id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1402.5953
Richard McClatchey
Andrew Branson, Jetendr Shamdasani, Richard McClatchey
A Description Driven Approach for Flexible Metadata Tracking
10 pages and 3 figures. arXiv admin note: text overlap with arXiv:1402.5753, arXiv:1402.5764
7th ESA International Conference on Ensuring Long-Term Preservation and Adding Value to Scientific and Technical Data (PV 2013) 4--6th November 2013. Frascati, Italy
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evolving user requirements presents a considerable software engineering challenge, all the more so in an environment where data will be stored for a very long time, and must remain usable as the system specification evolves around it. Capturing the description of the system addresses this issue since a description-driven approach enables new versions of data structures and processes to be created alongside the old, thereby providing a history of changes to the underlying data models and enabling the capture of provenance data. This description-driven approach is advocated in this paper in which a system called CRISTAL is presented. CRISTAL is based on description-driven principles; it can use previous versions of stored descriptions to define various versions of data which can be stored in various forms. To demonstrate the efficacy of this approach the history of the project at CERN is presented where CRISTAL was used to track data and process definitions and their associated provenance data in the construction of the CMS ECAL detector, how it was applied to handle analysis tracking and data index provenance in the neuGRID and N4U projects, and how it will be matured further in the CRISTAL-ISE project. We believe that the CRISTAL approach could be invaluable in handling the evolution, indexing and tracking of large datasets, and are keen to apply it further in this direction.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 10:09:30 GMT" } ]
2014-02-26T00:00:00
[ [ "Branson", "Andrew", "" ], [ "Shamdasani", "Jetendr", "" ], [ "McClatchey", "Richard", "" ] ]
TITLE: A Description Driven Approach for Flexible Metadata Tracking ABSTRACT: Evolving user requirements presents a considerable software engineering challenge, all the more so in an environment where data will be stored for a very long time, and must remain usable as the system specification evolves around it. Capturing the description of the system addresses this issue since a description-driven approach enables new versions of data structures and processes to be created alongside the old, thereby providing a history of changes to the underlying data models and enabling the capture of provenance data. This description-driven approach is advocated in this paper in which a system called CRISTAL is presented. CRISTAL is based on description-driven principles; it can use previous versions of stored descriptions to define various versions of data which can be stored in various forms. To demonstrate the efficacy of this approach the history of the project at CERN is presented where CRISTAL was used to track data and process definitions and their associated provenance data in the construction of the CMS ECAL detector, how it was applied to handle analysis tracking and data index provenance in the neuGRID and N4U projects, and how it will be matured further in the CRISTAL-ISE project. We believe that the CRISTAL approach could be invaluable in handling the evolution, indexing and tracking of large datasets, and are keen to apply it further in this direction.
1402.6077
Zhi-Hua Zhou
Wang-Zhou Dai and Zhi-Hua Zhou
Inductive Logic Boosting
19 pages, 2 figures
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have seen a surge of interest in Probabilistic Logic Programming (PLP) and Statistical Relational Learning (SRL) models that combine logic with probabilities. Structure learning of these systems is an intersection area of Inductive Logic Programming (ILP) and statistical learning (SL). However, ILP cannot deal with probabilities, SL cannot model relational hypothesis. The biggest challenge of integrating these two machine learning frameworks is how to estimate the probability of a logic clause only from the observation of grounded logic atoms. Many current methods models a joint probability by representing clause as graphical model and literals as vertices in it. This model is still too complicate and only can be approximate by pseudo-likelihood. We propose Inductive Logic Boosting framework to transform the relational dataset into a feature-based dataset, induces logic rules by boosting Problog Rule Trees and relaxes the independence constraint of pseudo-likelihood. Experimental evaluation on benchmark datasets demonstrates that the AUC-PR and AUC-ROC value of ILP learned rules are higher than current state-of-the-art SRL methods.
[ { "version": "v1", "created": "Tue, 25 Feb 2014 07:53:49 GMT" } ]
2014-02-26T00:00:00
[ [ "Dai", "Wang-Zhou", "" ], [ "Zhou", "Zhi-Hua", "" ] ]
TITLE: Inductive Logic Boosting ABSTRACT: Recent years have seen a surge of interest in Probabilistic Logic Programming (PLP) and Statistical Relational Learning (SRL) models that combine logic with probabilities. Structure learning of these systems is an intersection area of Inductive Logic Programming (ILP) and statistical learning (SL). However, ILP cannot deal with probabilities, SL cannot model relational hypothesis. The biggest challenge of integrating these two machine learning frameworks is how to estimate the probability of a logic clause only from the observation of grounded logic atoms. Many current methods models a joint probability by representing clause as graphical model and literals as vertices in it. This model is still too complicate and only can be approximate by pseudo-likelihood. We propose Inductive Logic Boosting framework to transform the relational dataset into a feature-based dataset, induces logic rules by boosting Problog Rule Trees and relaxes the independence constraint of pseudo-likelihood. Experimental evaluation on benchmark datasets demonstrates that the AUC-PR and AUC-ROC value of ILP learned rules are higher than current state-of-the-art SRL methods.
1402.6238
Jobin Wilson
Jobin Wilson, Santanu Chaudhury, Brejesh Lall, Prateek Kapadia
Improving Collaborative Filtering based Recommenders using Topic Modelling
null
null
null
null
cs.IR cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Standard Collaborative Filtering (CF) algorithms make use of interactions between users and items in the form of implicit or explicit ratings alone for generating recommendations. Similarity among users or items is calculated purely based on rating overlap in this case,without considering explicit properties of users or items involved, limiting their applicability in domains with very sparse rating spaces. In many domains such as movies, news or electronic commerce recommenders, considerable contextual data in text form describing item properties is available along with the rating data, which could be utilized to improve recommendation quality.In this paper, we propose a novel approach to improve standard CF based recommenders by utilizing latent Dirichlet allocation (LDA) to learn latent properties of items, expressed in terms of topic proportions, derived from their textual description. We infer user's topic preferences or persona in the same latent space,based on her historical ratings. While computing similarity between users, we make use of a combined similarity measure involving rating overlap as well as similarity in the latent topic space. This approach alleviates sparsity problem as it allows calculation of similarity between users even if they have not rated any items in common. Our experiments on multiple public datasets indicate that the proposed hybrid approach significantly outperforms standard user Based and item Based CF recommenders in terms of classification accuracy metrics such as precision, recall and f-measure.
[ { "version": "v1", "created": "Tue, 25 Feb 2014 16:52:05 GMT" } ]
2014-02-26T00:00:00
[ [ "Wilson", "Jobin", "" ], [ "Chaudhury", "Santanu", "" ], [ "Lall", "Brejesh", "" ], [ "Kapadia", "Prateek", "" ] ]
TITLE: Improving Collaborative Filtering based Recommenders using Topic Modelling ABSTRACT: Standard Collaborative Filtering (CF) algorithms make use of interactions between users and items in the form of implicit or explicit ratings alone for generating recommendations. Similarity among users or items is calculated purely based on rating overlap in this case,without considering explicit properties of users or items involved, limiting their applicability in domains with very sparse rating spaces. In many domains such as movies, news or electronic commerce recommenders, considerable contextual data in text form describing item properties is available along with the rating data, which could be utilized to improve recommendation quality.In this paper, we propose a novel approach to improve standard CF based recommenders by utilizing latent Dirichlet allocation (LDA) to learn latent properties of items, expressed in terms of topic proportions, derived from their textual description. We infer user's topic preferences or persona in the same latent space,based on her historical ratings. While computing similarity between users, we make use of a combined similarity measure involving rating overlap as well as similarity in the latent topic space. This approach alleviates sparsity problem as it allows calculation of similarity between users even if they have not rated any items in common. Our experiments on multiple public datasets indicate that the proposed hybrid approach significantly outperforms standard user Based and item Based CF recommenders in terms of classification accuracy metrics such as precision, recall and f-measure.
1306.5056
Tyler Sanderson
Tyler Sanderson and Clayton Scott
Class Proportion Estimation with Application to Multiclass Anomaly Rejection
Accepted to AISTATS 2014. 15 pages. 2 figures
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work addresses two classification problems that fall under the heading of domain adaptation, wherein the distributions of training and testing examples differ. The first problem studied is that of class proportion estimation, which is the problem of estimating the class proportions in an unlabeled testing data set given labeled examples of each class. Compared to previous work on this problem, our approach has the novel feature that it does not require labeled training data from one of the classes. This property allows us to address the second domain adaptation problem, namely, multiclass anomaly rejection. Here, the goal is to design a classifier that has the option of assigning a "reject" label, indicating that the instance did not arise from a class present in the training data. We establish consistent learning strategies for both of these domain adaptation problems, which to our knowledge are the first of their kind. We also implement the class proportion estimation technique and demonstrate its performance on several benchmark data sets.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 06:25:54 GMT" }, { "version": "v2", "created": "Thu, 27 Jun 2013 03:36:55 GMT" }, { "version": "v3", "created": "Sat, 22 Feb 2014 08:58:10 GMT" } ]
2014-02-25T00:00:00
[ [ "Sanderson", "Tyler", "" ], [ "Scott", "Clayton", "" ] ]
TITLE: Class Proportion Estimation with Application to Multiclass Anomaly Rejection ABSTRACT: This work addresses two classification problems that fall under the heading of domain adaptation, wherein the distributions of training and testing examples differ. The first problem studied is that of class proportion estimation, which is the problem of estimating the class proportions in an unlabeled testing data set given labeled examples of each class. Compared to previous work on this problem, our approach has the novel feature that it does not require labeled training data from one of the classes. This property allows us to address the second domain adaptation problem, namely, multiclass anomaly rejection. Here, the goal is to design a classifier that has the option of assigning a "reject" label, indicating that the instance did not arise from a class present in the training data. We establish consistent learning strategies for both of these domain adaptation problems, which to our knowledge are the first of their kind. We also implement the class proportion estimation technique and demonstrate its performance on several benchmark data sets.
1402.5565
David M. Johnson
David M. Johnson, Caiming Xiong and Jason J. Corso
Semi-Supervised Nonlinear Distance Metric Learning via Forests of Max-Margin Cluster Hierarchies
Manuscript submitted to SIGKDD on 21 Feb 2014
null
null
null
stat.ML cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metric learning is a key problem for many data mining and machine learning applications, and has long been dominated by Mahalanobis methods. Recent advances in nonlinear metric learning have demonstrated the potential power of non-Mahalanobis distance functions, particularly tree-based functions. We propose a novel nonlinear metric learning method that uses an iterative, hierarchical variant of semi-supervised max-margin clustering to construct a forest of cluster hierarchies, where each individual hierarchy can be interpreted as a weak metric over the data. By introducing randomness during hierarchy training and combining the output of many of the resulting semi-random weak hierarchy metrics, we can obtain a powerful and robust nonlinear metric model. This method has two primary contributions: first, it is semi-supervised, incorporating information from both constrained and unconstrained points. Second, we take a relaxed approach to constraint satisfaction, allowing the method to satisfy different subsets of the constraints at different levels of the hierarchy rather than attempting to simultaneously satisfy all of them. This leads to a more robust learning algorithm. We compare our method to a number of state-of-the-art benchmarks on $k$-nearest neighbor classification, large-scale image retrieval and semi-supervised clustering problems, and find that our algorithm yields results comparable or superior to the state-of-the-art, and is significantly more robust to noise.
[ { "version": "v1", "created": "Sun, 23 Feb 2014 00:26:48 GMT" } ]
2014-02-25T00:00:00
[ [ "Johnson", "David M.", "" ], [ "Xiong", "Caiming", "" ], [ "Corso", "Jason J.", "" ] ]
TITLE: Semi-Supervised Nonlinear Distance Metric Learning via Forests of Max-Margin Cluster Hierarchies ABSTRACT: Metric learning is a key problem for many data mining and machine learning applications, and has long been dominated by Mahalanobis methods. Recent advances in nonlinear metric learning have demonstrated the potential power of non-Mahalanobis distance functions, particularly tree-based functions. We propose a novel nonlinear metric learning method that uses an iterative, hierarchical variant of semi-supervised max-margin clustering to construct a forest of cluster hierarchies, where each individual hierarchy can be interpreted as a weak metric over the data. By introducing randomness during hierarchy training and combining the output of many of the resulting semi-random weak hierarchy metrics, we can obtain a powerful and robust nonlinear metric model. This method has two primary contributions: first, it is semi-supervised, incorporating information from both constrained and unconstrained points. Second, we take a relaxed approach to constraint satisfaction, allowing the method to satisfy different subsets of the constraints at different levels of the hierarchy rather than attempting to simultaneously satisfy all of them. This leads to a more robust learning algorithm. We compare our method to a number of state-of-the-art benchmarks on $k$-nearest neighbor classification, large-scale image retrieval and semi-supervised clustering problems, and find that our algorithm yields results comparable or superior to the state-of-the-art, and is significantly more robust to noise.
1402.5613
Peng Bo
Bo Peng, Zhipeng Lu, T.C.E. Cheng
A Tabu Search/Path Relinking Algorithm to Solve the Job Shop Scheduling Problem
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm that incorporates a tabu search procedure into the framework of path relinking to tackle the job shop scheduling problem (JSP). This tabu search/path relinking (TS/PR) algorithm comprises several distinguishing features, such as a specific relinking procedure and a reference solution determination method. To test the performance of TS/PR, we apply it to tackle almost all of the benchmark JSP instances available in the literature. The test results show that TS/PR obtains competitive results compared with state-of-the-art algorithms for JSP in the literature, demonstrating its efficacy in terms of both solution quality and computational efficiency. In particular, TS/PR is able to improve the upper bounds for 49 out of the 205 tested instances and it solves a challenging instance that has remained unsolved for over 20 years.
[ { "version": "v1", "created": "Sun, 23 Feb 2014 14:46:04 GMT" } ]
2014-02-25T00:00:00
[ [ "Peng", "Bo", "" ], [ "Lu", "Zhipeng", "" ], [ "Cheng", "T. C. E.", "" ] ]
TITLE: A Tabu Search/Path Relinking Algorithm to Solve the Job Shop Scheduling Problem ABSTRACT: We present an algorithm that incorporates a tabu search procedure into the framework of path relinking to tackle the job shop scheduling problem (JSP). This tabu search/path relinking (TS/PR) algorithm comprises several distinguishing features, such as a specific relinking procedure and a reference solution determination method. To test the performance of TS/PR, we apply it to tackle almost all of the benchmark JSP instances available in the literature. The test results show that TS/PR obtains competitive results compared with state-of-the-art algorithms for JSP in the literature, demonstrating its efficacy in terms of both solution quality and computational efficiency. In particular, TS/PR is able to improve the upper bounds for 49 out of the 205 tested instances and it solves a challenging instance that has remained unsolved for over 20 years.
1402.5634
Gaurav Pandey
Gaurav Pandey and Ambedkar Dukkipati
To go deep or wide in learning?
9 pages, 1 figure, Accepted for publication in Seventeenth International Conference on Artificial Intelligence and Statistics
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To achieve acceptable performance for AI tasks, one can either use sophisticated feature extraction methods as the first layer in a two-layered supervised learning model, or learn the features directly using a deep (multi-layered) model. While the first approach is very problem-specific, the second approach has computational overheads in learning multiple layers and fine-tuning of the model. In this paper, we propose an approach called wide learning based on arc-cosine kernels, that learns a single layer of infinite width. We propose exact and inexact learning strategies for wide learning and show that wide learning with single layer outperforms single layer as well as deep architectures of finite width for some benchmark datasets.
[ { "version": "v1", "created": "Sun, 23 Feb 2014 16:51:51 GMT" } ]
2014-02-25T00:00:00
[ [ "Pandey", "Gaurav", "" ], [ "Dukkipati", "Ambedkar", "" ] ]
TITLE: To go deep or wide in learning? ABSTRACT: To achieve acceptable performance for AI tasks, one can either use sophisticated feature extraction methods as the first layer in a two-layered supervised learning model, or learn the features directly using a deep (multi-layered) model. While the first approach is very problem-specific, the second approach has computational overheads in learning multiple layers and fine-tuning of the model. In this paper, we propose an approach called wide learning based on arc-cosine kernels, that learns a single layer of infinite width. We propose exact and inexact learning strategies for wide learning and show that wide learning with single layer outperforms single layer as well as deep architectures of finite width for some benchmark datasets.
1402.5645
Elshimaa Elgendi
Omar S. Soliman and Elshimaa A. R. Elgendi
A Hybrid Estimation of Distribution Algorithm with Random Walk local Search for Multi-mode Resource-Constrained Project Scheduling problems
8 pages,0 figures, Published with International Journal of Computer Trends and Technology (IJCTT). Omar S. Soliman, Elshimaa A.R. Elgendi. A Hybrid Estimation of Distribution Algorithm with Random Walk local Search for Multi-mode Resource-Constrained Project Scheduling problems. Inter J. of Computer Trends and Tech(IJCTT)8(2):57-64,2014
null
10.14445/22312803/IJCTT-V8P111
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-mode resource-constrained project scheduling problems (MRCPSPs) are classified as NP-hard problems, in which a task has different execution modes characterized by different resource requirements. Estimation of distribution algorithm (EDA) has shown an effective performance for solving such real-world optimization problems but it fails to find the desired optima. This paper integrates a novel hybrid local search technique with EDA to enhance their local search ability. The new local search is based on delete-then-insert operator and a random walk (DIRW) to enhance exploitation abilities of EDA in the neighborhoods of the search space. The proposed algorithm is capable to explore and exploit the search mechanism in the search space through its outer and inner loops. The proposed algorithm is tested and evaluated using benchmark test problems of the project scheduling problem library PSPLIB. Simulation results of the proposed algorithm are compared with the classical EDA algorithm. The obtained results showed that the effectiveness of the proposed algorithm and outperformed the compared EDA algorithm.
[ { "version": "v1", "created": "Sun, 23 Feb 2014 18:15:24 GMT" } ]
2014-02-25T00:00:00
[ [ "Soliman", "Omar S.", "" ], [ "Elgendi", "Elshimaa A. R.", "" ] ]
TITLE: A Hybrid Estimation of Distribution Algorithm with Random Walk local Search for Multi-mode Resource-Constrained Project Scheduling problems ABSTRACT: Multi-mode resource-constrained project scheduling problems (MRCPSPs) are classified as NP-hard problems, in which a task has different execution modes characterized by different resource requirements. Estimation of distribution algorithm (EDA) has shown an effective performance for solving such real-world optimization problems but it fails to find the desired optima. This paper integrates a novel hybrid local search technique with EDA to enhance their local search ability. The new local search is based on delete-then-insert operator and a random walk (DIRW) to enhance exploitation abilities of EDA in the neighborhoods of the search space. The proposed algorithm is capable to explore and exploit the search mechanism in the search space through its outer and inner loops. The proposed algorithm is tested and evaluated using benchmark test problems of the project scheduling problem library PSPLIB. Simulation results of the proposed algorithm are compared with the classical EDA algorithm. The obtained results showed that the effectiveness of the proposed algorithm and outperformed the compared EDA algorithm.
1402.5749
Richard McClatchey
R. McClatchey, A. Branson, A. Anjum, P. Bloodsworth, I. Habib, K. Munir, J. Shamdasani, K. Soomro and the neuGRID Consortium
Providing Traceability for Neuroimaging Analyses
17 pages, 9 figures, 2 tables
International Journal of Medical Informatics, 82 (2013) pp 882-894 Elsevier publishers
10.1016/j.ijmedinf.2013.05.005
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the increasingly digital nature of biomedical data and as the complexity of analyses in medical research increases, the need for accurate information capture, traceability and accessibility has become crucial to medical researchers in the pursuance of their research goals. Grid- or Cloud-based technologies, often based on so-called Service Oriented Architectures (SOA), are increasingly being seen as viable solutions for managing distributed data and algorithms in the bio-medical domain. For neuroscientific analyses, especially those centred on complex image analysis, traceability of processes and datasets is essential but up to now this has not been captured in a manner that facilitates collaborative study. Over the past decade, we have been working with mammographers, paediatricians and neuroscientists in three generations of projects to provide the data management and provenance services now required for 21st century medical research. This paper outlines the finding of a requirements study and a resulting system architecture for the production of services to support neuroscientific studies of biomarkers for Alzheimers Disease. The paper proposes a software infrastructure and services that provide the foundation for such support. It introduces the use of the CRISTAL software to provide provenance management as one of a number of services delivered on a SOA, deployed to manage neuroimaging projects that have been studying biomarkers for Alzheimers disease.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 08:44:49 GMT" } ]
2014-02-25T00:00:00
[ [ "McClatchey", "R.", "" ], [ "Branson", "A.", "" ], [ "Anjum", "A.", "" ], [ "Bloodsworth", "P.", "" ], [ "Habib", "I.", "" ], [ "Munir", "K.", "" ], [ "Shamdasani", "J.", "" ], [ "Soomro", "K.", "" ], [ "Consortium", "the neuGRID", "" ] ]
TITLE: Providing Traceability for Neuroimaging Analyses ABSTRACT: With the increasingly digital nature of biomedical data and as the complexity of analyses in medical research increases, the need for accurate information capture, traceability and accessibility has become crucial to medical researchers in the pursuance of their research goals. Grid- or Cloud-based technologies, often based on so-called Service Oriented Architectures (SOA), are increasingly being seen as viable solutions for managing distributed data and algorithms in the bio-medical domain. For neuroscientific analyses, especially those centred on complex image analysis, traceability of processes and datasets is essential but up to now this has not been captured in a manner that facilitates collaborative study. Over the past decade, we have been working with mammographers, paediatricians and neuroscientists in three generations of projects to provide the data management and provenance services now required for 21st century medical research. This paper outlines the finding of a requirements study and a resulting system architecture for the production of services to support neuroscientific studies of biomarkers for Alzheimers Disease. The paper proposes a software infrastructure and services that provide the foundation for such support. It introduces the use of the CRISTAL software to provide provenance management as one of a number of services delivered on a SOA, deployed to manage neuroimaging projects that have been studying biomarkers for Alzheimers disease.
1402.5757
Richard McClatchey
Kamran Munir, Saad Liaquat Kiani, Khawar Hasham, Richard McClatchey, Andrew Branson, Jetendr Shamdasani and the N4U Consortium
An Integrated e-science Analysis Base for Computation Neuroscience Experiments and Analysis
8 pages & 4 figures
Procedia - Social and Behavioral Sciences. Vol 73 pp 85-92 (2013) Elsevier Publishers
10.1016/j.sbspro.2013.02.026.
null
cs.SE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent developments in data management and imaging technologies have significantly affected diagnostic and extrapolative research in the understanding of neurodegenerative diseases. However, the impact of these new technologies is largely dependent on the speed and reliability with which the medical data can be visualised, analysed and interpreted. The EUs neuGRID for Users (N4U) is a follow-on project to neuGRID, which aims to provide an integrated environment to carry out computational neuroscience experiments. This paper reports on the design and development of the N4U Analysis Base and related Information Services, which addresses existing research and practical challenges by offering an integrated medical data analysis environment with the necessary building blocks for neuroscientists to optimally exploit neuroscience workflows, large image datasets and algorithms in order to conduct analyses. The N4U Analysis Base enables such analyses by indexing and interlinking the neuroimaging and clinical study datasets stored on the N4U Grid infrastructure, algorithms and scientific workflow definitions along with their associated provenance information.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 09:14:44 GMT" } ]
2014-02-25T00:00:00
[ [ "Munir", "Kamran", "" ], [ "Kiani", "Saad Liaquat", "" ], [ "Hasham", "Khawar", "" ], [ "McClatchey", "Richard", "" ], [ "Branson", "Andrew", "" ], [ "Shamdasani", "Jetendr", "" ], [ "Consortium", "the N4U", "" ] ]
TITLE: An Integrated e-science Analysis Base for Computation Neuroscience Experiments and Analysis ABSTRACT: Recent developments in data management and imaging technologies have significantly affected diagnostic and extrapolative research in the understanding of neurodegenerative diseases. However, the impact of these new technologies is largely dependent on the speed and reliability with which the medical data can be visualised, analysed and interpreted. The EUs neuGRID for Users (N4U) is a follow-on project to neuGRID, which aims to provide an integrated environment to carry out computational neuroscience experiments. This paper reports on the design and development of the N4U Analysis Base and related Information Services, which addresses existing research and practical challenges by offering an integrated medical data analysis environment with the necessary building blocks for neuroscientists to optimally exploit neuroscience workflows, large image datasets and algorithms in order to conduct analyses. The N4U Analysis Base enables such analyses by indexing and interlinking the neuroimaging and clinical study datasets stored on the N4U Grid infrastructure, algorithms and scientific workflow definitions along with their associated provenance information.
1402.5774
Da-Cheng Nie
Da-Cheng Nie, Ya-Hui An, Qiang Dong, Yan Fu and Tao Zhou
Information Filtering via Balanced Diffusion on Bipartite Networks
13 pages, 6 figures
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent decade has witnessed the increasing popularity of recommender systems, which help users acquire relevant commodities and services from overwhelming resources on Internet. Some simple physical diffusion processes have been used to design effective recommendation algorithms for user-object bipartite networks, typically mass diffusion (MD) and heat conduction (HC) algorithms which have different advantages respectively on accuracy and diversity. In this paper, we investigate the effect of weight assignment in the hybrid of MD and HC, and find that a new hybrid algorithm of MD and HC with balanced weights will achieve the optimal recommendation results, we name it balanced diffusion (BD) algorithm. Numerical experiments on three benchmark data sets, MovieLens, Netflix and RateYourMusic (RYM), show that the performance of BD algorithm outperforms the existing diffusion-based methods on the three important recommendation metrics, accuracy, diversity and novelty. Specifically, it can not only provide accurately recommendation results, but also yield higher diversity and novelty in recommendations by accurately recommending unpopular objects.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 10:26:39 GMT" } ]
2014-02-25T00:00:00
[ [ "Nie", "Da-Cheng", "" ], [ "An", "Ya-Hui", "" ], [ "Dong", "Qiang", "" ], [ "Fu", "Yan", "" ], [ "Zhou", "Tao", "" ] ]
TITLE: Information Filtering via Balanced Diffusion on Bipartite Networks ABSTRACT: Recent decade has witnessed the increasing popularity of recommender systems, which help users acquire relevant commodities and services from overwhelming resources on Internet. Some simple physical diffusion processes have been used to design effective recommendation algorithms for user-object bipartite networks, typically mass diffusion (MD) and heat conduction (HC) algorithms which have different advantages respectively on accuracy and diversity. In this paper, we investigate the effect of weight assignment in the hybrid of MD and HC, and find that a new hybrid algorithm of MD and HC with balanced weights will achieve the optimal recommendation results, we name it balanced diffusion (BD) algorithm. Numerical experiments on three benchmark data sets, MovieLens, Netflix and RateYourMusic (RYM), show that the performance of BD algorithm outperforms the existing diffusion-based methods on the three important recommendation metrics, accuracy, diversity and novelty. Specifically, it can not only provide accurately recommendation results, but also yield higher diversity and novelty in recommendations by accurately recommending unpopular objects.
1402.5859
Huanguo Zhang
Huanguo Zhang, Sha Lv, Wei Li and Xun Qu
A Novel Face Recognition Method using Nearest Line Projection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face recognition is a popular application of pat- tern recognition methods, and it faces challenging problems including illumination, expression, and pose. The most popular way is to learn the subspaces of the face images so that it could be project to another discriminant space where images of different persons can be separated. In this paper, a nearest line projection algorithm is developed to represent the face images for face recognition. Instead of projecting an image to its nearest image, we try to project it to its nearest line spanned by two different face images. The subspaces are learned so that each face image to its nearest line is minimized. We evaluated the proposed algorithm on some benchmark face image database, and also compared it to some other image projection algorithms. The experiment results showed that the proposed algorithm outperforms other ones.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 15:36:32 GMT" } ]
2014-02-25T00:00:00
[ [ "Zhang", "Huanguo", "" ], [ "Lv", "Sha", "" ], [ "Li", "Wei", "" ], [ "Qu", "Xun", "" ] ]
TITLE: A Novel Face Recognition Method using Nearest Line Projection ABSTRACT: Face recognition is a popular application of pat- tern recognition methods, and it faces challenging problems including illumination, expression, and pose. The most popular way is to learn the subspaces of the face images so that it could be project to another discriminant space where images of different persons can be separated. In this paper, a nearest line projection algorithm is developed to represent the face images for face recognition. Instead of projecting an image to its nearest image, we try to project it to its nearest line spanned by two different face images. The subspaces are learned so that each face image to its nearest line is minimized. We evaluated the proposed algorithm on some benchmark face image database, and also compared it to some other image projection algorithms. The experiment results showed that the proposed algorithm outperforms other ones.
1402.5923
Tatiana Tommasi
Tatiana Tommasi, Tinne Tuytelaars, Barbara Caputo
A Testbed for Cross-Dataset Analysis
null
null
null
December 2013, Technical Report: KUL/ESAT/PSI/1304
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since its beginning visual recognition research has tried to capture the huge variability of the visual world in several image collections. The number of available datasets is still progressively growing together with the amount of samples per object category. However, this trend does not correspond directly to an increasing in the generalization capabilities of the developed recognition systems. Each collection tends to have its specific characteristics and to cover just some aspects of the visual world: these biases often narrow the effect of the methods defined and tested separately over each image set. Our work makes a first step towards the analysis of the dataset bias problem on a large scale. We organize twelve existing databases in a unique corpus and we present the visual community with a useful feature repository for future research.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 19:25:17 GMT" } ]
2014-02-25T00:00:00
[ [ "Tommasi", "Tatiana", "" ], [ "Tuytelaars", "Tinne", "" ], [ "Caputo", "Barbara", "" ] ]
TITLE: A Testbed for Cross-Dataset Analysis ABSTRACT: Since its beginning visual recognition research has tried to capture the huge variability of the visual world in several image collections. The number of available datasets is still progressively growing together with the amount of samples per object category. However, this trend does not correspond directly to an increasing in the generalization capabilities of the developed recognition systems. Each collection tends to have its specific characteristics and to cover just some aspects of the visual world: these biases often narrow the effect of the methods defined and tested separately over each image set. Our work makes a first step towards the analysis of the dataset bias problem on a large scale. We organize twelve existing databases in a unique corpus and we present the visual community with a useful feature repository for future research.
1402.5194
Rui Han
Rui Han, Xiaoyi Lu
On Big Data Benchmarking
7 pages, 4 figures, 2 tables, accepted in BPOE-04 (http://prof.ict.ac.cn/bpoe_4_asplos/)
null
null
null
cs.PF cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Big data systems address the challenges of capturing, storing, managing, analyzing, and visualizing big data. Within this context, developing benchmarks to evaluate and compare big data systems has become an active topic for both research and industry communities. To date, most of the state-of-the-art big data benchmarks are designed for specific types of systems. Based on our experience, however, we argue that considering the complexity, diversity, and rapid evolution of big data systems, for the sake of fairness, big data benchmarks must include diversity of data and workloads. Given this motivation, in this paper, we first propose the key requirements and challenges in developing big data benchmarks from the perspectives of generating data with 4V properties (i.e. volume, velocity, variety and veracity) of big data, as well as generating tests with comprehensive workloads for big data systems. We then present the methodology on big data benchmarking designed to address these challenges. Next, the state-of-the-art are summarized and compared, following by our vision for future research directions.
[ { "version": "v1", "created": "Fri, 21 Feb 2014 03:03:16 GMT" } ]
2014-02-24T00:00:00
[ [ "Han", "Rui", "" ], [ "Lu", "Xiaoyi", "" ] ]
TITLE: On Big Data Benchmarking ABSTRACT: Big data systems address the challenges of capturing, storing, managing, analyzing, and visualizing big data. Within this context, developing benchmarks to evaluate and compare big data systems has become an active topic for both research and industry communities. To date, most of the state-of-the-art big data benchmarks are designed for specific types of systems. Based on our experience, however, we argue that considering the complexity, diversity, and rapid evolution of big data systems, for the sake of fairness, big data benchmarks must include diversity of data and workloads. Given this motivation, in this paper, we first propose the key requirements and challenges in developing big data benchmarks from the perspectives of generating data with 4V properties (i.e. volume, velocity, variety and veracity) of big data, as well as generating tests with comprehensive workloads for big data systems. We then present the methodology on big data benchmarking designed to address these challenges. Next, the state-of-the-art are summarized and compared, following by our vision for future research directions.
1402.5255
Christian von der Weth
Christian von der Weth, Manfred Hauswirth
Analysing Parallel and Passive Web Browsing Behavior and its Effects on Website Metrics
22 pages, 11 figures, 3 tables, 29 references. arXiv admin note: text overlap with arXiv:1307.1542
null
null
null
cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Getting deeper insights into the online browsing behavior of Web users has been a major research topic since the advent of the WWW. It provides useful information to optimize website design, Web browser design, search engines offerings, and online advertisement. We argue that new technologies and new services continue to have significant effects on the way how people browse the Web. For example, listening to music clips on YouTube or to a radio station on Last.fm does not require users to sit in front of their computer. Social media and networking sites like Facebook or micro-blogging sites like Twitter have attracted new types of users that previously were less inclined to go online. These changes in how people browse the Web feature new characteristics which are not well understood so far. In this paper, we provide novel and unique insights by presenting first results of DOBBS, our long-term effort to create a comprehensive and representative dataset capturing online user behavior. We firstly investigate the concepts of parallel browsing and passive browsing, showing that browsing the Web is no longer a dedicated task for many users. Based on these results, we then analyze their impact on the calculation of a user's dwell time -- i.e., the time the user spends on a webpage -- which has become an important metric to quantify the popularity of websites.
[ { "version": "v1", "created": "Fri, 21 Feb 2014 11:15:02 GMT" } ]
2014-02-24T00:00:00
[ [ "von der Weth", "Christian", "" ], [ "Hauswirth", "Manfred", "" ] ]
TITLE: Analysing Parallel and Passive Web Browsing Behavior and its Effects on Website Metrics ABSTRACT: Getting deeper insights into the online browsing behavior of Web users has been a major research topic since the advent of the WWW. It provides useful information to optimize website design, Web browser design, search engines offerings, and online advertisement. We argue that new technologies and new services continue to have significant effects on the way how people browse the Web. For example, listening to music clips on YouTube or to a radio station on Last.fm does not require users to sit in front of their computer. Social media and networking sites like Facebook or micro-blogging sites like Twitter have attracted new types of users that previously were less inclined to go online. These changes in how people browse the Web feature new characteristics which are not well understood so far. In this paper, we provide novel and unique insights by presenting first results of DOBBS, our long-term effort to create a comprehensive and representative dataset capturing online user behavior. We firstly investigate the concepts of parallel browsing and passive browsing, showing that browsing the Web is no longer a dedicated task for many users. Based on these results, we then analyze their impact on the calculation of a user's dwell time -- i.e., the time the user spends on a webpage -- which has become an important metric to quantify the popularity of websites.
1402.5360
Chanabasayya Vastrad M
Doreswamy, Chanabasayya M. Vastrad
Important Molecular Descriptors Selection Using Self Tuned Reweighted Sampling Method for Prediction of Antituberculosis Activity
published 2013
null
null
null
cs.LG stat.AP stat.ML
http://creativecommons.org/licenses/by/3.0/
In this paper, a new descriptor selection method for selecting an optimal combination of important descriptors of sulfonamide derivatives data, named self tuned reweighted sampling (STRS), is developed. descriptors are defined as the descriptors with large absolute coefficients in a multivariate linear regression model such as partial least squares(PLS). In this study, the absolute values of regression coefficients of PLS model are used as an index for evaluating the importance of each descriptor Then, based on the importance level of each descriptor, STRS sequentially selects N subsets of descriptors from N Monte Carlo (MC) sampling runs in an iterative and competitive manner. In each sampling run, a fixed ratio (e.g. 80%) of samples is first randomly selected to establish a regresson model. Next, based on the regression coefficients, a two-step procedure including rapidly decreasing function (RDF) based enforced descriptor selection and self tuned sampling (STS) based competitive descriptor selection is adopted to select the important descriptorss. After running the loops, a number of subsets of descriptors are obtained and root mean squared error of cross validation (RMSECV) of PLS models established with subsets of descriptors is computed. The subset of descriptors with the lowest RMSECV is considered as the optimal descriptor subset. The performance of the proposed algorithm is evaluated by sulfanomide derivative dataset. The results reveal an good characteristic of STRS that it can usually locate an optimal combination of some important descriptors which are interpretable to the biologically of interest. Additionally, our study shows that better prediction is obtained by STRS when compared to full descriptor set PLS modeling, Monte Carlo uninformative variable elimination (MC-UVE).
[ { "version": "v1", "created": "Fri, 21 Feb 2014 17:24:53 GMT" } ]
2014-02-24T00:00:00
[ [ "Doreswamy", "", "" ], [ "Vastrad", "Chanabasayya M.", "" ] ]
TITLE: Important Molecular Descriptors Selection Using Self Tuned Reweighted Sampling Method for Prediction of Antituberculosis Activity ABSTRACT: In this paper, a new descriptor selection method for selecting an optimal combination of important descriptors of sulfonamide derivatives data, named self tuned reweighted sampling (STRS), is developed. descriptors are defined as the descriptors with large absolute coefficients in a multivariate linear regression model such as partial least squares(PLS). In this study, the absolute values of regression coefficients of PLS model are used as an index for evaluating the importance of each descriptor Then, based on the importance level of each descriptor, STRS sequentially selects N subsets of descriptors from N Monte Carlo (MC) sampling runs in an iterative and competitive manner. In each sampling run, a fixed ratio (e.g. 80%) of samples is first randomly selected to establish a regresson model. Next, based on the regression coefficients, a two-step procedure including rapidly decreasing function (RDF) based enforced descriptor selection and self tuned sampling (STS) based competitive descriptor selection is adopted to select the important descriptorss. After running the loops, a number of subsets of descriptors are obtained and root mean squared error of cross validation (RMSECV) of PLS models established with subsets of descriptors is computed. The subset of descriptors with the lowest RMSECV is considered as the optimal descriptor subset. The performance of the proposed algorithm is evaluated by sulfanomide derivative dataset. The results reveal an good characteristic of STRS that it can usually locate an optimal combination of some important descriptors which are interpretable to the biologically of interest. Additionally, our study shows that better prediction is obtained by STRS when compared to full descriptor set PLS modeling, Monte Carlo uninformative variable elimination (MC-UVE).
1310.4945
Xiangrong Zeng
Xiangrong Zeng and M\'ario A. T. Figueiredo
A novel sparsity and clustering regularization
null
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel SPARsity and Clustering (SPARC) regularizer, which is a modified version of the previous octagonal shrinkage and clustering algorithm for regression (OSCAR), where, the proposed regularizer consists of a $K$-sparse constraint and a pair-wise $\ell_{\infty}$ norm restricted on the $K$ largest components in magnitude. The proposed regularizer is able to separably enforce $K$-sparsity and encourage the non-zeros to be equal in magnitude. Moreover, it can accurately group the features without shrinking their magnitude. In fact, SPARC is closely related to OSCAR, so that the proximity operator of the former can be efficiently computed based on that of the latter, allowing using proximal splitting algorithms to solve problems with SPARC regularization. Experiments on synthetic data and with benchmark breast cancer data show that SPARC is a competitive group-sparsity inducing regularizer for regression and classification.
[ { "version": "v1", "created": "Fri, 18 Oct 2013 08:31:54 GMT" }, { "version": "v2", "created": "Thu, 20 Feb 2014 16:41:40 GMT" } ]
2014-02-21T00:00:00
[ [ "Zeng", "Xiangrong", "" ], [ "Figueiredo", "Mário A. T.", "" ] ]
TITLE: A novel sparsity and clustering regularization ABSTRACT: We propose a novel SPARsity and Clustering (SPARC) regularizer, which is a modified version of the previous octagonal shrinkage and clustering algorithm for regression (OSCAR), where, the proposed regularizer consists of a $K$-sparse constraint and a pair-wise $\ell_{\infty}$ norm restricted on the $K$ largest components in magnitude. The proposed regularizer is able to separably enforce $K$-sparsity and encourage the non-zeros to be equal in magnitude. Moreover, it can accurately group the features without shrinking their magnitude. In fact, SPARC is closely related to OSCAR, so that the proximity operator of the former can be efficiently computed based on that of the latter, allowing using proximal splitting algorithms to solve problems with SPARC regularization. Experiments on synthetic data and with benchmark breast cancer data show that SPARC is a competitive group-sparsity inducing regularizer for regression and classification.
1312.6116
Jost Tobias Springenberg
Jost Tobias Springenberg, Martin Riedmiller
Improving Deep Neural Networks with Probabilistic Maxout Units
null
null
null
null
stat.ML cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a probabilistic variant of the recently introduced maxout unit. The success of deep neural networks utilizing maxout can partly be attributed to favorable performance under dropout, when compared to rectified linear units. It however also depends on the fact that each maxout unit performs a pooling operation over a group of linear transformations and is thus partially invariant to changes in its input. Starting from this observation we ask the question: Can the desirable properties of maxout units be preserved while improving their invariance properties ? We argue that our probabilistic maxout (probout) units successfully achieve this balance. We quantitatively verify this claim and report classification performance matching or exceeding the current state of the art on three challenging image classification benchmarks (CIFAR-10, CIFAR-100 and SVHN).
[ { "version": "v1", "created": "Fri, 20 Dec 2013 20:59:15 GMT" }, { "version": "v2", "created": "Wed, 19 Feb 2014 11:13:48 GMT" } ]
2014-02-20T00:00:00
[ [ "Springenberg", "Jost Tobias", "" ], [ "Riedmiller", "Martin", "" ] ]
TITLE: Improving Deep Neural Networks with Probabilistic Maxout Units ABSTRACT: We present a probabilistic variant of the recently introduced maxout unit. The success of deep neural networks utilizing maxout can partly be attributed to favorable performance under dropout, when compared to rectified linear units. It however also depends on the fact that each maxout unit performs a pooling operation over a group of linear transformations and is thus partially invariant to changes in its input. Starting from this observation we ask the question: Can the desirable properties of maxout units be preserved while improving their invariance properties ? We argue that our probabilistic maxout (probout) units successfully achieve this balance. We quantitatively verify this claim and report classification performance matching or exceeding the current state of the art on three challenging image classification benchmarks (CIFAR-10, CIFAR-100 and SVHN).
1312.6199
Joan Bruna
Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, Rob Fergus
Intriguing properties of neural networks
null
null
null
null
cs.CV cs.LG cs.NE
http://creativecommons.org/licenses/by/3.0/
Deep neural networks are highly expressive models that have recently achieved state of the art performance on speech and visual recognition tasks. While their expressiveness is the reason they succeed, it also causes them to learn uninterpretable solutions that could have counter-intuitive properties. In this paper we report two such properties. First, we find that there is no distinction between individual high level units and random linear combinations of high level units, according to various methods of unit analysis. It suggests that it is the space, rather than the individual units, that contains of the semantic information in the high layers of neural networks. Second, we find that deep neural networks learn input-output mappings that are fairly discontinuous to a significant extend. We can cause the network to misclassify an image by applying a certain imperceptible perturbation, which is found by maximizing the network's prediction error. In addition, the specific nature of these perturbations is not a random artifact of learning: the same perturbation can cause a different network, that was trained on a different subset of the dataset, to misclassify the same input.
[ { "version": "v1", "created": "Sat, 21 Dec 2013 03:36:08 GMT" }, { "version": "v2", "created": "Fri, 3 Jan 2014 04:37:34 GMT" }, { "version": "v3", "created": "Thu, 13 Feb 2014 17:40:08 GMT" }, { "version": "v4", "created": "Wed, 19 Feb 2014 16:33:14 GMT" } ]
2014-02-20T00:00:00
[ [ "Szegedy", "Christian", "" ], [ "Zaremba", "Wojciech", "" ], [ "Sutskever", "Ilya", "" ], [ "Bruna", "Joan", "" ], [ "Erhan", "Dumitru", "" ], [ "Goodfellow", "Ian", "" ], [ "Fergus", "Rob", "" ] ]
TITLE: Intriguing properties of neural networks ABSTRACT: Deep neural networks are highly expressive models that have recently achieved state of the art performance on speech and visual recognition tasks. While their expressiveness is the reason they succeed, it also causes them to learn uninterpretable solutions that could have counter-intuitive properties. In this paper we report two such properties. First, we find that there is no distinction between individual high level units and random linear combinations of high level units, according to various methods of unit analysis. It suggests that it is the space, rather than the individual units, that contains of the semantic information in the high layers of neural networks. Second, we find that deep neural networks learn input-output mappings that are fairly discontinuous to a significant extend. We can cause the network to misclassify an image by applying a certain imperceptible perturbation, which is found by maximizing the network's prediction error. In addition, the specific nature of these perturbations is not a random artifact of learning: the same perturbation can cause a different network, that was trained on a different subset of the dataset, to misclassify the same input.
1402.4542
Chunguo Li
Chun-Guo Li, Xing Mei, Bao-Gang Hu
Unsupervised Ranking of Multi-Attribute Objects Based on Principal Curves
This paper has 14 pages and 9 figures. The paper has submitted to IEEE Transactions on Knowledge and Data Engineering (TKDE)
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unsupervised ranking faces one critical challenge in evaluation applications, that is, no ground truth is available. When PageRank and its variants show a good solution in related subjects, they are applicable only for ranking from link-structure data. In this work, we focus on unsupervised ranking from multi-attribute data which is also common in evaluation tasks. To overcome the challenge, we propose five essential meta-rules for the design and assessment of unsupervised ranking approaches: scale and translation invariance, strict monotonicity, linear/nonlinear capacities, smoothness, and explicitness of parameter size. These meta-rules are regarded as high level knowledge for unsupervised ranking tasks. Inspired by the works in [8] and [14], we propose a ranking principal curve (RPC) model, which learns a one-dimensional manifold function to perform unsupervised ranking tasks on multi-attribute observations. Furthermore, the RPC is modeled to be a cubic B\'ezier curve with control points restricted in the interior of a hypercube, thereby complying with all the five meta-rules to infer a reasonable ranking list. With control points as the model parameters, one is able to understand the learned manifold and to interpret the ranking list semantically. Numerical experiments of the presented RPC model are conducted on two open datasets of different ranking applications. In comparison with the state-of-the-art approaches, the new model is able to show more reasonable ranking lists.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 01:29:14 GMT" } ]
2014-02-20T00:00:00
[ [ "Li", "Chun-Guo", "" ], [ "Mei", "Xing", "" ], [ "Hu", "Bao-Gang", "" ] ]
TITLE: Unsupervised Ranking of Multi-Attribute Objects Based on Principal Curves ABSTRACT: Unsupervised ranking faces one critical challenge in evaluation applications, that is, no ground truth is available. When PageRank and its variants show a good solution in related subjects, they are applicable only for ranking from link-structure data. In this work, we focus on unsupervised ranking from multi-attribute data which is also common in evaluation tasks. To overcome the challenge, we propose five essential meta-rules for the design and assessment of unsupervised ranking approaches: scale and translation invariance, strict monotonicity, linear/nonlinear capacities, smoothness, and explicitness of parameter size. These meta-rules are regarded as high level knowledge for unsupervised ranking tasks. Inspired by the works in [8] and [14], we propose a ranking principal curve (RPC) model, which learns a one-dimensional manifold function to perform unsupervised ranking tasks on multi-attribute observations. Furthermore, the RPC is modeled to be a cubic B\'ezier curve with control points restricted in the interior of a hypercube, thereby complying with all the five meta-rules to infer a reasonable ranking list. With control points as the model parameters, one is able to understand the learned manifold and to interpret the ranking list semantically. Numerical experiments of the presented RPC model are conducted on two open datasets of different ranking applications. In comparison with the state-of-the-art approaches, the new model is able to show more reasonable ranking lists.
1402.4624
Aleksandr Aravkin
Aleksandr Y. Aravkin and Anju Kambadur and Aurelie C. Lozano and Ronny Luss
Sparse Quantile Huber Regression for Efficient and Robust Estimation
9 pages
null
null
null
stat.ML cs.DS math.OC stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider new formulations and methods for sparse quantile regression in the high-dimensional setting. Quantile regression plays an important role in many applications, including outlier-robust exploratory analysis in gene selection. In addition, the sparsity consideration in quantile regression enables the exploration of the entire conditional distribution of the response variable given the predictors and therefore yields a more comprehensive view of the important predictors. We propose a generalized OMP algorithm for variable selection, taking the misfit loss to be either the traditional quantile loss or a smooth version we call quantile Huber, and compare the resulting greedy approaches with convex sparsity-regularized formulations. We apply a recently proposed interior point methodology to efficiently solve all convex formulations as well as convex subproblems in the generalized OMP setting, pro- vide theoretical guarantees of consistent estimation, and demonstrate the performance of our approach using empirical studies of simulated and genomic datasets.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 11:18:32 GMT" } ]
2014-02-20T00:00:00
[ [ "Aravkin", "Aleksandr Y.", "" ], [ "Kambadur", "Anju", "" ], [ "Lozano", "Aurelie C.", "" ], [ "Luss", "Ronny", "" ] ]
TITLE: Sparse Quantile Huber Regression for Efficient and Robust Estimation ABSTRACT: We consider new formulations and methods for sparse quantile regression in the high-dimensional setting. Quantile regression plays an important role in many applications, including outlier-robust exploratory analysis in gene selection. In addition, the sparsity consideration in quantile regression enables the exploration of the entire conditional distribution of the response variable given the predictors and therefore yields a more comprehensive view of the important predictors. We propose a generalized OMP algorithm for variable selection, taking the misfit loss to be either the traditional quantile loss or a smooth version we call quantile Huber, and compare the resulting greedy approaches with convex sparsity-regularized formulations. We apply a recently proposed interior point methodology to efficiently solve all convex formulations as well as convex subproblems in the generalized OMP setting, pro- vide theoretical guarantees of consistent estimation, and demonstrate the performance of our approach using empirical studies of simulated and genomic datasets.
1402.4653
Sohan Seth
Sohan Seth, John Shawe-Taylor, Samuel Kaski
Retrieval of Experiments by Efficient Estimation of Marginal Likelihood
null
null
null
null
stat.ML cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the task of retrieving relevant experiments given a query experiment. By experiment, we mean a collection of measurements from a set of `covariates' and the associated `outcomes'. While similar experiments can be retrieved by comparing available `annotations', this approach ignores the valuable information available in the measurements themselves. To incorporate this information in the retrieval task, we suggest employing a retrieval metric that utilizes probabilistic models learned from the measurements. We argue that such a metric is a sensible measure of similarity between two experiments since it permits inclusion of experiment-specific prior knowledge. However, accurate models are often not analytical, and one must resort to storing posterior samples which demands considerable resources. Therefore, we study strategies to select informative posterior samples to reduce the computational load while maintaining the retrieval performance. We demonstrate the efficacy of our approach on simulated data with simple linear regression as the models, and real world datasets.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 13:21:40 GMT" } ]
2014-02-20T00:00:00
[ [ "Seth", "Sohan", "" ], [ "Shawe-Taylor", "John", "" ], [ "Kaski", "Samuel", "" ] ]
TITLE: Retrieval of Experiments by Efficient Estimation of Marginal Likelihood ABSTRACT: We study the task of retrieving relevant experiments given a query experiment. By experiment, we mean a collection of measurements from a set of `covariates' and the associated `outcomes'. While similar experiments can be retrieved by comparing available `annotations', this approach ignores the valuable information available in the measurements themselves. To incorporate this information in the retrieval task, we suggest employing a retrieval metric that utilizes probabilistic models learned from the measurements. We argue that such a metric is a sensible measure of similarity between two experiments since it permits inclusion of experiment-specific prior knowledge. However, accurate models are often not analytical, and one must resort to storing posterior samples which demands considerable resources. Therefore, we study strategies to select informative posterior samples to reduce the computational load while maintaining the retrieval performance. We demonstrate the efficacy of our approach on simulated data with simple linear regression as the models, and real world datasets.
1402.4699
Shujia Liu
Shujia Liu
A Powerful Genetic Algorithm for Traveling Salesman Problem
5 pages, 1 figure
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a powerful genetic algorithm(GA) to solve the traveling salesman problem (TSP). To construct a powerful GA, I use edge swapping(ES) with a local search procedure to determine good combinations of building blocks of parent solutions for generating even better offspring solutions. Experimental results on well studied TSP benchmarks demonstrate that the proposed GA is competitive in finding very high quality solutions on instances with up to 16,862 cities.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 15:33:35 GMT" } ]
2014-02-20T00:00:00
[ [ "Liu", "Shujia", "" ] ]
TITLE: A Powerful Genetic Algorithm for Traveling Salesman Problem ABSTRACT: This paper presents a powerful genetic algorithm(GA) to solve the traveling salesman problem (TSP). To construct a powerful GA, I use edge swapping(ES) with a local search procedure to determine good combinations of building blocks of parent solutions for generating even better offspring solutions. Experimental results on well studied TSP benchmarks demonstrate that the proposed GA is competitive in finding very high quality solutions on instances with up to 16,862 cities.
1309.1369
Aleksandr Aravkin
Aleksandr Y. Aravkin, Anna Choromanska, Tony Jebara, and Dimitri Kanevsky
Semistochastic Quadratic Bound Methods
11 pages, 1 figure
null
null
null
stat.ML cs.LG math.NA stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Partition functions arise in a variety of settings, including conditional random fields, logistic regression, and latent gaussian models. In this paper, we consider semistochastic quadratic bound (SQB) methods for maximum likelihood inference based on partition function optimization. Batch methods based on the quadratic bound were recently proposed for this class of problems, and performed favorably in comparison to state-of-the-art techniques. Semistochastic methods fall in between batch algorithms, which use all the data, and stochastic gradient type methods, which use small random selections at each iteration. We build semistochastic quadratic bound-based methods, and prove both global convergence (to a stationary point) under very weak assumptions, and linear convergence rate under stronger assumptions on the objective. To make the proposed methods faster and more stable, we consider inexact subproblem minimization and batch-size selection schemes. The efficacy of SQB methods is demonstrated via comparison with several state-of-the-art techniques on commonly used datasets.
[ { "version": "v1", "created": "Thu, 5 Sep 2013 15:12:11 GMT" }, { "version": "v2", "created": "Sat, 21 Dec 2013 02:42:50 GMT" }, { "version": "v3", "created": "Sat, 25 Jan 2014 21:00:34 GMT" }, { "version": "v4", "created": "Mon, 17 Feb 2014 22:18:34 GMT" } ]
2014-02-19T00:00:00
[ [ "Aravkin", "Aleksandr Y.", "" ], [ "Choromanska", "Anna", "" ], [ "Jebara", "Tony", "" ], [ "Kanevsky", "Dimitri", "" ] ]
TITLE: Semistochastic Quadratic Bound Methods ABSTRACT: Partition functions arise in a variety of settings, including conditional random fields, logistic regression, and latent gaussian models. In this paper, we consider semistochastic quadratic bound (SQB) methods for maximum likelihood inference based on partition function optimization. Batch methods based on the quadratic bound were recently proposed for this class of problems, and performed favorably in comparison to state-of-the-art techniques. Semistochastic methods fall in between batch algorithms, which use all the data, and stochastic gradient type methods, which use small random selections at each iteration. We build semistochastic quadratic bound-based methods, and prove both global convergence (to a stationary point) under very weak assumptions, and linear convergence rate under stronger assumptions on the objective. To make the proposed methods faster and more stable, we consider inexact subproblem minimization and batch-size selection schemes. The efficacy of SQB methods is demonstrated via comparison with several state-of-the-art techniques on commonly used datasets.
1309.3797
Louis M Shekhtman
Louis M. Shekhtman, James P. Bagrow, and Dirk Brockmann
Robustness of skeletons and salient features in networks
null
null
10.1093/comnet/cnt019
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real world network datasets often contain a wealth of complex topological information. In the face of these data, researchers often employ methods to extract reduced networks containing the most important structures or pathways, sometimes known as `skeletons' or `backbones'. Numerous such methods have been developed. Yet data are often noisy or incomplete, with unknown numbers of missing or spurious links. Relatively little effort has gone into understanding how salient network extraction methods perform in the face of noisy or incomplete networks. We study this problem by comparing how the salient features extracted by two popular methods change when networks are perturbed, either by deleting nodes or links, or by randomly rewiring links. Our results indicate that simple, global statistics for skeletons can be accurately inferred even for noisy and incomplete network data, but it is crucial to have complete, reliable data to use the exact topologies of skeletons or backbones. These results also help us understand how skeletons respond to damage to the network itself, as in an attack scenario.
[ { "version": "v1", "created": "Sun, 15 Sep 2013 20:48:41 GMT" } ]
2014-02-19T00:00:00
[ [ "Shekhtman", "Louis M.", "" ], [ "Bagrow", "James P.", "" ], [ "Brockmann", "Dirk", "" ] ]
TITLE: Robustness of skeletons and salient features in networks ABSTRACT: Real world network datasets often contain a wealth of complex topological information. In the face of these data, researchers often employ methods to extract reduced networks containing the most important structures or pathways, sometimes known as `skeletons' or `backbones'. Numerous such methods have been developed. Yet data are often noisy or incomplete, with unknown numbers of missing or spurious links. Relatively little effort has gone into understanding how salient network extraction methods perform in the face of noisy or incomplete networks. We study this problem by comparing how the salient features extracted by two popular methods change when networks are perturbed, either by deleting nodes or links, or by randomly rewiring links. Our results indicate that simple, global statistics for skeletons can be accurately inferred even for noisy and incomplete network data, but it is crucial to have complete, reliable data to use the exact topologies of skeletons or backbones. These results also help us understand how skeletons respond to damage to the network itself, as in an attack scenario.
1312.4695
Wiktor Mlynarski
Wiktor Mlynarski
Sparse, complex-valued representations of natural sounds learned with phase and amplitude continuity priors
11 + 7 pages This version includes changes suggested by ICLR 2014 reviewers
null
null
null
cs.LG cs.SD q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex-valued sparse coding is a data representation which employs a dictionary of two-dimensional subspaces, while imposing a sparse, factorial prior on complex amplitudes. When trained on a dataset of natural image patches, it learns phase invariant features which closely resemble receptive fields of complex cells in the visual cortex. Features trained on natural sounds however, rarely reveal phase invariance and capture other aspects of the data. This observation is a starting point of the present work. As its first contribution, it provides an analysis of natural sound statistics by means of learning sparse, complex representations of short speech intervals. Secondly, it proposes priors over the basis function set, which bias them towards phase-invariant solutions. In this way, a dictionary of complex basis functions can be learned from the data statistics, while preserving the phase invariance property. Finally, representations trained on speech sounds with and without priors are compared. Prior-based basis functions reveal performance comparable to unconstrained sparse coding, while explicitely representing phase as a temporal shift. Such representations can find applications in many perceptual and machine learning tasks.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 09:12:55 GMT" }, { "version": "v2", "created": "Wed, 18 Dec 2013 10:48:17 GMT" }, { "version": "v3", "created": "Tue, 18 Feb 2014 10:20:25 GMT" } ]
2014-02-19T00:00:00
[ [ "Mlynarski", "Wiktor", "" ] ]
TITLE: Sparse, complex-valued representations of natural sounds learned with phase and amplitude continuity priors ABSTRACT: Complex-valued sparse coding is a data representation which employs a dictionary of two-dimensional subspaces, while imposing a sparse, factorial prior on complex amplitudes. When trained on a dataset of natural image patches, it learns phase invariant features which closely resemble receptive fields of complex cells in the visual cortex. Features trained on natural sounds however, rarely reveal phase invariance and capture other aspects of the data. This observation is a starting point of the present work. As its first contribution, it provides an analysis of natural sound statistics by means of learning sparse, complex representations of short speech intervals. Secondly, it proposes priors over the basis function set, which bias them towards phase-invariant solutions. In this way, a dictionary of complex basis functions can be learned from the data statistics, while preserving the phase invariance property. Finally, representations trained on speech sounds with and without priors are compared. Prior-based basis functions reveal performance comparable to unconstrained sparse coding, while explicitely representing phase as a temporal shift. Such representations can find applications in many perceptual and machine learning tasks.
1312.5869
Dimitrios Athanasakis Mr
Dimitrios Athanasakis, John Shawe-Taylor, Delmiro Fernandez-Reyes
Principled Non-Linear Feature Selection
arXiv admin note: substantial text overlap with arXiv:1311.5636
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent non-linear feature selection approaches employing greedy optimisation of Centred Kernel Target Alignment(KTA) exhibit strong results in terms of generalisation accuracy and sparsity. However, they are computationally prohibitive for large datasets. We propose randSel, a randomised feature selection algorithm, with attractive scaling properties. Our theoretical analysis of randSel provides strong probabilistic guarantees for correct identification of relevant features. RandSel's characteristics make it an ideal candidate for identifying informative learned representations. We've conducted experimentation to establish the performance of this approach, and present encouraging results, including a 3rd position result in the recent ICML black box learning challenge as well as competitive results for signal peptide prediction, an important problem in bioinformatics.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 10:16:13 GMT" }, { "version": "v2", "created": "Tue, 18 Feb 2014 17:25:43 GMT" } ]
2014-02-19T00:00:00
[ [ "Athanasakis", "Dimitrios", "" ], [ "Shawe-Taylor", "John", "" ], [ "Fernandez-Reyes", "Delmiro", "" ] ]
TITLE: Principled Non-Linear Feature Selection ABSTRACT: Recent non-linear feature selection approaches employing greedy optimisation of Centred Kernel Target Alignment(KTA) exhibit strong results in terms of generalisation accuracy and sparsity. However, they are computationally prohibitive for large datasets. We propose randSel, a randomised feature selection algorithm, with attractive scaling properties. Our theoretical analysis of randSel provides strong probabilistic guarantees for correct identification of relevant features. RandSel's characteristics make it an ideal candidate for identifying informative learned representations. We've conducted experimentation to establish the performance of this approach, and present encouraging results, including a 3rd position result in the recent ICML black box learning challenge as well as competitive results for signal peptide prediction, an important problem in bioinformatics.
1402.4293
Alexander Davies
Alex Davies, Zoubin Ghahramani
The Random Forest Kernel and other kernels for big data from random partitions
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Random Partition Kernels, a new class of kernels derived by demonstrating a natural connection between random partitions of objects and kernels between those objects. We show how the construction can be used to create kernels from methods that would not normally be viewed as random partitions, such as Random Forest. To demonstrate the potential of this method, we propose two new kernels, the Random Forest Kernel and the Fast Cluster Kernel, and show that these kernels consistently outperform standard kernels on problems involving real-world datasets. Finally, we show how the form of these kernels lend themselves to a natural approximation that is appropriate for certain big data problems, allowing $O(N)$ inference in methods such as Gaussian Processes, Support Vector Machines and Kernel PCA.
[ { "version": "v1", "created": "Tue, 18 Feb 2014 11:13:45 GMT" } ]
2014-02-19T00:00:00
[ [ "Davies", "Alex", "" ], [ "Ghahramani", "Zoubin", "" ] ]
TITLE: The Random Forest Kernel and other kernels for big data from random partitions ABSTRACT: We present Random Partition Kernels, a new class of kernels derived by demonstrating a natural connection between random partitions of objects and kernels between those objects. We show how the construction can be used to create kernels from methods that would not normally be viewed as random partitions, such as Random Forest. To demonstrate the potential of this method, we propose two new kernels, the Random Forest Kernel and the Fast Cluster Kernel, and show that these kernels consistently outperform standard kernels on problems involving real-world datasets. Finally, we show how the form of these kernels lend themselves to a natural approximation that is appropriate for certain big data problems, allowing $O(N)$ inference in methods such as Gaussian Processes, Support Vector Machines and Kernel PCA.
1402.4388
Mohammed Javed
Mohammed Javed, P. Nagabhushan, B.B. Chaudhuri
Automatic Detection of Font Size Straight from Run Length Compressed Text Documents
8 Pages
(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 818-825
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic detection of font size finds many applications in the area of intelligent OCRing and document image analysis, which has been traditionally practiced over uncompressed documents, although in real life the documents exist in compressed form for efficient storage and transmission. It would be novel and intelligent if the task of font size detection could be carried out directly from the compressed data of these documents without decompressing, which would result in saving of considerable amount of processing time and space. Therefore, in this paper we present a novel idea of learning and detecting font size directly from run-length compressed text documents at line level using simple line height features, which paves the way for intelligent OCRing and document analysis directly from compressed documents. In the proposed model, the given mixed-case text documents of different font size are segmented into compressed text lines and the features extracted such as line height and ascender height are used to capture the pattern of font size in the form of a regression line, using which the automatic detection of font size is done during the recognition stage. The method is experimented with a dataset of 50 compressed documents consisting of 780 text lines of single font size and 375 text lines of mixed font size resulting in an overall accuracy of 99.67%.
[ { "version": "v1", "created": "Tue, 18 Feb 2014 16:30:59 GMT" } ]
2014-02-19T00:00:00
[ [ "Javed", "Mohammed", "" ], [ "Nagabhushan", "P.", "" ], [ "Chaudhuri", "B. B.", "" ] ]
TITLE: Automatic Detection of Font Size Straight from Run Length Compressed Text Documents ABSTRACT: Automatic detection of font size finds many applications in the area of intelligent OCRing and document image analysis, which has been traditionally practiced over uncompressed documents, although in real life the documents exist in compressed form for efficient storage and transmission. It would be novel and intelligent if the task of font size detection could be carried out directly from the compressed data of these documents without decompressing, which would result in saving of considerable amount of processing time and space. Therefore, in this paper we present a novel idea of learning and detecting font size directly from run-length compressed text documents at line level using simple line height features, which paves the way for intelligent OCRing and document analysis directly from compressed documents. In the proposed model, the given mixed-case text documents of different font size are segmented into compressed text lines and the features extracted such as line height and ascender height are used to capture the pattern of font size in the form of a regression line, using which the automatic detection of font size is done during the recognition stage. The method is experimented with a dataset of 50 compressed documents consisting of 780 text lines of single font size and 375 text lines of mixed font size resulting in an overall accuracy of 99.67%.
1210.1357
Bojin Zheng
Jun Qin, Hongrun Wu, Xiaonian Tong, Bojin Zheng
A quantitative method for determining the robustness of complex networks
null
Physica D 2013 253 85--90
10.1016/j.physd.2013.03.002
null
cs.SI nlin.AO physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most current studies estimate the invulnerability of complex networks using a qualitative method that analyzes the inaccurate decay rate of network efficiency. This method results in confusion over the invulnerability of various types of complex networks. By normalizing network efficiency and defining a baseline, this paper defines the invulnerability index as the integral of the difference between the normalized network efficiency curve and the baseline. This quantitative method seeks to establish a benchmark for the robustness and fragility of networks and to measure network invulnerability under both edge and node attacks. To validate the reliability of the proposed method, three small-world networks were selected as test beds. The simulation results indicate that the proposed invulnerability index can effectively and accurately quantify network resilience. The index should provide a valuable reference for determining network invulnerability in future research.
[ { "version": "v1", "created": "Thu, 4 Oct 2012 09:46:26 GMT" }, { "version": "v2", "created": "Sat, 23 Mar 2013 09:33:00 GMT" } ]
2014-02-18T00:00:00
[ [ "Qin", "Jun", "" ], [ "Wu", "Hongrun", "" ], [ "Tong", "Xiaonian", "" ], [ "Zheng", "Bojin", "" ] ]
TITLE: A quantitative method for determining the robustness of complex networks ABSTRACT: Most current studies estimate the invulnerability of complex networks using a qualitative method that analyzes the inaccurate decay rate of network efficiency. This method results in confusion over the invulnerability of various types of complex networks. By normalizing network efficiency and defining a baseline, this paper defines the invulnerability index as the integral of the difference between the normalized network efficiency curve and the baseline. This quantitative method seeks to establish a benchmark for the robustness and fragility of networks and to measure network invulnerability under both edge and node attacks. To validate the reliability of the proposed method, three small-world networks were selected as test beds. The simulation results indicate that the proposed invulnerability index can effectively and accurately quantify network resilience. The index should provide a valuable reference for determining network invulnerability in future research.
1301.3584
Razvan Pascanu
Razvan Pascanu and Yoshua Bengio
Revisiting Natural Gradient for Deep Networks
null
null
null
null
cs.LG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We evaluate natural gradient, an algorithm originally proposed in Amari (1997), for learning deep models. The contributions of this paper are as follows. We show the connection between natural gradient and three other recently proposed methods for training deep models: Hessian-Free (Martens, 2010), Krylov Subspace Descent (Vinyals and Povey, 2012) and TONGA (Le Roux et al., 2008). We describe how one can use unlabeled data to improve the generalization error obtained by natural gradient and empirically evaluate the robustness of the algorithm to the ordering of the training set compared to stochastic gradient descent. Finally we extend natural gradient to incorporate second order information alongside the manifold information and provide a benchmark of the new algorithm using a truncated Newton approach for inverting the metric matrix instead of using a diagonal approximation of it.
[ { "version": "v1", "created": "Wed, 16 Jan 2013 04:47:02 GMT" }, { "version": "v2", "created": "Tue, 22 Jan 2013 03:57:04 GMT" }, { "version": "v3", "created": "Wed, 23 Jan 2013 14:59:04 GMT" }, { "version": "v4", "created": "Wed, 13 Mar 2013 19:13:08 GMT" }, { "version": "v5", "created": "Fri, 20 Dec 2013 19:29:42 GMT" }, { "version": "v6", "created": "Tue, 7 Jan 2014 18:11:36 GMT" }, { "version": "v7", "created": "Mon, 17 Feb 2014 16:29:27 GMT" } ]
2014-02-18T00:00:00
[ [ "Pascanu", "Razvan", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Revisiting Natural Gradient for Deep Networks ABSTRACT: We evaluate natural gradient, an algorithm originally proposed in Amari (1997), for learning deep models. The contributions of this paper are as follows. We show the connection between natural gradient and three other recently proposed methods for training deep models: Hessian-Free (Martens, 2010), Krylov Subspace Descent (Vinyals and Povey, 2012) and TONGA (Le Roux et al., 2008). We describe how one can use unlabeled data to improve the generalization error obtained by natural gradient and empirically evaluate the robustness of the algorithm to the ordering of the training set compared to stochastic gradient descent. Finally we extend natural gradient to incorporate second order information alongside the manifold information and provide a benchmark of the new algorithm using a truncated Newton approach for inverting the metric matrix instead of using a diagonal approximation of it.
1303.5966
M\'arton Karsai
M\'arton Karsai, Nicola Perra, Alessandro Vespignani
Time varying networks and the weakness of strong ties
22 pages, 15 figures
Scientific Reports 4, 4001 (2014)
10.1038/srep04001
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In most social and information systems the activity of agents generates rapidly evolving time-varying networks. The temporal variation in networks' connectivity patterns and the ongoing dynamic processes are usually coupled in ways that still challenge our mathematical or computational modelling. Here we analyse a mobile call dataset and find a simple statistical law that characterize the temporal evolution of users' egocentric networks. We encode this observation in a reinforcement process defining a time-varying network model that exhibits the emergence of strong and weak ties. We study the effect of time-varying and heterogeneous interactions on the classic rumour spreading model in both synthetic, and real-world networks. We observe that strong ties severely inhibit information diffusion by confining the spreading process among agents with recurrent communication patterns. This provides the counterintuitive evidence that strong ties may have a negative role in the spreading of information across networks.
[ { "version": "v1", "created": "Sun, 24 Mar 2013 16:42:48 GMT" }, { "version": "v2", "created": "Mon, 17 Feb 2014 14:25:55 GMT" } ]
2014-02-18T00:00:00
[ [ "Karsai", "Márton", "" ], [ "Perra", "Nicola", "" ], [ "Vespignani", "Alessandro", "" ] ]
TITLE: Time varying networks and the weakness of strong ties ABSTRACT: In most social and information systems the activity of agents generates rapidly evolving time-varying networks. The temporal variation in networks' connectivity patterns and the ongoing dynamic processes are usually coupled in ways that still challenge our mathematical or computational modelling. Here we analyse a mobile call dataset and find a simple statistical law that characterize the temporal evolution of users' egocentric networks. We encode this observation in a reinforcement process defining a time-varying network model that exhibits the emergence of strong and weak ties. We study the effect of time-varying and heterogeneous interactions on the classic rumour spreading model in both synthetic, and real-world networks. We observe that strong ties severely inhibit information diffusion by confining the spreading process among agents with recurrent communication patterns. This provides the counterintuitive evidence that strong ties may have a negative role in the spreading of information across networks.
1312.5242
Alexey Dosovitskiy
Alexey Dosovitskiy, Jost Tobias Springenberg and Thomas Brox
Unsupervised feature learning by augmenting single images
ICLR 2014 workshop track submission (7 pages, 4 figures, 1 table)
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When deep learning is applied to visual object recognition, data augmentation is often used to generate additional training data without extra labeling cost. It helps to reduce overfitting and increase the performance of the algorithm. In this paper we investigate if it is possible to use data augmentation as the main component of an unsupervised feature learning architecture. To that end we sample a set of random image patches and declare each of them to be a separate single-image surrogate class. We then extend these trivial one-element classes by applying a variety of transformations to the initial 'seed' patches. Finally we train a convolutional neural network to discriminate between these surrogate classes. The feature representation learned by the network can then be used in various vision tasks. We find that this simple feature learning algorithm is surprisingly successful, achieving competitive classification results on several popular vision datasets (STL-10, CIFAR-10, Caltech-101).
[ { "version": "v1", "created": "Wed, 18 Dec 2013 17:44:17 GMT" }, { "version": "v2", "created": "Fri, 24 Jan 2014 18:02:09 GMT" }, { "version": "v3", "created": "Sun, 16 Feb 2014 13:07:23 GMT" } ]
2014-02-18T00:00:00
[ [ "Dosovitskiy", "Alexey", "" ], [ "Springenberg", "Jost Tobias", "" ], [ "Brox", "Thomas", "" ] ]
TITLE: Unsupervised feature learning by augmenting single images ABSTRACT: When deep learning is applied to visual object recognition, data augmentation is often used to generate additional training data without extra labeling cost. It helps to reduce overfitting and increase the performance of the algorithm. In this paper we investigate if it is possible to use data augmentation as the main component of an unsupervised feature learning architecture. To that end we sample a set of random image patches and declare each of them to be a separate single-image surrogate class. We then extend these trivial one-element classes by applying a variety of transformations to the initial 'seed' patches. Finally we train a convolutional neural network to discriminate between these surrogate classes. The feature representation learned by the network can then be used in various vision tasks. We find that this simple feature learning algorithm is surprisingly successful, achieving competitive classification results on several popular vision datasets (STL-10, CIFAR-10, Caltech-101).
1312.6095
Bojan Pepikj
Bojan Pepik, Michael Stark, Peter Gehler, Bernt Schiele
Multi-View Priors for Learning Detectors from Sparse Viewpoint Data
13 pages, 7 figures, 4 tables, International Conference on Learning Representations 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While the majority of today's object class models provide only 2D bounding boxes, far richer output hypotheses are desirable including viewpoint, fine-grained category, and 3D geometry estimate. However, models trained to provide richer output require larger amounts of training data, preferably well covering the relevant aspects such as viewpoint and fine-grained categories. In this paper, we address this issue from the perspective of transfer learning, and design an object class model that explicitly leverages correlations between visual features. Specifically, our model represents prior distributions over permissible multi-view detectors in a parametric way -- the priors are learned once from training data of a source object class, and can later be used to facilitate the learning of a detector for a target class. As we show in our experiments, this transfer is not only beneficial for detectors based on basic-level category representations, but also enables the robust learning of detectors that represent classes at finer levels of granularity, where training data is typically even scarcer and more unbalanced. As a result, we report largely improved performance in simultaneous 2D object localization and viewpoint estimation on a recent dataset of challenging street scenes.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 20:12:07 GMT" }, { "version": "v2", "created": "Sun, 16 Feb 2014 10:39:35 GMT" } ]
2014-02-18T00:00:00
[ [ "Pepik", "Bojan", "" ], [ "Stark", "Michael", "" ], [ "Gehler", "Peter", "" ], [ "Schiele", "Bernt", "" ] ]
TITLE: Multi-View Priors for Learning Detectors from Sparse Viewpoint Data ABSTRACT: While the majority of today's object class models provide only 2D bounding boxes, far richer output hypotheses are desirable including viewpoint, fine-grained category, and 3D geometry estimate. However, models trained to provide richer output require larger amounts of training data, preferably well covering the relevant aspects such as viewpoint and fine-grained categories. In this paper, we address this issue from the perspective of transfer learning, and design an object class model that explicitly leverages correlations between visual features. Specifically, our model represents prior distributions over permissible multi-view detectors in a parametric way -- the priors are learned once from training data of a source object class, and can later be used to facilitate the learning of a detector for a target class. As we show in our experiments, this transfer is not only beneficial for detectors based on basic-level category representations, but also enables the robust learning of detectors that represent classes at finer levels of granularity, where training data is typically even scarcer and more unbalanced. As a result, we report largely improved performance in simultaneous 2D object localization and viewpoint estimation on a recent dataset of challenging street scenes.
1402.3643
Shayan Oveis Gharan
Mohammad Akbarpour and Shengwu Li and Shayan Oveis Gharan
Dynamic Matching Market Design
null
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a simple benchmark model of dynamic matching in networked markets, where agents arrive and depart stochastically and the network of acceptable transactions among agents forms a random graph. We analyze our model from three perspectives: waiting, optimization, and information. The main insight of our analysis is that waiting to thicken the market can be substantially more important than increasing the speed of transactions, and this is quite robust to the presence of waiting costs. From an optimization perspective, naive local algorithms, that choose the right time to match agents but do not exploit global network structure, can perform very close to optimal algorithms. From an information perspective, algorithms that employ even partial information on agents' departure times perform substantially better than those that lack such information. To elicit agents' departure times, we design an incentive-compatible continuous-time dynamic mechanism without transfers.
[ { "version": "v1", "created": "Sat, 15 Feb 2014 04:30:41 GMT" } ]
2014-02-18T00:00:00
[ [ "Akbarpour", "Mohammad", "" ], [ "Li", "Shengwu", "" ], [ "Gharan", "Shayan Oveis", "" ] ]
TITLE: Dynamic Matching Market Design ABSTRACT: We introduce a simple benchmark model of dynamic matching in networked markets, where agents arrive and depart stochastically and the network of acceptable transactions among agents forms a random graph. We analyze our model from three perspectives: waiting, optimization, and information. The main insight of our analysis is that waiting to thicken the market can be substantially more important than increasing the speed of transactions, and this is quite robust to the presence of waiting costs. From an optimization perspective, naive local algorithms, that choose the right time to match agents but do not exploit global network structure, can perform very close to optimal algorithms. From an information perspective, algorithms that employ even partial information on agents' departure times perform substantially better than those that lack such information. To elicit agents' departure times, we design an incentive-compatible continuous-time dynamic mechanism without transfers.
1402.3689
Radu Horaud P
Maxime Janvier, Xavier Alameda-Pineda, Laurent Girin and Radu Horaud
Sound Representation and Classification Benchmark for Domestic Robots
8 pages, 2 figures
null
null
null
cs.SD cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of sound representation and classification and present results of a comparative study in the context of a domestic robotic scenario. A dataset of sounds was recorded in realistic conditions (background noise, presence of several sound sources, reverberations, etc.) using the humanoid robot NAO. An extended benchmark is carried out to test a variety of representations combined with several classifiers. We provide results obtained with the annotated dataset and we assess the methods quantitatively on the basis of their classification scores, computation times and memory requirements. The annotated dataset is publicly available at https://team.inria.fr/perception/nard/.
[ { "version": "v1", "created": "Sat, 15 Feb 2014 13:27:01 GMT" } ]
2014-02-18T00:00:00
[ [ "Janvier", "Maxime", "" ], [ "Alameda-Pineda", "Xavier", "" ], [ "Girin", "Laurent", "" ], [ "Horaud", "Radu", "" ] ]
TITLE: Sound Representation and Classification Benchmark for Domestic Robots ABSTRACT: We address the problem of sound representation and classification and present results of a comparative study in the context of a domestic robotic scenario. A dataset of sounds was recorded in realistic conditions (background noise, presence of several sound sources, reverberations, etc.) using the humanoid robot NAO. An extended benchmark is carried out to test a variety of representations combined with several classifiers. We provide results obtained with the annotated dataset and we assess the methods quantitatively on the basis of their classification scores, computation times and memory requirements. The annotated dataset is publicly available at https://team.inria.fr/perception/nard/.
1402.3821
Ylies Falcone
Tom Cornebize and Yli\`es Falcone
Efficient and Generalized Decentralized Monitoring of Regular Languages
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main contribution of this paper is an efficient and generalized decentralized monitoring algorithm allowing to detect satisfaction or violation of any regular specification by local monitors alone in a system without central observation point. Our algorithm does not assume any form of synchronization between system events and communication of monitors, uses state machines as underlying mechanism for efficiency, and tries to keep the number and size of messages exchanged between monitors to a minimum. We provide a full implementation of the algorithm with an open-source benchmark to evaluate its efficiency in terms of number, size of exchanged messages, and delay induced by communication between monitors. Experimental results demonstrate the effectiveness of our algorithm which outperforms the previous most general one along several (new) monitoring metrics.
[ { "version": "v1", "created": "Sun, 16 Feb 2014 17:49:57 GMT" } ]
2014-02-18T00:00:00
[ [ "Cornebize", "Tom", "" ], [ "Falcone", "Yliès", "" ] ]
TITLE: Efficient and Generalized Decentralized Monitoring of Regular Languages ABSTRACT: The main contribution of this paper is an efficient and generalized decentralized monitoring algorithm allowing to detect satisfaction or violation of any regular specification by local monitors alone in a system without central observation point. Our algorithm does not assume any form of synchronization between system events and communication of monitors, uses state machines as underlying mechanism for efficiency, and tries to keep the number and size of messages exchanged between monitors to a minimum. We provide a full implementation of the algorithm with an open-source benchmark to evaluate its efficiency in terms of number, size of exchanged messages, and delay induced by communication between monitors. Experimental results demonstrate the effectiveness of our algorithm which outperforms the previous most general one along several (new) monitoring metrics.
1402.3847
Daniele de Rigo
Claudio Bosco, Daniele de Rigo, Olivier Dewitte and Luca Montanarella
Towards the reproducibility in soil erosion modeling: a new Pan-European soil erosion map
9 pages, from a poster presented at the Wageningen Conference on Applied Soil Science "Soil Science in a Changing World", 18 - 22 September 2011, Wageningen, The Netherlands
null
10.6084/m9.figshare.936872
null
cs.SY cs.CE physics.geo-ph
http://creativecommons.org/licenses/by/3.0/
Soil erosion by water is a widespread phenomenon throughout Europe and has the potentiality, with his on-site and off-site effects, to affect water quality, food security and floods. Despite the implementation of numerous and different models for estimating soil erosion by water in Europe, there is still a lack of harmonization of assessment methodologies. Often, different approaches result in soil erosion rates significantly different. Even when the same model is applied to the same region the results may differ. This can be due to the way the model is implemented (i.e. with the selection of different algorithms when available) and/or to the use of datasets having different resolution or accuracy. Scientific computation is emerging as one of the central topic of the scientific method, for overcoming these problems there is thus the necessity to develop reproducible computational method where codes and data are available. The present study illustrates this approach. Using only public available datasets, we applied the Revised Universal Soil loss Equation (RUSLE) to locate the most sensitive areas to soil erosion by water in Europe. A significant effort was made for selecting the better simplified equations to be used when a strict application of the RUSLE model is not possible. In particular for the computation of the Rainfall Erosivity factor (R) the reproducible research paradigm was applied. The calculation of the R factor was implemented using public datasets and the GNU R language. An easily reproducible validation procedure based on measured precipitation time series was applied using MATLAB language. Designing the computational modelling architecture with the aim to ease as much as possible the future reuse of the model in analysing climate change scenarios is also a challenging goal of the research.
[ { "version": "v1", "created": "Sun, 16 Feb 2014 22:10:42 GMT" } ]
2014-02-18T00:00:00
[ [ "Bosco", "Claudio", "" ], [ "de Rigo", "Daniele", "" ], [ "Dewitte", "Olivier", "" ], [ "Montanarella", "Luca", "" ] ]
TITLE: Towards the reproducibility in soil erosion modeling: a new Pan-European soil erosion map ABSTRACT: Soil erosion by water is a widespread phenomenon throughout Europe and has the potentiality, with his on-site and off-site effects, to affect water quality, food security and floods. Despite the implementation of numerous and different models for estimating soil erosion by water in Europe, there is still a lack of harmonization of assessment methodologies. Often, different approaches result in soil erosion rates significantly different. Even when the same model is applied to the same region the results may differ. This can be due to the way the model is implemented (i.e. with the selection of different algorithms when available) and/or to the use of datasets having different resolution or accuracy. Scientific computation is emerging as one of the central topic of the scientific method, for overcoming these problems there is thus the necessity to develop reproducible computational method where codes and data are available. The present study illustrates this approach. Using only public available datasets, we applied the Revised Universal Soil loss Equation (RUSLE) to locate the most sensitive areas to soil erosion by water in Europe. A significant effort was made for selecting the better simplified equations to be used when a strict application of the RUSLE model is not possible. In particular for the computation of the Rainfall Erosivity factor (R) the reproducible research paradigm was applied. The calculation of the R factor was implemented using public datasets and the GNU R language. An easily reproducible validation procedure based on measured precipitation time series was applied using MATLAB language. Designing the computational modelling architecture with the aim to ease as much as possible the future reuse of the model in analysing climate change scenarios is also a challenging goal of the research.
1402.3926
Hideitsu Hino
Toshiyuki Kato, Hideitsu Hino, and Noboru Murata
Sparse Coding Approach for Multi-Frame Image Super Resolution
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An image super-resolution method from multiple observation of low-resolution images is proposed. The method is based on sub-pixel accuracy block matching for estimating relative displacements of observed images, and sparse signal representation for estimating the corresponding high-resolution image. Relative displacements of small patches of observed low-resolution images are accurately estimated by a computationally efficient block matching method. Since the estimated displacements are also regarded as a warping component of image degradation process, the matching results are directly utilized to generate low-resolution dictionary for sparse image representation. The matching scores of the block matching are used to select a subset of low-resolution patches for reconstructing a high-resolution patch, that is, an adaptive selection of informative low-resolution images is realized. When there is only one low-resolution image, the proposed method works as a single-frame super-resolution method. The proposed method is shown to perform comparable or superior to conventional single- and multi-frame super-resolution methods through experiments using various real-world datasets.
[ { "version": "v1", "created": "Mon, 17 Feb 2014 08:23:35 GMT" } ]
2014-02-18T00:00:00
[ [ "Kato", "Toshiyuki", "" ], [ "Hino", "Hideitsu", "" ], [ "Murata", "Noboru", "" ] ]
TITLE: Sparse Coding Approach for Multi-Frame Image Super Resolution ABSTRACT: An image super-resolution method from multiple observation of low-resolution images is proposed. The method is based on sub-pixel accuracy block matching for estimating relative displacements of observed images, and sparse signal representation for estimating the corresponding high-resolution image. Relative displacements of small patches of observed low-resolution images are accurately estimated by a computationally efficient block matching method. Since the estimated displacements are also regarded as a warping component of image degradation process, the matching results are directly utilized to generate low-resolution dictionary for sparse image representation. The matching scores of the block matching are used to select a subset of low-resolution patches for reconstructing a high-resolution patch, that is, an adaptive selection of informative low-resolution images is realized. When there is only one low-resolution image, the proposed method works as a single-frame super-resolution method. The proposed method is shown to perform comparable or superior to conventional single- and multi-frame super-resolution methods through experiments using various real-world datasets.
1402.4033
Erheng Zhong
Erheng Zhong, Evan Wei Xiang, Wei Fan, Nathan Nan Liu, Qiang Yang
Friendship Prediction in Composite Social Networks
10 pages
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Friendship prediction is an important task in social network analysis (SNA). It can help users identify friends and improve their level of activity. Most previous approaches predict users' friendship based on their historical records, such as their existing friendship, social interactions, etc. However, in reality, most users have limited friends in a single network, and the data can be very sparse. The sparsity problem causes existing methods to overfit the rare observations and suffer from serious performance degradation. This is particularly true when a new social network just starts to form. We observe that many of today's social networks are composite in nature, where people are often engaged in multiple networks. In addition, users' friendships are always correlated, for example, they are both friends on Facebook and Google+. Thus, by considering those overlapping users as the bridge, the friendship knowledge in other networks can help predict their friendships in the current network. This can be achieved by exploiting the knowledge in different networks in a collective manner. However, as each individual network has its own properties that can be incompatible and inconsistent with other networks, the naive merging of all networks into a single one may not work well. The proposed solution is to extract the common behaviors between different networks via a hierarchical Bayesian model. It captures the common knowledge across networks, while avoiding negative impacts due to network differences. Empirical studies demonstrate that the proposed approach improves the mean average precision of friendship prediction over state-of-the-art baselines on nine real-world social networking datasets significantly.
[ { "version": "v1", "created": "Mon, 17 Feb 2014 15:36:38 GMT" } ]
2014-02-18T00:00:00
[ [ "Zhong", "Erheng", "" ], [ "Xiang", "Evan Wei", "" ], [ "Fan", "Wei", "" ], [ "Liu", "Nathan Nan", "" ], [ "Yang", "Qiang", "" ] ]
TITLE: Friendship Prediction in Composite Social Networks ABSTRACT: Friendship prediction is an important task in social network analysis (SNA). It can help users identify friends and improve their level of activity. Most previous approaches predict users' friendship based on their historical records, such as their existing friendship, social interactions, etc. However, in reality, most users have limited friends in a single network, and the data can be very sparse. The sparsity problem causes existing methods to overfit the rare observations and suffer from serious performance degradation. This is particularly true when a new social network just starts to form. We observe that many of today's social networks are composite in nature, where people are often engaged in multiple networks. In addition, users' friendships are always correlated, for example, they are both friends on Facebook and Google+. Thus, by considering those overlapping users as the bridge, the friendship knowledge in other networks can help predict their friendships in the current network. This can be achieved by exploiting the knowledge in different networks in a collective manner. However, as each individual network has its own properties that can be incompatible and inconsistent with other networks, the naive merging of all networks into a single one may not work well. The proposed solution is to extract the common behaviors between different networks via a hierarchical Bayesian model. It captures the common knowledge across networks, while avoiding negative impacts due to network differences. Empirical studies demonstrate that the proposed approach improves the mean average precision of friendship prediction over state-of-the-art baselines on nine real-world social networking datasets significantly.
1402.4084
Edward Moroshko
Edward Moroshko, Koby Crammer
Selective Sampling with Drift
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently there has been much work on selective sampling, an online active learning setting, in which algorithms work in rounds. On each round an algorithm receives an input and makes a prediction. Then, it can decide whether to query a label, and if so to update its model, otherwise the input is discarded. Most of this work is focused on the stationary case, where it is assumed that there is a fixed target model, and the performance of the algorithm is compared to a fixed model. However, in many real-world applications, such as spam prediction, the best target function may drift over time, or have shifts from time to time. We develop a novel selective sampling algorithm for the drifting setting, analyze it under no assumptions on the mechanism generating the sequence of instances, and derive new mistake bounds that depend on the amount of drift in the problem. Simulations on synthetic and real-world datasets demonstrate the superiority of our algorithms as a selective sampling algorithm in the drifting setting.
[ { "version": "v1", "created": "Mon, 17 Feb 2014 17:53:57 GMT" } ]
2014-02-18T00:00:00
[ [ "Moroshko", "Edward", "" ], [ "Crammer", "Koby", "" ] ]
TITLE: Selective Sampling with Drift ABSTRACT: Recently there has been much work on selective sampling, an online active learning setting, in which algorithms work in rounds. On each round an algorithm receives an input and makes a prediction. Then, it can decide whether to query a label, and if so to update its model, otherwise the input is discarded. Most of this work is focused on the stationary case, where it is assumed that there is a fixed target model, and the performance of the algorithm is compared to a fixed model. However, in many real-world applications, such as spam prediction, the best target function may drift over time, or have shifts from time to time. We develop a novel selective sampling algorithm for the drifting setting, analyze it under no assumptions on the mechanism generating the sequence of instances, and derive new mistake bounds that depend on the amount of drift in the problem. Simulations on synthetic and real-world datasets demonstrate the superiority of our algorithms as a selective sampling algorithm in the drifting setting.
1304.5299
Anoop Korattikara
Anoop Korattikara, Yutian Chen, Max Welling
Austerity in MCMC Land: Cutting the Metropolis-Hastings Budget
v4 - version accepted by ICML2014
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Can we make Bayesian posterior MCMC sampling more efficient when faced with very large datasets? We argue that computing the likelihood for N datapoints in the Metropolis-Hastings (MH) test to reach a single binary decision is computationally inefficient. We introduce an approximate MH rule based on a sequential hypothesis test that allows us to accept or reject samples with high confidence using only a fraction of the data required for the exact MH rule. While this method introduces an asymptotic bias, we show that this bias can be controlled and is more than offset by a decrease in variance due to our ability to draw more samples per unit of time.
[ { "version": "v1", "created": "Fri, 19 Apr 2013 02:51:52 GMT" }, { "version": "v2", "created": "Mon, 29 Apr 2013 21:13:59 GMT" }, { "version": "v3", "created": "Fri, 19 Jul 2013 18:05:53 GMT" }, { "version": "v4", "created": "Fri, 14 Feb 2014 07:42:15 GMT" } ]
2014-02-17T00:00:00
[ [ "Korattikara", "Anoop", "" ], [ "Chen", "Yutian", "" ], [ "Welling", "Max", "" ] ]
TITLE: Austerity in MCMC Land: Cutting the Metropolis-Hastings Budget ABSTRACT: Can we make Bayesian posterior MCMC sampling more efficient when faced with very large datasets? We argue that computing the likelihood for N datapoints in the Metropolis-Hastings (MH) test to reach a single binary decision is computationally inefficient. We introduce an approximate MH rule based on a sequential hypothesis test that allows us to accept or reject samples with high confidence using only a fraction of the data required for the exact MH rule. While this method introduces an asymptotic bias, we show that this bias can be controlled and is more than offset by a decrease in variance due to our ability to draw more samples per unit of time.
1312.0516
Vassilis Kekatos
Vassilis Kekatos, Georgios B. Giannakis, Ross Baldick
Grid Topology Identification using Electricity Prices
PES General Meeting 2014 submission
null
null
null
cs.LG cs.SY stat.AP stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The potential of recovering the topology of a grid using solely publicly available market data is explored here. In contemporary whole-sale electricity markets, real-time prices are typically determined by solving the network-constrained economic dispatch problem. Under a linear DC model, locational marginal prices (LMPs) correspond to the Lagrange multipliers of the linear program involved. The interesting observation here is that the matrix of spatiotemporally varying LMPs exhibits the following property: Once premultiplied by the weighted grid Laplacian, it yields a low-rank and sparse matrix. Leveraging this rich structure, a regularized maximum likelihood estimator (MLE) is developed to recover the grid Laplacian from the LMPs. The convex optimization problem formulated includes low rank- and sparsity-promoting regularizers, and it is solved using a scalable algorithm. Numerical tests on prices generated for the IEEE 14-bus benchmark provide encouraging topology recovery results.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 16:58:10 GMT" }, { "version": "v2", "created": "Fri, 14 Feb 2014 00:35:43 GMT" } ]
2014-02-17T00:00:00
[ [ "Kekatos", "Vassilis", "" ], [ "Giannakis", "Georgios B.", "" ], [ "Baldick", "Ross", "" ] ]
TITLE: Grid Topology Identification using Electricity Prices ABSTRACT: The potential of recovering the topology of a grid using solely publicly available market data is explored here. In contemporary whole-sale electricity markets, real-time prices are typically determined by solving the network-constrained economic dispatch problem. Under a linear DC model, locational marginal prices (LMPs) correspond to the Lagrange multipliers of the linear program involved. The interesting observation here is that the matrix of spatiotemporally varying LMPs exhibits the following property: Once premultiplied by the weighted grid Laplacian, it yields a low-rank and sparse matrix. Leveraging this rich structure, a regularized maximum likelihood estimator (MLE) is developed to recover the grid Laplacian from the LMPs. The convex optimization problem formulated includes low rank- and sparsity-promoting regularizers, and it is solved using a scalable algorithm. Numerical tests on prices generated for the IEEE 14-bus benchmark provide encouraging topology recovery results.
1402.1783
Jason J Corso
Caiming Xiong, David Johnson, Jason J. Corso
Active Clustering with Model-Based Uncertainty Reduction
14 pages, 8 figures, submitted to TPAMI (second version just fixes a missing reference and format)
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Semi-supervised clustering seeks to augment traditional clustering methods by incorporating side information provided via human expertise in order to increase the semantic meaningfulness of the resulting clusters. However, most current methods are \emph{passive} in the sense that the side information is provided beforehand and selected randomly. This may require a large number of constraints, some of which could be redundant, unnecessary, or even detrimental to the clustering results. Thus in order to scale such semi-supervised algorithms to larger problems it is desirable to pursue an \emph{active} clustering method---i.e. an algorithm that maximizes the effectiveness of the available human labor by only requesting human input where it will have the greatest impact. Here, we propose a novel online framework for active semi-supervised spectral clustering that selects pairwise constraints as clustering proceeds, based on the principle of uncertainty reduction. Using a first-order Taylor expansion, we decompose the expected uncertainty reduction problem into a gradient and a step-scale, computed via an application of matrix perturbation theory and cluster-assignment entropy, respectively. The resulting model is used to estimate the uncertainty reduction potential of each sample in the dataset. We then present the human user with pairwise queries with respect to only the best candidate sample. We evaluate our method using three different image datasets (faces, leaves and dogs), a set of common UCI machine learning datasets and a gene dataset. The results validate our decomposition formulation and show that our method is consistently superior to existing state-of-the-art techniques, as well as being robust to noise and to unknown numbers of clusters.
[ { "version": "v1", "created": "Fri, 7 Feb 2014 22:13:03 GMT" }, { "version": "v2", "created": "Fri, 14 Feb 2014 02:53:32 GMT" } ]
2014-02-17T00:00:00
[ [ "Xiong", "Caiming", "" ], [ "Johnson", "David", "" ], [ "Corso", "Jason J.", "" ] ]
TITLE: Active Clustering with Model-Based Uncertainty Reduction ABSTRACT: Semi-supervised clustering seeks to augment traditional clustering methods by incorporating side information provided via human expertise in order to increase the semantic meaningfulness of the resulting clusters. However, most current methods are \emph{passive} in the sense that the side information is provided beforehand and selected randomly. This may require a large number of constraints, some of which could be redundant, unnecessary, or even detrimental to the clustering results. Thus in order to scale such semi-supervised algorithms to larger problems it is desirable to pursue an \emph{active} clustering method---i.e. an algorithm that maximizes the effectiveness of the available human labor by only requesting human input where it will have the greatest impact. Here, we propose a novel online framework for active semi-supervised spectral clustering that selects pairwise constraints as clustering proceeds, based on the principle of uncertainty reduction. Using a first-order Taylor expansion, we decompose the expected uncertainty reduction problem into a gradient and a step-scale, computed via an application of matrix perturbation theory and cluster-assignment entropy, respectively. The resulting model is used to estimate the uncertainty reduction potential of each sample in the dataset. We then present the human user with pairwise queries with respect to only the best candidate sample. We evaluate our method using three different image datasets (faces, leaves and dogs), a set of common UCI machine learning datasets and a gene dataset. The results validate our decomposition formulation and show that our method is consistently superior to existing state-of-the-art techniques, as well as being robust to noise and to unknown numbers of clusters.
1402.3371
Andrea Ballatore
Andrea Ballatore, Michela Bertolotto, David C. Wilson
An evaluative baseline for geo-semantic relatedness and similarity
GeoInformatica 2014
null
10.1007/s10707-013-0197-8
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In geographic information science and semantics, the computation of semantic similarity is widely recognised as key to supporting a vast number of tasks in information integration and retrieval. By contrast, the role of geo-semantic relatedness has been largely ignored. In natural language processing, semantic relatedness is often confused with the more specific semantic similarity. In this article, we discuss a notion of geo-semantic relatedness based on Lehrer's semantic fields, and we compare it with geo-semantic similarity. We then describe and validate the Geo Relatedness and Similarity Dataset (GeReSiD), a new open dataset designed to evaluate computational measures of geo-semantic relatedness and similarity. This dataset is larger than existing datasets of this kind, and includes 97 geographic terms combined into 50 term pairs rated by 203 human subjects. GeReSiD is available online and can be used as an evaluation baseline to determine empirically to what degree a given computational model approximates geo-semantic relatedness and similarity.
[ { "version": "v1", "created": "Fri, 14 Feb 2014 06:06:47 GMT" } ]
2014-02-17T00:00:00
[ [ "Ballatore", "Andrea", "" ], [ "Bertolotto", "Michela", "" ], [ "Wilson", "David C.", "" ] ]
TITLE: An evaluative baseline for geo-semantic relatedness and similarity ABSTRACT: In geographic information science and semantics, the computation of semantic similarity is widely recognised as key to supporting a vast number of tasks in information integration and retrieval. By contrast, the role of geo-semantic relatedness has been largely ignored. In natural language processing, semantic relatedness is often confused with the more specific semantic similarity. In this article, we discuss a notion of geo-semantic relatedness based on Lehrer's semantic fields, and we compare it with geo-semantic similarity. We then describe and validate the Geo Relatedness and Similarity Dataset (GeReSiD), a new open dataset designed to evaluate computational measures of geo-semantic relatedness and similarity. This dataset is larger than existing datasets of this kind, and includes 97 geographic terms combined into 50 term pairs rated by 203 human subjects. GeReSiD is available online and can be used as an evaluation baseline to determine empirically to what degree a given computational model approximates geo-semantic relatedness and similarity.
1402.3447
Ioannis Caragiannis
Ioannis Caragiannis and Alexandros A. Voudouris
Welfare guarantees for proportional allocations
15 pages
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
According to the proportional allocation mechanism from the network optimization literature, users compete for a divisible resource -- such as bandwidth -- by submitting bids. The mechanism allocates to each user a fraction of the resource that is proportional to her bid and collects an amount equal to her bid as payment. Since users act as utility-maximizers, this naturally defines a proportional allocation game. Recently, Syrgkanis and Tardos (STOC 2013) quantified the inefficiency of equilibria in this game with respect to the social welfare and presented a lower bound of 26.8% on the price of anarchy over coarse-correlated and Bayes-Nash equilibria in the full and incomplete information settings, respectively. In this paper, we improve this bound to 50% over both equilibrium concepts. Our analysis is simpler and, furthermore, we argue that it cannot be improved by arguments that do not take the equilibrium structure into account. We also extend it to settings with budget constraints where we show the first constant bound (between 36% and 50%) on the price of anarchy of the corresponding game with respect to an effective welfare benchmark that takes budgets into account.
[ { "version": "v1", "created": "Fri, 14 Feb 2014 12:21:14 GMT" } ]
2014-02-17T00:00:00
[ [ "Caragiannis", "Ioannis", "" ], [ "Voudouris", "Alexandros A.", "" ] ]
TITLE: Welfare guarantees for proportional allocations ABSTRACT: According to the proportional allocation mechanism from the network optimization literature, users compete for a divisible resource -- such as bandwidth -- by submitting bids. The mechanism allocates to each user a fraction of the resource that is proportional to her bid and collects an amount equal to her bid as payment. Since users act as utility-maximizers, this naturally defines a proportional allocation game. Recently, Syrgkanis and Tardos (STOC 2013) quantified the inefficiency of equilibria in this game with respect to the social welfare and presented a lower bound of 26.8% on the price of anarchy over coarse-correlated and Bayes-Nash equilibria in the full and incomplete information settings, respectively. In this paper, we improve this bound to 50% over both equilibrium concepts. Our analysis is simpler and, furthermore, we argue that it cannot be improved by arguments that do not take the equilibrium structure into account. We also extend it to settings with budget constraints where we show the first constant bound (between 36% and 50%) on the price of anarchy of the corresponding game with respect to an effective welfare benchmark that takes budgets into account.
1402.3549
Xiajun Wang
Xiajun Wang, Song Huang, Song Fu and Krishna Kavi
Characterizing Workload of Web Applications on Virtualized Servers
8 pages, 8 figures, The Fourth Workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware in conjunction with the 19th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-2014), Salt Lake City, Utah, USA, March 1-5, 2014
null
null
null
cs.PF cs.DC
http://creativecommons.org/licenses/by/3.0/
With the ever increasing demands of cloud computing services, planning and management of cloud resources has become a more and more important issue which directed affects the resource utilization and SLA and customer satisfaction. But before any management strategy is made, a good understanding of applications' workload in virtualized environment is the basic fact and principle to the resource management methods. Unfortunately, little work has been focused on this area. Lack of raw data could be one reason; another reason is that people still use the traditional models or methods shared under non-virtualized environment. The study of applications' workload in virtualized environment should take on some of its peculiar features comparing to the non-virtualized environment. In this paper, we are open to analyze the workload demands that reflect applications' behavior and the impact of virtualization. The results are obtained from an experimental cloud testbed running web applications, specifically the RUBiS benchmark application. We profile the workload dynamics on both virtualized and non-virtualized environments and compare the findings. The experimental results are valuable for us to estimate the performance of applications on computer architectures, to predict SLA compliance or violation based on the projected application workload and to guide the decision making to support applications with the right hardware.
[ { "version": "v1", "created": "Fri, 14 Feb 2014 18:51:38 GMT" } ]
2014-02-17T00:00:00
[ [ "Wang", "Xiajun", "" ], [ "Huang", "Song", "" ], [ "Fu", "Song", "" ], [ "Kavi", "Krishna", "" ] ]
TITLE: Characterizing Workload of Web Applications on Virtualized Servers ABSTRACT: With the ever increasing demands of cloud computing services, planning and management of cloud resources has become a more and more important issue which directed affects the resource utilization and SLA and customer satisfaction. But before any management strategy is made, a good understanding of applications' workload in virtualized environment is the basic fact and principle to the resource management methods. Unfortunately, little work has been focused on this area. Lack of raw data could be one reason; another reason is that people still use the traditional models or methods shared under non-virtualized environment. The study of applications' workload in virtualized environment should take on some of its peculiar features comparing to the non-virtualized environment. In this paper, we are open to analyze the workload demands that reflect applications' behavior and the impact of virtualization. The results are obtained from an experimental cloud testbed running web applications, specifically the RUBiS benchmark application. We profile the workload dynamics on both virtualized and non-virtualized environments and compare the findings. The experimental results are valuable for us to estimate the performance of applications on computer architectures, to predict SLA compliance or violation based on the projected application workload and to guide the decision making to support applications with the right hardware.
1402.2782
Roland Glantz
Roland Glantz, Henning Meyerhenke, Christian Schulz
Tree-based Coarsening and Partitioning of Complex Networks
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many applications produce massive complex networks whose analysis would benefit from parallel processing. Parallel algorithms, in turn, often require a suitable network partition. For solving optimization tasks such as graph partitioning on large networks, multilevel methods are preferred in practice. Yet, complex networks pose challenges to established multilevel algorithms, in particular to their coarsening phase. One way to specify a (recursive) coarsening of a graph is to rate its edges and then contract the edges as prioritized by the rating. In this paper we (i) define weights for the edges of a network that express the edges' importance for connectivity, (ii) compute a minimum weight spanning tree $T^m$ with respect to these weights, and (iii) rate the network edges based on the conductance values of $T^m$'s fundamental cuts. To this end, we also (iv) develop the first optimal linear-time algorithm to compute the conductance values of \emph{all} fundamental cuts of a given spanning tree. We integrate the new edge rating into a leading multilevel graph partitioner and equip the latter with a new greedy postprocessing for optimizing the maximum communication volume (MCV). Experiments on bipartitioning frequently used benchmark networks show that the postprocessing already reduces MCV by 11.3%. Our new edge rating further reduces MCV by 10.3% compared to the previously best rating with the postprocessing in place for both ratings. In total, with a modest increase in running time, our new approach reduces the MCV of complex network partitions by 20.4%.
[ { "version": "v1", "created": "Wed, 12 Feb 2014 10:53:01 GMT" }, { "version": "v2", "created": "Thu, 13 Feb 2014 10:56:20 GMT" } ]
2014-02-14T00:00:00
[ [ "Glantz", "Roland", "" ], [ "Meyerhenke", "Henning", "" ], [ "Schulz", "Christian", "" ] ]
TITLE: Tree-based Coarsening and Partitioning of Complex Networks ABSTRACT: Many applications produce massive complex networks whose analysis would benefit from parallel processing. Parallel algorithms, in turn, often require a suitable network partition. For solving optimization tasks such as graph partitioning on large networks, multilevel methods are preferred in practice. Yet, complex networks pose challenges to established multilevel algorithms, in particular to their coarsening phase. One way to specify a (recursive) coarsening of a graph is to rate its edges and then contract the edges as prioritized by the rating. In this paper we (i) define weights for the edges of a network that express the edges' importance for connectivity, (ii) compute a minimum weight spanning tree $T^m$ with respect to these weights, and (iii) rate the network edges based on the conductance values of $T^m$'s fundamental cuts. To this end, we also (iv) develop the first optimal linear-time algorithm to compute the conductance values of \emph{all} fundamental cuts of a given spanning tree. We integrate the new edge rating into a leading multilevel graph partitioner and equip the latter with a new greedy postprocessing for optimizing the maximum communication volume (MCV). Experiments on bipartitioning frequently used benchmark networks show that the postprocessing already reduces MCV by 11.3%. Our new edge rating further reduces MCV by 10.3% compared to the previously best rating with the postprocessing in place for both ratings. In total, with a modest increase in running time, our new approach reduces the MCV of complex network partitions by 20.4%.
1402.3010
Eray Ozkural
Eray \"Ozkural, Cevdet Aykanat
1-D and 2-D Parallel Algorithms for All-Pairs Similarity Problem
null
null
null
null
cs.IR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
All-pairs similarity problem asks to find all vector pairs in a set of vectors the similarities of which surpass a given similarity threshold, and it is a computational kernel in data mining and information retrieval for several tasks. We investigate the parallelization of a recent fast sequential algorithm. We propose effective 1-D and 2-D data distribution strategies that preserve the essential optimizations in the fast algorithm. 1-D parallel algorithms distribute either dimensions or vectors, whereas the 2-D parallel algorithm distributes data both ways. Additional contributions to the 1-D vertical distribution include a local pruning strategy to reduce the number of candidates, a recursive pruning algorithm, and block processing to reduce imbalance. The parallel algorithms were programmed in OCaml which affords much convenience. Our experiments indicate that the performance depends on the dataset, therefore a variety of parallelizations is useful.
[ { "version": "v1", "created": "Thu, 13 Feb 2014 00:14:33 GMT" } ]
2014-02-14T00:00:00
[ [ "Özkural", "Eray", "" ], [ "Aykanat", "Cevdet", "" ] ]
TITLE: 1-D and 2-D Parallel Algorithms for All-Pairs Similarity Problem ABSTRACT: All-pairs similarity problem asks to find all vector pairs in a set of vectors the similarities of which surpass a given similarity threshold, and it is a computational kernel in data mining and information retrieval for several tasks. We investigate the parallelization of a recent fast sequential algorithm. We propose effective 1-D and 2-D data distribution strategies that preserve the essential optimizations in the fast algorithm. 1-D parallel algorithms distribute either dimensions or vectors, whereas the 2-D parallel algorithm distributes data both ways. Additional contributions to the 1-D vertical distribution include a local pruning strategy to reduce the number of candidates, a recursive pruning algorithm, and block processing to reduce imbalance. The parallel algorithms were programmed in OCaml which affords much convenience. Our experiments indicate that the performance depends on the dataset, therefore a variety of parallelizations is useful.
1402.3261
Didier Henrion
Jan Heller, Didier Henrion (LAAS, CTU/FEE), Tomas Pajdla
Hand-Eye and Robot-World Calibration by Global Polynomial Optimization
null
null
null
null
cs.CV math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The need to relate measurements made by a camera to a different known coordinate system arises in many engineering applications. Historically, it appeared for the first time in the connection with cameras mounted on robotic systems. This problem is commonly known as hand-eye calibration. In this paper, we present several formulations of hand-eye calibration that lead to multivariate polynomial optimization problems. We show that the method of convex linear matrix inequality (LMI) relaxations can be used to effectively solve these problems and to obtain globally optimal solutions. Further, we show that the same approach can be used for the simultaneous hand-eye and robot-world calibration. Finally, we validate the proposed solutions using both synthetic and real datasets.
[ { "version": "v1", "created": "Thu, 13 Feb 2014 19:17:01 GMT" } ]
2014-02-14T00:00:00
[ [ "Heller", "Jan", "", "LAAS, CTU/FEE" ], [ "Henrion", "Didier", "", "LAAS, CTU/FEE" ], [ "Pajdla", "Tomas", "" ] ]
TITLE: Hand-Eye and Robot-World Calibration by Global Polynomial Optimization ABSTRACT: The need to relate measurements made by a camera to a different known coordinate system arises in many engineering applications. Historically, it appeared for the first time in the connection with cameras mounted on robotic systems. This problem is commonly known as hand-eye calibration. In this paper, we present several formulations of hand-eye calibration that lead to multivariate polynomial optimization problems. We show that the method of convex linear matrix inequality (LMI) relaxations can be used to effectively solve these problems and to obtain globally optimal solutions. Further, we show that the same approach can be used for the simultaneous hand-eye and robot-world calibration. Finally, we validate the proposed solutions using both synthetic and real datasets.
1210.1766
Jun Zhu
Jun Zhu, Ning Chen, and Eric P. Xing
Bayesian Inference with Posterior Regularization and applications to Infinite Latent SVMs
49 pages, 11 figures
null
null
null
cs.LG cs.AI stat.ME stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing Bayesian models, especially nonparametric Bayesian methods, rely on specially conceived priors to incorporate domain knowledge for discovering improved latent representations. While priors can affect posterior distributions through Bayes' rule, imposing posterior regularization is arguably more direct and in some cases more natural and general. In this paper, we present regularized Bayesian inference (RegBayes), a novel computational framework that performs posterior inference with a regularization term on the desired post-data posterior distribution under an information theoretical formulation. RegBayes is more flexible than the procedure that elicits expert knowledge via priors, and it covers both directed Bayesian networks and undirected Markov networks whose Bayesian formulation results in hybrid chain graph models. When the regularization is induced from a linear operator on the posterior distributions, such as the expectation operator, we present a general convex-analysis theorem to characterize the solution of RegBayes. Furthermore, we present two concrete examples of RegBayes, infinite latent support vector machines (iLSVM) and multi-task infinite latent support vector machines (MT-iLSVM), which explore the large-margin idea in combination with a nonparametric Bayesian model for discovering predictive latent features for classification and multi-task learning, respectively. We present efficient inference methods and report empirical studies on several benchmark datasets, which appear to demonstrate the merits inherited from both large-margin learning and Bayesian nonparametrics. Such results were not available until now, and contribute to push forward the interface between these two important subfields, which have been largely treated as isolated in the community.
[ { "version": "v1", "created": "Fri, 5 Oct 2012 14:10:20 GMT" }, { "version": "v2", "created": "Mon, 8 Apr 2013 09:33:44 GMT" }, { "version": "v3", "created": "Wed, 12 Feb 2014 06:31:12 GMT" } ]
2014-02-13T00:00:00
[ [ "Zhu", "Jun", "" ], [ "Chen", "Ning", "" ], [ "Xing", "Eric P.", "" ] ]
TITLE: Bayesian Inference with Posterior Regularization and applications to Infinite Latent SVMs ABSTRACT: Existing Bayesian models, especially nonparametric Bayesian methods, rely on specially conceived priors to incorporate domain knowledge for discovering improved latent representations. While priors can affect posterior distributions through Bayes' rule, imposing posterior regularization is arguably more direct and in some cases more natural and general. In this paper, we present regularized Bayesian inference (RegBayes), a novel computational framework that performs posterior inference with a regularization term on the desired post-data posterior distribution under an information theoretical formulation. RegBayes is more flexible than the procedure that elicits expert knowledge via priors, and it covers both directed Bayesian networks and undirected Markov networks whose Bayesian formulation results in hybrid chain graph models. When the regularization is induced from a linear operator on the posterior distributions, such as the expectation operator, we present a general convex-analysis theorem to characterize the solution of RegBayes. Furthermore, we present two concrete examples of RegBayes, infinite latent support vector machines (iLSVM) and multi-task infinite latent support vector machines (MT-iLSVM), which explore the large-margin idea in combination with a nonparametric Bayesian model for discovering predictive latent features for classification and multi-task learning, respectively. We present efficient inference methods and report empirical studies on several benchmark datasets, which appear to demonstrate the merits inherited from both large-margin learning and Bayesian nonparametrics. Such results were not available until now, and contribute to push forward the interface between these two important subfields, which have been largely treated as isolated in the community.
1309.7750
Stefanos Ougiaroglou
Stefanos Ougiaroglou, Georgios Evangelidis, Dimitris A. Dervos
An Extensive Experimental Study on the Cluster-based Reference Set Reduction for speeding-up the k-NN Classifier
Proceeding of International Conference on Integrated Information (IC-InInfo 2011), pp. 12-15, Kos island, Greece, 2011
null
null
null
cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
The k-Nearest Neighbor (k-NN) classification algorithm is one of the most widely-used lazy classifiers because of its simplicity and ease of implementation. It is considered to be an effective classifier and has many applications. However, its major drawback is that when sequential search is used to find the neighbors, it involves high computational cost. Speeding-up k-NN search is still an active research field. Hwang and Cho have recently proposed an adaptive cluster-based method for fast Nearest Neighbor searching. The effectiveness of this method is based on the adjustment of three parameters. However, the authors evaluated their method by setting specific parameter values and using only one dataset. In this paper, an extensive experimental study of this method is presented. The results, which are based on five real life datasets, illustrate that if the parameters of the method are carefully defined, one can achieve even better classification performance.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 08:24:14 GMT" }, { "version": "v2", "created": "Tue, 11 Feb 2014 22:46:36 GMT" } ]
2014-02-13T00:00:00
[ [ "Ougiaroglou", "Stefanos", "" ], [ "Evangelidis", "Georgios", "" ], [ "Dervos", "Dimitris A.", "" ] ]
TITLE: An Extensive Experimental Study on the Cluster-based Reference Set Reduction for speeding-up the k-NN Classifier ABSTRACT: The k-Nearest Neighbor (k-NN) classification algorithm is one of the most widely-used lazy classifiers because of its simplicity and ease of implementation. It is considered to be an effective classifier and has many applications. However, its major drawback is that when sequential search is used to find the neighbors, it involves high computational cost. Speeding-up k-NN search is still an active research field. Hwang and Cho have recently proposed an adaptive cluster-based method for fast Nearest Neighbor searching. The effectiveness of this method is based on the adjustment of three parameters. However, the authors evaluated their method by setting specific parameter values and using only one dataset. In this paper, an extensive experimental study of this method is presented. The results, which are based on five real life datasets, illustrate that if the parameters of the method are carefully defined, one can achieve even better classification performance.
1402.2807
Rui Zhou
Rui Zhou, Chengfei Liu, Jeffrey Xu Yu, Weifa Liang and Yanchun Zhang
Efficient Truss Maintenance in Evolving Networks
null
null
null
null
cs.DB cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Truss was proposed to study social network data represented by graphs. A k-truss of a graph is a cohesive subgraph, in which each edge is contained in at least k-2 triangles within the subgraph. While truss has been demonstrated as superior to model the close relationship in social networks and efficient algorithms for finding trusses have been extensively studied, very little attention has been paid to truss maintenance. However, most social networks are evolving networks. It may be infeasible to recompute trusses from scratch from time to time in order to find the up-to-date $k$-trusses in the evolving networks. In this paper, we discuss how to maintain trusses in a graph with dynamic updates. We first discuss a set of properties on maintaining trusses, then propose algorithms on maintaining trusses on edge deletions and insertions, finally, we discuss truss index maintenance. We test the proposed techniques on real datasets. The experiment results show the promise of our work.
[ { "version": "v1", "created": "Wed, 12 Feb 2014 12:57:06 GMT" } ]
2014-02-13T00:00:00
[ [ "Zhou", "Rui", "" ], [ "Liu", "Chengfei", "" ], [ "Yu", "Jeffrey Xu", "" ], [ "Liang", "Weifa", "" ], [ "Zhang", "Yanchun", "" ] ]
TITLE: Efficient Truss Maintenance in Evolving Networks ABSTRACT: Truss was proposed to study social network data represented by graphs. A k-truss of a graph is a cohesive subgraph, in which each edge is contained in at least k-2 triangles within the subgraph. While truss has been demonstrated as superior to model the close relationship in social networks and efficient algorithms for finding trusses have been extensively studied, very little attention has been paid to truss maintenance. However, most social networks are evolving networks. It may be infeasible to recompute trusses from scratch from time to time in order to find the up-to-date $k$-trusses in the evolving networks. In this paper, we discuss how to maintain trusses in a graph with dynamic updates. We first discuss a set of properties on maintaining trusses, then propose algorithms on maintaining trusses on edge deletions and insertions, finally, we discuss truss index maintenance. We test the proposed techniques on real datasets. The experiment results show the promise of our work.
1402.2826
Aniket Bera
Aniket Bera and Dinesh Manocha
Realtime Multilevel Crowd Tracking using Reciprocal Velocity Obstacles
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel, realtime algorithm to compute the trajectory of each pedestrian in moderately dense crowd scenes. Our formulation is based on an adaptive particle filtering scheme that uses a multi-agent motion model based on velocity-obstacles, and takes into account local interactions as well as physical and personal constraints of each pedestrian. Our method dynamically changes the number of particles allocated to each pedestrian based on different confidence metrics. Additionally, we use a new high-definition crowd video dataset, which is used to evaluate the performance of different pedestrian tracking algorithms. This dataset consists of videos of indoor and outdoor scenes, recorded at different locations with 30-80 pedestrians. We highlight the performance benefits of our algorithm over prior techniques using this dataset. In practice, our algorithm can compute trajectories of tens of pedestrians on a multi-core desktop CPU at interactive rates (27-30 frames per second). To the best of our knowledge, our approach is 4-5 times faster than prior methods, which provide similar accuracy.
[ { "version": "v1", "created": "Tue, 11 Feb 2014 15:49:53 GMT" } ]
2014-02-13T00:00:00
[ [ "Bera", "Aniket", "" ], [ "Manocha", "Dinesh", "" ] ]
TITLE: Realtime Multilevel Crowd Tracking using Reciprocal Velocity Obstacles ABSTRACT: We present a novel, realtime algorithm to compute the trajectory of each pedestrian in moderately dense crowd scenes. Our formulation is based on an adaptive particle filtering scheme that uses a multi-agent motion model based on velocity-obstacles, and takes into account local interactions as well as physical and personal constraints of each pedestrian. Our method dynamically changes the number of particles allocated to each pedestrian based on different confidence metrics. Additionally, we use a new high-definition crowd video dataset, which is used to evaluate the performance of different pedestrian tracking algorithms. This dataset consists of videos of indoor and outdoor scenes, recorded at different locations with 30-80 pedestrians. We highlight the performance benefits of our algorithm over prior techniques using this dataset. In practice, our algorithm can compute trajectories of tens of pedestrians on a multi-core desktop CPU at interactive rates (27-30 frames per second). To the best of our knowledge, our approach is 4-5 times faster than prior methods, which provide similar accuracy.
1402.2899
Bei Yu
Duo Ding and Bei Yu and David Z. Pan
GLOW: A global router for low-power thermal-reliable interconnect synthesis using photonic wavelength multiplexing
null
null
10.1109/ASPDAC.2012.6165031
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we examine the integration potential and explore the design space of low power thermal reliable on-chip interconnect synthesis featuring nanophotonics Wavelength Division Multiplexing (WDM). With the recent advancements, it is foreseen that nanophotonics holds the promise to be employed for future on-chip data signalling due to its unique power efficiency, signal delay and huge multiplexing potential. However, there are major challenges to address before feasible on-chip integration could be reached. In this paper, we present GLOW, a hybrid global router to provide low power opto-electronic interconnect synthesis under the considerations of thermal reliability and various physical design constraints such as optical power, delay and signal quality. GLOW is evaluated with testing cases derived from ISPD07-08 global routing benchmarks. Compared with a greedy approach, GLOW demonstrates around 23%-50% of total optical power reduction, revealing great potential of on-chip WDM interconnect synthesis.
[ { "version": "v1", "created": "Wed, 12 Feb 2014 17:03:22 GMT" } ]
2014-02-13T00:00:00
[ [ "Ding", "Duo", "" ], [ "Yu", "Bei", "" ], [ "Pan", "David Z.", "" ] ]
TITLE: GLOW: A global router for low-power thermal-reliable interconnect synthesis using photonic wavelength multiplexing ABSTRACT: In this paper, we examine the integration potential and explore the design space of low power thermal reliable on-chip interconnect synthesis featuring nanophotonics Wavelength Division Multiplexing (WDM). With the recent advancements, it is foreseen that nanophotonics holds the promise to be employed for future on-chip data signalling due to its unique power efficiency, signal delay and huge multiplexing potential. However, there are major challenges to address before feasible on-chip integration could be reached. In this paper, we present GLOW, a hybrid global router to provide low power opto-electronic interconnect synthesis under the considerations of thermal reliability and various physical design constraints such as optical power, delay and signal quality. GLOW is evaluated with testing cases derived from ISPD07-08 global routing benchmarks. Compared with a greedy approach, GLOW demonstrates around 23%-50% of total optical power reduction, revealing great potential of on-chip WDM interconnect synthesis.
1402.2904
Bei Yu
Duo Ding and Bei Yu and Joydeep Ghosh and David Z. Pan
EPIC: Efficient prediction of IC manufacturing hotspots with a unified meta-classification formulation
null
null
10.1109/ASPDAC.2012.6164956
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present EPIC, an efficient and effective predictor for IC manufacturing hotspots in deep sub-wavelength lithography. EPIC proposes a unified framework to combine different hotspot detection methods together, such as machine learning and pattern matching, using mathematical programming/optimization. EPIC algorithm has been tested on a number of industry benchmarks under advanced manufacturing conditions. It demonstrates so far the best capability in selectively combining the desirable features of various hotspot detection methods (3.5-8.2% accuracy improvement) as well as significant suppression of the detection noise (e.g., 80% false-alarm reduction). These characteristics make EPIC very suitable for conducting high performance physical verification and guiding efficient manufacturability friendly physical design.
[ { "version": "v1", "created": "Wed, 12 Feb 2014 17:25:05 GMT" } ]
2014-02-13T00:00:00
[ [ "Ding", "Duo", "" ], [ "Yu", "Bei", "" ], [ "Ghosh", "Joydeep", "" ], [ "Pan", "David Z.", "" ] ]
TITLE: EPIC: Efficient prediction of IC manufacturing hotspots with a unified meta-classification formulation ABSTRACT: In this paper we present EPIC, an efficient and effective predictor for IC manufacturing hotspots in deep sub-wavelength lithography. EPIC proposes a unified framework to combine different hotspot detection methods together, such as machine learning and pattern matching, using mathematical programming/optimization. EPIC algorithm has been tested on a number of industry benchmarks under advanced manufacturing conditions. It demonstrates so far the best capability in selectively combining the desirable features of various hotspot detection methods (3.5-8.2% accuracy improvement) as well as significant suppression of the detection noise (e.g., 80% false-alarm reduction). These characteristics make EPIC very suitable for conducting high performance physical verification and guiding efficient manufacturability friendly physical design.
1402.2941
Zohaib Khan
Zohaib Khan, Faisal Shafait, Yiqun Hu, Ajmal Mian
Multispectral Palmprint Encoding and Recognition
Preliminary version of this manuscript was published in ICCV 2011. Z. Khan A. Mian and Y. Hu, "Contour Code: Robust and Efficient Multispectral Palmprint Encoding for Human Recognition", International Conference on Computer Vision, 2011. MATLAB Code available: https://sites.google.com/site/zohaibnet/Home/codes
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
Palmprints are emerging as a new entity in multi-modal biometrics for human identification and verification. Multispectral palmprint images captured in the visible and infrared spectrum not only contain the wrinkles and ridge structure of a palm, but also the underlying pattern of veins; making them a highly discriminating biometric identifier. In this paper, we propose a feature encoding scheme for robust and highly accurate representation and matching of multispectral palmprints. To facilitate compact storage of the feature, we design a binary hash table structure that allows for efficient matching in large databases. Comprehensive experiments for both identification and verification scenarios are performed on two public datasets -- one captured with a contact-based sensor (PolyU dataset), and the other with a contact-free sensor (CASIA dataset). Recognition results in various experimental setups show that the proposed method consistently outperforms existing state-of-the-art methods. Error rates achieved by our method (0.003% on PolyU and 0.2% on CASIA) are the lowest reported in literature on both dataset and clearly indicate the viability of palmprint as a reliable and promising biometric. All source codes are publicly available.
[ { "version": "v1", "created": "Thu, 6 Feb 2014 06:35:51 GMT" } ]
2014-02-13T00:00:00
[ [ "Khan", "Zohaib", "" ], [ "Shafait", "Faisal", "" ], [ "Hu", "Yiqun", "" ], [ "Mian", "Ajmal", "" ] ]
TITLE: Multispectral Palmprint Encoding and Recognition ABSTRACT: Palmprints are emerging as a new entity in multi-modal biometrics for human identification and verification. Multispectral palmprint images captured in the visible and infrared spectrum not only contain the wrinkles and ridge structure of a palm, but also the underlying pattern of veins; making them a highly discriminating biometric identifier. In this paper, we propose a feature encoding scheme for robust and highly accurate representation and matching of multispectral palmprints. To facilitate compact storage of the feature, we design a binary hash table structure that allows for efficient matching in large databases. Comprehensive experiments for both identification and verification scenarios are performed on two public datasets -- one captured with a contact-based sensor (PolyU dataset), and the other with a contact-free sensor (CASIA dataset). Recognition results in various experimental setups show that the proposed method consistently outperforms existing state-of-the-art methods. Error rates achieved by our method (0.003% on PolyU and 0.2% on CASIA) are the lowest reported in literature on both dataset and clearly indicate the viability of palmprint as a reliable and promising biometric. All source codes are publicly available.
1307.4048
Pavan Kumar D S
D. S. Pavan Kumar, N. Vishnu Prasad, Vikas Joshi, S. Umesh
Modified SPLICE and its Extension to Non-Stereo Data for Noise Robust Speech Recognition
Submitted to Automatic Speech Recognition and Understanding (ASRU) 2013 Workshop
null
10.1109/ASRU.2013.6707725
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a modification to the training process of the popular SPLICE algorithm has been proposed for noise robust speech recognition. The modification is based on feature correlations, and enables this stereo-based algorithm to improve the performance in all noise conditions, especially in unseen cases. Further, the modified framework is extended to work for non-stereo datasets where clean and noisy training utterances, but not stereo counterparts, are required. Finally, an MLLR-based computationally efficient run-time noise adaptation method in SPLICE framework has been proposed. The modified SPLICE shows 8.6% absolute improvement over SPLICE in Test C of Aurora-2 database, and 2.93% overall. Non-stereo method shows 10.37% and 6.93% absolute improvements over Aurora-2 and Aurora-4 baseline models respectively. Run-time adaptation shows 9.89% absolute improvement in modified framework as compared to SPLICE for Test C, and 4.96% overall w.r.t. standard MLLR adaptation on HMMs.
[ { "version": "v1", "created": "Mon, 15 Jul 2013 18:39:10 GMT" } ]
2014-02-12T00:00:00
[ [ "Kumar", "D. S. Pavan", "" ], [ "Prasad", "N. Vishnu", "" ], [ "Joshi", "Vikas", "" ], [ "Umesh", "S.", "" ] ]
TITLE: Modified SPLICE and its Extension to Non-Stereo Data for Noise Robust Speech Recognition ABSTRACT: In this paper, a modification to the training process of the popular SPLICE algorithm has been proposed for noise robust speech recognition. The modification is based on feature correlations, and enables this stereo-based algorithm to improve the performance in all noise conditions, especially in unseen cases. Further, the modified framework is extended to work for non-stereo datasets where clean and noisy training utterances, but not stereo counterparts, are required. Finally, an MLLR-based computationally efficient run-time noise adaptation method in SPLICE framework has been proposed. The modified SPLICE shows 8.6% absolute improvement over SPLICE in Test C of Aurora-2 database, and 2.93% overall. Non-stereo method shows 10.37% and 6.93% absolute improvements over Aurora-2 and Aurora-4 baseline models respectively. Run-time adaptation shows 9.89% absolute improvement in modified framework as compared to SPLICE for Test C, and 4.96% overall w.r.t. standard MLLR adaptation on HMMs.
1402.2300
Aaron Karper
Aaron Karper
Feature and Variable Selection in Classification
Part of master seminar in document analysis held by Marcus Eichenberger-Liwicki
null
null
null
cs.LG cs.AI stat.ML
http://creativecommons.org/licenses/publicdomain/
The amount of information in the form of features and variables avail- able to machine learning algorithms is ever increasing. This can lead to classifiers that are prone to overfitting in high dimensions, high di- mensional models do not lend themselves to interpretable results, and the CPU and memory resources necessary to run on high-dimensional datasets severly limit the applications of the approaches. Variable and feature selection aim to remedy this by finding a subset of features that in some way captures the information provided best. In this paper we present the general methodology and highlight some specific approaches.
[ { "version": "v1", "created": "Mon, 10 Feb 2014 21:05:58 GMT" } ]
2014-02-12T00:00:00
[ [ "Karper", "Aaron", "" ] ]
TITLE: Feature and Variable Selection in Classification ABSTRACT: The amount of information in the form of features and variables avail- able to machine learning algorithms is ever increasing. This can lead to classifiers that are prone to overfitting in high dimensions, high di- mensional models do not lend themselves to interpretable results, and the CPU and memory resources necessary to run on high-dimensional datasets severly limit the applications of the approaches. Variable and feature selection aim to remedy this by finding a subset of features that in some way captures the information provided best. In this paper we present the general methodology and highlight some specific approaches.
1402.2363
Ashish Shingade ANS
Ashish Shingade and Archana Ghotkar
Animation of 3D Human Model Using Markerless Motion Capture Applied To Sports
null
null
null
null
cs.GR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Markerless motion capture is an active research in 3D virtualization. In proposed work we presented a system for markerless motion capture for 3D human character animation, paper presents a survey on motion and skeleton tracking techniques which are developed or are under development. The paper proposed a method to transform the motion of a performer to a 3D human character (model), the 3D human character performs similar movements as that of a performer in real time. In the proposed work, human model data will be captured by Kinect camera, processed data will be applied on 3D human model for animation. 3D human model is created using open source software (MakeHuman). Anticipated dataset for sport activity is considered as input which can be applied to any HCI application.
[ { "version": "v1", "created": "Tue, 11 Feb 2014 04:05:12 GMT" } ]
2014-02-12T00:00:00
[ [ "Shingade", "Ashish", "" ], [ "Ghotkar", "Archana", "" ] ]
TITLE: Animation of 3D Human Model Using Markerless Motion Capture Applied To Sports ABSTRACT: Markerless motion capture is an active research in 3D virtualization. In proposed work we presented a system for markerless motion capture for 3D human character animation, paper presents a survey on motion and skeleton tracking techniques which are developed or are under development. The paper proposed a method to transform the motion of a performer to a 3D human character (model), the 3D human character performs similar movements as that of a performer in real time. In the proposed work, human model data will be captured by Kinect camera, processed data will be applied on 3D human model for animation. 3D human model is created using open source software (MakeHuman). Anticipated dataset for sport activity is considered as input which can be applied to any HCI application.
1402.2606
Dibyendu Mukherjee
Dibyendu Mukherjee
A Fast Two Pass Multi-Value Segmentation Algorithm based on Connected Component Analysis
9 pages, 7 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Connected component analysis (CCA) has been heavily used to label binary images and classify segments. However, it has not been well-exploited to segment multi-valued natural images. This work proposes a novel multi-value segmentation algorithm that utilizes CCA to segment color images. A user defined distance measure is incorporated in the proposed modified CCA to identify and segment similar image regions. The raw output of the algorithm consists of distinctly labelled segmented regions. The proposed algorithm has a unique design architecture that provides several benefits: 1) it can be used to segment any multi-channel multi-valued image; 2) the distance measure/segmentation criteria can be application-specific and 3) an absolute linear-time implementation allows easy extension for real-time video segmentation. Experimental demonstrations of the aforesaid benefits are presented along with the comparison results on multiple datasets with current benchmark algorithms. A number of possible application areas are also identified and results on real-time video segmentation has been presented to show the promise of the proposed method.
[ { "version": "v1", "created": "Tue, 11 Feb 2014 19:27:05 GMT" } ]
2014-02-12T00:00:00
[ [ "Mukherjee", "Dibyendu", "" ] ]
TITLE: A Fast Two Pass Multi-Value Segmentation Algorithm based on Connected Component Analysis ABSTRACT: Connected component analysis (CCA) has been heavily used to label binary images and classify segments. However, it has not been well-exploited to segment multi-valued natural images. This work proposes a novel multi-value segmentation algorithm that utilizes CCA to segment color images. A user defined distance measure is incorporated in the proposed modified CCA to identify and segment similar image regions. The raw output of the algorithm consists of distinctly labelled segmented regions. The proposed algorithm has a unique design architecture that provides several benefits: 1) it can be used to segment any multi-channel multi-valued image; 2) the distance measure/segmentation criteria can be application-specific and 3) an absolute linear-time implementation allows easy extension for real-time video segmentation. Experimental demonstrations of the aforesaid benefits are presented along with the comparison results on multiple datasets with current benchmark algorithms. A number of possible application areas are also identified and results on real-time video segmentation has been presented to show the promise of the proposed method.
1402.2020
Kang Zhang
Kang Zhang, Jiyang Li, Yijing Li, Weidong Hu, Lifeng Sun, Shiqiang Yang
Binary Stereo Matching
Pattern Recognition (ICPR), 2012 21st International Conference on
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel binary-based cost computation and aggregation approach for stereo matching problem. The cost volume is constructed through bitwise operations on a series of binary strings. Then this approach is combined with traditional winner-take-all strategy, resulting in a new local stereo matching algorithm called binary stereo matching (BSM). Since core algorithm of BSM is based on binary and integer computations, it has a higher computational efficiency than previous methods. Experimental results on Middlebury benchmark show that BSM has comparable performance with state-of-the-art local stereo methods in terms of both quality and speed. Furthermore, experiments on images with radiometric differences demonstrate that BSM is more robust than previous methods under these changes, which is common under real illumination.
[ { "version": "v1", "created": "Mon, 10 Feb 2014 02:33:39 GMT" } ]
2014-02-11T00:00:00
[ [ "Zhang", "Kang", "" ], [ "Li", "Jiyang", "" ], [ "Li", "Yijing", "" ], [ "Hu", "Weidong", "" ], [ "Sun", "Lifeng", "" ], [ "Yang", "Shiqiang", "" ] ]
TITLE: Binary Stereo Matching ABSTRACT: In this paper, we propose a novel binary-based cost computation and aggregation approach for stereo matching problem. The cost volume is constructed through bitwise operations on a series of binary strings. Then this approach is combined with traditional winner-take-all strategy, resulting in a new local stereo matching algorithm called binary stereo matching (BSM). Since core algorithm of BSM is based on binary and integer computations, it has a higher computational efficiency than previous methods. Experimental results on Middlebury benchmark show that BSM has comparable performance with state-of-the-art local stereo methods in terms of both quality and speed. Furthermore, experiments on images with radiometric differences demonstrate that BSM is more robust than previous methods under these changes, which is common under real illumination.
1311.7676
Song Gao
Song Gao, Linna Li, Wenwen Li, Krzysztof Janowicz, Yue Zhang
Constructing Gazetteers from Volunteered Big Geo-Data Based on Hadoop
45 pages, 10 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional gazetteers are built and maintained by authoritative mapping agencies. In the age of Big Data, it is possible to construct gazetteers in a data-driven approach by mining rich volunteered geographic information (VGI) from the Web. In this research, we build a scalable distributed platform and a high-performance geoprocessing workflow based on the Hadoop ecosystem to harvest crowd-sourced gazetteer entries. Using experiments based on geotagged datasets in Flickr, we find that the MapReduce-based workflow running on the spatially enabled Hadoop cluster can reduce the processing time compared with traditional desktop-based operations by an order of magnitude. We demonstrate how to use such a novel spatial-computing infrastructure to facilitate gazetteer research. In addition, we introduce a provenance-based trust model for quality assurance. This work offers new insights on enriching future gazetteers with the use of Hadoop clusters, and makes contributions in connecting GIS to the cloud computing environment for the next frontier of Big Geo-Data analytics.
[ { "version": "v1", "created": "Fri, 29 Nov 2013 19:52:42 GMT" }, { "version": "v2", "created": "Fri, 7 Feb 2014 07:11:22 GMT" } ]
2014-02-10T00:00:00
[ [ "Gao", "Song", "" ], [ "Li", "Linna", "" ], [ "Li", "Wenwen", "" ], [ "Janowicz", "Krzysztof", "" ], [ "Zhang", "Yue", "" ] ]
TITLE: Constructing Gazetteers from Volunteered Big Geo-Data Based on Hadoop ABSTRACT: Traditional gazetteers are built and maintained by authoritative mapping agencies. In the age of Big Data, it is possible to construct gazetteers in a data-driven approach by mining rich volunteered geographic information (VGI) from the Web. In this research, we build a scalable distributed platform and a high-performance geoprocessing workflow based on the Hadoop ecosystem to harvest crowd-sourced gazetteer entries. Using experiments based on geotagged datasets in Flickr, we find that the MapReduce-based workflow running on the spatially enabled Hadoop cluster can reduce the processing time compared with traditional desktop-based operations by an order of magnitude. We demonstrate how to use such a novel spatial-computing infrastructure to facilitate gazetteer research. In addition, we introduce a provenance-based trust model for quality assurance. This work offers new insights on enriching future gazetteers with the use of Hadoop clusters, and makes contributions in connecting GIS to the cloud computing environment for the next frontier of Big Geo-Data analytics.
1402.1546
Weiwei Sun
Renchu Song, Weiwei Sun, Baihua Zheng, Yu Zheng
PRESS: A Novel Framework of Trajectory Compression in Road Networks
27 pages, 17 figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Location data becomes more and more important. In this paper, we focus on the trajectory data, and propose a new framework, namely PRESS (Paralleled Road-Network-Based Trajectory Compression), to effectively compress trajectory data under road network constraints. Different from existing work, PRESS proposes a novel representation for trajectories to separate the spatial representation of a trajectory from the temporal representation, and proposes a Hybrid Spatial Compression (HSC) algorithm and error Bounded Temporal Compression (BTC) algorithm to compress the spatial and temporal information of trajectories respectively. PRESS also supports common spatial-temporal queries without fully decompressing the data. Through an extensive experimental study on real trajectory dataset, PRESS significantly outperforms existing approaches in terms of saving storage cost of trajectory data with bounded errors.
[ { "version": "v1", "created": "Fri, 7 Feb 2014 03:29:08 GMT" } ]
2014-02-10T00:00:00
[ [ "Song", "Renchu", "" ], [ "Sun", "Weiwei", "" ], [ "Zheng", "Baihua", "" ], [ "Zheng", "Yu", "" ] ]
TITLE: PRESS: A Novel Framework of Trajectory Compression in Road Networks ABSTRACT: Location data becomes more and more important. In this paper, we focus on the trajectory data, and propose a new framework, namely PRESS (Paralleled Road-Network-Based Trajectory Compression), to effectively compress trajectory data under road network constraints. Different from existing work, PRESS proposes a novel representation for trajectories to separate the spatial representation of a trajectory from the temporal representation, and proposes a Hybrid Spatial Compression (HSC) algorithm and error Bounded Temporal Compression (BTC) algorithm to compress the spatial and temporal information of trajectories respectively. PRESS also supports common spatial-temporal queries without fully decompressing the data. Through an extensive experimental study on real trajectory dataset, PRESS significantly outperforms existing approaches in terms of saving storage cost of trajectory data with bounded errors.
1304.2641
Jin-Kao Hao
Yan Jin, Jin-Kao Hao and Jean-Philippe Hamiez
A memetic algorithm for the minimum sum coloring problem
Submitted manuscript
Computers & Operations Research 43(3): 318-327, 2014
10.1016/j.cor.2013.09.019
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an undirected graph $G$, the Minimum Sum Coloring problem (MSCP) is to find a legal assignment of colors (represented by natural numbers) to each vertex of $G$ such that the total sum of the colors assigned to the vertices is minimized. This paper presents a memetic algorithm for MSCP based on a tabu search procedure with two neighborhoods and a multi-parent crossover operator. Experiments on a set of 77 well-known DIMACS and COLOR 2002-2004 benchmark instances show that the proposed algorithm achieves highly competitive results in comparison with five state-of-the-art algorithms. In particular, the proposed algorithm can improve the best known results for 17 instances. We also provide upper bounds for 18 additional instances for the first time.
[ { "version": "v1", "created": "Tue, 9 Apr 2013 15:54:53 GMT" } ]
2014-02-07T00:00:00
[ [ "Jin", "Yan", "" ], [ "Hao", "Jin-Kao", "" ], [ "Hamiez", "Jean-Philippe", "" ] ]
TITLE: A memetic algorithm for the minimum sum coloring problem ABSTRACT: Given an undirected graph $G$, the Minimum Sum Coloring problem (MSCP) is to find a legal assignment of colors (represented by natural numbers) to each vertex of $G$ such that the total sum of the colors assigned to the vertices is minimized. This paper presents a memetic algorithm for MSCP based on a tabu search procedure with two neighborhoods and a multi-parent crossover operator. Experiments on a set of 77 well-known DIMACS and COLOR 2002-2004 benchmark instances show that the proposed algorithm achieves highly competitive results in comparison with five state-of-the-art algorithms. In particular, the proposed algorithm can improve the best known results for 17 instances. We also provide upper bounds for 18 additional instances for the first time.
1402.1285
Jorge Gonz\'alez-Dom\'inguez
Jorge Gonz\'alez-Dom\'inguez, Evangelos Georganas, Yili Zheng, Mar\'ia J. Mart\'in
Constructing Performance Models for Dense Linear Algebra Algorithms on Cray XE Systems
null
null
null
null
cs.DC cs.MS cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hiding or minimizing the communication cost is key in order to obtain good performance on large-scale systems. While communication overlapping attempts to hide communications cost, 2.5D communication avoiding algorithms improve performance scalability by reducing the volume of data transfers at the cost of extra memory usage. Both approaches can be used together or separately and the best choice depends on the machine, the algorithm and the problem size. Thus, the development of performance models is crucial to determine the best option for each scenario. In this paper, we present a methodology for constructing performance models for parallel numerical routines on Cray XE systems. Our models use portable benchmarks that measure computational cost and network characteristics, as well as performance degradation caused by simultaneous accesses to the network. We validate our methodology by constructing the performance models for the 2D and 2.5D approaches, with and without overlapping, of two matrix multiplication algorithms (Cannon's and SUMMA), triangular solve (TRSM) and Cholesky. We compare the estimations provided by these models with the experimental results using up to 24,576 cores of a Cray XE6 system and predict the performance of the algorithms on larger systems. Results prove that the estimations significantly improve when taking into account network contention.
[ { "version": "v1", "created": "Thu, 6 Feb 2014 09:16:38 GMT" } ]
2014-02-07T00:00:00
[ [ "González-Domínguez", "Jorge", "" ], [ "Georganas", "Evangelos", "" ], [ "Zheng", "Yili", "" ], [ "Martín", "María J.", "" ] ]
TITLE: Constructing Performance Models for Dense Linear Algebra Algorithms on Cray XE Systems ABSTRACT: Hiding or minimizing the communication cost is key in order to obtain good performance on large-scale systems. While communication overlapping attempts to hide communications cost, 2.5D communication avoiding algorithms improve performance scalability by reducing the volume of data transfers at the cost of extra memory usage. Both approaches can be used together or separately and the best choice depends on the machine, the algorithm and the problem size. Thus, the development of performance models is crucial to determine the best option for each scenario. In this paper, we present a methodology for constructing performance models for parallel numerical routines on Cray XE systems. Our models use portable benchmarks that measure computational cost and network characteristics, as well as performance degradation caused by simultaneous accesses to the network. We validate our methodology by constructing the performance models for the 2D and 2.5D approaches, with and without overlapping, of two matrix multiplication algorithms (Cannon's and SUMMA), triangular solve (TRSM) and Cholesky. We compare the estimations provided by these models with the experimental results using up to 24,576 cores of a Cray XE6 system and predict the performance of the algorithms on larger systems. Results prove that the estimations significantly improve when taking into account network contention.
1402.1379
Jin-Kao Hao
Zhang-Hua Fu and Jin-Kao Hao
A Three-Phase Search Approach for the Quadratic Minimum Spanning Tree Problem
29 pages
null
null
null
cs.DS cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an undirected graph with costs associated with each edge as well as each pair of edges, the quadratic minimum spanning tree problem (QMSTP) consists of determining a spanning tree of minimum total cost. This problem can be used to model many real-life network design applications, in which both routing and interference costs should be considered. For this problem, we propose a three-phase search approach named TPS, which integrates 1) a descent-based neighborhood search phase using two different move operators to reach a local optimum from a given starting solution, 2) a local optima exploring phase to discover nearby local optima within a given regional search area, and 3) a perturbation-based diversification phase to jump out of the current regional search area. Additionally, we introduce dedicated techniques to reduce the neighborhood to explore and streamline the neighborhood evaluations. Computational experiments based on hundreds of representative benchmarks show that TPS produces highly competitive results with respect to the best performing approaches in the literature by improving the best known results for 31 instances and matching the best known results for the remaining instances only except two cases. Critical elements of the proposed algorithms are analyzed.
[ { "version": "v1", "created": "Thu, 6 Feb 2014 15:31:49 GMT" } ]
2014-02-07T00:00:00
[ [ "Fu", "Zhang-Hua", "" ], [ "Hao", "Jin-Kao", "" ] ]
TITLE: A Three-Phase Search Approach for the Quadratic Minimum Spanning Tree Problem ABSTRACT: Given an undirected graph with costs associated with each edge as well as each pair of edges, the quadratic minimum spanning tree problem (QMSTP) consists of determining a spanning tree of minimum total cost. This problem can be used to model many real-life network design applications, in which both routing and interference costs should be considered. For this problem, we propose a three-phase search approach named TPS, which integrates 1) a descent-based neighborhood search phase using two different move operators to reach a local optimum from a given starting solution, 2) a local optima exploring phase to discover nearby local optima within a given regional search area, and 3) a perturbation-based diversification phase to jump out of the current regional search area. Additionally, we introduce dedicated techniques to reduce the neighborhood to explore and streamline the neighborhood evaluations. Computational experiments based on hundreds of representative benchmarks show that TPS produces highly competitive results with respect to the best performing approaches in the literature by improving the best known results for 31 instances and matching the best known results for the remaining instances only except two cases. Critical elements of the proposed algorithms are analyzed.
1402.0914
Scott Linderman
Scott W. Linderman and Ryan P. Adams
Discovering Latent Network Structure in Point Process Data
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Networks play a central role in modern data analysis, enabling us to reason about systems by studying the relationships between their parts. Most often in network analysis, the edges are given. However, in many systems it is difficult or impossible to measure the network directly. Examples of latent networks include economic interactions linking financial instruments and patterns of reciprocity in gang violence. In these cases, we are limited to noisy observations of events associated with each node. To enable analysis of these implicit networks, we develop a probabilistic model that combines mutually-exciting point processes with random graph models. We show how the Poisson superposition principle enables an elegant auxiliary variable formulation and a fully-Bayesian, parallel inference algorithm. We evaluate this new model empirically on several datasets.
[ { "version": "v1", "created": "Tue, 4 Feb 2014 23:48:23 GMT" } ]
2014-02-06T00:00:00
[ [ "Linderman", "Scott W.", "" ], [ "Adams", "Ryan P.", "" ] ]
TITLE: Discovering Latent Network Structure in Point Process Data ABSTRACT: Networks play a central role in modern data analysis, enabling us to reason about systems by studying the relationships between their parts. Most often in network analysis, the edges are given. However, in many systems it is difficult or impossible to measure the network directly. Examples of latent networks include economic interactions linking financial instruments and patterns of reciprocity in gang violence. In these cases, we are limited to noisy observations of events associated with each node. To enable analysis of these implicit networks, we develop a probabilistic model that combines mutually-exciting point processes with random graph models. We show how the Poisson superposition principle enables an elegant auxiliary variable formulation and a fully-Bayesian, parallel inference algorithm. We evaluate this new model empirically on several datasets.
1402.0525
Emrah Akyol
Mustafa Mehmetoglu and Emrah Akyol and Kenneth Rose
A Deterministic Annealing Approach to Witsenhausen's Counterexample
submitted to ISIT'14
null
null
null
cs.IT cs.SY math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a numerical method, based on information theoretic ideas, to a class of distributed control problems. As a particular test case, the well-known and numerically "over-mined" problem of decentralized control and implicit communication, commonly referred to as Witsenhausen's counterexample, is considered. The method provides a small improvement over the best numerical result so far for this benchmark problem. The key idea is to randomize the zero-delay mappings. which become "soft", probabilistic mappings to be optimized in a deterministic annealing process, by incorporating a Shannon entropy constraint in the problem formulation. The entropy of the mapping is controlled and gradually lowered to zero to obtain deterministic mappings, while avoiding poor local minima. Proposed method obtains new mappings that shed light on the structure of the optimal solution, as well as achieving a small improvement in total cost over the state of the art in numerical approaches to this problem.
[ { "version": "v1", "created": "Mon, 3 Feb 2014 21:31:30 GMT" } ]
2014-02-05T00:00:00
[ [ "Mehmetoglu", "Mustafa", "" ], [ "Akyol", "Emrah", "" ], [ "Rose", "Kenneth", "" ] ]
TITLE: A Deterministic Annealing Approach to Witsenhausen's Counterexample ABSTRACT: This paper proposes a numerical method, based on information theoretic ideas, to a class of distributed control problems. As a particular test case, the well-known and numerically "over-mined" problem of decentralized control and implicit communication, commonly referred to as Witsenhausen's counterexample, is considered. The method provides a small improvement over the best numerical result so far for this benchmark problem. The key idea is to randomize the zero-delay mappings. which become "soft", probabilistic mappings to be optimized in a deterministic annealing process, by incorporating a Shannon entropy constraint in the problem formulation. The entropy of the mapping is controlled and gradually lowered to zero to obtain deterministic mappings, while avoiding poor local minima. Proposed method obtains new mappings that shed light on the structure of the optimal solution, as well as achieving a small improvement in total cost over the state of the art in numerical approaches to this problem.
1402.0557
Eric Huang
Eric Huang, Richard E. Korf
Optimal Rectangle Packing: An Absolute Placement Approach
null
Journal Of Artificial Intelligence Research, Volume 46, pages 47-87, 2013
10.1613/jair.3735
null
cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of finding all enclosing rectangles of minimum area that can contain a given set of rectangles without overlap. Our rectangle packer chooses the x-coordinates of all the rectangles before any of the y-coordinates. We then transform the problem into a perfect-packing problem with no empty space by adding additional rectangles. To determine the y-coordinates, we branch on the different rectangles that can be placed in each empty position. Our packer allows us to extend the known solutions for a consecutive-square benchmark from 27 to 32 squares. We also introduce three new benchmarks, avoiding properties that make a benchmark easy, such as rectangles with shared dimensions. Our third benchmark consists of rectangles of increasingly high precision. To pack them efficiently, we limit the rectangles coordinates and the bounding box dimensions to the set of subset sums of the rectangles dimensions. Overall, our algorithms represent the current state-of-the-art for this problem, outperforming other algorithms by orders of magnitude, depending on the benchmark.
[ { "version": "v1", "created": "Tue, 4 Feb 2014 01:33:30 GMT" } ]
2014-02-05T00:00:00
[ [ "Huang", "Eric", "" ], [ "Korf", "Richard E.", "" ] ]
TITLE: Optimal Rectangle Packing: An Absolute Placement Approach ABSTRACT: We consider the problem of finding all enclosing rectangles of minimum area that can contain a given set of rectangles without overlap. Our rectangle packer chooses the x-coordinates of all the rectangles before any of the y-coordinates. We then transform the problem into a perfect-packing problem with no empty space by adding additional rectangles. To determine the y-coordinates, we branch on the different rectangles that can be placed in each empty position. Our packer allows us to extend the known solutions for a consecutive-square benchmark from 27 to 32 squares. We also introduce three new benchmarks, avoiding properties that make a benchmark easy, such as rectangles with shared dimensions. Our third benchmark consists of rectangles of increasingly high precision. To pack them efficiently, we limit the rectangles coordinates and the bounding box dimensions to the set of subset sums of the rectangles dimensions. Overall, our algorithms represent the current state-of-the-art for this problem, outperforming other algorithms by orders of magnitude, depending on the benchmark.
1402.0568
Amit Metodi
Amit Metodi, Michael Codish, Peter James Stuckey
Boolean Equi-propagation for Concise and Efficient SAT Encodings of Combinatorial Problems
arXiv admin note: text overlap with arXiv:1206.3883
Journal Of Artificial Intelligence Research, Volume 46, pages 303-341, 2013
10.1613/jair.3809
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an approach to propagation-based SAT encoding of combinatorial problems, Boolean equi-propagation, where constraints are modeled as Boolean functions which propagate information about equalities between Boolean literals. This information is then applied to simplify the CNF encoding of the constraints. A key factor is that considering only a small fragment of a constraint model at one time enables us to apply stronger, and even complete, reasoning to detect equivalent literals in that fragment. Once detected, equivalences apply to simplify the entire constraint model and facilitate further reasoning on other fragments. Equi-propagation in combination with partial evaluation and constraint simplification provide the foundation for a powerful approach to SAT-based finite domain constraint solving. We introduce a tool called BEE (Ben-Gurion Equi-propagation Encoder) based on these ideas and demonstrate for a variety of benchmarks that our approach leads to a considerable reduction in the size of CNF encodings and subsequent speed-ups in SAT solving times.
[ { "version": "v1", "created": "Tue, 4 Feb 2014 01:36:36 GMT" } ]
2014-02-05T00:00:00
[ [ "Metodi", "Amit", "" ], [ "Codish", "Michael", "" ], [ "Stuckey", "Peter James", "" ] ]
TITLE: Boolean Equi-propagation for Concise and Efficient SAT Encodings of Combinatorial Problems ABSTRACT: We present an approach to propagation-based SAT encoding of combinatorial problems, Boolean equi-propagation, where constraints are modeled as Boolean functions which propagate information about equalities between Boolean literals. This information is then applied to simplify the CNF encoding of the constraints. A key factor is that considering only a small fragment of a constraint model at one time enables us to apply stronger, and even complete, reasoning to detect equivalent literals in that fragment. Once detected, equivalences apply to simplify the entire constraint model and facilitate further reasoning on other fragments. Equi-propagation in combination with partial evaluation and constraint simplification provide the foundation for a powerful approach to SAT-based finite domain constraint solving. We introduce a tool called BEE (Ben-Gurion Equi-propagation Encoder) based on these ideas and demonstrate for a variety of benchmarks that our approach leads to a considerable reduction in the size of CNF encodings and subsequent speed-ups in SAT solving times.
1402.0584
Shaowei Cai
Shaowei Cai, Kaile Su, Chuan Luo, Abdul Sattar
NuMVC: An Efficient Local Search Algorithm for Minimum Vertex Cover
null
Journal Of Artificial Intelligence Research, Volume 46, pages 687-716, 2013
10.1613/jair.3907
null
cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Minimum Vertex Cover (MVC) problem is a prominent NP-hard combinatorial optimization problem of great importance in both theory and application. Local search has proved successful for this problem. However, there are two main drawbacks in state-of-the-art MVC local search algorithms. First, they select a pair of vertices to exchange simultaneously, which is time-consuming. Secondly, although using edge weighting techniques to diversify the search, these algorithms lack mechanisms for decreasing the weights. To address these issues, we propose two new strategies: two-stage exchange and edge weighting with forgetting. The two-stage exchange strategy selects two vertices to exchange separately and performs the exchange in two stages. The strategy of edge weighting with forgetting not only increases weights of uncovered edges, but also decreases some weights for each edge periodically. These two strategies are used in designing a new MVC local search algorithm, which is referred to as NuMVC. We conduct extensive experimental studies on the standard benchmarks, namely DIMACS and BHOSLIB. The experiment comparing NuMVC with state-of-the-art heuristic algorithms show that NuMVC is at least competitive with the nearest competitor namely PLS on the DIMACS benchmark, and clearly dominates all competitors on the BHOSLIB benchmark. Also, experimental results indicate that NuMVC finds an optimal solution much faster than the current best exact algorithm for Maximum Clique on random instances as well as some structured ones. Moreover, we study the effectiveness of the two strategies and the run-time behaviour through experimental analysis.
[ { "version": "v1", "created": "Tue, 4 Feb 2014 01:42:48 GMT" } ]
2014-02-05T00:00:00
[ [ "Cai", "Shaowei", "" ], [ "Su", "Kaile", "" ], [ "Luo", "Chuan", "" ], [ "Sattar", "Abdul", "" ] ]
TITLE: NuMVC: An Efficient Local Search Algorithm for Minimum Vertex Cover ABSTRACT: The Minimum Vertex Cover (MVC) problem is a prominent NP-hard combinatorial optimization problem of great importance in both theory and application. Local search has proved successful for this problem. However, there are two main drawbacks in state-of-the-art MVC local search algorithms. First, they select a pair of vertices to exchange simultaneously, which is time-consuming. Secondly, although using edge weighting techniques to diversify the search, these algorithms lack mechanisms for decreasing the weights. To address these issues, we propose two new strategies: two-stage exchange and edge weighting with forgetting. The two-stage exchange strategy selects two vertices to exchange separately and performs the exchange in two stages. The strategy of edge weighting with forgetting not only increases weights of uncovered edges, but also decreases some weights for each edge periodically. These two strategies are used in designing a new MVC local search algorithm, which is referred to as NuMVC. We conduct extensive experimental studies on the standard benchmarks, namely DIMACS and BHOSLIB. The experiment comparing NuMVC with state-of-the-art heuristic algorithms show that NuMVC is at least competitive with the nearest competitor namely PLS on the DIMACS benchmark, and clearly dominates all competitors on the BHOSLIB benchmark. Also, experimental results indicate that NuMVC finds an optimal solution much faster than the current best exact algorithm for Maximum Clique on random instances as well as some structured ones. Moreover, we study the effectiveness of the two strategies and the run-time behaviour through experimental analysis.
1402.0595
Mojtaba Seyedhosseini
Mojtaba Seyedhosseini and Tolga Tasdizen
Scene Labeling with Contextual Hierarchical Models
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scene labeling is the problem of assigning an object label to each pixel. It unifies the image segmentation and object recognition problems. The importance of using contextual information in scene labeling frameworks has been widely realized in the field. We propose a contextual framework, called contextual hierarchical model (CHM), which learns contextual information in a hierarchical framework for scene labeling. At each level of the hierarchy, a classifier is trained based on downsampled input images and outputs of previous levels. Our model then incorporates the resulting multi-resolution contextual information into a classifier to segment the input image at original resolution. This training strategy allows for optimization of a joint posterior probability at multiple resolutions through the hierarchy. Contextual hierarchical model is purely based on the input image patches and does not make use of any fragments or shape examples. Hence, it is applicable to a variety of problems such as object segmentation and edge detection. We demonstrate that CHM outperforms state-of-the-art on Stanford background and Weizmann horse datasets. It also outperforms state-of-the-art edge detection methods on NYU depth dataset and achieves state-of-the-art on Berkeley segmentation dataset (BSDS 500).
[ { "version": "v1", "created": "Tue, 4 Feb 2014 02:10:01 GMT" } ]
2014-02-05T00:00:00
[ [ "Seyedhosseini", "Mojtaba", "" ], [ "Tasdizen", "Tolga", "" ] ]
TITLE: Scene Labeling with Contextual Hierarchical Models ABSTRACT: Scene labeling is the problem of assigning an object label to each pixel. It unifies the image segmentation and object recognition problems. The importance of using contextual information in scene labeling frameworks has been widely realized in the field. We propose a contextual framework, called contextual hierarchical model (CHM), which learns contextual information in a hierarchical framework for scene labeling. At each level of the hierarchy, a classifier is trained based on downsampled input images and outputs of previous levels. Our model then incorporates the resulting multi-resolution contextual information into a classifier to segment the input image at original resolution. This training strategy allows for optimization of a joint posterior probability at multiple resolutions through the hierarchy. Contextual hierarchical model is purely based on the input image patches and does not make use of any fragments or shape examples. Hence, it is applicable to a variety of problems such as object segmentation and edge detection. We demonstrate that CHM outperforms state-of-the-art on Stanford background and Weizmann horse datasets. It also outperforms state-of-the-art edge detection methods on NYU depth dataset and achieves state-of-the-art on Berkeley segmentation dataset (BSDS 500).
1402.0671
Roshan Ragel
Rajitha Navarathna, Swarnalatha Radhakrishnan and Roshan Ragel
Loop Unrolling in Multi-pipeline ASIP Design
6 pages
Navarathna, H. M R D B; Radhakrishnan, S.; Ragel, R.G., "Loop unrolling in multi-pipeline ASIP design," Industrial and Information Systems (ICIIS), 2009 International Conference on , pp.306-311, 28-31 Dec. 2009
10.1109/ICIINFS.2009.5429845
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Application Specific Instruction-set Processor (ASIP) is one of the popular processor design techniques for embedded systems which allows customizability in processor design without overly hindering design flexibility. Multi-pipeline ASIPs were proposed to improve the performance of such systems by compromising between speed and processor area. One of the problems in the multi-pipeline design is the limited inherent instruction level parallelism (ILP) available in applications. The ILP of application programs can be improved via a compiler optimization technique known as loop unrolling. In this paper, we present how loop unrolling effects the performance of multi-pipeline ASIPs. The improvements in performance average around 15% for a number of benchmark applications with the maximum improvement of around 30%. In addition, we analyzed the variable of performance against loop unrolling factor, which is the amount of unrolling we perform.
[ { "version": "v1", "created": "Tue, 4 Feb 2014 09:36:34 GMT" } ]
2014-02-05T00:00:00
[ [ "Navarathna", "Rajitha", "" ], [ "Radhakrishnan", "Swarnalatha", "" ], [ "Ragel", "Roshan", "" ] ]
TITLE: Loop Unrolling in Multi-pipeline ASIP Design ABSTRACT: Application Specific Instruction-set Processor (ASIP) is one of the popular processor design techniques for embedded systems which allows customizability in processor design without overly hindering design flexibility. Multi-pipeline ASIPs were proposed to improve the performance of such systems by compromising between speed and processor area. One of the problems in the multi-pipeline design is the limited inherent instruction level parallelism (ILP) available in applications. The ILP of application programs can be improved via a compiler optimization technique known as loop unrolling. In this paper, we present how loop unrolling effects the performance of multi-pipeline ASIPs. The improvements in performance average around 15% for a number of benchmark applications with the maximum improvement of around 30%. In addition, we analyzed the variable of performance against loop unrolling factor, which is the amount of unrolling we perform.
1202.2249
Ioana Sporea
Ioana Sporea and Andr\'e Gr\"uning
Supervised Learning in Multilayer Spiking Neural Networks
38 pages, 4 figures
Neural Compuation February 2013, Vol. 25, No. 2, Pages 473-509
10.1162/NECO_a_00396
null
cs.NE q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current article introduces a supervised learning algorithm for multilayer spiking neural networks. The algorithm presented here overcomes some limitations of existing learning algorithms as it can be applied to neurons firing multiple spikes and it can in principle be applied to any linearisable neuron model. The algorithm is applied successfully to various benchmarks, such as the XOR problem and the Iris data set, as well as complex classifications problems. The simulations also show the flexibility of this supervised learning algorithm which permits different encodings of the spike timing patterns, including precise spike trains encoding.
[ { "version": "v1", "created": "Fri, 10 Feb 2012 12:57:34 GMT" } ]
2014-02-04T00:00:00
[ [ "Sporea", "Ioana", "" ], [ "Grüning", "André", "" ] ]
TITLE: Supervised Learning in Multilayer Spiking Neural Networks ABSTRACT: The current article introduces a supervised learning algorithm for multilayer spiking neural networks. The algorithm presented here overcomes some limitations of existing learning algorithms as it can be applied to neurons firing multiple spikes and it can in principle be applied to any linearisable neuron model. The algorithm is applied successfully to various benchmarks, such as the XOR problem and the Iris data set, as well as complex classifications problems. The simulations also show the flexibility of this supervised learning algorithm which permits different encodings of the spike timing patterns, including precise spike trains encoding.
1309.3256
Rachel Ward
Abhinav Nellore and Rachel Ward
Recovery guarantees for exemplar-based clustering
24 pages, 4 figures
null
null
null
stat.ML cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a certain class of distributions, we prove that the linear programming relaxation of $k$-medoids clustering---a variant of $k$-means clustering where means are replaced by exemplars from within the dataset---distinguishes points drawn from nonoverlapping balls with high probability once the number of points drawn and the separation distance between any two balls are sufficiently large. Our results hold in the nontrivial regime where the separation distance is small enough that points drawn from different balls may be closer to each other than points drawn from the same ball; in this case, clustering by thresholding pairwise distances between points can fail. We also exhibit numerical evidence of high-probability recovery in a substantially more permissive regime.
[ { "version": "v1", "created": "Thu, 12 Sep 2013 19:38:18 GMT" }, { "version": "v2", "created": "Mon, 3 Feb 2014 03:56:31 GMT" } ]
2014-02-04T00:00:00
[ [ "Nellore", "Abhinav", "" ], [ "Ward", "Rachel", "" ] ]
TITLE: Recovery guarantees for exemplar-based clustering ABSTRACT: For a certain class of distributions, we prove that the linear programming relaxation of $k$-medoids clustering---a variant of $k$-means clustering where means are replaced by exemplars from within the dataset---distinguishes points drawn from nonoverlapping balls with high probability once the number of points drawn and the separation distance between any two balls are sufficiently large. Our results hold in the nontrivial regime where the separation distance is small enough that points drawn from different balls may be closer to each other than points drawn from the same ball; in this case, clustering by thresholding pairwise distances between points can fail. We also exhibit numerical evidence of high-probability recovery in a substantially more permissive regime.
1311.2663
Shandian Zhe
Shandian Zhe and Yuan Qi and Youngja Park and Ian Molloy and Suresh Chari
DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements
null
null
null
null
cs.LG cs.DC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Infinite Tucker Decomposition (InfTucker) and random function prior models, as nonparametric Bayesian models on infinite exchangeable arrays, are more powerful models than widely-used multilinear factorization methods including Tucker and PARAFAC decomposition, (partly) due to their capability of modeling nonlinear relationships between array elements. Despite their great predictive performance and sound theoretical foundations, they cannot handle massive data due to a prohibitively high training time. To overcome this limitation, we present Distributed Infinite Tucker (DINTUCKER), a large-scale nonlinear tensor decomposition algorithm on MAPREDUCE. While maintaining the predictive accuracy of InfTucker, it is scalable on massive data. DINTUCKER is based on a new hierarchical Bayesian model that enables local training of InfTucker on subarrays and information integration from all local training results. We use distributed stochastic gradient descent, coupled with variational inference, to train this model. We apply DINTUCKER to multidimensional arrays with billions of elements from applications in the "Read the Web" project (Carlson et al., 2010) and in information security and compare it with the state-of-the-art large-scale tensor decomposition method, GigaTensor. On both datasets, DINTUCKER achieves significantly higher prediction accuracy with less computational time.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 02:36:03 GMT" }, { "version": "v2", "created": "Wed, 13 Nov 2013 23:50:57 GMT" }, { "version": "v3", "created": "Sun, 15 Dec 2013 13:56:18 GMT" }, { "version": "v4", "created": "Thu, 23 Jan 2014 05:49:44 GMT" }, { "version": "v5", "created": "Sat, 1 Feb 2014 14:35:04 GMT" } ]
2014-02-04T00:00:00
[ [ "Zhe", "Shandian", "" ], [ "Qi", "Yuan", "" ], [ "Park", "Youngja", "" ], [ "Molloy", "Ian", "" ], [ "Chari", "Suresh", "" ] ]
TITLE: DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements ABSTRACT: Infinite Tucker Decomposition (InfTucker) and random function prior models, as nonparametric Bayesian models on infinite exchangeable arrays, are more powerful models than widely-used multilinear factorization methods including Tucker and PARAFAC decomposition, (partly) due to their capability of modeling nonlinear relationships between array elements. Despite their great predictive performance and sound theoretical foundations, they cannot handle massive data due to a prohibitively high training time. To overcome this limitation, we present Distributed Infinite Tucker (DINTUCKER), a large-scale nonlinear tensor decomposition algorithm on MAPREDUCE. While maintaining the predictive accuracy of InfTucker, it is scalable on massive data. DINTUCKER is based on a new hierarchical Bayesian model that enables local training of InfTucker on subarrays and information integration from all local training results. We use distributed stochastic gradient descent, coupled with variational inference, to train this model. We apply DINTUCKER to multidimensional arrays with billions of elements from applications in the "Read the Web" project (Carlson et al., 2010) and in information security and compare it with the state-of-the-art large-scale tensor decomposition method, GigaTensor. On both datasets, DINTUCKER achieves significantly higher prediction accuracy with less computational time.
1312.6169
C\'edric Lagnier
C\'edric Lagnier, Simon Bourigault, Sylvain Lamprier, Ludovic Denoyer and Patrick Gallinari
Learning Information Spread in Content Networks
4 pages
null
null
null
cs.LG cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a model for predicting the diffusion of content information on social media. When propagation is usually modeled on discrete graph structures, we introduce here a continuous diffusion model, where nodes in a diffusion cascade are projected onto a latent space with the property that their proximity in this space reflects the temporal diffusion process. We focus on the task of predicting contaminated users for an initial initial information source and provide preliminary results on differents datasets.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 22:49:01 GMT" }, { "version": "v2", "created": "Sun, 2 Feb 2014 20:36:57 GMT" } ]
2014-02-04T00:00:00
[ [ "Lagnier", "Cédric", "" ], [ "Bourigault", "Simon", "" ], [ "Lamprier", "Sylvain", "" ], [ "Denoyer", "Ludovic", "" ], [ "Gallinari", "Patrick", "" ] ]
TITLE: Learning Information Spread in Content Networks ABSTRACT: We introduce a model for predicting the diffusion of content information on social media. When propagation is usually modeled on discrete graph structures, we introduce here a continuous diffusion model, where nodes in a diffusion cascade are projected onto a latent space with the property that their proximity in this space reflects the temporal diffusion process. We focus on the task of predicting contaminated users for an initial initial information source and provide preliminary results on differents datasets.
1401.2288
Hemant Kumar Aggarwal
Hemant Kumar Aggarwal and Angshul Majumdar
Extension of Sparse Randomized Kaczmarz Algorithm for Multiple Measurement Vectors
null
null
null
null
cs.NA cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Kaczmarz algorithm is popular for iteratively solving an overdetermined system of linear equations. The traditional Kaczmarz algorithm can approximate the solution in few sweeps through the equations but a randomized version of the Kaczmarz algorithm was shown to converge exponentially and independent of number of equations. Recently an algorithm for finding sparse solution to a linear system of equations has been proposed based on weighted randomized Kaczmarz algorithm. These algorithms solves single measurement vector problem; however there are applications were multiple-measurements are available. In this work, the objective is to solve a multiple measurement vector problem with common sparse support by modifying the randomized Kaczmarz algorithm. We have also modeled the problem of face recognition from video as the multiple measurement vector problem and solved using our proposed technique. We have compared the proposed algorithm with state-of-art spectral projected gradient algorithm for multiple measurement vectors on both real and synthetic datasets. The Monte Carlo simulations confirms that our proposed algorithm have better recovery and convergence rate than the MMV version of spectral projected gradient algorithm under fairness constraints.
[ { "version": "v1", "created": "Fri, 10 Jan 2014 11:24:35 GMT" }, { "version": "v2", "created": "Sun, 26 Jan 2014 10:05:15 GMT" }, { "version": "v3", "created": "Sun, 2 Feb 2014 08:13:58 GMT" } ]
2014-02-04T00:00:00
[ [ "Aggarwal", "Hemant Kumar", "" ], [ "Majumdar", "Angshul", "" ] ]
TITLE: Extension of Sparse Randomized Kaczmarz Algorithm for Multiple Measurement Vectors ABSTRACT: The Kaczmarz algorithm is popular for iteratively solving an overdetermined system of linear equations. The traditional Kaczmarz algorithm can approximate the solution in few sweeps through the equations but a randomized version of the Kaczmarz algorithm was shown to converge exponentially and independent of number of equations. Recently an algorithm for finding sparse solution to a linear system of equations has been proposed based on weighted randomized Kaczmarz algorithm. These algorithms solves single measurement vector problem; however there are applications were multiple-measurements are available. In this work, the objective is to solve a multiple measurement vector problem with common sparse support by modifying the randomized Kaczmarz algorithm. We have also modeled the problem of face recognition from video as the multiple measurement vector problem and solved using our proposed technique. We have compared the proposed algorithm with state-of-art spectral projected gradient algorithm for multiple measurement vectors on both real and synthetic datasets. The Monte Carlo simulations confirms that our proposed algorithm have better recovery and convergence rate than the MMV version of spectral projected gradient algorithm under fairness constraints.
1401.4307
Khalid Belhajjame
Khalid Belhajjame and Jun Zhao and Daniel Garijo and Kristina Hettne and Raul Palma and \'Oscar Corcho and Jos\'e-Manuel G\'omez-P\'erez and Sean Bechhofer and Graham Klyne and Carole Goble
The Research Object Suite of Ontologies: Sharing and Exchanging Research Data and Methods on the Open Web
20 pages
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research in life sciences is increasingly being conducted in a digital and online environment. In particular, life scientists have been pioneers in embracing new computational tools to conduct their investigations. To support the sharing of digital objects produced during such research investigations, we have witnessed in the last few years the emergence of specialized repositories, e.g., DataVerse and FigShare. Such repositories provide users with the means to share and publish datasets that were used or generated in research investigations. While these repositories have proven their usefulness, interpreting and reusing evidence for most research results is a challenging task. Additional contextual descriptions are needed to understand how those results were generated and/or the circumstances under which they were concluded. Because of this, scientists are calling for models that go beyond the publication of datasets to systematically capture the life cycle of scientific investigations and provide a single entry point to access the information about the hypothesis investigated, the datasets used, the experiments carried out, the results of the experiments, the people involved in the research, etc. In this paper we present the Research Object (RO) suite of ontologies, which provide a structured container to encapsulate research data and methods along with essential metadata descriptions. Research Objects are portable units that enable the sharing, preservation, interpretation and reuse of research investigation results. The ontologies we present have been designed in the light of requirements that we gathered from life scientists. They have been built upon existing popular vocabularies to facilitate interoperability. Furthermore, we have developed tools to support the creation and sharing of Research Objects, thereby promoting and facilitating their adoption.
[ { "version": "v1", "created": "Fri, 17 Jan 2014 11:07:52 GMT" }, { "version": "v2", "created": "Mon, 3 Feb 2014 10:27:19 GMT" } ]
2014-02-04T00:00:00
[ [ "Belhajjame", "Khalid", "" ], [ "Zhao", "Jun", "" ], [ "Garijo", "Daniel", "" ], [ "Hettne", "Kristina", "" ], [ "Palma", "Raul", "" ], [ "Corcho", "Óscar", "" ], [ "Gómez-Pérez", "José-Manuel", "" ], [ "Bechhofer", "Sean", "" ], [ "Klyne", "Graham", "" ], [ "Goble", "Carole", "" ] ]
TITLE: The Research Object Suite of Ontologies: Sharing and Exchanging Research Data and Methods on the Open Web ABSTRACT: Research in life sciences is increasingly being conducted in a digital and online environment. In particular, life scientists have been pioneers in embracing new computational tools to conduct their investigations. To support the sharing of digital objects produced during such research investigations, we have witnessed in the last few years the emergence of specialized repositories, e.g., DataVerse and FigShare. Such repositories provide users with the means to share and publish datasets that were used or generated in research investigations. While these repositories have proven their usefulness, interpreting and reusing evidence for most research results is a challenging task. Additional contextual descriptions are needed to understand how those results were generated and/or the circumstances under which they were concluded. Because of this, scientists are calling for models that go beyond the publication of datasets to systematically capture the life cycle of scientific investigations and provide a single entry point to access the information about the hypothesis investigated, the datasets used, the experiments carried out, the results of the experiments, the people involved in the research, etc. In this paper we present the Research Object (RO) suite of ontologies, which provide a structured container to encapsulate research data and methods along with essential metadata descriptions. Research Objects are portable units that enable the sharing, preservation, interpretation and reuse of research investigation results. The ontologies we present have been designed in the light of requirements that we gathered from life scientists. They have been built upon existing popular vocabularies to facilitate interoperability. Furthermore, we have developed tools to support the creation and sharing of Research Objects, thereby promoting and facilitating their adoption.
1402.0238
Vincent Labatut
Burcu Kantarc{\i}, Vincent Labatut
Classification of Complex Networks Based on Topological Properties
null
3rd Conference on Social Computing and its Applications, Karlsruhe : Germany (2013)
10.1109/CGC.2013.54
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex networks are a powerful modeling tool, allowing the study of countless real-world systems. They have been used in very different domains such as computer science, biology, sociology, management, etc. Authors have been trying to characterize them using various measures such as degree distribution, transitivity or average distance. Their goal is to detect certain properties such as the small-world or scale-free properties. Previous works have shown some of these properties are present in many different systems, while others are characteristic of certain types of systems only. However, each one of these studies generally focuses on a very small number of topological measures and networks. In this work, we aim at using a more systematic approach. We first constitute a dataset of 152 publicly available networks, spanning over 7 different domains. We then process 14 different topological measures to characterize them in the most possible complete way. Finally, we apply standard data mining tools to analyze these data. A cluster analysis reveals it is possible to obtain two significantly distinct clusters of networks, corresponding roughly to a bisection of the domains modeled by the networks. On these data, the most discriminant measures are density, modularity, average degree and transitivity, and at a lesser extent, closeness and edgebetweenness centralities.Abstract--Complex networks are a powerful modeling tool, allowing the study of countless real-world systems. They have been used in very different domains such as computer science, biology, sociology, management, etc. Authors have been trying to characterize them using various measures such as degree distribution, transitivity or average distance. Their goal is to detect certain properties such as the small-world or scale-free properties. Previous works have shown some of these properties are present in many different systems, while others are characteristic of certain types of systems only. However, each one of these studies generally focuses on a very small number of topological measures and networks. In this work, we aim at using a more systematic approach. We first constitute a dataset of 152 publicly available networks, spanning over 7 different domains. We then process 14 different topological measures to characterize them in the most possible complete way. Finally, we apply standard data mining tools to analyze these data. A cluster analysis reveals it is possible to obtain two significantly distinct clusters of networks, corresponding roughly to a bisection of the domains modeled by the networks. On these data, the most discriminant measures are density, modularity, average degree and transitivity, and at a lesser extent, closeness and edgebetweenness centralities.
[ { "version": "v1", "created": "Sun, 2 Feb 2014 19:48:52 GMT" } ]
2014-02-04T00:00:00
[ [ "Kantarcı", "Burcu", "" ], [ "Labatut", "Vincent", "" ] ]
TITLE: Classification of Complex Networks Based on Topological Properties ABSTRACT: Complex networks are a powerful modeling tool, allowing the study of countless real-world systems. They have been used in very different domains such as computer science, biology, sociology, management, etc. Authors have been trying to characterize them using various measures such as degree distribution, transitivity or average distance. Their goal is to detect certain properties such as the small-world or scale-free properties. Previous works have shown some of these properties are present in many different systems, while others are characteristic of certain types of systems only. However, each one of these studies generally focuses on a very small number of topological measures and networks. In this work, we aim at using a more systematic approach. We first constitute a dataset of 152 publicly available networks, spanning over 7 different domains. We then process 14 different topological measures to characterize them in the most possible complete way. Finally, we apply standard data mining tools to analyze these data. A cluster analysis reveals it is possible to obtain two significantly distinct clusters of networks, corresponding roughly to a bisection of the domains modeled by the networks. On these data, the most discriminant measures are density, modularity, average degree and transitivity, and at a lesser extent, closeness and edgebetweenness centralities.Abstract--Complex networks are a powerful modeling tool, allowing the study of countless real-world systems. They have been used in very different domains such as computer science, biology, sociology, management, etc. Authors have been trying to characterize them using various measures such as degree distribution, transitivity or average distance. Their goal is to detect certain properties such as the small-world or scale-free properties. Previous works have shown some of these properties are present in many different systems, while others are characteristic of certain types of systems only. However, each one of these studies generally focuses on a very small number of topological measures and networks. In this work, we aim at using a more systematic approach. We first constitute a dataset of 152 publicly available networks, spanning over 7 different domains. We then process 14 different topological measures to characterize them in the most possible complete way. Finally, we apply standard data mining tools to analyze these data. A cluster analysis reveals it is possible to obtain two significantly distinct clusters of networks, corresponding roughly to a bisection of the domains modeled by the networks. On these data, the most discriminant measures are density, modularity, average degree and transitivity, and at a lesser extent, closeness and edgebetweenness centralities.
1402.0420
Luca Vassio Mr
Francesco Bertini, Lorenzo Dal Mas, Luca Vassio and Enrico Ampellio
Multidiscipinary Optimization For Gas Turbines Design
12 pages, 6 figures. Presented at the XXII Italian Association of Aeronautics and Astronautics Conference (2013)
null
null
null
math.OC cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
State-of-the-art aeronautic Low Pressure gas Turbines (LPTs) are already characterized by high quality standards, thus they offer very narrow margins of improvement. Typical design process starts with a Concept Design (CD) phase, defined using mean-line 1D and other low-order tools, and evolves through a Preliminary Design (PD) phase, which allows the geometric definition in details. In this framework, multidisciplinary optimization is the only way to properly handle the complicated peculiarities of the design. The authors present different strategies and algorithms that have been implemented exploiting the PD phase as a real-like design benchmark to illustrate results. The purpose of this work is to describe the optimization techniques, their settings and how to implement them effectively in a multidisciplinary environment. Starting from a basic gradient method and a semi-random second order method, the authors have introduced an Artificial Bee Colony-like optimizer, a multi-objective Genetic Diversity Evolutionary Algorithm [1] and a multi-objective response surface approach based on Artificial Neural Network, parallelizing and customizing them for the gas turbine study. Moreover, speedup and improvement arrangements are embedded in different hybrid strategies with the aim at finding the best solutions for different kind of problems that arise in this field.
[ { "version": "v1", "created": "Mon, 3 Feb 2014 16:38:51 GMT" } ]
2014-02-04T00:00:00
[ [ "Bertini", "Francesco", "" ], [ "Mas", "Lorenzo Dal", "" ], [ "Vassio", "Luca", "" ], [ "Ampellio", "Enrico", "" ] ]
TITLE: Multidiscipinary Optimization For Gas Turbines Design ABSTRACT: State-of-the-art aeronautic Low Pressure gas Turbines (LPTs) are already characterized by high quality standards, thus they offer very narrow margins of improvement. Typical design process starts with a Concept Design (CD) phase, defined using mean-line 1D and other low-order tools, and evolves through a Preliminary Design (PD) phase, which allows the geometric definition in details. In this framework, multidisciplinary optimization is the only way to properly handle the complicated peculiarities of the design. The authors present different strategies and algorithms that have been implemented exploiting the PD phase as a real-like design benchmark to illustrate results. The purpose of this work is to describe the optimization techniques, their settings and how to implement them effectively in a multidisciplinary environment. Starting from a basic gradient method and a semi-random second order method, the authors have introduced an Artificial Bee Colony-like optimizer, a multi-objective Genetic Diversity Evolutionary Algorithm [1] and a multi-objective response surface approach based on Artificial Neural Network, parallelizing and customizing them for the gas turbine study. Moreover, speedup and improvement arrangements are embedded in different hybrid strategies with the aim at finding the best solutions for different kind of problems that arise in this field.
1402.0459
Haoyang (Hubert) Duan
Hubert Haoyang Duan
Applying Supervised Learning Algorithms and a New Feature Selection Method to Predict Coronary Artery Disease
This is a Master of Science in Mathematics thesis under the supervision of Dr. Vladimir Pestov and Dr. George Wells submitted on January 31, 2014 at the University of Ottawa; 102 pages and 15 figures
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From a fresh data science perspective, this thesis discusses the prediction of coronary artery disease based on genetic variations at the DNA base pair level, called Single-Nucleotide Polymorphisms (SNPs), collected from the Ontario Heart Genomics Study (OHGS). First, the thesis explains two commonly used supervised learning algorithms, the k-Nearest Neighbour (k-NN) and Random Forest classifiers, and includes a complete proof that the k-NN classifier is universally consistent in any finite dimensional normed vector space. Second, the thesis introduces two dimensionality reduction steps, Random Projections, a known feature extraction technique based on the Johnson-Lindenstrauss lemma, and a new method termed Mass Transportation Distance (MTD) Feature Selection for discrete domains. Then, this thesis compares the performance of Random Projections with the k-NN classifier against MTD Feature Selection and Random Forest, for predicting artery disease based on accuracy, the F-Measure, and area under the Receiver Operating Characteristic (ROC) curve. The comparative results demonstrate that MTD Feature Selection with Random Forest is vastly superior to Random Projections and k-NN. The Random Forest classifier is able to obtain an accuracy of 0.6660 and an area under the ROC curve of 0.8562 on the OHGS genetic dataset, when 3335 SNPs are selected by MTD Feature Selection for classification. This area is considerably better than the previous high score of 0.608 obtained by Davies et al. in 2010 on the same dataset.
[ { "version": "v1", "created": "Mon, 3 Feb 2014 18:47:41 GMT" } ]
2014-02-04T00:00:00
[ [ "Duan", "Hubert Haoyang", "" ] ]
TITLE: Applying Supervised Learning Algorithms and a New Feature Selection Method to Predict Coronary Artery Disease ABSTRACT: From a fresh data science perspective, this thesis discusses the prediction of coronary artery disease based on genetic variations at the DNA base pair level, called Single-Nucleotide Polymorphisms (SNPs), collected from the Ontario Heart Genomics Study (OHGS). First, the thesis explains two commonly used supervised learning algorithms, the k-Nearest Neighbour (k-NN) and Random Forest classifiers, and includes a complete proof that the k-NN classifier is universally consistent in any finite dimensional normed vector space. Second, the thesis introduces two dimensionality reduction steps, Random Projections, a known feature extraction technique based on the Johnson-Lindenstrauss lemma, and a new method termed Mass Transportation Distance (MTD) Feature Selection for discrete domains. Then, this thesis compares the performance of Random Projections with the k-NN classifier against MTD Feature Selection and Random Forest, for predicting artery disease based on accuracy, the F-Measure, and area under the Receiver Operating Characteristic (ROC) curve. The comparative results demonstrate that MTD Feature Selection with Random Forest is vastly superior to Random Projections and k-NN. The Random Forest classifier is able to obtain an accuracy of 0.6660 and an area under the ROC curve of 0.8562 on the OHGS genetic dataset, when 3335 SNPs are selected by MTD Feature Selection for classification. This area is considerably better than the previous high score of 0.608 obtained by Davies et al. in 2010 on the same dataset.
1310.4822
Hugo Jair Escalante
Hugo Jair Escalante, Isabelle Guyon, Vassilis Athitsos, Pat Jangyodsuk, Jun Wan
Principal motion components for gesture recognition using a single-example
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces principal motion components (PMC), a new method for one-shot gesture recognition. In the considered scenario a single training-video is available for each gesture to be recognized, which limits the application of traditional techniques (e.g., HMMs). In PMC, a 2D map of motion energy is obtained per each pair of consecutive frames in a video. Motion maps associated to a video are processed to obtain a PCA model, which is used for recognition under a reconstruction-error approach. The main benefits of the proposed approach are its simplicity, easiness of implementation, competitive performance and efficiency. We report experimental results in one-shot gesture recognition using the ChaLearn Gesture Dataset; a benchmark comprising more than 50,000 gestures, recorded as both RGB and depth video with a Kinect camera. Results obtained with PMC are competitive with alternative methods proposed for the same data set.
[ { "version": "v1", "created": "Thu, 17 Oct 2013 19:52:50 GMT" }, { "version": "v2", "created": "Fri, 31 Jan 2014 12:04:41 GMT" } ]
2014-02-03T00:00:00
[ [ "Escalante", "Hugo Jair", "" ], [ "Guyon", "Isabelle", "" ], [ "Athitsos", "Vassilis", "" ], [ "Jangyodsuk", "Pat", "" ], [ "Wan", "Jun", "" ] ]
TITLE: Principal motion components for gesture recognition using a single-example ABSTRACT: This paper introduces principal motion components (PMC), a new method for one-shot gesture recognition. In the considered scenario a single training-video is available for each gesture to be recognized, which limits the application of traditional techniques (e.g., HMMs). In PMC, a 2D map of motion energy is obtained per each pair of consecutive frames in a video. Motion maps associated to a video are processed to obtain a PCA model, which is used for recognition under a reconstruction-error approach. The main benefits of the proposed approach are its simplicity, easiness of implementation, competitive performance and efficiency. We report experimental results in one-shot gesture recognition using the ChaLearn Gesture Dataset; a benchmark comprising more than 50,000 gestures, recorded as both RGB and depth video with a Kinect camera. Results obtained with PMC are competitive with alternative methods proposed for the same data set.
1401.8132
Giuseppe Vizzari
Stefania Bandini, Luca Crociani, Giuseppe Vizzari
Heterogeneous Speed Profiles in Discrete Models for Pedestrian Simulation
Poster at the 93rd Transportation Research Board annual meeting, Washington, January 2014 - Committee number AHB45 - TRB Committee on Traffic Flow Theory and Characteristics
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discrete pedestrian simulation models are viable alternatives to particle based approaches based on a continuous spatial representation. The effects of discretisation, however, also imply some difficulties in modelling certain phenomena that can be observed in reality. This paper focuses on the possibility to manage heterogeneity in the walking speed of the simulated population of pedestrians by modifying an existing multi-agent model extending the floor field approach. Whereas some discrete models allow pedestrians (or cars, when applied to traffic modelling) to move more than a single cell per time step, the present work proposes a maximum speed of one cell per step, but we model lower speeds by having pedestrians yielding their movement in some turns. Different classes of pedestrians are associated to different desired walking speeds and we define a stochastic mechanism ensuring that they maintain an average speed close to this threshold. In the paper we formally describe the model and we show the results of its application in benchmark scenarios. Finally, we also show how this approach can also support the definition of slopes and stairs as elements reducing the walking speed of pedestrians climbing them in a simulated scenario.
[ { "version": "v1", "created": "Fri, 31 Jan 2014 11:07:25 GMT" } ]
2014-02-03T00:00:00
[ [ "Bandini", "Stefania", "" ], [ "Crociani", "Luca", "" ], [ "Vizzari", "Giuseppe", "" ] ]
TITLE: Heterogeneous Speed Profiles in Discrete Models for Pedestrian Simulation ABSTRACT: Discrete pedestrian simulation models are viable alternatives to particle based approaches based on a continuous spatial representation. The effects of discretisation, however, also imply some difficulties in modelling certain phenomena that can be observed in reality. This paper focuses on the possibility to manage heterogeneity in the walking speed of the simulated population of pedestrians by modifying an existing multi-agent model extending the floor field approach. Whereas some discrete models allow pedestrians (or cars, when applied to traffic modelling) to move more than a single cell per time step, the present work proposes a maximum speed of one cell per step, but we model lower speeds by having pedestrians yielding their movement in some turns. Different classes of pedestrians are associated to different desired walking speeds and we define a stochastic mechanism ensuring that they maintain an average speed close to this threshold. In the paper we formally describe the model and we show the results of its application in benchmark scenarios. Finally, we also show how this approach can also support the definition of slopes and stairs as elements reducing the walking speed of pedestrians climbing them in a simulated scenario.
1401.7727
Benjamin Rubinstein
Battista Biggio and Igino Corona and Blaine Nelson and Benjamin I. P. Rubinstein and Davide Maiorca and Giorgio Fumera and Giorgio Giacinto and and Fabio Roli
Security Evaluation of Support Vector Machines in Adversarial Environments
47 pages, 9 figures; chapter accepted into book 'Support Vector Machine Applications'
null
null
null
cs.LG cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering. However, if SVMs are to be incorporated in real-world security systems, they must be able to cope with attack patterns that can either mislead the learning algorithm (poisoning), evade detection (evasion), or gain information about their internal parameters (privacy breaches). The main contributions of this chapter are twofold. First, we introduce a formal general framework for the empirical evaluation of the security of machine-learning systems. Second, according to our framework, we demonstrate the feasibility of evasion, poisoning and privacy attacks against SVMs in real-world security problems. For each attack technique, we evaluate its impact and discuss whether (and how) it can be countered through an adversary-aware design of SVMs. Our experiments are easily reproducible thanks to open-source code that we have made available, together with all the employed datasets, on a public repository.
[ { "version": "v1", "created": "Thu, 30 Jan 2014 03:37:18 GMT" } ]
2014-01-31T00:00:00
[ [ "Biggio", "Battista", "" ], [ "Corona", "Igino", "" ], [ "Nelson", "Blaine", "" ], [ "Rubinstein", "Benjamin I. P.", "" ], [ "Maiorca", "Davide", "" ], [ "Fumera", "Giorgio", "" ], [ "Giacinto", "Giorgio", "" ], [ "Roli", "and Fabio", "" ] ]
TITLE: Security Evaluation of Support Vector Machines in Adversarial Environments ABSTRACT: Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering. However, if SVMs are to be incorporated in real-world security systems, they must be able to cope with attack patterns that can either mislead the learning algorithm (poisoning), evade detection (evasion), or gain information about their internal parameters (privacy breaches). The main contributions of this chapter are twofold. First, we introduce a formal general framework for the empirical evaluation of the security of machine-learning systems. Second, according to our framework, we demonstrate the feasibility of evasion, poisoning and privacy attacks against SVMs in real-world security problems. For each attack technique, we evaluate its impact and discuss whether (and how) it can be countered through an adversary-aware design of SVMs. Our experiments are easily reproducible thanks to open-source code that we have made available, together with all the employed datasets, on a public repository.
1310.6775
Linas Vepstas PhD
Linas Vepstas
Durkheim Project Data Analysis Report
43 pages, to appear as appendix of primary science publication Poulin, et al "Predicting the risk of suicide by analyzing the text of clinical notes"
null
10.1371/journal.pone.0085733.s001
null
cs.AI cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report describes the suicidality prediction models created under the DARPA DCAPS program in association with the Durkheim Project [http://durkheimproject.org/]. The models were built primarily from unstructured text (free-format clinician notes) for several hundred patient records obtained from the Veterans Health Administration (VHA). The models were constructed using a genetic programming algorithm applied to bag-of-words and bag-of-phrases datasets. The influence of additional structured data was explored but was found to be minor. Given the small dataset size, classification between cohorts was high fidelity (98%). Cross-validation suggests these models are reasonably predictive, with an accuracy of 50% to 69% on five rotating folds, with ensemble averages of 58% to 67%. One particularly noteworthy result is that word-pairs can dramatically improve classification accuracy; but this is the case only when one of the words in the pair is already known to have a high predictive value. By contrast, the set of all possible word-pairs does not improve on a simple bag-of-words model.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 21:10:53 GMT" } ]
2014-01-30T00:00:00
[ [ "Vepstas", "Linas", "" ] ]
TITLE: Durkheim Project Data Analysis Report ABSTRACT: This report describes the suicidality prediction models created under the DARPA DCAPS program in association with the Durkheim Project [http://durkheimproject.org/]. The models were built primarily from unstructured text (free-format clinician notes) for several hundred patient records obtained from the Veterans Health Administration (VHA). The models were constructed using a genetic programming algorithm applied to bag-of-words and bag-of-phrases datasets. The influence of additional structured data was explored but was found to be minor. Given the small dataset size, classification between cohorts was high fidelity (98%). Cross-validation suggests these models are reasonably predictive, with an accuracy of 50% to 69% on five rotating folds, with ensemble averages of 58% to 67%. One particularly noteworthy result is that word-pairs can dramatically improve classification accuracy; but this is the case only when one of the words in the pair is already known to have a high predictive value. By contrast, the set of all possible word-pairs does not improve on a simple bag-of-words model.
1311.2334
Ahmed Elgohary
Ahmed Elgohary, Ahmed K. Farahat, Mohamed S. Kamel, Fakhri Karray
Embed and Conquer: Scalable Embeddings for Kernel k-Means on MapReduce
Appears in Proceedings of the SIAM International Conference on Data Mining (SDM), 2014
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The kernel $k$-means is an effective method for data clustering which extends the commonly-used $k$-means algorithm to work on a similarity matrix over complex data structures. The kernel $k$-means algorithm is however computationally very complex as it requires the complete data matrix to be calculated and stored. Further, the kernelized nature of the kernel $k$-means algorithm hinders the parallelization of its computations on modern infrastructures for distributed computing. In this paper, we are defining a family of kernel-based low-dimensional embeddings that allows for scaling kernel $k$-means on MapReduce via an efficient and unified parallelization strategy. Afterwards, we propose two methods for low-dimensional embedding that adhere to our definition of the embedding family. Exploiting the proposed parallelization strategy, we present two scalable MapReduce algorithms for kernel $k$-means. We demonstrate the effectiveness and efficiency of the proposed algorithms through an empirical evaluation on benchmark data sets.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 02:37:16 GMT" }, { "version": "v2", "created": "Tue, 12 Nov 2013 15:41:40 GMT" }, { "version": "v3", "created": "Sat, 28 Dec 2013 03:56:35 GMT" }, { "version": "v4", "created": "Wed, 29 Jan 2014 20:08:17 GMT" } ]
2014-01-30T00:00:00
[ [ "Elgohary", "Ahmed", "" ], [ "Farahat", "Ahmed K.", "" ], [ "Kamel", "Mohamed S.", "" ], [ "Karray", "Fakhri", "" ] ]
TITLE: Embed and Conquer: Scalable Embeddings for Kernel k-Means on MapReduce ABSTRACT: The kernel $k$-means is an effective method for data clustering which extends the commonly-used $k$-means algorithm to work on a similarity matrix over complex data structures. The kernel $k$-means algorithm is however computationally very complex as it requires the complete data matrix to be calculated and stored. Further, the kernelized nature of the kernel $k$-means algorithm hinders the parallelization of its computations on modern infrastructures for distributed computing. In this paper, we are defining a family of kernel-based low-dimensional embeddings that allows for scaling kernel $k$-means on MapReduce via an efficient and unified parallelization strategy. Afterwards, we propose two methods for low-dimensional embedding that adhere to our definition of the embedding family. Exploiting the proposed parallelization strategy, we present two scalable MapReduce algorithms for kernel $k$-means. We demonstrate the effectiveness and efficiency of the proposed algorithms through an empirical evaluation on benchmark data sets.
1401.1974
Vu Nguyen
Vu Nguyen, Dinh Phung, XuanLong Nguyen, Svetha Venkatesh, Hung Hai Bui
Bayesian Nonparametric Multilevel Clustering with Group-Level Contexts
Full version of ICML 2014
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a Bayesian nonparametric framework for multilevel clustering which utilizes group-level context information to simultaneously discover low-dimensional structures of the group contents and partitions groups into clusters. Using the Dirichlet process as the building block, our model constructs a product base-measure with a nested structure to accommodate content and context observations at multiple levels. The proposed model possesses properties that link the nested Dirichlet processes (nDP) and the Dirichlet process mixture models (DPM) in an interesting way: integrating out all contents results in the DPM over contexts, whereas integrating out group-specific contexts results in the nDP mixture over content variables. We provide a Polya-urn view of the model and an efficient collapsed Gibbs inference procedure. Extensive experiments on real-world datasets demonstrate the advantage of utilizing context information via our model in both text and image domains.
[ { "version": "v1", "created": "Thu, 9 Jan 2014 12:08:07 GMT" }, { "version": "v2", "created": "Mon, 13 Jan 2014 06:28:03 GMT" }, { "version": "v3", "created": "Mon, 27 Jan 2014 08:13:58 GMT" }, { "version": "v4", "created": "Wed, 29 Jan 2014 01:54:57 GMT" } ]
2014-01-30T00:00:00
[ [ "Nguyen", "Vu", "" ], [ "Phung", "Dinh", "" ], [ "Nguyen", "XuanLong", "" ], [ "Venkatesh", "Svetha", "" ], [ "Bui", "Hung Hai", "" ] ]
TITLE: Bayesian Nonparametric Multilevel Clustering with Group-Level Contexts ABSTRACT: We present a Bayesian nonparametric framework for multilevel clustering which utilizes group-level context information to simultaneously discover low-dimensional structures of the group contents and partitions groups into clusters. Using the Dirichlet process as the building block, our model constructs a product base-measure with a nested structure to accommodate content and context observations at multiple levels. The proposed model possesses properties that link the nested Dirichlet processes (nDP) and the Dirichlet process mixture models (DPM) in an interesting way: integrating out all contents results in the DPM over contexts, whereas integrating out group-specific contexts results in the nDP mixture over content variables. We provide a Polya-urn view of the model and an efficient collapsed Gibbs inference procedure. Extensive experiments on real-world datasets demonstrate the advantage of utilizing context information via our model in both text and image domains.
1401.7494
Johannes Hofmann
Johannes Hofmann, Jan Treibig, Georg Hager, Gerhard Wellein
Comparing the Performance of Different x86 SIMD Instruction Sets for a Medical Imaging Application on Modern Multi- and Manycore Chips
arXiv admin note: text overlap with arXiv:1401.3615
null
10.1145/2568058.2568068
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Single Instruction, Multiple Data (SIMD) vectorization is a major driver of performance in current architectures, and is mandatory for achieving good performance with codes that are limited by instruction throughput. We investigate the efficiency of different SIMD-vectorized implementations of the RabbitCT benchmark. RabbitCT performs 3D image reconstruction by back projection, a vital operation in computed tomography applications. The underlying algorithm is a challenge for vectorization because it consists, apart from a streaming part, also of a bilinear interpolation requiring scattered access to image data. We analyze the performance of SSE (128 bit), AVX (256 bit), AVX2 (256 bit), and IMCI (512 bit) implementations on recent Intel x86 systems. A special emphasis is put on the vector gather implementation on Intel Haswell and Knights Corner microarchitectures. Finally we discuss why GPU implementations perform much better for this specific algorithm.
[ { "version": "v1", "created": "Wed, 29 Jan 2014 12:41:44 GMT" } ]
2014-01-30T00:00:00
[ [ "Hofmann", "Johannes", "" ], [ "Treibig", "Jan", "" ], [ "Hager", "Georg", "" ], [ "Wellein", "Gerhard", "" ] ]
TITLE: Comparing the Performance of Different x86 SIMD Instruction Sets for a Medical Imaging Application on Modern Multi- and Manycore Chips ABSTRACT: Single Instruction, Multiple Data (SIMD) vectorization is a major driver of performance in current architectures, and is mandatory for achieving good performance with codes that are limited by instruction throughput. We investigate the efficiency of different SIMD-vectorized implementations of the RabbitCT benchmark. RabbitCT performs 3D image reconstruction by back projection, a vital operation in computed tomography applications. The underlying algorithm is a challenge for vectorization because it consists, apart from a streaming part, also of a bilinear interpolation requiring scattered access to image data. We analyze the performance of SSE (128 bit), AVX (256 bit), AVX2 (256 bit), and IMCI (512 bit) implementations on recent Intel x86 systems. A special emphasis is put on the vector gather implementation on Intel Haswell and Knights Corner microarchitectures. Finally we discuss why GPU implementations perform much better for this specific algorithm.
1207.7253
S\'ebastien Gigu\`ere
S\'ebastien Gigu\`ere, Mario Marchand, Fran\c{c}ois Laviolette, Alexandre Drouin and Jacques Corbeil
Learning a peptide-protein binding affinity predictor with kernel ridge regression
22 pages, 4 figures, 5 tables
BMC Bioinformatics 2013, 14:82
10.1186/1471-2105-14-82
null
q-bio.QM cs.LG q-bio.BM stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a specialized string kernel for small bio-molecules, peptides and pseudo-sequences of binding interfaces. The kernel incorporates physico-chemical properties of amino acids and elegantly generalize eight kernels, such as the Oligo, the Weighted Degree, the Blended Spectrum, and the Radial Basis Function. We provide a low complexity dynamic programming algorithm for the exact computation of the kernel and a linear time algorithm for it's approximation. Combined with kernel ridge regression and SupCK, a novel binding pocket kernel, the proposed kernel yields biologically relevant and good prediction accuracy on the PepX database. For the first time, a machine learning predictor is capable of accurately predicting the binding affinity of any peptide to any protein. The method was also applied to both single-target and pan-specific Major Histocompatibility Complex class II benchmark datasets and three Quantitative Structure Affinity Model benchmark datasets. On all benchmarks, our method significantly (p-value < 0.057) outperforms the current state-of-the-art methods at predicting peptide-protein binding affinities. The proposed approach is flexible and can be applied to predict any quantitative biological activity. The method should be of value to a large segment of the research community with the potential to accelerate peptide-based drug and vaccine development.
[ { "version": "v1", "created": "Tue, 31 Jul 2012 14:11:31 GMT" } ]
2014-01-29T00:00:00
[ [ "Giguère", "Sébastien", "" ], [ "Marchand", "Mario", "" ], [ "Laviolette", "François", "" ], [ "Drouin", "Alexandre", "" ], [ "Corbeil", "Jacques", "" ] ]
TITLE: Learning a peptide-protein binding affinity predictor with kernel ridge regression ABSTRACT: We propose a specialized string kernel for small bio-molecules, peptides and pseudo-sequences of binding interfaces. The kernel incorporates physico-chemical properties of amino acids and elegantly generalize eight kernels, such as the Oligo, the Weighted Degree, the Blended Spectrum, and the Radial Basis Function. We provide a low complexity dynamic programming algorithm for the exact computation of the kernel and a linear time algorithm for it's approximation. Combined with kernel ridge regression and SupCK, a novel binding pocket kernel, the proposed kernel yields biologically relevant and good prediction accuracy on the PepX database. For the first time, a machine learning predictor is capable of accurately predicting the binding affinity of any peptide to any protein. The method was also applied to both single-target and pan-specific Major Histocompatibility Complex class II benchmark datasets and three Quantitative Structure Affinity Model benchmark datasets. On all benchmarks, our method significantly (p-value < 0.057) outperforms the current state-of-the-art methods at predicting peptide-protein binding affinities. The proposed approach is flexible and can be applied to predict any quantitative biological activity. The method should be of value to a large segment of the research community with the potential to accelerate peptide-based drug and vaccine development.
1212.0695
Emanuele Frandi
Emanuele Frandi, Ricardo Nanculef, Maria Grazia Gasparo, Stefano Lodi, Claudio Sartori
Training Support Vector Machines Using Frank-Wolfe Optimization Methods
null
International Journal on Pattern Recognition and Artificial Intelligence, 27(3), 2013
10.1142/S0218001413600033
null
cs.LG cs.CV math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Training a Support Vector Machine (SVM) requires the solution of a quadratic programming problem (QP) whose computational complexity becomes prohibitively expensive for large scale datasets. Traditional optimization methods cannot be directly applied in these cases, mainly due to memory restrictions. By adopting a slightly different objective function and under mild conditions on the kernel used within the model, efficient algorithms to train SVMs have been devised under the name of Core Vector Machines (CVMs). This framework exploits the equivalence of the resulting learning problem with the task of building a Minimal Enclosing Ball (MEB) problem in a feature space, where data is implicitly embedded by a kernel function. In this paper, we improve on the CVM approach by proposing two novel methods to build SVMs based on the Frank-Wolfe algorithm, recently revisited as a fast method to approximate the solution of a MEB problem. In contrast to CVMs, our algorithms do not require to compute the solutions of a sequence of increasingly complex QPs and are defined by using only analytic optimization steps. Experiments on a large collection of datasets show that our methods scale better than CVMs in most cases, sometimes at the price of a slightly lower accuracy. As CVMs, the proposed methods can be easily extended to machine learning problems other than binary classification. However, effective classifiers are also obtained using kernels which do not satisfy the condition required by CVMs and can thus be used for a wider set of problems.
[ { "version": "v1", "created": "Tue, 4 Dec 2012 12:05:31 GMT" } ]
2014-01-29T00:00:00
[ [ "Frandi", "Emanuele", "" ], [ "Nanculef", "Ricardo", "" ], [ "Gasparo", "Maria Grazia", "" ], [ "Lodi", "Stefano", "" ], [ "Sartori", "Claudio", "" ] ]
TITLE: Training Support Vector Machines Using Frank-Wolfe Optimization Methods ABSTRACT: Training a Support Vector Machine (SVM) requires the solution of a quadratic programming problem (QP) whose computational complexity becomes prohibitively expensive for large scale datasets. Traditional optimization methods cannot be directly applied in these cases, mainly due to memory restrictions. By adopting a slightly different objective function and under mild conditions on the kernel used within the model, efficient algorithms to train SVMs have been devised under the name of Core Vector Machines (CVMs). This framework exploits the equivalence of the resulting learning problem with the task of building a Minimal Enclosing Ball (MEB) problem in a feature space, where data is implicitly embedded by a kernel function. In this paper, we improve on the CVM approach by proposing two novel methods to build SVMs based on the Frank-Wolfe algorithm, recently revisited as a fast method to approximate the solution of a MEB problem. In contrast to CVMs, our algorithms do not require to compute the solutions of a sequence of increasingly complex QPs and are defined by using only analytic optimization steps. Experiments on a large collection of datasets show that our methods scale better than CVMs in most cases, sometimes at the price of a slightly lower accuracy. As CVMs, the proposed methods can be easily extended to machine learning problems other than binary classification. However, effective classifiers are also obtained using kernels which do not satisfy the condition required by CVMs and can thus be used for a wider set of problems.
1307.7838
Sang Yeob Jung
Sang Yeob Jung, Seung Min Yu, and Seong-Lyun Kim
Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services
null
null
null
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.
[ { "version": "v1", "created": "Tue, 30 Jul 2013 06:51:02 GMT" }, { "version": "v2", "created": "Sat, 25 Jan 2014 13:10:14 GMT" } ]
2014-01-28T00:00:00
[ [ "Jung", "Sang Yeob", "" ], [ "Yu", "Seung Min", "" ], [ "Kim", "Seong-Lyun", "" ] ]
TITLE: Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services ABSTRACT: We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.
1312.6597
Luis Marujo
Luis Marujo, Anatole Gershman, Jaime Carbonell, David Martins de Matos, Jo\~ao P. Neto
Co-Multistage of Multiple Classifiers for Imbalanced Multiclass Learning
Preliminary version of the paper
null
null
null
cs.LG cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose two stochastic architectural models (CMC and CMC-M) with two layers of classifiers applicable to datasets with one and multiple skewed classes. This distinction becomes important when the datasets have a large number of classes. Therefore, we present a novel solution to imbalanced multiclass learning with several skewed majority classes, which improves minority classes identification. This fact is particularly important for text classification tasks, such as event detection. Our models combined with pre-processing sampling techniques improved the classification results on six well-known datasets. Finally, we have also introduced a new metric SG-Mean to overcome the multiplication by zero limitation of G-Mean.
[ { "version": "v1", "created": "Mon, 23 Dec 2013 16:52:56 GMT" }, { "version": "v2", "created": "Fri, 24 Jan 2014 23:09:17 GMT" } ]
2014-01-28T00:00:00
[ [ "Marujo", "Luis", "" ], [ "Gershman", "Anatole", "" ], [ "Carbonell", "Jaime", "" ], [ "de Matos", "David Martins", "" ], [ "Neto", "João P.", "" ] ]
TITLE: Co-Multistage of Multiple Classifiers for Imbalanced Multiclass Learning ABSTRACT: In this work, we propose two stochastic architectural models (CMC and CMC-M) with two layers of classifiers applicable to datasets with one and multiple skewed classes. This distinction becomes important when the datasets have a large number of classes. Therefore, we present a novel solution to imbalanced multiclass learning with several skewed majority classes, which improves minority classes identification. This fact is particularly important for text classification tasks, such as event detection. Our models combined with pre-processing sampling techniques improved the classification results on six well-known datasets. Finally, we have also introduced a new metric SG-Mean to overcome the multiplication by zero limitation of G-Mean.
1401.6484
Kiran Sree Pokkuluri Prof
Pokkuluri Kiran Sree, Inampudi Ramesh Babu
Identification of Protein Coding Regions in Genomic DNA Using Unsupervised FMACA Based Pattern Classifier
arXiv admin note: text overlap with arXiv:1312.2642
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008,305-310
null
null
cs.CE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Genes carry the instructions for making proteins that are found in a cell as a specific sequence of nucleotides that are found in DNA molecules. But, the regions of these genes that code for proteins may occupy only a small region of the sequence. Identifying the coding regions play a vital role in understanding these genes. In this paper we propose a unsupervised Fuzzy Multiple Attractor Cellular Automata (FMCA) based pattern classifier to identify the coding region of a DNA sequence. We propose a distinct K-Means algorithm for designing FMACA classifier which is simple, efficient and produces more accurate classifier than that has previously been obtained for a range of different sequence lengths. Experimental results confirm the scalability of the proposed Unsupervised FCA based classifier to handle large volume of datasets irrespective of the number of classes, tuples and attributes. Good classification accuracy has been established.
[ { "version": "v1", "created": "Sat, 25 Jan 2014 01:48:14 GMT" } ]
2014-01-28T00:00:00
[ [ "Sree", "Pokkuluri Kiran", "" ], [ "Babu", "Inampudi Ramesh", "" ] ]
TITLE: Identification of Protein Coding Regions in Genomic DNA Using Unsupervised FMACA Based Pattern Classifier ABSTRACT: Genes carry the instructions for making proteins that are found in a cell as a specific sequence of nucleotides that are found in DNA molecules. But, the regions of these genes that code for proteins may occupy only a small region of the sequence. Identifying the coding regions play a vital role in understanding these genes. In this paper we propose a unsupervised Fuzzy Multiple Attractor Cellular Automata (FMCA) based pattern classifier to identify the coding region of a DNA sequence. We propose a distinct K-Means algorithm for designing FMACA classifier which is simple, efficient and produces more accurate classifier than that has previously been obtained for a range of different sequence lengths. Experimental results confirm the scalability of the proposed Unsupervised FCA based classifier to handle large volume of datasets irrespective of the number of classes, tuples and attributes. Good classification accuracy has been established.
1401.6571
Shibamouli Lahiri
Shibamouli Lahiri, Sagnik Ray Choudhury, Cornelia Caragea
Keyword and Keyphrase Extraction Using Centrality Measures on Collocation Networks
11 pages
null
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Keyword and keyphrase extraction is an important problem in natural language processing, with applications ranging from summarization to semantic search to document clustering. Graph-based approaches to keyword and keyphrase extraction avoid the problem of acquiring a large in-domain training corpus by applying variants of PageRank algorithm on a network of words. Although graph-based approaches are knowledge-lean and easily adoptable in online systems, it remains largely open whether they can benefit from centrality measures other than PageRank. In this paper, we experiment with an array of centrality measures on word and noun phrase collocation networks, and analyze their performance on four benchmark datasets. Not only are there centrality measures that perform as well as or better than PageRank, but they are much simpler (e.g., degree, strength, and neighborhood size). Furthermore, centrality-based methods give results that are competitive with and, in some cases, better than two strong unsupervised baselines.
[ { "version": "v1", "created": "Sat, 25 Jan 2014 19:05:45 GMT" } ]
2014-01-28T00:00:00
[ [ "Lahiri", "Shibamouli", "" ], [ "Choudhury", "Sagnik Ray", "" ], [ "Caragea", "Cornelia", "" ] ]
TITLE: Keyword and Keyphrase Extraction Using Centrality Measures on Collocation Networks ABSTRACT: Keyword and keyphrase extraction is an important problem in natural language processing, with applications ranging from summarization to semantic search to document clustering. Graph-based approaches to keyword and keyphrase extraction avoid the problem of acquiring a large in-domain training corpus by applying variants of PageRank algorithm on a network of words. Although graph-based approaches are knowledge-lean and easily adoptable in online systems, it remains largely open whether they can benefit from centrality measures other than PageRank. In this paper, we experiment with an array of centrality measures on word and noun phrase collocation networks, and analyze their performance on four benchmark datasets. Not only are there centrality measures that perform as well as or better than PageRank, but they are much simpler (e.g., degree, strength, and neighborhood size). Furthermore, centrality-based methods give results that are competitive with and, in some cases, better than two strong unsupervised baselines.
1401.6597
Sadi Seker E
Sadi Evren Seker, Y. Unal, Z. Erdem, and H. Erdinc Kocer
Ensembled Correlation Between Liver Analysis Outputs
null
International Journal of Biology and Biomedical Engineering, ISSN: 1998-4510, Volume 8, pp. 1-5, 2014
null
null
stat.ML cs.CE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data mining techniques on the biological analysis are spreading for most of the areas including the health care and medical information. We have applied the data mining techniques, such as KNN, SVM, MLP or decision trees over a unique dataset, which is collected from 16,380 analysis results for a year. Furthermore we have also used meta-classifiers to question the increased correlation rate between the liver disorder and the liver analysis outputs. The results show that there is a correlation among ALT, AST, Billirubin Direct and Billirubin Total down to 15% of error rate. Also the correlation coefficient is up to 94%. This makes possible to predict the analysis results from each other or disease patterns can be applied over the linear correlation of the parameters.
[ { "version": "v1", "created": "Sat, 25 Jan 2014 23:52:37 GMT" } ]
2014-01-28T00:00:00
[ [ "Seker", "Sadi Evren", "" ], [ "Unal", "Y.", "" ], [ "Erdem", "Z.", "" ], [ "Kocer", "H. Erdinc", "" ] ]
TITLE: Ensembled Correlation Between Liver Analysis Outputs ABSTRACT: Data mining techniques on the biological analysis are spreading for most of the areas including the health care and medical information. We have applied the data mining techniques, such as KNN, SVM, MLP or decision trees over a unique dataset, which is collected from 16,380 analysis results for a year. Furthermore we have also used meta-classifiers to question the increased correlation rate between the liver disorder and the liver analysis outputs. The results show that there is a correlation among ALT, AST, Billirubin Direct and Billirubin Total down to 15% of error rate. Also the correlation coefficient is up to 94%. This makes possible to predict the analysis results from each other or disease patterns can be applied over the linear correlation of the parameters.
1401.6726
Earlence T Fernandes
Earlence Fernandes, Alexander Crowell, Ajit Aluri and Atul Prakash
Anception: Application Virtualization For Android
University of Michigan, Technical Report CSE-TR-583-13
null
null
CSE-TR-583-13
cs.CR cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant chal- lenge for several reasons: (1) graphics performance is important due to popularity of games and (2) applications with the same UID can share state. This paper presents Anception, the first flexible application virtualization framework for Android. It is imple- mented as a modification to the Android kernel and supports application virtualization that addresses the above requirements. Anception is able to confine many types of malware while supporting unmodified Android applications. Our Anception- based system exhibits up to 3.9% overhead on various 2D/3D benchmarks, and 1.8% overhead on the SunSpider benchmark.
[ { "version": "v1", "created": "Mon, 27 Jan 2014 03:01:33 GMT" } ]
2014-01-28T00:00:00
[ [ "Fernandes", "Earlence", "" ], [ "Crowell", "Alexander", "" ], [ "Aluri", "Ajit", "" ], [ "Prakash", "Atul", "" ] ]
TITLE: Anception: Application Virtualization For Android ABSTRACT: The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant chal- lenge for several reasons: (1) graphics performance is important due to popularity of games and (2) applications with the same UID can share state. This paper presents Anception, the first flexible application virtualization framework for Android. It is imple- mented as a modification to the Android kernel and supports application virtualization that addresses the above requirements. Anception is able to confine many types of malware while supporting unmodified Android applications. Our Anception- based system exhibits up to 3.9% overhead on various 2D/3D benchmarks, and 1.8% overhead on the SunSpider benchmark.
1401.6891
Gabriela Csurka
Gabriela Csurka and Julien Ah-Pine and St\'ephane Clinchant
Unsupervised Visual and Textual Information Fusion in Multimedia Retrieval - A Graph-based Point of View
An extended version of the paper: Visual and Textual Information Fusion in Multimedia Retrieval using Semantic Filtering and Graph based Methods, by J. Ah-Pine, G. Csurka and S. Clinchant, submitted to ACM Transactions on Information Systems
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multimedia collections are more than ever growing in size and diversity. Effective multimedia retrieval systems are thus critical to access these datasets from the end-user perspective and in a scalable way. We are interested in repositories of image/text multimedia objects and we study multimodal information fusion techniques in the context of content based multimedia information retrieval. We focus on graph based methods which have proven to provide state-of-the-art performances. We particularly examine two of such methods : cross-media similarities and random walk based scores. From a theoretical viewpoint, we propose a unifying graph based framework which encompasses the two aforementioned approaches. Our proposal allows us to highlight the core features one should consider when using a graph based technique for the combination of visual and textual information. We compare cross-media and random walk based results using three different real-world datasets. From a practical standpoint, our extended empirical analysis allow us to provide insights and guidelines about the use of graph based methods for multimodal information fusion in content based multimedia information retrieval.
[ { "version": "v1", "created": "Mon, 27 Jan 2014 15:29:14 GMT" } ]
2014-01-28T00:00:00
[ [ "Csurka", "Gabriela", "" ], [ "Ah-Pine", "Julien", "" ], [ "Clinchant", "Stéphane", "" ] ]
TITLE: Unsupervised Visual and Textual Information Fusion in Multimedia Retrieval - A Graph-based Point of View ABSTRACT: Multimedia collections are more than ever growing in size and diversity. Effective multimedia retrieval systems are thus critical to access these datasets from the end-user perspective and in a scalable way. We are interested in repositories of image/text multimedia objects and we study multimodal information fusion techniques in the context of content based multimedia information retrieval. We focus on graph based methods which have proven to provide state-of-the-art performances. We particularly examine two of such methods : cross-media similarities and random walk based scores. From a theoretical viewpoint, we propose a unifying graph based framework which encompasses the two aforementioned approaches. Our proposal allows us to highlight the core features one should consider when using a graph based technique for the combination of visual and textual information. We compare cross-media and random walk based results using three different real-world datasets. From a practical standpoint, our extended empirical analysis allow us to provide insights and guidelines about the use of graph based methods for multimodal information fusion in content based multimedia information retrieval.
1401.6984
Yajie Miao
Yajie Miao
Kaldi+PDNN: Building DNN-based ASR Systems with Kaldi and PDNN
unpublished manuscript
null
null
null
cs.LG cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
The Kaldi toolkit is becoming popular for constructing automated speech recognition (ASR) systems. Meanwhile, in recent years, deep neural networks (DNNs) have shown state-of-the-art performance on various ASR tasks. This document describes our open-source recipes to implement fully-fledged DNN acoustic modeling using Kaldi and PDNN. PDNN is a lightweight deep learning toolkit developed under the Theano environment. Using these recipes, we can build up multiple systems including DNN hybrid systems, convolutional neural network (CNN) systems and bottleneck feature systems. These recipes are directly based on the Kaldi Switchboard 110-hour setup. However, adapting them to new datasets is easy to achieve.
[ { "version": "v1", "created": "Mon, 27 Jan 2014 19:55:34 GMT" } ]
2014-01-28T00:00:00
[ [ "Miao", "Yajie", "" ] ]
TITLE: Kaldi+PDNN: Building DNN-based ASR Systems with Kaldi and PDNN ABSTRACT: The Kaldi toolkit is becoming popular for constructing automated speech recognition (ASR) systems. Meanwhile, in recent years, deep neural networks (DNNs) have shown state-of-the-art performance on various ASR tasks. This document describes our open-source recipes to implement fully-fledged DNN acoustic modeling using Kaldi and PDNN. PDNN is a lightweight deep learning toolkit developed under the Theano environment. Using these recipes, we can build up multiple systems including DNN hybrid systems, convolutional neural network (CNN) systems and bottleneck feature systems. These recipes are directly based on the Kaldi Switchboard 110-hour setup. However, adapting them to new datasets is easy to achieve.