id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1402.5953 | Richard McClatchey | Andrew Branson, Jetendr Shamdasani, Richard McClatchey | A Description Driven Approach for Flexible Metadata Tracking | 10 pages and 3 figures. arXiv admin note: text overlap with
arXiv:1402.5753, arXiv:1402.5764 | 7th ESA International Conference on Ensuring Long-Term
Preservation and Adding Value to Scientific and Technical Data (PV 2013)
4--6th November 2013. Frascati, Italy | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Evolving user requirements presents a considerable software engineering
challenge, all the more so in an environment where data will be stored for a
very long time, and must remain usable as the system specification evolves
around it. Capturing the description of the system addresses this issue since a
description-driven approach enables new versions of data structures and
processes to be created alongside the old, thereby providing a history of
changes to the underlying data models and enabling the capture of provenance
data. This description-driven approach is advocated in this paper in which a
system called CRISTAL is presented. CRISTAL is based on description-driven
principles; it can use previous versions of stored descriptions to define
various versions of data which can be stored in various forms. To demonstrate
the efficacy of this approach the history of the project at CERN is presented
where CRISTAL was used to track data and process definitions and their
associated provenance data in the construction of the CMS ECAL detector, how it
was applied to handle analysis tracking and data index provenance in the
neuGRID and N4U projects, and how it will be matured further in the CRISTAL-ISE
project. We believe that the CRISTAL approach could be invaluable in handling
the evolution, indexing and tracking of large datasets, and are keen to apply
it further in this direction.
| [
{
"version": "v1",
"created": "Mon, 24 Feb 2014 10:09:30 GMT"
}
] | 2014-02-26T00:00:00 | [
[
"Branson",
"Andrew",
""
],
[
"Shamdasani",
"Jetendr",
""
],
[
"McClatchey",
"Richard",
""
]
] | TITLE: A Description Driven Approach for Flexible Metadata Tracking
ABSTRACT: Evolving user requirements presents a considerable software engineering
challenge, all the more so in an environment where data will be stored for a
very long time, and must remain usable as the system specification evolves
around it. Capturing the description of the system addresses this issue since a
description-driven approach enables new versions of data structures and
processes to be created alongside the old, thereby providing a history of
changes to the underlying data models and enabling the capture of provenance
data. This description-driven approach is advocated in this paper in which a
system called CRISTAL is presented. CRISTAL is based on description-driven
principles; it can use previous versions of stored descriptions to define
various versions of data which can be stored in various forms. To demonstrate
the efficacy of this approach the history of the project at CERN is presented
where CRISTAL was used to track data and process definitions and their
associated provenance data in the construction of the CMS ECAL detector, how it
was applied to handle analysis tracking and data index provenance in the
neuGRID and N4U projects, and how it will be matured further in the CRISTAL-ISE
project. We believe that the CRISTAL approach could be invaluable in handling
the evolution, indexing and tracking of large datasets, and are keen to apply
it further in this direction.
|
1402.6077 | Zhi-Hua Zhou | Wang-Zhou Dai and Zhi-Hua Zhou | Inductive Logic Boosting | 19 pages, 2 figures | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent years have seen a surge of interest in Probabilistic Logic Programming
(PLP) and Statistical Relational Learning (SRL) models that combine logic with
probabilities. Structure learning of these systems is an intersection area of
Inductive Logic Programming (ILP) and statistical learning (SL). However, ILP
cannot deal with probabilities, SL cannot model relational hypothesis. The
biggest challenge of integrating these two machine learning frameworks is how
to estimate the probability of a logic clause only from the observation of
grounded logic atoms. Many current methods models a joint probability by
representing clause as graphical model and literals as vertices in it. This
model is still too complicate and only can be approximate by pseudo-likelihood.
We propose Inductive Logic Boosting framework to transform the relational
dataset into a feature-based dataset, induces logic rules by boosting Problog
Rule Trees and relaxes the independence constraint of pseudo-likelihood.
Experimental evaluation on benchmark datasets demonstrates that the AUC-PR and
AUC-ROC value of ILP learned rules are higher than current state-of-the-art SRL
methods.
| [
{
"version": "v1",
"created": "Tue, 25 Feb 2014 07:53:49 GMT"
}
] | 2014-02-26T00:00:00 | [
[
"Dai",
"Wang-Zhou",
""
],
[
"Zhou",
"Zhi-Hua",
""
]
] | TITLE: Inductive Logic Boosting
ABSTRACT: Recent years have seen a surge of interest in Probabilistic Logic Programming
(PLP) and Statistical Relational Learning (SRL) models that combine logic with
probabilities. Structure learning of these systems is an intersection area of
Inductive Logic Programming (ILP) and statistical learning (SL). However, ILP
cannot deal with probabilities, SL cannot model relational hypothesis. The
biggest challenge of integrating these two machine learning frameworks is how
to estimate the probability of a logic clause only from the observation of
grounded logic atoms. Many current methods models a joint probability by
representing clause as graphical model and literals as vertices in it. This
model is still too complicate and only can be approximate by pseudo-likelihood.
We propose Inductive Logic Boosting framework to transform the relational
dataset into a feature-based dataset, induces logic rules by boosting Problog
Rule Trees and relaxes the independence constraint of pseudo-likelihood.
Experimental evaluation on benchmark datasets demonstrates that the AUC-PR and
AUC-ROC value of ILP learned rules are higher than current state-of-the-art SRL
methods.
|
1402.6238 | Jobin Wilson | Jobin Wilson, Santanu Chaudhury, Brejesh Lall, Prateek Kapadia | Improving Collaborative Filtering based Recommenders using Topic
Modelling | null | null | null | null | cs.IR cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Standard Collaborative Filtering (CF) algorithms make use of interactions
between users and items in the form of implicit or explicit ratings alone for
generating recommendations. Similarity among users or items is calculated
purely based on rating overlap in this case,without considering explicit
properties of users or items involved, limiting their applicability in domains
with very sparse rating spaces. In many domains such as movies, news or
electronic commerce recommenders, considerable contextual data in text form
describing item properties is available along with the rating data, which could
be utilized to improve recommendation quality.In this paper, we propose a novel
approach to improve standard CF based recommenders by utilizing latent
Dirichlet allocation (LDA) to learn latent properties of items, expressed in
terms of topic proportions, derived from their textual description. We infer
user's topic preferences or persona in the same latent space,based on her
historical ratings. While computing similarity between users, we make use of a
combined similarity measure involving rating overlap as well as similarity in
the latent topic space. This approach alleviates sparsity problem as it allows
calculation of similarity between users even if they have not rated any items
in common. Our experiments on multiple public datasets indicate that the
proposed hybrid approach significantly outperforms standard user Based and item
Based CF recommenders in terms of classification accuracy metrics such as
precision, recall and f-measure.
| [
{
"version": "v1",
"created": "Tue, 25 Feb 2014 16:52:05 GMT"
}
] | 2014-02-26T00:00:00 | [
[
"Wilson",
"Jobin",
""
],
[
"Chaudhury",
"Santanu",
""
],
[
"Lall",
"Brejesh",
""
],
[
"Kapadia",
"Prateek",
""
]
] | TITLE: Improving Collaborative Filtering based Recommenders using Topic
Modelling
ABSTRACT: Standard Collaborative Filtering (CF) algorithms make use of interactions
between users and items in the form of implicit or explicit ratings alone for
generating recommendations. Similarity among users or items is calculated
purely based on rating overlap in this case,without considering explicit
properties of users or items involved, limiting their applicability in domains
with very sparse rating spaces. In many domains such as movies, news or
electronic commerce recommenders, considerable contextual data in text form
describing item properties is available along with the rating data, which could
be utilized to improve recommendation quality.In this paper, we propose a novel
approach to improve standard CF based recommenders by utilizing latent
Dirichlet allocation (LDA) to learn latent properties of items, expressed in
terms of topic proportions, derived from their textual description. We infer
user's topic preferences or persona in the same latent space,based on her
historical ratings. While computing similarity between users, we make use of a
combined similarity measure involving rating overlap as well as similarity in
the latent topic space. This approach alleviates sparsity problem as it allows
calculation of similarity between users even if they have not rated any items
in common. Our experiments on multiple public datasets indicate that the
proposed hybrid approach significantly outperforms standard user Based and item
Based CF recommenders in terms of classification accuracy metrics such as
precision, recall and f-measure.
|
1306.5056 | Tyler Sanderson | Tyler Sanderson and Clayton Scott | Class Proportion Estimation with Application to Multiclass Anomaly
Rejection | Accepted to AISTATS 2014. 15 pages. 2 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work addresses two classification problems that fall under the heading
of domain adaptation, wherein the distributions of training and testing
examples differ. The first problem studied is that of class proportion
estimation, which is the problem of estimating the class proportions in an
unlabeled testing data set given labeled examples of each class. Compared to
previous work on this problem, our approach has the novel feature that it does
not require labeled training data from one of the classes. This property allows
us to address the second domain adaptation problem, namely, multiclass anomaly
rejection. Here, the goal is to design a classifier that has the option of
assigning a "reject" label, indicating that the instance did not arise from a
class present in the training data. We establish consistent learning strategies
for both of these domain adaptation problems, which to our knowledge are the
first of their kind. We also implement the class proportion estimation
technique and demonstrate its performance on several benchmark data sets.
| [
{
"version": "v1",
"created": "Fri, 21 Jun 2013 06:25:54 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Jun 2013 03:36:55 GMT"
},
{
"version": "v3",
"created": "Sat, 22 Feb 2014 08:58:10 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Sanderson",
"Tyler",
""
],
[
"Scott",
"Clayton",
""
]
] | TITLE: Class Proportion Estimation with Application to Multiclass Anomaly
Rejection
ABSTRACT: This work addresses two classification problems that fall under the heading
of domain adaptation, wherein the distributions of training and testing
examples differ. The first problem studied is that of class proportion
estimation, which is the problem of estimating the class proportions in an
unlabeled testing data set given labeled examples of each class. Compared to
previous work on this problem, our approach has the novel feature that it does
not require labeled training data from one of the classes. This property allows
us to address the second domain adaptation problem, namely, multiclass anomaly
rejection. Here, the goal is to design a classifier that has the option of
assigning a "reject" label, indicating that the instance did not arise from a
class present in the training data. We establish consistent learning strategies
for both of these domain adaptation problems, which to our knowledge are the
first of their kind. We also implement the class proportion estimation
technique and demonstrate its performance on several benchmark data sets.
|
1402.5565 | David M. Johnson | David M. Johnson, Caiming Xiong and Jason J. Corso | Semi-Supervised Nonlinear Distance Metric Learning via Forests of
Max-Margin Cluster Hierarchies | Manuscript submitted to SIGKDD on 21 Feb 2014 | null | null | null | stat.ML cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metric learning is a key problem for many data mining and machine learning
applications, and has long been dominated by Mahalanobis methods. Recent
advances in nonlinear metric learning have demonstrated the potential power of
non-Mahalanobis distance functions, particularly tree-based functions. We
propose a novel nonlinear metric learning method that uses an iterative,
hierarchical variant of semi-supervised max-margin clustering to construct a
forest of cluster hierarchies, where each individual hierarchy can be
interpreted as a weak metric over the data. By introducing randomness during
hierarchy training and combining the output of many of the resulting
semi-random weak hierarchy metrics, we can obtain a powerful and robust
nonlinear metric model. This method has two primary contributions: first, it is
semi-supervised, incorporating information from both constrained and
unconstrained points. Second, we take a relaxed approach to constraint
satisfaction, allowing the method to satisfy different subsets of the
constraints at different levels of the hierarchy rather than attempting to
simultaneously satisfy all of them. This leads to a more robust learning
algorithm. We compare our method to a number of state-of-the-art benchmarks on
$k$-nearest neighbor classification, large-scale image retrieval and
semi-supervised clustering problems, and find that our algorithm yields results
comparable or superior to the state-of-the-art, and is significantly more
robust to noise.
| [
{
"version": "v1",
"created": "Sun, 23 Feb 2014 00:26:48 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Johnson",
"David M.",
""
],
[
"Xiong",
"Caiming",
""
],
[
"Corso",
"Jason J.",
""
]
] | TITLE: Semi-Supervised Nonlinear Distance Metric Learning via Forests of
Max-Margin Cluster Hierarchies
ABSTRACT: Metric learning is a key problem for many data mining and machine learning
applications, and has long been dominated by Mahalanobis methods. Recent
advances in nonlinear metric learning have demonstrated the potential power of
non-Mahalanobis distance functions, particularly tree-based functions. We
propose a novel nonlinear metric learning method that uses an iterative,
hierarchical variant of semi-supervised max-margin clustering to construct a
forest of cluster hierarchies, where each individual hierarchy can be
interpreted as a weak metric over the data. By introducing randomness during
hierarchy training and combining the output of many of the resulting
semi-random weak hierarchy metrics, we can obtain a powerful and robust
nonlinear metric model. This method has two primary contributions: first, it is
semi-supervised, incorporating information from both constrained and
unconstrained points. Second, we take a relaxed approach to constraint
satisfaction, allowing the method to satisfy different subsets of the
constraints at different levels of the hierarchy rather than attempting to
simultaneously satisfy all of them. This leads to a more robust learning
algorithm. We compare our method to a number of state-of-the-art benchmarks on
$k$-nearest neighbor classification, large-scale image retrieval and
semi-supervised clustering problems, and find that our algorithm yields results
comparable or superior to the state-of-the-art, and is significantly more
robust to noise.
|
1402.5613 | Peng Bo | Bo Peng, Zhipeng Lu, T.C.E. Cheng | A Tabu Search/Path Relinking Algorithm to Solve the Job Shop Scheduling
Problem | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an algorithm that incorporates a tabu search procedure into the
framework of path relinking to tackle the job shop scheduling problem (JSP).
This tabu search/path relinking (TS/PR) algorithm comprises several
distinguishing features, such as a specific relinking procedure and a reference
solution determination method. To test the performance of TS/PR, we apply it to
tackle almost all of the benchmark JSP instances available in the literature.
The test results show that TS/PR obtains competitive results compared with
state-of-the-art algorithms for JSP in the literature, demonstrating its
efficacy in terms of both solution quality and computational efficiency. In
particular, TS/PR is able to improve the upper bounds for 49 out of the 205
tested instances and it solves a challenging instance that has remained
unsolved for over 20 years.
| [
{
"version": "v1",
"created": "Sun, 23 Feb 2014 14:46:04 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Peng",
"Bo",
""
],
[
"Lu",
"Zhipeng",
""
],
[
"Cheng",
"T. C. E.",
""
]
] | TITLE: A Tabu Search/Path Relinking Algorithm to Solve the Job Shop Scheduling
Problem
ABSTRACT: We present an algorithm that incorporates a tabu search procedure into the
framework of path relinking to tackle the job shop scheduling problem (JSP).
This tabu search/path relinking (TS/PR) algorithm comprises several
distinguishing features, such as a specific relinking procedure and a reference
solution determination method. To test the performance of TS/PR, we apply it to
tackle almost all of the benchmark JSP instances available in the literature.
The test results show that TS/PR obtains competitive results compared with
state-of-the-art algorithms for JSP in the literature, demonstrating its
efficacy in terms of both solution quality and computational efficiency. In
particular, TS/PR is able to improve the upper bounds for 49 out of the 205
tested instances and it solves a challenging instance that has remained
unsolved for over 20 years.
|
1402.5634 | Gaurav Pandey | Gaurav Pandey and Ambedkar Dukkipati | To go deep or wide in learning? | 9 pages, 1 figure, Accepted for publication in Seventeenth
International Conference on Artificial Intelligence and Statistics | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To achieve acceptable performance for AI tasks, one can either use
sophisticated feature extraction methods as the first layer in a two-layered
supervised learning model, or learn the features directly using a deep
(multi-layered) model. While the first approach is very problem-specific, the
second approach has computational overheads in learning multiple layers and
fine-tuning of the model. In this paper, we propose an approach called wide
learning based on arc-cosine kernels, that learns a single layer of infinite
width. We propose exact and inexact learning strategies for wide learning and
show that wide learning with single layer outperforms single layer as well as
deep architectures of finite width for some benchmark datasets.
| [
{
"version": "v1",
"created": "Sun, 23 Feb 2014 16:51:51 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Pandey",
"Gaurav",
""
],
[
"Dukkipati",
"Ambedkar",
""
]
] | TITLE: To go deep or wide in learning?
ABSTRACT: To achieve acceptable performance for AI tasks, one can either use
sophisticated feature extraction methods as the first layer in a two-layered
supervised learning model, or learn the features directly using a deep
(multi-layered) model. While the first approach is very problem-specific, the
second approach has computational overheads in learning multiple layers and
fine-tuning of the model. In this paper, we propose an approach called wide
learning based on arc-cosine kernels, that learns a single layer of infinite
width. We propose exact and inexact learning strategies for wide learning and
show that wide learning with single layer outperforms single layer as well as
deep architectures of finite width for some benchmark datasets.
|
1402.5645 | Elshimaa Elgendi | Omar S. Soliman and Elshimaa A. R. Elgendi | A Hybrid Estimation of Distribution Algorithm with Random Walk local
Search for Multi-mode Resource-Constrained Project Scheduling problems | 8 pages,0 figures, Published with International Journal of Computer
Trends and Technology (IJCTT). Omar S. Soliman, Elshimaa A.R. Elgendi. A
Hybrid Estimation of Distribution Algorithm with Random Walk local Search for
Multi-mode Resource-Constrained Project Scheduling problems. Inter J. of
Computer Trends and Tech(IJCTT)8(2):57-64,2014 | null | 10.14445/22312803/IJCTT-V8P111 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-mode resource-constrained project scheduling problems (MRCPSPs) are
classified as NP-hard problems, in which a task has different execution modes
characterized by different resource requirements. Estimation of distribution
algorithm (EDA) has shown an effective performance for solving such real-world
optimization problems but it fails to find the desired optima. This paper
integrates a novel hybrid local search technique with EDA to enhance their
local search ability. The new local search is based on delete-then-insert
operator and a random walk (DIRW) to enhance exploitation abilities of EDA in
the neighborhoods of the search space. The proposed algorithm is capable to
explore and exploit the search mechanism in the search space through its outer
and inner loops. The proposed algorithm is tested and evaluated using benchmark
test problems of the project scheduling problem library PSPLIB. Simulation
results of the proposed algorithm are compared with the classical EDA
algorithm. The obtained results showed that the effectiveness of the proposed
algorithm and outperformed the compared EDA algorithm.
| [
{
"version": "v1",
"created": "Sun, 23 Feb 2014 18:15:24 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Soliman",
"Omar S.",
""
],
[
"Elgendi",
"Elshimaa A. R.",
""
]
] | TITLE: A Hybrid Estimation of Distribution Algorithm with Random Walk local
Search for Multi-mode Resource-Constrained Project Scheduling problems
ABSTRACT: Multi-mode resource-constrained project scheduling problems (MRCPSPs) are
classified as NP-hard problems, in which a task has different execution modes
characterized by different resource requirements. Estimation of distribution
algorithm (EDA) has shown an effective performance for solving such real-world
optimization problems but it fails to find the desired optima. This paper
integrates a novel hybrid local search technique with EDA to enhance their
local search ability. The new local search is based on delete-then-insert
operator and a random walk (DIRW) to enhance exploitation abilities of EDA in
the neighborhoods of the search space. The proposed algorithm is capable to
explore and exploit the search mechanism in the search space through its outer
and inner loops. The proposed algorithm is tested and evaluated using benchmark
test problems of the project scheduling problem library PSPLIB. Simulation
results of the proposed algorithm are compared with the classical EDA
algorithm. The obtained results showed that the effectiveness of the proposed
algorithm and outperformed the compared EDA algorithm.
|
1402.5749 | Richard McClatchey | R. McClatchey, A. Branson, A. Anjum, P. Bloodsworth, I. Habib, K.
Munir, J. Shamdasani, K. Soomro and the neuGRID Consortium | Providing Traceability for Neuroimaging Analyses | 17 pages, 9 figures, 2 tables | International Journal of Medical Informatics, 82 (2013) pp 882-894
Elsevier publishers | 10.1016/j.ijmedinf.2013.05.005 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the increasingly digital nature of biomedical data and as the complexity
of analyses in medical research increases, the need for accurate information
capture, traceability and accessibility has become crucial to medical
researchers in the pursuance of their research goals. Grid- or Cloud-based
technologies, often based on so-called Service Oriented Architectures (SOA),
are increasingly being seen as viable solutions for managing distributed data
and algorithms in the bio-medical domain. For neuroscientific analyses,
especially those centred on complex image analysis, traceability of processes
and datasets is essential but up to now this has not been captured in a manner
that facilitates collaborative study. Over the past decade, we have been
working with mammographers, paediatricians and neuroscientists in three
generations of projects to provide the data management and provenance services
now required for 21st century medical research. This paper outlines the finding
of a requirements study and a resulting system architecture for the production
of services to support neuroscientific studies of biomarkers for Alzheimers
Disease. The paper proposes a software infrastructure and services that provide
the foundation for such support. It introduces the use of the CRISTAL software
to provide provenance management as one of a number of services delivered on a
SOA, deployed to manage neuroimaging projects that have been studying
biomarkers for Alzheimers disease.
| [
{
"version": "v1",
"created": "Mon, 24 Feb 2014 08:44:49 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"McClatchey",
"R.",
""
],
[
"Branson",
"A.",
""
],
[
"Anjum",
"A.",
""
],
[
"Bloodsworth",
"P.",
""
],
[
"Habib",
"I.",
""
],
[
"Munir",
"K.",
""
],
[
"Shamdasani",
"J.",
""
],
[
"Soomro",
"K.",
""
],
[
"Consortium",
"the neuGRID",
""
]
] | TITLE: Providing Traceability for Neuroimaging Analyses
ABSTRACT: With the increasingly digital nature of biomedical data and as the complexity
of analyses in medical research increases, the need for accurate information
capture, traceability and accessibility has become crucial to medical
researchers in the pursuance of their research goals. Grid- or Cloud-based
technologies, often based on so-called Service Oriented Architectures (SOA),
are increasingly being seen as viable solutions for managing distributed data
and algorithms in the bio-medical domain. For neuroscientific analyses,
especially those centred on complex image analysis, traceability of processes
and datasets is essential but up to now this has not been captured in a manner
that facilitates collaborative study. Over the past decade, we have been
working with mammographers, paediatricians and neuroscientists in three
generations of projects to provide the data management and provenance services
now required for 21st century medical research. This paper outlines the finding
of a requirements study and a resulting system architecture for the production
of services to support neuroscientific studies of biomarkers for Alzheimers
Disease. The paper proposes a software infrastructure and services that provide
the foundation for such support. It introduces the use of the CRISTAL software
to provide provenance management as one of a number of services delivered on a
SOA, deployed to manage neuroimaging projects that have been studying
biomarkers for Alzheimers disease.
|
1402.5757 | Richard McClatchey | Kamran Munir, Saad Liaquat Kiani, Khawar Hasham, Richard McClatchey,
Andrew Branson, Jetendr Shamdasani and the N4U Consortium | An Integrated e-science Analysis Base for Computation Neuroscience
Experiments and Analysis | 8 pages & 4 figures | Procedia - Social and Behavioral Sciences. Vol 73 pp 85-92 (2013)
Elsevier Publishers | 10.1016/j.sbspro.2013.02.026. | null | cs.SE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent developments in data management and imaging technologies have
significantly affected diagnostic and extrapolative research in the
understanding of neurodegenerative diseases. However, the impact of these new
technologies is largely dependent on the speed and reliability with which the
medical data can be visualised, analysed and interpreted. The EUs neuGRID for
Users (N4U) is a follow-on project to neuGRID, which aims to provide an
integrated environment to carry out computational neuroscience experiments.
This paper reports on the design and development of the N4U Analysis Base and
related Information Services, which addresses existing research and practical
challenges by offering an integrated medical data analysis environment with the
necessary building blocks for neuroscientists to optimally exploit neuroscience
workflows, large image datasets and algorithms in order to conduct analyses.
The N4U Analysis Base enables such analyses by indexing and interlinking the
neuroimaging and clinical study datasets stored on the N4U Grid infrastructure,
algorithms and scientific workflow definitions along with their associated
provenance information.
| [
{
"version": "v1",
"created": "Mon, 24 Feb 2014 09:14:44 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Munir",
"Kamran",
""
],
[
"Kiani",
"Saad Liaquat",
""
],
[
"Hasham",
"Khawar",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Branson",
"Andrew",
""
],
[
"Shamdasani",
"Jetendr",
""
],
[
"Consortium",
"the N4U",
""
]
] | TITLE: An Integrated e-science Analysis Base for Computation Neuroscience
Experiments and Analysis
ABSTRACT: Recent developments in data management and imaging technologies have
significantly affected diagnostic and extrapolative research in the
understanding of neurodegenerative diseases. However, the impact of these new
technologies is largely dependent on the speed and reliability with which the
medical data can be visualised, analysed and interpreted. The EUs neuGRID for
Users (N4U) is a follow-on project to neuGRID, which aims to provide an
integrated environment to carry out computational neuroscience experiments.
This paper reports on the design and development of the N4U Analysis Base and
related Information Services, which addresses existing research and practical
challenges by offering an integrated medical data analysis environment with the
necessary building blocks for neuroscientists to optimally exploit neuroscience
workflows, large image datasets and algorithms in order to conduct analyses.
The N4U Analysis Base enables such analyses by indexing and interlinking the
neuroimaging and clinical study datasets stored on the N4U Grid infrastructure,
algorithms and scientific workflow definitions along with their associated
provenance information.
|
1402.5774 | Da-Cheng Nie | Da-Cheng Nie, Ya-Hui An, Qiang Dong, Yan Fu and Tao Zhou | Information Filtering via Balanced Diffusion on Bipartite Networks | 13 pages, 6 figures | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent decade has witnessed the increasing popularity of recommender systems,
which help users acquire relevant commodities and services from overwhelming
resources on Internet. Some simple physical diffusion processes have been used
to design effective recommendation algorithms for user-object bipartite
networks, typically mass diffusion (MD) and heat conduction (HC) algorithms
which have different advantages respectively on accuracy and diversity. In this
paper, we investigate the effect of weight assignment in the hybrid of MD and
HC, and find that a new hybrid algorithm of MD and HC with balanced weights
will achieve the optimal recommendation results, we name it balanced diffusion
(BD) algorithm. Numerical experiments on three benchmark data sets, MovieLens,
Netflix and RateYourMusic (RYM), show that the performance of BD algorithm
outperforms the existing diffusion-based methods on the three important
recommendation metrics, accuracy, diversity and novelty. Specifically, it can
not only provide accurately recommendation results, but also yield higher
diversity and novelty in recommendations by accurately recommending unpopular
objects.
| [
{
"version": "v1",
"created": "Mon, 24 Feb 2014 10:26:39 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Nie",
"Da-Cheng",
""
],
[
"An",
"Ya-Hui",
""
],
[
"Dong",
"Qiang",
""
],
[
"Fu",
"Yan",
""
],
[
"Zhou",
"Tao",
""
]
] | TITLE: Information Filtering via Balanced Diffusion on Bipartite Networks
ABSTRACT: Recent decade has witnessed the increasing popularity of recommender systems,
which help users acquire relevant commodities and services from overwhelming
resources on Internet. Some simple physical diffusion processes have been used
to design effective recommendation algorithms for user-object bipartite
networks, typically mass diffusion (MD) and heat conduction (HC) algorithms
which have different advantages respectively on accuracy and diversity. In this
paper, we investigate the effect of weight assignment in the hybrid of MD and
HC, and find that a new hybrid algorithm of MD and HC with balanced weights
will achieve the optimal recommendation results, we name it balanced diffusion
(BD) algorithm. Numerical experiments on three benchmark data sets, MovieLens,
Netflix and RateYourMusic (RYM), show that the performance of BD algorithm
outperforms the existing diffusion-based methods on the three important
recommendation metrics, accuracy, diversity and novelty. Specifically, it can
not only provide accurately recommendation results, but also yield higher
diversity and novelty in recommendations by accurately recommending unpopular
objects.
|
1402.5859 | Huanguo Zhang | Huanguo Zhang, Sha Lv, Wei Li and Xun Qu | A Novel Face Recognition Method using Nearest Line Projection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Face recognition is a popular application of pat- tern recognition methods,
and it faces challenging problems including illumination, expression, and pose.
The most popular way is to learn the subspaces of the face images so that it
could be project to another discriminant space where images of different
persons can be separated. In this paper, a nearest line projection algorithm is
developed to represent the face images for face recognition. Instead of
projecting an image to its nearest image, we try to project it to its nearest
line spanned by two different face images. The subspaces are learned so that
each face image to its nearest line is minimized. We evaluated the proposed
algorithm on some benchmark face image database, and also compared it to some
other image projection algorithms. The experiment results showed that the
proposed algorithm outperforms other ones.
| [
{
"version": "v1",
"created": "Mon, 24 Feb 2014 15:36:32 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Zhang",
"Huanguo",
""
],
[
"Lv",
"Sha",
""
],
[
"Li",
"Wei",
""
],
[
"Qu",
"Xun",
""
]
] | TITLE: A Novel Face Recognition Method using Nearest Line Projection
ABSTRACT: Face recognition is a popular application of pat- tern recognition methods,
and it faces challenging problems including illumination, expression, and pose.
The most popular way is to learn the subspaces of the face images so that it
could be project to another discriminant space where images of different
persons can be separated. In this paper, a nearest line projection algorithm is
developed to represent the face images for face recognition. Instead of
projecting an image to its nearest image, we try to project it to its nearest
line spanned by two different face images. The subspaces are learned so that
each face image to its nearest line is minimized. We evaluated the proposed
algorithm on some benchmark face image database, and also compared it to some
other image projection algorithms. The experiment results showed that the
proposed algorithm outperforms other ones.
|
1402.5923 | Tatiana Tommasi | Tatiana Tommasi, Tinne Tuytelaars, Barbara Caputo | A Testbed for Cross-Dataset Analysis | null | null | null | December 2013, Technical Report: KUL/ESAT/PSI/1304 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since its beginning visual recognition research has tried to capture the huge
variability of the visual world in several image collections. The number of
available datasets is still progressively growing together with the amount of
samples per object category. However, this trend does not correspond directly
to an increasing in the generalization capabilities of the developed
recognition systems. Each collection tends to have its specific characteristics
and to cover just some aspects of the visual world: these biases often narrow
the effect of the methods defined and tested separately over each image set.
Our work makes a first step towards the analysis of the dataset bias problem on
a large scale. We organize twelve existing databases in a unique corpus and we
present the visual community with a useful feature repository for future
research.
| [
{
"version": "v1",
"created": "Mon, 24 Feb 2014 19:25:17 GMT"
}
] | 2014-02-25T00:00:00 | [
[
"Tommasi",
"Tatiana",
""
],
[
"Tuytelaars",
"Tinne",
""
],
[
"Caputo",
"Barbara",
""
]
] | TITLE: A Testbed for Cross-Dataset Analysis
ABSTRACT: Since its beginning visual recognition research has tried to capture the huge
variability of the visual world in several image collections. The number of
available datasets is still progressively growing together with the amount of
samples per object category. However, this trend does not correspond directly
to an increasing in the generalization capabilities of the developed
recognition systems. Each collection tends to have its specific characteristics
and to cover just some aspects of the visual world: these biases often narrow
the effect of the methods defined and tested separately over each image set.
Our work makes a first step towards the analysis of the dataset bias problem on
a large scale. We organize twelve existing databases in a unique corpus and we
present the visual community with a useful feature repository for future
research.
|
1402.5194 | Rui Han | Rui Han, Xiaoyi Lu | On Big Data Benchmarking | 7 pages, 4 figures, 2 tables, accepted in BPOE-04
(http://prof.ict.ac.cn/bpoe_4_asplos/) | null | null | null | cs.PF cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Big data systems address the challenges of capturing, storing, managing,
analyzing, and visualizing big data. Within this context, developing benchmarks
to evaluate and compare big data systems has become an active topic for both
research and industry communities. To date, most of the state-of-the-art big
data benchmarks are designed for specific types of systems. Based on our
experience, however, we argue that considering the complexity, diversity, and
rapid evolution of big data systems, for the sake of fairness, big data
benchmarks must include diversity of data and workloads. Given this motivation,
in this paper, we first propose the key requirements and challenges in
developing big data benchmarks from the perspectives of generating data with 4V
properties (i.e. volume, velocity, variety and veracity) of big data, as well
as generating tests with comprehensive workloads for big data systems. We then
present the methodology on big data benchmarking designed to address these
challenges. Next, the state-of-the-art are summarized and compared, following
by our vision for future research directions.
| [
{
"version": "v1",
"created": "Fri, 21 Feb 2014 03:03:16 GMT"
}
] | 2014-02-24T00:00:00 | [
[
"Han",
"Rui",
""
],
[
"Lu",
"Xiaoyi",
""
]
] | TITLE: On Big Data Benchmarking
ABSTRACT: Big data systems address the challenges of capturing, storing, managing,
analyzing, and visualizing big data. Within this context, developing benchmarks
to evaluate and compare big data systems has become an active topic for both
research and industry communities. To date, most of the state-of-the-art big
data benchmarks are designed for specific types of systems. Based on our
experience, however, we argue that considering the complexity, diversity, and
rapid evolution of big data systems, for the sake of fairness, big data
benchmarks must include diversity of data and workloads. Given this motivation,
in this paper, we first propose the key requirements and challenges in
developing big data benchmarks from the perspectives of generating data with 4V
properties (i.e. volume, velocity, variety and veracity) of big data, as well
as generating tests with comprehensive workloads for big data systems. We then
present the methodology on big data benchmarking designed to address these
challenges. Next, the state-of-the-art are summarized and compared, following
by our vision for future research directions.
|
1402.5255 | Christian von der Weth | Christian von der Weth, Manfred Hauswirth | Analysing Parallel and Passive Web Browsing Behavior and its Effects on
Website Metrics | 22 pages, 11 figures, 3 tables, 29 references. arXiv admin note: text
overlap with arXiv:1307.1542 | null | null | null | cs.HC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Getting deeper insights into the online browsing behavior of Web users has
been a major research topic since the advent of the WWW. It provides useful
information to optimize website design, Web browser design, search engines
offerings, and online advertisement. We argue that new technologies and new
services continue to have significant effects on the way how people browse the
Web. For example, listening to music clips on YouTube or to a radio station on
Last.fm does not require users to sit in front of their computer. Social media
and networking sites like Facebook or micro-blogging sites like Twitter have
attracted new types of users that previously were less inclined to go online.
These changes in how people browse the Web feature new characteristics which
are not well understood so far. In this paper, we provide novel and unique
insights by presenting first results of DOBBS, our long-term effort to create a
comprehensive and representative dataset capturing online user behavior. We
firstly investigate the concepts of parallel browsing and passive browsing,
showing that browsing the Web is no longer a dedicated task for many users.
Based on these results, we then analyze their impact on the calculation of a
user's dwell time -- i.e., the time the user spends on a webpage -- which has
become an important metric to quantify the popularity of websites.
| [
{
"version": "v1",
"created": "Fri, 21 Feb 2014 11:15:02 GMT"
}
] | 2014-02-24T00:00:00 | [
[
"von der Weth",
"Christian",
""
],
[
"Hauswirth",
"Manfred",
""
]
] | TITLE: Analysing Parallel and Passive Web Browsing Behavior and its Effects on
Website Metrics
ABSTRACT: Getting deeper insights into the online browsing behavior of Web users has
been a major research topic since the advent of the WWW. It provides useful
information to optimize website design, Web browser design, search engines
offerings, and online advertisement. We argue that new technologies and new
services continue to have significant effects on the way how people browse the
Web. For example, listening to music clips on YouTube or to a radio station on
Last.fm does not require users to sit in front of their computer. Social media
and networking sites like Facebook or micro-blogging sites like Twitter have
attracted new types of users that previously were less inclined to go online.
These changes in how people browse the Web feature new characteristics which
are not well understood so far. In this paper, we provide novel and unique
insights by presenting first results of DOBBS, our long-term effort to create a
comprehensive and representative dataset capturing online user behavior. We
firstly investigate the concepts of parallel browsing and passive browsing,
showing that browsing the Web is no longer a dedicated task for many users.
Based on these results, we then analyze their impact on the calculation of a
user's dwell time -- i.e., the time the user spends on a webpage -- which has
become an important metric to quantify the popularity of websites.
|
1402.5360 | Chanabasayya Vastrad M | Doreswamy, Chanabasayya M. Vastrad | Important Molecular Descriptors Selection Using Self Tuned Reweighted
Sampling Method for Prediction of Antituberculosis Activity | published 2013 | null | null | null | cs.LG stat.AP stat.ML | http://creativecommons.org/licenses/by/3.0/ | In this paper, a new descriptor selection method for selecting an optimal
combination of important descriptors of sulfonamide derivatives data, named
self tuned reweighted sampling (STRS), is developed. descriptors are defined as
the descriptors with large absolute coefficients in a multivariate linear
regression model such as partial least squares(PLS). In this study, the
absolute values of regression coefficients of PLS model are used as an index
for evaluating the importance of each descriptor Then, based on the importance
level of each descriptor, STRS sequentially selects N subsets of descriptors
from N Monte Carlo (MC) sampling runs in an iterative and competitive manner.
In each sampling run, a fixed ratio (e.g. 80%) of samples is first randomly
selected to establish a regresson model. Next, based on the regression
coefficients, a two-step procedure including rapidly decreasing function (RDF)
based enforced descriptor selection and self tuned sampling (STS) based
competitive descriptor selection is adopted to select the important
descriptorss. After running the loops, a number of subsets of descriptors are
obtained and root mean squared error of cross validation (RMSECV) of PLS models
established with subsets of descriptors is computed. The subset of descriptors
with the lowest RMSECV is considered as the optimal descriptor subset. The
performance of the proposed algorithm is evaluated by sulfanomide derivative
dataset. The results reveal an good characteristic of STRS that it can usually
locate an optimal combination of some important descriptors which are
interpretable to the biologically of interest. Additionally, our study shows
that better prediction is obtained by STRS when compared to full descriptor set
PLS modeling, Monte Carlo uninformative variable elimination (MC-UVE).
| [
{
"version": "v1",
"created": "Fri, 21 Feb 2014 17:24:53 GMT"
}
] | 2014-02-24T00:00:00 | [
[
"Doreswamy",
"",
""
],
[
"Vastrad",
"Chanabasayya M.",
""
]
] | TITLE: Important Molecular Descriptors Selection Using Self Tuned Reweighted
Sampling Method for Prediction of Antituberculosis Activity
ABSTRACT: In this paper, a new descriptor selection method for selecting an optimal
combination of important descriptors of sulfonamide derivatives data, named
self tuned reweighted sampling (STRS), is developed. descriptors are defined as
the descriptors with large absolute coefficients in a multivariate linear
regression model such as partial least squares(PLS). In this study, the
absolute values of regression coefficients of PLS model are used as an index
for evaluating the importance of each descriptor Then, based on the importance
level of each descriptor, STRS sequentially selects N subsets of descriptors
from N Monte Carlo (MC) sampling runs in an iterative and competitive manner.
In each sampling run, a fixed ratio (e.g. 80%) of samples is first randomly
selected to establish a regresson model. Next, based on the regression
coefficients, a two-step procedure including rapidly decreasing function (RDF)
based enforced descriptor selection and self tuned sampling (STS) based
competitive descriptor selection is adopted to select the important
descriptorss. After running the loops, a number of subsets of descriptors are
obtained and root mean squared error of cross validation (RMSECV) of PLS models
established with subsets of descriptors is computed. The subset of descriptors
with the lowest RMSECV is considered as the optimal descriptor subset. The
performance of the proposed algorithm is evaluated by sulfanomide derivative
dataset. The results reveal an good characteristic of STRS that it can usually
locate an optimal combination of some important descriptors which are
interpretable to the biologically of interest. Additionally, our study shows
that better prediction is obtained by STRS when compared to full descriptor set
PLS modeling, Monte Carlo uninformative variable elimination (MC-UVE).
|
1310.4945 | Xiangrong Zeng | Xiangrong Zeng and M\'ario A. T. Figueiredo | A novel sparsity and clustering regularization | null | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel SPARsity and Clustering (SPARC) regularizer, which is a
modified version of the previous octagonal shrinkage and clustering algorithm
for regression (OSCAR), where, the proposed regularizer consists of a
$K$-sparse constraint and a pair-wise $\ell_{\infty}$ norm restricted on the
$K$ largest components in magnitude. The proposed regularizer is able to
separably enforce $K$-sparsity and encourage the non-zeros to be equal in
magnitude. Moreover, it can accurately group the features without shrinking
their magnitude. In fact, SPARC is closely related to OSCAR, so that the
proximity operator of the former can be efficiently computed based on that of
the latter, allowing using proximal splitting algorithms to solve problems with
SPARC regularization. Experiments on synthetic data and with benchmark breast
cancer data show that SPARC is a competitive group-sparsity inducing
regularizer for regression and classification.
| [
{
"version": "v1",
"created": "Fri, 18 Oct 2013 08:31:54 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Feb 2014 16:41:40 GMT"
}
] | 2014-02-21T00:00:00 | [
[
"Zeng",
"Xiangrong",
""
],
[
"Figueiredo",
"Mário A. T.",
""
]
] | TITLE: A novel sparsity and clustering regularization
ABSTRACT: We propose a novel SPARsity and Clustering (SPARC) regularizer, which is a
modified version of the previous octagonal shrinkage and clustering algorithm
for regression (OSCAR), where, the proposed regularizer consists of a
$K$-sparse constraint and a pair-wise $\ell_{\infty}$ norm restricted on the
$K$ largest components in magnitude. The proposed regularizer is able to
separably enforce $K$-sparsity and encourage the non-zeros to be equal in
magnitude. Moreover, it can accurately group the features without shrinking
their magnitude. In fact, SPARC is closely related to OSCAR, so that the
proximity operator of the former can be efficiently computed based on that of
the latter, allowing using proximal splitting algorithms to solve problems with
SPARC regularization. Experiments on synthetic data and with benchmark breast
cancer data show that SPARC is a competitive group-sparsity inducing
regularizer for regression and classification.
|
1312.6116 | Jost Tobias Springenberg | Jost Tobias Springenberg, Martin Riedmiller | Improving Deep Neural Networks with Probabilistic Maxout Units | null | null | null | null | stat.ML cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a probabilistic variant of the recently introduced maxout unit.
The success of deep neural networks utilizing maxout can partly be attributed
to favorable performance under dropout, when compared to rectified linear
units. It however also depends on the fact that each maxout unit performs a
pooling operation over a group of linear transformations and is thus partially
invariant to changes in its input. Starting from this observation we ask the
question: Can the desirable properties of maxout units be preserved while
improving their invariance properties ? We argue that our probabilistic maxout
(probout) units successfully achieve this balance. We quantitatively verify
this claim and report classification performance matching or exceeding the
current state of the art on three challenging image classification benchmarks
(CIFAR-10, CIFAR-100 and SVHN).
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 20:59:15 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Feb 2014 11:13:48 GMT"
}
] | 2014-02-20T00:00:00 | [
[
"Springenberg",
"Jost Tobias",
""
],
[
"Riedmiller",
"Martin",
""
]
] | TITLE: Improving Deep Neural Networks with Probabilistic Maxout Units
ABSTRACT: We present a probabilistic variant of the recently introduced maxout unit.
The success of deep neural networks utilizing maxout can partly be attributed
to favorable performance under dropout, when compared to rectified linear
units. It however also depends on the fact that each maxout unit performs a
pooling operation over a group of linear transformations and is thus partially
invariant to changes in its input. Starting from this observation we ask the
question: Can the desirable properties of maxout units be preserved while
improving their invariance properties ? We argue that our probabilistic maxout
(probout) units successfully achieve this balance. We quantitatively verify
this claim and report classification performance matching or exceeding the
current state of the art on three challenging image classification benchmarks
(CIFAR-10, CIFAR-100 and SVHN).
|
1312.6199 | Joan Bruna | Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna,
Dumitru Erhan, Ian Goodfellow, Rob Fergus | Intriguing properties of neural networks | null | null | null | null | cs.CV cs.LG cs.NE | http://creativecommons.org/licenses/by/3.0/ | Deep neural networks are highly expressive models that have recently achieved
state of the art performance on speech and visual recognition tasks. While
their expressiveness is the reason they succeed, it also causes them to learn
uninterpretable solutions that could have counter-intuitive properties. In this
paper we report two such properties.
First, we find that there is no distinction between individual high level
units and random linear combinations of high level units, according to various
methods of unit analysis. It suggests that it is the space, rather than the
individual units, that contains of the semantic information in the high layers
of neural networks.
Second, we find that deep neural networks learn input-output mappings that
are fairly discontinuous to a significant extend. We can cause the network to
misclassify an image by applying a certain imperceptible perturbation, which is
found by maximizing the network's prediction error. In addition, the specific
nature of these perturbations is not a random artifact of learning: the same
perturbation can cause a different network, that was trained on a different
subset of the dataset, to misclassify the same input.
| [
{
"version": "v1",
"created": "Sat, 21 Dec 2013 03:36:08 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Jan 2014 04:37:34 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Feb 2014 17:40:08 GMT"
},
{
"version": "v4",
"created": "Wed, 19 Feb 2014 16:33:14 GMT"
}
] | 2014-02-20T00:00:00 | [
[
"Szegedy",
"Christian",
""
],
[
"Zaremba",
"Wojciech",
""
],
[
"Sutskever",
"Ilya",
""
],
[
"Bruna",
"Joan",
""
],
[
"Erhan",
"Dumitru",
""
],
[
"Goodfellow",
"Ian",
""
],
[
"Fergus",
"Rob",
""
]
] | TITLE: Intriguing properties of neural networks
ABSTRACT: Deep neural networks are highly expressive models that have recently achieved
state of the art performance on speech and visual recognition tasks. While
their expressiveness is the reason they succeed, it also causes them to learn
uninterpretable solutions that could have counter-intuitive properties. In this
paper we report two such properties.
First, we find that there is no distinction between individual high level
units and random linear combinations of high level units, according to various
methods of unit analysis. It suggests that it is the space, rather than the
individual units, that contains of the semantic information in the high layers
of neural networks.
Second, we find that deep neural networks learn input-output mappings that
are fairly discontinuous to a significant extend. We can cause the network to
misclassify an image by applying a certain imperceptible perturbation, which is
found by maximizing the network's prediction error. In addition, the specific
nature of these perturbations is not a random artifact of learning: the same
perturbation can cause a different network, that was trained on a different
subset of the dataset, to misclassify the same input.
|
1402.4542 | Chunguo Li | Chun-Guo Li, Xing Mei, Bao-Gang Hu | Unsupervised Ranking of Multi-Attribute Objects Based on Principal
Curves | This paper has 14 pages and 9 figures. The paper has submitted to
IEEE Transactions on Knowledge and Data Engineering (TKDE) | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unsupervised ranking faces one critical challenge in evaluation applications,
that is, no ground truth is available. When PageRank and its variants show a
good solution in related subjects, they are applicable only for ranking from
link-structure data. In this work, we focus on unsupervised ranking from
multi-attribute data which is also common in evaluation tasks. To overcome the
challenge, we propose five essential meta-rules for the design and assessment
of unsupervised ranking approaches: scale and translation invariance, strict
monotonicity, linear/nonlinear capacities, smoothness, and explicitness of
parameter size. These meta-rules are regarded as high level knowledge for
unsupervised ranking tasks. Inspired by the works in [8] and [14], we propose a
ranking principal curve (RPC) model, which learns a one-dimensional manifold
function to perform unsupervised ranking tasks on multi-attribute observations.
Furthermore, the RPC is modeled to be a cubic B\'ezier curve with control
points restricted in the interior of a hypercube, thereby complying with all
the five meta-rules to infer a reasonable ranking list. With control points as
the model parameters, one is able to understand the learned manifold and to
interpret the ranking list semantically. Numerical experiments of the presented
RPC model are conducted on two open datasets of different ranking applications.
In comparison with the state-of-the-art approaches, the new model is able to
show more reasonable ranking lists.
| [
{
"version": "v1",
"created": "Wed, 19 Feb 2014 01:29:14 GMT"
}
] | 2014-02-20T00:00:00 | [
[
"Li",
"Chun-Guo",
""
],
[
"Mei",
"Xing",
""
],
[
"Hu",
"Bao-Gang",
""
]
] | TITLE: Unsupervised Ranking of Multi-Attribute Objects Based on Principal
Curves
ABSTRACT: Unsupervised ranking faces one critical challenge in evaluation applications,
that is, no ground truth is available. When PageRank and its variants show a
good solution in related subjects, they are applicable only for ranking from
link-structure data. In this work, we focus on unsupervised ranking from
multi-attribute data which is also common in evaluation tasks. To overcome the
challenge, we propose five essential meta-rules for the design and assessment
of unsupervised ranking approaches: scale and translation invariance, strict
monotonicity, linear/nonlinear capacities, smoothness, and explicitness of
parameter size. These meta-rules are regarded as high level knowledge for
unsupervised ranking tasks. Inspired by the works in [8] and [14], we propose a
ranking principal curve (RPC) model, which learns a one-dimensional manifold
function to perform unsupervised ranking tasks on multi-attribute observations.
Furthermore, the RPC is modeled to be a cubic B\'ezier curve with control
points restricted in the interior of a hypercube, thereby complying with all
the five meta-rules to infer a reasonable ranking list. With control points as
the model parameters, one is able to understand the learned manifold and to
interpret the ranking list semantically. Numerical experiments of the presented
RPC model are conducted on two open datasets of different ranking applications.
In comparison with the state-of-the-art approaches, the new model is able to
show more reasonable ranking lists.
|
1402.4624 | Aleksandr Aravkin | Aleksandr Y. Aravkin and Anju Kambadur and Aurelie C. Lozano and Ronny
Luss | Sparse Quantile Huber Regression for Efficient and Robust Estimation | 9 pages | null | null | null | stat.ML cs.DS math.OC stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider new formulations and methods for sparse quantile regression in
the high-dimensional setting. Quantile regression plays an important role in
many applications, including outlier-robust exploratory analysis in gene
selection. In addition, the sparsity consideration in quantile regression
enables the exploration of the entire conditional distribution of the response
variable given the predictors and therefore yields a more comprehensive view of
the important predictors. We propose a generalized OMP algorithm for variable
selection, taking the misfit loss to be either the traditional quantile loss or
a smooth version we call quantile Huber, and compare the resulting greedy
approaches with convex sparsity-regularized formulations. We apply a recently
proposed interior point methodology to efficiently solve all convex
formulations as well as convex subproblems in the generalized OMP setting, pro-
vide theoretical guarantees of consistent estimation, and demonstrate the
performance of our approach using empirical studies of simulated and genomic
datasets.
| [
{
"version": "v1",
"created": "Wed, 19 Feb 2014 11:18:32 GMT"
}
] | 2014-02-20T00:00:00 | [
[
"Aravkin",
"Aleksandr Y.",
""
],
[
"Kambadur",
"Anju",
""
],
[
"Lozano",
"Aurelie C.",
""
],
[
"Luss",
"Ronny",
""
]
] | TITLE: Sparse Quantile Huber Regression for Efficient and Robust Estimation
ABSTRACT: We consider new formulations and methods for sparse quantile regression in
the high-dimensional setting. Quantile regression plays an important role in
many applications, including outlier-robust exploratory analysis in gene
selection. In addition, the sparsity consideration in quantile regression
enables the exploration of the entire conditional distribution of the response
variable given the predictors and therefore yields a more comprehensive view of
the important predictors. We propose a generalized OMP algorithm for variable
selection, taking the misfit loss to be either the traditional quantile loss or
a smooth version we call quantile Huber, and compare the resulting greedy
approaches with convex sparsity-regularized formulations. We apply a recently
proposed interior point methodology to efficiently solve all convex
formulations as well as convex subproblems in the generalized OMP setting, pro-
vide theoretical guarantees of consistent estimation, and demonstrate the
performance of our approach using empirical studies of simulated and genomic
datasets.
|
1402.4653 | Sohan Seth | Sohan Seth, John Shawe-Taylor, Samuel Kaski | Retrieval of Experiments by Efficient Estimation of Marginal Likelihood | null | null | null | null | stat.ML cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the task of retrieving relevant experiments given a query
experiment. By experiment, we mean a collection of measurements from a set of
`covariates' and the associated `outcomes'. While similar experiments can be
retrieved by comparing available `annotations', this approach ignores the
valuable information available in the measurements themselves. To incorporate
this information in the retrieval task, we suggest employing a retrieval metric
that utilizes probabilistic models learned from the measurements. We argue that
such a metric is a sensible measure of similarity between two experiments since
it permits inclusion of experiment-specific prior knowledge. However, accurate
models are often not analytical, and one must resort to storing posterior
samples which demands considerable resources. Therefore, we study strategies to
select informative posterior samples to reduce the computational load while
maintaining the retrieval performance. We demonstrate the efficacy of our
approach on simulated data with simple linear regression as the models, and
real world datasets.
| [
{
"version": "v1",
"created": "Wed, 19 Feb 2014 13:21:40 GMT"
}
] | 2014-02-20T00:00:00 | [
[
"Seth",
"Sohan",
""
],
[
"Shawe-Taylor",
"John",
""
],
[
"Kaski",
"Samuel",
""
]
] | TITLE: Retrieval of Experiments by Efficient Estimation of Marginal Likelihood
ABSTRACT: We study the task of retrieving relevant experiments given a query
experiment. By experiment, we mean a collection of measurements from a set of
`covariates' and the associated `outcomes'. While similar experiments can be
retrieved by comparing available `annotations', this approach ignores the
valuable information available in the measurements themselves. To incorporate
this information in the retrieval task, we suggest employing a retrieval metric
that utilizes probabilistic models learned from the measurements. We argue that
such a metric is a sensible measure of similarity between two experiments since
it permits inclusion of experiment-specific prior knowledge. However, accurate
models are often not analytical, and one must resort to storing posterior
samples which demands considerable resources. Therefore, we study strategies to
select informative posterior samples to reduce the computational load while
maintaining the retrieval performance. We demonstrate the efficacy of our
approach on simulated data with simple linear regression as the models, and
real world datasets.
|
1402.4699 | Shujia Liu | Shujia Liu | A Powerful Genetic Algorithm for Traveling Salesman Problem | 5 pages, 1 figure | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a powerful genetic algorithm(GA) to solve the traveling
salesman problem (TSP). To construct a powerful GA, I use edge swapping(ES)
with a local search procedure to determine good combinations of building blocks
of parent solutions for generating even better offspring solutions.
Experimental results on well studied TSP benchmarks demonstrate that the
proposed GA is competitive in finding very high quality solutions on instances
with up to 16,862 cities.
| [
{
"version": "v1",
"created": "Wed, 19 Feb 2014 15:33:35 GMT"
}
] | 2014-02-20T00:00:00 | [
[
"Liu",
"Shujia",
""
]
] | TITLE: A Powerful Genetic Algorithm for Traveling Salesman Problem
ABSTRACT: This paper presents a powerful genetic algorithm(GA) to solve the traveling
salesman problem (TSP). To construct a powerful GA, I use edge swapping(ES)
with a local search procedure to determine good combinations of building blocks
of parent solutions for generating even better offspring solutions.
Experimental results on well studied TSP benchmarks demonstrate that the
proposed GA is competitive in finding very high quality solutions on instances
with up to 16,862 cities.
|
1309.1369 | Aleksandr Aravkin | Aleksandr Y. Aravkin, Anna Choromanska, Tony Jebara, and Dimitri
Kanevsky | Semistochastic Quadratic Bound Methods | 11 pages, 1 figure | null | null | null | stat.ML cs.LG math.NA stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Partition functions arise in a variety of settings, including conditional
random fields, logistic regression, and latent gaussian models. In this paper,
we consider semistochastic quadratic bound (SQB) methods for maximum likelihood
inference based on partition function optimization. Batch methods based on the
quadratic bound were recently proposed for this class of problems, and
performed favorably in comparison to state-of-the-art techniques.
Semistochastic methods fall in between batch algorithms, which use all the
data, and stochastic gradient type methods, which use small random selections
at each iteration. We build semistochastic quadratic bound-based methods, and
prove both global convergence (to a stationary point) under very weak
assumptions, and linear convergence rate under stronger assumptions on the
objective. To make the proposed methods faster and more stable, we consider
inexact subproblem minimization and batch-size selection schemes. The efficacy
of SQB methods is demonstrated via comparison with several state-of-the-art
techniques on commonly used datasets.
| [
{
"version": "v1",
"created": "Thu, 5 Sep 2013 15:12:11 GMT"
},
{
"version": "v2",
"created": "Sat, 21 Dec 2013 02:42:50 GMT"
},
{
"version": "v3",
"created": "Sat, 25 Jan 2014 21:00:34 GMT"
},
{
"version": "v4",
"created": "Mon, 17 Feb 2014 22:18:34 GMT"
}
] | 2014-02-19T00:00:00 | [
[
"Aravkin",
"Aleksandr Y.",
""
],
[
"Choromanska",
"Anna",
""
],
[
"Jebara",
"Tony",
""
],
[
"Kanevsky",
"Dimitri",
""
]
] | TITLE: Semistochastic Quadratic Bound Methods
ABSTRACT: Partition functions arise in a variety of settings, including conditional
random fields, logistic regression, and latent gaussian models. In this paper,
we consider semistochastic quadratic bound (SQB) methods for maximum likelihood
inference based on partition function optimization. Batch methods based on the
quadratic bound were recently proposed for this class of problems, and
performed favorably in comparison to state-of-the-art techniques.
Semistochastic methods fall in between batch algorithms, which use all the
data, and stochastic gradient type methods, which use small random selections
at each iteration. We build semistochastic quadratic bound-based methods, and
prove both global convergence (to a stationary point) under very weak
assumptions, and linear convergence rate under stronger assumptions on the
objective. To make the proposed methods faster and more stable, we consider
inexact subproblem minimization and batch-size selection schemes. The efficacy
of SQB methods is demonstrated via comparison with several state-of-the-art
techniques on commonly used datasets.
|
1309.3797 | Louis M Shekhtman | Louis M. Shekhtman, James P. Bagrow, and Dirk Brockmann | Robustness of skeletons and salient features in networks | null | null | 10.1093/comnet/cnt019 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Real world network datasets often contain a wealth of complex topological
information. In the face of these data, researchers often employ methods to
extract reduced networks containing the most important structures or pathways,
sometimes known as `skeletons' or `backbones'. Numerous such methods have been
developed. Yet data are often noisy or incomplete, with unknown numbers of
missing or spurious links. Relatively little effort has gone into understanding
how salient network extraction methods perform in the face of noisy or
incomplete networks. We study this problem by comparing how the salient
features extracted by two popular methods change when networks are perturbed,
either by deleting nodes or links, or by randomly rewiring links. Our results
indicate that simple, global statistics for skeletons can be accurately
inferred even for noisy and incomplete network data, but it is crucial to have
complete, reliable data to use the exact topologies of skeletons or backbones.
These results also help us understand how skeletons respond to damage to the
network itself, as in an attack scenario.
| [
{
"version": "v1",
"created": "Sun, 15 Sep 2013 20:48:41 GMT"
}
] | 2014-02-19T00:00:00 | [
[
"Shekhtman",
"Louis M.",
""
],
[
"Bagrow",
"James P.",
""
],
[
"Brockmann",
"Dirk",
""
]
] | TITLE: Robustness of skeletons and salient features in networks
ABSTRACT: Real world network datasets often contain a wealth of complex topological
information. In the face of these data, researchers often employ methods to
extract reduced networks containing the most important structures or pathways,
sometimes known as `skeletons' or `backbones'. Numerous such methods have been
developed. Yet data are often noisy or incomplete, with unknown numbers of
missing or spurious links. Relatively little effort has gone into understanding
how salient network extraction methods perform in the face of noisy or
incomplete networks. We study this problem by comparing how the salient
features extracted by two popular methods change when networks are perturbed,
either by deleting nodes or links, or by randomly rewiring links. Our results
indicate that simple, global statistics for skeletons can be accurately
inferred even for noisy and incomplete network data, but it is crucial to have
complete, reliable data to use the exact topologies of skeletons or backbones.
These results also help us understand how skeletons respond to damage to the
network itself, as in an attack scenario.
|
1312.4695 | Wiktor Mlynarski | Wiktor Mlynarski | Sparse, complex-valued representations of natural sounds learned with
phase and amplitude continuity priors | 11 + 7 pages This version includes changes suggested by ICLR 2014
reviewers | null | null | null | cs.LG cs.SD q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex-valued sparse coding is a data representation which employs a
dictionary of two-dimensional subspaces, while imposing a sparse, factorial
prior on complex amplitudes. When trained on a dataset of natural image
patches, it learns phase invariant features which closely resemble receptive
fields of complex cells in the visual cortex. Features trained on natural
sounds however, rarely reveal phase invariance and capture other aspects of the
data. This observation is a starting point of the present work. As its first
contribution, it provides an analysis of natural sound statistics by means of
learning sparse, complex representations of short speech intervals. Secondly,
it proposes priors over the basis function set, which bias them towards
phase-invariant solutions. In this way, a dictionary of complex basis functions
can be learned from the data statistics, while preserving the phase invariance
property. Finally, representations trained on speech sounds with and without
priors are compared. Prior-based basis functions reveal performance comparable
to unconstrained sparse coding, while explicitely representing phase as a
temporal shift. Such representations can find applications in many perceptual
and machine learning tasks.
| [
{
"version": "v1",
"created": "Tue, 17 Dec 2013 09:12:55 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Dec 2013 10:48:17 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Feb 2014 10:20:25 GMT"
}
] | 2014-02-19T00:00:00 | [
[
"Mlynarski",
"Wiktor",
""
]
] | TITLE: Sparse, complex-valued representations of natural sounds learned with
phase and amplitude continuity priors
ABSTRACT: Complex-valued sparse coding is a data representation which employs a
dictionary of two-dimensional subspaces, while imposing a sparse, factorial
prior on complex amplitudes. When trained on a dataset of natural image
patches, it learns phase invariant features which closely resemble receptive
fields of complex cells in the visual cortex. Features trained on natural
sounds however, rarely reveal phase invariance and capture other aspects of the
data. This observation is a starting point of the present work. As its first
contribution, it provides an analysis of natural sound statistics by means of
learning sparse, complex representations of short speech intervals. Secondly,
it proposes priors over the basis function set, which bias them towards
phase-invariant solutions. In this way, a dictionary of complex basis functions
can be learned from the data statistics, while preserving the phase invariance
property. Finally, representations trained on speech sounds with and without
priors are compared. Prior-based basis functions reveal performance comparable
to unconstrained sparse coding, while explicitely representing phase as a
temporal shift. Such representations can find applications in many perceptual
and machine learning tasks.
|
1312.5869 | Dimitrios Athanasakis Mr | Dimitrios Athanasakis, John Shawe-Taylor, Delmiro Fernandez-Reyes | Principled Non-Linear Feature Selection | arXiv admin note: substantial text overlap with arXiv:1311.5636 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent non-linear feature selection approaches employing greedy optimisation
of Centred Kernel Target Alignment(KTA) exhibit strong results in terms of
generalisation accuracy and sparsity. However, they are computationally
prohibitive for large datasets. We propose randSel, a randomised feature
selection algorithm, with attractive scaling properties. Our theoretical
analysis of randSel provides strong probabilistic guarantees for correct
identification of relevant features. RandSel's characteristics make it an ideal
candidate for identifying informative learned representations. We've conducted
experimentation to establish the performance of this approach, and present
encouraging results, including a 3rd position result in the recent ICML black
box learning challenge as well as competitive results for signal peptide
prediction, an important problem in bioinformatics.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 10:16:13 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Feb 2014 17:25:43 GMT"
}
] | 2014-02-19T00:00:00 | [
[
"Athanasakis",
"Dimitrios",
""
],
[
"Shawe-Taylor",
"John",
""
],
[
"Fernandez-Reyes",
"Delmiro",
""
]
] | TITLE: Principled Non-Linear Feature Selection
ABSTRACT: Recent non-linear feature selection approaches employing greedy optimisation
of Centred Kernel Target Alignment(KTA) exhibit strong results in terms of
generalisation accuracy and sparsity. However, they are computationally
prohibitive for large datasets. We propose randSel, a randomised feature
selection algorithm, with attractive scaling properties. Our theoretical
analysis of randSel provides strong probabilistic guarantees for correct
identification of relevant features. RandSel's characteristics make it an ideal
candidate for identifying informative learned representations. We've conducted
experimentation to establish the performance of this approach, and present
encouraging results, including a 3rd position result in the recent ICML black
box learning challenge as well as competitive results for signal peptide
prediction, an important problem in bioinformatics.
|
1402.4293 | Alexander Davies | Alex Davies, Zoubin Ghahramani | The Random Forest Kernel and other kernels for big data from random
partitions | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present Random Partition Kernels, a new class of kernels derived by
demonstrating a natural connection between random partitions of objects and
kernels between those objects. We show how the construction can be used to
create kernels from methods that would not normally be viewed as random
partitions, such as Random Forest. To demonstrate the potential of this method,
we propose two new kernels, the Random Forest Kernel and the Fast Cluster
Kernel, and show that these kernels consistently outperform standard kernels on
problems involving real-world datasets. Finally, we show how the form of these
kernels lend themselves to a natural approximation that is appropriate for
certain big data problems, allowing $O(N)$ inference in methods such as
Gaussian Processes, Support Vector Machines and Kernel PCA.
| [
{
"version": "v1",
"created": "Tue, 18 Feb 2014 11:13:45 GMT"
}
] | 2014-02-19T00:00:00 | [
[
"Davies",
"Alex",
""
],
[
"Ghahramani",
"Zoubin",
""
]
] | TITLE: The Random Forest Kernel and other kernels for big data from random
partitions
ABSTRACT: We present Random Partition Kernels, a new class of kernels derived by
demonstrating a natural connection between random partitions of objects and
kernels between those objects. We show how the construction can be used to
create kernels from methods that would not normally be viewed as random
partitions, such as Random Forest. To demonstrate the potential of this method,
we propose two new kernels, the Random Forest Kernel and the Fast Cluster
Kernel, and show that these kernels consistently outperform standard kernels on
problems involving real-world datasets. Finally, we show how the form of these
kernels lend themselves to a natural approximation that is appropriate for
certain big data problems, allowing $O(N)$ inference in methods such as
Gaussian Processes, Support Vector Machines and Kernel PCA.
|
1402.4388 | Mohammed Javed | Mohammed Javed, P. Nagabhushan, B.B. Chaudhuri | Automatic Detection of Font Size Straight from Run Length Compressed
Text Documents | 8 Pages | (IJCSIT) International Journal of Computer Science and Information
Technologies, Vol. 5 (1) , 2014, 818-825 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatic detection of font size finds many applications in the area of
intelligent OCRing and document image analysis, which has been traditionally
practiced over uncompressed documents, although in real life the documents
exist in compressed form for efficient storage and transmission. It would be
novel and intelligent if the task of font size detection could be carried out
directly from the compressed data of these documents without decompressing,
which would result in saving of considerable amount of processing time and
space. Therefore, in this paper we present a novel idea of learning and
detecting font size directly from run-length compressed text documents at line
level using simple line height features, which paves the way for intelligent
OCRing and document analysis directly from compressed documents. In the
proposed model, the given mixed-case text documents of different font size are
segmented into compressed text lines and the features extracted such as line
height and ascender height are used to capture the pattern of font size in the
form of a regression line, using which the automatic detection of font size is
done during the recognition stage. The method is experimented with a dataset of
50 compressed documents consisting of 780 text lines of single font size and
375 text lines of mixed font size resulting in an overall accuracy of 99.67%.
| [
{
"version": "v1",
"created": "Tue, 18 Feb 2014 16:30:59 GMT"
}
] | 2014-02-19T00:00:00 | [
[
"Javed",
"Mohammed",
""
],
[
"Nagabhushan",
"P.",
""
],
[
"Chaudhuri",
"B. B.",
""
]
] | TITLE: Automatic Detection of Font Size Straight from Run Length Compressed
Text Documents
ABSTRACT: Automatic detection of font size finds many applications in the area of
intelligent OCRing and document image analysis, which has been traditionally
practiced over uncompressed documents, although in real life the documents
exist in compressed form for efficient storage and transmission. It would be
novel and intelligent if the task of font size detection could be carried out
directly from the compressed data of these documents without decompressing,
which would result in saving of considerable amount of processing time and
space. Therefore, in this paper we present a novel idea of learning and
detecting font size directly from run-length compressed text documents at line
level using simple line height features, which paves the way for intelligent
OCRing and document analysis directly from compressed documents. In the
proposed model, the given mixed-case text documents of different font size are
segmented into compressed text lines and the features extracted such as line
height and ascender height are used to capture the pattern of font size in the
form of a regression line, using which the automatic detection of font size is
done during the recognition stage. The method is experimented with a dataset of
50 compressed documents consisting of 780 text lines of single font size and
375 text lines of mixed font size resulting in an overall accuracy of 99.67%.
|
1210.1357 | Bojin Zheng | Jun Qin, Hongrun Wu, Xiaonian Tong, Bojin Zheng | A quantitative method for determining the robustness of complex networks | null | Physica D 2013 253 85--90 | 10.1016/j.physd.2013.03.002 | null | cs.SI nlin.AO physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most current studies estimate the invulnerability of complex networks using a
qualitative method that analyzes the inaccurate decay rate of network
efficiency. This method results in confusion over the invulnerability of
various types of complex networks. By normalizing network efficiency and
defining a baseline, this paper defines the invulnerability index as the
integral of the difference between the normalized network efficiency curve and
the baseline. This quantitative method seeks to establish a benchmark for the
robustness and fragility of networks and to measure network invulnerability
under both edge and node attacks. To validate the reliability of the proposed
method, three small-world networks were selected as test beds. The simulation
results indicate that the proposed invulnerability index can effectively and
accurately quantify network resilience. The index should provide a valuable
reference for determining network invulnerability in future research.
| [
{
"version": "v1",
"created": "Thu, 4 Oct 2012 09:46:26 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Mar 2013 09:33:00 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Qin",
"Jun",
""
],
[
"Wu",
"Hongrun",
""
],
[
"Tong",
"Xiaonian",
""
],
[
"Zheng",
"Bojin",
""
]
] | TITLE: A quantitative method for determining the robustness of complex networks
ABSTRACT: Most current studies estimate the invulnerability of complex networks using a
qualitative method that analyzes the inaccurate decay rate of network
efficiency. This method results in confusion over the invulnerability of
various types of complex networks. By normalizing network efficiency and
defining a baseline, this paper defines the invulnerability index as the
integral of the difference between the normalized network efficiency curve and
the baseline. This quantitative method seeks to establish a benchmark for the
robustness and fragility of networks and to measure network invulnerability
under both edge and node attacks. To validate the reliability of the proposed
method, three small-world networks were selected as test beds. The simulation
results indicate that the proposed invulnerability index can effectively and
accurately quantify network resilience. The index should provide a valuable
reference for determining network invulnerability in future research.
|
1301.3584 | Razvan Pascanu | Razvan Pascanu and Yoshua Bengio | Revisiting Natural Gradient for Deep Networks | null | null | null | null | cs.LG cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We evaluate natural gradient, an algorithm originally proposed in Amari
(1997), for learning deep models. The contributions of this paper are as
follows. We show the connection between natural gradient and three other
recently proposed methods for training deep models: Hessian-Free (Martens,
2010), Krylov Subspace Descent (Vinyals and Povey, 2012) and TONGA (Le Roux et
al., 2008). We describe how one can use unlabeled data to improve the
generalization error obtained by natural gradient and empirically evaluate the
robustness of the algorithm to the ordering of the training set compared to
stochastic gradient descent. Finally we extend natural gradient to incorporate
second order information alongside the manifold information and provide a
benchmark of the new algorithm using a truncated Newton approach for inverting
the metric matrix instead of using a diagonal approximation of it.
| [
{
"version": "v1",
"created": "Wed, 16 Jan 2013 04:47:02 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jan 2013 03:57:04 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Jan 2013 14:59:04 GMT"
},
{
"version": "v4",
"created": "Wed, 13 Mar 2013 19:13:08 GMT"
},
{
"version": "v5",
"created": "Fri, 20 Dec 2013 19:29:42 GMT"
},
{
"version": "v6",
"created": "Tue, 7 Jan 2014 18:11:36 GMT"
},
{
"version": "v7",
"created": "Mon, 17 Feb 2014 16:29:27 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Pascanu",
"Razvan",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Revisiting Natural Gradient for Deep Networks
ABSTRACT: We evaluate natural gradient, an algorithm originally proposed in Amari
(1997), for learning deep models. The contributions of this paper are as
follows. We show the connection between natural gradient and three other
recently proposed methods for training deep models: Hessian-Free (Martens,
2010), Krylov Subspace Descent (Vinyals and Povey, 2012) and TONGA (Le Roux et
al., 2008). We describe how one can use unlabeled data to improve the
generalization error obtained by natural gradient and empirically evaluate the
robustness of the algorithm to the ordering of the training set compared to
stochastic gradient descent. Finally we extend natural gradient to incorporate
second order information alongside the manifold information and provide a
benchmark of the new algorithm using a truncated Newton approach for inverting
the metric matrix instead of using a diagonal approximation of it.
|
1303.5966 | M\'arton Karsai | M\'arton Karsai, Nicola Perra, Alessandro Vespignani | Time varying networks and the weakness of strong ties | 22 pages, 15 figures | Scientific Reports 4, 4001 (2014) | 10.1038/srep04001 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In most social and information systems the activity of agents generates
rapidly evolving time-varying networks. The temporal variation in networks'
connectivity patterns and the ongoing dynamic processes are usually coupled in
ways that still challenge our mathematical or computational modelling. Here we
analyse a mobile call dataset and find a simple statistical law that
characterize the temporal evolution of users' egocentric networks. We encode
this observation in a reinforcement process defining a time-varying network
model that exhibits the emergence of strong and weak ties. We study the effect
of time-varying and heterogeneous interactions on the classic rumour spreading
model in both synthetic, and real-world networks. We observe that strong ties
severely inhibit information diffusion by confining the spreading process among
agents with recurrent communication patterns. This provides the
counterintuitive evidence that strong ties may have a negative role in the
spreading of information across networks.
| [
{
"version": "v1",
"created": "Sun, 24 Mar 2013 16:42:48 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Feb 2014 14:25:55 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Karsai",
"Márton",
""
],
[
"Perra",
"Nicola",
""
],
[
"Vespignani",
"Alessandro",
""
]
] | TITLE: Time varying networks and the weakness of strong ties
ABSTRACT: In most social and information systems the activity of agents generates
rapidly evolving time-varying networks. The temporal variation in networks'
connectivity patterns and the ongoing dynamic processes are usually coupled in
ways that still challenge our mathematical or computational modelling. Here we
analyse a mobile call dataset and find a simple statistical law that
characterize the temporal evolution of users' egocentric networks. We encode
this observation in a reinforcement process defining a time-varying network
model that exhibits the emergence of strong and weak ties. We study the effect
of time-varying and heterogeneous interactions on the classic rumour spreading
model in both synthetic, and real-world networks. We observe that strong ties
severely inhibit information diffusion by confining the spreading process among
agents with recurrent communication patterns. This provides the
counterintuitive evidence that strong ties may have a negative role in the
spreading of information across networks.
|
1312.5242 | Alexey Dosovitskiy | Alexey Dosovitskiy, Jost Tobias Springenberg and Thomas Brox | Unsupervised feature learning by augmenting single images | ICLR 2014 workshop track submission (7 pages, 4 figures, 1 table) | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When deep learning is applied to visual object recognition, data augmentation
is often used to generate additional training data without extra labeling cost.
It helps to reduce overfitting and increase the performance of the algorithm.
In this paper we investigate if it is possible to use data augmentation as the
main component of an unsupervised feature learning architecture. To that end we
sample a set of random image patches and declare each of them to be a separate
single-image surrogate class. We then extend these trivial one-element classes
by applying a variety of transformations to the initial 'seed' patches. Finally
we train a convolutional neural network to discriminate between these surrogate
classes. The feature representation learned by the network can then be used in
various vision tasks. We find that this simple feature learning algorithm is
surprisingly successful, achieving competitive classification results on
several popular vision datasets (STL-10, CIFAR-10, Caltech-101).
| [
{
"version": "v1",
"created": "Wed, 18 Dec 2013 17:44:17 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Jan 2014 18:02:09 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Feb 2014 13:07:23 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Dosovitskiy",
"Alexey",
""
],
[
"Springenberg",
"Jost Tobias",
""
],
[
"Brox",
"Thomas",
""
]
] | TITLE: Unsupervised feature learning by augmenting single images
ABSTRACT: When deep learning is applied to visual object recognition, data augmentation
is often used to generate additional training data without extra labeling cost.
It helps to reduce overfitting and increase the performance of the algorithm.
In this paper we investigate if it is possible to use data augmentation as the
main component of an unsupervised feature learning architecture. To that end we
sample a set of random image patches and declare each of them to be a separate
single-image surrogate class. We then extend these trivial one-element classes
by applying a variety of transformations to the initial 'seed' patches. Finally
we train a convolutional neural network to discriminate between these surrogate
classes. The feature representation learned by the network can then be used in
various vision tasks. We find that this simple feature learning algorithm is
surprisingly successful, achieving competitive classification results on
several popular vision datasets (STL-10, CIFAR-10, Caltech-101).
|
1312.6095 | Bojan Pepikj | Bojan Pepik, Michael Stark, Peter Gehler, Bernt Schiele | Multi-View Priors for Learning Detectors from Sparse Viewpoint Data | 13 pages, 7 figures, 4 tables, International Conference on Learning
Representations 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While the majority of today's object class models provide only 2D bounding
boxes, far richer output hypotheses are desirable including viewpoint,
fine-grained category, and 3D geometry estimate. However, models trained to
provide richer output require larger amounts of training data, preferably well
covering the relevant aspects such as viewpoint and fine-grained categories. In
this paper, we address this issue from the perspective of transfer learning,
and design an object class model that explicitly leverages correlations between
visual features. Specifically, our model represents prior distributions over
permissible multi-view detectors in a parametric way -- the priors are learned
once from training data of a source object class, and can later be used to
facilitate the learning of a detector for a target class. As we show in our
experiments, this transfer is not only beneficial for detectors based on
basic-level category representations, but also enables the robust learning of
detectors that represent classes at finer levels of granularity, where training
data is typically even scarcer and more unbalanced. As a result, we report
largely improved performance in simultaneous 2D object localization and
viewpoint estimation on a recent dataset of challenging street scenes.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 20:12:07 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Feb 2014 10:39:35 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Pepik",
"Bojan",
""
],
[
"Stark",
"Michael",
""
],
[
"Gehler",
"Peter",
""
],
[
"Schiele",
"Bernt",
""
]
] | TITLE: Multi-View Priors for Learning Detectors from Sparse Viewpoint Data
ABSTRACT: While the majority of today's object class models provide only 2D bounding
boxes, far richer output hypotheses are desirable including viewpoint,
fine-grained category, and 3D geometry estimate. However, models trained to
provide richer output require larger amounts of training data, preferably well
covering the relevant aspects such as viewpoint and fine-grained categories. In
this paper, we address this issue from the perspective of transfer learning,
and design an object class model that explicitly leverages correlations between
visual features. Specifically, our model represents prior distributions over
permissible multi-view detectors in a parametric way -- the priors are learned
once from training data of a source object class, and can later be used to
facilitate the learning of a detector for a target class. As we show in our
experiments, this transfer is not only beneficial for detectors based on
basic-level category representations, but also enables the robust learning of
detectors that represent classes at finer levels of granularity, where training
data is typically even scarcer and more unbalanced. As a result, we report
largely improved performance in simultaneous 2D object localization and
viewpoint estimation on a recent dataset of challenging street scenes.
|
1402.3643 | Shayan Oveis Gharan | Mohammad Akbarpour and Shengwu Li and Shayan Oveis Gharan | Dynamic Matching Market Design | null | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a simple benchmark model of dynamic matching in networked
markets, where agents arrive and depart stochastically and the network of
acceptable transactions among agents forms a random graph. We analyze our model
from three perspectives: waiting, optimization, and information. The main
insight of our analysis is that waiting to thicken the market can be
substantially more important than increasing the speed of transactions, and
this is quite robust to the presence of waiting costs. From an optimization
perspective, naive local algorithms, that choose the right time to match agents
but do not exploit global network structure, can perform very close to optimal
algorithms. From an information perspective, algorithms that employ even
partial information on agents' departure times perform substantially better
than those that lack such information. To elicit agents' departure times, we
design an incentive-compatible continuous-time dynamic mechanism without
transfers.
| [
{
"version": "v1",
"created": "Sat, 15 Feb 2014 04:30:41 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Akbarpour",
"Mohammad",
""
],
[
"Li",
"Shengwu",
""
],
[
"Gharan",
"Shayan Oveis",
""
]
] | TITLE: Dynamic Matching Market Design
ABSTRACT: We introduce a simple benchmark model of dynamic matching in networked
markets, where agents arrive and depart stochastically and the network of
acceptable transactions among agents forms a random graph. We analyze our model
from three perspectives: waiting, optimization, and information. The main
insight of our analysis is that waiting to thicken the market can be
substantially more important than increasing the speed of transactions, and
this is quite robust to the presence of waiting costs. From an optimization
perspective, naive local algorithms, that choose the right time to match agents
but do not exploit global network structure, can perform very close to optimal
algorithms. From an information perspective, algorithms that employ even
partial information on agents' departure times perform substantially better
than those that lack such information. To elicit agents' departure times, we
design an incentive-compatible continuous-time dynamic mechanism without
transfers.
|
1402.3689 | Radu Horaud P | Maxime Janvier, Xavier Alameda-Pineda, Laurent Girin and Radu Horaud | Sound Representation and Classification Benchmark for Domestic Robots | 8 pages, 2 figures | null | null | null | cs.SD cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of sound representation and classification and present
results of a comparative study in the context of a domestic robotic scenario. A
dataset of sounds was recorded in realistic conditions (background noise,
presence of several sound sources, reverberations, etc.) using the humanoid
robot NAO. An extended benchmark is carried out to test a variety of
representations combined with several classifiers. We provide results obtained
with the annotated dataset and we assess the methods quantitatively on the
basis of their classification scores, computation times and memory
requirements. The annotated dataset is publicly available at
https://team.inria.fr/perception/nard/.
| [
{
"version": "v1",
"created": "Sat, 15 Feb 2014 13:27:01 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Janvier",
"Maxime",
""
],
[
"Alameda-Pineda",
"Xavier",
""
],
[
"Girin",
"Laurent",
""
],
[
"Horaud",
"Radu",
""
]
] | TITLE: Sound Representation and Classification Benchmark for Domestic Robots
ABSTRACT: We address the problem of sound representation and classification and present
results of a comparative study in the context of a domestic robotic scenario. A
dataset of sounds was recorded in realistic conditions (background noise,
presence of several sound sources, reverberations, etc.) using the humanoid
robot NAO. An extended benchmark is carried out to test a variety of
representations combined with several classifiers. We provide results obtained
with the annotated dataset and we assess the methods quantitatively on the
basis of their classification scores, computation times and memory
requirements. The annotated dataset is publicly available at
https://team.inria.fr/perception/nard/.
|
1402.3821 | Ylies Falcone | Tom Cornebize and Yli\`es Falcone | Efficient and Generalized Decentralized Monitoring of Regular Languages | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main contribution of this paper is an efficient and generalized
decentralized monitoring algorithm allowing to detect satisfaction or violation
of any regular specification by local monitors alone in a system without
central observation point. Our algorithm does not assume any form of
synchronization between system events and communication of monitors, uses state
machines as underlying mechanism for efficiency, and tries to keep the number
and size of messages exchanged between monitors to a minimum. We provide a full
implementation of the algorithm with an open-source benchmark to evaluate its
efficiency in terms of number, size of exchanged messages, and delay induced by
communication between monitors. Experimental results demonstrate the
effectiveness of our algorithm which outperforms the previous most general one
along several (new) monitoring metrics.
| [
{
"version": "v1",
"created": "Sun, 16 Feb 2014 17:49:57 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Cornebize",
"Tom",
""
],
[
"Falcone",
"Yliès",
""
]
] | TITLE: Efficient and Generalized Decentralized Monitoring of Regular Languages
ABSTRACT: The main contribution of this paper is an efficient and generalized
decentralized monitoring algorithm allowing to detect satisfaction or violation
of any regular specification by local monitors alone in a system without
central observation point. Our algorithm does not assume any form of
synchronization between system events and communication of monitors, uses state
machines as underlying mechanism for efficiency, and tries to keep the number
and size of messages exchanged between monitors to a minimum. We provide a full
implementation of the algorithm with an open-source benchmark to evaluate its
efficiency in terms of number, size of exchanged messages, and delay induced by
communication between monitors. Experimental results demonstrate the
effectiveness of our algorithm which outperforms the previous most general one
along several (new) monitoring metrics.
|
1402.3847 | Daniele de Rigo | Claudio Bosco, Daniele de Rigo, Olivier Dewitte and Luca Montanarella | Towards the reproducibility in soil erosion modeling: a new Pan-European
soil erosion map | 9 pages, from a poster presented at the Wageningen Conference on
Applied Soil Science "Soil Science in a Changing World", 18 - 22 September
2011, Wageningen, The Netherlands | null | 10.6084/m9.figshare.936872 | null | cs.SY cs.CE physics.geo-ph | http://creativecommons.org/licenses/by/3.0/ | Soil erosion by water is a widespread phenomenon throughout Europe and has
the potentiality, with his on-site and off-site effects, to affect water
quality, food security and floods. Despite the implementation of numerous and
different models for estimating soil erosion by water in Europe, there is still
a lack of harmonization of assessment methodologies.
Often, different approaches result in soil erosion rates significantly
different. Even when the same model is applied to the same region the results
may differ. This can be due to the way the model is implemented (i.e. with the
selection of different algorithms when available) and/or to the use of datasets
having different resolution or accuracy. Scientific computation is emerging as
one of the central topic of the scientific method, for overcoming these
problems there is thus the necessity to develop reproducible computational
method where codes and data are available.
The present study illustrates this approach. Using only public available
datasets, we applied the Revised Universal Soil loss Equation (RUSLE) to locate
the most sensitive areas to soil erosion by water in Europe.
A significant effort was made for selecting the better simplified equations
to be used when a strict application of the RUSLE model is not possible. In
particular for the computation of the Rainfall Erosivity factor (R) the
reproducible research paradigm was applied. The calculation of the R factor was
implemented using public datasets and the GNU R language. An easily
reproducible validation procedure based on measured precipitation time series
was applied using MATLAB language. Designing the computational modelling
architecture with the aim to ease as much as possible the future reuse of the
model in analysing climate change scenarios is also a challenging goal of the
research.
| [
{
"version": "v1",
"created": "Sun, 16 Feb 2014 22:10:42 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Bosco",
"Claudio",
""
],
[
"de Rigo",
"Daniele",
""
],
[
"Dewitte",
"Olivier",
""
],
[
"Montanarella",
"Luca",
""
]
] | TITLE: Towards the reproducibility in soil erosion modeling: a new Pan-European
soil erosion map
ABSTRACT: Soil erosion by water is a widespread phenomenon throughout Europe and has
the potentiality, with his on-site and off-site effects, to affect water
quality, food security and floods. Despite the implementation of numerous and
different models for estimating soil erosion by water in Europe, there is still
a lack of harmonization of assessment methodologies.
Often, different approaches result in soil erosion rates significantly
different. Even when the same model is applied to the same region the results
may differ. This can be due to the way the model is implemented (i.e. with the
selection of different algorithms when available) and/or to the use of datasets
having different resolution or accuracy. Scientific computation is emerging as
one of the central topic of the scientific method, for overcoming these
problems there is thus the necessity to develop reproducible computational
method where codes and data are available.
The present study illustrates this approach. Using only public available
datasets, we applied the Revised Universal Soil loss Equation (RUSLE) to locate
the most sensitive areas to soil erosion by water in Europe.
A significant effort was made for selecting the better simplified equations
to be used when a strict application of the RUSLE model is not possible. In
particular for the computation of the Rainfall Erosivity factor (R) the
reproducible research paradigm was applied. The calculation of the R factor was
implemented using public datasets and the GNU R language. An easily
reproducible validation procedure based on measured precipitation time series
was applied using MATLAB language. Designing the computational modelling
architecture with the aim to ease as much as possible the future reuse of the
model in analysing climate change scenarios is also a challenging goal of the
research.
|
1402.3926 | Hideitsu Hino | Toshiyuki Kato, Hideitsu Hino, and Noboru Murata | Sparse Coding Approach for Multi-Frame Image Super Resolution | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An image super-resolution method from multiple observation of low-resolution
images is proposed. The method is based on sub-pixel accuracy block matching
for estimating relative displacements of observed images, and sparse signal
representation for estimating the corresponding high-resolution image. Relative
displacements of small patches of observed low-resolution images are accurately
estimated by a computationally efficient block matching method. Since the
estimated displacements are also regarded as a warping component of image
degradation process, the matching results are directly utilized to generate
low-resolution dictionary for sparse image representation. The matching scores
of the block matching are used to select a subset of low-resolution patches for
reconstructing a high-resolution patch, that is, an adaptive selection of
informative low-resolution images is realized. When there is only one
low-resolution image, the proposed method works as a single-frame
super-resolution method. The proposed method is shown to perform comparable or
superior to conventional single- and multi-frame super-resolution methods
through experiments using various real-world datasets.
| [
{
"version": "v1",
"created": "Mon, 17 Feb 2014 08:23:35 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Kato",
"Toshiyuki",
""
],
[
"Hino",
"Hideitsu",
""
],
[
"Murata",
"Noboru",
""
]
] | TITLE: Sparse Coding Approach for Multi-Frame Image Super Resolution
ABSTRACT: An image super-resolution method from multiple observation of low-resolution
images is proposed. The method is based on sub-pixel accuracy block matching
for estimating relative displacements of observed images, and sparse signal
representation for estimating the corresponding high-resolution image. Relative
displacements of small patches of observed low-resolution images are accurately
estimated by a computationally efficient block matching method. Since the
estimated displacements are also regarded as a warping component of image
degradation process, the matching results are directly utilized to generate
low-resolution dictionary for sparse image representation. The matching scores
of the block matching are used to select a subset of low-resolution patches for
reconstructing a high-resolution patch, that is, an adaptive selection of
informative low-resolution images is realized. When there is only one
low-resolution image, the proposed method works as a single-frame
super-resolution method. The proposed method is shown to perform comparable or
superior to conventional single- and multi-frame super-resolution methods
through experiments using various real-world datasets.
|
1402.4033 | Erheng Zhong | Erheng Zhong, Evan Wei Xiang, Wei Fan, Nathan Nan Liu, Qiang Yang | Friendship Prediction in Composite Social Networks | 10 pages | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Friendship prediction is an important task in social network analysis (SNA).
It can help users identify friends and improve their level of activity. Most
previous approaches predict users' friendship based on their historical
records, such as their existing friendship, social interactions, etc. However,
in reality, most users have limited friends in a single network, and the data
can be very sparse. The sparsity problem causes existing methods to overfit the
rare observations and suffer from serious performance degradation. This is
particularly true when a new social network just starts to form. We observe
that many of today's social networks are composite in nature, where people are
often engaged in multiple networks. In addition, users' friendships are always
correlated, for example, they are both friends on Facebook and Google+. Thus,
by considering those overlapping users as the bridge, the friendship knowledge
in other networks can help predict their friendships in the current network.
This can be achieved by exploiting the knowledge in different networks in a
collective manner. However, as each individual network has its own properties
that can be incompatible and inconsistent with other networks, the naive
merging of all networks into a single one may not work well. The proposed
solution is to extract the common behaviors between different networks via a
hierarchical Bayesian model. It captures the common knowledge across networks,
while avoiding negative impacts due to network differences. Empirical studies
demonstrate that the proposed approach improves the mean average precision of
friendship prediction over state-of-the-art baselines on nine real-world social
networking datasets significantly.
| [
{
"version": "v1",
"created": "Mon, 17 Feb 2014 15:36:38 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Zhong",
"Erheng",
""
],
[
"Xiang",
"Evan Wei",
""
],
[
"Fan",
"Wei",
""
],
[
"Liu",
"Nathan Nan",
""
],
[
"Yang",
"Qiang",
""
]
] | TITLE: Friendship Prediction in Composite Social Networks
ABSTRACT: Friendship prediction is an important task in social network analysis (SNA).
It can help users identify friends and improve their level of activity. Most
previous approaches predict users' friendship based on their historical
records, such as their existing friendship, social interactions, etc. However,
in reality, most users have limited friends in a single network, and the data
can be very sparse. The sparsity problem causes existing methods to overfit the
rare observations and suffer from serious performance degradation. This is
particularly true when a new social network just starts to form. We observe
that many of today's social networks are composite in nature, where people are
often engaged in multiple networks. In addition, users' friendships are always
correlated, for example, they are both friends on Facebook and Google+. Thus,
by considering those overlapping users as the bridge, the friendship knowledge
in other networks can help predict their friendships in the current network.
This can be achieved by exploiting the knowledge in different networks in a
collective manner. However, as each individual network has its own properties
that can be incompatible and inconsistent with other networks, the naive
merging of all networks into a single one may not work well. The proposed
solution is to extract the common behaviors between different networks via a
hierarchical Bayesian model. It captures the common knowledge across networks,
while avoiding negative impacts due to network differences. Empirical studies
demonstrate that the proposed approach improves the mean average precision of
friendship prediction over state-of-the-art baselines on nine real-world social
networking datasets significantly.
|
1402.4084 | Edward Moroshko | Edward Moroshko, Koby Crammer | Selective Sampling with Drift | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently there has been much work on selective sampling, an online active
learning setting, in which algorithms work in rounds. On each round an
algorithm receives an input and makes a prediction. Then, it can decide whether
to query a label, and if so to update its model, otherwise the input is
discarded. Most of this work is focused on the stationary case, where it is
assumed that there is a fixed target model, and the performance of the
algorithm is compared to a fixed model. However, in many real-world
applications, such as spam prediction, the best target function may drift over
time, or have shifts from time to time. We develop a novel selective sampling
algorithm for the drifting setting, analyze it under no assumptions on the
mechanism generating the sequence of instances, and derive new mistake bounds
that depend on the amount of drift in the problem. Simulations on synthetic and
real-world datasets demonstrate the superiority of our algorithms as a
selective sampling algorithm in the drifting setting.
| [
{
"version": "v1",
"created": "Mon, 17 Feb 2014 17:53:57 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Moroshko",
"Edward",
""
],
[
"Crammer",
"Koby",
""
]
] | TITLE: Selective Sampling with Drift
ABSTRACT: Recently there has been much work on selective sampling, an online active
learning setting, in which algorithms work in rounds. On each round an
algorithm receives an input and makes a prediction. Then, it can decide whether
to query a label, and if so to update its model, otherwise the input is
discarded. Most of this work is focused on the stationary case, where it is
assumed that there is a fixed target model, and the performance of the
algorithm is compared to a fixed model. However, in many real-world
applications, such as spam prediction, the best target function may drift over
time, or have shifts from time to time. We develop a novel selective sampling
algorithm for the drifting setting, analyze it under no assumptions on the
mechanism generating the sequence of instances, and derive new mistake bounds
that depend on the amount of drift in the problem. Simulations on synthetic and
real-world datasets demonstrate the superiority of our algorithms as a
selective sampling algorithm in the drifting setting.
|
1304.5299 | Anoop Korattikara | Anoop Korattikara, Yutian Chen, Max Welling | Austerity in MCMC Land: Cutting the Metropolis-Hastings Budget | v4 - version accepted by ICML2014 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Can we make Bayesian posterior MCMC sampling more efficient when faced with
very large datasets? We argue that computing the likelihood for N datapoints in
the Metropolis-Hastings (MH) test to reach a single binary decision is
computationally inefficient. We introduce an approximate MH rule based on a
sequential hypothesis test that allows us to accept or reject samples with high
confidence using only a fraction of the data required for the exact MH rule.
While this method introduces an asymptotic bias, we show that this bias can be
controlled and is more than offset by a decrease in variance due to our ability
to draw more samples per unit of time.
| [
{
"version": "v1",
"created": "Fri, 19 Apr 2013 02:51:52 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Apr 2013 21:13:59 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Jul 2013 18:05:53 GMT"
},
{
"version": "v4",
"created": "Fri, 14 Feb 2014 07:42:15 GMT"
}
] | 2014-02-17T00:00:00 | [
[
"Korattikara",
"Anoop",
""
],
[
"Chen",
"Yutian",
""
],
[
"Welling",
"Max",
""
]
] | TITLE: Austerity in MCMC Land: Cutting the Metropolis-Hastings Budget
ABSTRACT: Can we make Bayesian posterior MCMC sampling more efficient when faced with
very large datasets? We argue that computing the likelihood for N datapoints in
the Metropolis-Hastings (MH) test to reach a single binary decision is
computationally inefficient. We introduce an approximate MH rule based on a
sequential hypothesis test that allows us to accept or reject samples with high
confidence using only a fraction of the data required for the exact MH rule.
While this method introduces an asymptotic bias, we show that this bias can be
controlled and is more than offset by a decrease in variance due to our ability
to draw more samples per unit of time.
|
1312.0516 | Vassilis Kekatos | Vassilis Kekatos, Georgios B. Giannakis, Ross Baldick | Grid Topology Identification using Electricity Prices | PES General Meeting 2014 submission | null | null | null | cs.LG cs.SY stat.AP stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The potential of recovering the topology of a grid using solely publicly
available market data is explored here. In contemporary whole-sale electricity
markets, real-time prices are typically determined by solving the
network-constrained economic dispatch problem. Under a linear DC model,
locational marginal prices (LMPs) correspond to the Lagrange multipliers of the
linear program involved. The interesting observation here is that the matrix of
spatiotemporally varying LMPs exhibits the following property: Once
premultiplied by the weighted grid Laplacian, it yields a low-rank and sparse
matrix. Leveraging this rich structure, a regularized maximum likelihood
estimator (MLE) is developed to recover the grid Laplacian from the LMPs. The
convex optimization problem formulated includes low rank- and
sparsity-promoting regularizers, and it is solved using a scalable algorithm.
Numerical tests on prices generated for the IEEE 14-bus benchmark provide
encouraging topology recovery results.
| [
{
"version": "v1",
"created": "Mon, 2 Dec 2013 16:58:10 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Feb 2014 00:35:43 GMT"
}
] | 2014-02-17T00:00:00 | [
[
"Kekatos",
"Vassilis",
""
],
[
"Giannakis",
"Georgios B.",
""
],
[
"Baldick",
"Ross",
""
]
] | TITLE: Grid Topology Identification using Electricity Prices
ABSTRACT: The potential of recovering the topology of a grid using solely publicly
available market data is explored here. In contemporary whole-sale electricity
markets, real-time prices are typically determined by solving the
network-constrained economic dispatch problem. Under a linear DC model,
locational marginal prices (LMPs) correspond to the Lagrange multipliers of the
linear program involved. The interesting observation here is that the matrix of
spatiotemporally varying LMPs exhibits the following property: Once
premultiplied by the weighted grid Laplacian, it yields a low-rank and sparse
matrix. Leveraging this rich structure, a regularized maximum likelihood
estimator (MLE) is developed to recover the grid Laplacian from the LMPs. The
convex optimization problem formulated includes low rank- and
sparsity-promoting regularizers, and it is solved using a scalable algorithm.
Numerical tests on prices generated for the IEEE 14-bus benchmark provide
encouraging topology recovery results.
|
1402.1783 | Jason J Corso | Caiming Xiong, David Johnson, Jason J. Corso | Active Clustering with Model-Based Uncertainty Reduction | 14 pages, 8 figures, submitted to TPAMI (second version just fixes a
missing reference and format) | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semi-supervised clustering seeks to augment traditional clustering methods by
incorporating side information provided via human expertise in order to
increase the semantic meaningfulness of the resulting clusters. However, most
current methods are \emph{passive} in the sense that the side information is
provided beforehand and selected randomly. This may require a large number of
constraints, some of which could be redundant, unnecessary, or even detrimental
to the clustering results. Thus in order to scale such semi-supervised
algorithms to larger problems it is desirable to pursue an \emph{active}
clustering method---i.e. an algorithm that maximizes the effectiveness of the
available human labor by only requesting human input where it will have the
greatest impact. Here, we propose a novel online framework for active
semi-supervised spectral clustering that selects pairwise constraints as
clustering proceeds, based on the principle of uncertainty reduction. Using a
first-order Taylor expansion, we decompose the expected uncertainty reduction
problem into a gradient and a step-scale, computed via an application of matrix
perturbation theory and cluster-assignment entropy, respectively. The resulting
model is used to estimate the uncertainty reduction potential of each sample in
the dataset. We then present the human user with pairwise queries with respect
to only the best candidate sample. We evaluate our method using three different
image datasets (faces, leaves and dogs), a set of common UCI machine learning
datasets and a gene dataset. The results validate our decomposition formulation
and show that our method is consistently superior to existing state-of-the-art
techniques, as well as being robust to noise and to unknown numbers of
clusters.
| [
{
"version": "v1",
"created": "Fri, 7 Feb 2014 22:13:03 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Feb 2014 02:53:32 GMT"
}
] | 2014-02-17T00:00:00 | [
[
"Xiong",
"Caiming",
""
],
[
"Johnson",
"David",
""
],
[
"Corso",
"Jason J.",
""
]
] | TITLE: Active Clustering with Model-Based Uncertainty Reduction
ABSTRACT: Semi-supervised clustering seeks to augment traditional clustering methods by
incorporating side information provided via human expertise in order to
increase the semantic meaningfulness of the resulting clusters. However, most
current methods are \emph{passive} in the sense that the side information is
provided beforehand and selected randomly. This may require a large number of
constraints, some of which could be redundant, unnecessary, or even detrimental
to the clustering results. Thus in order to scale such semi-supervised
algorithms to larger problems it is desirable to pursue an \emph{active}
clustering method---i.e. an algorithm that maximizes the effectiveness of the
available human labor by only requesting human input where it will have the
greatest impact. Here, we propose a novel online framework for active
semi-supervised spectral clustering that selects pairwise constraints as
clustering proceeds, based on the principle of uncertainty reduction. Using a
first-order Taylor expansion, we decompose the expected uncertainty reduction
problem into a gradient and a step-scale, computed via an application of matrix
perturbation theory and cluster-assignment entropy, respectively. The resulting
model is used to estimate the uncertainty reduction potential of each sample in
the dataset. We then present the human user with pairwise queries with respect
to only the best candidate sample. We evaluate our method using three different
image datasets (faces, leaves and dogs), a set of common UCI machine learning
datasets and a gene dataset. The results validate our decomposition formulation
and show that our method is consistently superior to existing state-of-the-art
techniques, as well as being robust to noise and to unknown numbers of
clusters.
|
1402.3371 | Andrea Ballatore | Andrea Ballatore, Michela Bertolotto, David C. Wilson | An evaluative baseline for geo-semantic relatedness and similarity | GeoInformatica 2014 | null | 10.1007/s10707-013-0197-8 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In geographic information science and semantics, the computation of semantic
similarity is widely recognised as key to supporting a vast number of tasks in
information integration and retrieval. By contrast, the role of geo-semantic
relatedness has been largely ignored. In natural language processing, semantic
relatedness is often confused with the more specific semantic similarity. In
this article, we discuss a notion of geo-semantic relatedness based on Lehrer's
semantic fields, and we compare it with geo-semantic similarity. We then
describe and validate the Geo Relatedness and Similarity Dataset (GeReSiD), a
new open dataset designed to evaluate computational measures of geo-semantic
relatedness and similarity. This dataset is larger than existing datasets of
this kind, and includes 97 geographic terms combined into 50 term pairs rated
by 203 human subjects. GeReSiD is available online and can be used as an
evaluation baseline to determine empirically to what degree a given
computational model approximates geo-semantic relatedness and similarity.
| [
{
"version": "v1",
"created": "Fri, 14 Feb 2014 06:06:47 GMT"
}
] | 2014-02-17T00:00:00 | [
[
"Ballatore",
"Andrea",
""
],
[
"Bertolotto",
"Michela",
""
],
[
"Wilson",
"David C.",
""
]
] | TITLE: An evaluative baseline for geo-semantic relatedness and similarity
ABSTRACT: In geographic information science and semantics, the computation of semantic
similarity is widely recognised as key to supporting a vast number of tasks in
information integration and retrieval. By contrast, the role of geo-semantic
relatedness has been largely ignored. In natural language processing, semantic
relatedness is often confused with the more specific semantic similarity. In
this article, we discuss a notion of geo-semantic relatedness based on Lehrer's
semantic fields, and we compare it with geo-semantic similarity. We then
describe and validate the Geo Relatedness and Similarity Dataset (GeReSiD), a
new open dataset designed to evaluate computational measures of geo-semantic
relatedness and similarity. This dataset is larger than existing datasets of
this kind, and includes 97 geographic terms combined into 50 term pairs rated
by 203 human subjects. GeReSiD is available online and can be used as an
evaluation baseline to determine empirically to what degree a given
computational model approximates geo-semantic relatedness and similarity.
|
1402.3447 | Ioannis Caragiannis | Ioannis Caragiannis and Alexandros A. Voudouris | Welfare guarantees for proportional allocations | 15 pages | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | According to the proportional allocation mechanism from the network
optimization literature, users compete for a divisible resource -- such as
bandwidth -- by submitting bids. The mechanism allocates to each user a
fraction of the resource that is proportional to her bid and collects an amount
equal to her bid as payment. Since users act as utility-maximizers, this
naturally defines a proportional allocation game. Recently, Syrgkanis and
Tardos (STOC 2013) quantified the inefficiency of equilibria in this game with
respect to the social welfare and presented a lower bound of 26.8% on the price
of anarchy over coarse-correlated and Bayes-Nash equilibria in the full and
incomplete information settings, respectively. In this paper, we improve this
bound to 50% over both equilibrium concepts. Our analysis is simpler and,
furthermore, we argue that it cannot be improved by arguments that do not take
the equilibrium structure into account. We also extend it to settings with
budget constraints where we show the first constant bound (between 36% and 50%)
on the price of anarchy of the corresponding game with respect to an effective
welfare benchmark that takes budgets into account.
| [
{
"version": "v1",
"created": "Fri, 14 Feb 2014 12:21:14 GMT"
}
] | 2014-02-17T00:00:00 | [
[
"Caragiannis",
"Ioannis",
""
],
[
"Voudouris",
"Alexandros A.",
""
]
] | TITLE: Welfare guarantees for proportional allocations
ABSTRACT: According to the proportional allocation mechanism from the network
optimization literature, users compete for a divisible resource -- such as
bandwidth -- by submitting bids. The mechanism allocates to each user a
fraction of the resource that is proportional to her bid and collects an amount
equal to her bid as payment. Since users act as utility-maximizers, this
naturally defines a proportional allocation game. Recently, Syrgkanis and
Tardos (STOC 2013) quantified the inefficiency of equilibria in this game with
respect to the social welfare and presented a lower bound of 26.8% on the price
of anarchy over coarse-correlated and Bayes-Nash equilibria in the full and
incomplete information settings, respectively. In this paper, we improve this
bound to 50% over both equilibrium concepts. Our analysis is simpler and,
furthermore, we argue that it cannot be improved by arguments that do not take
the equilibrium structure into account. We also extend it to settings with
budget constraints where we show the first constant bound (between 36% and 50%)
on the price of anarchy of the corresponding game with respect to an effective
welfare benchmark that takes budgets into account.
|
1402.3549 | Xiajun Wang | Xiajun Wang, Song Huang, Song Fu and Krishna Kavi | Characterizing Workload of Web Applications on Virtualized Servers | 8 pages, 8 figures, The Fourth Workshop on Big Data Benchmarks,
Performance Optimization, and Emerging Hardware in conjunction with the 19th
ACM International Conference on Architectural Support for Programming
Languages and Operating Systems (ASPLOS-2014), Salt Lake City, Utah, USA,
March 1-5, 2014 | null | null | null | cs.PF cs.DC | http://creativecommons.org/licenses/by/3.0/ | With the ever increasing demands of cloud computing services, planning and
management of cloud resources has become a more and more important issue which
directed affects the resource utilization and SLA and customer satisfaction.
But before any management strategy is made, a good understanding of
applications' workload in virtualized environment is the basic fact and
principle to the resource management methods. Unfortunately, little work has
been focused on this area. Lack of raw data could be one reason; another reason
is that people still use the traditional models or methods shared under
non-virtualized environment. The study of applications' workload in virtualized
environment should take on some of its peculiar features comparing to the
non-virtualized environment. In this paper, we are open to analyze the workload
demands that reflect applications' behavior and the impact of virtualization.
The results are obtained from an experimental cloud testbed running web
applications, specifically the RUBiS benchmark application. We profile the
workload dynamics on both virtualized and non-virtualized environments and
compare the findings. The experimental results are valuable for us to estimate
the performance of applications on computer architectures, to predict SLA
compliance or violation based on the projected application workload and to
guide the decision making to support applications with the right hardware.
| [
{
"version": "v1",
"created": "Fri, 14 Feb 2014 18:51:38 GMT"
}
] | 2014-02-17T00:00:00 | [
[
"Wang",
"Xiajun",
""
],
[
"Huang",
"Song",
""
],
[
"Fu",
"Song",
""
],
[
"Kavi",
"Krishna",
""
]
] | TITLE: Characterizing Workload of Web Applications on Virtualized Servers
ABSTRACT: With the ever increasing demands of cloud computing services, planning and
management of cloud resources has become a more and more important issue which
directed affects the resource utilization and SLA and customer satisfaction.
But before any management strategy is made, a good understanding of
applications' workload in virtualized environment is the basic fact and
principle to the resource management methods. Unfortunately, little work has
been focused on this area. Lack of raw data could be one reason; another reason
is that people still use the traditional models or methods shared under
non-virtualized environment. The study of applications' workload in virtualized
environment should take on some of its peculiar features comparing to the
non-virtualized environment. In this paper, we are open to analyze the workload
demands that reflect applications' behavior and the impact of virtualization.
The results are obtained from an experimental cloud testbed running web
applications, specifically the RUBiS benchmark application. We profile the
workload dynamics on both virtualized and non-virtualized environments and
compare the findings. The experimental results are valuable for us to estimate
the performance of applications on computer architectures, to predict SLA
compliance or violation based on the projected application workload and to
guide the decision making to support applications with the right hardware.
|
1402.2782 | Roland Glantz | Roland Glantz, Henning Meyerhenke, Christian Schulz | Tree-based Coarsening and Partitioning of Complex Networks | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many applications produce massive complex networks whose analysis would
benefit from parallel processing. Parallel algorithms, in turn, often require a
suitable network partition. For solving optimization tasks such as graph
partitioning on large networks, multilevel methods are preferred in practice.
Yet, complex networks pose challenges to established multilevel algorithms, in
particular to their coarsening phase.
One way to specify a (recursive) coarsening of a graph is to rate its edges
and then contract the edges as prioritized by the rating. In this paper we (i)
define weights for the edges of a network that express the edges' importance
for connectivity, (ii) compute a minimum weight spanning tree $T^m$ with
respect to these weights, and (iii) rate the network edges based on the
conductance values of $T^m$'s fundamental cuts. To this end, we also (iv)
develop the first optimal linear-time algorithm to compute the conductance
values of \emph{all} fundamental cuts of a given spanning tree. We integrate
the new edge rating into a leading multilevel graph partitioner and equip the
latter with a new greedy postprocessing for optimizing the maximum
communication volume (MCV). Experiments on bipartitioning frequently used
benchmark networks show that the postprocessing already reduces MCV by 11.3%.
Our new edge rating further reduces MCV by 10.3% compared to the previously
best rating with the postprocessing in place for both ratings. In total, with a
modest increase in running time, our new approach reduces the MCV of complex
network partitions by 20.4%.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2014 10:53:01 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Feb 2014 10:56:20 GMT"
}
] | 2014-02-14T00:00:00 | [
[
"Glantz",
"Roland",
""
],
[
"Meyerhenke",
"Henning",
""
],
[
"Schulz",
"Christian",
""
]
] | TITLE: Tree-based Coarsening and Partitioning of Complex Networks
ABSTRACT: Many applications produce massive complex networks whose analysis would
benefit from parallel processing. Parallel algorithms, in turn, often require a
suitable network partition. For solving optimization tasks such as graph
partitioning on large networks, multilevel methods are preferred in practice.
Yet, complex networks pose challenges to established multilevel algorithms, in
particular to their coarsening phase.
One way to specify a (recursive) coarsening of a graph is to rate its edges
and then contract the edges as prioritized by the rating. In this paper we (i)
define weights for the edges of a network that express the edges' importance
for connectivity, (ii) compute a minimum weight spanning tree $T^m$ with
respect to these weights, and (iii) rate the network edges based on the
conductance values of $T^m$'s fundamental cuts. To this end, we also (iv)
develop the first optimal linear-time algorithm to compute the conductance
values of \emph{all} fundamental cuts of a given spanning tree. We integrate
the new edge rating into a leading multilevel graph partitioner and equip the
latter with a new greedy postprocessing for optimizing the maximum
communication volume (MCV). Experiments on bipartitioning frequently used
benchmark networks show that the postprocessing already reduces MCV by 11.3%.
Our new edge rating further reduces MCV by 10.3% compared to the previously
best rating with the postprocessing in place for both ratings. In total, with a
modest increase in running time, our new approach reduces the MCV of complex
network partitions by 20.4%.
|
1402.3010 | Eray Ozkural | Eray \"Ozkural, Cevdet Aykanat | 1-D and 2-D Parallel Algorithms for All-Pairs Similarity Problem | null | null | null | null | cs.IR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | All-pairs similarity problem asks to find all vector pairs in a set of
vectors the similarities of which surpass a given similarity threshold, and it
is a computational kernel in data mining and information retrieval for several
tasks. We investigate the parallelization of a recent fast sequential
algorithm. We propose effective 1-D and 2-D data distribution strategies that
preserve the essential optimizations in the fast algorithm. 1-D parallel
algorithms distribute either dimensions or vectors, whereas the 2-D parallel
algorithm distributes data both ways. Additional contributions to the 1-D
vertical distribution include a local pruning strategy to reduce the number of
candidates, a recursive pruning algorithm, and block processing to reduce
imbalance. The parallel algorithms were programmed in OCaml which affords much
convenience. Our experiments indicate that the performance depends on the
dataset, therefore a variety of parallelizations is useful.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2014 00:14:33 GMT"
}
] | 2014-02-14T00:00:00 | [
[
"Özkural",
"Eray",
""
],
[
"Aykanat",
"Cevdet",
""
]
] | TITLE: 1-D and 2-D Parallel Algorithms for All-Pairs Similarity Problem
ABSTRACT: All-pairs similarity problem asks to find all vector pairs in a set of
vectors the similarities of which surpass a given similarity threshold, and it
is a computational kernel in data mining and information retrieval for several
tasks. We investigate the parallelization of a recent fast sequential
algorithm. We propose effective 1-D and 2-D data distribution strategies that
preserve the essential optimizations in the fast algorithm. 1-D parallel
algorithms distribute either dimensions or vectors, whereas the 2-D parallel
algorithm distributes data both ways. Additional contributions to the 1-D
vertical distribution include a local pruning strategy to reduce the number of
candidates, a recursive pruning algorithm, and block processing to reduce
imbalance. The parallel algorithms were programmed in OCaml which affords much
convenience. Our experiments indicate that the performance depends on the
dataset, therefore a variety of parallelizations is useful.
|
1402.3261 | Didier Henrion | Jan Heller, Didier Henrion (LAAS, CTU/FEE), Tomas Pajdla | Hand-Eye and Robot-World Calibration by Global Polynomial Optimization | null | null | null | null | cs.CV math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The need to relate measurements made by a camera to a different known
coordinate system arises in many engineering applications. Historically, it
appeared for the first time in the connection with cameras mounted on robotic
systems. This problem is commonly known as hand-eye calibration. In this paper,
we present several formulations of hand-eye calibration that lead to
multivariate polynomial optimization problems. We show that the method of
convex linear matrix inequality (LMI) relaxations can be used to effectively
solve these problems and to obtain globally optimal solutions. Further, we show
that the same approach can be used for the simultaneous hand-eye and
robot-world calibration. Finally, we validate the proposed solutions using both
synthetic and real datasets.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2014 19:17:01 GMT"
}
] | 2014-02-14T00:00:00 | [
[
"Heller",
"Jan",
"",
"LAAS, CTU/FEE"
],
[
"Henrion",
"Didier",
"",
"LAAS, CTU/FEE"
],
[
"Pajdla",
"Tomas",
""
]
] | TITLE: Hand-Eye and Robot-World Calibration by Global Polynomial Optimization
ABSTRACT: The need to relate measurements made by a camera to a different known
coordinate system arises in many engineering applications. Historically, it
appeared for the first time in the connection with cameras mounted on robotic
systems. This problem is commonly known as hand-eye calibration. In this paper,
we present several formulations of hand-eye calibration that lead to
multivariate polynomial optimization problems. We show that the method of
convex linear matrix inequality (LMI) relaxations can be used to effectively
solve these problems and to obtain globally optimal solutions. Further, we show
that the same approach can be used for the simultaneous hand-eye and
robot-world calibration. Finally, we validate the proposed solutions using both
synthetic and real datasets.
|
1210.1766 | Jun Zhu | Jun Zhu, Ning Chen, and Eric P. Xing | Bayesian Inference with Posterior Regularization and applications to
Infinite Latent SVMs | 49 pages, 11 figures | null | null | null | cs.LG cs.AI stat.ME stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing Bayesian models, especially nonparametric Bayesian methods, rely on
specially conceived priors to incorporate domain knowledge for discovering
improved latent representations. While priors can affect posterior
distributions through Bayes' rule, imposing posterior regularization is
arguably more direct and in some cases more natural and general. In this paper,
we present regularized Bayesian inference (RegBayes), a novel computational
framework that performs posterior inference with a regularization term on the
desired post-data posterior distribution under an information theoretical
formulation. RegBayes is more flexible than the procedure that elicits expert
knowledge via priors, and it covers both directed Bayesian networks and
undirected Markov networks whose Bayesian formulation results in hybrid chain
graph models. When the regularization is induced from a linear operator on the
posterior distributions, such as the expectation operator, we present a general
convex-analysis theorem to characterize the solution of RegBayes. Furthermore,
we present two concrete examples of RegBayes, infinite latent support vector
machines (iLSVM) and multi-task infinite latent support vector machines
(MT-iLSVM), which explore the large-margin idea in combination with a
nonparametric Bayesian model for discovering predictive latent features for
classification and multi-task learning, respectively. We present efficient
inference methods and report empirical studies on several benchmark datasets,
which appear to demonstrate the merits inherited from both large-margin
learning and Bayesian nonparametrics. Such results were not available until
now, and contribute to push forward the interface between these two important
subfields, which have been largely treated as isolated in the community.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2012 14:10:20 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Apr 2013 09:33:44 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Feb 2014 06:31:12 GMT"
}
] | 2014-02-13T00:00:00 | [
[
"Zhu",
"Jun",
""
],
[
"Chen",
"Ning",
""
],
[
"Xing",
"Eric P.",
""
]
] | TITLE: Bayesian Inference with Posterior Regularization and applications to
Infinite Latent SVMs
ABSTRACT: Existing Bayesian models, especially nonparametric Bayesian methods, rely on
specially conceived priors to incorporate domain knowledge for discovering
improved latent representations. While priors can affect posterior
distributions through Bayes' rule, imposing posterior regularization is
arguably more direct and in some cases more natural and general. In this paper,
we present regularized Bayesian inference (RegBayes), a novel computational
framework that performs posterior inference with a regularization term on the
desired post-data posterior distribution under an information theoretical
formulation. RegBayes is more flexible than the procedure that elicits expert
knowledge via priors, and it covers both directed Bayesian networks and
undirected Markov networks whose Bayesian formulation results in hybrid chain
graph models. When the regularization is induced from a linear operator on the
posterior distributions, such as the expectation operator, we present a general
convex-analysis theorem to characterize the solution of RegBayes. Furthermore,
we present two concrete examples of RegBayes, infinite latent support vector
machines (iLSVM) and multi-task infinite latent support vector machines
(MT-iLSVM), which explore the large-margin idea in combination with a
nonparametric Bayesian model for discovering predictive latent features for
classification and multi-task learning, respectively. We present efficient
inference methods and report empirical studies on several benchmark datasets,
which appear to demonstrate the merits inherited from both large-margin
learning and Bayesian nonparametrics. Such results were not available until
now, and contribute to push forward the interface between these two important
subfields, which have been largely treated as isolated in the community.
|
1309.7750 | Stefanos Ougiaroglou | Stefanos Ougiaroglou, Georgios Evangelidis, Dimitris A. Dervos | An Extensive Experimental Study on the Cluster-based Reference Set
Reduction for speeding-up the k-NN Classifier | Proceeding of International Conference on Integrated Information
(IC-InInfo 2011), pp. 12-15, Kos island, Greece, 2011 | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The k-Nearest Neighbor (k-NN) classification algorithm is one of the most
widely-used lazy classifiers because of its simplicity and ease of
implementation. It is considered to be an effective classifier and has many
applications. However, its major drawback is that when sequential search is
used to find the neighbors, it involves high computational cost. Speeding-up
k-NN search is still an active research field. Hwang and Cho have recently
proposed an adaptive cluster-based method for fast Nearest Neighbor searching.
The effectiveness of this method is based on the adjustment of three
parameters. However, the authors evaluated their method by setting specific
parameter values and using only one dataset. In this paper, an extensive
experimental study of this method is presented. The results, which are based on
five real life datasets, illustrate that if the parameters of the method are
carefully defined, one can achieve even better classification performance.
| [
{
"version": "v1",
"created": "Mon, 30 Sep 2013 08:24:14 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Feb 2014 22:46:36 GMT"
}
] | 2014-02-13T00:00:00 | [
[
"Ougiaroglou",
"Stefanos",
""
],
[
"Evangelidis",
"Georgios",
""
],
[
"Dervos",
"Dimitris A.",
""
]
] | TITLE: An Extensive Experimental Study on the Cluster-based Reference Set
Reduction for speeding-up the k-NN Classifier
ABSTRACT: The k-Nearest Neighbor (k-NN) classification algorithm is one of the most
widely-used lazy classifiers because of its simplicity and ease of
implementation. It is considered to be an effective classifier and has many
applications. However, its major drawback is that when sequential search is
used to find the neighbors, it involves high computational cost. Speeding-up
k-NN search is still an active research field. Hwang and Cho have recently
proposed an adaptive cluster-based method for fast Nearest Neighbor searching.
The effectiveness of this method is based on the adjustment of three
parameters. However, the authors evaluated their method by setting specific
parameter values and using only one dataset. In this paper, an extensive
experimental study of this method is presented. The results, which are based on
five real life datasets, illustrate that if the parameters of the method are
carefully defined, one can achieve even better classification performance.
|
1402.2807 | Rui Zhou | Rui Zhou, Chengfei Liu, Jeffrey Xu Yu, Weifa Liang and Yanchun Zhang | Efficient Truss Maintenance in Evolving Networks | null | null | null | null | cs.DB cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Truss was proposed to study social network data represented by graphs. A
k-truss of a graph is a cohesive subgraph, in which each edge is contained in
at least k-2 triangles within the subgraph. While truss has been demonstrated
as superior to model the close relationship in social networks and efficient
algorithms for finding trusses have been extensively studied, very little
attention has been paid to truss maintenance. However, most social networks are
evolving networks. It may be infeasible to recompute trusses from scratch from
time to time in order to find the up-to-date $k$-trusses in the evolving
networks. In this paper, we discuss how to maintain trusses in a graph with
dynamic updates. We first discuss a set of properties on maintaining trusses,
then propose algorithms on maintaining trusses on edge deletions and
insertions, finally, we discuss truss index maintenance. We test the proposed
techniques on real datasets. The experiment results show the promise of our
work.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2014 12:57:06 GMT"
}
] | 2014-02-13T00:00:00 | [
[
"Zhou",
"Rui",
""
],
[
"Liu",
"Chengfei",
""
],
[
"Yu",
"Jeffrey Xu",
""
],
[
"Liang",
"Weifa",
""
],
[
"Zhang",
"Yanchun",
""
]
] | TITLE: Efficient Truss Maintenance in Evolving Networks
ABSTRACT: Truss was proposed to study social network data represented by graphs. A
k-truss of a graph is a cohesive subgraph, in which each edge is contained in
at least k-2 triangles within the subgraph. While truss has been demonstrated
as superior to model the close relationship in social networks and efficient
algorithms for finding trusses have been extensively studied, very little
attention has been paid to truss maintenance. However, most social networks are
evolving networks. It may be infeasible to recompute trusses from scratch from
time to time in order to find the up-to-date $k$-trusses in the evolving
networks. In this paper, we discuss how to maintain trusses in a graph with
dynamic updates. We first discuss a set of properties on maintaining trusses,
then propose algorithms on maintaining trusses on edge deletions and
insertions, finally, we discuss truss index maintenance. We test the proposed
techniques on real datasets. The experiment results show the promise of our
work.
|
1402.2826 | Aniket Bera | Aniket Bera and Dinesh Manocha | Realtime Multilevel Crowd Tracking using Reciprocal Velocity Obstacles | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel, realtime algorithm to compute the trajectory of each
pedestrian in moderately dense crowd scenes. Our formulation is based on an
adaptive particle filtering scheme that uses a multi-agent motion model based
on velocity-obstacles, and takes into account local interactions as well as
physical and personal constraints of each pedestrian. Our method dynamically
changes the number of particles allocated to each pedestrian based on different
confidence metrics. Additionally, we use a new high-definition crowd video
dataset, which is used to evaluate the performance of different pedestrian
tracking algorithms. This dataset consists of videos of indoor and outdoor
scenes, recorded at different locations with 30-80 pedestrians. We highlight
the performance benefits of our algorithm over prior techniques using this
dataset. In practice, our algorithm can compute trajectories of tens of
pedestrians on a multi-core desktop CPU at interactive rates (27-30 frames per
second). To the best of our knowledge, our approach is 4-5 times faster than
prior methods, which provide similar accuracy.
| [
{
"version": "v1",
"created": "Tue, 11 Feb 2014 15:49:53 GMT"
}
] | 2014-02-13T00:00:00 | [
[
"Bera",
"Aniket",
""
],
[
"Manocha",
"Dinesh",
""
]
] | TITLE: Realtime Multilevel Crowd Tracking using Reciprocal Velocity Obstacles
ABSTRACT: We present a novel, realtime algorithm to compute the trajectory of each
pedestrian in moderately dense crowd scenes. Our formulation is based on an
adaptive particle filtering scheme that uses a multi-agent motion model based
on velocity-obstacles, and takes into account local interactions as well as
physical and personal constraints of each pedestrian. Our method dynamically
changes the number of particles allocated to each pedestrian based on different
confidence metrics. Additionally, we use a new high-definition crowd video
dataset, which is used to evaluate the performance of different pedestrian
tracking algorithms. This dataset consists of videos of indoor and outdoor
scenes, recorded at different locations with 30-80 pedestrians. We highlight
the performance benefits of our algorithm over prior techniques using this
dataset. In practice, our algorithm can compute trajectories of tens of
pedestrians on a multi-core desktop CPU at interactive rates (27-30 frames per
second). To the best of our knowledge, our approach is 4-5 times faster than
prior methods, which provide similar accuracy.
|
1402.2899 | Bei Yu | Duo Ding and Bei Yu and David Z. Pan | GLOW: A global router for low-power thermal-reliable interconnect
synthesis using photonic wavelength multiplexing | null | null | 10.1109/ASPDAC.2012.6165031 | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we examine the integration potential and explore the design
space of low power thermal reliable on-chip interconnect synthesis featuring
nanophotonics Wavelength Division Multiplexing (WDM). With the recent
advancements, it is foreseen that nanophotonics holds the promise to be
employed for future on-chip data signalling due to its unique power efficiency,
signal delay and huge multiplexing potential. However, there are major
challenges to address before feasible on-chip integration could be reached. In
this paper, we present GLOW, a hybrid global router to provide low power
opto-electronic interconnect synthesis under the considerations of thermal
reliability and various physical design constraints such as optical power,
delay and signal quality. GLOW is evaluated with testing cases derived from
ISPD07-08 global routing benchmarks. Compared with a greedy approach, GLOW
demonstrates around 23%-50% of total optical power reduction, revealing great
potential of on-chip WDM interconnect synthesis.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2014 17:03:22 GMT"
}
] | 2014-02-13T00:00:00 | [
[
"Ding",
"Duo",
""
],
[
"Yu",
"Bei",
""
],
[
"Pan",
"David Z.",
""
]
] | TITLE: GLOW: A global router for low-power thermal-reliable interconnect
synthesis using photonic wavelength multiplexing
ABSTRACT: In this paper, we examine the integration potential and explore the design
space of low power thermal reliable on-chip interconnect synthesis featuring
nanophotonics Wavelength Division Multiplexing (WDM). With the recent
advancements, it is foreseen that nanophotonics holds the promise to be
employed for future on-chip data signalling due to its unique power efficiency,
signal delay and huge multiplexing potential. However, there are major
challenges to address before feasible on-chip integration could be reached. In
this paper, we present GLOW, a hybrid global router to provide low power
opto-electronic interconnect synthesis under the considerations of thermal
reliability and various physical design constraints such as optical power,
delay and signal quality. GLOW is evaluated with testing cases derived from
ISPD07-08 global routing benchmarks. Compared with a greedy approach, GLOW
demonstrates around 23%-50% of total optical power reduction, revealing great
potential of on-chip WDM interconnect synthesis.
|
1402.2904 | Bei Yu | Duo Ding and Bei Yu and Joydeep Ghosh and David Z. Pan | EPIC: Efficient prediction of IC manufacturing hotspots with a unified
meta-classification formulation | null | null | 10.1109/ASPDAC.2012.6164956 | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present EPIC, an efficient and effective predictor for IC
manufacturing hotspots in deep sub-wavelength lithography. EPIC proposes a
unified framework to combine different hotspot detection methods together, such
as machine learning and pattern matching, using mathematical
programming/optimization. EPIC algorithm has been tested on a number of
industry benchmarks under advanced manufacturing conditions. It demonstrates so
far the best capability in selectively combining the desirable features of
various hotspot detection methods (3.5-8.2% accuracy improvement) as well as
significant suppression of the detection noise (e.g., 80% false-alarm
reduction). These characteristics make EPIC very suitable for conducting high
performance physical verification and guiding efficient manufacturability
friendly physical design.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2014 17:25:05 GMT"
}
] | 2014-02-13T00:00:00 | [
[
"Ding",
"Duo",
""
],
[
"Yu",
"Bei",
""
],
[
"Ghosh",
"Joydeep",
""
],
[
"Pan",
"David Z.",
""
]
] | TITLE: EPIC: Efficient prediction of IC manufacturing hotspots with a unified
meta-classification formulation
ABSTRACT: In this paper we present EPIC, an efficient and effective predictor for IC
manufacturing hotspots in deep sub-wavelength lithography. EPIC proposes a
unified framework to combine different hotspot detection methods together, such
as machine learning and pattern matching, using mathematical
programming/optimization. EPIC algorithm has been tested on a number of
industry benchmarks under advanced manufacturing conditions. It demonstrates so
far the best capability in selectively combining the desirable features of
various hotspot detection methods (3.5-8.2% accuracy improvement) as well as
significant suppression of the detection noise (e.g., 80% false-alarm
reduction). These characteristics make EPIC very suitable for conducting high
performance physical verification and guiding efficient manufacturability
friendly physical design.
|
1402.2941 | Zohaib Khan | Zohaib Khan, Faisal Shafait, Yiqun Hu, Ajmal Mian | Multispectral Palmprint Encoding and Recognition | Preliminary version of this manuscript was published in ICCV 2011. Z.
Khan A. Mian and Y. Hu, "Contour Code: Robust and Efficient Multispectral
Palmprint Encoding for Human Recognition", International Conference on
Computer Vision, 2011. MATLAB Code available:
https://sites.google.com/site/zohaibnet/Home/codes | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Palmprints are emerging as a new entity in multi-modal biometrics for human
identification and verification. Multispectral palmprint images captured in the
visible and infrared spectrum not only contain the wrinkles and ridge structure
of a palm, but also the underlying pattern of veins; making them a highly
discriminating biometric identifier. In this paper, we propose a feature
encoding scheme for robust and highly accurate representation and matching of
multispectral palmprints. To facilitate compact storage of the feature, we
design a binary hash table structure that allows for efficient matching in
large databases. Comprehensive experiments for both identification and
verification scenarios are performed on two public datasets -- one captured
with a contact-based sensor (PolyU dataset), and the other with a contact-free
sensor (CASIA dataset). Recognition results in various experimental setups show
that the proposed method consistently outperforms existing state-of-the-art
methods. Error rates achieved by our method (0.003% on PolyU and 0.2% on CASIA)
are the lowest reported in literature on both dataset and clearly indicate the
viability of palmprint as a reliable and promising biometric. All source codes
are publicly available.
| [
{
"version": "v1",
"created": "Thu, 6 Feb 2014 06:35:51 GMT"
}
] | 2014-02-13T00:00:00 | [
[
"Khan",
"Zohaib",
""
],
[
"Shafait",
"Faisal",
""
],
[
"Hu",
"Yiqun",
""
],
[
"Mian",
"Ajmal",
""
]
] | TITLE: Multispectral Palmprint Encoding and Recognition
ABSTRACT: Palmprints are emerging as a new entity in multi-modal biometrics for human
identification and verification. Multispectral palmprint images captured in the
visible and infrared spectrum not only contain the wrinkles and ridge structure
of a palm, but also the underlying pattern of veins; making them a highly
discriminating biometric identifier. In this paper, we propose a feature
encoding scheme for robust and highly accurate representation and matching of
multispectral palmprints. To facilitate compact storage of the feature, we
design a binary hash table structure that allows for efficient matching in
large databases. Comprehensive experiments for both identification and
verification scenarios are performed on two public datasets -- one captured
with a contact-based sensor (PolyU dataset), and the other with a contact-free
sensor (CASIA dataset). Recognition results in various experimental setups show
that the proposed method consistently outperforms existing state-of-the-art
methods. Error rates achieved by our method (0.003% on PolyU and 0.2% on CASIA)
are the lowest reported in literature on both dataset and clearly indicate the
viability of palmprint as a reliable and promising biometric. All source codes
are publicly available.
|
1307.4048 | Pavan Kumar D S | D. S. Pavan Kumar, N. Vishnu Prasad, Vikas Joshi, S. Umesh | Modified SPLICE and its Extension to Non-Stereo Data for Noise Robust
Speech Recognition | Submitted to Automatic Speech Recognition and Understanding (ASRU)
2013 Workshop | null | 10.1109/ASRU.2013.6707725 | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a modification to the training process of the popular SPLICE
algorithm has been proposed for noise robust speech recognition. The
modification is based on feature correlations, and enables this stereo-based
algorithm to improve the performance in all noise conditions, especially in
unseen cases. Further, the modified framework is extended to work for
non-stereo datasets where clean and noisy training utterances, but not stereo
counterparts, are required. Finally, an MLLR-based computationally efficient
run-time noise adaptation method in SPLICE framework has been proposed. The
modified SPLICE shows 8.6% absolute improvement over SPLICE in Test C of
Aurora-2 database, and 2.93% overall. Non-stereo method shows 10.37% and 6.93%
absolute improvements over Aurora-2 and Aurora-4 baseline models respectively.
Run-time adaptation shows 9.89% absolute improvement in modified framework as
compared to SPLICE for Test C, and 4.96% overall w.r.t. standard MLLR
adaptation on HMMs.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2013 18:39:10 GMT"
}
] | 2014-02-12T00:00:00 | [
[
"Kumar",
"D. S. Pavan",
""
],
[
"Prasad",
"N. Vishnu",
""
],
[
"Joshi",
"Vikas",
""
],
[
"Umesh",
"S.",
""
]
] | TITLE: Modified SPLICE and its Extension to Non-Stereo Data for Noise Robust
Speech Recognition
ABSTRACT: In this paper, a modification to the training process of the popular SPLICE
algorithm has been proposed for noise robust speech recognition. The
modification is based on feature correlations, and enables this stereo-based
algorithm to improve the performance in all noise conditions, especially in
unseen cases. Further, the modified framework is extended to work for
non-stereo datasets where clean and noisy training utterances, but not stereo
counterparts, are required. Finally, an MLLR-based computationally efficient
run-time noise adaptation method in SPLICE framework has been proposed. The
modified SPLICE shows 8.6% absolute improvement over SPLICE in Test C of
Aurora-2 database, and 2.93% overall. Non-stereo method shows 10.37% and 6.93%
absolute improvements over Aurora-2 and Aurora-4 baseline models respectively.
Run-time adaptation shows 9.89% absolute improvement in modified framework as
compared to SPLICE for Test C, and 4.96% overall w.r.t. standard MLLR
adaptation on HMMs.
|
1402.2300 | Aaron Karper | Aaron Karper | Feature and Variable Selection in Classification | Part of master seminar in document analysis held by Marcus
Eichenberger-Liwicki | null | null | null | cs.LG cs.AI stat.ML | http://creativecommons.org/licenses/publicdomain/ | The amount of information in the form of features and variables avail- able
to machine learning algorithms is ever increasing. This can lead to classifiers
that are prone to overfitting in high dimensions, high di- mensional models do
not lend themselves to interpretable results, and the CPU and memory resources
necessary to run on high-dimensional datasets severly limit the applications of
the approaches. Variable and feature selection aim to remedy this by finding a
subset of features that in some way captures the information provided best. In
this paper we present the general methodology and highlight some specific
approaches.
| [
{
"version": "v1",
"created": "Mon, 10 Feb 2014 21:05:58 GMT"
}
] | 2014-02-12T00:00:00 | [
[
"Karper",
"Aaron",
""
]
] | TITLE: Feature and Variable Selection in Classification
ABSTRACT: The amount of information in the form of features and variables avail- able
to machine learning algorithms is ever increasing. This can lead to classifiers
that are prone to overfitting in high dimensions, high di- mensional models do
not lend themselves to interpretable results, and the CPU and memory resources
necessary to run on high-dimensional datasets severly limit the applications of
the approaches. Variable and feature selection aim to remedy this by finding a
subset of features that in some way captures the information provided best. In
this paper we present the general methodology and highlight some specific
approaches.
|
1402.2363 | Ashish Shingade ANS | Ashish Shingade and Archana Ghotkar | Animation of 3D Human Model Using Markerless Motion Capture Applied To
Sports | null | null | null | null | cs.GR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Markerless motion capture is an active research in 3D virtualization. In
proposed work we presented a system for markerless motion capture for 3D human
character animation, paper presents a survey on motion and skeleton tracking
techniques which are developed or are under development. The paper proposed a
method to transform the motion of a performer to a 3D human character (model),
the 3D human character performs similar movements as that of a performer in
real time. In the proposed work, human model data will be captured by Kinect
camera, processed data will be applied on 3D human model for animation. 3D
human model is created using open source software (MakeHuman). Anticipated
dataset for sport activity is considered as input which can be applied to any
HCI application.
| [
{
"version": "v1",
"created": "Tue, 11 Feb 2014 04:05:12 GMT"
}
] | 2014-02-12T00:00:00 | [
[
"Shingade",
"Ashish",
""
],
[
"Ghotkar",
"Archana",
""
]
] | TITLE: Animation of 3D Human Model Using Markerless Motion Capture Applied To
Sports
ABSTRACT: Markerless motion capture is an active research in 3D virtualization. In
proposed work we presented a system for markerless motion capture for 3D human
character animation, paper presents a survey on motion and skeleton tracking
techniques which are developed or are under development. The paper proposed a
method to transform the motion of a performer to a 3D human character (model),
the 3D human character performs similar movements as that of a performer in
real time. In the proposed work, human model data will be captured by Kinect
camera, processed data will be applied on 3D human model for animation. 3D
human model is created using open source software (MakeHuman). Anticipated
dataset for sport activity is considered as input which can be applied to any
HCI application.
|
1402.2606 | Dibyendu Mukherjee | Dibyendu Mukherjee | A Fast Two Pass Multi-Value Segmentation Algorithm based on Connected
Component Analysis | 9 pages, 7 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Connected component analysis (CCA) has been heavily used to label binary
images and classify segments. However, it has not been well-exploited to
segment multi-valued natural images. This work proposes a novel multi-value
segmentation algorithm that utilizes CCA to segment color images. A user
defined distance measure is incorporated in the proposed modified CCA to
identify and segment similar image regions. The raw output of the algorithm
consists of distinctly labelled segmented regions. The proposed algorithm has a
unique design architecture that provides several benefits: 1) it can be used to
segment any multi-channel multi-valued image; 2) the distance
measure/segmentation criteria can be application-specific and 3) an absolute
linear-time implementation allows easy extension for real-time video
segmentation. Experimental demonstrations of the aforesaid benefits are
presented along with the comparison results on multiple datasets with current
benchmark algorithms. A number of possible application areas are also
identified and results on real-time video segmentation has been presented to
show the promise of the proposed method.
| [
{
"version": "v1",
"created": "Tue, 11 Feb 2014 19:27:05 GMT"
}
] | 2014-02-12T00:00:00 | [
[
"Mukherjee",
"Dibyendu",
""
]
] | TITLE: A Fast Two Pass Multi-Value Segmentation Algorithm based on Connected
Component Analysis
ABSTRACT: Connected component analysis (CCA) has been heavily used to label binary
images and classify segments. However, it has not been well-exploited to
segment multi-valued natural images. This work proposes a novel multi-value
segmentation algorithm that utilizes CCA to segment color images. A user
defined distance measure is incorporated in the proposed modified CCA to
identify and segment similar image regions. The raw output of the algorithm
consists of distinctly labelled segmented regions. The proposed algorithm has a
unique design architecture that provides several benefits: 1) it can be used to
segment any multi-channel multi-valued image; 2) the distance
measure/segmentation criteria can be application-specific and 3) an absolute
linear-time implementation allows easy extension for real-time video
segmentation. Experimental demonstrations of the aforesaid benefits are
presented along with the comparison results on multiple datasets with current
benchmark algorithms. A number of possible application areas are also
identified and results on real-time video segmentation has been presented to
show the promise of the proposed method.
|
1402.2020 | Kang Zhang | Kang Zhang, Jiyang Li, Yijing Li, Weidong Hu, Lifeng Sun, Shiqiang
Yang | Binary Stereo Matching | Pattern Recognition (ICPR), 2012 21st International Conference on | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel binary-based cost computation and
aggregation approach for stereo matching problem. The cost volume is
constructed through bitwise operations on a series of binary strings. Then this
approach is combined with traditional winner-take-all strategy, resulting in a
new local stereo matching algorithm called binary stereo matching (BSM). Since
core algorithm of BSM is based on binary and integer computations, it has a
higher computational efficiency than previous methods. Experimental results on
Middlebury benchmark show that BSM has comparable performance with
state-of-the-art local stereo methods in terms of both quality and speed.
Furthermore, experiments on images with radiometric differences demonstrate
that BSM is more robust than previous methods under these changes, which is
common under real illumination.
| [
{
"version": "v1",
"created": "Mon, 10 Feb 2014 02:33:39 GMT"
}
] | 2014-02-11T00:00:00 | [
[
"Zhang",
"Kang",
""
],
[
"Li",
"Jiyang",
""
],
[
"Li",
"Yijing",
""
],
[
"Hu",
"Weidong",
""
],
[
"Sun",
"Lifeng",
""
],
[
"Yang",
"Shiqiang",
""
]
] | TITLE: Binary Stereo Matching
ABSTRACT: In this paper, we propose a novel binary-based cost computation and
aggregation approach for stereo matching problem. The cost volume is
constructed through bitwise operations on a series of binary strings. Then this
approach is combined with traditional winner-take-all strategy, resulting in a
new local stereo matching algorithm called binary stereo matching (BSM). Since
core algorithm of BSM is based on binary and integer computations, it has a
higher computational efficiency than previous methods. Experimental results on
Middlebury benchmark show that BSM has comparable performance with
state-of-the-art local stereo methods in terms of both quality and speed.
Furthermore, experiments on images with radiometric differences demonstrate
that BSM is more robust than previous methods under these changes, which is
common under real illumination.
|
1311.7676 | Song Gao | Song Gao, Linna Li, Wenwen Li, Krzysztof Janowicz, Yue Zhang | Constructing Gazetteers from Volunteered Big Geo-Data Based on Hadoop | 45 pages, 10 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional gazetteers are built and maintained by authoritative mapping
agencies. In the age of Big Data, it is possible to construct gazetteers in a
data-driven approach by mining rich volunteered geographic information (VGI)
from the Web. In this research, we build a scalable distributed platform and a
high-performance geoprocessing workflow based on the Hadoop ecosystem to
harvest crowd-sourced gazetteer entries. Using experiments based on geotagged
datasets in Flickr, we find that the MapReduce-based workflow running on the
spatially enabled Hadoop cluster can reduce the processing time compared with
traditional desktop-based operations by an order of magnitude. We demonstrate
how to use such a novel spatial-computing infrastructure to facilitate
gazetteer research. In addition, we introduce a provenance-based trust model
for quality assurance. This work offers new insights on enriching future
gazetteers with the use of Hadoop clusters, and makes contributions in
connecting GIS to the cloud computing environment for the next frontier of Big
Geo-Data analytics.
| [
{
"version": "v1",
"created": "Fri, 29 Nov 2013 19:52:42 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Feb 2014 07:11:22 GMT"
}
] | 2014-02-10T00:00:00 | [
[
"Gao",
"Song",
""
],
[
"Li",
"Linna",
""
],
[
"Li",
"Wenwen",
""
],
[
"Janowicz",
"Krzysztof",
""
],
[
"Zhang",
"Yue",
""
]
] | TITLE: Constructing Gazetteers from Volunteered Big Geo-Data Based on Hadoop
ABSTRACT: Traditional gazetteers are built and maintained by authoritative mapping
agencies. In the age of Big Data, it is possible to construct gazetteers in a
data-driven approach by mining rich volunteered geographic information (VGI)
from the Web. In this research, we build a scalable distributed platform and a
high-performance geoprocessing workflow based on the Hadoop ecosystem to
harvest crowd-sourced gazetteer entries. Using experiments based on geotagged
datasets in Flickr, we find that the MapReduce-based workflow running on the
spatially enabled Hadoop cluster can reduce the processing time compared with
traditional desktop-based operations by an order of magnitude. We demonstrate
how to use such a novel spatial-computing infrastructure to facilitate
gazetteer research. In addition, we introduce a provenance-based trust model
for quality assurance. This work offers new insights on enriching future
gazetteers with the use of Hadoop clusters, and makes contributions in
connecting GIS to the cloud computing environment for the next frontier of Big
Geo-Data analytics.
|
1402.1546 | Weiwei Sun | Renchu Song, Weiwei Sun, Baihua Zheng, Yu Zheng | PRESS: A Novel Framework of Trajectory Compression in Road Networks | 27 pages, 17 figures | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Location data becomes more and more important. In this paper, we focus on the
trajectory data, and propose a new framework, namely PRESS (Paralleled
Road-Network-Based Trajectory Compression), to effectively compress trajectory
data under road network constraints. Different from existing work, PRESS
proposes a novel representation for trajectories to separate the spatial
representation of a trajectory from the temporal representation, and proposes a
Hybrid Spatial Compression (HSC) algorithm and error Bounded Temporal
Compression (BTC) algorithm to compress the spatial and temporal information of
trajectories respectively. PRESS also supports common spatial-temporal queries
without fully decompressing the data. Through an extensive experimental study
on real trajectory dataset, PRESS significantly outperforms existing approaches
in terms of saving storage cost of trajectory data with bounded errors.
| [
{
"version": "v1",
"created": "Fri, 7 Feb 2014 03:29:08 GMT"
}
] | 2014-02-10T00:00:00 | [
[
"Song",
"Renchu",
""
],
[
"Sun",
"Weiwei",
""
],
[
"Zheng",
"Baihua",
""
],
[
"Zheng",
"Yu",
""
]
] | TITLE: PRESS: A Novel Framework of Trajectory Compression in Road Networks
ABSTRACT: Location data becomes more and more important. In this paper, we focus on the
trajectory data, and propose a new framework, namely PRESS (Paralleled
Road-Network-Based Trajectory Compression), to effectively compress trajectory
data under road network constraints. Different from existing work, PRESS
proposes a novel representation for trajectories to separate the spatial
representation of a trajectory from the temporal representation, and proposes a
Hybrid Spatial Compression (HSC) algorithm and error Bounded Temporal
Compression (BTC) algorithm to compress the spatial and temporal information of
trajectories respectively. PRESS also supports common spatial-temporal queries
without fully decompressing the data. Through an extensive experimental study
on real trajectory dataset, PRESS significantly outperforms existing approaches
in terms of saving storage cost of trajectory data with bounded errors.
|
1304.2641 | Jin-Kao Hao | Yan Jin, Jin-Kao Hao and Jean-Philippe Hamiez | A memetic algorithm for the minimum sum coloring problem | Submitted manuscript | Computers & Operations Research 43(3): 318-327, 2014 | 10.1016/j.cor.2013.09.019 | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given an undirected graph $G$, the Minimum Sum Coloring problem (MSCP) is to
find a legal assignment of colors (represented by natural numbers) to each
vertex of $G$ such that the total sum of the colors assigned to the vertices is
minimized. This paper presents a memetic algorithm for MSCP based on a tabu
search procedure with two neighborhoods and a multi-parent crossover operator.
Experiments on a set of 77 well-known DIMACS and COLOR 2002-2004 benchmark
instances show that the proposed algorithm achieves highly competitive results
in comparison with five state-of-the-art algorithms. In particular, the
proposed algorithm can improve the best known results for 17 instances. We also
provide upper bounds for 18 additional instances for the first time.
| [
{
"version": "v1",
"created": "Tue, 9 Apr 2013 15:54:53 GMT"
}
] | 2014-02-07T00:00:00 | [
[
"Jin",
"Yan",
""
],
[
"Hao",
"Jin-Kao",
""
],
[
"Hamiez",
"Jean-Philippe",
""
]
] | TITLE: A memetic algorithm for the minimum sum coloring problem
ABSTRACT: Given an undirected graph $G$, the Minimum Sum Coloring problem (MSCP) is to
find a legal assignment of colors (represented by natural numbers) to each
vertex of $G$ such that the total sum of the colors assigned to the vertices is
minimized. This paper presents a memetic algorithm for MSCP based on a tabu
search procedure with two neighborhoods and a multi-parent crossover operator.
Experiments on a set of 77 well-known DIMACS and COLOR 2002-2004 benchmark
instances show that the proposed algorithm achieves highly competitive results
in comparison with five state-of-the-art algorithms. In particular, the
proposed algorithm can improve the best known results for 17 instances. We also
provide upper bounds for 18 additional instances for the first time.
|
1402.1285 | Jorge Gonz\'alez-Dom\'inguez | Jorge Gonz\'alez-Dom\'inguez, Evangelos Georganas, Yili Zheng, Mar\'ia
J. Mart\'in | Constructing Performance Models for Dense Linear Algebra Algorithms on
Cray XE Systems | null | null | null | null | cs.DC cs.MS cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hiding or minimizing the communication cost is key in order to obtain good
performance on large-scale systems. While communication overlapping attempts to
hide communications cost, 2.5D communication avoiding algorithms improve
performance scalability by reducing the volume of data transfers at the cost of
extra memory usage. Both approaches can be used together or separately and the
best choice depends on the machine, the algorithm and the problem size. Thus,
the development of performance models is crucial to determine the best option
for each scenario. In this paper, we present a methodology for constructing
performance models for parallel numerical routines on Cray XE systems. Our
models use portable benchmarks that measure computational cost and network
characteristics, as well as performance degradation caused by simultaneous
accesses to the network. We validate our methodology by constructing the
performance models for the 2D and 2.5D approaches, with and without
overlapping, of two matrix multiplication algorithms (Cannon's and SUMMA),
triangular solve (TRSM) and Cholesky. We compare the estimations provided by
these models with the experimental results using up to 24,576 cores of a Cray
XE6 system and predict the performance of the algorithms on larger systems.
Results prove that the estimations significantly improve when taking into
account network contention.
| [
{
"version": "v1",
"created": "Thu, 6 Feb 2014 09:16:38 GMT"
}
] | 2014-02-07T00:00:00 | [
[
"González-Domínguez",
"Jorge",
""
],
[
"Georganas",
"Evangelos",
""
],
[
"Zheng",
"Yili",
""
],
[
"Martín",
"María J.",
""
]
] | TITLE: Constructing Performance Models for Dense Linear Algebra Algorithms on
Cray XE Systems
ABSTRACT: Hiding or minimizing the communication cost is key in order to obtain good
performance on large-scale systems. While communication overlapping attempts to
hide communications cost, 2.5D communication avoiding algorithms improve
performance scalability by reducing the volume of data transfers at the cost of
extra memory usage. Both approaches can be used together or separately and the
best choice depends on the machine, the algorithm and the problem size. Thus,
the development of performance models is crucial to determine the best option
for each scenario. In this paper, we present a methodology for constructing
performance models for parallel numerical routines on Cray XE systems. Our
models use portable benchmarks that measure computational cost and network
characteristics, as well as performance degradation caused by simultaneous
accesses to the network. We validate our methodology by constructing the
performance models for the 2D and 2.5D approaches, with and without
overlapping, of two matrix multiplication algorithms (Cannon's and SUMMA),
triangular solve (TRSM) and Cholesky. We compare the estimations provided by
these models with the experimental results using up to 24,576 cores of a Cray
XE6 system and predict the performance of the algorithms on larger systems.
Results prove that the estimations significantly improve when taking into
account network contention.
|
1402.1379 | Jin-Kao Hao | Zhang-Hua Fu and Jin-Kao Hao | A Three-Phase Search Approach for the Quadratic Minimum Spanning Tree
Problem | 29 pages | null | null | null | cs.DS cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given an undirected graph with costs associated with each edge as well as
each pair of edges, the quadratic minimum spanning tree problem (QMSTP)
consists of determining a spanning tree of minimum total cost. This problem can
be used to model many real-life network design applications, in which both
routing and interference costs should be considered. For this problem, we
propose a three-phase search approach named TPS, which integrates 1) a
descent-based neighborhood search phase using two different move operators to
reach a local optimum from a given starting solution, 2) a local optima
exploring phase to discover nearby local optima within a given regional search
area, and 3) a perturbation-based diversification phase to jump out of the
current regional search area. Additionally, we introduce dedicated techniques
to reduce the neighborhood to explore and streamline the neighborhood
evaluations. Computational experiments based on hundreds of representative
benchmarks show that TPS produces highly competitive results with respect to
the best performing approaches in the literature by improving the best known
results for 31 instances and matching the best known results for the remaining
instances only except two cases. Critical elements of the proposed algorithms
are analyzed.
| [
{
"version": "v1",
"created": "Thu, 6 Feb 2014 15:31:49 GMT"
}
] | 2014-02-07T00:00:00 | [
[
"Fu",
"Zhang-Hua",
""
],
[
"Hao",
"Jin-Kao",
""
]
] | TITLE: A Three-Phase Search Approach for the Quadratic Minimum Spanning Tree
Problem
ABSTRACT: Given an undirected graph with costs associated with each edge as well as
each pair of edges, the quadratic minimum spanning tree problem (QMSTP)
consists of determining a spanning tree of minimum total cost. This problem can
be used to model many real-life network design applications, in which both
routing and interference costs should be considered. For this problem, we
propose a three-phase search approach named TPS, which integrates 1) a
descent-based neighborhood search phase using two different move operators to
reach a local optimum from a given starting solution, 2) a local optima
exploring phase to discover nearby local optima within a given regional search
area, and 3) a perturbation-based diversification phase to jump out of the
current regional search area. Additionally, we introduce dedicated techniques
to reduce the neighborhood to explore and streamline the neighborhood
evaluations. Computational experiments based on hundreds of representative
benchmarks show that TPS produces highly competitive results with respect to
the best performing approaches in the literature by improving the best known
results for 31 instances and matching the best known results for the remaining
instances only except two cases. Critical elements of the proposed algorithms
are analyzed.
|
1402.0914 | Scott Linderman | Scott W. Linderman and Ryan P. Adams | Discovering Latent Network Structure in Point Process Data | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Networks play a central role in modern data analysis, enabling us to reason
about systems by studying the relationships between their parts. Most often in
network analysis, the edges are given. However, in many systems it is difficult
or impossible to measure the network directly. Examples of latent networks
include economic interactions linking financial instruments and patterns of
reciprocity in gang violence. In these cases, we are limited to noisy
observations of events associated with each node. To enable analysis of these
implicit networks, we develop a probabilistic model that combines
mutually-exciting point processes with random graph models. We show how the
Poisson superposition principle enables an elegant auxiliary variable
formulation and a fully-Bayesian, parallel inference algorithm. We evaluate
this new model empirically on several datasets.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 23:48:23 GMT"
}
] | 2014-02-06T00:00:00 | [
[
"Linderman",
"Scott W.",
""
],
[
"Adams",
"Ryan P.",
""
]
] | TITLE: Discovering Latent Network Structure in Point Process Data
ABSTRACT: Networks play a central role in modern data analysis, enabling us to reason
about systems by studying the relationships between their parts. Most often in
network analysis, the edges are given. However, in many systems it is difficult
or impossible to measure the network directly. Examples of latent networks
include economic interactions linking financial instruments and patterns of
reciprocity in gang violence. In these cases, we are limited to noisy
observations of events associated with each node. To enable analysis of these
implicit networks, we develop a probabilistic model that combines
mutually-exciting point processes with random graph models. We show how the
Poisson superposition principle enables an elegant auxiliary variable
formulation and a fully-Bayesian, parallel inference algorithm. We evaluate
this new model empirically on several datasets.
|
1402.0525 | Emrah Akyol | Mustafa Mehmetoglu and Emrah Akyol and Kenneth Rose | A Deterministic Annealing Approach to Witsenhausen's Counterexample | submitted to ISIT'14 | null | null | null | cs.IT cs.SY math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a numerical method, based on information theoretic ideas,
to a class of distributed control problems. As a particular test case, the
well-known and numerically "over-mined" problem of decentralized control and
implicit communication, commonly referred to as Witsenhausen's counterexample,
is considered. The method provides a small improvement over the best numerical
result so far for this benchmark problem. The key idea is to randomize the
zero-delay mappings. which become "soft", probabilistic mappings to be
optimized in a deterministic annealing process, by incorporating a Shannon
entropy constraint in the problem formulation. The entropy of the mapping is
controlled and gradually lowered to zero to obtain deterministic mappings,
while avoiding poor local minima. Proposed method obtains new mappings that
shed light on the structure of the optimal solution, as well as achieving a
small improvement in total cost over the state of the art in numerical
approaches to this problem.
| [
{
"version": "v1",
"created": "Mon, 3 Feb 2014 21:31:30 GMT"
}
] | 2014-02-05T00:00:00 | [
[
"Mehmetoglu",
"Mustafa",
""
],
[
"Akyol",
"Emrah",
""
],
[
"Rose",
"Kenneth",
""
]
] | TITLE: A Deterministic Annealing Approach to Witsenhausen's Counterexample
ABSTRACT: This paper proposes a numerical method, based on information theoretic ideas,
to a class of distributed control problems. As a particular test case, the
well-known and numerically "over-mined" problem of decentralized control and
implicit communication, commonly referred to as Witsenhausen's counterexample,
is considered. The method provides a small improvement over the best numerical
result so far for this benchmark problem. The key idea is to randomize the
zero-delay mappings. which become "soft", probabilistic mappings to be
optimized in a deterministic annealing process, by incorporating a Shannon
entropy constraint in the problem formulation. The entropy of the mapping is
controlled and gradually lowered to zero to obtain deterministic mappings,
while avoiding poor local minima. Proposed method obtains new mappings that
shed light on the structure of the optimal solution, as well as achieving a
small improvement in total cost over the state of the art in numerical
approaches to this problem.
|
1402.0557 | Eric Huang | Eric Huang, Richard E. Korf | Optimal Rectangle Packing: An Absolute Placement Approach | null | Journal Of Artificial Intelligence Research, Volume 46, pages
47-87, 2013 | 10.1613/jair.3735 | null | cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of finding all enclosing rectangles of minimum area
that can contain a given set of rectangles without overlap. Our rectangle
packer chooses the x-coordinates of all the rectangles before any of the
y-coordinates. We then transform the problem into a perfect-packing problem
with no empty space by adding additional rectangles. To determine the
y-coordinates, we branch on the different rectangles that can be placed in each
empty position. Our packer allows us to extend the known solutions for a
consecutive-square benchmark from 27 to 32 squares. We also introduce three new
benchmarks, avoiding properties that make a benchmark easy, such as rectangles
with shared dimensions. Our third benchmark consists of rectangles of
increasingly high precision. To pack them efficiently, we limit the rectangles
coordinates and the bounding box dimensions to the set of subset sums of the
rectangles dimensions. Overall, our algorithms represent the current
state-of-the-art for this problem, outperforming other algorithms by orders of
magnitude, depending on the benchmark.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 01:33:30 GMT"
}
] | 2014-02-05T00:00:00 | [
[
"Huang",
"Eric",
""
],
[
"Korf",
"Richard E.",
""
]
] | TITLE: Optimal Rectangle Packing: An Absolute Placement Approach
ABSTRACT: We consider the problem of finding all enclosing rectangles of minimum area
that can contain a given set of rectangles without overlap. Our rectangle
packer chooses the x-coordinates of all the rectangles before any of the
y-coordinates. We then transform the problem into a perfect-packing problem
with no empty space by adding additional rectangles. To determine the
y-coordinates, we branch on the different rectangles that can be placed in each
empty position. Our packer allows us to extend the known solutions for a
consecutive-square benchmark from 27 to 32 squares. We also introduce three new
benchmarks, avoiding properties that make a benchmark easy, such as rectangles
with shared dimensions. Our third benchmark consists of rectangles of
increasingly high precision. To pack them efficiently, we limit the rectangles
coordinates and the bounding box dimensions to the set of subset sums of the
rectangles dimensions. Overall, our algorithms represent the current
state-of-the-art for this problem, outperforming other algorithms by orders of
magnitude, depending on the benchmark.
|
1402.0568 | Amit Metodi | Amit Metodi, Michael Codish, Peter James Stuckey | Boolean Equi-propagation for Concise and Efficient SAT Encodings of
Combinatorial Problems | arXiv admin note: text overlap with arXiv:1206.3883 | Journal Of Artificial Intelligence Research, Volume 46, pages
303-341, 2013 | 10.1613/jair.3809 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an approach to propagation-based SAT encoding of combinatorial
problems, Boolean equi-propagation, where constraints are modeled as Boolean
functions which propagate information about equalities between Boolean
literals. This information is then applied to simplify the CNF encoding of the
constraints. A key factor is that considering only a small fragment of a
constraint model at one time enables us to apply stronger, and even complete,
reasoning to detect equivalent literals in that fragment. Once detected,
equivalences apply to simplify the entire constraint model and facilitate
further reasoning on other fragments. Equi-propagation in combination with
partial evaluation and constraint simplification provide the foundation for a
powerful approach to SAT-based finite domain constraint solving. We introduce a
tool called BEE (Ben-Gurion Equi-propagation Encoder) based on these ideas and
demonstrate for a variety of benchmarks that our approach leads to a
considerable reduction in the size of CNF encodings and subsequent speed-ups in
SAT solving times.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 01:36:36 GMT"
}
] | 2014-02-05T00:00:00 | [
[
"Metodi",
"Amit",
""
],
[
"Codish",
"Michael",
""
],
[
"Stuckey",
"Peter James",
""
]
] | TITLE: Boolean Equi-propagation for Concise and Efficient SAT Encodings of
Combinatorial Problems
ABSTRACT: We present an approach to propagation-based SAT encoding of combinatorial
problems, Boolean equi-propagation, where constraints are modeled as Boolean
functions which propagate information about equalities between Boolean
literals. This information is then applied to simplify the CNF encoding of the
constraints. A key factor is that considering only a small fragment of a
constraint model at one time enables us to apply stronger, and even complete,
reasoning to detect equivalent literals in that fragment. Once detected,
equivalences apply to simplify the entire constraint model and facilitate
further reasoning on other fragments. Equi-propagation in combination with
partial evaluation and constraint simplification provide the foundation for a
powerful approach to SAT-based finite domain constraint solving. We introduce a
tool called BEE (Ben-Gurion Equi-propagation Encoder) based on these ideas and
demonstrate for a variety of benchmarks that our approach leads to a
considerable reduction in the size of CNF encodings and subsequent speed-ups in
SAT solving times.
|
1402.0584 | Shaowei Cai | Shaowei Cai, Kaile Su, Chuan Luo, Abdul Sattar | NuMVC: An Efficient Local Search Algorithm for Minimum Vertex Cover | null | Journal Of Artificial Intelligence Research, Volume 46, pages
687-716, 2013 | 10.1613/jair.3907 | null | cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Minimum Vertex Cover (MVC) problem is a prominent NP-hard combinatorial
optimization problem of great importance in both theory and application. Local
search has proved successful for this problem. However, there are two main
drawbacks in state-of-the-art MVC local search algorithms. First, they select a
pair of vertices to exchange simultaneously, which is time-consuming. Secondly,
although using edge weighting techniques to diversify the search, these
algorithms lack mechanisms for decreasing the weights. To address these issues,
we propose two new strategies: two-stage exchange and edge weighting with
forgetting. The two-stage exchange strategy selects two vertices to exchange
separately and performs the exchange in two stages. The strategy of edge
weighting with forgetting not only increases weights of uncovered edges, but
also decreases some weights for each edge periodically. These two strategies
are used in designing a new MVC local search algorithm, which is referred to as
NuMVC. We conduct extensive experimental studies on the standard benchmarks,
namely DIMACS and BHOSLIB. The experiment comparing NuMVC with state-of-the-art
heuristic algorithms show that NuMVC is at least competitive with the nearest
competitor namely PLS on the DIMACS benchmark, and clearly dominates all
competitors on the BHOSLIB benchmark. Also, experimental results indicate that
NuMVC finds an optimal solution much faster than the current best exact
algorithm for Maximum Clique on random instances as well as some structured
ones. Moreover, we study the effectiveness of the two strategies and the
run-time behaviour through experimental analysis.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 01:42:48 GMT"
}
] | 2014-02-05T00:00:00 | [
[
"Cai",
"Shaowei",
""
],
[
"Su",
"Kaile",
""
],
[
"Luo",
"Chuan",
""
],
[
"Sattar",
"Abdul",
""
]
] | TITLE: NuMVC: An Efficient Local Search Algorithm for Minimum Vertex Cover
ABSTRACT: The Minimum Vertex Cover (MVC) problem is a prominent NP-hard combinatorial
optimization problem of great importance in both theory and application. Local
search has proved successful for this problem. However, there are two main
drawbacks in state-of-the-art MVC local search algorithms. First, they select a
pair of vertices to exchange simultaneously, which is time-consuming. Secondly,
although using edge weighting techniques to diversify the search, these
algorithms lack mechanisms for decreasing the weights. To address these issues,
we propose two new strategies: two-stage exchange and edge weighting with
forgetting. The two-stage exchange strategy selects two vertices to exchange
separately and performs the exchange in two stages. The strategy of edge
weighting with forgetting not only increases weights of uncovered edges, but
also decreases some weights for each edge periodically. These two strategies
are used in designing a new MVC local search algorithm, which is referred to as
NuMVC. We conduct extensive experimental studies on the standard benchmarks,
namely DIMACS and BHOSLIB. The experiment comparing NuMVC with state-of-the-art
heuristic algorithms show that NuMVC is at least competitive with the nearest
competitor namely PLS on the DIMACS benchmark, and clearly dominates all
competitors on the BHOSLIB benchmark. Also, experimental results indicate that
NuMVC finds an optimal solution much faster than the current best exact
algorithm for Maximum Clique on random instances as well as some structured
ones. Moreover, we study the effectiveness of the two strategies and the
run-time behaviour through experimental analysis.
|
1402.0595 | Mojtaba Seyedhosseini | Mojtaba Seyedhosseini and Tolga Tasdizen | Scene Labeling with Contextual Hierarchical Models | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scene labeling is the problem of assigning an object label to each pixel. It
unifies the image segmentation and object recognition problems. The importance
of using contextual information in scene labeling frameworks has been widely
realized in the field. We propose a contextual framework, called contextual
hierarchical model (CHM), which learns contextual information in a hierarchical
framework for scene labeling. At each level of the hierarchy, a classifier is
trained based on downsampled input images and outputs of previous levels. Our
model then incorporates the resulting multi-resolution contextual information
into a classifier to segment the input image at original resolution. This
training strategy allows for optimization of a joint posterior probability at
multiple resolutions through the hierarchy. Contextual hierarchical model is
purely based on the input image patches and does not make use of any fragments
or shape examples. Hence, it is applicable to a variety of problems such as
object segmentation and edge detection. We demonstrate that CHM outperforms
state-of-the-art on Stanford background and Weizmann horse datasets. It also
outperforms state-of-the-art edge detection methods on NYU depth dataset and
achieves state-of-the-art on Berkeley segmentation dataset (BSDS 500).
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 02:10:01 GMT"
}
] | 2014-02-05T00:00:00 | [
[
"Seyedhosseini",
"Mojtaba",
""
],
[
"Tasdizen",
"Tolga",
""
]
] | TITLE: Scene Labeling with Contextual Hierarchical Models
ABSTRACT: Scene labeling is the problem of assigning an object label to each pixel. It
unifies the image segmentation and object recognition problems. The importance
of using contextual information in scene labeling frameworks has been widely
realized in the field. We propose a contextual framework, called contextual
hierarchical model (CHM), which learns contextual information in a hierarchical
framework for scene labeling. At each level of the hierarchy, a classifier is
trained based on downsampled input images and outputs of previous levels. Our
model then incorporates the resulting multi-resolution contextual information
into a classifier to segment the input image at original resolution. This
training strategy allows for optimization of a joint posterior probability at
multiple resolutions through the hierarchy. Contextual hierarchical model is
purely based on the input image patches and does not make use of any fragments
or shape examples. Hence, it is applicable to a variety of problems such as
object segmentation and edge detection. We demonstrate that CHM outperforms
state-of-the-art on Stanford background and Weizmann horse datasets. It also
outperforms state-of-the-art edge detection methods on NYU depth dataset and
achieves state-of-the-art on Berkeley segmentation dataset (BSDS 500).
|
1402.0671 | Roshan Ragel | Rajitha Navarathna, Swarnalatha Radhakrishnan and Roshan Ragel | Loop Unrolling in Multi-pipeline ASIP Design | 6 pages | Navarathna, H. M R D B; Radhakrishnan, S.; Ragel, R.G., "Loop
unrolling in multi-pipeline ASIP design," Industrial and Information Systems
(ICIIS), 2009 International Conference on , pp.306-311, 28-31 Dec. 2009 | 10.1109/ICIINFS.2009.5429845 | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Application Specific Instruction-set Processor (ASIP) is one of the popular
processor design techniques for embedded systems which allows customizability
in processor design without overly hindering design flexibility. Multi-pipeline
ASIPs were proposed to improve the performance of such systems by compromising
between speed and processor area. One of the problems in the multi-pipeline
design is the limited inherent instruction level parallelism (ILP) available in
applications. The ILP of application programs can be improved via a compiler
optimization technique known as loop unrolling. In this paper, we present how
loop unrolling effects the performance of multi-pipeline ASIPs. The
improvements in performance average around 15% for a number of benchmark
applications with the maximum improvement of around 30%. In addition, we
analyzed the variable of performance against loop unrolling factor, which is
the amount of unrolling we perform.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2014 09:36:34 GMT"
}
] | 2014-02-05T00:00:00 | [
[
"Navarathna",
"Rajitha",
""
],
[
"Radhakrishnan",
"Swarnalatha",
""
],
[
"Ragel",
"Roshan",
""
]
] | TITLE: Loop Unrolling in Multi-pipeline ASIP Design
ABSTRACT: Application Specific Instruction-set Processor (ASIP) is one of the popular
processor design techniques for embedded systems which allows customizability
in processor design without overly hindering design flexibility. Multi-pipeline
ASIPs were proposed to improve the performance of such systems by compromising
between speed and processor area. One of the problems in the multi-pipeline
design is the limited inherent instruction level parallelism (ILP) available in
applications. The ILP of application programs can be improved via a compiler
optimization technique known as loop unrolling. In this paper, we present how
loop unrolling effects the performance of multi-pipeline ASIPs. The
improvements in performance average around 15% for a number of benchmark
applications with the maximum improvement of around 30%. In addition, we
analyzed the variable of performance against loop unrolling factor, which is
the amount of unrolling we perform.
|
1202.2249 | Ioana Sporea | Ioana Sporea and Andr\'e Gr\"uning | Supervised Learning in Multilayer Spiking Neural Networks | 38 pages, 4 figures | Neural Compuation February 2013, Vol. 25, No. 2, Pages 473-509 | 10.1162/NECO_a_00396 | null | cs.NE q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The current article introduces a supervised learning algorithm for multilayer
spiking neural networks. The algorithm presented here overcomes some
limitations of existing learning algorithms as it can be applied to neurons
firing multiple spikes and it can in principle be applied to any linearisable
neuron model. The algorithm is applied successfully to various benchmarks, such
as the XOR problem and the Iris data set, as well as complex classifications
problems. The simulations also show the flexibility of this supervised learning
algorithm which permits different encodings of the spike timing patterns,
including precise spike trains encoding.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2012 12:57:34 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Sporea",
"Ioana",
""
],
[
"Grüning",
"André",
""
]
] | TITLE: Supervised Learning in Multilayer Spiking Neural Networks
ABSTRACT: The current article introduces a supervised learning algorithm for multilayer
spiking neural networks. The algorithm presented here overcomes some
limitations of existing learning algorithms as it can be applied to neurons
firing multiple spikes and it can in principle be applied to any linearisable
neuron model. The algorithm is applied successfully to various benchmarks, such
as the XOR problem and the Iris data set, as well as complex classifications
problems. The simulations also show the flexibility of this supervised learning
algorithm which permits different encodings of the spike timing patterns,
including precise spike trains encoding.
|
1309.3256 | Rachel Ward | Abhinav Nellore and Rachel Ward | Recovery guarantees for exemplar-based clustering | 24 pages, 4 figures | null | null | null | stat.ML cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a certain class of distributions, we prove that the linear programming
relaxation of $k$-medoids clustering---a variant of $k$-means clustering where
means are replaced by exemplars from within the dataset---distinguishes points
drawn from nonoverlapping balls with high probability once the number of points
drawn and the separation distance between any two balls are sufficiently large.
Our results hold in the nontrivial regime where the separation distance is
small enough that points drawn from different balls may be closer to each other
than points drawn from the same ball; in this case, clustering by thresholding
pairwise distances between points can fail. We also exhibit numerical evidence
of high-probability recovery in a substantially more permissive regime.
| [
{
"version": "v1",
"created": "Thu, 12 Sep 2013 19:38:18 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Feb 2014 03:56:31 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Nellore",
"Abhinav",
""
],
[
"Ward",
"Rachel",
""
]
] | TITLE: Recovery guarantees for exemplar-based clustering
ABSTRACT: For a certain class of distributions, we prove that the linear programming
relaxation of $k$-medoids clustering---a variant of $k$-means clustering where
means are replaced by exemplars from within the dataset---distinguishes points
drawn from nonoverlapping balls with high probability once the number of points
drawn and the separation distance between any two balls are sufficiently large.
Our results hold in the nontrivial regime where the separation distance is
small enough that points drawn from different balls may be closer to each other
than points drawn from the same ball; in this case, clustering by thresholding
pairwise distances between points can fail. We also exhibit numerical evidence
of high-probability recovery in a substantially more permissive regime.
|
1311.2663 | Shandian Zhe | Shandian Zhe and Yuan Qi and Youngja Park and Ian Molloy and Suresh
Chari | DinTucker: Scaling up Gaussian process models on multidimensional arrays
with billions of elements | null | null | null | null | cs.LG cs.DC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Infinite Tucker Decomposition (InfTucker) and random function prior models,
as nonparametric Bayesian models on infinite exchangeable arrays, are more
powerful models than widely-used multilinear factorization methods including
Tucker and PARAFAC decomposition, (partly) due to their capability of modeling
nonlinear relationships between array elements. Despite their great predictive
performance and sound theoretical foundations, they cannot handle massive data
due to a prohibitively high training time. To overcome this limitation, we
present Distributed Infinite Tucker (DINTUCKER), a large-scale nonlinear tensor
decomposition algorithm on MAPREDUCE. While maintaining the predictive accuracy
of InfTucker, it is scalable on massive data. DINTUCKER is based on a new
hierarchical Bayesian model that enables local training of InfTucker on
subarrays and information integration from all local training results. We use
distributed stochastic gradient descent, coupled with variational inference, to
train this model. We apply DINTUCKER to multidimensional arrays with billions
of elements from applications in the "Read the Web" project (Carlson et al.,
2010) and in information security and compare it with the state-of-the-art
large-scale tensor decomposition method, GigaTensor. On both datasets,
DINTUCKER achieves significantly higher prediction accuracy with less
computational time.
| [
{
"version": "v1",
"created": "Tue, 12 Nov 2013 02:36:03 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Nov 2013 23:50:57 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Dec 2013 13:56:18 GMT"
},
{
"version": "v4",
"created": "Thu, 23 Jan 2014 05:49:44 GMT"
},
{
"version": "v5",
"created": "Sat, 1 Feb 2014 14:35:04 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Zhe",
"Shandian",
""
],
[
"Qi",
"Yuan",
""
],
[
"Park",
"Youngja",
""
],
[
"Molloy",
"Ian",
""
],
[
"Chari",
"Suresh",
""
]
] | TITLE: DinTucker: Scaling up Gaussian process models on multidimensional arrays
with billions of elements
ABSTRACT: Infinite Tucker Decomposition (InfTucker) and random function prior models,
as nonparametric Bayesian models on infinite exchangeable arrays, are more
powerful models than widely-used multilinear factorization methods including
Tucker and PARAFAC decomposition, (partly) due to their capability of modeling
nonlinear relationships between array elements. Despite their great predictive
performance and sound theoretical foundations, they cannot handle massive data
due to a prohibitively high training time. To overcome this limitation, we
present Distributed Infinite Tucker (DINTUCKER), a large-scale nonlinear tensor
decomposition algorithm on MAPREDUCE. While maintaining the predictive accuracy
of InfTucker, it is scalable on massive data. DINTUCKER is based on a new
hierarchical Bayesian model that enables local training of InfTucker on
subarrays and information integration from all local training results. We use
distributed stochastic gradient descent, coupled with variational inference, to
train this model. We apply DINTUCKER to multidimensional arrays with billions
of elements from applications in the "Read the Web" project (Carlson et al.,
2010) and in information security and compare it with the state-of-the-art
large-scale tensor decomposition method, GigaTensor. On both datasets,
DINTUCKER achieves significantly higher prediction accuracy with less
computational time.
|
1312.6169 | C\'edric Lagnier | C\'edric Lagnier, Simon Bourigault, Sylvain Lamprier, Ludovic Denoyer
and Patrick Gallinari | Learning Information Spread in Content Networks | 4 pages | null | null | null | cs.LG cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a model for predicting the diffusion of content information on
social media. When propagation is usually modeled on discrete graph structures,
we introduce here a continuous diffusion model, where nodes in a diffusion
cascade are projected onto a latent space with the property that their
proximity in this space reflects the temporal diffusion process. We focus on
the task of predicting contaminated users for an initial initial information
source and provide preliminary results on differents datasets.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 22:49:01 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Feb 2014 20:36:57 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Lagnier",
"Cédric",
""
],
[
"Bourigault",
"Simon",
""
],
[
"Lamprier",
"Sylvain",
""
],
[
"Denoyer",
"Ludovic",
""
],
[
"Gallinari",
"Patrick",
""
]
] | TITLE: Learning Information Spread in Content Networks
ABSTRACT: We introduce a model for predicting the diffusion of content information on
social media. When propagation is usually modeled on discrete graph structures,
we introduce here a continuous diffusion model, where nodes in a diffusion
cascade are projected onto a latent space with the property that their
proximity in this space reflects the temporal diffusion process. We focus on
the task of predicting contaminated users for an initial initial information
source and provide preliminary results on differents datasets.
|
1401.2288 | Hemant Kumar Aggarwal | Hemant Kumar Aggarwal and Angshul Majumdar | Extension of Sparse Randomized Kaczmarz Algorithm for Multiple
Measurement Vectors | null | null | null | null | cs.NA cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Kaczmarz algorithm is popular for iteratively solving an overdetermined
system of linear equations. The traditional Kaczmarz algorithm can approximate
the solution in few sweeps through the equations but a randomized version of
the Kaczmarz algorithm was shown to converge exponentially and independent of
number of equations. Recently an algorithm for finding sparse solution to a
linear system of equations has been proposed based on weighted randomized
Kaczmarz algorithm. These algorithms solves single measurement vector problem;
however there are applications were multiple-measurements are available. In
this work, the objective is to solve a multiple measurement vector problem with
common sparse support by modifying the randomized Kaczmarz algorithm. We have
also modeled the problem of face recognition from video as the multiple
measurement vector problem and solved using our proposed technique. We have
compared the proposed algorithm with state-of-art spectral projected gradient
algorithm for multiple measurement vectors on both real and synthetic datasets.
The Monte Carlo simulations confirms that our proposed algorithm have better
recovery and convergence rate than the MMV version of spectral projected
gradient algorithm under fairness constraints.
| [
{
"version": "v1",
"created": "Fri, 10 Jan 2014 11:24:35 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Jan 2014 10:05:15 GMT"
},
{
"version": "v3",
"created": "Sun, 2 Feb 2014 08:13:58 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Aggarwal",
"Hemant Kumar",
""
],
[
"Majumdar",
"Angshul",
""
]
] | TITLE: Extension of Sparse Randomized Kaczmarz Algorithm for Multiple
Measurement Vectors
ABSTRACT: The Kaczmarz algorithm is popular for iteratively solving an overdetermined
system of linear equations. The traditional Kaczmarz algorithm can approximate
the solution in few sweeps through the equations but a randomized version of
the Kaczmarz algorithm was shown to converge exponentially and independent of
number of equations. Recently an algorithm for finding sparse solution to a
linear system of equations has been proposed based on weighted randomized
Kaczmarz algorithm. These algorithms solves single measurement vector problem;
however there are applications were multiple-measurements are available. In
this work, the objective is to solve a multiple measurement vector problem with
common sparse support by modifying the randomized Kaczmarz algorithm. We have
also modeled the problem of face recognition from video as the multiple
measurement vector problem and solved using our proposed technique. We have
compared the proposed algorithm with state-of-art spectral projected gradient
algorithm for multiple measurement vectors on both real and synthetic datasets.
The Monte Carlo simulations confirms that our proposed algorithm have better
recovery and convergence rate than the MMV version of spectral projected
gradient algorithm under fairness constraints.
|
1401.4307 | Khalid Belhajjame | Khalid Belhajjame and Jun Zhao and Daniel Garijo and Kristina Hettne
and Raul Palma and \'Oscar Corcho and Jos\'e-Manuel G\'omez-P\'erez and Sean
Bechhofer and Graham Klyne and Carole Goble | The Research Object Suite of Ontologies: Sharing and Exchanging Research
Data and Methods on the Open Web | 20 pages | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Research in life sciences is increasingly being conducted in a digital and
online environment. In particular, life scientists have been pioneers in
embracing new computational tools to conduct their investigations. To support
the sharing of digital objects produced during such research investigations, we
have witnessed in the last few years the emergence of specialized repositories,
e.g., DataVerse and FigShare. Such repositories provide users with the means to
share and publish datasets that were used or generated in research
investigations. While these repositories have proven their usefulness,
interpreting and reusing evidence for most research results is a challenging
task. Additional contextual descriptions are needed to understand how those
results were generated and/or the circumstances under which they were
concluded. Because of this, scientists are calling for models that go beyond
the publication of datasets to systematically capture the life cycle of
scientific investigations and provide a single entry point to access the
information about the hypothesis investigated, the datasets used, the
experiments carried out, the results of the experiments, the people involved in
the research, etc. In this paper we present the Research Object (RO) suite of
ontologies, which provide a structured container to encapsulate research data
and methods along with essential metadata descriptions. Research Objects are
portable units that enable the sharing, preservation, interpretation and reuse
of research investigation results. The ontologies we present have been designed
in the light of requirements that we gathered from life scientists. They have
been built upon existing popular vocabularies to facilitate interoperability.
Furthermore, we have developed tools to support the creation and sharing of
Research Objects, thereby promoting and facilitating their adoption.
| [
{
"version": "v1",
"created": "Fri, 17 Jan 2014 11:07:52 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Feb 2014 10:27:19 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Belhajjame",
"Khalid",
""
],
[
"Zhao",
"Jun",
""
],
[
"Garijo",
"Daniel",
""
],
[
"Hettne",
"Kristina",
""
],
[
"Palma",
"Raul",
""
],
[
"Corcho",
"Óscar",
""
],
[
"Gómez-Pérez",
"José-Manuel",
""
],
[
"Bechhofer",
"Sean",
""
],
[
"Klyne",
"Graham",
""
],
[
"Goble",
"Carole",
""
]
] | TITLE: The Research Object Suite of Ontologies: Sharing and Exchanging Research
Data and Methods on the Open Web
ABSTRACT: Research in life sciences is increasingly being conducted in a digital and
online environment. In particular, life scientists have been pioneers in
embracing new computational tools to conduct their investigations. To support
the sharing of digital objects produced during such research investigations, we
have witnessed in the last few years the emergence of specialized repositories,
e.g., DataVerse and FigShare. Such repositories provide users with the means to
share and publish datasets that were used or generated in research
investigations. While these repositories have proven their usefulness,
interpreting and reusing evidence for most research results is a challenging
task. Additional contextual descriptions are needed to understand how those
results were generated and/or the circumstances under which they were
concluded. Because of this, scientists are calling for models that go beyond
the publication of datasets to systematically capture the life cycle of
scientific investigations and provide a single entry point to access the
information about the hypothesis investigated, the datasets used, the
experiments carried out, the results of the experiments, the people involved in
the research, etc. In this paper we present the Research Object (RO) suite of
ontologies, which provide a structured container to encapsulate research data
and methods along with essential metadata descriptions. Research Objects are
portable units that enable the sharing, preservation, interpretation and reuse
of research investigation results. The ontologies we present have been designed
in the light of requirements that we gathered from life scientists. They have
been built upon existing popular vocabularies to facilitate interoperability.
Furthermore, we have developed tools to support the creation and sharing of
Research Objects, thereby promoting and facilitating their adoption.
|
1402.0238 | Vincent Labatut | Burcu Kantarc{\i}, Vincent Labatut | Classification of Complex Networks Based on Topological Properties | null | 3rd Conference on Social Computing and its Applications, Karlsruhe
: Germany (2013) | 10.1109/CGC.2013.54 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex networks are a powerful modeling tool, allowing the study of
countless real-world systems. They have been used in very different domains
such as computer science, biology, sociology, management, etc. Authors have
been trying to characterize them using various measures such as degree
distribution, transitivity or average distance. Their goal is to detect certain
properties such as the small-world or scale-free properties. Previous works
have shown some of these properties are present in many different systems,
while others are characteristic of certain types of systems only. However, each
one of these studies generally focuses on a very small number of topological
measures and networks. In this work, we aim at using a more systematic
approach. We first constitute a dataset of 152 publicly available networks,
spanning over 7 different domains. We then process 14 different topological
measures to characterize them in the most possible complete way. Finally, we
apply standard data mining tools to analyze these data. A cluster analysis
reveals it is possible to obtain two significantly distinct clusters of
networks, corresponding roughly to a bisection of the domains modeled by the
networks. On these data, the most discriminant measures are density,
modularity, average degree and transitivity, and at a lesser extent, closeness
and edgebetweenness centralities.Abstract--Complex networks are a powerful
modeling tool, allowing the study of countless real-world systems. They have
been used in very different domains such as computer science, biology,
sociology, management, etc. Authors have been trying to characterize them using
various measures such as degree distribution, transitivity or average distance.
Their goal is to detect certain properties such as the small-world or
scale-free properties. Previous works have shown some of these properties are
present in many different systems, while others are characteristic of certain
types of systems only. However, each one of these studies generally focuses on
a very small number of topological measures and networks. In this work, we aim
at using a more systematic approach. We first constitute a dataset of 152
publicly available networks, spanning over 7 different domains. We then process
14 different topological measures to characterize them in the most possible
complete way. Finally, we apply standard data mining tools to analyze these
data. A cluster analysis reveals it is possible to obtain two significantly
distinct clusters of networks, corresponding roughly to a bisection of the
domains modeled by the networks. On these data, the most discriminant measures
are density, modularity, average degree and transitivity, and at a lesser
extent, closeness and edgebetweenness centralities.
| [
{
"version": "v1",
"created": "Sun, 2 Feb 2014 19:48:52 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Kantarcı",
"Burcu",
""
],
[
"Labatut",
"Vincent",
""
]
] | TITLE: Classification of Complex Networks Based on Topological Properties
ABSTRACT: Complex networks are a powerful modeling tool, allowing the study of
countless real-world systems. They have been used in very different domains
such as computer science, biology, sociology, management, etc. Authors have
been trying to characterize them using various measures such as degree
distribution, transitivity or average distance. Their goal is to detect certain
properties such as the small-world or scale-free properties. Previous works
have shown some of these properties are present in many different systems,
while others are characteristic of certain types of systems only. However, each
one of these studies generally focuses on a very small number of topological
measures and networks. In this work, we aim at using a more systematic
approach. We first constitute a dataset of 152 publicly available networks,
spanning over 7 different domains. We then process 14 different topological
measures to characterize them in the most possible complete way. Finally, we
apply standard data mining tools to analyze these data. A cluster analysis
reveals it is possible to obtain two significantly distinct clusters of
networks, corresponding roughly to a bisection of the domains modeled by the
networks. On these data, the most discriminant measures are density,
modularity, average degree and transitivity, and at a lesser extent, closeness
and edgebetweenness centralities.Abstract--Complex networks are a powerful
modeling tool, allowing the study of countless real-world systems. They have
been used in very different domains such as computer science, biology,
sociology, management, etc. Authors have been trying to characterize them using
various measures such as degree distribution, transitivity or average distance.
Their goal is to detect certain properties such as the small-world or
scale-free properties. Previous works have shown some of these properties are
present in many different systems, while others are characteristic of certain
types of systems only. However, each one of these studies generally focuses on
a very small number of topological measures and networks. In this work, we aim
at using a more systematic approach. We first constitute a dataset of 152
publicly available networks, spanning over 7 different domains. We then process
14 different topological measures to characterize them in the most possible
complete way. Finally, we apply standard data mining tools to analyze these
data. A cluster analysis reveals it is possible to obtain two significantly
distinct clusters of networks, corresponding roughly to a bisection of the
domains modeled by the networks. On these data, the most discriminant measures
are density, modularity, average degree and transitivity, and at a lesser
extent, closeness and edgebetweenness centralities.
|
1402.0420 | Luca Vassio Mr | Francesco Bertini, Lorenzo Dal Mas, Luca Vassio and Enrico Ampellio | Multidiscipinary Optimization For Gas Turbines Design | 12 pages, 6 figures. Presented at the XXII Italian Association of
Aeronautics and Astronautics Conference (2013) | null | null | null | math.OC cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | State-of-the-art aeronautic Low Pressure gas Turbines (LPTs) are already
characterized by high quality standards, thus they offer very narrow margins of
improvement. Typical design process starts with a Concept Design (CD) phase,
defined using mean-line 1D and other low-order tools, and evolves through a
Preliminary Design (PD) phase, which allows the geometric definition in
details. In this framework, multidisciplinary optimization is the only way to
properly handle the complicated peculiarities of the design. The authors
present different strategies and algorithms that have been implemented
exploiting the PD phase as a real-like design benchmark to illustrate results.
The purpose of this work is to describe the optimization techniques, their
settings and how to implement them effectively in a multidisciplinary
environment. Starting from a basic gradient method and a semi-random second
order method, the authors have introduced an Artificial Bee Colony-like
optimizer, a multi-objective Genetic Diversity Evolutionary Algorithm [1] and a
multi-objective response surface approach based on Artificial Neural Network,
parallelizing and customizing them for the gas turbine study. Moreover, speedup
and improvement arrangements are embedded in different hybrid strategies with
the aim at finding the best solutions for different kind of problems that arise
in this field.
| [
{
"version": "v1",
"created": "Mon, 3 Feb 2014 16:38:51 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Bertini",
"Francesco",
""
],
[
"Mas",
"Lorenzo Dal",
""
],
[
"Vassio",
"Luca",
""
],
[
"Ampellio",
"Enrico",
""
]
] | TITLE: Multidiscipinary Optimization For Gas Turbines Design
ABSTRACT: State-of-the-art aeronautic Low Pressure gas Turbines (LPTs) are already
characterized by high quality standards, thus they offer very narrow margins of
improvement. Typical design process starts with a Concept Design (CD) phase,
defined using mean-line 1D and other low-order tools, and evolves through a
Preliminary Design (PD) phase, which allows the geometric definition in
details. In this framework, multidisciplinary optimization is the only way to
properly handle the complicated peculiarities of the design. The authors
present different strategies and algorithms that have been implemented
exploiting the PD phase as a real-like design benchmark to illustrate results.
The purpose of this work is to describe the optimization techniques, their
settings and how to implement them effectively in a multidisciplinary
environment. Starting from a basic gradient method and a semi-random second
order method, the authors have introduced an Artificial Bee Colony-like
optimizer, a multi-objective Genetic Diversity Evolutionary Algorithm [1] and a
multi-objective response surface approach based on Artificial Neural Network,
parallelizing and customizing them for the gas turbine study. Moreover, speedup
and improvement arrangements are embedded in different hybrid strategies with
the aim at finding the best solutions for different kind of problems that arise
in this field.
|
1402.0459 | Haoyang (Hubert) Duan | Hubert Haoyang Duan | Applying Supervised Learning Algorithms and a New Feature Selection
Method to Predict Coronary Artery Disease | This is a Master of Science in Mathematics thesis under the
supervision of Dr. Vladimir Pestov and Dr. George Wells submitted on January
31, 2014 at the University of Ottawa; 102 pages and 15 figures | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | From a fresh data science perspective, this thesis discusses the prediction
of coronary artery disease based on genetic variations at the DNA base pair
level, called Single-Nucleotide Polymorphisms (SNPs), collected from the
Ontario Heart Genomics Study (OHGS).
First, the thesis explains two commonly used supervised learning algorithms,
the k-Nearest Neighbour (k-NN) and Random Forest classifiers, and includes a
complete proof that the k-NN classifier is universally consistent in any finite
dimensional normed vector space. Second, the thesis introduces two
dimensionality reduction steps, Random Projections, a known feature extraction
technique based on the Johnson-Lindenstrauss lemma, and a new method termed
Mass Transportation Distance (MTD) Feature Selection for discrete domains.
Then, this thesis compares the performance of Random Projections with the k-NN
classifier against MTD Feature Selection and Random Forest, for predicting
artery disease based on accuracy, the F-Measure, and area under the Receiver
Operating Characteristic (ROC) curve.
The comparative results demonstrate that MTD Feature Selection with Random
Forest is vastly superior to Random Projections and k-NN. The Random Forest
classifier is able to obtain an accuracy of 0.6660 and an area under the ROC
curve of 0.8562 on the OHGS genetic dataset, when 3335 SNPs are selected by MTD
Feature Selection for classification. This area is considerably better than the
previous high score of 0.608 obtained by Davies et al. in 2010 on the same
dataset.
| [
{
"version": "v1",
"created": "Mon, 3 Feb 2014 18:47:41 GMT"
}
] | 2014-02-04T00:00:00 | [
[
"Duan",
"Hubert Haoyang",
""
]
] | TITLE: Applying Supervised Learning Algorithms and a New Feature Selection
Method to Predict Coronary Artery Disease
ABSTRACT: From a fresh data science perspective, this thesis discusses the prediction
of coronary artery disease based on genetic variations at the DNA base pair
level, called Single-Nucleotide Polymorphisms (SNPs), collected from the
Ontario Heart Genomics Study (OHGS).
First, the thesis explains two commonly used supervised learning algorithms,
the k-Nearest Neighbour (k-NN) and Random Forest classifiers, and includes a
complete proof that the k-NN classifier is universally consistent in any finite
dimensional normed vector space. Second, the thesis introduces two
dimensionality reduction steps, Random Projections, a known feature extraction
technique based on the Johnson-Lindenstrauss lemma, and a new method termed
Mass Transportation Distance (MTD) Feature Selection for discrete domains.
Then, this thesis compares the performance of Random Projections with the k-NN
classifier against MTD Feature Selection and Random Forest, for predicting
artery disease based on accuracy, the F-Measure, and area under the Receiver
Operating Characteristic (ROC) curve.
The comparative results demonstrate that MTD Feature Selection with Random
Forest is vastly superior to Random Projections and k-NN. The Random Forest
classifier is able to obtain an accuracy of 0.6660 and an area under the ROC
curve of 0.8562 on the OHGS genetic dataset, when 3335 SNPs are selected by MTD
Feature Selection for classification. This area is considerably better than the
previous high score of 0.608 obtained by Davies et al. in 2010 on the same
dataset.
|
1310.4822 | Hugo Jair Escalante | Hugo Jair Escalante, Isabelle Guyon, Vassilis Athitsos, Pat
Jangyodsuk, Jun Wan | Principal motion components for gesture recognition using a
single-example | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces principal motion components (PMC), a new method for
one-shot gesture recognition. In the considered scenario a single
training-video is available for each gesture to be recognized, which limits the
application of traditional techniques (e.g., HMMs). In PMC, a 2D map of motion
energy is obtained per each pair of consecutive frames in a video. Motion maps
associated to a video are processed to obtain a PCA model, which is used for
recognition under a reconstruction-error approach. The main benefits of the
proposed approach are its simplicity, easiness of implementation, competitive
performance and efficiency. We report experimental results in one-shot gesture
recognition using the ChaLearn Gesture Dataset; a benchmark comprising more
than 50,000 gestures, recorded as both RGB and depth video with a Kinect
camera. Results obtained with PMC are competitive with alternative methods
proposed for the same data set.
| [
{
"version": "v1",
"created": "Thu, 17 Oct 2013 19:52:50 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Jan 2014 12:04:41 GMT"
}
] | 2014-02-03T00:00:00 | [
[
"Escalante",
"Hugo Jair",
""
],
[
"Guyon",
"Isabelle",
""
],
[
"Athitsos",
"Vassilis",
""
],
[
"Jangyodsuk",
"Pat",
""
],
[
"Wan",
"Jun",
""
]
] | TITLE: Principal motion components for gesture recognition using a
single-example
ABSTRACT: This paper introduces principal motion components (PMC), a new method for
one-shot gesture recognition. In the considered scenario a single
training-video is available for each gesture to be recognized, which limits the
application of traditional techniques (e.g., HMMs). In PMC, a 2D map of motion
energy is obtained per each pair of consecutive frames in a video. Motion maps
associated to a video are processed to obtain a PCA model, which is used for
recognition under a reconstruction-error approach. The main benefits of the
proposed approach are its simplicity, easiness of implementation, competitive
performance and efficiency. We report experimental results in one-shot gesture
recognition using the ChaLearn Gesture Dataset; a benchmark comprising more
than 50,000 gestures, recorded as both RGB and depth video with a Kinect
camera. Results obtained with PMC are competitive with alternative methods
proposed for the same data set.
|
1401.8132 | Giuseppe Vizzari | Stefania Bandini, Luca Crociani, Giuseppe Vizzari | Heterogeneous Speed Profiles in Discrete Models for Pedestrian
Simulation | Poster at the 93rd Transportation Research Board annual meeting,
Washington, January 2014 - Committee number AHB45 - TRB Committee on Traffic
Flow Theory and Characteristics | null | null | null | cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discrete pedestrian simulation models are viable alternatives to particle
based approaches based on a continuous spatial representation. The effects of
discretisation, however, also imply some difficulties in modelling certain
phenomena that can be observed in reality. This paper focuses on the
possibility to manage heterogeneity in the walking speed of the simulated
population of pedestrians by modifying an existing multi-agent model extending
the floor field approach. Whereas some discrete models allow pedestrians (or
cars, when applied to traffic modelling) to move more than a single cell per
time step, the present work proposes a maximum speed of one cell per step, but
we model lower speeds by having pedestrians yielding their movement in some
turns. Different classes of pedestrians are associated to different desired
walking speeds and we define a stochastic mechanism ensuring that they maintain
an average speed close to this threshold. In the paper we formally describe the
model and we show the results of its application in benchmark scenarios.
Finally, we also show how this approach can also support the definition of
slopes and stairs as elements reducing the walking speed of pedestrians
climbing them in a simulated scenario.
| [
{
"version": "v1",
"created": "Fri, 31 Jan 2014 11:07:25 GMT"
}
] | 2014-02-03T00:00:00 | [
[
"Bandini",
"Stefania",
""
],
[
"Crociani",
"Luca",
""
],
[
"Vizzari",
"Giuseppe",
""
]
] | TITLE: Heterogeneous Speed Profiles in Discrete Models for Pedestrian
Simulation
ABSTRACT: Discrete pedestrian simulation models are viable alternatives to particle
based approaches based on a continuous spatial representation. The effects of
discretisation, however, also imply some difficulties in modelling certain
phenomena that can be observed in reality. This paper focuses on the
possibility to manage heterogeneity in the walking speed of the simulated
population of pedestrians by modifying an existing multi-agent model extending
the floor field approach. Whereas some discrete models allow pedestrians (or
cars, when applied to traffic modelling) to move more than a single cell per
time step, the present work proposes a maximum speed of one cell per step, but
we model lower speeds by having pedestrians yielding their movement in some
turns. Different classes of pedestrians are associated to different desired
walking speeds and we define a stochastic mechanism ensuring that they maintain
an average speed close to this threshold. In the paper we formally describe the
model and we show the results of its application in benchmark scenarios.
Finally, we also show how this approach can also support the definition of
slopes and stairs as elements reducing the walking speed of pedestrians
climbing them in a simulated scenario.
|
1401.7727 | Benjamin Rubinstein | Battista Biggio and Igino Corona and Blaine Nelson and Benjamin I. P.
Rubinstein and Davide Maiorca and Giorgio Fumera and Giorgio Giacinto and and
Fabio Roli | Security Evaluation of Support Vector Machines in Adversarial
Environments | 47 pages, 9 figures; chapter accepted into book 'Support Vector
Machine Applications' | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Support Vector Machines (SVMs) are among the most popular classification
techniques adopted in security applications like malware detection, intrusion
detection, and spam filtering. However, if SVMs are to be incorporated in
real-world security systems, they must be able to cope with attack patterns
that can either mislead the learning algorithm (poisoning), evade detection
(evasion), or gain information about their internal parameters (privacy
breaches). The main contributions of this chapter are twofold. First, we
introduce a formal general framework for the empirical evaluation of the
security of machine-learning systems. Second, according to our framework, we
demonstrate the feasibility of evasion, poisoning and privacy attacks against
SVMs in real-world security problems. For each attack technique, we evaluate
its impact and discuss whether (and how) it can be countered through an
adversary-aware design of SVMs. Our experiments are easily reproducible thanks
to open-source code that we have made available, together with all the employed
datasets, on a public repository.
| [
{
"version": "v1",
"created": "Thu, 30 Jan 2014 03:37:18 GMT"
}
] | 2014-01-31T00:00:00 | [
[
"Biggio",
"Battista",
""
],
[
"Corona",
"Igino",
""
],
[
"Nelson",
"Blaine",
""
],
[
"Rubinstein",
"Benjamin I. P.",
""
],
[
"Maiorca",
"Davide",
""
],
[
"Fumera",
"Giorgio",
""
],
[
"Giacinto",
"Giorgio",
""
],
[
"Roli",
"and Fabio",
""
]
] | TITLE: Security Evaluation of Support Vector Machines in Adversarial
Environments
ABSTRACT: Support Vector Machines (SVMs) are among the most popular classification
techniques adopted in security applications like malware detection, intrusion
detection, and spam filtering. However, if SVMs are to be incorporated in
real-world security systems, they must be able to cope with attack patterns
that can either mislead the learning algorithm (poisoning), evade detection
(evasion), or gain information about their internal parameters (privacy
breaches). The main contributions of this chapter are twofold. First, we
introduce a formal general framework for the empirical evaluation of the
security of machine-learning systems. Second, according to our framework, we
demonstrate the feasibility of evasion, poisoning and privacy attacks against
SVMs in real-world security problems. For each attack technique, we evaluate
its impact and discuss whether (and how) it can be countered through an
adversary-aware design of SVMs. Our experiments are easily reproducible thanks
to open-source code that we have made available, together with all the employed
datasets, on a public repository.
|
1310.6775 | Linas Vepstas PhD | Linas Vepstas | Durkheim Project Data Analysis Report | 43 pages, to appear as appendix of primary science publication
Poulin, et al "Predicting the risk of suicide by analyzing the text of
clinical notes" | null | 10.1371/journal.pone.0085733.s001 | null | cs.AI cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This report describes the suicidality prediction models created under the
DARPA DCAPS program in association with the Durkheim Project
[http://durkheimproject.org/]. The models were built primarily from
unstructured text (free-format clinician notes) for several hundred patient
records obtained from the Veterans Health Administration (VHA). The models were
constructed using a genetic programming algorithm applied to bag-of-words and
bag-of-phrases datasets. The influence of additional structured data was
explored but was found to be minor. Given the small dataset size,
classification between cohorts was high fidelity (98%). Cross-validation
suggests these models are reasonably predictive, with an accuracy of 50% to 69%
on five rotating folds, with ensemble averages of 58% to 67%. One particularly
noteworthy result is that word-pairs can dramatically improve classification
accuracy; but this is the case only when one of the words in the pair is
already known to have a high predictive value. By contrast, the set of all
possible word-pairs does not improve on a simple bag-of-words model.
| [
{
"version": "v1",
"created": "Thu, 24 Oct 2013 21:10:53 GMT"
}
] | 2014-01-30T00:00:00 | [
[
"Vepstas",
"Linas",
""
]
] | TITLE: Durkheim Project Data Analysis Report
ABSTRACT: This report describes the suicidality prediction models created under the
DARPA DCAPS program in association with the Durkheim Project
[http://durkheimproject.org/]. The models were built primarily from
unstructured text (free-format clinician notes) for several hundred patient
records obtained from the Veterans Health Administration (VHA). The models were
constructed using a genetic programming algorithm applied to bag-of-words and
bag-of-phrases datasets. The influence of additional structured data was
explored but was found to be minor. Given the small dataset size,
classification between cohorts was high fidelity (98%). Cross-validation
suggests these models are reasonably predictive, with an accuracy of 50% to 69%
on five rotating folds, with ensemble averages of 58% to 67%. One particularly
noteworthy result is that word-pairs can dramatically improve classification
accuracy; but this is the case only when one of the words in the pair is
already known to have a high predictive value. By contrast, the set of all
possible word-pairs does not improve on a simple bag-of-words model.
|
1311.2334 | Ahmed Elgohary | Ahmed Elgohary, Ahmed K. Farahat, Mohamed S. Kamel, Fakhri Karray | Embed and Conquer: Scalable Embeddings for Kernel k-Means on MapReduce | Appears in Proceedings of the SIAM International Conference on Data
Mining (SDM), 2014 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The kernel $k$-means is an effective method for data clustering which extends
the commonly-used $k$-means algorithm to work on a similarity matrix over
complex data structures. The kernel $k$-means algorithm is however
computationally very complex as it requires the complete data matrix to be
calculated and stored. Further, the kernelized nature of the kernel $k$-means
algorithm hinders the parallelization of its computations on modern
infrastructures for distributed computing. In this paper, we are defining a
family of kernel-based low-dimensional embeddings that allows for scaling
kernel $k$-means on MapReduce via an efficient and unified parallelization
strategy. Afterwards, we propose two methods for low-dimensional embedding that
adhere to our definition of the embedding family. Exploiting the proposed
parallelization strategy, we present two scalable MapReduce algorithms for
kernel $k$-means. We demonstrate the effectiveness and efficiency of the
proposed algorithms through an empirical evaluation on benchmark data sets.
| [
{
"version": "v1",
"created": "Mon, 11 Nov 2013 02:37:16 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Nov 2013 15:41:40 GMT"
},
{
"version": "v3",
"created": "Sat, 28 Dec 2013 03:56:35 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Jan 2014 20:08:17 GMT"
}
] | 2014-01-30T00:00:00 | [
[
"Elgohary",
"Ahmed",
""
],
[
"Farahat",
"Ahmed K.",
""
],
[
"Kamel",
"Mohamed S.",
""
],
[
"Karray",
"Fakhri",
""
]
] | TITLE: Embed and Conquer: Scalable Embeddings for Kernel k-Means on MapReduce
ABSTRACT: The kernel $k$-means is an effective method for data clustering which extends
the commonly-used $k$-means algorithm to work on a similarity matrix over
complex data structures. The kernel $k$-means algorithm is however
computationally very complex as it requires the complete data matrix to be
calculated and stored. Further, the kernelized nature of the kernel $k$-means
algorithm hinders the parallelization of its computations on modern
infrastructures for distributed computing. In this paper, we are defining a
family of kernel-based low-dimensional embeddings that allows for scaling
kernel $k$-means on MapReduce via an efficient and unified parallelization
strategy. Afterwards, we propose two methods for low-dimensional embedding that
adhere to our definition of the embedding family. Exploiting the proposed
parallelization strategy, we present two scalable MapReduce algorithms for
kernel $k$-means. We demonstrate the effectiveness and efficiency of the
proposed algorithms through an empirical evaluation on benchmark data sets.
|
1401.1974 | Vu Nguyen | Vu Nguyen, Dinh Phung, XuanLong Nguyen, Svetha Venkatesh, Hung Hai Bui | Bayesian Nonparametric Multilevel Clustering with Group-Level Contexts | Full version of ICML 2014 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a Bayesian nonparametric framework for multilevel clustering which
utilizes group-level context information to simultaneously discover
low-dimensional structures of the group contents and partitions groups into
clusters. Using the Dirichlet process as the building block, our model
constructs a product base-measure with a nested structure to accommodate
content and context observations at multiple levels. The proposed model
possesses properties that link the nested Dirichlet processes (nDP) and the
Dirichlet process mixture models (DPM) in an interesting way: integrating out
all contents results in the DPM over contexts, whereas integrating out
group-specific contexts results in the nDP mixture over content variables. We
provide a Polya-urn view of the model and an efficient collapsed Gibbs
inference procedure. Extensive experiments on real-world datasets demonstrate
the advantage of utilizing context information via our model in both text and
image domains.
| [
{
"version": "v1",
"created": "Thu, 9 Jan 2014 12:08:07 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Jan 2014 06:28:03 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Jan 2014 08:13:58 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Jan 2014 01:54:57 GMT"
}
] | 2014-01-30T00:00:00 | [
[
"Nguyen",
"Vu",
""
],
[
"Phung",
"Dinh",
""
],
[
"Nguyen",
"XuanLong",
""
],
[
"Venkatesh",
"Svetha",
""
],
[
"Bui",
"Hung Hai",
""
]
] | TITLE: Bayesian Nonparametric Multilevel Clustering with Group-Level Contexts
ABSTRACT: We present a Bayesian nonparametric framework for multilevel clustering which
utilizes group-level context information to simultaneously discover
low-dimensional structures of the group contents and partitions groups into
clusters. Using the Dirichlet process as the building block, our model
constructs a product base-measure with a nested structure to accommodate
content and context observations at multiple levels. The proposed model
possesses properties that link the nested Dirichlet processes (nDP) and the
Dirichlet process mixture models (DPM) in an interesting way: integrating out
all contents results in the DPM over contexts, whereas integrating out
group-specific contexts results in the nDP mixture over content variables. We
provide a Polya-urn view of the model and an efficient collapsed Gibbs
inference procedure. Extensive experiments on real-world datasets demonstrate
the advantage of utilizing context information via our model in both text and
image domains.
|
1401.7494 | Johannes Hofmann | Johannes Hofmann, Jan Treibig, Georg Hager, Gerhard Wellein | Comparing the Performance of Different x86 SIMD Instruction Sets for a
Medical Imaging Application on Modern Multi- and Manycore Chips | arXiv admin note: text overlap with arXiv:1401.3615 | null | 10.1145/2568058.2568068 | null | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Single Instruction, Multiple Data (SIMD) vectorization is a major driver of
performance in current architectures, and is mandatory for achieving good
performance with codes that are limited by instruction throughput. We
investigate the efficiency of different SIMD-vectorized implementations of the
RabbitCT benchmark. RabbitCT performs 3D image reconstruction by back
projection, a vital operation in computed tomography applications. The
underlying algorithm is a challenge for vectorization because it consists,
apart from a streaming part, also of a bilinear interpolation requiring
scattered access to image data. We analyze the performance of SSE (128 bit),
AVX (256 bit), AVX2 (256 bit), and IMCI (512 bit) implementations on recent
Intel x86 systems. A special emphasis is put on the vector gather
implementation on Intel Haswell and Knights Corner microarchitectures. Finally
we discuss why GPU implementations perform much better for this specific
algorithm.
| [
{
"version": "v1",
"created": "Wed, 29 Jan 2014 12:41:44 GMT"
}
] | 2014-01-30T00:00:00 | [
[
"Hofmann",
"Johannes",
""
],
[
"Treibig",
"Jan",
""
],
[
"Hager",
"Georg",
""
],
[
"Wellein",
"Gerhard",
""
]
] | TITLE: Comparing the Performance of Different x86 SIMD Instruction Sets for a
Medical Imaging Application on Modern Multi- and Manycore Chips
ABSTRACT: Single Instruction, Multiple Data (SIMD) vectorization is a major driver of
performance in current architectures, and is mandatory for achieving good
performance with codes that are limited by instruction throughput. We
investigate the efficiency of different SIMD-vectorized implementations of the
RabbitCT benchmark. RabbitCT performs 3D image reconstruction by back
projection, a vital operation in computed tomography applications. The
underlying algorithm is a challenge for vectorization because it consists,
apart from a streaming part, also of a bilinear interpolation requiring
scattered access to image data. We analyze the performance of SSE (128 bit),
AVX (256 bit), AVX2 (256 bit), and IMCI (512 bit) implementations on recent
Intel x86 systems. A special emphasis is put on the vector gather
implementation on Intel Haswell and Knights Corner microarchitectures. Finally
we discuss why GPU implementations perform much better for this specific
algorithm.
|
1207.7253 | S\'ebastien Gigu\`ere | S\'ebastien Gigu\`ere, Mario Marchand, Fran\c{c}ois Laviolette,
Alexandre Drouin and Jacques Corbeil | Learning a peptide-protein binding affinity predictor with kernel ridge
regression | 22 pages, 4 figures, 5 tables | BMC Bioinformatics 2013, 14:82 | 10.1186/1471-2105-14-82 | null | q-bio.QM cs.LG q-bio.BM stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a specialized string kernel for small bio-molecules, peptides and
pseudo-sequences of binding interfaces. The kernel incorporates
physico-chemical properties of amino acids and elegantly generalize eight
kernels, such as the Oligo, the Weighted Degree, the Blended Spectrum, and the
Radial Basis Function. We provide a low complexity dynamic programming
algorithm for the exact computation of the kernel and a linear time algorithm
for it's approximation. Combined with kernel ridge regression and SupCK, a
novel binding pocket kernel, the proposed kernel yields biologically relevant
and good prediction accuracy on the PepX database. For the first time, a
machine learning predictor is capable of accurately predicting the binding
affinity of any peptide to any protein. The method was also applied to both
single-target and pan-specific Major Histocompatibility Complex class II
benchmark datasets and three Quantitative Structure Affinity Model benchmark
datasets.
On all benchmarks, our method significantly (p-value < 0.057) outperforms the
current state-of-the-art methods at predicting peptide-protein binding
affinities. The proposed approach is flexible and can be applied to predict any
quantitative biological activity. The method should be of value to a large
segment of the research community with the potential to accelerate
peptide-based drug and vaccine development.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2012 14:11:31 GMT"
}
] | 2014-01-29T00:00:00 | [
[
"Giguère",
"Sébastien",
""
],
[
"Marchand",
"Mario",
""
],
[
"Laviolette",
"François",
""
],
[
"Drouin",
"Alexandre",
""
],
[
"Corbeil",
"Jacques",
""
]
] | TITLE: Learning a peptide-protein binding affinity predictor with kernel ridge
regression
ABSTRACT: We propose a specialized string kernel for small bio-molecules, peptides and
pseudo-sequences of binding interfaces. The kernel incorporates
physico-chemical properties of amino acids and elegantly generalize eight
kernels, such as the Oligo, the Weighted Degree, the Blended Spectrum, and the
Radial Basis Function. We provide a low complexity dynamic programming
algorithm for the exact computation of the kernel and a linear time algorithm
for it's approximation. Combined with kernel ridge regression and SupCK, a
novel binding pocket kernel, the proposed kernel yields biologically relevant
and good prediction accuracy on the PepX database. For the first time, a
machine learning predictor is capable of accurately predicting the binding
affinity of any peptide to any protein. The method was also applied to both
single-target and pan-specific Major Histocompatibility Complex class II
benchmark datasets and three Quantitative Structure Affinity Model benchmark
datasets.
On all benchmarks, our method significantly (p-value < 0.057) outperforms the
current state-of-the-art methods at predicting peptide-protein binding
affinities. The proposed approach is flexible and can be applied to predict any
quantitative biological activity. The method should be of value to a large
segment of the research community with the potential to accelerate
peptide-based drug and vaccine development.
|
1212.0695 | Emanuele Frandi | Emanuele Frandi, Ricardo Nanculef, Maria Grazia Gasparo, Stefano Lodi,
Claudio Sartori | Training Support Vector Machines Using Frank-Wolfe Optimization Methods | null | International Journal on Pattern Recognition and Artificial
Intelligence, 27(3), 2013 | 10.1142/S0218001413600033 | null | cs.LG cs.CV math.OC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Training a Support Vector Machine (SVM) requires the solution of a quadratic
programming problem (QP) whose computational complexity becomes prohibitively
expensive for large scale datasets. Traditional optimization methods cannot be
directly applied in these cases, mainly due to memory restrictions.
By adopting a slightly different objective function and under mild conditions
on the kernel used within the model, efficient algorithms to train SVMs have
been devised under the name of Core Vector Machines (CVMs). This framework
exploits the equivalence of the resulting learning problem with the task of
building a Minimal Enclosing Ball (MEB) problem in a feature space, where data
is implicitly embedded by a kernel function.
In this paper, we improve on the CVM approach by proposing two novel methods
to build SVMs based on the Frank-Wolfe algorithm, recently revisited as a fast
method to approximate the solution of a MEB problem. In contrast to CVMs, our
algorithms do not require to compute the solutions of a sequence of
increasingly complex QPs and are defined by using only analytic optimization
steps. Experiments on a large collection of datasets show that our methods
scale better than CVMs in most cases, sometimes at the price of a slightly
lower accuracy. As CVMs, the proposed methods can be easily extended to machine
learning problems other than binary classification. However, effective
classifiers are also obtained using kernels which do not satisfy the condition
required by CVMs and can thus be used for a wider set of problems.
| [
{
"version": "v1",
"created": "Tue, 4 Dec 2012 12:05:31 GMT"
}
] | 2014-01-29T00:00:00 | [
[
"Frandi",
"Emanuele",
""
],
[
"Nanculef",
"Ricardo",
""
],
[
"Gasparo",
"Maria Grazia",
""
],
[
"Lodi",
"Stefano",
""
],
[
"Sartori",
"Claudio",
""
]
] | TITLE: Training Support Vector Machines Using Frank-Wolfe Optimization Methods
ABSTRACT: Training a Support Vector Machine (SVM) requires the solution of a quadratic
programming problem (QP) whose computational complexity becomes prohibitively
expensive for large scale datasets. Traditional optimization methods cannot be
directly applied in these cases, mainly due to memory restrictions.
By adopting a slightly different objective function and under mild conditions
on the kernel used within the model, efficient algorithms to train SVMs have
been devised under the name of Core Vector Machines (CVMs). This framework
exploits the equivalence of the resulting learning problem with the task of
building a Minimal Enclosing Ball (MEB) problem in a feature space, where data
is implicitly embedded by a kernel function.
In this paper, we improve on the CVM approach by proposing two novel methods
to build SVMs based on the Frank-Wolfe algorithm, recently revisited as a fast
method to approximate the solution of a MEB problem. In contrast to CVMs, our
algorithms do not require to compute the solutions of a sequence of
increasingly complex QPs and are defined by using only analytic optimization
steps. Experiments on a large collection of datasets show that our methods
scale better than CVMs in most cases, sometimes at the price of a slightly
lower accuracy. As CVMs, the proposed methods can be easily extended to machine
learning problems other than binary classification. However, effective
classifiers are also obtained using kernels which do not satisfy the condition
required by CVMs and can thus be used for a wider set of problems.
|
1307.7838 | Sang Yeob Jung | Sang Yeob Jung, Seung Min Yu, and Seong-Lyun Kim | Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband
Services | null | null | null | null | cs.NI cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study bidding and pricing competition between two spiteful mobile network
operators (MNOs) with considering their existing spectrum holdings. Given
asymmetric-valued spectrum blocks are auctioned off to them via a first-price
sealed-bid auction, we investigate the interactions between two spiteful MNOs
and users as a three-stage dynamic game and characterize the dynamic game's
equilibria. We show an asymmetric pricing structure and different market share
between two spiteful MNOs. Perhaps counter-intuitively, our results show that
the MNO who acquires the less-valued spectrum block always lowers his service
price despite providing double-speed LTE service to users. We also show that
the MNO who acquires the high-valued spectrum block, despite charing a higher
price, still achieves more market share than the other MNO. We further show
that the competition between two MNOs leads to some loss of their revenues. By
investigating a cross-over point at which the MNOs' profits are switched, it
serves as the benchmark of practical auction designs.
| [
{
"version": "v1",
"created": "Tue, 30 Jul 2013 06:51:02 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Jan 2014 13:10:14 GMT"
}
] | 2014-01-28T00:00:00 | [
[
"Jung",
"Sang Yeob",
""
],
[
"Yu",
"Seung Min",
""
],
[
"Kim",
"Seong-Lyun",
""
]
] | TITLE: Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband
Services
ABSTRACT: We study bidding and pricing competition between two spiteful mobile network
operators (MNOs) with considering their existing spectrum holdings. Given
asymmetric-valued spectrum blocks are auctioned off to them via a first-price
sealed-bid auction, we investigate the interactions between two spiteful MNOs
and users as a three-stage dynamic game and characterize the dynamic game's
equilibria. We show an asymmetric pricing structure and different market share
between two spiteful MNOs. Perhaps counter-intuitively, our results show that
the MNO who acquires the less-valued spectrum block always lowers his service
price despite providing double-speed LTE service to users. We also show that
the MNO who acquires the high-valued spectrum block, despite charing a higher
price, still achieves more market share than the other MNO. We further show
that the competition between two MNOs leads to some loss of their revenues. By
investigating a cross-over point at which the MNOs' profits are switched, it
serves as the benchmark of practical auction designs.
|
1312.6597 | Luis Marujo | Luis Marujo, Anatole Gershman, Jaime Carbonell, David Martins de
Matos, Jo\~ao P. Neto | Co-Multistage of Multiple Classifiers for Imbalanced Multiclass Learning | Preliminary version of the paper | null | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we propose two stochastic architectural models (CMC and CMC-M)
with two layers of classifiers applicable to datasets with one and multiple
skewed classes. This distinction becomes important when the datasets have a
large number of classes. Therefore, we present a novel solution to imbalanced
multiclass learning with several skewed majority classes, which improves
minority classes identification. This fact is particularly important for text
classification tasks, such as event detection. Our models combined with
pre-processing sampling techniques improved the classification results on six
well-known datasets. Finally, we have also introduced a new metric SG-Mean to
overcome the multiplication by zero limitation of G-Mean.
| [
{
"version": "v1",
"created": "Mon, 23 Dec 2013 16:52:56 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Jan 2014 23:09:17 GMT"
}
] | 2014-01-28T00:00:00 | [
[
"Marujo",
"Luis",
""
],
[
"Gershman",
"Anatole",
""
],
[
"Carbonell",
"Jaime",
""
],
[
"de Matos",
"David Martins",
""
],
[
"Neto",
"João P.",
""
]
] | TITLE: Co-Multistage of Multiple Classifiers for Imbalanced Multiclass Learning
ABSTRACT: In this work, we propose two stochastic architectural models (CMC and CMC-M)
with two layers of classifiers applicable to datasets with one and multiple
skewed classes. This distinction becomes important when the datasets have a
large number of classes. Therefore, we present a novel solution to imbalanced
multiclass learning with several skewed majority classes, which improves
minority classes identification. This fact is particularly important for text
classification tasks, such as event detection. Our models combined with
pre-processing sampling techniques improved the classification results on six
well-known datasets. Finally, we have also introduced a new metric SG-Mean to
overcome the multiplication by zero limitation of G-Mean.
|
1401.6484 | Kiran Sree Pokkuluri Prof | Pokkuluri Kiran Sree, Inampudi Ramesh Babu | Identification of Protein Coding Regions in Genomic DNA Using
Unsupervised FMACA Based Pattern Classifier | arXiv admin note: text overlap with arXiv:1312.2642 | IJCSNS International Journal of Computer Science and Network
Security, VOL.8 No.1, January 2008,305-310 | null | null | cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Genes carry the instructions for making proteins that are found in a cell as
a specific sequence of nucleotides that are found in DNA molecules. But, the
regions of these genes that code for proteins may occupy only a small region of
the sequence. Identifying the coding regions play a vital role in understanding
these genes. In this paper we propose a unsupervised Fuzzy Multiple Attractor
Cellular Automata (FMCA) based pattern classifier to identify the coding region
of a DNA sequence. We propose a distinct K-Means algorithm for designing FMACA
classifier which is simple, efficient and produces more accurate classifier
than that has previously been obtained for a range of different sequence
lengths. Experimental results confirm the scalability of the proposed
Unsupervised FCA based classifier to handle large volume of datasets
irrespective of the number of classes, tuples and attributes. Good
classification accuracy has been established.
| [
{
"version": "v1",
"created": "Sat, 25 Jan 2014 01:48:14 GMT"
}
] | 2014-01-28T00:00:00 | [
[
"Sree",
"Pokkuluri Kiran",
""
],
[
"Babu",
"Inampudi Ramesh",
""
]
] | TITLE: Identification of Protein Coding Regions in Genomic DNA Using
Unsupervised FMACA Based Pattern Classifier
ABSTRACT: Genes carry the instructions for making proteins that are found in a cell as
a specific sequence of nucleotides that are found in DNA molecules. But, the
regions of these genes that code for proteins may occupy only a small region of
the sequence. Identifying the coding regions play a vital role in understanding
these genes. In this paper we propose a unsupervised Fuzzy Multiple Attractor
Cellular Automata (FMCA) based pattern classifier to identify the coding region
of a DNA sequence. We propose a distinct K-Means algorithm for designing FMACA
classifier which is simple, efficient and produces more accurate classifier
than that has previously been obtained for a range of different sequence
lengths. Experimental results confirm the scalability of the proposed
Unsupervised FCA based classifier to handle large volume of datasets
irrespective of the number of classes, tuples and attributes. Good
classification accuracy has been established.
|
1401.6571 | Shibamouli Lahiri | Shibamouli Lahiri, Sagnik Ray Choudhury, Cornelia Caragea | Keyword and Keyphrase Extraction Using Centrality Measures on
Collocation Networks | 11 pages | null | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Keyword and keyphrase extraction is an important problem in natural language
processing, with applications ranging from summarization to semantic search to
document clustering. Graph-based approaches to keyword and keyphrase extraction
avoid the problem of acquiring a large in-domain training corpus by applying
variants of PageRank algorithm on a network of words. Although graph-based
approaches are knowledge-lean and easily adoptable in online systems, it
remains largely open whether they can benefit from centrality measures other
than PageRank. In this paper, we experiment with an array of centrality
measures on word and noun phrase collocation networks, and analyze their
performance on four benchmark datasets. Not only are there centrality measures
that perform as well as or better than PageRank, but they are much simpler
(e.g., degree, strength, and neighborhood size). Furthermore, centrality-based
methods give results that are competitive with and, in some cases, better than
two strong unsupervised baselines.
| [
{
"version": "v1",
"created": "Sat, 25 Jan 2014 19:05:45 GMT"
}
] | 2014-01-28T00:00:00 | [
[
"Lahiri",
"Shibamouli",
""
],
[
"Choudhury",
"Sagnik Ray",
""
],
[
"Caragea",
"Cornelia",
""
]
] | TITLE: Keyword and Keyphrase Extraction Using Centrality Measures on
Collocation Networks
ABSTRACT: Keyword and keyphrase extraction is an important problem in natural language
processing, with applications ranging from summarization to semantic search to
document clustering. Graph-based approaches to keyword and keyphrase extraction
avoid the problem of acquiring a large in-domain training corpus by applying
variants of PageRank algorithm on a network of words. Although graph-based
approaches are knowledge-lean and easily adoptable in online systems, it
remains largely open whether they can benefit from centrality measures other
than PageRank. In this paper, we experiment with an array of centrality
measures on word and noun phrase collocation networks, and analyze their
performance on four benchmark datasets. Not only are there centrality measures
that perform as well as or better than PageRank, but they are much simpler
(e.g., degree, strength, and neighborhood size). Furthermore, centrality-based
methods give results that are competitive with and, in some cases, better than
two strong unsupervised baselines.
|
1401.6597 | Sadi Seker E | Sadi Evren Seker, Y. Unal, Z. Erdem, and H. Erdinc Kocer | Ensembled Correlation Between Liver Analysis Outputs | null | International Journal of Biology and Biomedical Engineering, ISSN:
1998-4510, Volume 8, pp. 1-5, 2014 | null | null | stat.ML cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data mining techniques on the biological analysis are spreading for most of
the areas including the health care and medical information. We have applied
the data mining techniques, such as KNN, SVM, MLP or decision trees over a
unique dataset, which is collected from 16,380 analysis results for a year.
Furthermore we have also used meta-classifiers to question the increased
correlation rate between the liver disorder and the liver analysis outputs. The
results show that there is a correlation among ALT, AST, Billirubin Direct and
Billirubin Total down to 15% of error rate. Also the correlation coefficient is
up to 94%. This makes possible to predict the analysis results from each other
or disease patterns can be applied over the linear correlation of the
parameters.
| [
{
"version": "v1",
"created": "Sat, 25 Jan 2014 23:52:37 GMT"
}
] | 2014-01-28T00:00:00 | [
[
"Seker",
"Sadi Evren",
""
],
[
"Unal",
"Y.",
""
],
[
"Erdem",
"Z.",
""
],
[
"Kocer",
"H. Erdinc",
""
]
] | TITLE: Ensembled Correlation Between Liver Analysis Outputs
ABSTRACT: Data mining techniques on the biological analysis are spreading for most of
the areas including the health care and medical information. We have applied
the data mining techniques, such as KNN, SVM, MLP or decision trees over a
unique dataset, which is collected from 16,380 analysis results for a year.
Furthermore we have also used meta-classifiers to question the increased
correlation rate between the liver disorder and the liver analysis outputs. The
results show that there is a correlation among ALT, AST, Billirubin Direct and
Billirubin Total down to 15% of error rate. Also the correlation coefficient is
up to 94%. This makes possible to predict the analysis results from each other
or disease patterns can be applied over the linear correlation of the
parameters.
|
1401.6726 | Earlence T Fernandes | Earlence Fernandes, Alexander Crowell, Ajit Aluri and Atul Prakash | Anception: Application Virtualization For Android | University of Michigan, Technical Report CSE-TR-583-13 | null | null | CSE-TR-583-13 | cs.CR cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of malware has become significant on Android devices. Library
operating systems and application virtualization are both possible solutions
for confining malware. Unfortunately, such solutions do not exist for Android.
Designing mechanisms for application virtualization is a significant chal-
lenge for several reasons: (1) graphics performance is important due to
popularity of games and (2) applications with the same UID can share state.
This paper presents Anception, the first flexible application virtualization
framework for Android. It is imple- mented as a modification to the Android
kernel and supports application virtualization that addresses the above
requirements. Anception is able to confine many types of malware while
supporting unmodified Android applications. Our Anception- based system
exhibits up to 3.9% overhead on various 2D/3D benchmarks, and 1.8% overhead on
the SunSpider benchmark.
| [
{
"version": "v1",
"created": "Mon, 27 Jan 2014 03:01:33 GMT"
}
] | 2014-01-28T00:00:00 | [
[
"Fernandes",
"Earlence",
""
],
[
"Crowell",
"Alexander",
""
],
[
"Aluri",
"Ajit",
""
],
[
"Prakash",
"Atul",
""
]
] | TITLE: Anception: Application Virtualization For Android
ABSTRACT: The problem of malware has become significant on Android devices. Library
operating systems and application virtualization are both possible solutions
for confining malware. Unfortunately, such solutions do not exist for Android.
Designing mechanisms for application virtualization is a significant chal-
lenge for several reasons: (1) graphics performance is important due to
popularity of games and (2) applications with the same UID can share state.
This paper presents Anception, the first flexible application virtualization
framework for Android. It is imple- mented as a modification to the Android
kernel and supports application virtualization that addresses the above
requirements. Anception is able to confine many types of malware while
supporting unmodified Android applications. Our Anception- based system
exhibits up to 3.9% overhead on various 2D/3D benchmarks, and 1.8% overhead on
the SunSpider benchmark.
|
1401.6891 | Gabriela Csurka | Gabriela Csurka and Julien Ah-Pine and St\'ephane Clinchant | Unsupervised Visual and Textual Information Fusion in Multimedia
Retrieval - A Graph-based Point of View | An extended version of the paper: Visual and Textual Information
Fusion in Multimedia Retrieval using Semantic Filtering and Graph based
Methods, by J. Ah-Pine, G. Csurka and S. Clinchant, submitted to ACM
Transactions on Information Systems | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multimedia collections are more than ever growing in size and diversity.
Effective multimedia retrieval systems are thus critical to access these
datasets from the end-user perspective and in a scalable way. We are interested
in repositories of image/text multimedia objects and we study multimodal
information fusion techniques in the context of content based multimedia
information retrieval. We focus on graph based methods which have proven to
provide state-of-the-art performances. We particularly examine two of such
methods : cross-media similarities and random walk based scores. From a
theoretical viewpoint, we propose a unifying graph based framework which
encompasses the two aforementioned approaches. Our proposal allows us to
highlight the core features one should consider when using a graph based
technique for the combination of visual and textual information. We compare
cross-media and random walk based results using three different real-world
datasets. From a practical standpoint, our extended empirical analysis allow us
to provide insights and guidelines about the use of graph based methods for
multimodal information fusion in content based multimedia information
retrieval.
| [
{
"version": "v1",
"created": "Mon, 27 Jan 2014 15:29:14 GMT"
}
] | 2014-01-28T00:00:00 | [
[
"Csurka",
"Gabriela",
""
],
[
"Ah-Pine",
"Julien",
""
],
[
"Clinchant",
"Stéphane",
""
]
] | TITLE: Unsupervised Visual and Textual Information Fusion in Multimedia
Retrieval - A Graph-based Point of View
ABSTRACT: Multimedia collections are more than ever growing in size and diversity.
Effective multimedia retrieval systems are thus critical to access these
datasets from the end-user perspective and in a scalable way. We are interested
in repositories of image/text multimedia objects and we study multimodal
information fusion techniques in the context of content based multimedia
information retrieval. We focus on graph based methods which have proven to
provide state-of-the-art performances. We particularly examine two of such
methods : cross-media similarities and random walk based scores. From a
theoretical viewpoint, we propose a unifying graph based framework which
encompasses the two aforementioned approaches. Our proposal allows us to
highlight the core features one should consider when using a graph based
technique for the combination of visual and textual information. We compare
cross-media and random walk based results using three different real-world
datasets. From a practical standpoint, our extended empirical analysis allow us
to provide insights and guidelines about the use of graph based methods for
multimodal information fusion in content based multimedia information
retrieval.
|
1401.6984 | Yajie Miao | Yajie Miao | Kaldi+PDNN: Building DNN-based ASR Systems with Kaldi and PDNN | unpublished manuscript | null | null | null | cs.LG cs.CL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The Kaldi toolkit is becoming popular for constructing automated speech
recognition (ASR) systems. Meanwhile, in recent years, deep neural networks
(DNNs) have shown state-of-the-art performance on various ASR tasks. This
document describes our open-source recipes to implement fully-fledged DNN
acoustic modeling using Kaldi and PDNN. PDNN is a lightweight deep learning
toolkit developed under the Theano environment. Using these recipes, we can
build up multiple systems including DNN hybrid systems, convolutional neural
network (CNN) systems and bottleneck feature systems. These recipes are
directly based on the Kaldi Switchboard 110-hour setup. However, adapting them
to new datasets is easy to achieve.
| [
{
"version": "v1",
"created": "Mon, 27 Jan 2014 19:55:34 GMT"
}
] | 2014-01-28T00:00:00 | [
[
"Miao",
"Yajie",
""
]
] | TITLE: Kaldi+PDNN: Building DNN-based ASR Systems with Kaldi and PDNN
ABSTRACT: The Kaldi toolkit is becoming popular for constructing automated speech
recognition (ASR) systems. Meanwhile, in recent years, deep neural networks
(DNNs) have shown state-of-the-art performance on various ASR tasks. This
document describes our open-source recipes to implement fully-fledged DNN
acoustic modeling using Kaldi and PDNN. PDNN is a lightweight deep learning
toolkit developed under the Theano environment. Using these recipes, we can
build up multiple systems including DNN hybrid systems, convolutional neural
network (CNN) systems and bottleneck feature systems. These recipes are
directly based on the Kaldi Switchboard 110-hour setup. However, adapting them
to new datasets is easy to achieve.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.