of solvers). The best
results are obtained using a computational model of human solving activity.
Using the model we show that there are two sources of the problem difficulty:
complexity of individual steps (logic operations) and structure of dependency
among steps. We also describe metrics based on analysis of solutions under
relaxed constraints -- a novel approach inspired by phase transition phenomenon
in the graph coloring problem. In our discussion we focus not just on the
performance of individual metrics on the Sudoku puzzle, but also on their
generalizability and applicability to other problems.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2014 13:43:50 GMT"
}
] | 2014-03-31T00:00:00 | [
[
"Pelánek",
"Radek",
""
]
] | TITLE: Difficulty Rating of Sudoku Puzzles: An Overview and Evaluation
ABSTRACT: How can we predict the difficulty of a Sudoku puzzle? We give an overview of
difficulty rating metrics and evaluate them on extensive dataset on human
problem solving (more then 1700 Sudoku puzzles, hundreds of solvers). The best
results are obtained using a computational model of human solving activity.
Using the model we show that there are two sources of the problem difficulty:
complexity of individual steps (logic operations) and structure of dependency
among steps. We also describe metrics based on analysis of solutions under
relaxed constraints -- a novel approach inspired by phase transition phenomenon
in the graph coloring problem. In our discussion we focus not just on the
performance of individual metrics on the Sudoku puzzle, but also on their
generalizability and applicability to other problems.
|
1403.6950 | Manuel Marin-Jimenez | F.M. Castro and M.J. Marin-Jimenez and R. Medina-Carnicer | Pyramidal Fisher Motion for Multiview Gait Recognition | Submitted to International Conference on Pattern Recognition, ICPR,
2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is to identify individuals by analyzing their gait.
Instead of using binary silhouettes as input data (as done in many previous
works) we propose and evaluate the use of motion descriptors based on densely
sampled short-term trajectories. We take advantage of state-of-the-art people
detectors to define custom spatial configurations of the descriptors around the
target person. Thus, obtaining a pyramidal representation of the gait motion.
The local motion features (described by the Divergence-Curl-Shear descriptor)
extracted on the different spatial areas of the person are combined into a
single high-level gait descriptor by using the Fisher Vector encoding. The
proposed approach, coined Pyramidal Fisher Motion, is experimentally validated
on the recent `AVA Multiview Gait' dataset. The results show that this new
approach achieves promising results in the problem of gait recognition.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2014 08:39:31 GMT"
}
] | 2014-03-28T00:00:00 | [
[
"Castro",
"F. M.",
""
],
[
"Marin-Jimenez",
"M. J.",
""
],
[
"Medina-Carnicer",
"R.",
""
]
] | TITLE: Pyramidal Fisher Motion for Multiview Gait Recognition
ABSTRACT: The goal of this paper is to identify individuals by analyzing their gait.
Instead of using binary silhouettes as input data (as done in many previous
works) we propose and evaluate the use of motion descriptors based on densely
sampled short-term trajectories. We take advantage of state-of-the-art people
detectors to define custom spatial configurations of the descriptors around the
target person. Thus, obtaining a pyramidal representation of the gait motion.
The local motion features (described by the Divergence-Curl-Shear descriptor)
extracted on the different spatial areas of the person are combined into a
single high-level gait descriptor by using the Fisher Vector encoding. The
proposed approach, coined Pyramidal Fisher Motion, is experimentally validated
on the recent `AVA Multiview Gait' dataset. The results show that this new
approach achieves promising results in the problem of gait recognition.
|
1403.7057 | Alexander Kolesnikov | Alexander Kolesnikov, Matthieu Guillaumin, Vittorio Ferrari and
Christoph H. Lampert | Closed-Form Training of Conditional Random Fields for Large Scale Image
Segmentation | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present LS-CRF, a new method for very efficient large-scale training of
Conditional Random Fields (CRFs). It is inspired by existing closed-form
expressions for the maximum likelihood parameters of a generative graphical
model with tree topology. LS-CRF training requires only solving a set of
independent regression problems, for which closed-form expression as well as
efficient iterative solvers are available. This makes it orders of magnitude
faster than conventional maximum likelihood learning for CRFs that require
repeated runs of probabilistic inference. At the same time, the models learned
by our method still allow for joint inference at test time. We apply LS-CRF to
the task of semantic image segmentation, showing that it is highly efficient,
even for loopy models where probabilistic inference is problematic. It allows
the training of image segmentation models from significantly larger training
sets than had been used previously. We demonstrate this on two new datasets
that form a second contribution of this paper. They consist of over 180,000
images with figure-ground segmentation annotations. Our large-scale experiments
show that the possibilities of CRF-based image segmentation are far from
exhausted, indicating, for example, that semi-supervised learning and the use
of non-linear predictors are promising directions for achieving higher
segmentation accuracy in the future.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2014 14:38:23 GMT"
}
] | 2014-03-28T00:00:00 | [
[
"Kolesnikov",
"Alexander",
""
],
[
"Guillaumin",
"Matthieu",
""
],
[
"Ferrari",
"Vittorio",
""
],
[
"Lampert",
"Christoph H.",
""
]
] | TITLE: Closed-Form Training of Conditional Random Fields for Large Scale Image
Segmentation
ABSTRACT: We present LS-CRF, a new method for very efficient large-scale training of
Conditional Random Fields (CRFs). It is inspired by existing closed-form
expressions for the maximum likelihood parameters of a generative graphical
model with tree topology. LS-CRF training requires only solving a set of
independent regression problems, for which closed-form expression as well as
efficient iterative solvers are available. This makes it orders of magnitude
faster than conventional maximum likelihood learning for CRFs that require
repeated runs of probabilistic inference. At the same time, the models learned
by our method still allow for joint inference at test time. We apply LS-CRF to
the task of semantic image segmentation, showing that it is highly efficient,
even for loopy models where probabilistic inference is problematic. It allows
the training of image segmentation models from significantly larger training
sets than had been used previously. We demonstrate this on two new datasets
that form a second contribution of this paper. They consist of over 180,000
images with figure-ground segmentation annotations. Our large-scale experiments
show that the possibilities of CRF-based image segmentation are far from
exhausted, indicating, for example, that semi-supervised learning and the use
of non-linear predictors are promising directions for achieving higher
segmentation accuracy in the future.
|
1311.4082 | Joel Leibo | Qianli Liao, Joel Z Leibo, Youssef Mroueh, Tomaso Poggio | Can a biologically-plausible hierarchy effectively replace face
detection, alignment, and recognition pipelines? | 11 Pages, 4 Figures. Mar 26, (2014): Improved exposition. Added CBMM
memo cover page. No substantive changes | null | null | CBMM-003 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The standard approach to unconstrained face recognition in natural
photographs is via a detection, alignment, recognition pipeline. While that
approach has achieved impressive results, there are several reasons to be
dissatisfied with it, among them is its lack of biological plausibility. A
recent theory of invariant recognition by feedforward hierarchical networks,
like HMAX, other convolutional networks, or possibly the ventral stream,
implies an alternative approach to unconstrained face recognition. This
approach accomplishes detection and alignment implicitly by storing
transformations of training images (called templates) rather than explicitly
detecting and aligning faces at test time. Here we propose a particular
locality-sensitive hashing based voting scheme which we call "consensus of
collisions" and show that it can be used to approximate the full 3-layer
hierarchy implied by the theory. The resulting end-to-end system for
unconstrained face recognition operates on photographs of faces taken under
natural conditions, e.g., Labeled Faces in the Wild (LFW), without aligning or
cropping them, as is normally done. It achieves a drastic improvement in the
state of the art on this end-to-end task, reaching the same level of
performance as the best systems operating on aligned, closely cropped images
(no outside training data). It also performs well on two newer datasets,
similar to LFW, but more difficult: LFW-jittered (new here) and SUFR-W.
| [
{
"version": "v1",
"created": "Sat, 16 Nov 2013 17:49:31 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Nov 2013 10:25:29 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Mar 2014 10:11:42 GMT"
}
] | 2014-03-27T00:00:00 | [
[
"Liao",
"Qianli",
""
],
[
"Leibo",
"Joel Z",
""
],
[
"Mroueh",
"Youssef",
""
],
[
"Poggio",
"Tomaso",
""
]
] | TITLE: Can a biologically-plausible hierarchy effectively replace face
detection, alignment, and recognition pipelines?
ABSTRACT: The standard approach to unconstrained face recognition in natural
photographs is via a detection, alignment, recognition pipeline. While that
approach has achieved impressive results, there are several reasons to be
dissatisfied with it, among them is its lack of biological plausibility. A
recent theory of invariant recognition by feedforward hierarchical networks,
like HMAX, other convolutional networks, or possibly the ventral stream,
implies an alternative approach to unconstrained face recognition. This
approach accomplishes detection and alignment implicitly by storing
transformations of training images (called templates) rather than explicitly
detecting and aligning faces at test time. Here we propose a particular
locality-sensitive hashing based voting scheme which we call "consensus of
collisions" and show that it can be used to approximate the full 3-layer
hierarchy implied by the theory. The resulting end-to-end system for
unconstrained face recognition operates on photographs of faces taken under
natural conditions, e.g., Labeled Faces in the Wild (LFW), without aligning or
cropping them, as is normally done. It achieves a drastic improvement in the
state of the art on this end-to-end task, reaching the same level of
performance as the best systems operating on aligned, closely cropped images
(no outside training data). It also performs well on two newer datasets,
similar to LFW, but more difficult: LFW-jittered (new here) and SUFR-W.
|
1311.4529 | Afroza Sultana | Afroza Sultana, Naeemul Hassan, Chengkai Li, Jun Yang, Cong Yu | Incremental Discovery of Prominent Situational Facts | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the novel problem of finding new, prominent situational facts, which
are emerging statements about objects that stand out within certain contexts.
Many such facts are newsworthy---e.g., an athlete's outstanding performance in
a game, or a viral video's impressive popularity. Effective and efficient
identification of these facts assists journalists in reporting, one of the main
goals of computational journalism. Technically, we consider an ever-growing
table of objects with dimension and measure attributes. A situational fact is a
"contextual" skyline tuple that stands out against historical tuples in a
context, specified by a conjunctive constraint involving dimension attributes,
when a set of measure attributes are compared. New tuples are constantly added
to the table, reflecting events happening in the real world. Our goal is to
discover constraint-measure pairs that qualify a new tuple as a contextual
skyline tuple, and discover them quickly before the event becomes yesterday's
news. A brute-force approach requires exhaustive comparison with every tuple,
under every constraint, and in every measure subspace. We design algorithms in
response to these challenges using three corresponding ideas---tuple reduction,
constraint pruning, and sharing computation across measure subspaces. We also
adopt a simple prominence measure to rank the discovered facts when they are
numerous. Experiments over two real datasets validate the effectiveness and
efficiency of our techniques.
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2013 20:44:13 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Mar 2014 16:43:25 GMT"
}
] | 2014-03-27T00:00:00 | [
[
"Sultana",
"Afroza",
""
],
[
"Hassan",
"Naeemul",
""
],
[
"Li",
"Chengkai",
""
],
[
"Yang",
"Jun",
""
],
[
"Yu",
"Cong",
""
]
] | TITLE: Incremental Discovery of Prominent Situational Facts
ABSTRACT: We study the novel problem of finding new, prominent situational facts, which
are emerging statements about objects that stand out within certain contexts.
Many such facts are newsworthy---e.g., an athlete's outstanding performance in
a game, or a viral video's impressive popularity. Effective and efficient
identification of these facts assists journalists in reporting, one of the main
goals of computational journalism. Technically, we consider an ever-growing
table of objects with dimension and measure attributes. A situational fact is a
"contextual" skyline tuple that stands out against historical tuples in a
context, specified by a conjunctive constraint involving dimension attributes,
when a set of measure attributes are compared. New tuples are constantly added
to the table, reflecting events happening in the real world. Our goal is to
discover constraint-measure pairs that qualify a new tuple as a contextual
skyline tuple, and discover them quickly before the event becomes yesterday's
news. A brute-force approach requires exhaustive comparison with every tuple,
under every constraint, and in every measure subspace. We design algorithms in
response to these challenges using three corresponding ideas---tuple reduction,
constraint pruning, and sharing computation across measure subspaces. We also
adopt a simple prominence measure to rank the discovered facts when they are
numerous. Experiments over two real datasets validate the effectiveness and
efficiency of our techniques.
|
1311.2008 | Matus Medo | Matus Medo | Statistical validation of high-dimensional models of growing networks | 8 pages, 5 figures, 2 tables | Phys. Rev. E 89, 032801, 2014 | 10.1103/PhysRevE.89.032801 | null | physics.soc-ph cs.SI physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The abundance of models of complex networks and the current insufficient
validation standards make it difficult to judge which models are strongly
supported by data and which are not. We focus here on likelihood maximization
methods for models of growing networks with many parameters and compare their
performance on artificial and real datasets. While high dimensionality of the
parameter space harms the performance of direct likelihood maximization on
artificial data, this can be improved by introducing a suitable penalization
term. Likelihood maximization on real data shows that the presented approach is
able to discriminate among available network models. To make large-scale
datasets accessible to this kind of analysis, we propose a subset sampling
technique and show that it yields substantial model evidence in a fraction of
time necessary for the analysis of the complete data.
| [
{
"version": "v1",
"created": "Fri, 8 Nov 2013 16:09:08 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jan 2014 13:16:06 GMT"
}
] | 2014-03-26T00:00:00 | [
[
"Medo",
"Matus",
""
]
] | TITLE: Statistical validation of high-dimensional models of growing networks
ABSTRACT: The abundance of models of complex networks and the current insufficient
validation standards make it difficult to judge which models are strongly
supported by data and which are not. We focus here on likelihood maximization
methods for models of growing networks with many parameters and compare their
performance on artificial and real datasets. While high dimensionality of the
parameter space harms the performance of direct likelihood maximization on
artificial data, this can be improved by introducing a suitable penalization
term. Likelihood maximization on real data shows that the presented approach is
able to discriminate among available network models. To make large-scale
datasets accessible to this kind of analysis, we propose a subset sampling
technique and show that it yields substantial model evidence in a fraction of
time necessary for the analysis of the complete data.
|
1403.6270 | Alessio Guerrieri | Alessio Guerrieri, Alberto Montresor | Distributed Edge Partitioning for Graph Processing | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The availability of larger and larger graph datasets, growing exponentially
over the years, has created several new algorithmic challenges to be addressed.
Sequential approaches have become unfeasible, while interest on parallel and
distributed algorithms has greatly increased.
Appropriately partitioning the graph as a preprocessing step can improve the
degree of parallelism of its analysis. A number of heuristic algorithms have
been developed to solve this problem, but many of them subdivide the graph on
its vertex set, thus obtaining a vertex-partitioned graph.
Aim of this paper is to explore a completely different approach based on edge
partitioning, in which edges, rather than vertices, are partitioned into
disjoint subsets. Contribution of this paper is twofold: first, we introduce a
graph processing framework based on edge partitioning, that is flexible enough
to be applied to several different graph problems. Second, we show the
feasibility of these ideas by presenting a distributed edge partitioning
algorithm called d-fep.
Our framework is thoroughly evaluated, using both simulations and an Hadoop
implementation running on the Amazon EC2 cloud. The experiments show that d-fep
is efficient, scalable and obtains consistently good partitions. The resulting
edge-partitioned graph can be exploited to obtain more efficient
implementations of graph analysis algorithms.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2014 09:38:12 GMT"
}
] | 2014-03-26T00:00:00 | [
[
"Guerrieri",
"Alessio",
""
],
[
"Montresor",
"Alberto",
""
]
] | TITLE: Distributed Edge Partitioning for Graph Processing
ABSTRACT: The availability of larger and larger graph datasets, growing exponentially
over the years, has created several new algorithmic challenges to be addressed.
Sequential approaches have become unfeasible, while interest on parallel and
distributed algorithms has greatly increased.
Appropriately partitioning the graph as a preprocessing step can improve the
degree of parallelism of its analysis. A number of heuristic algorithms have
been developed to solve this problem, but many of them subdivide the graph on
its vertex set, thus obtaining a vertex-partitioned graph.
Aim of this paper is to explore a completely different approach based on edge
partitioning, in which edges, rather than vertices, are partitioned into
disjoint subsets. Contribution of this paper is twofold: first, we introduce a
graph processing framework based on edge partitioning, that is flexible enough
to be applied to several different graph problems. Second, we show the
feasibility of these ideas by presenting a distributed edge partitioning
algorithm called d-fep.
Our framework is thoroughly evaluated, using both simulations and an Hadoop
implementation running on the Amazon EC2 cloud. The experiments show that d-fep
is efficient, scalable and obtains consistently good partitions. The resulting
edge-partitioned graph can be exploited to obtain more efficient
implementations of graph analysis algorithms.
|
1403.6275 | Vibhav Vineet Mr | Vibhav Vineet, Jonathan Warrell and Philip H.S. Torr | A Tiered Move-making Algorithm for General Non-submodular Pairwise
Energies | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A large number of problems in computer vision can be modelled as energy
minimization problems in a Markov Random Field (MRF) or Conditional Random
Field (CRF) framework. Graph-cuts based $\alpha$-expansion is a standard
move-making method to minimize the energy functions with sub-modular pairwise
terms. However, certain problems require more complex pairwise terms where the
$\alpha$-expansion method is generally not applicable.
In this paper, we propose an iterative {\em tiered move making algorithm}
which is able to handle general pairwise terms. Each move to the next
configuration is based on the current labeling and an optimal tiered move,
where each tiered move requires one application of the dynamic programming
based tiered labeling method introduced in Felzenszwalb et. al.
\cite{tiered_cvpr_felzenszwalbV10}. The algorithm converges to a local minimum
for any general pairwise potential, and we give a theoretical analysis of the
properties of the algorithm, characterizing the situations in which we can
expect good performance. We first evaluate our method on an object-class
segmentation problem using the Pascal VOC-11 segmentation dataset where we
learn general pairwise terms. Further we evaluate the algorithm on many other
benchmark labeling problems such as stereo, image segmentation, image stitching
and image denoising. Our method consistently gets better accuracy and energy
values than alpha-expansion, loopy belief propagation (LBP), quadratic
pseudo-boolean optimization (QPBO), and is competitive with TRWS.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2014 10:18:47 GMT"
}
] | 2014-03-26T00:00:00 | [
[
"Vineet",
"Vibhav",
""
],
[
"Warrell",
"Jonathan",
""
],
[
"Torr",
"Philip H. S.",
""
]
] | TITLE: A Tiered Move-making Algorithm for General Non-submodular Pairwise
Energies
ABSTRACT: A large number of problems in computer vision can be modelled as energy
minimization problems in a Markov Random Field (MRF) or Conditional Random
Field (CRF) framework. Graph-cuts based $\alpha$-expansion is a standard
move-making method to minimize the energy functions with sub-modular pairwise
terms. However, certain problems require more complex pairwise terms where the
$\alpha$-expansion method is generally not applicable.
In this paper, we propose an iterative {\em tiered move making algorithm}
which is able to handle general pairwise terms. Each move to the next
configuration is based on the current labeling and an optimal tiered move,
where each tiered move requires one application of the dynamic programming
based tiered labeling method introduced in Felzenszwalb et. al.
\cite{tiered_cvpr_felzenszwalbV10}. The algorithm converges to a local minimum
for any general pairwise potential, and we give a theoretical analysis of the
properties of the algorithm, characterizing the situations in which we can
expect good performance. We first evaluate our method on an object-class
segmentation problem using the Pascal VOC-11 segmentation dataset where we
learn general pairwise terms. Further we evaluate the algorithm on many other
benchmark labeling problems such as stereo, image segmentation, image stitching
and image denoising. Our method consistently gets better accuracy and energy
values than alpha-expansion, loopy belief propagation (LBP), quadratic
pseudo-boolean optimization (QPBO), and is competitive with TRWS.
|
1403.6426 | Elmar Peise | Elmar Peise (1), Diego Fabregat-Traver (1), Paolo Bientinesi (1) ((1)
AICES, RWTH Aachen) | High Performance Solutions for Big-data GWAS | Submitted to Parallel Computing. arXiv admin note: substantial text
overlap with arXiv:1304.2272 | null | null | AICES-2013/12-01 | q-bio.GN cs.CE cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to associate complex traits with genetic polymorphisms, genome-wide
association studies process huge datasets involving tens of thousands of
individuals genotyped for millions of polymorphisms. When handling these
datasets, which exceed the main memory of contemporary computers, one faces two
distinct challenges: 1) Millions of polymorphisms and thousands of phenotypes
come at the cost of hundreds of gigabytes of data, which can only be kept in
secondary storage; 2) the relatedness of the test population is represented by
a relationship matrix, which, for large populations, can only fit in the
combined main memory of a distributed architecture. In this paper, by using
distributed resources such as Cloud or clusters, we address both challenges:
The genotype and phenotype data is streamed from secondary storage using a
double buffer- ing technique, while the relationship matrix is kept across the
main memory of a distributed memory system. With the help of these solutions,
we develop separate algorithms for studies involving only one or a multitude of
traits. We show that these algorithms sustain high-performance and allow the
analysis of enormous datasets.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2014 17:21:55 GMT"
}
] | 2014-03-26T00:00:00 | [
[
"Peise",
"Elmar",
""
],
[
"Fabregat-Traver",
"Diego",
""
],
[
"Bientinesi",
"Paolo",
""
]
] | TITLE: High Performance Solutions for Big-data GWAS
ABSTRACT: In order to associate complex traits with genetic polymorphisms, genome-wide
association studies process huge datasets involving tens of thousands of
individuals genotyped for millions of polymorphisms. When handling these
datasets, which exceed the main memory of contemporary computers, one faces two
distinct challenges: 1) Millions of polymorphisms and thousands of phenotypes
come at the cost of hundreds of gigabytes of data, which can only be kept in
secondary storage; 2) the relatedness of the test population is represented by
a relationship matrix, which, for large populations, can only fit in the
combined main memory of a distributed architecture. In this paper, by using
distributed resources such as Cloud or clusters, we address both challenges:
The genotype and phenotype data is streamed from secondary storage using a
double buffer- ing technique, while the relationship matrix is kept across the
main memory of a distributed memory system. With the help of these solutions,
we develop separate algorithms for studies involving only one or a multitude of
traits. We show that these algorithms sustain high-performance and allow the
analysis of enormous datasets.
|
1312.5663 | Alireza Makhzani | Alireza Makhzani, Brendan Frey | k-Sparse Autoencoders | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, it has been observed that when representations are learnt in a way
that encourages sparsity, improved performance is obtained on classification
tasks. These methods involve combinations of activation functions, sampling
steps and different kinds of penalties. To investigate the effectiveness of
sparsity by itself, we propose the k-sparse autoencoder, which is an
autoencoder with linear activation function, where in hidden layers only the k
highest activities are kept. When applied to the MNIST and NORB datasets, we
find that this method achieves better classification results than denoising
autoencoders, networks trained with dropout, and RBMs. k-sparse autoencoders
are simple to train and the encoding stage is very fast, making them
well-suited to large problem sizes, where conventional sparse coding algorithms
cannot be applied.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2013 17:46:46 GMT"
},
{
"version": "v2",
"created": "Sat, 22 Mar 2014 17:12:07 GMT"
}
] | 2014-03-25T00:00:00 | [
[
"Makhzani",
"Alireza",
""
],
[
"Frey",
"Brendan",
""
]
] | TITLE: k-Sparse Autoencoders
ABSTRACT: Recently, it has been observed that when representations are learnt in a way
that encourages sparsity, improved performance is obtained on classification
tasks. These methods involve combinations of activation functions, sampling
steps and different kinds of penalties. To investigate the effectiveness of
sparsity by itself, we propose the k-sparse autoencoder, which is an
autoencoder with linear activation function, where in hidden layers only the k
highest activities are kept. When applied to the MNIST and NORB datasets, we
find that this method achieves better classification results than denoising
autoencoders, networks trained with dropout, and RBMs. k-sparse autoencoders
are simple to train and the encoding stage is very fast, making them
well-suited to large problem sizes, where conventional sparse coding algorithms
cannot be applied.
|
1402.6862 | Mohammad Reza Keshtkaran | Mohammad Reza Keshtkaran and Zhi Yang | A Fast, robust algorithm for power line interference cancellation in
neural recording | 18 pages, 21 figures, to appear in Journal of Neural Engineering | M. R. Keshtkaran and Z. Yang, "A fast, robust algorithm for power
line interference cancellation in neural recording," J. Neural Eng., vol. 11,
no. 2, p. 026017, Apr. 2014 | 10.1088/1741-2560/11/2/026017 | null | cs.SY physics.med-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Power line interference may severely corrupt neural recordings at 50/60 Hz
and harmonic frequencies. In this paper, we present a robust and
computationally efficient algorithm for removing power line interference from
neural recordings. The algorithm includes four steps. First, an adaptive notch
filter is used to estimate the fundamental frequency of the interference.
Subsequently, based on the estimated frequency, harmonics are generated by
using discrete-time oscillators, and then the amplitude and phase of each
harmonic are estimated through using a modified recursive least squares
algorithm. Finally, the estimated interference is subtracted from the recorded
data. The algorithm does not require any reference signal, and can track the
frequency, phase, and amplitude of each harmonic. When benchmarked with other
popular approaches, our algorithm performs better in terms of noise immunity,
convergence speed, and output signal-to-noise ratio (SNR). While minimally
affecting the signal bands of interest, the algorithm consistently yields fast
convergence and substantial interference rejection in different conditions of
interference strengths (input SNR from -30 dB to 30 dB), power line frequencies
(45-65 Hz), and phase and amplitude drifts. In addition, the algorithm features
a straightforward parameter adjustment since the parameters are independent of
the input SNR, input signal power, and the sampling rate. The proposed
algorithm features a highly robust operation, fast adaptation to interference
variations, significant SNR improvement, low computational complexity and
memory requirement, and straightforward parameter adjustment. These features
render the algorithm suitable for wearable and implantable sensor applications,
where reliable and real-time cancellation of the interference is desired.
| [
{
"version": "v1",
"created": "Thu, 27 Feb 2014 11:27:17 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Mar 2014 13:03:10 GMT"
}
] | 2014-03-25T00:00:00 | [
[
"Keshtkaran",
"Mohammad Reza",
""
],
[
"Yang",
"Zhi",
""
]
] | TITLE: A Fast, robust algorithm for power line interference cancellation in
neural recording
ABSTRACT: Power line interference may severely corrupt neural recordings at 50/60 Hz
and harmonic frequencies. In this paper, we present a robust and
computationally efficient algorithm for removing power line interference from
neural recordings. The algorithm includes four steps. First, an adaptive notch
filter is used to estimate the fundamental frequency of the interference.
Subsequently, based on the estimated frequency, harmonics are generated by
using discrete-time oscillators, and then the amplitude and phase of each
harmonic are estimated through using a modified recursive least squares
algorithm. Finally, the estimated interference is subtracted from the recorded
data. The algorithm does not require any reference signal, and can track the
frequency, phase, and amplitude of each harmonic. When benchmarked with other
popular approaches, our algorithm performs better in terms of noise immunity,
convergence speed, and output signal-to-noise ratio (SNR). While minimally
affecting the signal bands of interest, the algorithm consistently yields fast
convergence and substantial interference rejection in different conditions of
interference strengths (input SNR from -30 dB to 30 dB), power line frequencies
(45-65 Hz), and phase and amplitude drifts. In addition, the algorithm features
a straightforward parameter adjustment since the parameters are independent of
the input SNR, input signal power, and the sampling rate. The proposed
algorithm features a highly robust operation, fast adaptation to interference
variations, significant SNR improvement, low computational complexity and
memory requirement, and straightforward parameter adjustment. These features
render the algorithm suitable for wearable and implantable sensor applications,
where reliable and real-time cancellation of the interference is desired.
|
1403.5590 | Petter Strandmark | Petter Strandmark and Sameer Agarwal | Continuous Optimization for Fields of Experts Denoising Works | 5 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several recent papers use image denoising with a Fields of Experts prior to
benchmark discrete optimization methods. We show that a non-linear least
squares solver significantly outperforms all known discrete methods on this
problem.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2014 23:26:47 GMT"
}
] | 2014-03-25T00:00:00 | [
[
"Strandmark",
"Petter",
""
],
[
"Agarwal",
"Sameer",
""
]
] | TITLE: Continuous Optimization for Fields of Experts Denoising Works
ABSTRACT: Several recent papers use image denoising with a Fields of Experts prior to
benchmark discrete optimization methods. We show that a non-linear least
squares solver significantly outperforms all known discrete methods on this
problem.
|
1403.5693 | Dougal Maclaurin | Dougal Maclaurin and Ryan P. Adams | Firefly Monte Carlo: Exact MCMC with Subsets of Data | null | null | null | null | stat.ML cs.LG stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Markov chain Monte Carlo (MCMC) is a popular and successful general-purpose
tool for Bayesian inference. However, MCMC cannot be practically applied to
large data sets because of the prohibitive cost of evaluating every likelihood
term at every iteration. Here we present Firefly Monte Carlo (FlyMC) an
auxiliary variable MCMC algorithm that only queries the likelihoods of a
potentially small subset of the data at each iteration yet simulates from the
exact posterior distribution, in contrast to recent proposals that are
approximate even in the asymptotic limit. FlyMC is compatible with a wide
variety of modern MCMC algorithms, and only requires a lower bound on the
per-datum likelihood factors. In experiments, we find that FlyMC generates
samples from the posterior more than an order of magnitude faster than regular
MCMC, opening up MCMC methods to larger datasets than were previously
considered feasible.
| [
{
"version": "v1",
"created": "Sat, 22 Mar 2014 18:21:29 GMT"
}
] | 2014-03-25T00:00:00 | [
[
"Maclaurin",
"Dougal",
""
],
[
"Adams",
"Ryan P.",
""
]
] | TITLE: Firefly Monte Carlo: Exact MCMC with Subsets of Data
ABSTRACT: Markov chain Monte Carlo (MCMC) is a popular and successful general-purpose
tool for Bayesian inference. However, MCMC cannot be practically applied to
large data sets because of the prohibitive cost of evaluating every likelihood
term at every iteration. Here we present Firefly Monte Carlo (FlyMC) an
auxiliary variable MCMC algorithm that only queries the likelihoods of a
potentially small subset of the data at each iteration yet simulates from the
exact posterior distribution, in contrast to recent proposals that are
approximate even in the asymptotic limit. FlyMC is compatible with a wide
variety of modern MCMC algorithms, and only requires a lower bound on the
per-datum likelihood factors. In experiments, we find that FlyMC generates
samples from the posterior more than an order of magnitude faster than regular
MCMC, opening up MCMC methods to larger datasets than were previously
considered feasible.
|
1403.5877 | Anastasios Kyrillidis | Anastasios Kyrillidis and Anastasios Zouzias | Non-uniform Feature Sampling for Decision Tree Ensembles | 7 pages, 7 figures, 1 table | null | null | null | stat.ML cs.IT cs.LG math.IT stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the effectiveness of non-uniform randomized feature selection in
decision tree classification. We experimentally evaluate two feature selection
methodologies, based on information extracted from the provided dataset: $(i)$
\emph{leverage scores-based} and $(ii)$ \emph{norm-based} feature selection.
Experimental evaluation of the proposed feature selection techniques indicate
that such approaches might be more effective compared to naive uniform feature
selection and moreover having comparable performance to the random forest
algorithm [3]
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2014 08:26:19 GMT"
}
] | 2014-03-25T00:00:00 | [
[
"Kyrillidis",
"Anastasios",
""
],
[
"Zouzias",
"Anastasios",
""
]
] | TITLE: Non-uniform Feature Sampling for Decision Tree Ensembles
ABSTRACT: We study the effectiveness of non-uniform randomized feature selection in
decision tree classification. We experimentally evaluate two feature selection
methodologies, based on information extracted from the provided dataset: $(i)$
\emph{leverage scores-based} and $(ii)$ \emph{norm-based} feature selection.
Experimental evaluation of the proposed feature selection techniques indicate
that such approaches might be more effective compared to naive uniform feature
selection and moreover having comparable performance to the random forest
algorithm [3]
|
1403.5299 | Arkadiusz Stopczynski Mr. | Arkadiusz Stopczynski, Riccardo Pietri, Alex Pentland, David Lazer,
Sune Lehmann | Privacy in Sensor-Driven Human Data Collection: A Guide for
Practitioners | null | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, the amount of information collected about human beings has
increased dramatically. This development has been partially driven by
individuals posting and storing data about themselves and friends using online
social networks or collecting their data for self-tracking purposes
(quantified-self movement). Across the sciences, researchers conduct studies
collecting data with an unprecedented resolution and scale. Using computational
power combined with mathematical models, such rich datasets can be mined to
infer underlying patterns, thereby providing insights into human nature. Much
of the data collected is sensitive. It is private in the sense that most
individuals would feel uncomfortable sharing their collected personal data
publicly. For this reason, the need for solutions to ensure the privacy of the
individuals generating data has grown alongside the data collection efforts.
Out of all the massive data collection efforts, this paper focuses on efforts
directly instrumenting human behavior, and notes that -- in many cases -- the
privacy of participants is not sufficiently addressed. For example, study
purposes are often not explicit, informed consent is ill-defined, and security
and sharing protocols are only partially disclosed. This paper provides a
survey of the work related to addressing privacy issues in research studies
that collect detailed sensor data on human behavior. Reflections on the key
problems and recommendations for future work are included. We hope the overview
of the privacy-related practices in massive data collection studies can be used
as a frame of reference for practitioners in the field. Although focused on
data collection in an academic context, we believe that many of the challenges
and solutions we identify are also relevant and useful for other domains where
massive data collection takes place, including businesses and governments.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2014 21:16:55 GMT"
}
] | 2014-03-24T00:00:00 | [
[
"Stopczynski",
"Arkadiusz",
""
],
[
"Pietri",
"Riccardo",
""
],
[
"Pentland",
"Alex",
""
],
[
"Lazer",
"David",
""
],
[
"Lehmann",
"Sune",
""
]
] | TITLE: Privacy in Sensor-Driven Human Data Collection: A Guide for
Practitioners
ABSTRACT: In recent years, the amount of information collected about human beings has
increased dramatically. This development has been partially driven by
individuals posting and storing data about themselves and friends using online
social networks or collecting their data for self-tracking purposes
(quantified-self movement). Across the sciences, researchers conduct studies
collecting data with an unprecedented resolution and scale. Using computational
power combined with mathematical models, such rich datasets can be mined to
infer underlying patterns, thereby providing insights into human nature. Much
of the data collected is sensitive. It is private in the sense that most
individuals would feel uncomfortable sharing their collected personal data
publicly. For this reason, the need for solutions to ensure the privacy of the
individuals generating data has grown alongside the data collection efforts.
Out of all the massive data collection efforts, this paper focuses on efforts
directly instrumenting human behavior, and notes that -- in many cases -- the
privacy of participants is not sufficiently addressed. For example, study
purposes are often not explicit, informed consent is ill-defined, and security
and sharing protocols are only partially disclosed. This paper provides a
survey of the work related to addressing privacy issues in research studies
that collect detailed sensor data on human behavior. Reflections on the key
problems and recommendations for future work are included. We hope the overview
of the privacy-related practices in massive data collection studies can be used
as a frame of reference for practitioners in the field. Although focused on
data collection in an academic context, we believe that many of the challenges
and solutions we identify are also relevant and useful for other domains where
massive data collection takes place, including businesses and governments.
|
1403.5381 | Silu Huang | Silu Huang, Ada Wai-Chee Fu | ({\alpha}, k)-Minimal Sorting and Skew Join in MPI and MapReduce | 18 pages | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As computer clusters are found to be highly effective for handling massive
datasets, the design of efficient parallel algorithms for such a computing
model is of great interest. We consider ({\alpha}, k)-minimal algorithms for
such a purpose, where {\alpha} is the number of rounds in the algorithm, and k
is a bound on the deviation from perfect workload balance. We focus on new
({\alpha}, k)-minimal algorithms for sorting and skew equijoin operations for
computer clusters. To the best of our knowledge the proposed sorting and skew
join algorithms achieve the best workload balancing guarantee when compared to
previous works. Our empirical study shows that they are close to optimal in
workload balancing. In particular, our proposed sorting algorithm is around 25%
more efficient than the state-of-the-art Terasort algorithm and achieves
significantly more even workload distribution by over 50%.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2014 07:10:16 GMT"
}
] | 2014-03-24T00:00:00 | [
[
"Huang",
"Silu",
""
],
[
"Fu",
"Ada Wai-Chee",
""
]
] | TITLE: ({\alpha}, k)-Minimal Sorting and Skew Join in MPI and MapReduce
ABSTRACT: As computer clusters are found to be highly effective for handling massive
datasets, the design of efficient parallel algorithms for such a computing
model is of great interest. We consider ({\alpha}, k)-minimal algorithms for
such a purpose, where {\alpha} is the number of rounds in the algorithm, and k
is a bound on the deviation from perfect workload balance. We focus on new
({\alpha}, k)-minimal algorithms for sorting and skew equijoin operations for
computer clusters. To the best of our knowledge the proposed sorting and skew
join algorithms achieve the best workload balancing guarantee when compared to
previous works. Our empirical study shows that they are close to optimal in
workload balancing. In particular, our proposed sorting algorithm is around 25%
more efficient than the state-of-the-art Terasort algorithm and achieves
significantly more even workload distribution by over 50%.
|
1403.5488 | Tshilidzi Marwala | Collins Leke, Bhekisipho Twala, and T. Marwala | Missing Data Prediction and Classification: The Use of Auto-Associative
Neural Networks and Optimization Algorithms | null | null | null | null | cs.NE cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper presents methods which are aimed at finding approximations to
missing data in a dataset by using optimization algorithms to optimize the
network parameters after which prediction and classification tasks can be
performed. The optimization methods that are considered are genetic algorithm
(GA), simulated annealing (SA), particle swarm optimization (PSO), random
forest (RF) and negative selection (NS) and these methods are individually used
in combination with auto-associative neural networks (AANN) for missing data
estimation and the results obtained are compared. The methods suggested use the
optimization algorithms to minimize an error function derived from training the
auto-associative neural network during which the interrelationships between the
inputs and the outputs are obtained and stored in the weights connecting the
different layers of the network. The error function is expressed as the square
of the difference between the actual observations and predicted values from an
auto-associative neural network. In the event of missing data, all the values
of the actual observations are not known hence, the error function is
decomposed to depend on the known and unknown variable values. Multi-layer
perceptron (MLP) neural network is employed to train the neural networks using
the scaled conjugate gradient (SCG) method. Prediction accuracy is determined
by mean squared error (MSE), root mean squared error (RMSE), mean absolute
error (MAE), and correlation coefficient (r) computations. Accuracy in
classification is obtained by plotting ROC curves and calculating the areas
under these. Analysis of results depicts that the approach using RF with AANN
produces the most accurate predictions and classifications while on the other
end of the scale is the approach which entails using NS with AANN.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2014 15:11:52 GMT"
}
] | 2014-03-24T00:00:00 | [
[
"Leke",
"Collins",
""
],
[
"Twala",
"Bhekisipho",
""
],
[
"Marwala",
"T.",
""
]
] | TITLE: Missing Data Prediction and Classification: The Use of Auto-Associative
Neural Networks and Optimization Algorithms
ABSTRACT: This paper presents methods which are aimed at finding approximations to
missing data in a dataset by using optimization algorithms to optimize the
network parameters after which prediction and classification tasks can be
performed. The optimization methods that are considered are genetic algorithm
(GA), simulated annealing (SA), particle swarm optimization (PSO), random
forest (RF) and negative selection (NS) and these methods are individually used
in combination with auto-associative neural networks (AANN) for missing data
estimation and the results obtained are compared. The methods suggested use the
optimization algorithms to minimize an error function derived from training the
auto-associative neural network during which the interrelationships between the
inputs and the outputs are obtained and stored in the weights connecting the
different layers of the network. The error function is expressed as the square
of the difference between the actual observations and predicted values from an
auto-associative neural network. In the event of missing data, all the values
of the actual observations are not known hence, the error function is
decomposed to depend on the known and unknown variable values. Multi-layer
perceptron (MLP) neural network is employed to train the neural networks using
the scaled conjugate gradient (SCG) method. Prediction accuracy is determined
by mean squared error (MSE), root mean squared error (RMSE), mean absolute
error (MAE), and correlation coefficient (r) computations. Accuracy in
classification is obtained by plotting ROC curves and calculating the areas
under these. Analysis of results depicts that the approach using RF with AANN
produces the most accurate predictions and classifications while on the other
end of the scale is the approach which entails using NS with AANN.
|
1403.5115 | Ugo Louche | Ugo Louche (LIF), Liva Ralaivola (LIF) | Unconfused Ultraconservative Multiclass Algorithms | ACML, Australia (2013) | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We tackle the problem of learning linear classifiers from noisy datasets in a
multiclass setting. The two-class version of this problem was studied a few
years ago by, e.g. Bylander (1994) and Blum et al. (1996): in these
contributions, the proposed approaches to fight the noise revolve around a
Perceptron learning scheme fed with peculiar examples computed through a
weighted average of points from the noisy training set. We propose to build
upon these approaches and we introduce a new algorithm called UMA (for
Unconfused Multiclass additive Algorithm) which may be seen as a generalization
to the multiclass setting of the previous approaches. In order to characterize
the noise we use the confusion matrix as a multiclass extension of the
classification noise studied in the aforementioned literature. Theoretically
well-founded, UMA furthermore displays very good empirical noise robustness, as
evidenced by numerical simulations conducted on both synthetic and real data.
Keywords: Multiclass classification, Perceptron, Noisy labels, Confusion Matrix
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2014 12:46:33 GMT"
}
] | 2014-03-21T00:00:00 | [
[
"Louche",
"Ugo",
"",
"LIF"
],
[
"Ralaivola",
"Liva",
"",
"LIF"
]
] | TITLE: Unconfused Ultraconservative Multiclass Algorithms
ABSTRACT: We tackle the problem of learning linear classifiers from noisy datasets in a
multiclass setting. The two-class version of this problem was studied a few
years ago by, e.g. Bylander (1994) and Blum et al. (1996): in these
contributions, the proposed approaches to fight the noise revolve around a
Perceptron learning scheme fed with peculiar examples computed through a
weighted average of points from the noisy training set. We propose to build
upon these approaches and we introduce a new algorithm called UMA (for
Unconfused Multiclass additive Algorithm) which may be seen as a generalization
to the multiclass setting of the previous approaches. In order to characterize
the noise we use the confusion matrix as a multiclass extension of the
classification noise studied in the aforementioned literature. Theoretically
well-founded, UMA furthermore displays very good empirical noise robustness, as
evidenced by numerical simulations conducted on both synthetic and real data.
Keywords: Multiclass classification, Perceptron, Noisy labels, Confusion Matrix
|
1403.5118 | Robin Lovelace Dr | Robin Lovelace, Nick Malleson, Kirk Harland and Mark Birkin | Geotagged tweets to inform a spatial interaction model: a case study of
museums | A concise version of this article was submitted to GISRUK2014
conference | null | null | null | stat.ME cs.CY cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper explores the potential of volunteered geographical information
from social media for informing geographical models of behavior, based on a
case study of museums in Yorkshire, UK. A spatial interaction model of visitors
to 15 museums from 179 administrative zones is constructed to test this
potential. The main input dataset comprises geo-tagged messages harvested using
the Twitter Streaming Application Programming Interface (API), filtered,
analyzed and aggregated to allow direct comparison with the model's output.
Comparison between model output and tweet information allowed the calibration
of model parameters to optimize the fit between flows to museums inferred from
tweets and flow matrices generated by the spatial interaction model. We
conclude that volunteered geographic information from social media sites have
great potential for informing geographical models of behavior, especially if
the volume of geo-tagged social media messages continues to increase. However,
we caution that volunteered geographical information from social media has some
major limitations so should be used only as a supplement to more consistent
data sources or when official datasets are unavailable.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2014 12:48:24 GMT"
}
] | 2014-03-21T00:00:00 | [
[
"Lovelace",
"Robin",
""
],
[
"Malleson",
"Nick",
""
],
[
"Harland",
"Kirk",
""
],
[
"Birkin",
"Mark",
""
]
] | TITLE: Geotagged tweets to inform a spatial interaction model: a case study of
museums
ABSTRACT: This paper explores the potential of volunteered geographical information
from social media for informing geographical models of behavior, based on a
case study of museums in Yorkshire, UK. A spatial interaction model of visitors
to 15 museums from 179 administrative zones is constructed to test this
potential. The main input dataset comprises geo-tagged messages harvested using
the Twitter Streaming Application Programming Interface (API), filtered,
analyzed and aggregated to allow direct comparison with the model's output.
Comparison between model output and tweet information allowed the calibration
of model parameters to optimize the fit between flows to museums inferred from
tweets and flow matrices generated by the spatial interaction model. We
conclude that volunteered geographic information from social media sites have
great potential for informing geographical models of behavior, especially if
the volume of geo-tagged social media messages continues to increase. However,
we caution that volunteered geographical information from social media has some
major limitations so should be used only as a supplement to more consistent
data sources or when official datasets are unavailable.
|
1208.2908 | Georg Hager | Georg Hager, Jan Treibig, Johannes Habich and Gerhard Wellein | Exploring performance and power properties of modern multicore chips via
simple machine models | 23 pages, 10 figures. Typos corrected, DOI added | null | 10.1002/cpe.3180 | null | cs.PF cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern multicore chips show complex behavior with respect to performance and
power. Starting with the Intel Sandy Bridge processor, it has become possible
to directly measure the power dissipation of a CPU chip and correlate this data
with the performance properties of the running code. Going beyond a simple
bottleneck analysis, we employ the recently published Execution-Cache-Memory
(ECM) model to describe the single- and multi-core performance of streaming
kernels. The model refines the well-known roofline model, since it can predict
the scaling and the saturation behavior of bandwidth-limited loop kernels on a
multicore chip. The saturation point is especially relevant for considerations
of energy consumption. From power dissipation measurements of benchmark
programs with vastly different requirements to the hardware, we derive a
simple, phenomenological power model for the Sandy Bridge processor. Together
with the ECM model, we are able to explain many peculiarities in the
performance and power behavior of multicore processors, and derive guidelines
for energy-efficient execution of parallel programs. Finally, we show that the
ECM and power models can be successfully used to describe the scaling and power
behavior of a lattice-Boltzmann flow solver code.
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2012 15:51:43 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Aug 2012 19:12:39 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Sep 2013 10:17:43 GMT"
},
{
"version": "v4",
"created": "Wed, 19 Mar 2014 13:55:47 GMT"
}
] | 2014-03-20T00:00:00 | [
[
"Hager",
"Georg",
""
],
[
"Treibig",
"Jan",
""
],
[
"Habich",
"Johannes",
""
],
[
"Wellein",
"Gerhard",
""
]
] | TITLE: Exploring performance and power properties of modern multicore chips via
simple machine models
ABSTRACT: Modern multicore chips show complex behavior with respect to performance and
power. Starting with the Intel Sandy Bridge processor, it has become possible
to directly measure the power dissipation of a CPU chip and correlate this data
with the performance properties of the running code. Going beyond a simple
bottleneck analysis, we employ the recently published Execution-Cache-Memory
(ECM) model to describe the single- and multi-core performance of streaming
kernels. The model refines the well-known roofline model, since it can predict
the scaling and the saturation behavior of bandwidth-limited loop kernels on a
multicore chip. The saturation point is especially relevant for considerations
of energy consumption. From power dissipation measurements of benchmark
programs with vastly different requirements to the hardware, we derive a
simple, phenomenological power model for the Sandy Bridge processor. Together
with the ECM model, we are able to explain many peculiarities in the
performance and power behavior of multicore processors, and derive guidelines
for energy-efficient execution of parallel programs. Finally, we show that the
ECM and power models can be successfully used to describe the scaling and power
behavior of a lattice-Boltzmann flow solver code.
|
1403.4415 | Julia Perl | Julia Preusse, J\'er\^ome Kunegis, Matthias Thimm, Sergej Sizov | DecLiNe -- Models for Decay of Links in Networks | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The prediction of graph evolution is an important and challenging problem in
the analysis of networks and of the Web in particular. But while the appearance
of new links is part of virtually every model of Web growth, the disappearance
of links has received much less attention in the literature. To fill this gap,
our approach DecLiNe (an acronym for DECay of LInks in NEtworks) aims to
predict link decay in networks, based on structural analysis of corresponding
graph models. In analogy to the link prediction problem, we show that analysis
of graph structures can help to identify indicators for superfluous links under
consideration of common network models. In doing so, we introduce novel metrics
that denote the likelihood of certain links in social graphs to remain in the
network, and combine them with state-of-the-art machine learning methods for
predicting link decay. Our methods are independent of the underlying network
type, and can be applied to such diverse networks as the Web, social networks
and any other structure representable as a network, and can be easily combined
with case-specific content analysis and adopted for a variety of social network
mining, filtering and recommendation applications. In systematic evaluations
with large-scale datasets of Wikipedia we show the practical feasibility of the
proposed structure-based link decay prediction algorithms.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2014 11:44:36 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Mar 2014 13:03:24 GMT"
}
] | 2014-03-20T00:00:00 | [
[
"Preusse",
"Julia",
""
],
[
"Kunegis",
"Jérôme",
""
],
[
"Thimm",
"Matthias",
""
],
[
"Sizov",
"Sergej",
""
]
] | TITLE: DecLiNe -- Models for Decay of Links in Networks
ABSTRACT: The prediction of graph evolution is an important and challenging problem in
the analysis of networks and of the Web in particular. But while the appearance
of new links is part of virtually every model of Web growth, the disappearance
of links has received much less attention in the literature. To fill this gap,
our approach DecLiNe (an acronym for DECay of LInks in NEtworks) aims to
predict link decay in networks, based on structural analysis of corresponding
graph models. In analogy to the link prediction problem, we show that analysis
of graph structures can help to identify indicators for superfluous links under
consideration of common network models. In doing so, we introduce novel metrics
that denote the likelihood of certain links in social graphs to remain in the
network, and combine them with state-of-the-art machine learning methods for
predicting link decay. Our methods are independent of the underlying network
type, and can be applied to such diverse networks as the Web, social networks
and any other structure representable as a network, and can be easily combined
with case-specific content analysis and adopted for a variety of social network
mining, filtering and recommendation applications. In systematic evaluations
with large-scale datasets of Wikipedia we show the practical feasibility of the
proposed structure-based link decay prediction algorithms.
|
1403.4781 | Subhadip Mukherjee | Subhadip Mukherjee and Chandra Sekhar Seelamantula | A Split-and-Merge Dictionary Learning Algorithm for Sparse
Representation | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In big data image/video analytics, we encounter the problem of learning an
overcomplete dictionary for sparse representation from a large training
dataset, which can not be processed at once because of storage and
computational constraints. To tackle the problem of dictionary learning in such
scenarios, we propose an algorithm for parallel dictionary learning. The
fundamental idea behind the algorithm is to learn a sparse representation in
two phases. In the first phase, the whole training dataset is partitioned into
small non-overlapping subsets, and a dictionary is trained independently on
each small database. In the second phase, the dictionaries are merged to form a
global dictionary. We show that the proposed algorithm is efficient in its
usage of memory and computational complexity, and performs on par with the
standard learning strategy operating on the entire data at a time. As an
application, we consider the problem of image denoising. We present a
comparative analysis of our algorithm with the standard learning techniques,
that use the entire database at a time, in terms of training and denoising
performance. We observe that the split-and-merge algorithm results in a
remarkable reduction of training time, without significantly affecting the
denoising performance.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2014 12:16:17 GMT"
}
] | 2014-03-20T00:00:00 | [
[
"Mukherjee",
"Subhadip",
""
],
[
"Seelamantula",
"Chandra Sekhar",
""
]
] | TITLE: A Split-and-Merge Dictionary Learning Algorithm for Sparse
Representation
ABSTRACT: In big data image/video analytics, we encounter the problem of learning an
overcomplete dictionary for sparse representation from a large training
dataset, which can not be processed at once because of storage and
computational constraints. To tackle the problem of dictionary learning in such
scenarios, we propose an algorithm for parallel dictionary learning. The
fundamental idea behind the algorithm is to learn a sparse representation in
two phases. In the first phase, the whole training dataset is partitioned into
small non-overlapping subsets, and a dictionary is trained independently on
each small database. In the second phase, the dictionaries are merged to form a
global dictionary. We show that the proposed algorithm is efficient in its
usage of memory and computational complexity, and performs on par with the
standard learning strategy operating on the entire data at a time. As an
application, we consider the problem of image denoising. We present a
comparative analysis of our algorithm with the standard learning techniques,
that use the entire database at a time, in terms of training and denoising
performance. We observe that the split-and-merge algorithm results in a
remarkable reduction of training time, without significantly affecting the
denoising performance.
|
1403.4540 | Llu\'is Belanche-Mu\~noz | Llu\'is Belanche and Jer\'onimo Hern\'andez | Similarity networks for classification: a case study in the Horse Colic
problem | 16 pages, 1 figure Universitat Polit\`ecnica de Catalunya preprint | null | null | Technical Report LSI-14-4-R | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper develops a two-layer neural network in which the neuron model
computes a user-defined similarity function between inputs and weights. The
neuron transfer function is formed by composition of an adapted logistic
function with the mean of the partial input-weight similarities. The resulting
neuron model is capable of dealing directly with variables of potentially
different nature (continuous, fuzzy, ordinal, categorical). There is also
provision for missing values. The network is trained using a two-stage
procedure very similar to that used to train a radial basis function (RBF)
neural network. The network is compared to two types of RBF networks in a
non-trivial dataset: the Horse Colic problem, taken as a case study and
analyzed in detail.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2014 17:15:21 GMT"
}
] | 2014-03-19T00:00:00 | [
[
"Belanche",
"Lluís",
""
],
[
"Hernández",
"Jerónimo",
""
]
] | TITLE: Similarity networks for classification: a case study in the Horse Colic
problem
ABSTRACT: This paper develops a two-layer neural network in which the neuron model
computes a user-defined similarity function between inputs and weights. The
neuron transfer function is formed by composition of an adapted logistic
function with the mean of the partial input-weight similarities. The resulting
neuron model is capable of dealing directly with variables of potentially
different nature (continuous, fuzzy, ordinal, categorical). There is also
provision for missing values. The network is trained using a two-stage
procedure very similar to that used to train a radial basis function (RBF)
neural network. The network is compared to two types of RBF networks in a
non-trivial dataset: the Horse Colic problem, taken as a case study and
analyzed in detail.
|
1206.5580 | John Moeller | John Moeller, Parasaran Raman, Avishek Saha, Suresh Venkatasubramanian | A Geometric Algorithm for Scalable Multiple Kernel Learning | 20 pages | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a geometric formulation of the Multiple Kernel Learning (MKL)
problem. To do so, we reinterpret the problem of learning kernel weights as
searching for a kernel that maximizes the minimum (kernel) distance between two
convex polytopes. This interpretation combined with novel structural insights
from our geometric formulation allows us to reduce the MKL problem to a simple
optimization routine that yields provable convergence as well as quality
guarantees. As a result our method scales efficiently to much larger data sets
than most prior methods can handle. Empirical evaluation on eleven datasets
shows that we are significantly faster and even compare favorably with a
uniform unweighted combination of kernels.
| [
{
"version": "v1",
"created": "Mon, 25 Jun 2012 05:57:29 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Mar 2014 04:33:18 GMT"
}
] | 2014-03-18T00:00:00 | [
[
"Moeller",
"John",
""
],
[
"Raman",
"Parasaran",
""
],
[
"Saha",
"Avishek",
""
],
[
"Venkatasubramanian",
"Suresh",
""
]
] | TITLE: A Geometric Algorithm for Scalable Multiple Kernel Learning
ABSTRACT: We present a geometric formulation of the Multiple Kernel Learning (MKL)
problem. To do so, we reinterpret the problem of learning kernel weights as
searching for a kernel that maximizes the minimum (kernel) distance between two
convex polytopes. This interpretation combined with novel structural insights
from our geometric formulation allows us to reduce the MKL problem to a simple
optimization routine that yields provable convergence as well as quality
guarantees. As a result our method scales efficiently to much larger data sets
than most prior methods can handle. Empirical evaluation on eleven datasets
shows that we are significantly faster and even compare favorably with a
uniform unweighted combination of kernels.
|
1307.1289 | Miguel Angel Veganzones | Miguel Angel Veganzones (GIPSA), Mihai Datcu (DLR), Manuel Gra\~na
(GIC) | Further results on dissimilarity spaces for hyperspectral images RF-CBIR | In Pattern Recognition Letters (2013) | Pattern Recognition Letters 34, 14 (2013) 1659-1668 | 10.1016/j.patrec.2013.05.025 | veganzones_PRL2013 | cs.IR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Content-Based Image Retrieval (CBIR) systems are powerful search tools in
image databases that have been little applied to hyperspectral images.
Relevance feedback (RF) is an iterative process that uses machine learning
techniques and user's feedback to improve the CBIR systems performance. We
pursued to expand previous research in hyperspectral CBIR systems built on
dissimilarity functions defined either on spectral and spatial features
extracted by spectral unmixing techniques, or on dictionaries extracted by
dictionary-based compressors. These dissimilarity functions were not suitable
for direct application in common machine learning techniques. We propose to use
a RF general approach based on dissimilarity spaces which is more appropriate
for the application of machine learning algorithms to the hyperspectral
RF-CBIR. We validate the proposed RF method for hyperspectral CBIR systems over
a real hyperspectral dataset.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2013 11:58:04 GMT"
}
] | 2014-03-18T00:00:00 | [
[
"Veganzones",
"Miguel Angel",
"",
"GIPSA"
],
[
"Datcu",
"Mihai",
"",
"DLR"
],
[
"Graña",
"Manuel",
"",
"GIC"
]
] | TITLE: Further results on dissimilarity spaces for hyperspectral images RF-CBIR
ABSTRACT: Content-Based Image Retrieval (CBIR) systems are powerful search tools in
image databases that have been little applied to hyperspectral images.
Relevance feedback (RF) is an iterative process that uses machine learning
techniques and user's feedback to improve the CBIR systems performance. We
pursued to expand previous research in hyperspectral CBIR systems built on
dissimilarity functions defined either on spectral and spatial features
extracted by spectral unmixing techniques, or on dictionaries extracted by
dictionary-based compressors. These dissimilarity functions were not suitable
for direct application in common machine learning techniques. We propose to use
a RF general approach based on dissimilarity spaces which is more appropriate
for the application of machine learning algorithms to the hyperspectral
RF-CBIR. We validate the proposed RF method for hyperspectral CBIR systems over
a real hyperspectral dataset.
|
1403.3829 | Wei Di | Zixuan Wang, Wei Di, Anurag Bhardwaj, Vignesh Jagadeesh, Robinson
Piramuthu | Geometric VLAD for Large Scale Image Search | 8 pages | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | We present a novel compact image descriptor for large scale image search. Our
proposed descriptor - Geometric VLAD (gVLAD) is an extension of VLAD (Vector of
Locally Aggregated Descriptors) that incorporates weak geometry information
into the VLAD framework. The proposed geometry cues are derived as a membership
function over keypoint angles which contain evident and informative information
but yet often discarded. A principled technique for learning the membership
function by clustering angles is also presented. Further, to address the
overhead of iterative codebook training over real-time datasets, a novel
codebook adaptation strategy is outlined. Finally, we demonstrate the efficacy
of proposed gVLAD based retrieval framework where we achieve more than 15%
improvement in mAP over existing benchmarks.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2014 17:35:26 GMT"
}
] | 2014-03-18T00:00:00 | [
[
"Wang",
"Zixuan",
""
],
[
"Di",
"Wei",
""
],
[
"Bhardwaj",
"Anurag",
""
],
[
"Jagadeesh",
"Vignesh",
""
],
[
"Piramuthu",
"Robinson",
""
]
] | TITLE: Geometric VLAD for Large Scale Image Search
ABSTRACT: We present a novel compact image descriptor for large scale image search. Our
proposed descriptor - Geometric VLAD (gVLAD) is an extension of VLAD (Vector of
Locally Aggregated Descriptors) that incorporates weak geometry information
into the VLAD framework. The proposed geometry cues are derived as a membership
function over keypoint angles which contain evident and informative information
but yet often discarded. A principled technique for learning the membership
function by clustering angles is also presented. Further, to address the
overhead of iterative codebook training over real-time datasets, a novel
codebook adaptation strategy is outlined. Finally, we demonstrate the efficacy
of proposed gVLAD based retrieval framework where we achieve more than 15%
improvement in mAP over existing benchmarks.
|
1403.3996 | Vineeth Kashyap | Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin
Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf | JSAI: Designing a Sound, Configurable, and Efficient Static Analyzer for
JavaScript | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe JSAI, an abstract interpreter for JavaScript. JSAI uses novel
abstract domains to compute a reduced product of type inference, pointer
analysis, string analysis, integer and boolean constant propagation, and
control-flow analysis. In addition, JSAI allows for analysis control-flow
sensitivity (i.e., context-, path-, and heap-sensitivity) to be modularly
configured without requiring any changes to the analysis implementation. JSAI
is designed to be provably sound with respect to a specific concrete semantics
for JavaScript, which has been extensively tested against existing
production-quality JavaScript implementations.
We provide a comprehensive evaluation of JSAI's performance and precision
using an extensive benchmark suite. This benchmark suite includes real-world
JavaScript applications, machine-generated JavaScript code via Emscripten, and
browser addons. We use JSAI's configurability to evaluate a large number of
analysis sensitivities (some well-known, some novel) and observe some
surprising results. We believe that JSAI's configurability and its formal
specifications position it as a useful research platform to experiment on novel
sensitivities, abstract domains, and client analyses for JavaScript.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2014 04:29:25 GMT"
}
] | 2014-03-18T00:00:00 | [
[
"Kashyap",
"Vineeth",
""
],
[
"Dewey",
"Kyle",
""
],
[
"Kuefner",
"Ethan A.",
""
],
[
"Wagner",
"John",
""
],
[
"Gibbons",
"Kevin",
""
],
[
"Sarracino",
"John",
""
],
[
"Wiedermann",
"Ben",
""
],
[
"Hardekopf",
"Ben",
""
]
] | TITLE: JSAI: Designing a Sound, Configurable, and Efficient Static Analyzer for
JavaScript
ABSTRACT: We describe JSAI, an abstract interpreter for JavaScript. JSAI uses novel
abstract domains to compute a reduced product of type inference, pointer
analysis, string analysis, integer and boolean constant propagation, and
control-flow analysis. In addition, JSAI allows for analysis control-flow
sensitivity (i.e., context-, path-, and heap-sensitivity) to be modularly
configured without requiring any changes to the analysis implementation. JSAI
is designed to be provably sound with respect to a specific concrete semantics
for JavaScript, which has been extensively tested against existing
production-quality JavaScript implementations.
We provide a comprehensive evaluation of JSAI's performance and precision
using an extensive benchmark suite. This benchmark suite includes real-world
JavaScript applications, machine-generated JavaScript code via Emscripten, and
browser addons. We use JSAI's configurability to evaluate a large number of
analysis sensitivities (some well-known, some novel) and observe some
surprising results. We believe that JSAI's configurability and its formal
specifications position it as a useful research platform to experiment on novel
sensitivities, abstract domains, and client analyses for JavaScript.
|
1403.4017 | Longqi Yang | Longqi Yang, Yibing Wang, Zhisong Pan and Guyu Hu | Multi-task Feature Selection based Anomaly Detection | 6 pages, 5 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network anomaly detection is still a vibrant research area. As the fast
growth of network bandwidth and the tremendous traffic on the network, there
arises an extremely challengeable question: How to efficiently and accurately
detect the anomaly on multiple traffic? In multi-task learning, the traffic
consisting of flows at different time periods is considered as a task. Multiple
tasks at different time periods performed simultaneously to detect anomalies.
In this paper, we apply the multi-task feature selection in network anomaly
detection area which provides a powerful method to gather information from
multiple traffic and detect anomalies on it simultaneously. In particular, the
multi-task feature selection includes the well-known l1-norm based feature
selection as a special case given only one task. Moreover, we show that the
multi-task feature selection is more accurate by utilizing more information
simultaneously than the l1-norm based method. At the evaluation stage, we
preprocess the raw data trace from trans-Pacific backbone link between Japan
and the United States, label with anomaly communities, and generate a
248-feature dataset. We show empirically that the multi-task feature selection
outperforms independent l1-norm based feature selection on real traffic
dataset.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2014 08:04:41 GMT"
}
] | 2014-03-18T00:00:00 | [
[
"Yang",
"Longqi",
""
],
[
"Wang",
"Yibing",
""
],
[
"Pan",
"Zhisong",
""
],
[
"Hu",
"Guyu",
""
]
] | TITLE: Multi-task Feature Selection based Anomaly Detection
ABSTRACT: Network anomaly detection is still a vibrant research area. As the fast
growth of network bandwidth and the tremendous traffic on the network, there
arises an extremely challengeable question: How to efficiently and accurately
detect the anomaly on multiple traffic? In multi-task learning, the traffic
consisting of flows at different time periods is considered as a task. Multiple
tasks at different time periods performed simultaneously to detect anomalies.
In this paper, we apply the multi-task feature selection in network anomaly
detection area which provides a powerful method to gather information from
multiple traffic and detect anomalies on it simultaneously. In particular, the
multi-task feature selection includes the well-known l1-norm based feature
selection as a special case given only one task. Moreover, we show that the
multi-task feature selection is more accurate by utilizing more information
simultaneously than the l1-norm based method. At the evaluation stage, we
preprocess the raw data trace from trans-Pacific backbone link between Japan
and the United States, label with anomaly communities, and generate a
248-feature dataset. We show empirically that the multi-task feature selection
outperforms independent l1-norm based feature selection on real traffic
dataset.
|
1205.1758 | Jonathan Ullman | Justin Thaler, Jonathan Ullman, Salil Vadhan | Faster Algorithms for Privately Releasing Marginals | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of releasing $k$-way marginals of a database $D \in
(\{0,1\}^d)^n$, while preserving differential privacy. The answer to a $k$-way
marginal query is the fraction of $D$'s records $x \in \{0,1\}^d$ with a given
value in each of a given set of up to $k$ columns. Marginal queries enable a
rich class of statistical analyses of a dataset, and designing efficient
algorithms for privately releasing marginal queries has been identified as an
important open problem in private data analysis (cf. Barak et. al., PODS '07).
We give an algorithm that runs in time $d^{O(\sqrt{k})}$ and releases a
private summary capable of answering any $k$-way marginal query with at most
$\pm .01$ error on every query as long as $n \geq d^{O(\sqrt{k})}$. To our
knowledge, ours is the first algorithm capable of privately releasing marginal
queries with non-trivial worst-case accuracy guarantees in time substantially
smaller than the number of $k$-way marginal queries, which is $d^{\Theta(k)}$
(for $k \ll d$).
| [
{
"version": "v1",
"created": "Tue, 8 May 2012 17:43:11 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jun 2012 14:59:54 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Mar 2014 13:56:07 GMT"
}
] | 2014-03-17T00:00:00 | [
[
"Thaler",
"Justin",
""
],
[
"Ullman",
"Jonathan",
""
],
[
"Vadhan",
"Salil",
""
]
] | TITLE: Faster Algorithms for Privately Releasing Marginals
ABSTRACT: We study the problem of releasing $k$-way marginals of a database $D \in
(\{0,1\}^d)^n$, while preserving differential privacy. The answer to a $k$-way
marginal query is the fraction of $D$'s records $x \in \{0,1\}^d$ with a given
value in each of a given set of up to $k$ columns. Marginal queries enable a
rich class of statistical analyses of a dataset, and designing efficient
algorithms for privately releasing marginal queries has been identified as an
important open problem in private data analysis (cf. Barak et. al., PODS '07).
We give an algorithm that runs in time $d^{O(\sqrt{k})}$ and releases a
private summary capable of answering any $k$-way marginal query with at most
$\pm .01$ error on every query as long as $n \geq d^{O(\sqrt{k})}$. To our
knowledge, ours is the first algorithm capable of privately releasing marginal
queries with non-trivial worst-case accuracy guarantees in time substantially
smaller than the number of $k$-way marginal queries, which is $d^{\Theta(k)}$
(for $k \ll d$).
|
1304.0869 | Conrad Sanderson | Yongkang Wong, Shaokang Chen, Sandra Mau, Conrad Sanderson, Brian C.
Lovell | Patch-based Probabilistic Image Quality Assessment for Face Selection
and Improved Video-based Face Recognition | null | IEEE Conference on Computer Vision and Pattern Recognition
Workshops (CVPRW), pp. 74-81, 2011 | 10.1109/CVPRW.2011.5981881 | null | cs.CV stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In video based face recognition, face images are typically captured over
multiple frames in uncontrolled conditions, where head pose, illumination,
shadowing, motion blur and focus change over the sequence. Additionally,
inaccuracies in face localisation can also introduce scale and alignment
variations. Using all face images, including images of poor quality, can
actually degrade face recognition performance. While one solution it to use
only the "best" subset of images, current face selection techniques are
incapable of simultaneously handling all of the abovementioned issues. We
propose an efficient patch-based face image quality assessment algorithm which
quantifies the similarity of a face image to a probabilistic face model,
representing an "ideal" face. Image characteristics that affect recognition are
taken into account, including variations in geometric alignment (shift,
rotation and scale), sharpness, head pose and cast shadows. Experiments on
FERET and PIE datasets show that the proposed algorithm is able to identify
images which are simultaneously the most frontal, aligned, sharp and well
illuminated. Further experiments on a new video surveillance dataset (termed
ChokePoint) show that the proposed method provides better face subsets than
existing face selection techniques, leading to significant improvements in
recognition accuracy.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2013 08:41:23 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Mar 2014 15:53:31 GMT"
}
] | 2014-03-17T00:00:00 | [
[
"Wong",
"Yongkang",
""
],
[
"Chen",
"Shaokang",
""
],
[
"Mau",
"Sandra",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Lovell",
"Brian C.",
""
]
] | TITLE: Patch-based Probabilistic Image Quality Assessment for Face Selection
and Improved Video-based Face Recognition
ABSTRACT: In video based face recognition, face images are typically captured over
multiple frames in uncontrolled conditions, where head pose, illumination,
shadowing, motion blur and focus change over the sequence. Additionally,
inaccuracies in face localisation can also introduce scale and alignment
variations. Using all face images, including images of poor quality, can
actually degrade face recognition performance. While one solution it to use
only the "best" subset of images, current face selection techniques are
incapable of simultaneously handling all of the abovementioned issues. We
propose an efficient patch-based face image quality assessment algorithm which
quantifies the similarity of a face image to a probabilistic face model,
representing an "ideal" face. Image characteristics that affect recognition are
taken into account, including variations in geometric alignment (shift,
rotation and scale), sharpness, head pose and cast shadows. Experiments on
FERET and PIE datasets show that the proposed algorithm is able to identify
images which are simultaneously the most frontal, aligned, sharp and well
illuminated. Further experiments on a new video surveillance dataset (termed
ChokePoint) show that the proposed method provides better face subsets than
existing face selection techniques, leading to significant improvements in
recognition accuracy.
|
1403.3460 | Chi Wang | Chi Wang, Xueqing Liu, Yanglei Song, Jiawei Han | Scalable and Robust Construction of Topical Hierarchies | null | null | null | null | cs.LG cs.CL cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automated generation of high-quality topical hierarchies for a text
collection is a dream problem in knowledge engineering with many valuable
applications. In this paper a scalable and robust algorithm is proposed for
constructing a hierarchy of topics from a text collection. We divide and
conquer the problem using a top-down recursive framework, based on a tensor
orthogonal decomposition technique. We solve a critical challenge to perform
scalable inference for our newly designed hierarchical topic model. Experiments
with various real-world datasets illustrate its ability to generate robust,
high-quality hierarchies efficiently. Our method reduces the time of
construction by several orders of magnitude, and its robust feature renders it
possible for users to interactively revise the hierarchy.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2014 23:22:21 GMT"
}
] | 2014-03-17T00:00:00 | [
[
"Wang",
"Chi",
""
],
[
"Liu",
"Xueqing",
""
],
[
"Song",
"Yanglei",
""
],
[
"Han",
"Jiawei",
""
]
] | TITLE: Scalable and Robust Construction of Topical Hierarchies
ABSTRACT: Automated generation of high-quality topical hierarchies for a text
collection is a dream problem in knowledge engineering with many valuable
applications. In this paper a scalable and robust algorithm is proposed for
constructing a hierarchy of topics from a text collection. We divide and
conquer the problem using a top-down recursive framework, based on a tensor
orthogonal decomposition technique. We solve a critical challenge to perform
scalable inference for our newly designed hierarchical topic model. Experiments
with various real-world datasets illustrate its ability to generate robust,
high-quality hierarchies efficiently. Our method reduces the time of
construction by several orders of magnitude, and its robust feature renders it
possible for users to interactively revise the hierarchy.
|
1403.3480 | Fan Liang | Fan Liang, Chen Feng, Xiaoyi Lu, Zhiwei Xu | Performance Benefits of DataMPI: A Case Study with BigDataBench | null | null | null | null | cs.PF cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Apache Hadoop and Spark are gaining prominence in Big Data processing and
analytics. Both of them are widely deployed on Internet companies. On the other
hand, high-performance data analysis requirements are causing academical and
industrial communities to adopt state-of-the-art technologies in HPC to solve
Big Data problems. Recently, we have proposed a key-value pair based
communication library, DataMPI, which is extending MPI to support
Hadoop/Spark-like Big Data Computing jobs. In this paper, we use BigDataBench,
a Big Data benchmark suite, to do comprehensive studies on performance and
resource utilization characterizations of Hadoop, Spark and DataMPI. From our
experiments, we observe that the job execution time of DataMPI has up to 55%
and 39% speedups compared with those of Hadoop and Spark, respectively. Most of
the benefits come from the high-efficiency communication mechanisms in DataMPI.
We also notice that the resource (CPU, memory, disk and network I/O)
utilizations of DataMPI are also more efficient than those of the other two
frameworks.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2014 03:06:34 GMT"
}
] | 2014-03-17T00:00:00 | [
[
"Liang",
"Fan",
""
],
[
"Feng",
"Chen",
""
],
[
"Lu",
"Xiaoyi",
""
],
[
"Xu",
"Zhiwei",
""
]
] | TITLE: Performance Benefits of DataMPI: A Case Study with BigDataBench
ABSTRACT: Apache Hadoop and Spark are gaining prominence in Big Data processing and
analytics. Both of them are widely deployed on Internet companies. On the other
hand, high-performance data analysis requirements are causing academical and
industrial communities to adopt state-of-the-art technologies in HPC to solve
Big Data problems. Recently, we have proposed a key-value pair based
communication library, DataMPI, which is extending MPI to support
Hadoop/Spark-like Big Data Computing jobs. In this paper, we use BigDataBench,
a Big Data benchmark suite, to do comprehensive studies on performance and
resource utilization characterizations of Hadoop, Spark and DataMPI. From our
experiments, we observe that the job execution time of DataMPI has up to 55%
and 39% speedups compared with those of Hadoop and Spark, respectively. Most of
the benefits come from the high-efficiency communication mechanisms in DataMPI.
We also notice that the resource (CPU, memory, disk and network I/O)
utilizations of DataMPI are also more efficient than those of the other two
frameworks.
|
1403.3628 | Remi Flamary | R\'emi Flamary (LAGRANGE), Nisrine Jrad (GIPSA-lab), Ronald Phlypo
(GIPSA-lab), Marco Congedo (GIPSA-lab), Alain Rakotomamonjy (LITIS) | Mixed-norm Regularization for Brain Decoding | Computational and Mathematical Methods in Medicine (2014)
http://www.hindawi.com/journals/cmmm/ | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work investigates the use of mixed-norm regularization for sensor
selection in Event-Related Potential (ERP) based Brain-Computer Interfaces
(BCI). The classification problem is cast as a discriminative optimization
framework where sensor selection is induced through the use of mixed-norms.
This framework is extended to the multi-task learning situation where several
similar classification tasks related to different subjects are learned
simultaneously. In this case, multi-task learning helps in leveraging data
scarcity issue yielding to more robust classifiers. For this purpose, we have
introduced a regularizer that induces both sensor selection and classifier
similarities. The different regularization approaches are compared on three ERP
datasets showing the interest of mixed-norm regularization in terms of sensor
selection. The multi-task approaches are evaluated when a small number of
learning examples are available yielding to significant performance
improvements especially for subjects performing poorly.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2014 16:15:24 GMT"
}
] | 2014-03-17T00:00:00 | [
[
"Flamary",
"Rémi",
"",
"LAGRANGE"
],
[
"Jrad",
"Nisrine",
"",
"GIPSA-lab"
],
[
"Phlypo",
"Ronald",
"",
"GIPSA-lab"
],
[
"Congedo",
"Marco",
"",
"GIPSA-lab"
],
[
"Rakotomamonjy",
"Alain",
"",
"LITIS"
]
] | TITLE: Mixed-norm Regularization for Brain Decoding
ABSTRACT: This work investigates the use of mixed-norm regularization for sensor
selection in Event-Related Potential (ERP) based Brain-Computer Interfaces
(BCI). The classification problem is cast as a discriminative optimization
framework where sensor selection is induced through the use of mixed-norms.
This framework is extended to the multi-task learning situation where several
similar classification tasks related to different subjects are learned
simultaneously. In this case, multi-task learning helps in leveraging data
scarcity issue yielding to more robust classifiers. For this purpose, we have
introduced a regularizer that induces both sensor selection and classifier
similarities. The different regularization approaches are compared on three ERP
datasets showing the interest of mixed-norm regularization in terms of sensor
selection. The multi-task approaches are evaluated when a small number of
learning examples are available yielding to significant performance
improvements especially for subjects performing poorly.
|
1403.2802 | Zhimin Cao | Haoqiang Fan, Zhimin Cao, Yuning Jiang, Qi Yin, Chinchilla Doudou | Learning Deep Face Representation | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Face representation is a crucial step of face recognition systems. An optimal
face representation should be discriminative, robust, compact, and very
easy-to-implement. While numerous hand-crafted and learning-based
representations have been proposed, considerable room for improvement is still
present. In this paper, we present a very easy-to-implement deep learning
framework for face representation. Our method bases on a new structure of deep
network (called Pyramid CNN). The proposed Pyramid CNN adopts a
greedy-filter-and-down-sample operation, which enables the training procedure
to be very fast and computation-efficient. In addition, the structure of
Pyramid CNN can naturally incorporate feature sharing across multi-scale face
representations, increasing the discriminative ability of resulting
representation. Our basic network is capable of achieving high recognition
accuracy ($85.8\%$ on LFW benchmark) with only 8 dimension representation. When
extended to feature-sharing Pyramid CNN, our system achieves the
state-of-the-art performance ($97.3\%$) on LFW benchmark. We also introduce a
new benchmark of realistic face images on social network and validate our
proposed representation has a good ability of generalization.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2014 03:47:18 GMT"
}
] | 2014-03-13T00:00:00 | [
[
"Fan",
"Haoqiang",
""
],
[
"Cao",
"Zhimin",
""
],
[
"Jiang",
"Yuning",
""
],
[
"Yin",
"Qi",
""
],
[
"Doudou",
"Chinchilla",
""
]
] | TITLE: Learning Deep Face Representation
ABSTRACT: Face representation is a crucial step of face recognition systems. An optimal
face representation should be discriminative, robust, compact, and very
easy-to-implement. While numerous hand-crafted and learning-based
representations have been proposed, considerable room for improvement is still
present. In this paper, we present a very easy-to-implement deep learning
framework for face representation. Our method bases on a new structure of deep
network (called Pyramid CNN). The proposed Pyramid CNN adopts a
greedy-filter-and-down-sample operation, which enables the training procedure
to be very fast and computation-efficient. In addition, the structure of
Pyramid CNN can naturally incorporate feature sharing across multi-scale face
representations, increasing the discriminative ability of resulting
representation. Our basic network is capable of achieving high recognition
accuracy ($85.8\%$ on LFW benchmark) with only 8 dimension representation. When
extended to feature-sharing Pyramid CNN, our system achieves the
state-of-the-art performance ($97.3\%$) on LFW benchmark. We also introduce a
new benchmark of realistic face images on social network and validate our
proposed representation has a good ability of generalization.
|
1403.3060 | Chanabasayya Vastrad M | Doreswamy, Chanabasayya M. Vastrad | Non linear Prediction of Antitubercular Activity Of Oxazolines and
Oxazoles derivatives Making Use of Compact TS-Fuzzy models Through Clustering
with orthogonal least sqaure technique and Fuzzy identification system | Published 2013 | null | null | null | cs.CE | http://creativecommons.org/licenses/by/3.0/ | The prediction of uncertain and predictive nonlinear systems is an important
and challenging problem. Fuzzy logic models are often a good choice to describe
such systems however in many cases these become complex soon. commonlly, too
less effort is put into descriptor selection and in the creation of suitable
local rules. Moreover, in common no model reduction is applied, while this may
analyze the model by removing redundant data. This paper suggests a combined
method that deal with these issues in order to create compact Takagi Sugeno
(TS) models that can be effectively used to represent complex predictive
systems. A new fuzzy clustering method is come up with for the identification
of compact TS-fuzzy models. The best relevant consequent variables of the TS
model are choosen by an orthogonal least squares technique based on the
obtained clusters.For the selection of the relevant antecedent (scheduling)
variables a new method has been developed based on Fisher's interclass
separability basis. This complete approach is demonstrated by means of the
Oxazolines and Oxazoles derivatives as antituberculosis agent for nonlinear
regression benchmark. The results are compared with results obtained by
neuro-fuzzy i.e. ANFIS algorithm and advanced fuzzyy clustering techniques i.e
FMID toolbox .
| [
{
"version": "v1",
"created": "Sat, 22 Feb 2014 02:40:40 GMT"
}
] | 2014-03-13T00:00:00 | [
[
"Doreswamy",
"",
""
],
[
"Vastrad",
"Chanabasayya M.",
""
]
] | TITLE: Non linear Prediction of Antitubercular Activity Of Oxazolines and
Oxazoles derivatives Making Use of Compact TS-Fuzzy models Through Clustering
with orthogonal least sqaure technique and Fuzzy identification system
ABSTRACT: The prediction of uncertain and predictive nonlinear systems is an important
and challenging problem. Fuzzy logic models are often a good choice to describe
such systems however in many cases these become complex soon. commonlly, too
less effort is put into descriptor selection and in the creation of suitable
local rules. Moreover, in common no model reduction is applied, while this may
analyze the model by removing redundant data. This paper suggests a combined
method that deal with these issues in order to create compact Takagi Sugeno
(TS) models that can be effectively used to represent complex predictive
systems. A new fuzzy clustering method is come up with for the identification
of compact TS-fuzzy models. The best relevant consequent variables of the TS
model are choosen by an orthogonal least squares technique based on the
obtained clusters.For the selection of the relevant antecedent (scheduling)
variables a new method has been developed based on Fisher's interclass
separability basis. This complete approach is demonstrated by means of the
Oxazolines and Oxazoles derivatives as antituberculosis agent for nonlinear
regression benchmark. The results are compared with results obtained by
neuro-fuzzy i.e. ANFIS algorithm and advanced fuzzyy clustering techniques i.e
FMID toolbox .
|
1403.2372 | Mehdi Naseriparsa | Mehdi Naseriparsa, Amir-Masoud Bidgoli, Touraj Varaee | A Hybrid Feature Selection Method to Improve Performance of a Group of
Classification Algorithms | 8 pages. arXiv admin note: substantial text overlap with
arXiv:1403.1946; and text overlap with arXiv:1106.1813 by other authors | International Journal of Computer Applications,Vol 69,No 17,pp
28-35,2013 | 10.5120/12065-8172 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper a hybrid feature selection method is proposed which takes
advantages of wrapper subset evaluation with a lower cost and improves the
performance of a group of classifiers. The method uses combination of sample
domain filtering and resampling to refine the sample domain and two feature
subset evaluation methods to select reliable features. This method utilizes
both feature space and sample domain in two phases. The first phase filters and
resamples the sample domain and the second phase adopts a hybrid procedure by
information gain, wrapper subset evaluation and genetic search to find the
optimal feature space. Experiments carried out on different types of datasets
from UCI Repository of Machine Learning databases and the results show a rise
in the average performance of five classifiers (Naive Bayes, Logistic,
Multilayer Perceptron, Best First Decision Tree and JRIP) simultaneously and
the classification error for these classifiers decreases considerably. The
experiments also show that this method outperforms other feature selection
methods with a lower cost.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2014 08:04:29 GMT"
}
] | 2014-03-12T00:00:00 | [
[
"Naseriparsa",
"Mehdi",
""
],
[
"Bidgoli",
"Amir-Masoud",
""
],
[
"Varaee",
"Touraj",
""
]
] | TITLE: A Hybrid Feature Selection Method to Improve Performance of a Group of
Classification Algorithms
ABSTRACT: In this paper a hybrid feature selection method is proposed which takes
advantages of wrapper subset evaluation with a lower cost and improves the
performance of a group of classifiers. The method uses combination of sample
domain filtering and resampling to refine the sample domain and two feature
subset evaluation methods to select reliable features. This method utilizes
both feature space and sample domain in two phases. The first phase filters and
resamples the sample domain and the second phase adopts a hybrid procedure by
information gain, wrapper subset evaluation and genetic search to find the
optimal feature space. Experiments carried out on different types of datasets
from UCI Repository of Machine Learning databases and the results show a rise
in the average performance of five classifiers (Naive Bayes, Logistic,
Multilayer Perceptron, Best First Decision Tree and JRIP) simultaneously and
the classification error for these classifiers decreases considerably. The
experiments also show that this method outperforms other feature selection
methods with a lower cost.
|
1403.2404 | Long Cheng | Long Cheng, Avinash Malik, Spyros Kotoulas, Tomas E Ward, Georgios
Theodoropoulos | Scalable RDF Data Compression using X10 | null | null | null | null | cs.DC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Semantic Web comprises enormous volumes of semi-structured data elements.
For interoperability, these elements are represented by long strings. Such
representations are not efficient for the purposes of Semantic Web applications
that perform computations over large volumes of information. A typical method
for alleviating the impact of this problem is through the use of compression
methods that produce more compact representations of the data. The use of
dictionary encoding for this purpose is particularly prevalent in Semantic Web
database systems. However, centralized implementations present performance
bottlenecks, giving rise to the need for scalable, efficient distributed
encoding schemes. In this paper, we describe an encoding implementation based
on the asynchronous partitioned global address space (APGAS) parallel
programming model. We evaluate performance on a cluster of up to 384 cores and
datasets of up to 11 billion triples (1.9 TB). Compared to the state-of-art
MapReduce algorithm, we demonstrate a speedup of 2.6-7.4x and excellent
scalability. These results illustrate the strong potential of the APGAS model
for efficient implementation of dictionary encoding and contributes to the
engineering of larger scale Semantic Web applications.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2014 20:48:08 GMT"
}
] | 2014-03-12T00:00:00 | [
[
"Cheng",
"Long",
""
],
[
"Malik",
"Avinash",
""
],
[
"Kotoulas",
"Spyros",
""
],
[
"Ward",
"Tomas E",
""
],
[
"Theodoropoulos",
"Georgios",
""
]
] | TITLE: Scalable RDF Data Compression using X10
ABSTRACT: The Semantic Web comprises enormous volumes of semi-structured data elements.
For interoperability, these elements are represented by long strings. Such
representations are not efficient for the purposes of Semantic Web applications
that perform computations over large volumes of information. A typical method
for alleviating the impact of this problem is through the use of compression
methods that produce more compact representations of the data. The use of
dictionary encoding for this purpose is particularly prevalent in Semantic Web
database systems. However, centralized implementations present performance
bottlenecks, giving rise to the need for scalable, efficient distributed
encoding schemes. In this paper, we describe an encoding implementation based
on the asynchronous partitioned global address space (APGAS) parallel
programming model. We evaluate performance on a cluster of up to 384 cores and
datasets of up to 11 billion triples (1.9 TB). Compared to the state-of-art
MapReduce algorithm, we demonstrate a speedup of 2.6-7.4x and excellent
scalability. These results illustrate the strong potential of the APGAS model
for efficient implementation of dictionary encoding and contributes to the
engineering of larger scale Semantic Web applications.
|
1309.2074 | Qiang Qiu | Qiang Qiu, Guillermo Sapiro | Learning Transformations for Clustering and Classification | arXiv admin note: substantial text overlap with arXiv:1308.0273,
arXiv:1308.0275 | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A low-rank transformation learning framework for subspace clustering and
classification is here proposed. Many high-dimensional data, such as face
images and motion sequences, approximately lie in a union of low-dimensional
subspaces. The corresponding subspace clustering problem has been extensively
studied in the literature to partition such high-dimensional data into clusters
corresponding to their underlying low-dimensional subspaces. However,
low-dimensional intrinsic structures are often violated for real-world
observations, as they can be corrupted by errors or deviate from ideal models.
We propose to address this by learning a linear transformation on subspaces
using matrix rank, via its convex surrogate nuclear norm, as the optimization
criteria. The learned linear transformation restores a low-rank structure for
data from the same subspace, and, at the same time, forces a a maximally
separated structure for data from different subspaces. In this way, we reduce
variations within subspaces, and increase separation between subspaces for a
more robust subspace clustering. This proposed learned robust subspace
clustering framework significantly enhances the performance of existing
subspace clustering methods. Basic theoretical results here presented help to
further support the underlying framework. To exploit the low-rank structures of
the transformed subspaces, we further introduce a fast subspace clustering
technique, which efficiently combines robust PCA with sparse modeling. When
class labels are present at the training stage, we show this low-rank
transformation framework also significantly enhances classification
performance. Extensive experiments using public datasets are presented, showing
that the proposed approach significantly outperforms state-of-the-art methods
for subspace clustering and classification.
| [
{
"version": "v1",
"created": "Mon, 9 Sep 2013 09:16:02 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Mar 2014 18:50:35 GMT"
}
] | 2014-03-11T00:00:00 | [
[
"Qiu",
"Qiang",
""
],
[
"Sapiro",
"Guillermo",
""
]
] | TITLE: Learning Transformations for Clustering and Classification
ABSTRACT: A low-rank transformation learning framework for subspace clustering and
classification is here proposed. Many high-dimensional data, such as face
images and motion sequences, approximately lie in a union of low-dimensional
subspaces. The corresponding subspace clustering problem has been extensively
studied in the literature to partition such high-dimensional data into clusters
corresponding to their underlying low-dimensional subspaces. However,
low-dimensional intrinsic structures are often violated for real-world
observations, as they can be corrupted by errors or deviate from ideal models.
We propose to address this by learning a linear transformation on subspaces
using matrix rank, via its convex surrogate nuclear norm, as the optimization
criteria. The learned linear transformation restores a low-rank structure for
data from the same subspace, and, at the same time, forces a a maximally
separated structure for data from different subspaces. In this way, we reduce
variations within subspaces, and increase separation between subspaces for a
more robust subspace clustering. This proposed learned robust subspace
clustering framework significantly enhances the performance of existing
subspace clustering methods. Basic theoretical results here presented help to
further support the underlying framework. To exploit the low-rank structures of
the transformed subspaces, we further introduce a fast subspace clustering
technique, which efficiently combines robust PCA with sparse modeling. When
class labels are present at the training stage, we show this low-rank
transformation framework also significantly enhances classification
performance. Extensive experiments using public datasets are presented, showing
that the proposed approach significantly outperforms state-of-the-art methods
for subspace clustering and classification.
|
1312.4314 | David Eigen | David Eigen, Marc'Aurelio Ranzato, Ilya Sutskever | Learning Factored Representations in a Deep Mixture of Experts | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mixtures of Experts combine the outputs of several "expert" networks, each of
which specializes in a different part of the input space. This is achieved by
training a "gating" network that maps each input to a distribution over the
experts. Such models show promise for building larger networks that are still
cheap to compute at test time, and more parallelizable at training time. In
this this work, we extend the Mixture of Experts to a stacked model, the Deep
Mixture of Experts, with multiple sets of gating and experts. This
exponentially increases the number of effective experts by associating each
input with a combination of experts at each layer, yet maintains a modest model
size. On a randomly translated version of the MNIST dataset, we find that the
Deep Mixture of Experts automatically learns to develop location-dependent
("where") experts at the first layer, and class-specific ("what") experts at
the second layer. In addition, we see that the different combinations are in
use when the model is applied to a dataset of speech monophones. These
demonstrate effective use of all expert combinations.
| [
{
"version": "v1",
"created": "Mon, 16 Dec 2013 11:15:10 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Feb 2014 17:57:53 GMT"
},
{
"version": "v3",
"created": "Sun, 9 Mar 2014 20:15:03 GMT"
}
] | 2014-03-11T00:00:00 | [
[
"Eigen",
"David",
""
],
[
"Ranzato",
"Marc'Aurelio",
""
],
[
"Sutskever",
"Ilya",
""
]
] | TITLE: Learning Factored Representations in a Deep Mixture of Experts
ABSTRACT: Mixtures of Experts combine the outputs of several "expert" networks, each of
which specializes in a different part of the input space. This is achieved by
training a "gating" network that maps each input to a distribution over the
experts. Such models show promise for building larger networks that are still
cheap to compute at test time, and more parallelizable at training time. In
this this work, we extend the Mixture of Experts to a stacked model, the Deep
Mixture of Experts, with multiple sets of gating and experts. This
exponentially increases the number of effective experts by associating each
input with a combination of experts at each layer, yet maintains a modest model
size. On a randomly translated version of the MNIST dataset, we find that the
Deep Mixture of Experts automatically learns to develop location-dependent
("where") experts at the first layer, and class-specific ("what") experts at
the second layer. In addition, we see that the different combinations are in
use when the model is applied to a dataset of speech monophones. These
demonstrate effective use of all expert combinations.
|
1401.0509 | Yann Dauphin | Yann N. Dauphin, Gokhan Tur, Dilek Hakkani-Tur, Larry Heck | Zero-Shot Learning for Semantic Utterance Classification | null | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by/3.0/ | We propose a novel zero-shot learning method for semantic utterance
classification (SUC). It learns a classifier $f: X \to Y$ for problems where
none of the semantic categories $Y$ are present in the training set. The
framework uncovers the link between categories and utterances using a semantic
space. We show that this semantic space can be learned by deep neural networks
trained on large amounts of search engine query log data. More precisely, we
propose a novel method that can learn discriminative semantic features without
supervision. It uses the zero-shot learning framework to guide the learning of
the semantic features. We demonstrate the effectiveness of the zero-shot
semantic learning algorithm on the SUC dataset collected by (Tur, 2012).
Furthermore, we achieve state-of-the-art results by combining the semantic
features with a supervised method.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 17:08:26 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Feb 2014 20:34:08 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Mar 2014 23:31:02 GMT"
}
] | 2014-03-11T00:00:00 | [
[
"Dauphin",
"Yann N.",
""
],
[
"Tur",
"Gokhan",
""
],
[
"Hakkani-Tur",
"Dilek",
""
],
[
"Heck",
"Larry",
""
]
] | TITLE: Zero-Shot Learning for Semantic Utterance Classification
ABSTRACT: We propose a novel zero-shot learning method for semantic utterance
classification (SUC). It learns a classifier $f: X \to Y$ for problems where
none of the semantic categories $Y$ are present in the training set. The
framework uncovers the link between categories and utterances using a semantic
space. We show that this semantic space can be learned by deep neural networks
trained on large amounts of search engine query log data. More precisely, we
propose a novel method that can learn discriminative semantic features without
supervision. It uses the zero-shot learning framework to guide the learning of
the semantic features. We demonstrate the effectiveness of the zero-shot
semantic learning algorithm on the SUC dataset collected by (Tur, 2012).
Furthermore, we achieve state-of-the-art results by combining the semantic
features with a supervised method.
|
1403.1946 | Mehdi Naseriparsa | Mehdi Naseriparsa, Amir-masoud Bidgoli, Touraj Varaee | Improving Performance of a Group of Classification Algorithms Using
Resampling and Feature Selection | 7 pages | World of Computer Science and Information Technology Journal,Vol
3, No 4,pp 70-76,2013 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years the importance of finding a meaningful pattern from huge
datasets has become more challenging. Data miners try to adopt innovative
methods to face this problem by applying feature selection methods. In this
paper we propose a new hybrid method in which we use a combination of
resampling, filtering the sample domain and wrapper subset evaluation method
with genetic search to reduce dimensions of Lung-Cancer dataset that we
received from UCI Repository of Machine Learning databases. Finally, we apply
some well- known classification algorithms (Na\"ive Bayes, Logistic, Multilayer
Perceptron, Best First Decision Tree and JRIP) to the resulting dataset and
compare the results and prediction rates before and after the application of
our feature selection method on that dataset. The results show a substantial
progress in the average performance of five classification algorithms
simultaneously and the classification error for these classifiers decreases
considerably. The experiments also show that this method outperforms other
feature selection methods with a lower cost.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2014 07:47:44 GMT"
}
] | 2014-03-11T00:00:00 | [
[
"Naseriparsa",
"Mehdi",
""
],
[
"Bidgoli",
"Amir-masoud",
""
],
[
"Varaee",
"Touraj",
""
]
] | TITLE: Improving Performance of a Group of Classification Algorithms Using
Resampling and Feature Selection
ABSTRACT: In recent years the importance of finding a meaningful pattern from huge
datasets has become more challenging. Data miners try to adopt innovative
methods to face this problem by applying feature selection methods. In this
paper we propose a new hybrid method in which we use a combination of
resampling, filtering the sample domain and wrapper subset evaluation method
with genetic search to reduce dimensions of Lung-Cancer dataset that we
received from UCI Repository of Machine Learning databases. Finally, we apply
some well- known classification algorithms (Na\"ive Bayes, Logistic, Multilayer
Perceptron, Best First Decision Tree and JRIP) to the resulting dataset and
compare the results and prediction rates before and after the application of
our feature selection method on that dataset. The results show a substantial
progress in the average performance of five classification algorithms
simultaneously and the classification error for these classifiers decreases
considerably. The experiments also show that this method outperforms other
feature selection methods with a lower cost.
|
1403.1949 | Mehdi Naseriparsa | Mehdi Naseriparsa, Mohammad Mansour Riahi Kashani | Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in
Lung Cancer Dataset | 6 pages. arXiv admin note: text overlap with arXiv:1106.1813,
arXiv:1001.1446 by other authors | International Journal of Computer Applications,Vol 77,No 3,pp
33-38,2013 | 10.5120/13376-0987 | null | cs.LG cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classification algorithms are unable to make reliable models on the datasets
with huge sizes. These datasets contain many irrelevant and redundant features
that mislead the classifiers. Furthermore, many huge datasets have imbalanced
class distribution which leads to bias over majority class in the
classification process. In this paper combination of unsupervised
dimensionality reduction methods with resampling is proposed and the results
are tested on Lung-Cancer dataset. In the first step PCA is applied on
Lung-Cancer dataset to compact the dataset and eliminate irrelevant features
and in the second step SMOTE resampling is carried out to balance the class
distribution and increase the variety of sample domain. Finally, Naive Bayes
classifier is applied on the resulting dataset and the results are compared and
evaluation metrics are calculated. The experiments show the effectiveness of
the proposed method across four evaluation metrics: Overall accuracy, False
Positive Rate, Precision, Recall.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2014 08:12:54 GMT"
}
] | 2014-03-11T00:00:00 | [
[
"Naseriparsa",
"Mehdi",
""
],
[
"Kashani",
"Mohammad Mansour Riahi",
""
]
] | TITLE: Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in
Lung Cancer Dataset
ABSTRACT: Classification algorithms are unable to make reliable models on the datasets
with huge sizes. These datasets contain many irrelevant and redundant features
that mislead the classifiers. Furthermore, many huge datasets have imbalanced
class distribution which leads to bias over majority class in the
classification process. In this paper combination of unsupervised
dimensionality reduction methods with resampling is proposed and the results
are tested on Lung-Cancer dataset. In the first step PCA is applied on
Lung-Cancer dataset to compact the dataset and eliminate irrelevant features
and in the second step SMOTE resampling is carried out to balance the class
distribution and increase the variety of sample domain. Finally, Naive Bayes
classifier is applied on the resulting dataset and the results are compared and
evaluation metrics are calculated. The experiments show the effectiveness of
the proposed method across four evaluation metrics: Overall accuracy, False
Positive Rate, Precision, Recall.
|
1403.2006 | Morteza Yousefi Kharaji | Morteza Yousefi Kharaji, Fatemeh Salehi Rizi | An IAC Approach for Detecting Profile Cloning in Online Social Networks | null | null | null | null | cs.SI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nowadays, Online Social Networks are popular websites on the internet, which
millions of users register on and share their own personal information with
others. Privacy threats and disclosing personal information are the most
important concerns of OSNs users. Recently, a new attack which is named
Identity Cloned Attack is detected on OSNs. In this attack the attacker tries
to make a fake identity of a real user in order to access to private
information of the users friends which they do not publish on the public
profiles. In today OSNs, there are some verification services, but they are not
active services and they are useful for users who are familiar with online
identity issues. In this paper, Identity cloned attacks are explained in more
details and a new and precise method to detect profile cloning in online social
networks is proposed. In this method, first, the social network is shown in a
form of graph, then, according to similarities among users, this graph is
divided into smaller communities. Afterwards, all of the similar profiles to
the real profile are gathered (from the same community), then strength of
relationship (among all selected profiles and the real profile) is calculated,
and those which have the less strength of relationship will be verified by
mutual friend system. In this study, in order to evaluate the effectiveness of
proposed method, all steps are applied on a dataset of Facebook, and finally
this work is compared with two previous works by applying them on the dataset.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2014 20:38:57 GMT"
}
] | 2014-03-11T00:00:00 | [
[
"Kharaji",
"Morteza Yousefi",
""
],
[
"Rizi",
"Fatemeh Salehi",
""
]
] | TITLE: An IAC Approach for Detecting Profile Cloning in Online Social Networks
ABSTRACT: Nowadays, Online Social Networks are popular websites on the internet, which
millions of users register on and share their own personal information with
others. Privacy threats and disclosing personal information are the most
important concerns of OSNs users. Recently, a new attack which is named
Identity Cloned Attack is detected on OSNs. In this attack the attacker tries
to make a fake identity of a real user in order to access to private
information of the users friends which they do not publish on the public
profiles. In today OSNs, there are some verification services, but they are not
active services and they are useful for users who are familiar with online
identity issues. In this paper, Identity cloned attacks are explained in more
details and a new and precise method to detect profile cloning in online social
networks is proposed. In this method, first, the social network is shown in a
form of graph, then, according to similarities among users, this graph is
divided into smaller communities. Afterwards, all of the similar profiles to
the real profile are gathered (from the same community), then strength of
relationship (among all selected profiles and the real profile) is calculated,
and those which have the less strength of relationship will be verified by
mutual friend system. In this study, in order to evaluate the effectiveness of
proposed method, all steps are applied on a dataset of Facebook, and finally
this work is compared with two previous works by applying them on the dataset.
|
1403.2024 | Pin-Yu Chen | Pin-Yu Chen and Alfred O. Hero III | Node Removal Vulnerability of the Largest Component of a Network | Published in IEEE GlobalSIP 2013 | null | null | null | cs.SI cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The connectivity structure of a network can be very sensitive to removal of
certain nodes in the network. In this paper, we study the sensitivity of the
largest component size to node removals. We prove that minimizing the largest
component size is equivalent to solving a matrix one-norm minimization problem
whose column vectors are orthogonal and sparse and they form a basis of the
null space of the associated graph Laplacian matrix. A greedy node removal
algorithm is then proposed based on the matrix one-norm minimization. In
comparison with other node centralities such as node degree and betweenness,
experimental results on US power grid dataset validate the effectiveness of the
proposed approach in terms of reduction of the largest component size with
relatively few node removals.
| [
{
"version": "v1",
"created": "Sun, 9 Mar 2014 02:52:51 GMT"
}
] | 2014-03-11T00:00:00 | [
[
"Chen",
"Pin-Yu",
""
],
[
"Hero",
"Alfred O.",
"III"
]
] | TITLE: Node Removal Vulnerability of the Largest Component of a Network
ABSTRACT: The connectivity structure of a network can be very sensitive to removal of
certain nodes in the network. In this paper, we study the sensitivity of the
largest component size to node removals. We prove that minimizing the largest
component size is equivalent to solving a matrix one-norm minimization problem
whose column vectors are orthogonal and sparse and they form a basis of the
null space of the associated graph Laplacian matrix. A greedy node removal
algorithm is then proposed based on the matrix one-norm minimization. In
comparison with other node centralities such as node degree and betweenness,
experimental results on US power grid dataset validate the effectiveness of the
proposed approach in terms of reduction of the largest component size with
relatively few node removals.
|
1310.2125 | Ritabrata Dutta | Ritabrata Dutta and Sohan Seth and Samuel Kaski | Retrieval of Experiments with Sequential Dirichlet Process Mixtures in
Model Space | null | null | null | null | stat.ML cs.IR stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of retrieving relevant experiments given a query
experiment, motivated by the public databases of datasets in molecular biology
and other experimental sciences, and the need of scientists to relate to
earlier work on the level of actual measurement data. Since experiments are
inherently noisy and databases ever accumulating, we argue that a retrieval
engine should possess two particular characteristics. First, it should compare
models learnt from the experiments rather than the raw measurements themselves:
this allows incorporating experiment-specific prior knowledge to suppress noise
effects and focus on what is important. Second, it should be updated
sequentially from newly published experiments, without explicitly storing
either the measurements or the models, which is critical for saving storage
space and protecting data privacy: this promotes life long learning. We
formulate the retrieval as a ``supermodelling'' problem, of sequentially
learning a model of the set of posterior distributions, represented as sets of
MCMC samples, and suggest the use of Particle-Learning-based sequential
Dirichlet process mixture (DPM) for this purpose. The relevance measure for
retrieval is derived from the supermodel through the mixture representation. We
demonstrate the performance of the proposed retrieval method on simulated data
and molecular biological experiments.
| [
{
"version": "v1",
"created": "Tue, 8 Oct 2013 13:10:26 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Mar 2014 22:04:33 GMT"
}
] | 2014-03-10T00:00:00 | [
[
"Dutta",
"Ritabrata",
""
],
[
"Seth",
"Sohan",
""
],
[
"Kaski",
"Samuel",
""
]
] | TITLE: Retrieval of Experiments with Sequential Dirichlet Process Mixtures in
Model Space
ABSTRACT: We address the problem of retrieving relevant experiments given a query
experiment, motivated by the public databases of datasets in molecular biology
and other experimental sciences, and the need of scientists to relate to
earlier work on the level of actual measurement data. Since experiments are
inherently noisy and databases ever accumulating, we argue that a retrieval
engine should possess two particular characteristics. First, it should compare
models learnt from the experiments rather than the raw measurements themselves:
this allows incorporating experiment-specific prior knowledge to suppress noise
effects and focus on what is important. Second, it should be updated
sequentially from newly published experiments, without explicitly storing
either the measurements or the models, which is critical for saving storage
space and protecting data privacy: this promotes life long learning. We
formulate the retrieval as a ``supermodelling'' problem, of sequentially
learning a model of the set of posterior distributions, represented as sets of
MCMC samples, and suggest the use of Particle-Learning-based sequential
Dirichlet process mixture (DPM) for this purpose. The relevance measure for
retrieval is derived from the supermodel through the mixture representation. We
demonstrate the performance of the proposed retrieval method on simulated data
and molecular biological experiments.
|
1403.1600 | Kai Zhu | Kai Zhu, Rui Wu, Lei Ying, R. Srikant | Collaborative Filtering with Information-Rich and Information-Sparse
Entities | null | null | null | null | stat.ML cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider a popular model for collaborative filtering in
recommender systems where some users of a website rate some items, such as
movies, and the goal is to recover the ratings of some or all of the unrated
items of each user. In particular, we consider both the clustering model, where
only users (or items) are clustered, and the co-clustering model, where both
users and items are clustered, and further, we assume that some users rate many
items (information-rich users) and some users rate only a few items
(information-sparse users). When users (or items) are clustered, our algorithm
can recover the rating matrix with $\omega(MK \log M)$ noisy entries while $MK$
entries are necessary, where $K$ is the number of clusters and $M$ is the
number of items. In the case of co-clustering, we prove that $K^2$ entries are
necessary for recovering the rating matrix, and our algorithm achieves this
lower bound within a logarithmic factor when $K$ is sufficiently large. We
compare our algorithms with a well-known algorithms called alternating
minimization (AM), and a similarity score-based algorithm known as the
popularity-among-friends (PAF) algorithm by applying all three to the MovieLens
and Netflix data sets. Our co-clustering algorithm and AM have similar overall
error rates when recovering the rating matrix, both of which are lower than the
error rate under PAF. But more importantly, the error rate of our co-clustering
algorithm is significantly lower than AM and PAF in the scenarios of interest
in recommender systems: when recommending a few items to each user or when
recommending items to users who only rated a few items (these users are the
majority of the total user population). The performance difference increases
even more when noise is added to the datasets.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2014 21:51:48 GMT"
}
] | 2014-03-10T00:00:00 | [
[
"Zhu",
"Kai",
""
],
[
"Wu",
"Rui",
""
],
[
"Ying",
"Lei",
""
],
[
"Srikant",
"R.",
""
]
] | TITLE: Collaborative Filtering with Information-Rich and Information-Sparse
Entities
ABSTRACT: In this paper, we consider a popular model for collaborative filtering in
recommender systems where some users of a website rate some items, such as
movies, and the goal is to recover the ratings of some or all of the unrated
items of each user. In particular, we consider both the clustering model, where
only users (or items) are clustered, and the co-clustering model, where both
users and items are clustered, and further, we assume that some users rate many
items (information-rich users) and some users rate only a few items
(information-sparse users). When users (or items) are clustered, our algorithm
can recover the rating matrix with $\omega(MK \log M)$ noisy entries while $MK$
entries are necessary, where $K$ is the number of clusters and $M$ is the
number of items. In the case of co-clustering, we prove that $K^2$ entries are
necessary for recovering the rating matrix, and our algorithm achieves this
lower bound within a logarithmic factor when $K$ is sufficiently large. We
compare our algorithms with a well-known algorithms called alternating
minimization (AM), and a similarity score-based algorithm known as the
popularity-among-friends (PAF) algorithm by applying all three to the MovieLens
and Netflix data sets. Our co-clustering algorithm and AM have similar overall
error rates when recovering the rating matrix, both of which are lower than the
error rate under PAF. But more importantly, the error rate of our co-clustering
algorithm is significantly lower than AM and PAF in the scenarios of interest
in recommender systems: when recommending a few items to each user or when
recommending items to users who only rated a few items (these users are the
majority of the total user population). The performance difference increases
even more when noise is added to the datasets.
|
1403.1706 | Johannes K\"oster | Johannes K\"oster, Sven Rahmann | Massively parallel read mapping on GPUs with PEANUT | null | null | null | null | cs.DS cs.DC q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present PEANUT (ParallEl AligNment UTility), a highly parallel GPU-based
read mapper with several distinguishing features, including a novel q-gram
index (called the q-group index) with small memory footprint built on-the-fly
over the reads and the possibility to output both the best hits or all hits of
a read. Designing the algorithm particularly for the GPU architecture, we were
able to reach maximum core occupancy for several key steps. Our benchmarks show
that PEANUT outperforms other state-of- the-art mappers in terms of speed and
sensitivity. The software is available at http://peanut.readthedocs.org.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2014 10:10:07 GMT"
}
] | 2014-03-10T00:00:00 | [
[
"Köster",
"Johannes",
""
],
[
"Rahmann",
"Sven",
""
]
] | TITLE: Massively parallel read mapping on GPUs with PEANUT
ABSTRACT: We present PEANUT (ParallEl AligNment UTility), a highly parallel GPU-based
read mapper with several distinguishing features, including a novel q-gram
index (called the q-group index) with small memory footprint built on-the-fly
over the reads and the possibility to output both the best hits or all hits of
a read. Designing the algorithm particularly for the GPU architecture, we were
able to reach maximum core occupancy for several key steps. Our benchmarks show
that PEANUT outperforms other state-of- the-art mappers in terms of speed and
sensitivity. The software is available at http://peanut.readthedocs.org.
|
1403.1749 | Saurabh Joshi | Saurabh Joshi and Akash Lal | Automatically finding atomic regions for fixing bugs in Concurrent
programs | 16 pages, 6 figures, 1 table | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a technique for automatically constructing a fix for
buggy concurrent programs: given a concurrent program that does not satisfy
user-provided assertions, we infer atomic blocks that fix the program. An
atomic block protects a piece of code and ensures that it runs without
interruption from other threads. Our technique uses a verification tool as a
subroutine to find the smallest atomic regions that remove all bugs in a given
program. Keeping the atomic regions small allows for maximum concurrency. We
have implemented our approach in a tool called AtomicInf. A user of AtomicInf
can choose between strong and weak atomicity semantics for the inferred fix.
While the former is simpler to find, the latter provides more information about
the bugs that got fixed.
We ran AtomicInf on several benchmarks and came up with the smallest and the
most precise atomic regions in all of them. We implemented an earlier technique
to our setting and observed that AtomicInf is 1.7 times faster on an average as
compared to an earlier approach.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2014 13:46:25 GMT"
}
] | 2014-03-10T00:00:00 | [
[
"Joshi",
"Saurabh",
""
],
[
"Lal",
"Akash",
""
]
] | TITLE: Automatically finding atomic regions for fixing bugs in Concurrent
programs
ABSTRACT: This paper presents a technique for automatically constructing a fix for
buggy concurrent programs: given a concurrent program that does not satisfy
user-provided assertions, we infer atomic blocks that fix the program. An
atomic block protects a piece of code and ensures that it runs without
interruption from other threads. Our technique uses a verification tool as a
subroutine to find the smallest atomic regions that remove all bugs in a given
program. Keeping the atomic regions small allows for maximum concurrency. We
have implemented our approach in a tool called AtomicInf. A user of AtomicInf
can choose between strong and weak atomicity semantics for the inferred fix.
While the former is simpler to find, the latter provides more information about
the bugs that got fixed.
We ran AtomicInf on several benchmarks and came up with the smallest and the
most precise atomic regions in all of them. We implemented an earlier technique
to our setting and observed that AtomicInf is 1.7 times faster on an average as
compared to an earlier approach.
|
1311.6091 | Jianshu Chen | Jianshu Chen and Li Deng | A Primal-Dual Method for Training Recurrent Neural Networks Constrained
by the Echo-State Property | null | null | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an architecture of a recurrent neural network (RNN) with a
fully-connected deep neural network (DNN) as its feature extractor. The RNN is
equipped with both causal temporal prediction and non-causal look-ahead, via
auto-regression (AR) and moving-average (MA), respectively. The focus of this
paper is a primal-dual training method that formulates the learning of the RNN
as a formal optimization problem with an inequality constraint that provides a
sufficient condition for the stability of the network dynamics. Experimental
results demonstrate the effectiveness of this new method, which achieves 18.86%
phone recognition error on the TIMIT benchmark for the core test set. The
result approaches the best result of 17.7%, which was obtained by using RNN
with long short-term memory (LSTM). The results also show that the proposed
primal-dual training method produces lower recognition errors than the popular
RNN methods developed earlier based on the carefully tuned threshold parameter
that heuristically prevents the gradient from exploding.
| [
{
"version": "v1",
"created": "Sun, 24 Nov 2013 08:04:41 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Dec 2013 09:12:55 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Mar 2014 03:06:36 GMT"
}
] | 2014-03-07T00:00:00 | [
[
"Chen",
"Jianshu",
""
],
[
"Deng",
"Li",
""
]
] | TITLE: A Primal-Dual Method for Training Recurrent Neural Networks Constrained
by the Echo-State Property
ABSTRACT: We present an architecture of a recurrent neural network (RNN) with a
fully-connected deep neural network (DNN) as its feature extractor. The RNN is
equipped with both causal temporal prediction and non-causal look-ahead, via
auto-regression (AR) and moving-average (MA), respectively. The focus of this
paper is a primal-dual training method that formulates the learning of the RNN
as a formal optimization problem with an inequality constraint that provides a
sufficient condition for the stability of the network dynamics. Experimental
results demonstrate the effectiveness of this new method, which achieves 18.86%
phone recognition error on the TIMIT benchmark for the core test set. The
result approaches the best result of 17.7%, which was obtained by using RNN
with long short-term memory (LSTM). The results also show that the proposed
primal-dual training method produces lower recognition errors than the popular
RNN methods developed earlier based on the carefully tuned threshold parameter
that heuristically prevents the gradient from exploding.
|
1403.1347 | Jian Zhou Zhou | Jian Zhou and Olga G. Troyanskaya | Deep Supervised and Convolutional Generative Stochastic Network for
Protein Secondary Structure Prediction | Accepted by ICML 2014 | null | null | null | q-bio.QM cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Predicting protein secondary structure is a fundamental problem in protein
structure prediction. Here we present a new supervised generative stochastic
network (GSN) based method to predict local secondary structure with deep
hierarchical representations. GSN is a recently proposed deep learning
technique (Bengio & Thibodeau-Laufer, 2013) to globally train deep generative
model. We present the supervised extension of GSN, which learns a Markov chain
to sample from a conditional distribution, and applied it to protein structure
prediction. To scale the model to full-sized, high-dimensional data, like
protein sequences with hundreds of amino acids, we introduce a convolutional
architecture, which allows efficient learning across multiple layers of
hierarchical representations. Our architecture uniquely focuses on predicting
structured low-level labels informed with both low and high-level
representations learned by the model. In our application this corresponds to
labeling the secondary structure state of each amino-acid residue. We trained
and tested the model on separate sets of non-homologous proteins sharing less
than 30% sequence identity. Our model achieves 66.4% Q8 accuracy on the CB513
dataset, better than the previously reported best performance 64.9% (Wang et
al., 2011) for this challenging secondary structure prediction problem.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2014 05:18:26 GMT"
}
] | 2014-03-07T00:00:00 | [
[
"Zhou",
"Jian",
""
],
[
"Troyanskaya",
"Olga G.",
""
]
] | TITLE: Deep Supervised and Convolutional Generative Stochastic Network for
Protein Secondary Structure Prediction
ABSTRACT: Predicting protein secondary structure is a fundamental problem in protein
structure prediction. Here we present a new supervised generative stochastic
network (GSN) based method to predict local secondary structure with deep
hierarchical representations. GSN is a recently proposed deep learning
technique (Bengio & Thibodeau-Laufer, 2013) to globally train deep generative
model. We present the supervised extension of GSN, which learns a Markov chain
to sample from a conditional distribution, and applied it to protein structure
prediction. To scale the model to full-sized, high-dimensional data, like
protein sequences with hundreds of amino acids, we introduce a convolutional
architecture, which allows efficient learning across multiple layers of
hierarchical representations. Our architecture uniquely focuses on predicting
structured low-level labels informed with both low and high-level
representations learned by the model. In our application this corresponds to
labeling the secondary structure state of each amino-acid residue. We trained
and tested the model on separate sets of non-homologous proteins sharing less
than 30% sequence identity. Our model achieves 66.4% Q8 accuracy on the CB513
dataset, better than the previously reported best performance 64.9% (Wang et
al., 2011) for this challenging secondary structure prediction problem.
|
1403.1353 | Yang Wu | Yang Wu, Vansteenberge Jarich, Masayuki Mukunoki, and Michihiko Minoh | Collaborative Representation for Classification, Sparse or Non-sparse? | 8 pages, 1 figure | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sparse representation based classification (SRC) has been proved to be a
simple, effective and robust solution to face recognition. As it gets popular,
doubts on the necessity of enforcing sparsity starts coming up, and primary
experimental results showed that simply changing the $l_1$-norm based
regularization to the computationally much more efficient $l_2$-norm based
non-sparse version would lead to a similar or even better performance. However,
that's not always the case. Given a new classification task, it's still unclear
which regularization strategy (i.e., making the coefficients sparse or
non-sparse) is a better choice without trying both for comparison. In this
paper, we present as far as we know the first study on solving this issue,
based on plenty of diverse classification experiments. We propose a scoring
function for pre-selecting the regularization strategy using only the dataset
size, the feature dimensionality and a discrimination score derived from a
given feature representation. Moreover, we show that when dictionary learning
is taking into account, non-sparse representation has a more significant
superiority to sparse representation. This work is expected to enrich our
understanding of sparse/non-sparse collaborative representation for
classification and motivate further research activities.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2014 05:44:32 GMT"
}
] | 2014-03-07T00:00:00 | [
[
"Wu",
"Yang",
""
],
[
"Jarich",
"Vansteenberge",
""
],
[
"Mukunoki",
"Masayuki",
""
],
[
"Minoh",
"Michihiko",
""
]
] | TITLE: Collaborative Representation for Classification, Sparse or Non-sparse?
ABSTRACT: Sparse representation based classification (SRC) has been proved to be a
simple, effective and robust solution to face recognition. As it gets popular,
doubts on the necessity of enforcing sparsity starts coming up, and primary
experimental results showed that simply changing the $l_1$-norm based
regularization to the computationally much more efficient $l_2$-norm based
non-sparse version would lead to a similar or even better performance. However,
that's not always the case. Given a new classification task, it's still unclear
which regularization strategy (i.e., making the coefficients sparse or
non-sparse) is a better choice without trying both for comparison. In this
paper, we present as far as we know the first study on solving this issue,
based on plenty of diverse classification experiments. We propose a scoring
function for pre-selecting the regularization strategy using only the dataset
size, the feature dimensionality and a discrimination score derived from a
given feature representation. Moreover, we show that when dictionary learning
is taking into account, non-sparse representation has a more significant
superiority to sparse representation. This work is expected to enrich our
understanding of sparse/non-sparse collaborative representation for
classification and motivate further research activities.
|
1302.4886 | Aleksandr Aravkin | Aleksandr Y. Aravkin and Rajiv Kumar and Hassan Mansour and Ben Recht
and Felix J. Herrmann | Fast methods for denoising matrix completion formulations, with
applications to robust seismic data interpolation | 26 pages, 13 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent SVD-free matrix factorization formulations have enabled rank
minimization for systems with millions of rows and columns, paving the way for
matrix completion in extremely large-scale applications, such as seismic data
interpolation.
In this paper, we consider matrix completion formulations designed to hit a
target data-fitting error level provided by the user, and propose an algorithm
called LR-BPDN that is able to exploit factorized formulations to solve the
corresponding optimization problem. Since practitioners typically have strong
prior knowledge about target error level, this innovation makes it easy to
apply the algorithm in practice, leaving only the factor rank to be determined.
Within the established framework, we propose two extensions that are highly
relevant to solving practical challenges of data interpolation. First, we
propose a weighted extension that allows known subspace information to improve
the results of matrix completion formulations. We show how this weighting can
be used in the context of frequency continuation, an essential aspect to
seismic data interpolation. Second, we propose matrix completion formulations
that are robust to large measurement errors in the available data.
We illustrate the advantages of LR-BPDN on the collaborative filtering
problem using the MovieLens 1M, 10M, and Netflix 100M datasets. Then, we use
the new method, along with its robust and subspace re-weighted extensions, to
obtain high-quality reconstructions for large scale seismic interpolation
problems with real data, even in the presence of data contamination.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2013 12:31:30 GMT"
},
{
"version": "v2",
"created": "Wed, 1 May 2013 10:03:30 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Mar 2014 10:29:18 GMT"
}
] | 2014-03-06T00:00:00 | [
[
"Aravkin",
"Aleksandr Y.",
""
],
[
"Kumar",
"Rajiv",
""
],
[
"Mansour",
"Hassan",
""
],
[
"Recht",
"Ben",
""
],
[
"Herrmann",
"Felix J.",
""
]
] | TITLE: Fast methods for denoising matrix completion formulations, with
applications to robust seismic data interpolation
ABSTRACT: Recent SVD-free matrix factorization formulations have enabled rank
minimization for systems with millions of rows and columns, paving the way for
matrix completion in extremely large-scale applications, such as seismic data
interpolation.
In this paper, we consider matrix completion formulations designed to hit a
target data-fitting error level provided by the user, and propose an algorithm
called LR-BPDN that is able to exploit factorized formulations to solve the
corresponding optimization problem. Since practitioners typically have strong
prior knowledge about target error level, this innovation makes it easy to
apply the algorithm in practice, leaving only the factor rank to be determined.
Within the established framework, we propose two extensions that are highly
relevant to solving practical challenges of data interpolation. First, we
propose a weighted extension that allows known subspace information to improve
the results of matrix completion formulations. We show how this weighting can
be used in the context of frequency continuation, an essential aspect to
seismic data interpolation. Second, we propose matrix completion formulations
that are robust to large measurement errors in the available data.
We illustrate the advantages of LR-BPDN on the collaborative filtering
problem using the MovieLens 1M, 10M, and Netflix 100M datasets. Then, we use
the new method, along with its robust and subspace re-weighted extensions, to
obtain high-quality reconstructions for large scale seismic interpolation
problems with real data, even in the presence of data contamination.
|
1311.6079 | Amirreza Shaban | Amirreza Shaban, Hamid R. Rabiee and Mahyar Najibi | Local Similarities, Global Coding: An Algorithm for Feature Coding and
its Applications | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data coding as a building block of several image processing algorithms has
been received great attention recently. Indeed, the importance of the locality
assumption in coding approaches is studied in numerous works and several
methods are proposed based on this concept. We probe this assumption and claim
that taking the similarity between a data point and a more global set of anchor
points does not necessarily weaken the coding method as long as the underlying
structure of the anchor points are taken into account. Based on this fact, we
propose to capture this underlying structure by assuming a random walker over
the anchor points. We show that our method is a fast approximate learning
algorithm based on the diffusion map kernel. The experiments on various
datasets show that making different state-of-the-art coding algorithms aware of
this structure boosts them in different learning tasks.
| [
{
"version": "v1",
"created": "Sun, 24 Nov 2013 04:39:28 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Mar 2014 20:30:13 GMT"
}
] | 2014-03-06T00:00:00 | [
[
"Shaban",
"Amirreza",
""
],
[
"Rabiee",
"Hamid R.",
""
],
[
"Najibi",
"Mahyar",
""
]
] | TITLE: Local Similarities, Global Coding: An Algorithm for Feature Coding and
its Applications
ABSTRACT: Data coding as a building block of several image processing algorithms has
been received great attention recently. Indeed, the importance of the locality
assumption in coding approaches is studied in numerous works and several
methods are proposed based on this concept. We probe this assumption and claim
that taking the similarity between a data point and a more global set of anchor
points does not necessarily weaken the coding method as long as the underlying
structure of the anchor points are taken into account. Based on this fact, we
propose to capture this underlying structure by assuming a random walker over
the anchor points. We show that our method is a fast approximate learning
algorithm based on the diffusion map kernel. The experiments on various
datasets show that making different state-of-the-art coding algorithms aware of
this structure boosts them in different learning tasks.
|
1402.7025 | Max Welling | Max Welling | Exploiting the Statistics of Learning and Inference | Proceedings of the NIPS workshop on "Probabilistic Models for Big
Data" | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When dealing with datasets containing a billion instances or with simulations
that require a supercomputer to execute, computational resources become part of
the equation. We can improve the efficiency of learning and inference by
exploiting their inherent statistical nature. We propose algorithms that
exploit the redundancy of data relative to a model by subsampling data-cases
for every update and reasoning about the uncertainty created in this process.
In the context of learning we propose to test for the probability that a
stochastically estimated gradient points more than 180 degrees in the wrong
direction. In the context of MCMC sampling we use stochastic gradients to
improve the efficiency of MCMC updates, and hypothesis tests based on adaptive
mini-batches to decide whether to accept or reject a proposed parameter update.
Finally, we argue that in the context of likelihood free MCMC one needs to
store all the information revealed by all simulations, for instance in a
Gaussian process. We conclude that Bayesian methods will remain to play a
crucial role in the era of big data and big simulations, but only if we
overcome a number of computational challenges.
| [
{
"version": "v1",
"created": "Wed, 26 Feb 2014 10:47:09 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Mar 2014 21:12:43 GMT"
}
] | 2014-03-06T00:00:00 | [
[
"Welling",
"Max",
""
]
] | TITLE: Exploiting the Statistics of Learning and Inference
ABSTRACT: When dealing with datasets containing a billion instances or with simulations
that require a supercomputer to execute, computational resources become part of
the equation. We can improve the efficiency of learning and inference by
exploiting their inherent statistical nature. We propose algorithms that
exploit the redundancy of data relative to a model by subsampling data-cases
for every update and reasoning about the uncertainty created in this process.
In the context of learning we propose to test for the probability that a
stochastically estimated gradient points more than 180 degrees in the wrong
direction. In the context of MCMC sampling we use stochastic gradients to
improve the efficiency of MCMC updates, and hypothesis tests based on adaptive
mini-batches to decide whether to accept or reject a proposed parameter update.
Finally, we argue that in the context of likelihood free MCMC one needs to
store all the information revealed by all simulations, for instance in a
Gaussian process. We conclude that Bayesian methods will remain to play a
crucial role in the era of big data and big simulations, but only if we
overcome a number of computational challenges.
|
1403.1056 | Conrad Sanderson | Andres Sanin, Conrad Sanderson, Mehrtash T. Harandi, Brian C. Lovell | K-Tangent Spaces on Riemannian Manifolds for Improved Pedestrian
Detection | IEEE International Conference on Image Processing (ICIP), 2012 | null | 10.1109/ICIP.2012.6466899 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For covariance-based image descriptors, taking into account the curvature of
the corresponding feature space has been shown to improve discrimination
performance. This is often done through representing the descriptors as points
on Riemannian manifolds, with the discrimination accomplished on a tangent
space. However, such treatment is restrictive as distances between arbitrary
points on the tangent space do not represent true geodesic distances, and hence
do not represent the manifold structure accurately. In this paper we propose a
general discriminative model based on the combination of several tangent
spaces, in order to preserve more details of the structure. The model can be
used as a weak learner in a boosting-based pedestrian detection framework.
Experiments on the challenging INRIA and DaimlerChrysler datasets show that the
proposed model leads to considerably higher performance than methods based on
histograms of oriented gradients as well as previous Riemannian-based
techniques.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2014 09:44:41 GMT"
}
] | 2014-03-06T00:00:00 | [
[
"Sanin",
"Andres",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Harandi",
"Mehrtash T.",
""
],
[
"Lovell",
"Brian C.",
""
]
] | TITLE: K-Tangent Spaces on Riemannian Manifolds for Improved Pedestrian
Detection
ABSTRACT: For covariance-based image descriptors, taking into account the curvature of
the corresponding feature space has been shown to improve discrimination
performance. This is often done through representing the descriptors as points
on Riemannian manifolds, with the discrimination accomplished on a tangent
space. However, such treatment is restrictive as distances between arbitrary
points on the tangent space do not represent true geodesic distances, and hence
do not represent the manifold structure accurately. In this paper we propose a
general discriminative model based on the combination of several tangent
spaces, in order to preserve more details of the structure. The model can be
used as a weak learner in a boosting-based pedestrian detection framework.
Experiments on the challenging INRIA and DaimlerChrysler datasets show that the
proposed model leads to considerably higher performance than methods based on
histograms of oriented gradients as well as previous Riemannian-based
techniques.
|
1211.6664 | Fabien Campagne | Fabien Campagne, Kevin C. Dorff, Nyasha Chambwe, James T. Robinson,
Jill P. Mesirov and Thomas D. Wu | Compression of structured high-throughput sequencing data | main article: 2 figures, 2 tables. Supplementary material: 2 figures,
4 tables. Comment on this manuscript on Twitter or Google Plus using handle
#Goby2Paper | null | 10.1371/journal.pone.0079871 | null | q-bio.QM cs.DB q-bio.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large biological datasets are being produced at a rapid pace and create
substantial storage challenges, particularly in the domain of high-throughput
sequencing (HTS). Most approaches currently used to store HTS data are either
unable to quickly adapt to the requirements of new sequencing or analysis
methods (because they do not support schema evolution), or fail to provide
state of the art compression of the datasets. We have devised new approaches to
store HTS data that support seamless data schema evolution and compress
datasets substantially better than existing approaches. Building on these new
approaches, we discuss and demonstrate how a multi-tier data organization can
dramatically reduce the storage, computational and network burden of
collecting, analyzing, and archiving large sequencing datasets. For instance,
we show that spliced RNA-Seq alignments can be stored in less than 4% the size
of a BAM file with perfect data fidelity. Compared to the previous compression
state of the art, these methods reduce dataset size more than 20% when storing
gene expression and epigenetic datasets. The approaches have been integrated in
a comprehensive suite of software tools (http://goby.campagnelab.org) that
support common analyses for a range of high-throughput sequencing assays.
| [
{
"version": "v1",
"created": "Wed, 28 Nov 2012 17:11:54 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Campagne",
"Fabien",
""
],
[
"Dorff",
"Kevin C.",
""
],
[
"Chambwe",
"Nyasha",
""
],
[
"Robinson",
"James T.",
""
],
[
"Mesirov",
"Jill P.",
""
],
[
"Wu",
"Thomas D.",
""
]
] | TITLE: Compression of structured high-throughput sequencing data
ABSTRACT: Large biological datasets are being produced at a rapid pace and create
substantial storage challenges, particularly in the domain of high-throughput
sequencing (HTS). Most approaches currently used to store HTS data are either
unable to quickly adapt to the requirements of new sequencing or analysis
methods (because they do not support schema evolution), or fail to provide
state of the art compression of the datasets. We have devised new approaches to
store HTS data that support seamless data schema evolution and compress
datasets substantially better than existing approaches. Building on these new
approaches, we discuss and demonstrate how a multi-tier data organization can
dramatically reduce the storage, computational and network burden of
collecting, analyzing, and archiving large sequencing datasets. For instance,
we show that spliced RNA-Seq alignments can be stored in less than 4% the size
of a BAM file with perfect data fidelity. Compared to the previous compression
state of the art, these methods reduce dataset size more than 20% when storing
gene expression and epigenetic datasets. The approaches have been integrated in
a comprehensive suite of software tools (http://goby.campagnelab.org) that
support common analyses for a range of high-throughput sequencing assays.
|
1306.0196 | Peng Bao | Peng Bao, Hua-Wei Shen, Wei Chen, Xue-Qi Cheng | Cumulative Effect in Information Diffusion: A Comprehensive Empirical
Study on Microblogging Network | null | null | 10.1371/journal.pone.0076027 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cumulative effect in social contagions underlies many studies on the spread
of innovation, behaviors, and influence. However, few large-scale empirical
studies are conducted to validate the existence of cumulative effect in the
information diffusion on social networks. In this paper, using the
population-scale dataset from the largest Chinese microblogging website, we
conduct a comprehensive study on the cumulative effect in information
diffusion. We base our study on the diffusion network of each message, where
nodes are the involved users and links are the following relationships among
them. We find that multiple exposures to the same message indeed increase the
possibility of forwarding it. However, additional exposures cannot further
improve the chance of forwarding when the number of exposures crosses its peak
at two. This finding questions the cumulative effect hypothesis in information
diffusion. Furthermore, to clarify the forwarding preference among users, we
investigate both the structural motif of the diffusion network and the temporal
pattern of information diffusion process among users. The patterns provide
vital insight for understanding the variation of message popularity and explain
the characteristics of diffusion networks.
| [
{
"version": "v1",
"created": "Sun, 2 Jun 2013 11:31:51 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Bao",
"Peng",
""
],
[
"Shen",
"Hua-Wei",
""
],
[
"Chen",
"Wei",
""
],
[
"Cheng",
"Xue-Qi",
""
]
] | TITLE: Cumulative Effect in Information Diffusion: A Comprehensive Empirical
Study on Microblogging Network
ABSTRACT: Cumulative effect in social contagions underlies many studies on the spread
of innovation, behaviors, and influence. However, few large-scale empirical
studies are conducted to validate the existence of cumulative effect in the
information diffusion on social networks. In this paper, using the
population-scale dataset from the largest Chinese microblogging website, we
conduct a comprehensive study on the cumulative effect in information
diffusion. We base our study on the diffusion network of each message, where
nodes are the involved users and links are the following relationships among
them. We find that multiple exposures to the same message indeed increase the
possibility of forwarding it. However, additional exposures cannot further
improve the chance of forwarding when the number of exposures crosses its peak
at two. This finding questions the cumulative effect hypothesis in information
diffusion. Furthermore, to clarify the forwarding preference among users, we
investigate both the structural motif of the diffusion network and the temporal
pattern of information diffusion process among users. The patterns provide
vital insight for understanding the variation of message popularity and explain
the characteristics of diffusion networks.
|
1308.3060 | Wei Zeng | Wei Zeng, An Zeng, Ming-Sheng Shang and Yi-Cheng Zhang | Information filtering in sparse online systems: recommendation via
semi-local diffusion | 8 figures | null | 10.1371/journal.pone.0079354 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid growth of the Internet and overwhelming amount of information
and choices that people are confronted with, recommender systems have been
developed to effectively support users' decision-making process in the online
systems. However, many recommendation algorithms suffer from the data sparsity
problem, i.e. the user-object bipartite networks are so sparse that algorithms
cannot accurately recommend objects for users. This data sparsity problem makes
many well-known recommendation algorithms perform poorly. To solve the problem,
we propose a recommendation algorithm based on the semi-local diffusion process
on a user-object bipartite network. The numerical simulation on two sparse
datasets, Amazon and Bookcross, show that our method significantly outperforms
the state-of-the-art methods especially for those small-degree users. Two
personalized semi-local diffusion methods are proposed which further improve
the recommendation accuracy. Finally, our work indicates that sparse online
systems are essentially different from the dense online systems, all the
algorithms and conclusions based on dense data should be rechecked again in
sparse data.
| [
{
"version": "v1",
"created": "Wed, 14 Aug 2013 08:29:41 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Zeng",
"Wei",
""
],
[
"Zeng",
"An",
""
],
[
"Shang",
"Ming-Sheng",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
] | TITLE: Information filtering in sparse online systems: recommendation via
semi-local diffusion
ABSTRACT: With the rapid growth of the Internet and overwhelming amount of information
and choices that people are confronted with, recommender systems have been
developed to effectively support users' decision-making process in the online
systems. However, many recommendation algorithms suffer from the data sparsity
problem, i.e. the user-object bipartite networks are so sparse that algorithms
cannot accurately recommend objects for users. This data sparsity problem makes
many well-known recommendation algorithms perform poorly. To solve the problem,
we propose a recommendation algorithm based on the semi-local diffusion process
on a user-object bipartite network. The numerical simulation on two sparse
datasets, Amazon and Bookcross, show that our method significantly outperforms
the state-of-the-art methods especially for those small-degree users. Two
personalized semi-local diffusion methods are proposed which further improve
the recommendation accuracy. Finally, our work indicates that sparse online
systems are essentially different from the dense online systems, all the
algorithms and conclusions based on dense data should be rechecked again in
sparse data.
|
1308.5703 | Gonzalo Diaz | Marcelo Arenas, Gonzalo I. Diaz, Achille Fokoue, Anastasios
Kementsietsidis, Kavitha Srinivas | A Principled Approach to Bridging the Gap between Graph Data and their
Schemas | 18 pages, 8 figures. To be published in PVLDB Vol. 8, No. 9 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although RDF graphs have schema information associated with them, in practice
it is very common to find cases in which data do not fully conform to their
schema. A prominent example of this is DBpedia, which is RDF data extracted
from Wikipedia, a publicly editable source of information. In such situations,
it becomes interesting to study the structural properties of the actual data,
because the schema gives an incomplete description of the organization of a
dataset. In this paper we have approached the study of the structuredness of an
RDF graph in a principled way: we propose a framework for specifying
structuredness functions, which gauge the degree to which an RDF graph conforms
to a schema. In particular, we first define a formal language for specifying
structuredness functions with expressions we call rules. This language allows a
user or a database administrator to state a rule to which an RDF graph may
fully or partially conform. Then we consider the issue of discovering a
refinement of a sort (type) by partitioning the dataset into subsets whose
structuredness is over a specified threshold. In particular, we prove that the
natural decision problem associated to this refinement problem is NP-complete,
and we provide a natural translation of this problem into Integer Linear
Programming (ILP). Finally, we test this ILP solution with two real world
datasets, DBpedia Persons and WordNet Nouns, and 4 different and intuitive
rules, which gauge the structuredness in different ways. The rules give
meaningful refinements of the datasets, showing that our language can be a
powerful tool for understanding the structure of RDF data.
| [
{
"version": "v1",
"created": "Mon, 26 Aug 2013 21:26:00 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Mar 2014 14:01:46 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Arenas",
"Marcelo",
""
],
[
"Diaz",
"Gonzalo I.",
""
],
[
"Fokoue",
"Achille",
""
],
[
"Kementsietsidis",
"Anastasios",
""
],
[
"Srinivas",
"Kavitha",
""
]
] | TITLE: A Principled Approach to Bridging the Gap between Graph Data and their
Schemas
ABSTRACT: Although RDF graphs have schema information associated with them, in practice
it is very common to find cases in which data do not fully conform to their
schema. A prominent example of this is DBpedia, which is RDF data extracted
from Wikipedia, a publicly editable source of information. In such situations,
it becomes interesting to study the structural properties of the actual data,
because the schema gives an incomplete description of the organization of a
dataset. In this paper we have approached the study of the structuredness of an
RDF graph in a principled way: we propose a framework for specifying
structuredness functions, which gauge the degree to which an RDF graph conforms
to a schema. In particular, we first define a formal language for specifying
structuredness functions with expressions we call rules. This language allows a
user or a database administrator to state a rule to which an RDF graph may
fully or partially conform. Then we consider the issue of discovering a
refinement of a sort (type) by partitioning the dataset into subsets whose
structuredness is over a specified threshold. In particular, we prove that the
natural decision problem associated to this refinement problem is NP-complete,
and we provide a natural translation of this problem into Integer Linear
Programming (ILP). Finally, we test this ILP solution with two real world
datasets, DBpedia Persons and WordNet Nouns, and 4 different and intuitive
rules, which gauge the structuredness in different ways. The rules give
meaningful refinements of the datasets, showing that our language can be a
powerful tool for understanding the structure of RDF data.
|
1312.3005 | Ciprian Chelba | Ciprian Chelba, Tomas Mikolov, Mike Schuster, Qi Ge, Thorsten Brants,
Phillipp Koehn, Tony Robinson | One Billion Word Benchmark for Measuring Progress in Statistical
Language Modeling | Accompanied by a code.google.com project allowing anyone to generate
the benchmark data, and use it to compare their language model against the
ones described in the paper | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new benchmark corpus to be used for measuring progress in
statistical language modeling. With almost one billion words of training data,
we hope this benchmark will be useful to quickly evaluate novel language
modeling techniques, and to compare their contribution when combined with other
advanced techniques. We show performance of several well-known types of
language models, with the best results achieved with a recurrent neural network
based language model. The baseline unpruned Kneser-Ney 5-gram model achieves
perplexity 67.6; a combination of techniques leads to 35% reduction in
perplexity, or 10% reduction in cross-entropy (bits), over that baseline.
The benchmark is available as a code.google.com project; besides the scripts
needed to rebuild the training/held-out data, it also makes available
log-probability values for each word in each of ten held-out data sets, for
each of the baseline n-gram models.
| [
{
"version": "v1",
"created": "Wed, 11 Dec 2013 00:25:57 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Feb 2014 22:26:59 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Mar 2014 18:30:26 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Chelba",
"Ciprian",
""
],
[
"Mikolov",
"Tomas",
""
],
[
"Schuster",
"Mike",
""
],
[
"Ge",
"Qi",
""
],
[
"Brants",
"Thorsten",
""
],
[
"Koehn",
"Phillipp",
""
],
[
"Robinson",
"Tony",
""
]
] | TITLE: One Billion Word Benchmark for Measuring Progress in Statistical
Language Modeling
ABSTRACT: We propose a new benchmark corpus to be used for measuring progress in
statistical language modeling. With almost one billion words of training data,
we hope this benchmark will be useful to quickly evaluate novel language
modeling techniques, and to compare their contribution when combined with other
advanced techniques. We show performance of several well-known types of
language models, with the best results achieved with a recurrent neural network
based language model. The baseline unpruned Kneser-Ney 5-gram model achieves
perplexity 67.6; a combination of techniques leads to 35% reduction in
perplexity, or 10% reduction in cross-entropy (bits), over that baseline.
The benchmark is available as a code.google.com project; besides the scripts
needed to rebuild the training/held-out data, it also makes available
log-probability values for each word in each of ten held-out data sets, for
each of the baseline n-gram models.
|
1312.4400 | Min Lin | Min Lin, Qiang Chen, Shuicheng Yan | Network In Network | 10 pages, 4 figures, for iclr2014 | null | null | null | cs.NE cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel deep network structure called "Network In Network" (NIN)
to enhance model discriminability for local patches within the receptive field.
The conventional convolutional layer uses linear filters followed by a
nonlinear activation function to scan the input. Instead, we build micro neural
networks with more complex structures to abstract the data within the receptive
field. We instantiate the micro neural network with a multilayer perceptron,
which is a potent function approximator. The feature maps are obtained by
sliding the micro networks over the input in a similar manner as CNN; they are
then fed into the next layer. Deep NIN can be implemented by stacking mutiple
of the above described structure. With enhanced local modeling via the micro
network, we are able to utilize global average pooling over feature maps in the
classification layer, which is easier to interpret and less prone to
overfitting than traditional fully connected layers. We demonstrated the
state-of-the-art classification performances with NIN on CIFAR-10 and
CIFAR-100, and reasonable performances on SVHN and MNIST datasets.
| [
{
"version": "v1",
"created": "Mon, 16 Dec 2013 15:34:13 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Dec 2013 09:30:27 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Mar 2014 05:15:42 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Lin",
"Min",
""
],
[
"Chen",
"Qiang",
""
],
[
"Yan",
"Shuicheng",
""
]
] | TITLE: Network In Network
ABSTRACT: We propose a novel deep network structure called "Network In Network" (NIN)
to enhance model discriminability for local patches within the receptive field.
The conventional convolutional layer uses linear filters followed by a
nonlinear activation function to scan the input. Instead, we build micro neural
networks with more complex structures to abstract the data within the receptive
field. We instantiate the micro neural network with a multilayer perceptron,
which is a potent function approximator. The feature maps are obtained by
sliding the micro networks over the input in a similar manner as CNN; they are
then fed into the next layer. Deep NIN can be implemented by stacking mutiple
of the above described structure. With enhanced local modeling via the micro
network, we are able to utilize global average pooling over feature maps in the
classification layer, which is easier to interpret and less prone to
overfitting than traditional fully connected layers. We demonstrated the
state-of-the-art classification performances with NIN on CIFAR-10 and
CIFAR-100, and reasonable performances on SVHN and MNIST datasets.
|
1403.0598 | Pinar Yanardag | Pinar Yanardag, S.V.N. Vishwanathan | The Structurally Smoothed Graphlet Kernel | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A commonly used paradigm for representing graphs is to use a vector that
contains normalized frequencies of occurrence of certain motifs or sub-graphs.
This vector representation can be used in a variety of applications, such as,
for computing similarity between graphs. The graphlet kernel of Shervashidze et
al. [32] uses induced sub-graphs of k nodes (christened as graphlets by Przulj
[28]) as motifs in the vector representation, and computes the kernel via a dot
product between these vectors. One can easily show that this is a valid kernel
between graphs. However, such a vector representation suffers from a few
drawbacks. As k becomes larger we encounter the sparsity problem; most higher
order graphlets will not occur in a given graph. This leads to diagonal
dominance, that is, a given graph is similar to itself but not to any other
graph in the dataset. On the other hand, since lower order graphlets tend to be
more numerous, using lower values of k does not provide enough discrimination
ability. We propose a smoothing technique to tackle the above problems. Our
method is based on a novel extension of Kneser-Ney and Pitman-Yor smoothing
techniques from natural language processing to graphs. We use the relationships
between lower order and higher order graphlets in order to derive our method.
Consequently, our smoothing algorithm not only respects the dependency between
sub-graphs but also tackles the diagonal dominance problem by distributing the
probability mass across graphlets. In our experiments, the smoothed graphlet
kernel outperforms graph kernels based on raw frequency counts.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 21:20:14 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Yanardag",
"Pinar",
""
],
[
"Vishwanathan",
"S. V. N.",
""
]
] | TITLE: The Structurally Smoothed Graphlet Kernel
ABSTRACT: A commonly used paradigm for representing graphs is to use a vector that
contains normalized frequencies of occurrence of certain motifs or sub-graphs.
This vector representation can be used in a variety of applications, such as,
for computing similarity between graphs. The graphlet kernel of Shervashidze et
al. [32] uses induced sub-graphs of k nodes (christened as graphlets by Przulj
[28]) as motifs in the vector representation, and computes the kernel via a dot
product between these vectors. One can easily show that this is a valid kernel
between graphs. However, such a vector representation suffers from a few
drawbacks. As k becomes larger we encounter the sparsity problem; most higher
order graphlets will not occur in a given graph. This leads to diagonal
dominance, that is, a given graph is similar to itself but not to any other
graph in the dataset. On the other hand, since lower order graphlets tend to be
more numerous, using lower values of k does not provide enough discrimination
ability. We propose a smoothing technique to tackle the above problems. Our
method is based on a novel extension of Kneser-Ney and Pitman-Yor smoothing
techniques from natural language processing to graphs. We use the relationships
between lower order and higher order graphlets in order to derive our method.
Consequently, our smoothing algorithm not only respects the dependency between
sub-graphs but also tackles the diagonal dominance problem by distributing the
probability mass across graphlets. In our experiments, the smoothed graphlet
kernel outperforms graph kernels based on raw frequency counts.
|
1403.0699 | Conrad Sanderson | Azadeh Alavi, Yan Yang, Mehrtash Harandi, Conrad Sanderson | Multi-Shot Person Re-Identification via Relational Stein Divergence | IEEE International Conference on Image Processing (ICIP), 2013 | null | 10.1109/ICIP.2013.6738731 | null | cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Person re-identification is particularly challenging due to significant
appearance changes across separate camera views. In order to re-identify
people, a representative human signature should effectively handle differences
in illumination, pose and camera parameters. While general appearance-based
methods are modelled in Euclidean spaces, it has been argued that some
applications in image and video analysis are better modelled via non-Euclidean
manifold geometry. To this end, recent approaches represent images as
covariance matrices, and interpret such matrices as points on Riemannian
manifolds. As direct classification on such manifolds can be difficult, in this
paper we propose to represent each manifold point as a vector of similarities
to class representers, via a recently introduced form of Bregman matrix
divergence known as the Stein divergence. This is followed by using a
discriminative mapping of similarity vectors for final classification. The use
of similarity vectors is in contrast to the traditional approach of embedding
manifolds into tangent spaces, which can suffer from representing the manifold
structure inaccurately. Comparative evaluations on benchmark ETHZ and iLIDS
datasets for the person re-identification task show that the proposed approach
obtains better performance than recent techniques such as Histogram Plus
Epitome, Partial Least Squares, and Symmetry-Driven Accumulation of Local
Features.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2014 06:44:17 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Alavi",
"Azadeh",
""
],
[
"Yang",
"Yan",
""
],
[
"Harandi",
"Mehrtash",
""
],
[
"Sanderson",
"Conrad",
""
]
] | TITLE: Multi-Shot Person Re-Identification via Relational Stein Divergence
ABSTRACT: Person re-identification is particularly challenging due to significant
appearance changes across separate camera views. In order to re-identify
people, a representative human signature should effectively handle differences
in illumination, pose and camera parameters. While general appearance-based
methods are modelled in Euclidean spaces, it has been argued that some
applications in image and video analysis are better modelled via non-Euclidean
manifold geometry. To this end, recent approaches represent images as
covariance matrices, and interpret such matrices as points on Riemannian
manifolds. As direct classification on such manifolds can be difficult, in this
paper we propose to represent each manifold point as a vector of similarities
to class representers, via a recently introduced form of Bregman matrix
divergence known as the Stein divergence. This is followed by using a
discriminative mapping of similarity vectors for final classification. The use
of similarity vectors is in contrast to the traditional approach of embedding
manifolds into tangent spaces, which can suffer from representing the manifold
structure inaccurately. Comparative evaluations on benchmark ETHZ and iLIDS
datasets for the person re-identification task show that the proposed approach
obtains better performance than recent techniques such as Histogram Plus
Epitome, Partial Least Squares, and Symmetry-Driven Accumulation of Local
Features.
|
1403.0829 | Weifeng Liu | W. Liu, H. Liu, D. Tao, Y. Wang, Ke Lu | Multiview Hessian regularized logistic regression for action recognition | 13 pages,2 figures, submitted to signal processing | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid development of social media sharing, people often need to
manage the growing volume of multimedia data such as large scale video
classification and annotation, especially to organize those videos containing
human activities. Recently, manifold regularized semi-supervised learning
(SSL), which explores the intrinsic data probability distribution and then
improves the generalization ability with only a small number of labeled data,
has emerged as a promising paradigm for semiautomatic video classification. In
addition, human action videos often have multi-modal content and different
representations. To tackle the above problems, in this paper we propose
multiview Hessian regularized logistic regression (mHLR) for human action
recognition. Compared with existing work, the advantages of mHLR lie in three
folds: (1) mHLR combines multiple Hessian regularization, each of which
obtained from a particular representation of instance, to leverage the
exploring of local geometry; (2) mHLR naturally handle multi-view instances
with multiple representations; (3) mHLR employs a smooth loss function and then
can be effectively optimized. We carefully conduct extensive experiments on the
unstructured social activity attribute (USAA) dataset and the experimental
results demonstrate the effectiveness of the proposed multiview Hessian
regularized logistic regression for human action recognition.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 01:11:40 GMT"
}
] | 2014-03-05T00:00:00 | [
[
"Liu",
"W.",
""
],
[
"Liu",
"H.",
""
],
[
"Tao",
"D.",
""
],
[
"Wang",
"Y.",
""
],
[
"Lu",
"Ke",
""
]
] | TITLE: Multiview Hessian regularized logistic regression for action recognition
ABSTRACT: With the rapid development of social media sharing, people often need to
manage the growing volume of multimedia data such as large scale video
classification and annotation, especially to organize those videos containing
human activities. Recently, manifold regularized semi-supervised learning
(SSL), which explores the intrinsic data probability distribution and then
improves the generalization ability with only a small number of labeled data,
has emerged as a promising paradigm for semiautomatic video classification. In
addition, human action videos often have multi-modal content and different
representations. To tackle the above problems, in this paper we propose
multiview Hessian regularized logistic regression (mHLR) for human action
recognition. Compared with existing work, the advantages of mHLR lie in three
folds: (1) mHLR combines multiple Hessian regularization, each of which
obtained from a particular representation of instance, to leverage the
exploring of local geometry; (2) mHLR naturally handle multi-view instances
with multiple representations; (3) mHLR employs a smooth loss function and then
can be effectively optimized. We carefully conduct extensive experiments on the
unstructured social activity attribute (USAA) dataset and the experimental
results demonstrate the effectiveness of the proposed multiview Hessian
regularized logistic regression for human action recognition.
|
1310.6887 | Filipe Brand\~ao M.Sc | Filipe Brand\~ao, Jo\~ao Pedro Pedroso | Bin Packing and Related Problems: General Arc-flow Formulation with
Graph Compression | null | null | null | DCC-2013-08 | math.OC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an exact method, based on an arc-flow formulation with side
constraints, for solving bin packing and cutting stock problems --- including
multi-constraint variants --- by simply representing all the patterns in a very
compact graph. Our method includes a graph compression algorithm that usually
reduces the size of the underlying graph substantially without weakening the
model. As opposed to our method, which provides strong models, conventional
models are usually highly symmetric and provide very weak lower bounds.
Our formulation is equivalent to Gilmore and Gomory's, thus providing a very
strong linear relaxation. However, instead of using column-generation in an
iterative process, the method constructs a graph, where paths from the source
to the target node represent every valid packing pattern.
The same method, without any problem-specific parameterization, was used to
solve a large variety of instances from several different cutting and packing
problems. In this paper, we deal with vector packing, graph coloring, bin
packing, cutting stock, cardinality constrained bin packing, cutting stock with
cutting knife limitation, cutting stock with binary patterns, bin packing with
conflicts, and cutting stock with binary patterns and forbidden pairs. We
report computational results obtained with many benchmark test data sets, all
of them showing a large advantage of this formulation with respect to the
traditional ones.
| [
{
"version": "v1",
"created": "Fri, 25 Oct 2013 11:55:30 GMT"
}
] | 2014-03-04T00:00:00 | [
[
"Brandão",
"Filipe",
""
],
[
"Pedroso",
"João Pedro",
""
]
] | TITLE: Bin Packing and Related Problems: General Arc-flow Formulation with
Graph Compression
ABSTRACT: We present an exact method, based on an arc-flow formulation with side
constraints, for solving bin packing and cutting stock problems --- including
multi-constraint variants --- by simply representing all the patterns in a very
compact graph. Our method includes a graph compression algorithm that usually
reduces the size of the underlying graph substantially without weakening the
model. As opposed to our method, which provides strong models, conventional
models are usually highly symmetric and provide very weak lower bounds.
Our formulation is equivalent to Gilmore and Gomory's, thus providing a very
strong linear relaxation. However, instead of using column-generation in an
iterative process, the method constructs a graph, where paths from the source
to the target node represent every valid packing pattern.
The same method, without any problem-specific parameterization, was used to
solve a large variety of instances from several different cutting and packing
problems. In this paper, we deal with vector packing, graph coloring, bin
packing, cutting stock, cardinality constrained bin packing, cutting stock with
cutting knife limitation, cutting stock with binary patterns, bin packing with
conflicts, and cutting stock with binary patterns and forbidden pairs. We
report computational results obtained with many benchmark test data sets, all
of them showing a large advantage of this formulation with respect to the
traditional ones.
|
1403.0224 | Rakesh Mohanty | Mitali Sinha, Suchismita Pattanaik, Rakesh Mohanty and Prachi Tripathy | Experimental Study of A Novel Variant of Fiduccia Mattheyses(FM)
Partitioning Algorithm | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Partitioning is a well studied research problem in the area of VLSI physical
design automation. In this problem, input is an integrated circuit and output
is a set of almost equal disjoint blocks. The main objective of partitioning is
to assign the components of circuit to blocks in order to minimize the numbers
of inter-block connections. A partitioning algorithm using hypergraph was
proposed by Fiduccia and Mattheyses with linear time complexity which has been
popularly known as FM algorithm. Most of the hypergraph based partitioning
algorithms proposed in the literature are variants of FM algorithm. In this
paper, we have proposed a novel variant of FM algorithm by using pair wise
swapping technique. We have performed a comparative experimental study of FM
algorithm and our proposed algorithm using two dataset such as ISPD98 and
ISPD99. Experimental results show that performance of our proposed algorithm is
better than the FM algorithm using the above dataset.
| [
{
"version": "v1",
"created": "Sun, 2 Mar 2014 15:34:48 GMT"
}
] | 2014-03-04T00:00:00 | [
[
"Sinha",
"Mitali",
""
],
[
"Pattanaik",
"Suchismita",
""
],
[
"Mohanty",
"Rakesh",
""
],
[
"Tripathy",
"Prachi",
""
]
] | TITLE: Experimental Study of A Novel Variant of Fiduccia Mattheyses(FM)
Partitioning Algorithm
ABSTRACT: Partitioning is a well studied research problem in the area of VLSI physical
design automation. In this problem, input is an integrated circuit and output
is a set of almost equal disjoint blocks. The main objective of partitioning is
to assign the components of circuit to blocks in order to minimize the numbers
of inter-block connections. A partitioning algorithm using hypergraph was
proposed by Fiduccia and Mattheyses with linear time complexity which has been
popularly known as FM algorithm. Most of the hypergraph based partitioning
algorithms proposed in the literature are variants of FM algorithm. In this
paper, we have proposed a novel variant of FM algorithm by using pair wise
swapping technique. We have performed a comparative experimental study of FM
algorithm and our proposed algorithm using two dataset such as ISPD98 and
ISPD99. Experimental results show that performance of our proposed algorithm is
better than the FM algorithm using the above dataset.
|
1403.0240 | Ivo Sbalzarini | Ivo F. Sbalzarini, Sophie Schneider, Janick Cardinale | Particle methods enable fast and simple approximation of Sobolev
gradients in image segmentation | 21 pages, 10 figures | null | null | null | cs.CV cs.CE cs.NA q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bio-image analysis is challenging due to inhomogeneous intensity
distributions and high levels of noise in the images. Bayesian inference
provides a principled way for regularizing the problem using prior knowledge. A
fundamental choice is how one measures "distances" between shapes in an image.
It has been shown that the straightforward geometric L2 distance is degenerate
and leads to pathological situations. This is avoided when using Sobolev
gradients, rendering the segmentation problem less ill-posed. The high
computational cost and implementation overhead of Sobolev gradients, however,
have hampered practical applications. We show how particle methods as applied
to image segmentation allow for a simple and computationally efficient
implementation of Sobolev gradients. We show that the evaluation of Sobolev
gradients amounts to particle-particle interactions along the contour in an
image. We extend an existing particle-based segmentation algorithm to using
Sobolev gradients. Using synthetic and real-world images, we benchmark the
results for both 2D and 3D images using piecewise smooth and piecewise constant
region models. The present particle approximation of Sobolev gradients is 2.8
to 10 times faster than the previous reference implementation, but retains the
known favorable properties of Sobolev gradients. This speedup is achieved by
using local particle-particle interactions instead of solving a global Poisson
equation at each iteration. The computational time per iteration is higher for
Sobolev gradients than for L2 gradients. Since Sobolev gradients precondition
the optimization problem, however, a smaller number of overall iterations may
be necessary for the algorithm to converge, which can in some cases amortize
the higher per-iteration cost.
| [
{
"version": "v1",
"created": "Sun, 2 Mar 2014 16:58:29 GMT"
}
] | 2014-03-04T00:00:00 | [
[
"Sbalzarini",
"Ivo F.",
""
],
[
"Schneider",
"Sophie",
""
],
[
"Cardinale",
"Janick",
""
]
] | TITLE: Particle methods enable fast and simple approximation of Sobolev
gradients in image segmentation
ABSTRACT: Bio-image analysis is challenging due to inhomogeneous intensity
distributions and high levels of noise in the images. Bayesian inference
provides a principled way for regularizing the problem using prior knowledge. A
fundamental choice is how one measures "distances" between shapes in an image.
It has been shown that the straightforward geometric L2 distance is degenerate
and leads to pathological situations. This is avoided when using Sobolev
gradients, rendering the segmentation problem less ill-posed. The high
computational cost and implementation overhead of Sobolev gradients, however,
have hampered practical applications. We show how particle methods as applied
to image segmentation allow for a simple and computationally efficient
implementation of Sobolev gradients. We show that the evaluation of Sobolev
gradients amounts to particle-particle interactions along the contour in an
image. We extend an existing particle-based segmentation algorithm to using
Sobolev gradients. Using synthetic and real-world images, we benchmark the
results for both 2D and 3D images using piecewise smooth and piecewise constant
region models. The present particle approximation of Sobolev gradients is 2.8
to 10 times faster than the previous reference implementation, but retains the
known favorable properties of Sobolev gradients. This speedup is achieved by
using local particle-particle interactions instead of solving a global Poisson
equation at each iteration. The computational time per iteration is higher for
Sobolev gradients than for L2 gradients. Since Sobolev gradients precondition
the optimization problem, however, a smaller number of overall iterations may
be necessary for the algorithm to converge, which can in some cases amortize
the higher per-iteration cost.
|
1403.0316 | Kang Zhang | Kang Zhang, Yuqiang Fang, Dongbo Min, Lifeng Sun, Shiqiang Yang.
Shuicheng Yan, Qi Tian | Cross-Scale Cost Aggregation for Stereo Matching | To Appear in 2013 IEEE Conference on Computer Vision and Pattern
Recognition (CVPR). 2014 (poster, 29.88%) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human beings process stereoscopic correspondence across multiple scales.
However, this bio-inspiration is ignored by state-of-the-art cost aggregation
methods for dense stereo correspondence. In this paper, a generic cross-scale
cost aggregation framework is proposed to allow multi-scale interaction in cost
aggregation. We firstly reformulate cost aggregation from a unified
optimization perspective and show that different cost aggregation methods
essentially differ in the choices of similarity kernels. Then, an inter-scale
regularizer is introduced into optimization and solving this new optimization
problem leads to the proposed framework. Since the regularization term is
independent of the similarity kernel, various cost aggregation methods can be
integrated into the proposed general framework. We show that the cross-scale
framework is important as it effectively and efficiently expands
state-of-the-art cost aggregation methods and leads to significant
improvements, when evaluated on Middlebury, KITTI and New Tsukuba datasets.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 05:20:28 GMT"
}
] | 2014-03-04T00:00:00 | [
[
"Zhang",
"Kang",
""
],
[
"Fang",
"Yuqiang",
""
],
[
"Min",
"Dongbo",
""
],
[
"Sun",
"Lifeng",
""
],
[
"Yan",
"Shiqiang Yang. Shuicheng",
""
],
[
"Tian",
"Qi",
""
]
] | TITLE: Cross-Scale Cost Aggregation for Stereo Matching
ABSTRACT: Human beings process stereoscopic correspondence across multiple scales.
However, this bio-inspiration is ignored by state-of-the-art cost aggregation
methods for dense stereo correspondence. In this paper, a generic cross-scale
cost aggregation framework is proposed to allow multi-scale interaction in cost
aggregation. We firstly reformulate cost aggregation from a unified
optimization perspective and show that different cost aggregation methods
essentially differ in the choices of similarity kernels. Then, an inter-scale
regularizer is introduced into optimization and solving this new optimization
problem leads to the proposed framework. Since the regularization term is
independent of the similarity kernel, various cost aggregation methods can be
integrated into the proposed general framework. We show that the cross-scale
framework is important as it effectively and efficiently expands
state-of-the-art cost aggregation methods and leads to significant
improvements, when evaluated on Middlebury, KITTI and New Tsukuba datasets.
|
1403.0481 | Arindam Chaudhuri AC | Arindam Chaudhuri | Support Vector Machine Model for Currency Crisis Discrimination | Book Chapter Selected Works in Infrastructural Finance, Rudra P.
Pradhan, Indian Institute of Technology Kharagpur, Editor, Macmillan
Publishers, India, pp 249 - 256, 2011 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Support Vector Machine (SVM) is powerful classification technique based on
the idea of structural risk minimization. Use of kernel function enables curse
of dimensionality to be addressed. However, proper kernel function for certain
problem is dependent on specific dataset and as such there is no good method on
choice of kernel function. In this paper, SVM is used to build empirical models
of currency crisis in Argentina. An estimation technique is developed by
training model on real life data set which provides reasonably accurate model
outputs and helps policy makers to identify situations in which currency crisis
may happen. The third and fourth order polynomial kernel is generally best
choice to achieve high generalization of classifier performance. SVM has high
level of maturity with algorithms that are simple, easy to implement, tolerates
curse of dimensionality and good empirical performance. The satisfactory
results show that currency crisis situation is properly emulated using only
small fraction of database and could be used as an evaluation tool as well as
an early warning system. To the best of knowledge this is the first work on SVM
approach for currency crisis evaluation of Argentina.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 16:34:38 GMT"
}
] | 2014-03-04T00:00:00 | [
[
"Chaudhuri",
"Arindam",
""
]
] | TITLE: Support Vector Machine Model for Currency Crisis Discrimination
ABSTRACT: Support Vector Machine (SVM) is powerful classification technique based on
the idea of structural risk minimization. Use of kernel function enables curse
of dimensionality to be addressed. However, proper kernel function for certain
problem is dependent on specific dataset and as such there is no good method on
choice of kernel function. In this paper, SVM is used to build empirical models
of currency crisis in Argentina. An estimation technique is developed by
training model on real life data set which provides reasonably accurate model
outputs and helps policy makers to identify situations in which currency crisis
may happen. The third and fourth order polynomial kernel is generally best
choice to achieve high generalization of classifier performance. SVM has high
level of maturity with algorithms that are simple, easy to implement, tolerates
curse of dimensionality and good empirical performance. The satisfactory
results show that currency crisis situation is properly emulated using only
small fraction of database and could be used as an evaluation tool as well as
an early warning system. To the best of knowledge this is the first work on SVM
approach for currency crisis evaluation of Argentina.
|
1310.2959 | Partha Talukdar | Partha Pratim Talukdar, William Cohen | Scaling Graph-based Semi Supervised Learning to Large Number of Labels
Using Count-Min Sketch | 9 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph-based Semi-supervised learning (SSL) algorithms have been successfully
used in a large number of applications. These methods classify initially
unlabeled nodes by propagating label information over the structure of graph
starting from seed nodes. Graph-based SSL algorithms usually scale linearly
with the number of distinct labels (m), and require O(m) space on each node.
Unfortunately, there exist many applications of practical significance with
very large m over large graphs, demanding better space and time complexity. In
this paper, we propose MAD-SKETCH, a novel graph-based SSL algorithm which
compactly stores label distribution on each node using Count-min Sketch, a
randomized data structure. We present theoretical analysis showing that under
mild conditions, MAD-SKETCH can reduce space complexity at each node from O(m)
to O(log m), and achieve similar savings in time complexity as well. We support
our analysis through experiments on multiple real world datasets. We observe
that MAD-SKETCH achieves similar performance as existing state-of-the-art
graph- based SSL algorithms, while requiring smaller memory footprint and at
the same time achieving up to 10x speedup. We find that MAD-SKETCH is able to
scale to datasets with one million labels, which is beyond the scope of
existing graph- based SSL algorithms.
| [
{
"version": "v1",
"created": "Thu, 10 Oct 2013 20:30:06 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Feb 2014 21:19:41 GMT"
}
] | 2014-03-03T00:00:00 | [
[
"Talukdar",
"Partha Pratim",
""
],
[
"Cohen",
"William",
""
]
] | TITLE: Scaling Graph-based Semi Supervised Learning to Large Number of Labels
Using Count-Min Sketch
ABSTRACT: Graph-based Semi-supervised learning (SSL) algorithms have been successfully
used in a large number of applications. These methods classify initially
unlabeled nodes by propagating label information over the structure of graph
starting from seed nodes. Graph-based SSL algorithms usually scale linearly
with the number of distinct labels (m), and require O(m) space on each node.
Unfortunately, there exist many applications of practical significance with
very large m over large graphs, demanding better space and time complexity. In
this paper, we propose MAD-SKETCH, a novel graph-based SSL algorithm which
compactly stores label distribution on each node using Count-min Sketch, a
randomized data structure. We present theoretical analysis showing that under
mild conditions, MAD-SKETCH can reduce space complexity at each node from O(m)
to O(log m), and achieve similar savings in time complexity as well. We support
our analysis through experiments on multiple real world datasets. We observe
that MAD-SKETCH achieves similar performance as existing state-of-the-art
graph- based SSL algorithms, while requiring smaller memory footprint and at
the same time achieving up to 10x speedup. We find that MAD-SKETCH is able to
scale to datasets with one million labels, which is beyond the scope of
existing graph- based SSL algorithms.
|
1311.0680 | Bartosz Hawelka | Bartosz Hawelka, Izabela Sitko, Euro Beinat, Stanislav Sobolevsky,
Pavlos Kazakopoulos and Carlo Ratti | Geo-located Twitter as the proxy for global mobility patterns | 17 pages, 13 figures | null | 10.1080/15230406.2014.890072 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the advent of a pervasive presence of location sharing services
researchers gained an unprecedented access to the direct records of human
activity in space and time. This paper analyses geo-located Twitter messages in
order to uncover global patterns of human mobility. Based on a dataset of
almost a billion tweets recorded in 2012 we estimate volumes of international
travelers in respect to their country of residence. We examine mobility
profiles of different nations looking at the characteristics such as mobility
rate, radius of gyration, diversity of destinations and a balance of the
inflows and outflows. The temporal patterns disclose the universal seasons of
increased international mobility and the peculiar national nature of overseen
travels. Our analysis of the community structure of the Twitter mobility
network, obtained with the iterative network partitioning, reveals spatially
cohesive regions that follow the regional division of the world. Finally, we
validate our result with the global tourism statistics and mobility models
provided by other authors, and argue that Twitter is a viable source to
understand and quantify global mobility patterns.
| [
{
"version": "v1",
"created": "Mon, 4 Nov 2013 12:46:08 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Dec 2013 13:40:30 GMT"
}
] | 2014-03-03T00:00:00 | [
[
"Hawelka",
"Bartosz",
""
],
[
"Sitko",
"Izabela",
""
],
[
"Beinat",
"Euro",
""
],
[
"Sobolevsky",
"Stanislav",
""
],
[
"Kazakopoulos",
"Pavlos",
""
],
[
"Ratti",
"Carlo",
""
]
] | TITLE: Geo-located Twitter as the proxy for global mobility patterns
ABSTRACT: In the advent of a pervasive presence of location sharing services
researchers gained an unprecedented access to the direct records of human
activity in space and time. This paper analyses geo-located Twitter messages in
order to uncover global patterns of human mobility. Based on a dataset of
almost a billion tweets recorded in 2012 we estimate volumes of international
travelers in respect to their country of residence. We examine mobility
profiles of different nations looking at the characteristics such as mobility
rate, radius of gyration, diversity of destinations and a balance of the
inflows and outflows. The temporal patterns disclose the universal seasons of
increased international mobility and the peculiar national nature of overseen
travels. Our analysis of the community structure of the Twitter mobility
network, obtained with the iterative network partitioning, reveals spatially
cohesive regions that follow the regional division of the world. Finally, we
validate our result with the global tourism statistics and mobility models
provided by other authors, and argue that Twitter is a viable source to
understand and quantify global mobility patterns.
|
1402.5596 | Jason Lee | Jason D Lee and Jonathan E Taylor | Exact Post Model Selection Inference for Marginal Screening | null | null | null | null | stat.ME cs.LG math.ST stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a framework for post model selection inference, via marginal
screening, in linear regression. At the core of this framework is a result that
characterizes the exact distribution of linear functions of the response $y$,
conditional on the model being selected (``condition on selection" framework).
This allows us to construct valid confidence intervals and hypothesis tests for
regression coefficients that account for the selection procedure. In contrast
to recent work in high-dimensional statistics, our results are exact
(non-asymptotic) and require no eigenvalue-like assumptions on the design
matrix $X$. Furthermore, the computational cost of marginal regression,
constructing confidence intervals and hypothesis testing is negligible compared
to the cost of linear regression, thus making our methods particularly suitable
for extremely large datasets. Although we focus on marginal screening to
illustrate the applicability of the condition on selection framework, this
framework is much more broadly applicable. We show how to apply the proposed
framework to several other selection procedures including orthogonal matching
pursuit, non-negative least squares, and marginal screening+Lasso.
| [
{
"version": "v1",
"created": "Sun, 23 Feb 2014 10:30:21 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Feb 2014 00:28:21 GMT"
}
] | 2014-03-03T00:00:00 | [
[
"Lee",
"Jason D",
""
],
[
"Taylor",
"Jonathan E",
""
]
] | TITLE: Exact Post Model Selection Inference for Marginal Screening
ABSTRACT: We develop a framework for post model selection inference, via marginal
screening, in linear regression. At the core of this framework is a result that
characterizes the exact distribution of linear functions of the response $y$,
conditional on the model being selected (``condition on selection" framework).
This allows us to construct valid confidence intervals and hypothesis tests for
regression coefficients that account for the selection procedure. In contrast
to recent work in high-dimensional statistics, our results are exact
(non-asymptotic) and require no eigenvalue-like assumptions on the design
matrix $X$. Furthermore, the computational cost of marginal regression,
constructing confidence intervals and hypothesis testing is negligible compared
to the cost of linear regression, thus making our methods particularly suitable
for extremely large datasets. Although we focus on marginal screening to
illustrate the applicability of the condition on selection framework, this
framework is much more broadly applicable. We show how to apply the proposed
framework to several other selection procedures including orthogonal matching
pursuit, non-negative least squares, and marginal screening+Lasso.
|
1312.3245 | Hien Thi Thu Truong | Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner,
Sasu Tarkoma, N. Asokan, Sourav Bhattacharya | The Company You Keep: Mobile Malware Infection Rates and Inexpensive
Risk Indicators | null | null | 10.1145/2566486.2568046 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is little information from independent sources in the public domain
about mobile malware infection rates. The only previous independent estimate
(0.0009%) [12], was based on indirect measurements obtained from domain name
resolution traces. In this paper, we present the first independent study of
malware infection rates and associated risk factors using data collected
directly from over 55,000 Android devices. We find that the malware infection
rates in Android devices estimated using two malware datasets (0.28% and
0.26%), though small, are significantly higher than the previous independent
estimate. Using our datasets, we investigate how indicators extracted
inexpensively from the devices correlate with malware infection. Based on the
hypothesis that some application stores have a greater density of malicious
applications and that advertising within applications and cross-promotional
deals may act as infection vectors, we investigate whether the set of
applications used on a device can serve as an indicator for infection of that
device. Our analysis indicates that this alone is not an accurate indicator for
pinpointing infection. However, it is a very inexpensive but surprisingly
useful way for significantly narrowing down the pool of devices on which
expensive monitoring and analysis mechanisms must be deployed. Using our two
malware datasets we show that this indicator performs 4.8 and 4.6 times
(respectively) better at identifying infected devices than the baseline of
random checks. Such indicators can be used, for example, in the search for new
or previously undetected malware. It is therefore a technique that can
complement standard malware scanning by anti-malware tools. Our analysis also
demonstrates a marginally significant difference in battery use between
infected and clean devices.
| [
{
"version": "v1",
"created": "Wed, 11 Dec 2013 17:06:16 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Feb 2014 16:58:12 GMT"
}
] | 2014-02-28T00:00:00 | [
[
"Truong",
"Hien Thi Thu",
""
],
[
"Lagerspetz",
"Eemil",
""
],
[
"Nurmi",
"Petteri",
""
],
[
"Oliner",
"Adam J.",
""
],
[
"Tarkoma",
"Sasu",
""
],
[
"Asokan",
"N.",
""
],
[
"Bhattacharya",
"Sourav",
""
]
] | TITLE: The Company You Keep: Mobile Malware Infection Rates and Inexpensive
Risk Indicators
ABSTRACT: There is little information from independent sources in the public domain
about mobile malware infection rates. The only previous independent estimate
(0.0009%) [12], was based on indirect measurements obtained from domain name
resolution traces. In this paper, we present the first independent study of
malware infection rates and associated risk factors using data collected
directly from over 55,000 Android devices. We find that the malware infection
rates in Android devices estimated using two malware datasets (0.28% and
0.26%), though small, are significantly higher than the previous independent
estimate. Using our datasets, we investigate how indicators extracted
inexpensively from the devices correlate with malware infection. Based on the
hypothesis that some application stores have a greater density of malicious
applications and that advertising within applications and cross-promotional
deals may act as infection vectors, we investigate whether the set of
applications used on a device can serve as an indicator for infection of that
device. Our analysis indicates that this alone is not an accurate indicator for
pinpointing infection. However, it is a very inexpensive but surprisingly
useful way for significantly narrowing down the pool of devices on which
expensive monitoring and analysis mechanisms must be deployed. Using our two
malware datasets we show that this indicator performs 4.8 and 4.6 times
(respectively) better at identifying infected devices than the baseline of
random checks. Such indicators can be used, for example, in the search for new
or previously undetected malware. It is therefore a technique that can
complement standard malware scanning by anti-malware tools. Our analysis also
demonstrates a marginally significant difference in battery use between
infected and clean devices.
|
1401.5465 | Wanling Gao | Zijian Ming, Chunjie Luo, Wanling Gao, Rui Han, Qiang Yang, Lei Wang,
and Jianfeng Zhan | BDGS: A Scalable Big Data Generator Suite in Big Data Benchmarking | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data generation is a key issue in big data benchmarking that aims to generate
application-specific data sets to meet the 4V requirements of big data.
Specifically, big data generators need to generate scalable data (Volume) of
different types (Variety) under controllable generation rates (Velocity) while
keeping the important characteristics of raw data (Veracity). This gives rise
to various new challenges about how we design generators efficiently and
successfully. To date, most existing techniques can only generate limited types
of data and support specific big data systems such as Hadoop. Hence we develop
a tool, called Big Data Generator Suite (BDGS), to efficiently generate
scalable big data while employing data models derived from real data to
preserve data veracity. The effectiveness of BDGS is demonstrated by developing
six data generators covering three representative data types (structured,
semi-structured and unstructured) and three data sources (text, graph, and
table data).
| [
{
"version": "v1",
"created": "Wed, 22 Jan 2014 02:17:52 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Feb 2014 08:13:48 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Feb 2014 03:40:26 GMT"
}
] | 2014-02-28T00:00:00 | [
[
"Ming",
"Zijian",
""
],
[
"Luo",
"Chunjie",
""
],
[
"Gao",
"Wanling",
""
],
[
"Han",
"Rui",
""
],
[
"Yang",
"Qiang",
""
],
[
"Wang",
"Lei",
""
],
[
"Zhan",
"Jianfeng",
""
]
] | TITLE: BDGS: A Scalable Big Data Generator Suite in Big Data Benchmarking
ABSTRACT: Data generation is a key issue in big data benchmarking that aims to generate
application-specific data sets to meet the 4V requirements of big data.
Specifically, big data generators need to generate scalable data (Volume) of
different types (Variety) under controllable generation rates (Velocity) while
keeping the important characteristics of raw data (Veracity). This gives rise
to various new challenges about how we design generators efficiently and
successfully. To date, most existing techniques can only generate limited types
of data and support specific big data systems such as Hadoop. Hence we develop
a tool, called Big Data Generator Suite (BDGS), to efficiently generate
scalable big data while employing data models derived from real data to
preserve data veracity. The effectiveness of BDGS is demonstrated by developing
six data generators covering three representative data types (structured,
semi-structured and unstructured) and three data sources (text, graph, and
table data).
|
1402.6366 | Mustafa Abdul Salam | Osman Hegazy, Omar S. Soliman and Mustafa Abdul Salam | LSSVM-ABC Algorithm for Stock Price prediction | 12 pages. International Journal of Computer Trends and Technology
(IJCTT)2014 | null | null | null | cs.CE cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, Artificial Bee Colony (ABC) algorithm which inspired from the
behavior of honey bees swarm is presented. ABC is a stochastic population-based
evolutionary algorithm for problem solving. ABC algorithm, which is considered
one of the most recently swarm intelligent techniques, is proposed to optimize
least square support vector machine (LSSVM) to predict the daily stock prices.
The proposed model is based on the study of stocks historical data, technical
indicators and optimizing LSSVM with ABC algorithm. ABC selects best free
parameters combination for LSSVM to avoid over-fitting and local minima
problems and improve prediction accuracy. LSSVM optimized by Particle swarm
optimization (PSO) algorithm, LSSVM, and ANN techniques are used for comparison
with proposed model. Proposed model tested with twenty datasets representing
different sectors in S&P 500 stock market. Results presented in this paper show
that the proposed model has fast convergence speed, and it also achieves better
accuracy than compared techniques in most cases.
| [
{
"version": "v1",
"created": "Tue, 25 Feb 2014 23:02:08 GMT"
}
] | 2014-02-28T00:00:00 | [
[
"Hegazy",
"Osman",
""
],
[
"Soliman",
"Omar S.",
""
],
[
"Salam",
"Mustafa Abdul",
""
]
] | TITLE: LSSVM-ABC Algorithm for Stock Price prediction
ABSTRACT: In this paper, Artificial Bee Colony (ABC) algorithm which inspired from the
behavior of honey bees swarm is presented. ABC is a stochastic population-based
evolutionary algorithm for problem solving. ABC algorithm, which is considered
one of the most recently swarm intelligent techniques, is proposed to optimize
least square support vector machine (LSSVM) to predict the daily stock prices.
The proposed model is based on the study of stocks historical data, technical
indicators and optimizing LSSVM with ABC algorithm. ABC selects best free
parameters combination for LSSVM to avoid over-fitting and local minima
problems and improve prediction accuracy. LSSVM optimized by Particle swarm
optimization (PSO) algorithm, LSSVM, and ANN techniques are used for comparison
with proposed model. Proposed model tested with twenty datasets representing
different sectors in S&P 500 stock market. Results presented in this paper show
that the proposed model has fast convergence speed, and it also achieves better
accuracy than compared techniques in most cases.
|
1402.6865 | J\'er\^ome Kunegis | J\'er\^ome Kunegis | Applications of Structural Balance in Signed Social Networks | 37 pages | null | null | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/by/3.0/ | We present measures, models and link prediction algorithms based on the
structural balance in signed social networks. Certain social networks contain,
in addition to the usual 'friend' links, 'enemy' links. These networks are
called signed social networks. A classical and major concept for signed social
networks is that of structural balance, i.e., the tendency of triangles to be
'balanced' towards including an even number of negative edges, such as
friend-friend-friend and friend-enemy-enemy triangles. In this article, we
introduce several new signed network analysis methods that exploit structural
balance for measuring partial balance, for finding communities of people based
on balance, for drawing signed social networks, and for solving the problem of
link prediction. Notably, the introduced methods are based on the signed graph
Laplacian and on the concept of signed resistance distances. We evaluate our
methods on a collection of four signed social network datasets.
| [
{
"version": "v1",
"created": "Thu, 27 Feb 2014 11:32:50 GMT"
}
] | 2014-02-28T00:00:00 | [
[
"Kunegis",
"Jérôme",
""
]
] | TITLE: Applications of Structural Balance in Signed Social Networks
ABSTRACT: We present measures, models and link prediction algorithms based on the
structural balance in signed social networks. Certain social networks contain,
in addition to the usual 'friend' links, 'enemy' links. These networks are
called signed social networks. A classical and major concept for signed social
networks is that of structural balance, i.e., the tendency of triangles to be
'balanced' towards including an even number of negative edges, such as
friend-friend-friend and friend-enemy-enemy triangles. In this article, we
introduce several new signed network analysis methods that exploit structural
balance for measuring partial balance, for finding communities of people based
on balance, for drawing signed social networks, and for solving the problem of
link prediction. Notably, the introduced methods are based on the signed graph
Laplacian and on the concept of signed resistance distances. We evaluate our
methods on a collection of four signed social network datasets.
|
1402.6942 | Jakub Nalepa | Jakub Nalepa and Zbigniew J. Czech | A Parallel Memetic Algorithm to Solve the Vehicle Routing Problem with
Time Windows | 15 pages | Studia Informatica 33 (1), pp 91-106 (2012) | null | null | cs.DC cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a parallel memetic algorithm for solving the vehicle
routing problem with time windows (VRPTW). The VRPTW is a well-known NP-hard
discrete optimization problem with two objectives. The main objective is to
minimize the number of vehicles serving customers scattered on the map, and the
second one is to minimize the total distance traveled by the vehicles. Here,
the fleet size is minimized in the first phase of the proposed method using the
parallel heuristic algorithm (PHA), and the traveled distance is minimized in
the second phase by the parallel memetic algorithm (PMA). In both parallel
algorithms, the parallel components co-operate periodically in order to
exchange the best solutions found so far. An extensive experimental study
performed on the Gehring and Homberger's benchmark proves the high convergence
capabilities and robustness of both PHA and PMA. Also, we present the speedup
analysis of the PMA.
| [
{
"version": "v1",
"created": "Thu, 27 Feb 2014 15:41:05 GMT"
}
] | 2014-02-28T00:00:00 | [
[
"Nalepa",
"Jakub",
""
],
[
"Czech",
"Zbigniew J.",
""
]
] | TITLE: A Parallel Memetic Algorithm to Solve the Vehicle Routing Problem with
Time Windows
ABSTRACT: This paper presents a parallel memetic algorithm for solving the vehicle
routing problem with time windows (VRPTW). The VRPTW is a well-known NP-hard
discrete optimization problem with two objectives. The main objective is to
minimize the number of vehicles serving customers scattered on the map, and the
second one is to minimize the total distance traveled by the vehicles. Here,
the fleet size is minimized in the first phase of the proposed method using the
parallel heuristic algorithm (PHA), and the traveled distance is minimized in
the second phase by the parallel memetic algorithm (PMA). In both parallel
algorithms, the parallel components co-operate periodically in order to
exchange the best solutions found so far. An extensive experimental study
performed on the Gehring and Homberger's benchmark proves the high convergence
capabilities and robustness of both PHA and PMA. Also, we present the speedup
analysis of the PMA.
|
1402.7005 | Ziyu Wang | Ziyu Wang, Babak Shakibi, Lin Jin, Nando de Freitas | Bayesian Multi-Scale Optimistic Optimization | 15 pages | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bayesian optimization is a powerful global optimization technique for
expensive black-box functions. One of its shortcomings is that it requires
auxiliary optimization of an acquisition function at each iteration. This
auxiliary optimization can be costly and very hard to carry out in practice.
Moreover, it creates serious theoretical concerns, as most of the convergence
results assume that the exact optimum of the acquisition function can be found.
In this paper, we introduce a new technique for efficient global optimization
that combines Gaussian process confidence bounds and treed simultaneous
optimistic optimization to eliminate the need for auxiliary optimization of
acquisition functions. The experiments with global optimization benchmarks and
a novel application to automatic information extraction demonstrate that the
resulting technique is more efficient than the two approaches from which it
draws inspiration. Unlike most theoretical analyses of Bayesian optimization
with Gaussian processes, our finite-time convergence rate proofs do not require
exact optimization of an acquisition function. That is, our approach eliminates
the unsatisfactory assumption that a difficult, potentially NP-hard, problem
has to be solved in order to obtain vanishing regret rates.
| [
{
"version": "v1",
"created": "Thu, 27 Feb 2014 18:38:02 GMT"
}
] | 2014-02-28T00:00:00 | [
[
"Wang",
"Ziyu",
""
],
[
"Shakibi",
"Babak",
""
],
[
"Jin",
"Lin",
""
],
[
"de Freitas",
"Nando",
""
]
] | TITLE: Bayesian Multi-Scale Optimistic Optimization
ABSTRACT: Bayesian optimization is a powerful global optimization technique for
expensive black-box functions. One of its shortcomings is that it requires
auxiliary optimization of an acquisition function at each iteration. This
auxiliary optimization can be costly and very hard to carry out in practice.
Moreover, it creates serious theoretical concerns, as most of the convergence
results assume that the exact optimum of the acquisition function can be found.
In this paper, we introduce a new technique for efficient global optimization
that combines Gaussian process confidence bounds and treed simultaneous
optimistic optimization to eliminate the need for auxiliary optimization of
acquisition functions. The experiments with global optimization benchmarks and
a novel application to automatic information extraction demonstrate that the
resulting technique is more efficient than the two approaches from which it
draws inspiration. Unlike most theoretical analyses of Bayesian optimization
with Gaussian processes, our finite-time convergence rate proofs do not require
exact optimization of an acquisition function. That is, our approach eliminates
the unsatisfactory assumption that a difficult, potentially NP-hard, problem
has to be solved in order to obtain vanishing regret rates.
|
1402.7063 | Spyros Sioutas SS | Nikolaos Nodarakis, Spyros Sioutas, Dimitrios Tsoumakos, Giannis
Tzimas and Evaggelia Pitoura | Rapid AkNN Query Processing for Fast Classification of Multidimensional
Data in the Cloud | 12 pages, 14 figures, 4 tables (it will be submitted to DEXA 2014) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A $k$-nearest neighbor ($k$NN) query determines the $k$ nearest points, using
distance metrics, from a specific location. An all $k$-nearest neighbor
(A$k$NN) query constitutes a variation of a $k$NN query and retrieves the $k$
nearest points for each point inside a database. Their main usage resonates in
spatial databases and they consist the backbone of many location-based
applications and not only (i.e. $k$NN joins in databases, classification in
data mining). So, it is very crucial to develop methods that answer them
efficiently. In this work, we propose a novel method for classifying
multidimensional data using an A$k$NN algorithm in the MapReduce framework. Our
approach exploits space decomposition techniques for processing the
classification procedure in a parallel and distributed manner. To our
knowledge, we are the first to study the classification of multidimensional
objects under this perspective. Through an extensive experimental evaluation we
prove that our solution is efficient and scalable in processing the given
queries. We investigate many different perspectives that can affect the total
computational cost, such as different dataset distributions, number of
dimensions, growth of $k$ value and granularity of space decomposition and
prove that our system is efficient, robust and scalable.
| [
{
"version": "v1",
"created": "Thu, 27 Feb 2014 20:46:09 GMT"
}
] | 2014-02-28T00:00:00 | [
[
"Nodarakis",
"Nikolaos",
""
],
[
"Sioutas",
"Spyros",
""
],
[
"Tsoumakos",
"Dimitrios",
""
],
[
"Tzimas",
"Giannis",
""
],
[
"Pitoura",
"Evaggelia",
""
]
] | TITLE: Rapid AkNN Query Processing for Fast Classification of Multidimensional
Data in the Cloud
ABSTRACT: A $k$-nearest neighbor ($k$NN) query determines the $k$ nearest points, using
distance metrics, from a specific location. An all $k$-nearest neighbor
(A$k$NN) query constitutes a variation of a $k$NN query and retrieves the $k$
nearest points for each point inside a database. Their main usage resonates in
spatial databases and they consist the backbone of many location-based
applications and not only (i.e. $k$NN joins in databases, classification in
data mining). So, it is very crucial to develop methods that answer them
efficiently. In this work, we propose a novel method for classifying
multidimensional data using an A$k$NN algorithm in the MapReduce framework. Our
approach exploits space decomposition techniques for processing the
classification procedure in a parallel and distributed manner. To our
knowledge, we are the first to study the classification of multidimensional
objects under this perspective. Through an extensive experimental evaluation we
prove that our solution is efficient and scalable in processing the given
queries. We investigate many different perspectives that can affect the total
computational cost, such as different dataset distributions, number of
dimensions, growth of $k$ value and granularity of space decomposition and
prove that our system is efficient, robust and scalable.
|
1402.6428 | Vishakha Metre VAM | Jayshree Ghorpade-Aher and Vishakha A. Metre | Clustering Multidimensional Data with PSO based Algorithm | 6 pages,6 figures,3 tables, conference paper | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data clustering is a recognized data analysis method in data mining whereas
K-Means is the well known partitional clustering method, possessing pleasant
features. We observed that, K-Means and other partitional clustering techniques
suffer from several limitations such as initial cluster centre selection,
preknowledge of number of clusters, dead unit problem, multiple cluster
membership and premature convergence to local optima. Several optimization
methods are proposed in the literature in order to solve clustering
limitations, but Swarm Intelligence (SI) has achieved its remarkable position
in the concerned area. Particle Swarm Optimization (PSO) is the most popular SI
technique and one of the favorite areas of researchers. In this paper, we
present a brief overview of PSO and applicability of its variants to solve
clustering challenges. Also, we propose an advanced PSO algorithm named as
Subtractive Clustering based Boundary Restricted Adaptive Particle Swarm
Optimization (SC-BR-APSO) algorithm for clustering multidimensional data. For
comparison purpose, we have studied and analyzed various algorithms such as
K-Means, PSO, K-Means-PSO, Hybrid Subtractive + PSO, BRAPSO, and proposed
algorithm on nine different datasets. The motivation behind proposing
SC-BR-APSO algorithm is to deal with multidimensional data clustering, with
minimum error rate and maximum convergence rate.
| [
{
"version": "v1",
"created": "Wed, 26 Feb 2014 06:08:27 GMT"
}
] | 2014-02-27T00:00:00 | [
[
"Ghorpade-Aher",
"Jayshree",
""
],
[
"Metre",
"Vishakha A.",
""
]
] | TITLE: Clustering Multidimensional Data with PSO based Algorithm
ABSTRACT: Data clustering is a recognized data analysis method in data mining whereas
K-Means is the well known partitional clustering method, possessing pleasant
features. We observed that, K-Means and other partitional clustering techniques
suffer from several limitations such as initial cluster centre selection,
preknowledge of number of clusters, dead unit problem, multiple cluster
membership and premature convergence to local optima. Several optimization
methods are proposed in the literature in order to solve clustering
limitations, but Swarm Intelligence (SI) has achieved its remarkable position
in the concerned area. Particle Swarm Optimization (PSO) is the most popular SI
technique and one of the favorite areas of researchers. In this paper, we
present a brief overview of PSO and applicability of its variants to solve
clustering challenges. Also, we propose an advanced PSO algorithm named as
Subtractive Clustering based Boundary Restricted Adaptive Particle Swarm
Optimization (SC-BR-APSO) algorithm for clustering multidimensional data. For
comparison purpose, we have studied and analyzed various algorithms such as
K-Means, PSO, K-Means-PSO, Hybrid Subtractive + PSO, BRAPSO, and proposed
algorithm on nine different datasets. The motivation behind proposing
SC-BR-APSO algorithm is to deal with multidimensional data clustering, with
minimum error rate and maximum convergence rate.
|
1402.6636 | Iain Rice Mr | Iain Rice, Roger Benton, Les Hart and David Lowe | Analysis of Multibeam SONAR Data using Dissimilarity Representations | Presented at IMA Mathematics in Defence 2013 | null | null | null | cs.CE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of low-dimensional visualisation of very
high dimensional information sources for the purpose of situation awareness in
the maritime environment. In response to the requirement for human decision
support aids to reduce information overload (and specifically, data amenable to
inter-point relative similarity measures) appropriate to the below-water
maritime domain, we are investigating a preliminary prototype topographic
visualisation model. The focus of the current paper is on the mathematical
problem of exploiting a relative dissimilarity representation of signals in a
visual informatics mapping model, driven by real-world sonar systems. An
independent source model is used to analyse the sonar beams from which a simple
probabilistic input model to represent uncertainty is mapped to a latent
visualisation space where data uncertainty can be accommodated. The use of
euclidean and non-euclidean measures are used and the motivation for future use
of non-euclidean measures is made. Concepts are illustrated using a simulated
64 beam weak SNR dataset with realistic sonar targets.
| [
{
"version": "v1",
"created": "Wed, 19 Feb 2014 10:21:34 GMT"
}
] | 2014-02-27T00:00:00 | [
[
"Rice",
"Iain",
""
],
[
"Benton",
"Roger",
""
],
[
"Hart",
"Les",
""
],
[
"Lowe",
"David",
""
]
] | TITLE: Analysis of Multibeam SONAR Data using Dissimilarity Representations
ABSTRACT: This paper considers the problem of low-dimensional visualisation of very
high dimensional information sources for the purpose of situation awareness in
the maritime environment. In response to the requirement for human decision
support aids to reduce information overload (and specifically, data amenable to
inter-point relative similarity measures) appropriate to the below-water
maritime domain, we are investigating a preliminary prototype topographic
visualisation model. The focus of the current paper is on the mathematical
problem of exploiting a relative dissimilarity representation of signals in a
visual informatics mapping model, driven by real-world sonar systems. An
independent source model is used to analyse the sonar beams from which a simple
probabilistic input model to represent uncertainty is mapped to a latent
visualisation space where data uncertainty can be accommodated. The use of
euclidean and non-euclidean measures are used and the motivation for future use
of non-euclidean measures is made. Concepts are illustrated using a simulated
64 beam weak SNR dataset with realistic sonar targets.
|
1402.6650 | Ahmed Sahlol | Ahmed Sahlol and Cheng Suen | A Novel Method for the Recognition of Isolated Handwritten Arabic
Characters | Indicate 13 pages, 5 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | There are many difficulties facing a handwritten Arabic recognition system
such as unlimited variation in human handwriting, similarities of distinct
character shapes, interconnections of neighbouring characters and their
position in the word. The typical Optical Character Recognition (OCR) systems
are based mainly on three stages, preprocessing, features extraction and
recognition. This paper proposes new methods for handwritten Arabic character
recognition which is based on novel preprocessing operations including
different kinds of noise removal also different kind of features like
structural, Statistical and Morphological features from the main body of the
character and also from the secondary components. Evaluation of the accuracy of
the selected features is made. The system was trained and tested by back
propagation neural network with CENPRMI dataset. The proposed algorithm
obtained promising results as it is able to recognize 88% of our test set
accurately. In Comparable with other related works we find that our result is
the highest among other published works.
| [
{
"version": "v1",
"created": "Wed, 26 Feb 2014 19:09:09 GMT"
}
] | 2014-02-27T00:00:00 | [
[
"Sahlol",
"Ahmed",
""
],
[
"Suen",
"Cheng",
""
]
] | TITLE: A Novel Method for the Recognition of Isolated Handwritten Arabic
Characters
ABSTRACT: There are many difficulties facing a handwritten Arabic recognition system
such as unlimited variation in human handwriting, similarities of distinct
character shapes, interconnections of neighbouring characters and their
position in the word. The typical Optical Character Recognition (OCR) systems
are based mainly on three stages, preprocessing, features extraction and
recognition. This paper proposes new methods for handwritten Arabic character
recognition which is based on novel preprocessing operations including
different kinds of noise removal also different kind of features like
structural, Statistical and Morphological features from the main body of the
character and also from the secondary components. Evaluation of the accuracy of
the selected features is made. The system was trained and tested by back
propagation neural network with CENPRMI dataset. The proposed algorithm
obtained promising results as it is able to recognize 88% of our test set
accurately. In Comparable with other related works we find that our result is
the highest among other published works.
|
1402.6690 | Jalal Mahmud | Jalal Mahmud, Jilin Chen, Jeffrey Nichols | Why Are You More Engaged? Predicting Social Engagement from Word Use | null | null | null | null | cs.SI cs.CL cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a study to analyze how word use can predict social engagement
behaviors such as replies and retweets in Twitter. We compute psycholinguistic
category scores from word usage, and investigate how people with different
scores exhibited different reply and retweet behaviors on Twitter. We also
found psycholinguistic categories that show significant correlations with such
social engagement behaviors. In addition, we have built predictive models of
replies and retweets from such psycholinguistic category based features. Our
experiments using a real world dataset collected from Twitter validates that
such predictions can be done with reasonable accuracy.
| [
{
"version": "v1",
"created": "Wed, 26 Feb 2014 20:58:00 GMT"
}
] | 2014-02-27T00:00:00 | [
[
"Mahmud",
"Jalal",
""
],
[
"Chen",
"Jilin",
""
],
[
"Nichols",
"Jeffrey",
""
]
] | TITLE: Why Are You More Engaged? Predicting Social Engagement from Word Use
ABSTRACT: We present a study to analyze how word use can predict social engagement
behaviors such as replies and retweets in Twitter. We compute psycholinguistic
category scores from word usage, and investigate how people with different
scores exhibited different reply and retweet behaviors on Twitter. We also
found psycholinguistic categories that show significant correlations with such
social engagement behaviors. In addition, we have built predictive models of
replies and retweets from such psycholinguistic category based features. Our
experiments using a real world dataset collected from Twitter validates that
such predictions can be done with reasonable accuracy.
|
1212.1522 | Vasilis Gkatzelis | Richard Cole, Vasilis Gkatzelis, Gagan Goel | Mechanism Design for Fair Division | arXiv admin note: substantial text overlap with arXiv:1203.4627 | null | null | null | cs.GT cs.DS cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We revisit the classic problem of fair division from a mechanism design
perspective, using {\em Proportional Fairness} as a benchmark. In particular,
we aim to allocate a collection of divisible items to a set of agents while
incentivizing the agents to be truthful in reporting their valuations. For the
very large class of homogeneous valuations, we design a truthful mechanism that
provides {\em every agent} with at least a $1/e\approx 0.368$ fraction of her
Proportionally Fair valuation. To complement this result, we show that no
truthful mechanism can guarantee more than a $0.5$ fraction, even for the
restricted class of additive linear valuations. We also propose another
mechanism for additive linear valuations that works really well when every item
is highly demanded. To guarantee truthfulness, our mechanisms discard a
carefully chosen fraction of the allocated resources; we conclude by uncovering
interesting connections between our mechanisms and known mechanisms that use
money instead.
| [
{
"version": "v1",
"created": "Fri, 7 Dec 2012 02:31:27 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Feb 2013 05:47:58 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Feb 2014 00:14:37 GMT"
}
] | 2014-02-26T00:00:00 | [
[
"Cole",
"Richard",
""
],
[
"Gkatzelis",
"Vasilis",
""
],
[
"Goel",
"Gagan",
""
]
] | TITLE: Mechanism Design for Fair Division
ABSTRACT: We revisit the classic problem of fair division from a mechanism design
perspective, using {\em Proportional Fairness} as a benchmark. In particular,
we aim to allocate a collection of divisible items to a set of agents while
incentivizing the agents to be truthful in reporting their valuations. For the
very large class of homogeneous valuations, we design a truthful mechanism that
provides {\em every agent} with at least a $1/e\approx 0.368$ fraction of her
Proportionally Fair valuation. To complement this result, we show that no
truthful mechanism can guarantee more than a $0.5$ fraction, even for the
restricted class of additive linear valuations. We also propose another
mechanism for additive linear valuations that works really well when every item
is highly demanded. To guarantee truthfulness, our mechanisms discard a
carefully chosen fraction of the allocated resources; we conclude by uncovering
interesting connections between our mechanisms and known mechanisms that use
money instead.
|
1301.7006 | Michel Plantie | Michel Crampes, Michel Planti\'e | A Unified Community Detection, Visualization and Analysis method | Submitted to Advances in Complex Systems | null | null | null | cs.SI physics.data-an physics.soc-ph stat.OT | http://creativecommons.org/licenses/publicdomain/ | Community detection in social graphs has attracted researchers' interest for
a long time. With the widespread of social networks on the Internet it has
recently become an important research domain. Most contributions focus upon the
definition of algorithms for optimizing the so-called modularity function. In
the first place interest was limited to unipartite graph inputs and partitioned
community outputs. Recently bipartite graphs, directed graphs and overlapping
communities have been investigated. Few contributions embrace at the same time
the three types of nodes. In this paper we present a method which unifies
commmunity detection for the three types of nodes and at the same time merges
partitionned and overlapping communities. Moreover results are visualized in
such a way that they can be analyzed and semantically interpreted. For
validation we experiment this method on well known simple benchmarks. It is
then applied to real data in three cases. In two examples of photos sets with
tagged people we reveal social networks. A second type of application is of
particularly interest. After applying our method to Human Brain Tractography
Data provided by a team of neurologists, we produce clusters of white fibers in
accordance with other well known clustering methods. Moreover our approach for
visualizing overlapping clusters allows better understanding of the results by
the neurologist team. These last results open up the possibility of applying
community detection methods in other domains such as data analysis with
original enhanced performances.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2013 18:02:44 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jan 2013 15:13:52 GMT"
},
{
"version": "v3",
"created": "Thu, 31 Jan 2013 16:11:59 GMT"
},
{
"version": "v4",
"created": "Fri, 1 Feb 2013 14:59:59 GMT"
},
{
"version": "v5",
"created": "Fri, 15 Feb 2013 17:41:14 GMT"
},
{
"version": "v6",
"created": "Tue, 25 Feb 2014 17:35:36 GMT"
}
] | 2014-02-26T00:00:00 | [
[
"Crampes",
"Michel",
""
],
[
"Plantié",
"Michel",
""
]
] | TITLE: A Unified Community Detection, Visualization and Analysis method
ABSTRACT: Community detection in social graphs has attracted researchers' interest for
a long time. With the widespread of social networks on the Internet it has
recently become an important research domain. Most contributions focus upon the
definition of algorithms for optimizing the so-called modularity function. In
the first place interest was limited to unipartite graph inputs and partitioned
community outputs. Recently bipartite graphs, directed graphs and overlapping
communities have been investigated. Few contributions embrace at the same time
the three types of nodes. In this paper we present a method which unifies
commmunity detection for the three types of nodes and at the same time merges
partitionned and overlapping communities. Moreover results are visualized in
such a way that they can be analyzed and semantically interpreted. For
validation we experiment this method on well known simple benchmarks. It is
then applied to real data in three cases. In two examples of photos sets with
tagged people we reveal social networks. A second type of application is of
particularly interest. After applying our method to Human Brain Tractography
Data provided by a team of neurologists, we produce clusters of white fibers in
accordance with other well known clustering methods. Moreover our approach for
visualizing overlapping clusters allows better understanding of the results by
the neurologist team. These last results open up the possibility of applying
community detection methods in other domains such as data analysis with
original enhanced performances.
|
1306.1704 | Dmytro Karamshuk | Dmytro Karamshuk, Anastasios Noulas, Salvatore Scellato, Vincenzo
Nicosia, Cecilia Mascolo | Geo-Spotting: Mining Online Location-based Services for Optimal Retail
Store Placement | Proceedings of the 19th ACM SIGKDD international conference on
Knowledge discovery and data mining, Chicago, 2013, Pages 793-801 | null | 10.1145/2487575.2487616 | null | cs.SI cs.CE physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of identifying the optimal location for a new retail store has
been the focus of past research, especially in the field of land economy, due
to its importance in the success of a business. Traditional approaches to the
problem have factored in demographics, revenue and aggregated human flow
statistics from nearby or remote areas. However, the acquisition of relevant
data is usually expensive. With the growth of location-based social networks,
fine grained data describing user mobility and popularity of places has
recently become attainable.
In this paper we study the predictive power of various machine learning
features on the popularity of retail stores in the city through the use of a
dataset collected from Foursquare in New York. The features we mine are based
on two general signals: geographic, where features are formulated according to
the types and density of nearby places, and user mobility, which includes
transitions between venues or the incoming flow of mobile users from distant
areas. Our evaluation suggests that the best performing features are common
across the three different commercial chains considered in the analysis,
although variations may exist too, as explained by heterogeneities in the way
retail facilities attract users. We also show that performance improves
significantly when combining multiple features in supervised learning
algorithms, suggesting that the retail success of a business may depend on
multiple factors.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2013 12:42:06 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Feb 2014 10:48:20 GMT"
}
] | 2014-02-26T00:00:00 | [
[
"Karamshuk",
"Dmytro",
""
],
[
"Noulas",
"Anastasios",
""
],
[
"Scellato",
"Salvatore",
""
],
[
"Nicosia",
"Vincenzo",
""
],
[
"Mascolo",
"Cecilia",
""
]
] | TITLE: Geo-Spotting: Mining Online Location-based Services for Optimal Retail
Store Placement
ABSTRACT: The problem of identifying the optimal location for a new retail store has
been the focus of past research, especially in the field of land economy, due
to its importance in the success of a business. Traditional approaches to the
problem have factored in demographics, revenue and aggregated human flow
statistics from nearby or remote areas. However, the acquisition of relevant
data is usually expensive. With the growth of location-based social networks,
fine grained data describing user mobility and popularity of places has
recently become attainable.
In this paper we study the predictive power of various machine learning
features on the popularity of retail stores in the city through the use of a
dataset collected from Foursquare in New York. The features we mine are based
on two general signals: geographic, where features are formulated according to
the types and density of nearby places, and user mobility, which includes
transitions between venues or the incoming flow of mobile users from distant
areas. Our evaluation suggests that the best performing features are common
across the three different commercial chains considered in the analysis,
although variations may exist too, as explained by heterogeneities in the way
retail facilities attract users. We also show that performance improves
significantly when combining multiple features in supervised learning
algorithms, suggesting that the retail success of a business may depend on
multiple factors.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.