id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1303.6485 | James Pallister | James Pallister, Simon Hollis, Jeremy Bennett | Identifying Compiler Options to Minimise Energy Consumption for Embedded
Platforms | 14 pages, 7 figures | null | 10.1093/comjnl/bxt129 | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an analysis of the energy consumption of an extensive
number of the optimisations a modern compiler can perform. Using GCC as a test
case, we evaluate a set of ten carefully selected benchmarks for five different
embedded platforms.
A fractional factorial design is used to systematically explore the large
optimisation space (2^82 possible combinations), whilst still accurately
determining the effects of optimisations and optimisation combinations.
Hardware power measurements on each platform are taken to ensure all
architectural effects on the energy consumption are captured.
We show that fractional factorial design can find more optimal combinations
than relying on built in compiler settings. We explore the relationship between
run-time and energy consumption, and identify scenarios where they are and are
not correlated.
A further conclusion of this study is the structure of the benchmark has a
larger effect than the hardware architecture on whether the optimisation will
be effective, and that no single optimisation is universally beneficial for
execution time or energy consumption.
| [
{
"version": "v1",
"created": "Tue, 26 Mar 2013 13:31:34 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Aug 2013 15:14:26 GMT"
}
] | 2014-01-27T00:00:00 | [
[
"Pallister",
"James",
""
],
[
"Hollis",
"Simon",
""
],
[
"Bennett",
"Jeremy",
""
]
] | TITLE: Identifying Compiler Options to Minimise Energy Consumption for Embedded
Platforms
ABSTRACT: This paper presents an analysis of the energy consumption of an extensive
number of the optimisations a modern compiler can perform. Using GCC as a test
case, we evaluate a set of ten carefully selected benchmarks for five different
embedded platforms.
A fractional factorial design is used to systematically explore the large
optimisation space (2^82 possible combinations), whilst still accurately
determining the effects of optimisations and optimisation combinations.
Hardware power measurements on each platform are taken to ensure all
architectural effects on the energy consumption are captured.
We show that fractional factorial design can find more optimal combinations
than relying on built in compiler settings. We explore the relationship between
run-time and energy consumption, and identify scenarios where they are and are
not correlated.
A further conclusion of this study is the structure of the benchmark has a
larger effect than the hardware architecture on whether the optimisation will
be effective, and that no single optimisation is universally beneficial for
execution time or energy consumption.
|
1401.6404 | Ankit Sharma | Ankit Sharma, Jaideep Srivastava and Abhishek Chandra | Predicting Multi-actor collaborations using Hypergraphs | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social networks are now ubiquitous and most of them contain interactions
involving multiple actors (groups) like author collaborations, teams or emails
in an organizations, etc. Hypergraphs are natural structures to effectively
capture multi-actor interactions which conventional dyadic graphs fail to
capture. In this work the problem of predicting collaborations is addressed
while modeling the collaboration network as a hypergraph network. The problem
of predicting future multi-actor collaboration is mapped to hyperedge
prediction problem. Given that the higher order edge prediction is an
inherently hard problem, in this work we restrict to the task of predicting
edges (collaborations) that have already been observed in past. In this work,
we propose a novel use of hyperincidence temporal tensors to capture time
varying hypergraphs and provides a tensor decomposition based prediction
algorithm. We quantitatively compare the performance of the hypergraphs based
approach with the conventional dyadic graph based approach. Our hypothesis that
hypergraphs preserve the information that simple graphs destroy is corroborated
by experiments using author collaboration network from the DBLP dataset. Our
results demonstrate the strength of hypergraph based approach to predict higher
order collaborations (size>4) which is very difficult using dyadic graph based
approach. Moreover, while predicting collaborations of size>2 hypergraphs in
most cases provide better results with an average increase of approx. 45% in
F-Score for different sizes = {3,4,5,6,7}.
| [
{
"version": "v1",
"created": "Fri, 24 Jan 2014 17:10:16 GMT"
}
] | 2014-01-27T00:00:00 | [
[
"Sharma",
"Ankit",
""
],
[
"Srivastava",
"Jaideep",
""
],
[
"Chandra",
"Abhishek",
""
]
] | TITLE: Predicting Multi-actor collaborations using Hypergraphs
ABSTRACT: Social networks are now ubiquitous and most of them contain interactions
involving multiple actors (groups) like author collaborations, teams or emails
in an organizations, etc. Hypergraphs are natural structures to effectively
capture multi-actor interactions which conventional dyadic graphs fail to
capture. In this work the problem of predicting collaborations is addressed
while modeling the collaboration network as a hypergraph network. The problem
of predicting future multi-actor collaboration is mapped to hyperedge
prediction problem. Given that the higher order edge prediction is an
inherently hard problem, in this work we restrict to the task of predicting
edges (collaborations) that have already been observed in past. In this work,
we propose a novel use of hyperincidence temporal tensors to capture time
varying hypergraphs and provides a tensor decomposition based prediction
algorithm. We quantitatively compare the performance of the hypergraphs based
approach with the conventional dyadic graph based approach. Our hypothesis that
hypergraphs preserve the information that simple graphs destroy is corroborated
by experiments using author collaboration network from the DBLP dataset. Our
results demonstrate the strength of hypergraph based approach to predict higher
order collaborations (size>4) which is very difficult using dyadic graph based
approach. Moreover, while predicting collaborations of size>2 hypergraphs in
most cases provide better results with an average increase of approx. 45% in
F-Score for different sizes = {3,4,5,6,7}.
|
1401.6124 | Fabricio de Franca Olivetti | Fabricio Olivetti de Franca | Iterative Universal Hash Function Generator for Minhashing | 6 pages, 4 tables, 1 algorithm | null | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Minhashing is a technique used to estimate the Jaccard Index between two sets
by exploiting the probability of collision in a random permutation. In order to
speed up the computation, a random permutation can be approximated by using an
universal hash function such as the $h_{a,b}$ function proposed by Carter and
Wegman. A better estimate of the Jaccard Index can be achieved by using many of
these hash functions, created at random. In this paper a new iterative
procedure to generate a set of $h_{a,b}$ functions is devised that eliminates
the need for a list of random values and avoid the multiplication operation
during the calculation. The properties of the generated hash functions remains
that of an universal hash function family. This is possible due to the random
nature of features occurrence on sparse datasets. Results show that the
uniformity of hashing the features is maintaned while obtaining a speed up of
up to $1.38$ compared to the traditional approach.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2014 19:03:38 GMT"
}
] | 2014-01-25T00:00:00 | [
[
"de Franca",
"Fabricio Olivetti",
""
]
] | TITLE: Iterative Universal Hash Function Generator for Minhashing
ABSTRACT: Minhashing is a technique used to estimate the Jaccard Index between two sets
by exploiting the probability of collision in a random permutation. In order to
speed up the computation, a random permutation can be approximated by using an
universal hash function such as the $h_{a,b}$ function proposed by Carter and
Wegman. A better estimate of the Jaccard Index can be achieved by using many of
these hash functions, created at random. In this paper a new iterative
procedure to generate a set of $h_{a,b}$ functions is devised that eliminates
the need for a list of random values and avoid the multiplication operation
during the calculation. The properties of the generated hash functions remains
that of an universal hash function family. This is possible due to the random
nature of features occurrence on sparse datasets. Results show that the
uniformity of hashing the features is maintaned while obtaining a speed up of
up to $1.38$ compared to the traditional approach.
|
1401.5808 | Zahra Pourbahman | Zahra Pourbahman and Ali Hamzeh | Reducing the Computational Cost in Multi-objective Evolutionary
Algorithms by Filtering Worthless Individuals | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The large number of exact fitness function evaluations makes evolutionary
algorithms to have computational cost. In some real-world problems, reducing
number of these evaluations is much more valuable even by increasing
computational complexity and spending more time. To fulfill this target, we
introduce an effective factor, in spite of applied factor in Adaptive Fuzzy
Fitness Granulation with Non-dominated Sorting Genetic Algorithm-II, to filter
out worthless individuals more precisely. Our proposed approach is compared
with respect to Adaptive Fuzzy Fitness Granulation with Non-dominated Sorting
Genetic Algorithm-II, using the Hyper volume and the Inverted Generational
Distance performance measures. The proposed method is applied to 1 traditional
and 1 state-of-the-art benchmarks with considering 3 different dimensions. From
an average performance view, the results indicate that although decreasing the
number of fitness evaluations leads to have performance reduction but it is not
tangible compared to what we gain.
| [
{
"version": "v1",
"created": "Thu, 2 Jan 2014 10:28:53 GMT"
}
] | 2014-01-24T00:00:00 | [
[
"Pourbahman",
"Zahra",
""
],
[
"Hamzeh",
"Ali",
""
]
] | TITLE: Reducing the Computational Cost in Multi-objective Evolutionary
Algorithms by Filtering Worthless Individuals
ABSTRACT: The large number of exact fitness function evaluations makes evolutionary
algorithms to have computational cost. In some real-world problems, reducing
number of these evaluations is much more valuable even by increasing
computational complexity and spending more time. To fulfill this target, we
introduce an effective factor, in spite of applied factor in Adaptive Fuzzy
Fitness Granulation with Non-dominated Sorting Genetic Algorithm-II, to filter
out worthless individuals more precisely. Our proposed approach is compared
with respect to Adaptive Fuzzy Fitness Granulation with Non-dominated Sorting
Genetic Algorithm-II, using the Hyper volume and the Inverted Generational
Distance performance measures. The proposed method is applied to 1 traditional
and 1 state-of-the-art benchmarks with considering 3 different dimensions. From
an average performance view, the results indicate that although decreasing the
number of fitness evaluations leads to have performance reduction but it is not
tangible compared to what we gain.
|
1401.5814 | Johannes Schneider | Johannes Schneider and Michail Vlachos | On Randomly Projected Hierarchical Clustering with Guarantees | This version contains the conference paper "On Randomly Projected
Hierarchical Clustering with Guarantees'', SIAM International Conference on
Data Mining (SDM), 2014 and, additionally, proofs omitted in the conference
version | null | null | null | cs.IR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hierarchical clustering (HC) algorithms are generally limited to small data
instances due to their runtime costs. Here we mitigate this shortcoming and
explore fast HC algorithms based on random projections for single (SLC) and
average (ALC) linkage clustering as well as for the minimum spanning tree
problem (MST). We present a thorough adaptive analysis of our algorithms that
improve prior work from $O(N^2)$ by up to a factor of $N/(\log N)^2$ for a
dataset of $N$ points in Euclidean space. The algorithms maintain, with
arbitrary high probability, the outcome of hierarchical clustering as well as
the worst-case running-time guarantees. We also present parameter-free
instances of our algorithms.
| [
{
"version": "v1",
"created": "Wed, 22 Jan 2014 22:01:05 GMT"
}
] | 2014-01-24T00:00:00 | [
[
"Schneider",
"Johannes",
""
],
[
"Vlachos",
"Michail",
""
]
] | TITLE: On Randomly Projected Hierarchical Clustering with Guarantees
ABSTRACT: Hierarchical clustering (HC) algorithms are generally limited to small data
instances due to their runtime costs. Here we mitigate this shortcoming and
explore fast HC algorithms based on random projections for single (SLC) and
average (ALC) linkage clustering as well as for the minimum spanning tree
problem (MST). We present a thorough adaptive analysis of our algorithms that
improve prior work from $O(N^2)$ by up to a factor of $N/(\log N)^2$ for a
dataset of $N$ points in Euclidean space. The algorithms maintain, with
arbitrary high probability, the outcome of hierarchical clustering as well as
the worst-case running-time guarantees. We also present parameter-free
instances of our algorithms.
|
1401.5857 | Amanda J. Coles | Amanda J. Coles, Andrew I. Coles, Maria Fox, Derek Long | COLIN: Planning with Continuous Linear Numeric Change | null | Journal Of Artificial Intelligence Research, Volume 44, pages
1-96, 2012 | 10.1613/jair.3608 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe COLIN, a forward-chaining heuristic search planner,
capable of reasoning with COntinuous LINear numeric change, in addition to the
full temporal semantics of PDDL. Through this work we make two advances to the
state-of-the-art in terms of expressive reasoning capabilities of planners: the
handling of continuous linear change, and the handling of duration-dependent
effects in combination with duration inequalities, both of which require
tightly coupled temporal and numeric reasoning during planning. COLIN combines
FF-style forward chaining search, with the use of a Linear Program (LP) to
check the consistency of the interacting temporal and numeric constraints at
each state. The LP is used to compute bounds on the values of variables in each
state, reducing the range of actions that need to be considered for
application. In addition, we develop an extension of the Temporal Relaxed
Planning Graph heuristic of CRIKEY3, to support reasoning directly with
continuous change. We extend the range of task variables considered to be
suitable candidates for specifying the gradient of the continuous numeric
change effected by an action. Finally, we explore the potential for employing
mixed integer programming as a tool for optimising the timestamps of the
actions in the plan, once a solution has been found. To support this, we
further contribute a selection of extended benchmark domains that include
continuous numeric effects. We present results for COLIN that demonstrate its
scalability on a range of benchmarks, and compare to existing state-of-the-art
planners.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2014 02:46:26 GMT"
}
] | 2014-01-24T00:00:00 | [
[
"Coles",
"Amanda J.",
""
],
[
"Coles",
"Andrew I.",
""
],
[
"Fox",
"Maria",
""
],
[
"Long",
"Derek",
""
]
] | TITLE: COLIN: Planning with Continuous Linear Numeric Change
ABSTRACT: In this paper we describe COLIN, a forward-chaining heuristic search planner,
capable of reasoning with COntinuous LINear numeric change, in addition to the
full temporal semantics of PDDL. Through this work we make two advances to the
state-of-the-art in terms of expressive reasoning capabilities of planners: the
handling of continuous linear change, and the handling of duration-dependent
effects in combination with duration inequalities, both of which require
tightly coupled temporal and numeric reasoning during planning. COLIN combines
FF-style forward chaining search, with the use of a Linear Program (LP) to
check the consistency of the interacting temporal and numeric constraints at
each state. The LP is used to compute bounds on the values of variables in each
state, reducing the range of actions that need to be considered for
application. In addition, we develop an extension of the Temporal Relaxed
Planning Graph heuristic of CRIKEY3, to support reasoning directly with
continuous change. We extend the range of task variables considered to be
suitable candidates for specifying the gradient of the continuous numeric
change effected by an action. Finally, we explore the potential for employing
mixed integer programming as a tool for optimising the timestamps of the
actions in the plan, once a solution has been found. To support this, we
further contribute a selection of extended benchmark domains that include
continuous numeric effects. We present results for COLIN that demonstrate its
scalability on a range of benchmarks, and compare to existing state-of-the-art
planners.
|
1401.5869 | Zizhen Zhang | Zizhen Zhang, Hu Qin, Xiaocong Liang, Andrew Lim | An Enhanced Branch-and-bound Algorithm for the Talent Scheduling Problem | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The talent scheduling problem is a simplified version of the real-world film
shooting problem, which aims to determine a shooting sequence so as to minimize
the total cost of the actors involved. In this article, we first formulate the
problem as an integer linear programming model. Next, we devise a
branch-and-bound algorithm to solve the problem. The branch-and-bound algorithm
is enhanced by several accelerating techniques, including preprocessing,
dominance rules and caching search states. Extensive experiments over two sets
of benchmark instances suggest that our algorithm is superior to the current
best exact algorithm. Finally, the impacts of different parameter settings are
disclosed by some additional experiments.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2014 04:09:45 GMT"
}
] | 2014-01-24T00:00:00 | [
[
"Zhang",
"Zizhen",
""
],
[
"Qin",
"Hu",
""
],
[
"Liang",
"Xiaocong",
""
],
[
"Lim",
"Andrew",
""
]
] | TITLE: An Enhanced Branch-and-bound Algorithm for the Talent Scheduling Problem
ABSTRACT: The talent scheduling problem is a simplified version of the real-world film
shooting problem, which aims to determine a shooting sequence so as to minimize
the total cost of the actors involved. In this article, we first formulate the
problem as an integer linear programming model. Next, we devise a
branch-and-bound algorithm to solve the problem. The branch-and-bound algorithm
is enhanced by several accelerating techniques, including preprocessing,
dominance rules and caching search states. Extensive experiments over two sets
of benchmark instances suggest that our algorithm is superior to the current
best exact algorithm. Finally, the impacts of different parameter settings are
disclosed by some additional experiments.
|
1401.6048 | Ronen I. Brafman | Ronen I. Brafman, Guy Shani | Replanning in Domains with Partial Information and Sensing Actions | null | Journal Of Artificial Intelligence Research, Volume 45, pages
565-600, 2012 | 10.1613/jair.3711 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Replanning via determinization is a recent, popular approach for online
planning in MDPs. In this paper we adapt this idea to classical, non-stochastic
domains with partial information and sensing actions, presenting a new planner:
SDR (Sample, Determinize, Replan). At each step we generate a solution plan to
a classical planning problem induced by the original problem. We execute this
plan as long as it is safe to do so. When this is no longer the case, we
replan. The classical planning problem we generate is based on the
translation-based approach for conformant planning introduced by Palacios and
Geffner. The state of the classical planning problem generated in this approach
captures the belief state of the agent in the original problem. Unfortunately,
when this method is applied to planning problems with sensing, it yields a
non-deterministic planning problem that is typically very large. Our main
contribution is the introduction of state sampling techniques for overcoming
these two problems. In addition, we introduce a novel, lazy, regression-based
method for querying the agents belief state during run-time. We provide a
comprehensive experimental evaluation of the planner, showing that it scales
better than the state-of-the-art CLG planner on existing benchmark problems,
but also highlighting its weaknesses with new domains. We also discuss its
theoretical guarantees.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2014 16:44:51 GMT"
}
] | 2014-01-24T00:00:00 | [
[
"Brafman",
"Ronen I.",
""
],
[
"Shani",
"Guy",
""
]
] | TITLE: Replanning in Domains with Partial Information and Sensing Actions
ABSTRACT: Replanning via determinization is a recent, popular approach for online
planning in MDPs. In this paper we adapt this idea to classical, non-stochastic
domains with partial information and sensing actions, presenting a new planner:
SDR (Sample, Determinize, Replan). At each step we generate a solution plan to
a classical planning problem induced by the original problem. We execute this
plan as long as it is safe to do so. When this is no longer the case, we
replan. The classical planning problem we generate is based on the
translation-based approach for conformant planning introduced by Palacios and
Geffner. The state of the classical planning problem generated in this approach
captures the belief state of the agent in the original problem. Unfortunately,
when this method is applied to planning problems with sensing, it yields a
non-deterministic planning problem that is typically very large. Our main
contribution is the introduction of state sampling techniques for overcoming
these two problems. In addition, we introduce a novel, lazy, regression-based
method for querying the agents belief state during run-time. We provide a
comprehensive experimental evaluation of the planner, showing that it scales
better than the state-of-the-art CLG planner on existing benchmark problems,
but also highlighting its weaknesses with new domains. We also discuss its
theoretical guarantees.
|
1401.6049 | Richard Hoshino | Richard Hoshino, Ken-ichi Kawarabayashi | Generating Approximate Solutions to the TTP using a Linear Distance
Relaxation | null | Journal Of Artificial Intelligence Research, Volume 45, pages
257-286, 2012 | 10.1613/jair.3713 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In some domestic professional sports leagues, the home stadiums are located
in cities connected by a common train line running in one direction. For these
instances, we can incorporate this geographical information to determine
optimal or nearly-optimal solutions to the n-team Traveling Tournament Problem
(TTP), an NP-hard sports scheduling problem whose solution is a double
round-robin tournament schedule that minimizes the sum total of distances
traveled by all n teams. We introduce the Linear Distance Traveling Tournament
Problem (LD-TTP), and solve it for n=4 and n=6, generating the complete set of
possible solutions through elementary combinatorial techniques. For larger n,
we propose a novel "expander construction" that generates an approximate
solution to the LD-TTP. For n congruent to 4 modulo 6, we show that our
expander construction produces a feasible double round-robin tournament
schedule whose total distance is guaranteed to be no worse than 4/3 times the
optimal solution, regardless of where the n teams are located. This
4/3-approximation for the LD-TTP is stronger than the currently best-known
ratio of 5/3 + epsilon for the general TTP. We conclude the paper by applying
this linear distance relaxation to general (non-linear) n-team TTP instances,
where we develop fast approximate solutions by simply "assuming" the n teams
lie on a straight line and solving the modified problem. We show that this
technique surprisingly generates the distance-optimal tournament on all
benchmark sets on 6 teams, as well as close-to-optimal schedules for larger n,
even when the teams are located around a circle or positioned in
three-dimensional space.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2014 16:45:07 GMT"
}
] | 2014-01-24T00:00:00 | [
[
"Hoshino",
"Richard",
""
],
[
"Kawarabayashi",
"Ken-ichi",
""
]
] | TITLE: Generating Approximate Solutions to the TTP using a Linear Distance
Relaxation
ABSTRACT: In some domestic professional sports leagues, the home stadiums are located
in cities connected by a common train line running in one direction. For these
instances, we can incorporate this geographical information to determine
optimal or nearly-optimal solutions to the n-team Traveling Tournament Problem
(TTP), an NP-hard sports scheduling problem whose solution is a double
round-robin tournament schedule that minimizes the sum total of distances
traveled by all n teams. We introduce the Linear Distance Traveling Tournament
Problem (LD-TTP), and solve it for n=4 and n=6, generating the complete set of
possible solutions through elementary combinatorial techniques. For larger n,
we propose a novel "expander construction" that generates an approximate
solution to the LD-TTP. For n congruent to 4 modulo 6, we show that our
expander construction produces a feasible double round-robin tournament
schedule whose total distance is guaranteed to be no worse than 4/3 times the
optimal solution, regardless of where the n teams are located. This
4/3-approximation for the LD-TTP is stronger than the currently best-known
ratio of 5/3 + epsilon for the general TTP. We conclude the paper by applying
this linear distance relaxation to general (non-linear) n-team TTP instances,
where we develop fast approximate solutions by simply "assuming" the n teams
lie on a straight line and solving the modified problem. We show that this
technique surprisingly generates the distance-optimal tournament on all
benchmark sets on 6 teams, as well as close-to-optimal schedules for larger n,
even when the teams are located around a circle or positioned in
three-dimensional space.
|
1301.1218 | Matteo Riondato | Matteo Riondato and Fabio Vandin | Finding the True Frequent Itemsets | 13 pages, Extended version of work appeared in SIAM International
Conference on Data Mining, 2014 | null | null | null | cs.LG cs.DB cs.DS stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Frequent Itemsets (FIs) mining is a fundamental primitive in data mining. It
requires to identify all itemsets appearing in at least a fraction $\theta$ of
a transactional dataset $\mathcal{D}$. Often though, the ultimate goal of
mining $\mathcal{D}$ is not an analysis of the dataset \emph{per se}, but the
understanding of the underlying process that generated it. Specifically, in
many applications $\mathcal{D}$ is a collection of samples obtained from an
unknown probability distribution $\pi$ on transactions, and by extracting the
FIs in $\mathcal{D}$ one attempts to infer itemsets that are frequently (i.e.,
with probability at least $\theta$) generated by $\pi$, which we call the True
Frequent Itemsets (TFIs). Due to the inherently stochastic nature of the
generative process, the set of FIs is only a rough approximation of the set of
TFIs, as it often contains a huge number of \emph{false positives}, i.e.,
spurious itemsets that are not among the TFIs. In this work we design and
analyze an algorithm to identify a threshold $\hat{\theta}$ such that the
collection of itemsets with frequency at least $\hat{\theta}$ in $\mathcal{D}$
contains only TFIs with probability at least $1-\delta$, for some
user-specified $\delta$. Our method uses results from statistical learning
theory involving the (empirical) VC-dimension of the problem at hand. This
allows us to identify almost all the TFIs without including any false positive.
We also experimentally compare our method with the direct mining of
$\mathcal{D}$ at frequency $\theta$ and with techniques based on widely-used
standard bounds (i.e., the Chernoff bounds) of the binomial distribution, and
show that our algorithm outperforms these methods and achieves even better
results than what is guaranteed by the theoretical analysis.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2013 15:04:43 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Apr 2013 12:54:12 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Jan 2014 16:38:44 GMT"
}
] | 2014-01-23T00:00:00 | [
[
"Riondato",
"Matteo",
""
],
[
"Vandin",
"Fabio",
""
]
] | TITLE: Finding the True Frequent Itemsets
ABSTRACT: Frequent Itemsets (FIs) mining is a fundamental primitive in data mining. It
requires to identify all itemsets appearing in at least a fraction $\theta$ of
a transactional dataset $\mathcal{D}$. Often though, the ultimate goal of
mining $\mathcal{D}$ is not an analysis of the dataset \emph{per se}, but the
understanding of the underlying process that generated it. Specifically, in
many applications $\mathcal{D}$ is a collection of samples obtained from an
unknown probability distribution $\pi$ on transactions, and by extracting the
FIs in $\mathcal{D}$ one attempts to infer itemsets that are frequently (i.e.,
with probability at least $\theta$) generated by $\pi$, which we call the True
Frequent Itemsets (TFIs). Due to the inherently stochastic nature of the
generative process, the set of FIs is only a rough approximation of the set of
TFIs, as it often contains a huge number of \emph{false positives}, i.e.,
spurious itemsets that are not among the TFIs. In this work we design and
analyze an algorithm to identify a threshold $\hat{\theta}$ such that the
collection of itemsets with frequency at least $\hat{\theta}$ in $\mathcal{D}$
contains only TFIs with probability at least $1-\delta$, for some
user-specified $\delta$. Our method uses results from statistical learning
theory involving the (empirical) VC-dimension of the problem at hand. This
allows us to identify almost all the TFIs without including any false positive.
We also experimentally compare our method with the direct mining of
$\mathcal{D}$ at frequency $\theta$ and with techniques based on widely-used
standard bounds (i.e., the Chernoff bounds) of the binomial distribution, and
show that our algorithm outperforms these methods and achieves even better
results than what is guaranteed by the theoretical analysis.
|
1401.5632 | Manoj Krishnaswamy | Manoj Krishnaswamy, G. Hemantha Kumar | Enhancing Template Security of Face Biometrics by Using Edge Detection
and Hashing | 11 pages, 13 figures, Journal. arXiv admin note: text overlap with
arXiv:1307.7474 by other authors | International Journal of Information Processing, 7(4), 11-20,
2013, ISSN : 0973-8215 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we address the issues of using edge detection techniques on
facial images to produce cancellable biometric templates and a novel method for
template verification against tampering. With increasing use of biometrics,
there is a real threat for the conventional systems using face databases, which
store images of users in raw and unaltered form. If compromised not only it is
irrevocable, but can be misused for cross-matching across different databases.
So it is desirable to generate and store revocable templates for the same user
in different applications to prevent cross-matching and to enhance security,
while maintaining privacy and ethics. By comparing different edge detection
methods it has been observed that the edge detection based on the Roberts Cross
operator performs consistently well across multiple face datasets, in which the
face images have been taken under a variety of conditions. We have proposed a
novel scheme using hashing, for extra verification, in order to harden the
security of the stored biometric templates.
| [
{
"version": "v1",
"created": "Wed, 22 Jan 2014 11:50:08 GMT"
}
] | 2014-01-23T00:00:00 | [
[
"Krishnaswamy",
"Manoj",
""
],
[
"Kumar",
"G. Hemantha",
""
]
] | TITLE: Enhancing Template Security of Face Biometrics by Using Edge Detection
and Hashing
ABSTRACT: In this paper we address the issues of using edge detection techniques on
facial images to produce cancellable biometric templates and a novel method for
template verification against tampering. With increasing use of biometrics,
there is a real threat for the conventional systems using face databases, which
store images of users in raw and unaltered form. If compromised not only it is
irrevocable, but can be misused for cross-matching across different databases.
So it is desirable to generate and store revocable templates for the same user
in different applications to prevent cross-matching and to enhance security,
while maintaining privacy and ethics. By comparing different edge detection
methods it has been observed that the edge detection based on the Roberts Cross
operator performs consistently well across multiple face datasets, in which the
face images have been taken under a variety of conditions. We have proposed a
novel scheme using hashing, for extra verification, in order to harden the
security of the stored biometric templates.
|
1401.5644 | Issam Sahmoudi issam sahmoudi | Issam Sahmoudi and Hanane Froud and Abdelmonaime Lachkar | A new keyphrases extraction method based on suffix tree data structure
for arabic documents clustering | 17 pages, 3 figures | International Journal of Database Management Systems ( IJDMS )
Vol.5, No.6, December 2013 | 10.5121/ijdms.2013.5602 | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Document Clustering is a branch of a larger area of scientific study known as
data mining .which is an unsupervised classification using to find a structure
in a collection of unlabeled data. The useful information in the documents can
be accompanied by a large amount of noise words when using Full Text
Representation, and therefore will affect negatively the result of the
clustering process. So it is with great need to eliminate the noise words and
keeping just the useful information in order to enhance the quality of the
clustering results. This problem occurs with different degree for any language
such as English, European, Hindi, Chinese, and Arabic Language. To overcome
this problem, in this paper, we propose a new and efficient Keyphrases
extraction method based on the Suffix Tree data structure (KpST), the extracted
Keyphrases are then used in the clustering process instead of Full Text
Representation. The proposed method for Keyphrases extraction is language
independent and therefore it may be applied to any language. In this
investigation, we are interested to deal with the Arabic language which is one
of the most complex languages. To evaluate our method, we conduct an
experimental study on Arabic Documents using the most popular Clustering
approach of Hierarchical algorithms: Agglomerative Hierarchical algorithm with
seven linkage techniques and a variety of distance functions and similarity
measures to perform Arabic Document Clustering task. The obtained results show
that our method for extracting Keyphrases increases the quality of the
clustering results. We propose also to study the effect of using the stemming
for the testing dataset to cluster it with the same documents clustering
techniques and similarity/distance measures.
| [
{
"version": "v1",
"created": "Wed, 22 Jan 2014 12:36:38 GMT"
}
] | 2014-01-23T00:00:00 | [
[
"Sahmoudi",
"Issam",
""
],
[
"Froud",
"Hanane",
""
],
[
"Lachkar",
"Abdelmonaime",
""
]
] | TITLE: A new keyphrases extraction method based on suffix tree data structure
for arabic documents clustering
ABSTRACT: Document Clustering is a branch of a larger area of scientific study known as
data mining .which is an unsupervised classification using to find a structure
in a collection of unlabeled data. The useful information in the documents can
be accompanied by a large amount of noise words when using Full Text
Representation, and therefore will affect negatively the result of the
clustering process. So it is with great need to eliminate the noise words and
keeping just the useful information in order to enhance the quality of the
clustering results. This problem occurs with different degree for any language
such as English, European, Hindi, Chinese, and Arabic Language. To overcome
this problem, in this paper, we propose a new and efficient Keyphrases
extraction method based on the Suffix Tree data structure (KpST), the extracted
Keyphrases are then used in the clustering process instead of Full Text
Representation. The proposed method for Keyphrases extraction is language
independent and therefore it may be applied to any language. In this
investigation, we are interested to deal with the Arabic language which is one
of the most complex languages. To evaluate our method, we conduct an
experimental study on Arabic Documents using the most popular Clustering
approach of Hierarchical algorithms: Agglomerative Hierarchical algorithm with
seven linkage techniques and a variety of distance functions and similarity
measures to perform Arabic Document Clustering task. The obtained results show
that our method for extracting Keyphrases increases the quality of the
clustering results. We propose also to study the effect of using the stemming
for the testing dataset to cluster it with the same documents clustering
techniques and similarity/distance measures.
|
1401.5686 | Ayman Bahaa-Eldin | Ayman M. Bahaa-Eldin, Hoda K. Mohamead, Sally S. Deraz | Increasing Server Availability for Overall System Security: A Preventive
Maintenance Approach Based on Failure Prediction | arXiv admin note: text overlap with arXiv:1206.1534 by other authors | Ain Shams Journal of Electrical Engineering (ASJEE), Volume 1,
Issue 2, pp 135-143 (2009) | null | null | cs.DC cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Server Availability (SA) is an important measure of overall systems security.
Important security systems rely on the availability of their hosting servers to
deliver critical security services. Many of these servers offer management
interface through web mainly using an Apache server. This paper investigates
the increase of Server Availability by the use of Artificial Neural Networks
(ANN) to predict software aging phenomenon. Several resource usage data is
collected and analyzed on a typical long-running software system (a web
server). A Multi-Layer Perceptron feed forward Artificial Neural Network was
trained on an Apache web server data-set to predict future server resource
exhaustion through uni-variate time series forecasting. The results were
benchmarked against those obtained from non-parametric statistical techniques,
parametric time series models and empirical modeling techniques reported in the
literature.
| [
{
"version": "v1",
"created": "Tue, 21 Jan 2014 10:13:25 GMT"
}
] | 2014-01-23T00:00:00 | [
[
"Bahaa-Eldin",
"Ayman M.",
""
],
[
"Mohamead",
"Hoda K.",
""
],
[
"Deraz",
"Sally S.",
""
]
] | TITLE: Increasing Server Availability for Overall System Security: A Preventive
Maintenance Approach Based on Failure Prediction
ABSTRACT: Server Availability (SA) is an important measure of overall systems security.
Important security systems rely on the availability of their hosting servers to
deliver critical security services. Many of these servers offer management
interface through web mainly using an Apache server. This paper investigates
the increase of Server Availability by the use of Artificial Neural Networks
(ANN) to predict software aging phenomenon. Several resource usage data is
collected and analyzed on a typical long-running software system (a web
server). A Multi-Layer Perceptron feed forward Artificial Neural Network was
trained on an Apache web server data-set to predict future server resource
exhaustion through uni-variate time series forecasting. The results were
benchmarked against those obtained from non-parametric statistical techniques,
parametric time series models and empirical modeling techniques reported in the
literature.
|
1401.5741 | Peter Pollner | Gergely Tib\'ely, P\'eter Pollner, Tam\'as Vicsek, Gergely Palla | Extracting tag hierarchies | 25 pages with 21 pages of supporting information, 25 figures | PLoS ONE 8, e84133 (2013) | 10.1371/journal.pone.0084133 | null | cs.IR cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tagging items with descriptive annotations or keywords is a very natural way
to compress and highlight information about the properties of the given entity.
Over the years several methods have been proposed for extracting a hierarchy
between the tags for systems with a "flat", egalitarian organization of the
tags, which is very common when the tags correspond to free words given by
numerous independent people. Here we present a complete framework for automated
tag hierarchy extraction based on tag occurrence statistics. Along with
proposing new algorithms, we are also introducing different quality measures
enabling the detailed comparison of competing approaches from different
aspects. Furthermore, we set up a synthetic, computer generated benchmark
providing a versatile tool for testing, with a couple of tunable parameters
capable of generating a wide range of test beds. Beside the computer generated
input we also use real data in our studies, including a biological example with
a pre-defined hierarchy between the tags. The encouraging similarity between
the pre-defined and reconstructed hierarchy, as well as the seemingly
meaningful hierarchies obtained for other real systems indicate that tag
hierarchy extraction is a very promising direction for further research with a
great potential for practical applications.
| [
{
"version": "v1",
"created": "Wed, 22 Jan 2014 17:52:11 GMT"
}
] | 2014-01-23T00:00:00 | [
[
"Tibély",
"Gergely",
""
],
[
"Pollner",
"Péter",
""
],
[
"Vicsek",
"Tamás",
""
],
[
"Palla",
"Gergely",
""
]
] | TITLE: Extracting tag hierarchies
ABSTRACT: Tagging items with descriptive annotations or keywords is a very natural way
to compress and highlight information about the properties of the given entity.
Over the years several methods have been proposed for extracting a hierarchy
between the tags for systems with a "flat", egalitarian organization of the
tags, which is very common when the tags correspond to free words given by
numerous independent people. Here we present a complete framework for automated
tag hierarchy extraction based on tag occurrence statistics. Along with
proposing new algorithms, we are also introducing different quality measures
enabling the detailed comparison of competing approaches from different
aspects. Furthermore, we set up a synthetic, computer generated benchmark
providing a versatile tool for testing, with a couple of tunable parameters
capable of generating a wide range of test beds. Beside the computer generated
input we also use real data in our studies, including a biological example with
a pre-defined hierarchy between the tags. The encouraging similarity between
the pre-defined and reconstructed hierarchy, as well as the seemingly
meaningful hierarchies obtained for other real systems indicate that tag
hierarchy extraction is a very promising direction for further research with a
great potential for practical applications.
|
1401.5367 | Roberto Lopez-Herrejon | Roberto E. Lopez-Herrejon, Javier Ferrer, Francisco Chicano, Evelyn
Nicole Haslinger, Alexander Egyed, Enrique Alba | Towards a Benchmark and a Comparison Framework for Combinatorial
Interaction Testing of Software Product Lines | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As Software Product Lines (SPLs) are becoming a more pervasive development
practice, their effective testing is becoming a more important concern. In the
past few years many SPL testing approaches have been proposed, among them, are
those that support Combinatorial Interaction Testing (CIT) whose premise is to
select a group of products where faults, due to feature interactions, are more
likely to occur. Many CIT techniques for SPL testing have been put forward;
however, no systematic and comprehensive comparison among them has been
performed. To achieve such goal two items are important: a common benchmark of
feature models, and an adequate comparison framework. In this
research-in-progress paper, we propose 19 feature models as the base of a
benchmark, which we apply to three different techniques in order to analyze the
comparison framework proposed by Perrouin et al. We identify the shortcomings
of this framework and elaborate alternatives for further study.
| [
{
"version": "v1",
"created": "Tue, 21 Jan 2014 16:20:24 GMT"
}
] | 2014-01-22T00:00:00 | [
[
"Lopez-Herrejon",
"Roberto E.",
""
],
[
"Ferrer",
"Javier",
""
],
[
"Chicano",
"Francisco",
""
],
[
"Haslinger",
"Evelyn Nicole",
""
],
[
"Egyed",
"Alexander",
""
],
[
"Alba",
"Enrique",
""
]
] | TITLE: Towards a Benchmark and a Comparison Framework for Combinatorial
Interaction Testing of Software Product Lines
ABSTRACT: As Software Product Lines (SPLs) are becoming a more pervasive development
practice, their effective testing is becoming a more important concern. In the
past few years many SPL testing approaches have been proposed, among them, are
those that support Combinatorial Interaction Testing (CIT) whose premise is to
select a group of products where faults, due to feature interactions, are more
likely to occur. Many CIT techniques for SPL testing have been put forward;
however, no systematic and comprehensive comparison among them has been
performed. To achieve such goal two items are important: a common benchmark of
feature models, and an adequate comparison framework. In this
research-in-progress paper, we propose 19 feature models as the base of a
benchmark, which we apply to three different techniques in order to analyze the
comparison framework proposed by Perrouin et al. We identify the shortcomings
of this framework and elaborate alternatives for further study.
|
1401.5389 | Sajib Dasgupta | Sajib Dasgupta, Vincent Ng | Which Clustering Do You Want? Inducing Your Ideal Clustering with
Minimal Feedback | null | Journal Of Artificial Intelligence Research, Volume 39, pages
581-632, 2010 | 10.1613/jair.3003 | null | cs.IR cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While traditional research on text clustering has largely focused on grouping
documents by topic, it is conceivable that a user may want to cluster documents
along other dimensions, such as the authors mood, gender, age, or sentiment.
Without knowing the users intention, a clustering algorithm will only group
documents along the most prominent dimension, which may not be the one the user
desires. To address the problem of clustering documents along the user-desired
dimension, previous work has focused on learning a similarity metric from data
manually annotated with the users intention or having a human construct a
feature space in an interactive manner during the clustering process. With the
goal of reducing reliance on human knowledge for fine-tuning the similarity
function or selecting the relevant features required by these approaches, we
propose a novel active clustering algorithm, which allows a user to easily
select the dimension along which she wants to cluster the documents by
inspecting only a small number of words. We demonstrate the viability of our
algorithm on a variety of commonly-used sentiment datasets.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 04:56:03 GMT"
}
] | 2014-01-22T00:00:00 | [
[
"Dasgupta",
"Sajib",
""
],
[
"Ng",
"Vincent",
""
]
] | TITLE: Which Clustering Do You Want? Inducing Your Ideal Clustering with
Minimal Feedback
ABSTRACT: While traditional research on text clustering has largely focused on grouping
documents by topic, it is conceivable that a user may want to cluster documents
along other dimensions, such as the authors mood, gender, age, or sentiment.
Without knowing the users intention, a clustering algorithm will only group
documents along the most prominent dimension, which may not be the one the user
desires. To address the problem of clustering documents along the user-desired
dimension, previous work has focused on learning a similarity metric from data
manually annotated with the users intention or having a human construct a
feature space in an interactive manner during the clustering process. With the
goal of reducing reliance on human knowledge for fine-tuning the similarity
function or selecting the relevant features required by these approaches, we
propose a novel active clustering algorithm, which allows a user to easily
select the dimension along which she wants to cluster the documents by
inspecting only a small number of words. We demonstrate the viability of our
algorithm on a variety of commonly-used sentiment datasets.
|
1401.5407 | Thanuka Wickramarathne | J Xu, TL Wickramarathne, EK Grey, K Steinhaeuser, R Keller, J Drake, N
Chawla and DM Lodge | Patterns of Ship-borne Species Spread: A Clustering Approach for Risk
Assessment and Management of Non-indigenous Species Spread | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The spread of non-indigenous species (NIS) through the global shipping
network (GSN) has enormous ecological and economic cost throughout the world.
Previous attempts at quantifying NIS invasions have mostly taken "bottom-up"
approaches that eventually require the use of multiple simplifying assumptions
due to insufficiency and/or uncertainty of available data. By modeling implicit
species exchanges via a graph abstraction that we refer to as the Species Flow
Network (SFN), a different approach that exploits the power of network science
methods in extracting knowledge from largely incomplete data is presented.
Here, coarse-grained species flow dynamics are studied via a graph clustering
approach that decomposes the SFN to clusters of ports and inter-cluster
connections. With this decomposition of ports in place, NIS flow among clusters
can be very efficiently reduced by enforcing NIS management on a few chosen
inter-cluster connections. Furthermore, efficient NIS management strategy for
species exchanges within a cluster (often difficult due higher rate of travel
and pathways) are then derived in conjunction with ecological and environmental
aspects that govern the species establishment. The benefits of the presented
approach include robustness to data uncertainties, implicit incorporation of
"stepping-stone" spread of invasive species, and decoupling of species spread
and establishment risk estimation. Our analysis of a multi-year (1997--2006)
GSN dataset using the presented approach shows the existence of a few large
clusters of ports with higher intra-cluster species flow that are fairly stable
over time. Furthermore, detailed investigations were carried out on vessel
types, ports, and inter-cluster connections. Finally, our observations are
discussed in the context of known NIS invasions and future research directions
are also presented.
| [
{
"version": "v1",
"created": "Tue, 21 Jan 2014 18:13:57 GMT"
}
] | 2014-01-22T00:00:00 | [
[
"Xu",
"J",
""
],
[
"Wickramarathne",
"TL",
""
],
[
"Grey",
"EK",
""
],
[
"Steinhaeuser",
"K",
""
],
[
"Keller",
"R",
""
],
[
"Drake",
"J",
""
],
[
"Chawla",
"N",
""
],
[
"Lodge",
"DM",
""
]
] | TITLE: Patterns of Ship-borne Species Spread: A Clustering Approach for Risk
Assessment and Management of Non-indigenous Species Spread
ABSTRACT: The spread of non-indigenous species (NIS) through the global shipping
network (GSN) has enormous ecological and economic cost throughout the world.
Previous attempts at quantifying NIS invasions have mostly taken "bottom-up"
approaches that eventually require the use of multiple simplifying assumptions
due to insufficiency and/or uncertainty of available data. By modeling implicit
species exchanges via a graph abstraction that we refer to as the Species Flow
Network (SFN), a different approach that exploits the power of network science
methods in extracting knowledge from largely incomplete data is presented.
Here, coarse-grained species flow dynamics are studied via a graph clustering
approach that decomposes the SFN to clusters of ports and inter-cluster
connections. With this decomposition of ports in place, NIS flow among clusters
can be very efficiently reduced by enforcing NIS management on a few chosen
inter-cluster connections. Furthermore, efficient NIS management strategy for
species exchanges within a cluster (often difficult due higher rate of travel
and pathways) are then derived in conjunction with ecological and environmental
aspects that govern the species establishment. The benefits of the presented
approach include robustness to data uncertainties, implicit incorporation of
"stepping-stone" spread of invasive species, and decoupling of species spread
and establishment risk estimation. Our analysis of a multi-year (1997--2006)
GSN dataset using the presented approach shows the existence of a few large
clusters of ports with higher intra-cluster species flow that are fairly stable
over time. Furthermore, detailed investigations were carried out on vessel
types, ports, and inter-cluster connections. Finally, our observations are
discussed in the context of known NIS invasions and future research directions
are also presented.
|
1401.4601 | Gilles Pesant | Gilles Pesant, Claude-Guy Quimper, Alessandro Zanarini | Counting-Based Search: Branching Heuristics for Constraint Satisfaction
Problems | null | Journal Of Artificial Intelligence Research, Volume 43, pages
173-210, 2012 | 10.1613/jair.3463 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Designing a search heuristic for constraint programming that is reliable
across problem domains has been an important research topic in recent years.
This paper concentrates on one family of candidates: counting-based search.
Such heuristics seek to make branching decisions that preserve most of the
solutions by determining what proportion of solutions to each individual
constraint agree with that decision. Whereas most generic search heuristics in
constraint programming rely on local information at the level of the individual
variable, our search heuristics are based on more global information at the
constraint level. We design several algorithms that are used to count the
number of solutions to specific families of constraints and propose some search
heuristics exploiting such information. The experimental part of the paper
considers eight problem domains ranging from well-established benchmark puzzles
to rostering and sport scheduling. An initial empirical analysis identifies
heuristic maxSD as a robust candidate among our proposals.eWe then evaluate the
latter against the state of the art, including the latest generic search
heuristics, restarts, and discrepancy-based tree traversals. Experimental
results show that counting-based search generally outperforms other generic
heuristics.
| [
{
"version": "v1",
"created": "Sat, 18 Jan 2014 21:09:25 GMT"
}
] | 2014-01-21T00:00:00 | [
[
"Pesant",
"Gilles",
""
],
[
"Quimper",
"Claude-Guy",
""
],
[
"Zanarini",
"Alessandro",
""
]
] | TITLE: Counting-Based Search: Branching Heuristics for Constraint Satisfaction
Problems
ABSTRACT: Designing a search heuristic for constraint programming that is reliable
across problem domains has been an important research topic in recent years.
This paper concentrates on one family of candidates: counting-based search.
Such heuristics seek to make branching decisions that preserve most of the
solutions by determining what proportion of solutions to each individual
constraint agree with that decision. Whereas most generic search heuristics in
constraint programming rely on local information at the level of the individual
variable, our search heuristics are based on more global information at the
constraint level. We design several algorithms that are used to count the
number of solutions to specific families of constraints and propose some search
heuristics exploiting such information. The experimental part of the paper
considers eight problem domains ranging from well-established benchmark puzzles
to rostering and sport scheduling. An initial empirical analysis identifies
heuristic maxSD as a robust candidate among our proposals.eWe then evaluate the
latter against the state of the art, including the latest generic search
heuristics, restarts, and discrepancy-based tree traversals. Experimental
results show that counting-based search generally outperforms other generic
heuristics.
|
1401.4605 | J.H.M. Lee | J.H.M. Lee, Ka Lun Leung | Consistency Techniques for Flow-Based Projection-Safe Global Cost
Functions in Weighted Constraint Satisfaction | null | Journal Of Artificial Intelligence Research, Volume 43, pages
257-292, 2012 | 10.1613/jair.3476 | null | cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many combinatorial problems deal with preferences and violations, the goal of
which is to find solutions with the minimum cost. Weighted constraint
satisfaction is a framework for modeling such problems, which consists of a set
of cost functions to measure the degree of violation or preferences of
different combinations of variable assignments. Typical solution methods for
weighted constraint satisfaction problems (WCSPs) are based on branch-and-bound
search, which are made practical through the use of powerful consistency
techniques such as AC*, FDAC*, EDAC* to deduce hidden cost information and
value pruning during search. These techniques, however, are designed to be
efficient only on binary and ternary cost functions which are represented in
table form. In tackling many real-life problems, high arity (or global) cost
functions are required. We investigate efficient representation scheme and
algorithms to bring the benefits of the consistency techniques to also high
arity cost functions, which are often derived from hard global constraints from
classical constraint satisfaction. The literature suggests some global cost
functions can be represented as flow networks, and the minimum cost flow
algorithm can be used to compute the minimum costs of such networks in
polynomial time. We show that naive adoption of this flow-based algorithmic
method for global cost functions can result in a stronger form of null-inverse
consistency. We further show how the method can be modified to handle cost
projections and extensions to maintain generalized versions of AC* and FDAC*
for cost functions with more than two variables. Similar generalization for the
stronger EDAC* is less straightforward. We reveal the oscillation problem when
enforcing EDAC* on cost functions sharing more than one variable. To avoid
oscillation, we propose a weak version of EDAC* and generalize it to weak
EDGAC* for non-binary cost functions. Using various benchmarks involving the
soft variants of hard global constraints ALLDIFFERENT, GCC, SAME, and REGULAR,
empirical results demonstrate that our proposal gives improvements of up to an
order of magnitude when compared with the traditional constraint optimization
approach, both in terms of time and pruning.
| [
{
"version": "v1",
"created": "Sat, 18 Jan 2014 21:10:22 GMT"
}
] | 2014-01-21T00:00:00 | [
[
"Lee",
"J. H. M.",
""
],
[
"Leung",
"Ka Lun",
""
]
] | TITLE: Consistency Techniques for Flow-Based Projection-Safe Global Cost
Functions in Weighted Constraint Satisfaction
ABSTRACT: Many combinatorial problems deal with preferences and violations, the goal of
which is to find solutions with the minimum cost. Weighted constraint
satisfaction is a framework for modeling such problems, which consists of a set
of cost functions to measure the degree of violation or preferences of
different combinations of variable assignments. Typical solution methods for
weighted constraint satisfaction problems (WCSPs) are based on branch-and-bound
search, which are made practical through the use of powerful consistency
techniques such as AC*, FDAC*, EDAC* to deduce hidden cost information and
value pruning during search. These techniques, however, are designed to be
efficient only on binary and ternary cost functions which are represented in
table form. In tackling many real-life problems, high arity (or global) cost
functions are required. We investigate efficient representation scheme and
algorithms to bring the benefits of the consistency techniques to also high
arity cost functions, which are often derived from hard global constraints from
classical constraint satisfaction. The literature suggests some global cost
functions can be represented as flow networks, and the minimum cost flow
algorithm can be used to compute the minimum costs of such networks in
polynomial time. We show that naive adoption of this flow-based algorithmic
method for global cost functions can result in a stronger form of null-inverse
consistency. We further show how the method can be modified to handle cost
projections and extensions to maintain generalized versions of AC* and FDAC*
for cost functions with more than two variables. Similar generalization for the
stronger EDAC* is less straightforward. We reveal the oscillation problem when
enforcing EDAC* on cost functions sharing more than one variable. To avoid
oscillation, we propose a weak version of EDAC* and generalize it to weak
EDGAC* for non-binary cost functions. Using various benchmarks involving the
soft variants of hard global constraints ALLDIFFERENT, GCC, SAME, and REGULAR,
empirical results demonstrate that our proposal gives improvements of up to an
order of magnitude when compared with the traditional constraint optimization
approach, both in terms of time and pruning.
|
1401.4606 | Patrick Raymond Conrad | Patrick Raymond Conrad, Brian Williams | Drake: An Efficient Executive for Temporal Plans with Choice | null | Journal Of Artificial Intelligence Research, Volume 42, pages
607-659, 2011 | 10.1613/jair.3478 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work presents Drake, a dynamic executive for temporal plans with choice.
Dynamic plan execution strategies allow an autonomous agent to react quickly to
unfolding events, improving the robustness of the agent. Prior work developed
methods for dynamically dispatching Simple Temporal Networks, and further
research enriched the expressiveness of the plans executives could handle,
including discrete choices, which are the focus of this work. However, in some
approaches to date, these additional choices induce significant storage or
latency requirements to make flexible execution possible.
Drake is designed to leverage the low latency made possible by a
preprocessing step called compilation, while avoiding high memory costs through
a compact representation. We leverage the concepts of labels and environments,
taken from prior work in Assumption-based Truth Maintenance Systems (ATMS), to
concisely record the implications of the discrete choices, exploiting the
structure of the plan to avoid redundant reasoning or storage. Our labeling and
maintenance scheme, called the Labeled Value Set Maintenance System, is
distinguished by its focus on properties fundamental to temporal problems, and,
more generally, weighted graph algorithms. In particular, the maintenance
system focuses on maintaining a minimal representation of non-dominated
constraints. We benchmark Drakes performance on random structured problems, and
find that Drake reduces the size of the compiled representation by a factor of
over 500 for large problems, while incurring only a modest increase in run-time
latency, compared to prior work in compiled executives for temporal plans with
discrete choices.
| [
{
"version": "v1",
"created": "Sat, 18 Jan 2014 21:10:40 GMT"
}
] | 2014-01-21T00:00:00 | [
[
"Conrad",
"Patrick Raymond",
""
],
[
"Williams",
"Brian",
""
]
] | TITLE: Drake: An Efficient Executive for Temporal Plans with Choice
ABSTRACT: This work presents Drake, a dynamic executive for temporal plans with choice.
Dynamic plan execution strategies allow an autonomous agent to react quickly to
unfolding events, improving the robustness of the agent. Prior work developed
methods for dynamically dispatching Simple Temporal Networks, and further
research enriched the expressiveness of the plans executives could handle,
including discrete choices, which are the focus of this work. However, in some
approaches to date, these additional choices induce significant storage or
latency requirements to make flexible execution possible.
Drake is designed to leverage the low latency made possible by a
preprocessing step called compilation, while avoiding high memory costs through
a compact representation. We leverage the concepts of labels and environments,
taken from prior work in Assumption-based Truth Maintenance Systems (ATMS), to
concisely record the implications of the discrete choices, exploiting the
structure of the plan to avoid redundant reasoning or storage. Our labeling and
maintenance scheme, called the Labeled Value Set Maintenance System, is
distinguished by its focus on properties fundamental to temporal problems, and,
more generally, weighted graph algorithms. In particular, the maintenance
system focuses on maintaining a minimal representation of non-dominated
constraints. We benchmark Drakes performance on random structured problems, and
find that Drake reduces the size of the compiled representation by a factor of
over 500 for large problems, while incurring only a modest increase in run-time
latency, compared to prior work in compiled executives for temporal plans with
discrete choices.
|
1401.4609 | L\'eon R. Planken | L\'eon R. Planken, Mathijs M. de Weerdt, Roman P.J. van der Krogt | Computing All-Pairs Shortest Paths by Leveraging Low Treewidth | null | Journal Of Artificial Intelligence Research, Volume 43, pages
353-388, 2012 | 10.1613/jair.3509 | null | cs.DS cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present two new and efficient algorithms for computing all-pairs shortest
paths. The algorithms operate on directed graphs with real (possibly negative)
weights. They make use of directed path consistency along a vertex ordering d.
Both algorithms run in O(n^2 w_d) time, where w_d is the graph width induced by
this vertex ordering. For graphs of constant treewidth, this yields O(n^2)
time, which is optimal. On chordal graphs, the algorithms run in O(nm) time. In
addition, we present a variant that exploits graph separators to arrive at a
run time of O(n w_d^2 + n^2 s_d) on general graphs, where s_d andlt= w_d is the
size of the largest minimal separator induced by the vertex ordering d. We show
empirically that on both constructed and realistic benchmarks, in many cases
the algorithms outperform Floyd-Warshalls as well as Johnsons algorithm, which
represent the current state of the art with a run time of O(n^3) and O(nm + n^2
log n), respectively. Our algorithms can be used for spatial and temporal
reasoning, such as for the Simple Temporal Problem, which underlines their
relevance to the planning and scheduling community.
| [
{
"version": "v1",
"created": "Sat, 18 Jan 2014 21:23:48 GMT"
}
] | 2014-01-21T00:00:00 | [
[
"Planken",
"Léon R.",
""
],
[
"de Weerdt",
"Mathijs M.",
""
],
[
"van der Krogt",
"Roman P. J.",
""
]
] | TITLE: Computing All-Pairs Shortest Paths by Leveraging Low Treewidth
ABSTRACT: We present two new and efficient algorithms for computing all-pairs shortest
paths. The algorithms operate on directed graphs with real (possibly negative)
weights. They make use of directed path consistency along a vertex ordering d.
Both algorithms run in O(n^2 w_d) time, where w_d is the graph width induced by
this vertex ordering. For graphs of constant treewidth, this yields O(n^2)
time, which is optimal. On chordal graphs, the algorithms run in O(nm) time. In
addition, we present a variant that exploits graph separators to arrive at a
run time of O(n w_d^2 + n^2 s_d) on general graphs, where s_d andlt= w_d is the
size of the largest minimal separator induced by the vertex ordering d. We show
empirically that on both constructed and realistic benchmarks, in many cases
the algorithms outperform Floyd-Warshalls as well as Johnsons algorithm, which
represent the current state of the art with a run time of O(n^3) and O(nm + n^2
log n), respectively. Our algorithms can be used for spatial and temporal
reasoning, such as for the Simple Temporal Problem, which underlines their
relevance to the planning and scheduling community.
|
1401.5024 | Fabrice Rastello | Naznin Fauzia (OSU), Venmugil Elango (OSU), Mahesh Ravishankar (OSU),
J. Ramanujam (ECE), Fabrice Rastello (LIP), Atanas Rountev (OSU),
Louis-No\"el Pouchet (UCLA-CS), P. Sadayappan (CSE) | Beyond Reuse Distance Analysis: Dynamic Analysis for Characterization of
Data Locality Potential | Transaction on Architecture and Code Optimization (2014) | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Emerging computer architectures will feature drastically decreased flops/byte
(ratio of peak processing rate to memory bandwidth) as highlighted by recent
studies on Exascale architectural trends. Further, flops are getting cheaper
while the energy cost of data movement is increasingly dominant. The
understanding and characterization of data locality properties of computations
is critical in order to guide efforts to enhance data locality. Reuse distance
analysis of memory address traces is a valuable tool to perform data locality
characterization of programs. A single reuse distance analysis can be used to
estimate the number of cache misses in a fully associative LRU cache of any
size, thereby providing estimates on the minimum bandwidth requirements at
different levels of the memory hierarchy to avoid being bandwidth bound.
However, such an analysis only holds for the particular execution order that
produced the trace. It cannot estimate potential improvement in data locality
through dependence preserving transformations that change the execution
schedule of the operations in the computation. In this article, we develop a
novel dynamic analysis approach to characterize the inherent locality
properties of a computation and thereby assess the potential for data locality
enhancement via dependence preserving transformations. The execution trace of a
code is analyzed to extract a computational directed acyclic graph (CDAG) of
the data dependences. The CDAG is then partitioned into convex subsets, and the
convex partitioning is used to reorder the operations in the execution trace to
enhance data locality. The approach enables us to go beyond reuse distance
analysis of a single specific order of execution of the operations of a
computation in characterization of its data locality properties. It can serve a
valuable role in identifying promising code regions for manual transformation,
as well as assessing the effectiveness of compiler transformations for data
locality enhancement. We demonstrate the effectiveness of the approach using a
number of benchmarks, including case studies where the potential shown by the
analysis is exploited to achieve lower data movement costs and better
performance.
| [
{
"version": "v1",
"created": "Sat, 21 Dec 2013 08:06:18 GMT"
}
] | 2014-01-21T00:00:00 | [
[
"Fauzia",
"Naznin",
"",
"OSU"
],
[
"Elango",
"Venmugil",
"",
"OSU"
],
[
"Ravishankar",
"Mahesh",
"",
"OSU"
],
[
"Ramanujam",
"J.",
"",
"ECE"
],
[
"Rastello",
"Fabrice",
"",
"LIP"
],
[
"Rountev",
"Atanas",
"",
"OSU"
],
[
"Pouchet",
"Louis-Noël",
"",
"UCLA-CS"
],
[
"Sadayappan",
"P.",
"",
"CSE"
]
] | TITLE: Beyond Reuse Distance Analysis: Dynamic Analysis for Characterization of
Data Locality Potential
ABSTRACT: Emerging computer architectures will feature drastically decreased flops/byte
(ratio of peak processing rate to memory bandwidth) as highlighted by recent
studies on Exascale architectural trends. Further, flops are getting cheaper
while the energy cost of data movement is increasingly dominant. The
understanding and characterization of data locality properties of computations
is critical in order to guide efforts to enhance data locality. Reuse distance
analysis of memory address traces is a valuable tool to perform data locality
characterization of programs. A single reuse distance analysis can be used to
estimate the number of cache misses in a fully associative LRU cache of any
size, thereby providing estimates on the minimum bandwidth requirements at
different levels of the memory hierarchy to avoid being bandwidth bound.
However, such an analysis only holds for the particular execution order that
produced the trace. It cannot estimate potential improvement in data locality
through dependence preserving transformations that change the execution
schedule of the operations in the computation. In this article, we develop a
novel dynamic analysis approach to characterize the inherent locality
properties of a computation and thereby assess the potential for data locality
enhancement via dependence preserving transformations. The execution trace of a
code is analyzed to extract a computational directed acyclic graph (CDAG) of
the data dependences. The CDAG is then partitioned into convex subsets, and the
convex partitioning is used to reorder the operations in the execution trace to
enhance data locality. The approach enables us to go beyond reuse distance
analysis of a single specific order of execution of the operations of a
computation in characterization of its data locality properties. It can serve a
valuable role in identifying promising code regions for manual transformation,
as well as assessing the effectiveness of compiler transformations for data
locality enhancement. We demonstrate the effectiveness of the approach using a
number of benchmarks, including case studies where the potential shown by the
analysis is exploited to achieve lower data movement costs and better
performance.
|
1401.4447 | Abdul Kadir | Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto, Paulus Insap Santosa | Leaf Classification Using Shape, Color, and Texture Features | 6 pages, International Journal of Computer Trends and Technology-
July to Aug Issue 2011 | null | null | null | cs.CV cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several methods to identify plants have been proposed by several researchers.
Commonly, the methods did not capture color information, because color was not
recognized as an important aspect to the identification. In this research,
shape and vein, color, and texture features were incorporated to classify a
leaf. In this case, a neural network called Probabilistic Neural network (PNN)
was used as a classifier. The experimental result shows that the method for
classification gives average accuracy of 93.75% when it was tested on Flavia
dataset, that contains 32 kinds of plant leaves. It means that the method gives
better performance compared to the original work.
| [
{
"version": "v1",
"created": "Wed, 20 Nov 2013 07:55:40 GMT"
}
] | 2014-01-20T00:00:00 | [
[
"Kadir",
"Abdul",
""
],
[
"Nugroho",
"Lukito Edi",
""
],
[
"Susanto",
"Adhi",
""
],
[
"Santosa",
"Paulus Insap",
""
]
] | TITLE: Leaf Classification Using Shape, Color, and Texture Features
ABSTRACT: Several methods to identify plants have been proposed by several researchers.
Commonly, the methods did not capture color information, because color was not
recognized as an important aspect to the identification. In this research,
shape and vein, color, and texture features were incorporated to classify a
leaf. In this case, a neural network called Probabilistic Neural network (PNN)
was used as a classifier. The experimental result shows that the method for
classification gives average accuracy of 93.75% when it was tested on Flavia
dataset, that contains 32 kinds of plant leaves. It means that the method gives
better performance compared to the original work.
|
1302.2082 | Reza Parhizkar | Reza Parhizkar, Yann Barbotin and Martin Vetterli | Sequences with Minimal Time-Frequency Uncertainty | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A central problem in signal processing and communications is to design
signals that are compact both in time and frequency. Heisenberg's uncertainty
principle states that a given function cannot be arbitrarily compact both in
time and frequency, defining an "uncertainty" lower bound. Taking the variance
as a measure of localization in time and frequency, Gaussian functions reach
this bound for continuous-time signals. For sequences, however, this is not
true; it is known that Heisenberg's bound is generally unachievable. For a
chosen frequency variance, we formulate the search for "maximally compact
sequences" as an exactly and efficiently solved convex optimization problem,
thus providing a sharp uncertainty principle for sequences. Interestingly, the
optimization formulation also reveals that maximally compact sequences are
derived from Mathieu's harmonic cosine function of order zero. We further
provide rational asymptotic expansions of this sharp uncertainty bound. We use
the derived bounds as a benchmark to compare the compactness of well-known
window functions with that of the optimal Mathieu's functions.
| [
{
"version": "v1",
"created": "Fri, 8 Feb 2013 16:49:22 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Mar 2013 13:55:05 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Jan 2014 14:34:57 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Parhizkar",
"Reza",
""
],
[
"Barbotin",
"Yann",
""
],
[
"Vetterli",
"Martin",
""
]
] | TITLE: Sequences with Minimal Time-Frequency Uncertainty
ABSTRACT: A central problem in signal processing and communications is to design
signals that are compact both in time and frequency. Heisenberg's uncertainty
principle states that a given function cannot be arbitrarily compact both in
time and frequency, defining an "uncertainty" lower bound. Taking the variance
as a measure of localization in time and frequency, Gaussian functions reach
this bound for continuous-time signals. For sequences, however, this is not
true; it is known that Heisenberg's bound is generally unachievable. For a
chosen frequency variance, we formulate the search for "maximally compact
sequences" as an exactly and efficiently solved convex optimization problem,
thus providing a sharp uncertainty principle for sequences. Interestingly, the
optimization formulation also reveals that maximally compact sequences are
derived from Mathieu's harmonic cosine function of order zero. We further
provide rational asymptotic expansions of this sharp uncertainty bound. We use
the derived bounds as a benchmark to compare the compactness of well-known
window functions with that of the optimal Mathieu's functions.
|
1401.3830 | Henrik Reif Andersen | Henrik Reif Andersen, Tarik Hadzic, David Pisinger | Interactive Cost Configuration Over Decision Diagrams | null | Journal Of Artificial Intelligence Research, Volume 37, pages
99-139, 2010 | 10.1613/jair.2905 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many AI domains such as product configuration, a user should interactively
specify a solution that must satisfy a set of constraints. In such scenarios,
offline compilation of feasible solutions into a tractable representation is an
important approach to delivering efficient backtrack-free user interaction
online. In particular,binary decision diagrams (BDDs) have been successfully
used as a compilation target for product and service configuration. In this
paper we discuss how to extend BDD-based configuration to scenarios involving
cost functions which express user preferences.
We first show that an efficient, robust and easy to implement extension is
possible if the cost function is additive, and feasible solutions are
represented using multi-valued decision diagrams (MDDs). We also discuss the
effect on MDD size if the cost function is non-additive or if it is encoded
explicitly into MDD. We then discuss interactive configuration in the presence
of multiple cost functions. We prove that even in its simplest form,
multiple-cost configuration is NP-hard in the input MDD. However, for solving
two-cost configuration we develop a pseudo-polynomial scheme and a fully
polynomial approximation scheme. The applicability of our approach is
demonstrated through experiments over real-world configuration models and
product-catalogue datasets. Response times are generally within a fraction of a
second even for very large instances.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 04:48:15 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Andersen",
"Henrik Reif",
""
],
[
"Hadzic",
"Tarik",
""
],
[
"Pisinger",
"David",
""
]
] | TITLE: Interactive Cost Configuration Over Decision Diagrams
ABSTRACT: In many AI domains such as product configuration, a user should interactively
specify a solution that must satisfy a set of constraints. In such scenarios,
offline compilation of feasible solutions into a tractable representation is an
important approach to delivering efficient backtrack-free user interaction
online. In particular,binary decision diagrams (BDDs) have been successfully
used as a compilation target for product and service configuration. In this
paper we discuss how to extend BDD-based configuration to scenarios involving
cost functions which express user preferences.
We first show that an efficient, robust and easy to implement extension is
possible if the cost function is additive, and feasible solutions are
represented using multi-valued decision diagrams (MDDs). We also discuss the
effect on MDD size if the cost function is non-additive or if it is encoded
explicitly into MDD. We then discuss interactive configuration in the presence
of multiple cost functions. We prove that even in its simplest form,
multiple-cost configuration is NP-hard in the input MDD. However, for solving
two-cost configuration we develop a pseudo-polynomial scheme and a fully
polynomial approximation scheme. The applicability of our approach is
demonstrated through experiments over real-world configuration models and
product-catalogue datasets. Response times are generally within a fraction of a
second even for very large instances.
|
1401.3836 | Liyue Zhao | Liyue Zhao, Yu Zhang and Gita Sukthankar | An Active Learning Approach for Jointly Estimating Worker Performance
and Annotation Reliability with Crowdsourced Data | 10 pages | null | null | null | cs.LG cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crowdsourcing platforms offer a practical solution to the problem of
affordably annotating large datasets for training supervised classifiers.
Unfortunately, poor worker performance frequently threatens to compromise
annotation reliability, and requesting multiple labels for every instance can
lead to large cost increases without guaranteeing good results. Minimizing the
required training samples using an active learning selection procedure reduces
the labeling requirement but can jeopardize classifier training by focusing on
erroneous annotations. This paper presents an active learning approach in which
worker performance, task difficulty, and annotation reliability are jointly
estimated and used to compute the risk function guiding the sample selection
procedure. We demonstrate that the proposed approach, which employs active
learning with Bayesian networks, significantly improves training accuracy and
correctly ranks the expertise of unknown labelers in the presence of annotation
noise.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 04:51:19 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Zhao",
"Liyue",
""
],
[
"Zhang",
"Yu",
""
],
[
"Sukthankar",
"Gita",
""
]
] | TITLE: An Active Learning Approach for Jointly Estimating Worker Performance
and Annotation Reliability with Crowdsourced Data
ABSTRACT: Crowdsourcing platforms offer a practical solution to the problem of
affordably annotating large datasets for training supervised classifiers.
Unfortunately, poor worker performance frequently threatens to compromise
annotation reliability, and requesting multiple labels for every instance can
lead to large cost increases without guaranteeing good results. Minimizing the
required training samples using an active learning selection procedure reduces
the labeling requirement but can jeopardize classifier training by focusing on
erroneous annotations. This paper presents an active learning approach in which
worker performance, task difficulty, and annotation reliability are jointly
estimated and used to compute the risk function guiding the sample selection
procedure. We demonstrate that the proposed approach, which employs active
learning with Bayesian networks, significantly improves training accuracy and
correctly ranks the expertise of unknown labelers in the presence of annotation
noise.
|
1401.3848 | Alexander Feldman | Alexander Feldman, Gregory Provan, Arjan van Gemund | Approximate Model-Based Diagnosis Using Greedy Stochastic Search | null | Journal Of Artificial Intelligence Research, Volume 38, pages
371-413, 2010 | 10.1613/jair.3025 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a StochAstic Fault diagnosis AlgoRIthm, called SAFARI, which
trades off guarantees of computing minimal diagnoses for computational
efficiency. We empirically demonstrate, using the 74XXX and ISCAS-85 suites of
benchmark combinatorial circuits, that SAFARI achieves several
orders-of-magnitude speedup over two well-known deterministic algorithms, CDA*
and HA*, for multiple-fault diagnoses; further, SAFARI can compute a range of
multiple-fault diagnoses that CDA* and HA* cannot. We also prove that SAFARI is
optimal for a range of propositional fault models, such as the widely-used
weak-fault models (models with ignorance of abnormal behavior). We discuss the
optimality of SAFARI in a class of strong-fault circuit models with stuck-at
failure modes. By modeling the algorithm itself as a Markov chain, we provide
exact bounds on the minimality of the diagnosis computed. SAFARI also displays
strong anytime behavior, and will return a diagnosis after any non-trivial
inference time.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 04:57:50 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Feldman",
"Alexander",
""
],
[
"Provan",
"Gregory",
""
],
[
"van Gemund",
"Arjan",
""
]
] | TITLE: Approximate Model-Based Diagnosis Using Greedy Stochastic Search
ABSTRACT: We propose a StochAstic Fault diagnosis AlgoRIthm, called SAFARI, which
trades off guarantees of computing minimal diagnoses for computational
efficiency. We empirically demonstrate, using the 74XXX and ISCAS-85 suites of
benchmark combinatorial circuits, that SAFARI achieves several
orders-of-magnitude speedup over two well-known deterministic algorithms, CDA*
and HA*, for multiple-fault diagnoses; further, SAFARI can compute a range of
multiple-fault diagnoses that CDA* and HA* cannot. We also prove that SAFARI is
optimal for a range of propositional fault models, such as the widely-used
weak-fault models (models with ignorance of abnormal behavior). We discuss the
optimality of SAFARI in a class of strong-fault circuit models with stuck-at
failure modes. By modeling the algorithm itself as a Markov chain, we provide
exact bounds on the minimality of the diagnosis computed. SAFARI also displays
strong anytime behavior, and will return a diagnosis after any non-trivial
inference time.
|
1401.3850 | Alexander Feldman | Alexander Feldman, Gregory Provan, Arjan van Gemund | A Model-Based Active Testing Approach to Sequential Diagnosis | null | Journal Of Artificial Intelligence Research, Volume 39, pages
301-334, 2010 | 10.1613/jair.3031 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Model-based diagnostic reasoning often leads to a large number of diagnostic
hypotheses. The set of diagnoses can be reduced by taking into account extra
observations (passive monitoring), measuring additional variables (probing) or
executing additional tests (sequential diagnosis/test sequencing). In this
paper we combine the above approaches with techniques from Automated Test
Pattern Generation (ATPG) and Model-Based Diagnosis (MBD) into a framework
called FRACTAL (FRamework for ACtive Testing ALgorithms). Apart from the inputs
and outputs that connect a system to its environment, in active testing we
consider additional input variables to which a sequence of test vectors can be
supplied. We address the computationally hard problem of computing optimal
control assignments (as defined in FRACTAL) in terms of a greedy approximation
algorithm called FRACTAL-G. We compare the decrease in the number of remaining
minimal cardinality diagnoses of FRACTAL-G to that of two more FRACTAL
algorithms: FRACTAL-ATPG and FRACTAL-P. FRACTAL-ATPG is based on ATPG and
sequential diagnosis while FRACTAL-P is based on probing and, although not an
active testing algorithm, provides a baseline for comparing the lower bound on
the number of reachable diagnoses for the FRACTAL algorithms. We empirically
evaluate the trade-offs of the three FRACTAL algorithms by performing extensive
experimentation on the ISCAS85/74XXX benchmark of combinational circuits.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 04:58:46 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Feldman",
"Alexander",
""
],
[
"Provan",
"Gregory",
""
],
[
"van Gemund",
"Arjan",
""
]
] | TITLE: A Model-Based Active Testing Approach to Sequential Diagnosis
ABSTRACT: Model-based diagnostic reasoning often leads to a large number of diagnostic
hypotheses. The set of diagnoses can be reduced by taking into account extra
observations (passive monitoring), measuring additional variables (probing) or
executing additional tests (sequential diagnosis/test sequencing). In this
paper we combine the above approaches with techniques from Automated Test
Pattern Generation (ATPG) and Model-Based Diagnosis (MBD) into a framework
called FRACTAL (FRamework for ACtive Testing ALgorithms). Apart from the inputs
and outputs that connect a system to its environment, in active testing we
consider additional input variables to which a sequence of test vectors can be
supplied. We address the computationally hard problem of computing optimal
control assignments (as defined in FRACTAL) in terms of a greedy approximation
algorithm called FRACTAL-G. We compare the decrease in the number of remaining
minimal cardinality diagnoses of FRACTAL-G to that of two more FRACTAL
algorithms: FRACTAL-ATPG and FRACTAL-P. FRACTAL-ATPG is based on ATPG and
sequential diagnosis while FRACTAL-P is based on probing and, although not an
active testing algorithm, provides a baseline for comparing the lower bound on
the number of reachable diagnoses for the FRACTAL algorithms. We empirically
evaluate the trade-offs of the three FRACTAL algorithms by performing extensive
experimentation on the ISCAS85/74XXX benchmark of combinational circuits.
|
1401.3851 | Jing Xu | Jing Xu, Christian R. Shelton | Intrusion Detection using Continuous Time Bayesian Networks | null | Journal Of Artificial Intelligence Research, Volume 39, pages
745-774, 2010 | 10.1613/jair.3050 | null | cs.AI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intrusion detection systems (IDSs) fall into two high-level categories:
network-based systems (NIDS) that monitor network behaviors, and host-based
systems (HIDS) that monitor system calls. In this work, we present a general
technique for both systems. We use anomaly detection, which identifies patterns
not conforming to a historic norm. In both types of systems, the rates of
change vary dramatically over time (due to burstiness) and over components (due
to service difference). To efficiently model such systems, we use continuous
time Bayesian networks (CTBNs) and avoid specifying a fixed update interval
common to discrete-time models. We build generative models from the normal
training data, and abnormal behaviors are flagged based on their likelihood
under this norm. For NIDS, we construct a hierarchical CTBN model for the
network packet traces and use Rao-Blackwellized particle filtering to learn the
parameters. We illustrate the power of our method through experiments on
detecting real worms and identifying hosts on two publicly available network
traces, the MAWI dataset and the LBNL dataset. For HIDS, we develop a novel
learning method to deal with the finite resolution of system log file time
stamps, without losing the benefits of our continuous time model. We
demonstrate the method by detecting intrusions in the DARPA 1998 BSM dataset.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 04:59:06 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Xu",
"Jing",
""
],
[
"Shelton",
"Christian R.",
""
]
] | TITLE: Intrusion Detection using Continuous Time Bayesian Networks
ABSTRACT: Intrusion detection systems (IDSs) fall into two high-level categories:
network-based systems (NIDS) that monitor network behaviors, and host-based
systems (HIDS) that monitor system calls. In this work, we present a general
technique for both systems. We use anomaly detection, which identifies patterns
not conforming to a historic norm. In both types of systems, the rates of
change vary dramatically over time (due to burstiness) and over components (due
to service difference). To efficiently model such systems, we use continuous
time Bayesian networks (CTBNs) and avoid specifying a fixed update interval
common to discrete-time models. We build generative models from the normal
training data, and abnormal behaviors are flagged based on their likelihood
under this norm. For NIDS, we construct a hierarchical CTBN model for the
network packet traces and use Rao-Blackwellized particle filtering to learn the
parameters. We illustrate the power of our method through experiments on
detecting real worms and identifying hosts on two publicly available network
traces, the MAWI dataset and the LBNL dataset. For HIDS, we develop a novel
learning method to deal with the finite resolution of system log file time
stamps, without losing the benefits of our continuous time model. We
demonstrate the method by detecting intrusions in the DARPA 1998 BSM dataset.
|
1401.3862 | Yonghong Wang | Yonghong Wang, Chung-Wei Hang, Munindar P. Singh | A Probabilistic Approach for Maintaining Trust Based on Evidence | null | Journal Of Artificial Intelligence Research, Volume 40, pages
221-267, 2011 | 10.1613/jair.3108 | null | cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Leading agent-based trust models address two important needs. First, they
show how an agent may estimate the trustworthiness of another agent based on
prior interactions. Second, they show how agents may share their knowledge in
order to cooperatively assess the trustworthiness of others. However, in
real-life settings, information relevant to trust is usually obtained
piecemeal, not all at once. Unfortunately, the problem of maintaining trust has
drawn little attention. Existing approaches handle trust updates in a
heuristic, not a principled, manner. This paper builds on a formal model that
considers probability and certainty as two dimensions of trust. It proposes a
mechanism using which an agent can update the amount of trust it places in
other agents on an ongoing basis. This paper shows via simulation that the
proposed approach (a) provides accurate estimates of the trustworthiness of
agents that change behavior frequently; and (b) captures the dynamic behavior
of the agents. This paper includes an evaluation based on a real dataset drawn
from Amazon Marketplace, a leading e-commerce site.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 05:04:29 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Wang",
"Yonghong",
""
],
[
"Hang",
"Chung-Wei",
""
],
[
"Singh",
"Munindar P.",
""
]
] | TITLE: A Probabilistic Approach for Maintaining Trust Based on Evidence
ABSTRACT: Leading agent-based trust models address two important needs. First, they
show how an agent may estimate the trustworthiness of another agent based on
prior interactions. Second, they show how agents may share their knowledge in
order to cooperatively assess the trustworthiness of others. However, in
real-life settings, information relevant to trust is usually obtained
piecemeal, not all at once. Unfortunately, the problem of maintaining trust has
drawn little attention. Existing approaches handle trust updates in a
heuristic, not a principled, manner. This paper builds on a formal model that
considers probability and certainty as two dimensions of trust. It proposes a
mechanism using which an agent can update the amount of trust it places in
other agents on an ongoing basis. This paper shows via simulation that the
proposed approach (a) provides accurate estimates of the trustworthiness of
agents that change behavior frequently; and (b) captures the dynamic behavior
of the agents. This paper includes an evaluation based on a real dataset drawn
from Amazon Marketplace, a leading e-commerce site.
|
1401.3872 | Christophe Lecoutre | Christophe Lecoutre, Stephane Cardon, Julien Vion | Second-Order Consistencies | null | Journal Of Artificial Intelligence Research, Volume 40, pages
175-219, 2011 | 10.1613/jair.3180 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a comprehensive study of second-order consistencies
(i.e., consistencies identifying inconsistent pairs of values) for constraint
satisfaction. We build a full picture of the relationships existing between
four basic second-order consistencies, namely path consistency (PC),
3-consistency (3C), dual consistency (DC) and 2-singleton arc consistency
(2SAC), as well as their conservative and strong variants. Interestingly, dual
consistency is an original property that can be established by using the
outcome of the enforcement of generalized arc consistency (GAC), which makes it
rather easy to obtain since constraint solvers typically maintain GAC during
search. On binary constraint networks, DC is equivalent to PC, but its
restriction to existing constraints, called conservative dual consistency
(CDC), is strictly stronger than traditional conservative consistencies derived
from path consistency, namely partial path consistency (PPC) and conservative
path consistency (CPC). After introducing a general algorithm to enforce strong
(C)DC, we present the results of an experimentation over a wide range of
benchmarks that demonstrate the interest of (conservative) dual consistency. In
particular, we show that enforcing (C)DC before search clearly improves the
performance of MAC (the algorithm that maintains GAC during search) on several
binary and non-binary structured problems.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 05:09:30 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Lecoutre",
"Christophe",
""
],
[
"Cardon",
"Stephane",
""
],
[
"Vion",
"Julien",
""
]
] | TITLE: Second-Order Consistencies
ABSTRACT: In this paper, we propose a comprehensive study of second-order consistencies
(i.e., consistencies identifying inconsistent pairs of values) for constraint
satisfaction. We build a full picture of the relationships existing between
four basic second-order consistencies, namely path consistency (PC),
3-consistency (3C), dual consistency (DC) and 2-singleton arc consistency
(2SAC), as well as their conservative and strong variants. Interestingly, dual
consistency is an original property that can be established by using the
outcome of the enforcement of generalized arc consistency (GAC), which makes it
rather easy to obtain since constraint solvers typically maintain GAC during
search. On binary constraint networks, DC is equivalent to PC, but its
restriction to existing constraints, called conservative dual consistency
(CDC), is strictly stronger than traditional conservative consistencies derived
from path consistency, namely partial path consistency (PPC) and conservative
path consistency (CPC). After introducing a general algorithm to enforce strong
(C)DC, we present the results of an experimentation over a wide range of
benchmarks that demonstrate the interest of (conservative) dual consistency. In
particular, we show that enforcing (C)DC before search clearly improves the
performance of MAC (the algorithm that maintains GAC during search) on several
binary and non-binary structured problems.
|
1401.3878 | Alessandro Cimatti | Alessandro Cimatti, Alberto Griggio, Roberto Sebastiani | Computing Small Unsatisfiable Cores in Satisfiability Modulo Theories | null | Journal Of Artificial Intelligence Research, Volume 40, pages
701-728, 2011 | 10.1613/jair.3196 | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of finding small unsatisfiable cores for SAT formulas has
recently received a lot of interest, mostly for its applications in formal
verification. However, propositional logic is often not expressive enough for
representing many interesting verification problems, which can be more
naturally addressed in the framework of Satisfiability Modulo Theories, SMT.
Surprisingly, the problem of finding unsatisfiable cores in SMT has received
very little attention in the literature. In this paper we present a novel
approach to this problem, called the Lemma-Lifting approach. The main idea is
to combine an SMT solver with an external propositional core extractor. The SMT
solver produces the theory lemmas found during the search, dynamically lifting
the suitable amount of theory information to the Boolean level. The core
extractor is then called on the Boolean abstraction of the original SMT problem
and of the theory lemmas. This results in an unsatisfiable core for the
original SMT problem, once the remaining theory lemmas are removed. The
approach is conceptually interesting, and has several advantages in practice.
In fact, it is extremely simple to implement and to update, and it can be
interfaced with every propositional core extractor in a plug-and-play manner,
so as to benefit for free of all unsat-core reduction techniques which have
been or will be made available.
We have evaluated our algorithm with a very extensive empirical test on
SMT-LIB benchmarks, which confirms the validity and potential of this approach.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 05:11:40 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Cimatti",
"Alessandro",
""
],
[
"Griggio",
"Alberto",
""
],
[
"Sebastiani",
"Roberto",
""
]
] | TITLE: Computing Small Unsatisfiable Cores in Satisfiability Modulo Theories
ABSTRACT: The problem of finding small unsatisfiable cores for SAT formulas has
recently received a lot of interest, mostly for its applications in formal
verification. However, propositional logic is often not expressive enough for
representing many interesting verification problems, which can be more
naturally addressed in the framework of Satisfiability Modulo Theories, SMT.
Surprisingly, the problem of finding unsatisfiable cores in SMT has received
very little attention in the literature. In this paper we present a novel
approach to this problem, called the Lemma-Lifting approach. The main idea is
to combine an SMT solver with an external propositional core extractor. The SMT
solver produces the theory lemmas found during the search, dynamically lifting
the suitable amount of theory information to the Boolean level. The core
extractor is then called on the Boolean abstraction of the original SMT problem
and of the theory lemmas. This results in an unsatisfiable core for the
original SMT problem, once the remaining theory lemmas are removed. The
approach is conceptually interesting, and has several advantages in practice.
In fact, it is extremely simple to implement and to update, and it can be
interfaced with every propositional core extractor in a plug-and-play manner,
so as to benefit for free of all unsat-core reduction techniques which have
been or will be made available.
We have evaluated our algorithm with a very extensive empirical test on
SMT-LIB benchmarks, which confirms the validity and potential of this approach.
|
1401.3881 | Mustafa Bilgic | Mustafa Bilgic, Lise Getoor | Value of Information Lattice: Exploiting Probabilistic Independence for
Effective Feature Subset Acquisition | null | Journal Of Artificial Intelligence Research, Volume 41, pages
69-95, 2011 | 10.1613/jair.3200 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the cost-sensitive feature acquisition problem, where
misclassifying an instance is costly but the expected misclassification cost
can be reduced by acquiring the values of the missing features. Because
acquiring the features is costly as well, the objective is to acquire the right
set of features so that the sum of the feature acquisition cost and
misclassification cost is minimized. We describe the Value of Information
Lattice (VOILA), an optimal and efficient feature subset acquisition framework.
Unlike the common practice, which is to acquire features greedily, VOILA can
reason with subsets of features. VOILA efficiently searches the space of
possible feature subsets by discovering and exploiting conditional independence
properties between the features and it reuses probabilistic inference
computations to further speed up the process. Through empirical evaluation on
five medical datasets, we show that the greedy strategy is often reluctant to
acquire features, as it cannot forecast the benefit of acquiring multiple
features in combination.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 05:12:42 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Bilgic",
"Mustafa",
""
],
[
"Getoor",
"Lise",
""
]
] | TITLE: Value of Information Lattice: Exploiting Probabilistic Independence for
Effective Feature Subset Acquisition
ABSTRACT: We address the cost-sensitive feature acquisition problem, where
misclassifying an instance is costly but the expected misclassification cost
can be reduced by acquiring the values of the missing features. Because
acquiring the features is costly as well, the objective is to acquire the right
set of features so that the sum of the feature acquisition cost and
misclassification cost is minimized. We describe the Value of Information
Lattice (VOILA), an optimal and efficient feature subset acquisition framework.
Unlike the common practice, which is to acquire features greedily, VOILA can
reason with subsets of features. VOILA efficiently searches the space of
possible feature subsets by discovering and exploiting conditional independence
properties between the features and it reuses probabilistic inference
computations to further speed up the process. Through empirical evaluation on
five medical datasets, we show that the greedy strategy is often reluctant to
acquire features, as it cannot forecast the benefit of acquiring multiple
features in combination.
|
1401.3886 | Wei Li | Wei Li, Pascal Poupart, Peter van Beek | Exploiting Structure in Weighted Model Counting Approaches to
Probabilistic Inference | null | Journal Of Artificial Intelligence Research, Volume 40, pages
729-765, 2011 | 10.1613/jair.3232 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previous studies have demonstrated that encoding a Bayesian network into a
SAT formula and then performing weighted model counting using a backtracking
search algorithm can be an effective method for exact inference. In this paper,
we present techniques for improving this approach for Bayesian networks with
noisy-OR and noisy-MAX relations---two relations that are widely used in
practice as they can dramatically reduce the number of probabilities one needs
to specify. In particular, we present two SAT encodings for noisy-OR and two
encodings for noisy-MAX that exploit the structure or semantics of the
relations to improve both time and space efficiency, and we prove the
correctness of the encodings. We experimentally evaluated our techniques on
large-scale real and randomly generated Bayesian networks. On these benchmarks,
our techniques gave speedups of up to two orders of magnitude over the best
previous approaches for networks with noisy-OR/MAX relations and scaled up to
larger networks. As well, our techniques extend the weighted model counting
approach for exact inference to networks that were previously intractable for
the approach.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 05:15:08 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Li",
"Wei",
""
],
[
"Poupart",
"Pascal",
""
],
[
"van Beek",
"Peter",
""
]
] | TITLE: Exploiting Structure in Weighted Model Counting Approaches to
Probabilistic Inference
ABSTRACT: Previous studies have demonstrated that encoding a Bayesian network into a
SAT formula and then performing weighted model counting using a backtracking
search algorithm can be an effective method for exact inference. In this paper,
we present techniques for improving this approach for Bayesian networks with
noisy-OR and noisy-MAX relations---two relations that are widely used in
practice as they can dramatically reduce the number of probabilities one needs
to specify. In particular, we present two SAT encodings for noisy-OR and two
encodings for noisy-MAX that exploit the structure or semantics of the
relations to improve both time and space efficiency, and we prove the
correctness of the encodings. We experimentally evaluated our techniques on
large-scale real and randomly generated Bayesian networks. On these benchmarks,
our techniques gave speedups of up to two orders of magnitude over the best
previous approaches for networks with noisy-OR/MAX relations and scaled up to
larger networks. As well, our techniques extend the weighted model counting
approach for exact inference to networks that were previously intractable for
the approach.
|
1401.3890 | Joerg Hoffmann | Joerg Hoffmann | Analyzing Search Topology Without Running Any Search: On the Connection
Between Causal Graphs and h+ | null | Journal Of Artificial Intelligence Research, Volume 41, pages
155-229, 2011 | 10.1613/jair.3276 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ignoring delete lists relaxation is of paramount importance for both
satisficing and optimal planning. In earlier work, it was observed that the
optimal relaxation heuristic h+ has amazing qualities in many classical
planning benchmarks, in particular pertaining to the complete absence of local
minima. The proofs of this are hand-made, raising the question whether such
proofs can be lead automatically by domain analysis techniques. In contrast to
earlier disappointing results -- the analysis method has exponential runtime
and succeeds only in two extremely simple benchmark domains -- we herein answer
this question in the affirmative. We establish connections between causal graph
structure and h+ topology. This results in low-order polynomial time analysis
methods, implemented in a tool we call TorchLight. Of the 12 domains where the
absence of local minima has been proved, TorchLight gives strong success
guarantees in 8 domains. Empirically, its analysis exhibits strong performance
in a further 2 of these domains, plus in 4 more domains where local minima may
exist but are rare. In this way, TorchLight can distinguish easy domains from
hard ones. By summarizing structural reasons for analysis failure, TorchLight
also provides diagnostic output indicating domain aspects that may cause local
minima.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 05:16:17 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Hoffmann",
"Joerg",
""
]
] | TITLE: Analyzing Search Topology Without Running Any Search: On the Connection
Between Causal Graphs and h+
ABSTRACT: The ignoring delete lists relaxation is of paramount importance for both
satisficing and optimal planning. In earlier work, it was observed that the
optimal relaxation heuristic h+ has amazing qualities in many classical
planning benchmarks, in particular pertaining to the complete absence of local
minima. The proofs of this are hand-made, raising the question whether such
proofs can be lead automatically by domain analysis techniques. In contrast to
earlier disappointing results -- the analysis method has exponential runtime
and succeeds only in two extremely simple benchmark domains -- we herein answer
this question in the affirmative. We establish connections between causal graph
structure and h+ topology. This results in low-order polynomial time analysis
methods, implemented in a tool we call TorchLight. Of the 12 domains where the
absence of local minima has been proved, TorchLight gives strong success
guarantees in 8 domains. Empirically, its analysis exhibits strong performance
in a further 2 of these domains, plus in 4 more domains where local minima may
exist but are rare. In this way, TorchLight can distinguish easy domains from
hard ones. By summarizing structural reasons for analysis failure, TorchLight
also provides diagnostic output indicating domain aspects that may cause local
minima.
|
1401.3892 | Sajjad Ahmed Siddiqi | Sajjad Ahmed Siddiqi, Jinbo Huang | Sequential Diagnosis by Abstraction | null | Journal Of Artificial Intelligence Research, Volume 41, pages
329-365, 2011 | 10.1613/jair.3296 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When a system behaves abnormally, sequential diagnosis takes a sequence of
measurements of the system until the faults causing the abnormality are
identified, and the goal is to reduce the diagnostic cost, defined here as the
number of measurements. To propose measurement points, previous work employs a
heuristic based on reducing the entropy over a computed set of diagnoses. This
approach generally has good performance in terms of diagnostic cost, but can
fail to diagnose large systems when the set of diagnoses is too large. Focusing
on a smaller set of probable diagnoses scales the approach but generally leads
to increased average diagnostic costs. In this paper, we propose a new
diagnostic framework employing four new techniques, which scales to much larger
systems with good performance in terms of diagnostic cost. First, we propose a
new heuristic for measurement point selection that can be computed efficiently,
without requiring the set of diagnoses, once the system is modeled as a
Bayesian network and compiled into a logical form known as d-DNNF. Second, we
extend hierarchical diagnosis, a technique based on system abstraction from our
previous work, to handle probabilities so that it can be applied to sequential
diagnosis to allow larger systems to be diagnosed. Third, for the largest
systems where even hierarchical diagnosis fails, we propose a novel method that
converts the system into one that has a smaller abstraction and whose diagnoses
form a superset of those of the original system; the new system can then be
diagnosed and the result mapped back to the original system. Finally, we
propose a novel cost estimation function which can be used to choose an
abstraction of the system that is more likely to provide optimal average cost.
Experiments with ISCAS-85 benchmark circuits indicate that our approach scales
to all circuits in the suite except one that has a flat structure not
susceptible to useful abstraction.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 05:16:38 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Siddiqi",
"Sajjad Ahmed",
""
],
[
"Huang",
"Jinbo",
""
]
] | TITLE: Sequential Diagnosis by Abstraction
ABSTRACT: When a system behaves abnormally, sequential diagnosis takes a sequence of
measurements of the system until the faults causing the abnormality are
identified, and the goal is to reduce the diagnostic cost, defined here as the
number of measurements. To propose measurement points, previous work employs a
heuristic based on reducing the entropy over a computed set of diagnoses. This
approach generally has good performance in terms of diagnostic cost, but can
fail to diagnose large systems when the set of diagnoses is too large. Focusing
on a smaller set of probable diagnoses scales the approach but generally leads
to increased average diagnostic costs. In this paper, we propose a new
diagnostic framework employing four new techniques, which scales to much larger
systems with good performance in terms of diagnostic cost. First, we propose a
new heuristic for measurement point selection that can be computed efficiently,
without requiring the set of diagnoses, once the system is modeled as a
Bayesian network and compiled into a logical form known as d-DNNF. Second, we
extend hierarchical diagnosis, a technique based on system abstraction from our
previous work, to handle probabilities so that it can be applied to sequential
diagnosis to allow larger systems to be diagnosed. Third, for the largest
systems where even hierarchical diagnosis fails, we propose a novel method that
converts the system into one that has a smaller abstraction and whose diagnoses
form a superset of those of the original system; the new system can then be
diagnosed and the result mapped back to the original system. Finally, we
propose a novel cost estimation function which can be used to choose an
abstraction of the system that is more likely to provide optimal average cost.
Experiments with ISCAS-85 benchmark circuits indicate that our approach scales
to all circuits in the suite except one that has a flat structure not
susceptible to useful abstraction.
|
1401.3893 | Changhe Yuan | Changhe Yuan, Heejin Lim, Tsai-Ching Lu | Most Relevant Explanation in Bayesian Networks | null | Journal Of Artificial Intelligence Research, Volume 42, pages
309-352, 2011 | 10.1613/jair.3301 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A major inference task in Bayesian networks is explaining why some variables
are observed in their particular states using a set of target variables.
Existing methods for solving this problem often generate explanations that are
either too simple (underspecified) or too complex (overspecified). In this
paper, we introduce a method called Most Relevant Explanation (MRE) which finds
a partial instantiation of the target variables that maximizes the generalized
Bayes factor (GBF) as the best explanation for the given evidence. Our study
shows that GBF has several theoretical properties that enable MRE to
automatically identify the most relevant target variables in forming its
explanation. In particular, conditional Bayes factor (CBF), defined as the GBF
of a new explanation conditioned on an existing explanation, provides a soft
measure on the degree of relevance of the variables in the new explanation in
explaining the evidence given the existing explanation. As a result, MRE is
able to automatically prune less relevant variables from its explanation. We
also show that CBF is able to capture well the explaining-away phenomenon that
is often represented in Bayesian networks. Moreover, we define two dominance
relations between the candidate solutions and use the relations to generalize
MRE to find a set of top explanations that is both diverse and representative.
Case studies on several benchmark diagnostic Bayesian networks show that MRE is
often able to find explanatory hypotheses that are not only precise but also
concise.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 05:17:05 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Yuan",
"Changhe",
""
],
[
"Lim",
"Heejin",
""
],
[
"Lu",
"Tsai-Ching",
""
]
] | TITLE: Most Relevant Explanation in Bayesian Networks
ABSTRACT: A major inference task in Bayesian networks is explaining why some variables
are observed in their particular states using a set of target variables.
Existing methods for solving this problem often generate explanations that are
either too simple (underspecified) or too complex (overspecified). In this
paper, we introduce a method called Most Relevant Explanation (MRE) which finds
a partial instantiation of the target variables that maximizes the generalized
Bayes factor (GBF) as the best explanation for the given evidence. Our study
shows that GBF has several theoretical properties that enable MRE to
automatically identify the most relevant target variables in forming its
explanation. In particular, conditional Bayes factor (CBF), defined as the GBF
of a new explanation conditioned on an existing explanation, provides a soft
measure on the degree of relevance of the variables in the new explanation in
explaining the evidence given the existing explanation. As a result, MRE is
able to automatically prune less relevant variables from its explanation. We
also show that CBF is able to capture well the explaining-away phenomenon that
is often represented in Bayesian networks. Moreover, we define two dominance
relations between the candidate solutions and use the relations to generalize
MRE to find a set of top explanations that is both diverse and representative.
Case studies on several benchmark diagnostic Bayesian networks show that MRE is
often able to find explanatory hypotheses that are not only precise but also
concise.
|
1401.4063 | Maciej Cytowski Mr | Jakub Katarzy\'nski and Maciej Cytowski | Towards Autotuning of OpenMP Applications on Multicore Architectures | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe an autotuning tool for optimization of OpenMP
applications on highly multicore and multithreaded architectures. Our work was
motivated by in-depth performance analysis of scientific applications and
synthetic benchmarks on IBM Power 775 architecture. The tool provides an
automatic code instrumentation of OpenMP parallel regions. Based on measurement
of chosen hardware performance counters the tool decides on the number of
parallel threads that should be used for execution of chosen code fragments.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 15:30:17 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Katarzyński",
"Jakub",
""
],
[
"Cytowski",
"Maciej",
""
]
] | TITLE: Towards Autotuning of OpenMP Applications on Multicore Architectures
ABSTRACT: In this paper we describe an autotuning tool for optimization of OpenMP
applications on highly multicore and multithreaded architectures. Our work was
motivated by in-depth performance analysis of scientific applications and
synthetic benchmarks on IBM Power 775 architecture. The tool provides an
automatic code instrumentation of OpenMP parallel regions. Based on measurement
of chosen hardware performance counters the tool decides on the number of
parallel threads that should be used for execution of chosen code fragments.
|
1401.4128 | Charles-Henri Cappelaere | Charles-Henri Cappelaere, R. Dubois, P. Roussel, G. Dreyfus | Towards the selection of patients requiring ICD implantation by
automatic classification from Holter monitoring indices | Computing in Cardiology, Saragosse : Espagne (2013) | null | null | null | cs.LG stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The purpose of this study is to optimize the selection of prophylactic
cardioverter defibrillator implantation candidates. Currently, the main
criterion for implantation is a low Left Ventricular Ejection Fraction (LVEF)
whose specificity is relatively poor. We designed two classifiers aimed to
predict, from long term ECG recordings (Holter), whether a low-LVEF patient is
likely or not to undergo ventricular arrhythmia in the next six months. One
classifier is a single hidden layer neural network whose variables are the most
relevant features extracted from Holter recordings, and the other classifier
has a structure that capitalizes on the physiological decomposition of the
arrhythmogenic factors into three disjoint groups: the myocardial substrate,
the triggers and the autonomic nervous system (ANS). In this ad hoc network,
the features were assigned to each group; one neural network classifier per
group was designed and its complexity was optimized. The outputs of the
classifiers were fed to a single neuron that provided the required probability
estimate. The latter was thresholded for final discrimination A dataset
composed of 186 pre-implantation 30-mn Holter recordings of patients equipped
with an implantable cardioverter defibrillator (ICD) in primary prevention was
used in order to design and test this classifier. 44 out of 186 patients
underwent at least one treated ventricular arrhythmia during the six-month
follow-up period. Performances of the designed classifier were evaluated using
a cross-test strategy that consists in splitting the database into several
combinations of a training set and a test set. The average arrhythmia
prediction performances of the ad-hoc classifier are NPV = 77% $\pm$ 13% and
PPV = 31% $\pm$ 19% (Negative Predictive Value $\pm$ std, Positive Predictive
Value $\pm$ std). According to our study, improving prophylactic
ICD-implantation candidate selection by automatic classification from ECG
features may be possible, but the availability of a sizable dataset appears to
be essential to decrease the number of False Negatives.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2014 18:54:43 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Cappelaere",
"Charles-Henri",
""
],
[
"Dubois",
"R.",
""
],
[
"Roussel",
"P.",
""
],
[
"Dreyfus",
"G.",
""
]
] | TITLE: Towards the selection of patients requiring ICD implantation by
automatic classification from Holter monitoring indices
ABSTRACT: The purpose of this study is to optimize the selection of prophylactic
cardioverter defibrillator implantation candidates. Currently, the main
criterion for implantation is a low Left Ventricular Ejection Fraction (LVEF)
whose specificity is relatively poor. We designed two classifiers aimed to
predict, from long term ECG recordings (Holter), whether a low-LVEF patient is
likely or not to undergo ventricular arrhythmia in the next six months. One
classifier is a single hidden layer neural network whose variables are the most
relevant features extracted from Holter recordings, and the other classifier
has a structure that capitalizes on the physiological decomposition of the
arrhythmogenic factors into three disjoint groups: the myocardial substrate,
the triggers and the autonomic nervous system (ANS). In this ad hoc network,
the features were assigned to each group; one neural network classifier per
group was designed and its complexity was optimized. The outputs of the
classifiers were fed to a single neuron that provided the required probability
estimate. The latter was thresholded for final discrimination A dataset
composed of 186 pre-implantation 30-mn Holter recordings of patients equipped
with an implantable cardioverter defibrillator (ICD) in primary prevention was
used in order to design and test this classifier. 44 out of 186 patients
underwent at least one treated ventricular arrhythmia during the six-month
follow-up period. Performances of the designed classifier were evaluated using
a cross-test strategy that consists in splitting the database into several
combinations of a training set and a test set. The average arrhythmia
prediction performances of the ad-hoc classifier are NPV = 77% $\pm$ 13% and
PPV = 31% $\pm$ 19% (Negative Predictive Value $\pm$ std, Positive Predictive
Value $\pm$ std). According to our study, improving prophylactic
ICD-implantation candidate selection by automatic classification from ECG
features may be possible, but the availability of a sizable dataset appears to
be essential to decrease the number of False Negatives.
|
1401.3173 | Mohamad Noureddine A | Mohamad Noureddine, Fadi A. Zaraket and Ali S. Elzein | Synthesis of Sequential Extended Regular Expressions for Verification | null | null | null | null | cs.FL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Synthesis techniques take realizable Linear Temporal Logic specifications and
produce correct cir- cuits that implement the specifications. The generated
circuits can be used directly, or as miters that check the correctness of a
logic design. Typically, those techniques generate non-deterministic finite
state automata, which can be determinized at a possibly exponential cost.
Recent results show multiple advantages of using deterministic automata in
symbolic and bounded model checking of LTL safety properties. In this paper, we
present a technique with a supporting tool that takes a sequential extended
regular expression specification {\Phi}, and a logic design implementation S,
and generates a sequential circuit C, expressed as an And-Inverted-Graph, that
checks whether S satisfies {\Phi}. The technique passes the generated circuit C
to ABC, a bounded model checker, to validate correctness. We use free input
variables to encode the non- determinism in {\Phi} and we obtain a number of
states in miter linear in the size of {\Phi}. Our technique succeeds to
generate the input to the model checker while other techniques fail because of
the exponential blowup, and in most cases, ABC succeeds to either find defects
in the design that was otherwise uncheckable, or validate the design. We
evaluated our technique against several industrial benchmarks including the IBM
arbiter, a load balancer, and a traffic light system, and compared our results
with the NuSMV framework. Our method found defects and validated systems NuSMV
could not validate.
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2014 13:09:58 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Noureddine",
"Mohamad",
""
],
[
"Zaraket",
"Fadi A.",
""
],
[
"Elzein",
"Ali S.",
""
]
] | TITLE: Synthesis of Sequential Extended Regular Expressions for Verification
ABSTRACT: Synthesis techniques take realizable Linear Temporal Logic specifications and
produce correct cir- cuits that implement the specifications. The generated
circuits can be used directly, or as miters that check the correctness of a
logic design. Typically, those techniques generate non-deterministic finite
state automata, which can be determinized at a possibly exponential cost.
Recent results show multiple advantages of using deterministic automata in
symbolic and bounded model checking of LTL safety properties. In this paper, we
present a technique with a supporting tool that takes a sequential extended
regular expression specification {\Phi}, and a logic design implementation S,
and generates a sequential circuit C, expressed as an And-Inverted-Graph, that
checks whether S satisfies {\Phi}. The technique passes the generated circuit C
to ABC, a bounded model checker, to validate correctness. We use free input
variables to encode the non- determinism in {\Phi} and we obtain a number of
states in miter linear in the size of {\Phi}. Our technique succeeds to
generate the input to the model checker while other techniques fail because of
the exponential blowup, and in most cases, ABC succeeds to either find defects
in the design that was otherwise uncheckable, or validate the design. We
evaluated our technique against several industrial benchmarks including the IBM
arbiter, a load balancer, and a traffic light system, and compared our results
with the NuSMV framework. Our method found defects and validated systems NuSMV
could not validate.
|
1401.3390 | Mahdi Pakdaman Naeini | Mahdi Pakdaman Naeini, Gregory F. Cooper, Milos Hauskrecht | Binary Classifier Calibration: Non-parametric approach | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurate calibration of probabilistic predictive models learned is critical
for many practical prediction and decision-making tasks. There are two main
categories of methods for building calibrated classifiers. One approach is to
develop methods for learning probabilistic models that are well-calibrated, ab
initio. The other approach is to use some post-processing methods for
transforming the output of a classifier to be well calibrated, as for example
histogram binning, Platt scaling, and isotonic regression. One advantage of the
post-processing approach is that it can be applied to any existing
probabilistic classification model that was constructed using any
machine-learning method.
In this paper, we first introduce two measures for evaluating how well a
classifier is calibrated. We prove three theorems showing that using a simple
histogram binning post-processing method, it is possible to make a classifier
be well calibrated while retaining its discrimination capability. Also, by
casting the histogram binning method as a density-based non-parametric binary
classifier, we can extend it using two simple non-parametric density estimation
methods. We demonstrate the performance of the proposed calibration methods on
synthetic and real datasets. Experimental results show that the proposed
methods either outperform or are comparable to existing calibration methods.
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2014 23:52:16 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Naeini",
"Mahdi Pakdaman",
""
],
[
"Cooper",
"Gregory F.",
""
],
[
"Hauskrecht",
"Milos",
""
]
] | TITLE: Binary Classifier Calibration: Non-parametric approach
ABSTRACT: Accurate calibration of probabilistic predictive models learned is critical
for many practical prediction and decision-making tasks. There are two main
categories of methods for building calibrated classifiers. One approach is to
develop methods for learning probabilistic models that are well-calibrated, ab
initio. The other approach is to use some post-processing methods for
transforming the output of a classifier to be well calibrated, as for example
histogram binning, Platt scaling, and isotonic regression. One advantage of the
post-processing approach is that it can be applied to any existing
probabilistic classification model that was constructed using any
machine-learning method.
In this paper, we first introduce two measures for evaluating how well a
classifier is calibrated. We prove three theorems showing that using a simple
histogram binning post-processing method, it is possible to make a classifier
be well calibrated while retaining its discrimination capability. Also, by
casting the histogram binning method as a density-based non-parametric binary
classifier, we can extend it using two simple non-parametric density estimation
methods. We demonstrate the performance of the proposed calibration methods on
synthetic and real datasets. Experimental results show that the proposed
methods either outperform or are comparable to existing calibration methods.
|
1401.3413 | Avneesh Saluja | Avneesh Saluja, Mahdi Pakdaman, Dongzhen Piao, Ankur P. Parikh | Infinite Mixed Membership Matrix Factorization | For ICDM 2013 Workshop Proceedings | null | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rating and recommendation systems have become a popular application area for
applying a suite of machine learning techniques. Current approaches rely
primarily on probabilistic interpretations and extensions of matrix
factorization, which factorizes a user-item ratings matrix into latent user and
item vectors. Most of these methods fail to model significant variations in
item ratings from otherwise similar users, a phenomenon known as the "Napoleon
Dynamite" effect. Recent efforts have addressed this problem by adding a
contextual bias term to the rating, which captures the mood under which a user
rates an item or the context in which an item is rated by a user. In this work,
we extend this model in a nonparametric sense by learning the optimal number of
moods or contexts from the data, and derive Gibbs sampling inference procedures
for our model. We evaluate our approach on the MovieLens 1M dataset, and show
significant improvements over the optimal parametric baseline, more than twice
the improvements previously encountered for this task. We also extract and
evaluate a DBLP dataset, wherein we predict the number of papers co-authored by
two authors, and present improvements over the parametric baseline on this
alternative domain as well.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 02:39:15 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Saluja",
"Avneesh",
""
],
[
"Pakdaman",
"Mahdi",
""
],
[
"Piao",
"Dongzhen",
""
],
[
"Parikh",
"Ankur P.",
""
]
] | TITLE: Infinite Mixed Membership Matrix Factorization
ABSTRACT: Rating and recommendation systems have become a popular application area for
applying a suite of machine learning techniques. Current approaches rely
primarily on probabilistic interpretations and extensions of matrix
factorization, which factorizes a user-item ratings matrix into latent user and
item vectors. Most of these methods fail to model significant variations in
item ratings from otherwise similar users, a phenomenon known as the "Napoleon
Dynamite" effect. Recent efforts have addressed this problem by adding a
contextual bias term to the rating, which captures the mood under which a user
rates an item or the context in which an item is rated by a user. In this work,
we extend this model in a nonparametric sense by learning the optimal number of
moods or contexts from the data, and derive Gibbs sampling inference procedures
for our model. We evaluate our approach on the MovieLens 1M dataset, and show
significant improvements over the optimal parametric baseline, more than twice
the improvements previously encountered for this task. We also extract and
evaluate a DBLP dataset, wherein we predict the number of papers co-authored by
two authors, and present improvements over the parametric baseline on this
alternative domain as well.
|
1401.3427 | Laurent Miclet | Laurent Miclet, Sabri Bayoudh, Arnaud Delhay | Analogical Dissimilarity: Definition, Algorithms and Two Experiments in
Machine Learning | null | Journal Of Artificial Intelligence Research, Volume 32, pages
793-824, 2008 | 10.1613/jair.2519 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper defines the notion of analogical dissimilarity between four
objects, with a special focus on objects structured as sequences. Firstly, it
studies the case where the four objects have a null analogical dissimilarity,
i.e. are in analogical proportion. Secondly, when one of these objects is
unknown, it gives algorithms to compute it. Thirdly, it tackles the problem of
defining analogical dissimilarity, which is a measure of how far four objects
are from being in analogical proportion. In particular, when objects are
sequences, it gives a definition and an algorithm based on an optimal alignment
of the four sequences. It gives also learning algorithms, i.e. methods to find
the triple of objects in a learning sample which has the least analogical
dissimilarity with a given object. Two practical experiments are described: the
first is a classification problem on benchmarks of binary and nominal data, the
second shows how the generation of sequences by solving analogical equations
enables a handwritten character recognition system to rapidly be adapted to a
new writer.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 04:42:13 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Miclet",
"Laurent",
""
],
[
"Bayoudh",
"Sabri",
""
],
[
"Delhay",
"Arnaud",
""
]
] | TITLE: Analogical Dissimilarity: Definition, Algorithms and Two Experiments in
Machine Learning
ABSTRACT: This paper defines the notion of analogical dissimilarity between four
objects, with a special focus on objects structured as sequences. Firstly, it
studies the case where the four objects have a null analogical dissimilarity,
i.e. are in analogical proportion. Secondly, when one of these objects is
unknown, it gives algorithms to compute it. Thirdly, it tackles the problem of
defining analogical dissimilarity, which is a measure of how far four objects
are from being in analogical proportion. In particular, when objects are
sequences, it gives a definition and an algorithm based on an optimal alignment
of the four sequences. It gives also learning algorithms, i.e. methods to find
the triple of objects in a learning sample which has the least analogical
dissimilarity with a given object. Two practical experiments are described: the
first is a classification problem on benchmarks of binary and nominal data, the
second shows how the generation of sequences by solving analogical equations
enables a handwritten character recognition system to rapidly be adapted to a
new writer.
|
1401.3431 | James Delgrande | James Delgrande, Yi Jin, Francis Jeffry Pelletier | Compositional Belief Update | null | Journal Of Artificial Intelligence Research, Volume 32, pages
757-791, 2008 | 10.1613/jair.2539 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we explore a class of belief update operators, in which the
definition of the operator is compositional with respect to the sentence to be
added. The goal is to provide an update operator that is intuitive, in that its
definition is based on a recursive decomposition of the update sentences
structure, and that may be reasonably implemented. In addressing update, we
first provide a definition phrased in terms of the models of a knowledge base.
While this operator satisfies a core group of the benchmark Katsuno-Mendelzon
update postulates, not all of the postulates are satisfied. Other
Katsuno-Mendelzon postulates can be obtained by suitably restricting the
syntactic form of the sentence for update, as we show. In restricting the
syntactic form of the sentence for update, we also obtain a hierarchy of update
operators with Winsletts standard semantics as the most basic interesting
approach captured. We subsequently give an algorithm which captures this
approach; in the general case the algorithm is exponential, but with some
not-unreasonable assumptions we obtain an algorithm that is linear in the size
of the knowledge base. Hence the resulting approach has much better complexity
characteristics than other operators in some situations. We also explore other
compositional belief change operators: erasure is developed as a dual operator
to update; we show that a forget operator is definable in terms of update; and
we give a definition of the compositional revision operator. We obtain that
compositional revision, under the most natural definition, yields the Satoh
revision operator.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 04:48:21 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Delgrande",
"James",
""
],
[
"Jin",
"Yi",
""
],
[
"Pelletier",
"Francis Jeffry",
""
]
] | TITLE: Compositional Belief Update
ABSTRACT: In this paper we explore a class of belief update operators, in which the
definition of the operator is compositional with respect to the sentence to be
added. The goal is to provide an update operator that is intuitive, in that its
definition is based on a recursive decomposition of the update sentences
structure, and that may be reasonably implemented. In addressing update, we
first provide a definition phrased in terms of the models of a knowledge base.
While this operator satisfies a core group of the benchmark Katsuno-Mendelzon
update postulates, not all of the postulates are satisfied. Other
Katsuno-Mendelzon postulates can be obtained by suitably restricting the
syntactic form of the sentence for update, as we show. In restricting the
syntactic form of the sentence for update, we also obtain a hierarchy of update
operators with Winsletts standard semantics as the most basic interesting
approach captured. We subsequently give an algorithm which captures this
approach; in the general case the algorithm is exponential, but with some
not-unreasonable assumptions we obtain an algorithm that is linear in the size
of the knowledge base. Hence the resulting approach has much better complexity
characteristics than other operators in some situations. We also explore other
compositional belief change operators: erasure is developed as a dual operator
to update; we show that a forget operator is definable in terms of update; and
we give a definition of the compositional revision operator. We obtain that
compositional revision, under the most natural definition, yields the Satoh
revision operator.
|
1401.3434 | Bal\'azs Csan\'ad Cs\'aji | Bal\'azs Csan\'ad Cs\'aji, L\'aszl\'o Monostori | Adaptive Stochastic Resource Control: A Machine Learning Approach | null | Journal Of Artificial Intelligence Research, Volume 32, pages
453-486, 2008 | 10.1613/jair.2548 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper investigates stochastic resource allocation problems with scarce,
reusable resources and non-preemtive, time-dependent, interconnected tasks.
This approach is a natural generalization of several standard resource
management problems, such as scheduling and transportation problems. First,
reactive solutions are considered and defined as control policies of suitably
reformulated Markov decision processes (MDPs). We argue that this reformulation
has several favorable properties, such as it has finite state and action
spaces, it is aperiodic, hence all policies are proper and the space of control
policies can be safely restricted. Next, approximate dynamic programming (ADP)
methods, such as fitted Q-learning, are suggested for computing an efficient
control policy. In order to compactly maintain the cost-to-go function, two
representations are studied: hash tables and support vector regression (SVR),
particularly, nu-SVRs. Several additional improvements, such as the application
of limited-lookahead rollout algorithms in the initial phases, action space
decomposition, task clustering and distributed sampling are investigated, too.
Finally, experimental results on both benchmark and industry-related data are
presented.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 04:50:50 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Csáji",
"Balázs Csanád",
""
],
[
"Monostori",
"László",
""
]
] | TITLE: Adaptive Stochastic Resource Control: A Machine Learning Approach
ABSTRACT: The paper investigates stochastic resource allocation problems with scarce,
reusable resources and non-preemtive, time-dependent, interconnected tasks.
This approach is a natural generalization of several standard resource
management problems, such as scheduling and transportation problems. First,
reactive solutions are considered and defined as control policies of suitably
reformulated Markov decision processes (MDPs). We argue that this reformulation
has several favorable properties, such as it has finite state and action
spaces, it is aperiodic, hence all policies are proper and the space of control
policies can be safely restricted. Next, approximate dynamic programming (ADP)
methods, such as fitted Q-learning, are suggested for computing an efficient
control policy. In order to compactly maintain the cost-to-go function, two
representations are studied: hash tables and support vector regression (SVR),
particularly, nu-SVRs. Several additional improvements, such as the application
of limited-lookahead rollout algorithms in the initial phases, action space
decomposition, task clustering and distributed sampling are investigated, too.
Finally, experimental results on both benchmark and industry-related data are
presented.
|
1401.3447 | Saher Esmeir | Saher Esmeir, Shaul Markovitch | Anytime Induction of Low-cost, Low-error Classifiers: a Sampling-based
Approach | null | Journal Of Artificial Intelligence Research, Volume 33, pages
1-31, 2008 | 10.1613/jair.2602 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine learning techniques are gaining prevalence in the production of a
wide range of classifiers for complex real-world applications with nonuniform
testing and misclassification costs. The increasing complexity of these
applications poses a real challenge to resource management during learning and
classification. In this work we introduce ACT (anytime cost-sensitive tree
learner), a novel framework for operating in such complex environments. ACT is
an anytime algorithm that allows learning time to be increased in return for
lower classification costs. It builds a tree top-down and exploits additional
time resources to obtain better estimations for the utility of the different
candidate splits. Using sampling techniques, ACT approximates the cost of the
subtree under each candidate split and favors the one with a minimal cost. As a
stochastic algorithm, ACT is expected to be able to escape local minima, into
which greedy methods may be trapped. Experiments with a variety of datasets
were conducted to compare ACT to the state-of-the-art cost-sensitive tree
learners. The results show that for the majority of domains ACT produces
significantly less costly trees. ACT also exhibits good anytime behavior with
diminishing returns.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 05:09:07 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Esmeir",
"Saher",
""
],
[
"Markovitch",
"Shaul",
""
]
] | TITLE: Anytime Induction of Low-cost, Low-error Classifiers: a Sampling-based
Approach
ABSTRACT: Machine learning techniques are gaining prevalence in the production of a
wide range of classifiers for complex real-world applications with nonuniform
testing and misclassification costs. The increasing complexity of these
applications poses a real challenge to resource management during learning and
classification. In this work we introduce ACT (anytime cost-sensitive tree
learner), a novel framework for operating in such complex environments. ACT is
an anytime algorithm that allows learning time to be increased in return for
lower classification costs. It builds a tree top-down and exploits additional
time resources to obtain better estimations for the utility of the different
candidate splits. Using sampling techniques, ACT approximates the cost of the
subtree under each candidate split and favors the one with a minimal cost. As a
stochastic algorithm, ACT is expected to be able to escape local minima, into
which greedy methods may be trapped. Experiments with a variety of datasets
were conducted to compare ACT to the state-of-the-art cost-sensitive tree
learners. The results show that for the majority of domains ACT produces
significantly less costly trees. ACT also exhibits good anytime behavior with
diminishing returns.
|
1401.3454 | Sherief Abdallah | Sherief Abdallah, Victor Lesser | A Multiagent Reinforcement Learning Algorithm with Non-linear Dynamics | null | Journal Of Artificial Intelligence Research, Volume 33, pages
521-549, 2008 | 10.1613/jair.2628 | null | cs.LG cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several multiagent reinforcement learning (MARL) algorithms have been
proposed to optimize agents decisions. Due to the complexity of the problem,
the majority of the previously developed MARL algorithms assumed agents either
had some knowledge of the underlying game (such as Nash equilibria) and/or
observed other agents actions and the rewards they received.
We introduce a new MARL algorithm called the Weighted Policy Learner (WPL),
which allows agents to reach a Nash Equilibrium (NE) in benchmark
2-player-2-action games with minimum knowledge. Using WPL, the only feedback an
agent needs is its own local reward (the agent does not observe other agents
actions or rewards). Furthermore, WPL does not assume that agents know the
underlying game or the corresponding Nash Equilibrium a priori. We
experimentally show that our algorithm converges in benchmark
two-player-two-action games. We also show that our algorithm converges in the
challenging Shapleys game where previous MARL algorithms failed to converge
without knowing the underlying game or the NE. Furthermore, we show that WPL
outperforms the state-of-the-art algorithms in a more realistic setting of 100
agents interacting and learning concurrently.
An important aspect of understanding the behavior of a MARL algorithm is
analyzing the dynamics of the algorithm: how the policies of multiple learning
agents evolve over time as agents interact with one another. Such an analysis
not only verifies whether agents using a given MARL algorithm will eventually
converge, but also reveals the behavior of the MARL algorithm prior to
convergence. We analyze our algorithm in two-player-two-action games and show
that symbolically proving WPLs convergence is difficult, because of the
non-linear nature of WPLs dynamics, unlike previous MARL algorithms that had
either linear or piece-wise-linear dynamics. Instead, we numerically solve WPLs
dynamics differential equations and compare the solution to the dynamics of
previous MARL algorithms.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 05:13:47 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Abdallah",
"Sherief",
""
],
[
"Lesser",
"Victor",
""
]
] | TITLE: A Multiagent Reinforcement Learning Algorithm with Non-linear Dynamics
ABSTRACT: Several multiagent reinforcement learning (MARL) algorithms have been
proposed to optimize agents decisions. Due to the complexity of the problem,
the majority of the previously developed MARL algorithms assumed agents either
had some knowledge of the underlying game (such as Nash equilibria) and/or
observed other agents actions and the rewards they received.
We introduce a new MARL algorithm called the Weighted Policy Learner (WPL),
which allows agents to reach a Nash Equilibrium (NE) in benchmark
2-player-2-action games with minimum knowledge. Using WPL, the only feedback an
agent needs is its own local reward (the agent does not observe other agents
actions or rewards). Furthermore, WPL does not assume that agents know the
underlying game or the corresponding Nash Equilibrium a priori. We
experimentally show that our algorithm converges in benchmark
two-player-two-action games. We also show that our algorithm converges in the
challenging Shapleys game where previous MARL algorithms failed to converge
without knowing the underlying game or the NE. Furthermore, we show that WPL
outperforms the state-of-the-art algorithms in a more realistic setting of 100
agents interacting and learning concurrently.
An important aspect of understanding the behavior of a MARL algorithm is
analyzing the dynamics of the algorithm: how the policies of multiple learning
agents evolve over time as agents interact with one another. Such an analysis
not only verifies whether agents using a given MARL algorithm will eventually
converge, but also reveals the behavior of the MARL algorithm prior to
convergence. We analyze our algorithm in two-player-two-action games and show
that symbolically proving WPLs convergence is difficult, because of the
non-linear nature of WPLs dynamics, unlike previous MARL algorithms that had
either linear or piece-wise-linear dynamics. Instead, we numerically solve WPLs
dynamics differential equations and compare the solution to the dynamics of
previous MARL algorithms.
|
1401.3463 | Roberto Sebastiani | Roberto Sebastiani, Michele Vescovi | Automated Reasoning in Modal and Description Logics via SAT Encoding:
the Case Study of K(m)/ALC-Satisfiability | null | Journal Of Artificial Intelligence Research, Volume 35, pages
343-389, 2009 | 10.1613/jair.2675 | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last two decades, modal and description logics have been applied to
numerous areas of computer science, including knowledge representation, formal
verification, database theory, distributed computing and, more recently,
semantic web and ontologies. For this reason, the problem of automated
reasoning in modal and description logics has been thoroughly investigated. In
particular, many approaches have been proposed for efficiently handling the
satisfiability of the core normal modal logic K(m), and of its notational
variant, the description logic ALC. Although simple in structure, K(m)/ALC is
computationally very hard to reason on, its satisfiability being
PSPACE-complete.
In this paper we start exploring the idea of performing automated reasoning
tasks in modal and description logics by encoding them into SAT, so that to be
handled by state-of-the-art SAT tools; as with most previous approaches, we
begin our investigation from the satisfiability in K(m). We propose an
efficient encoding, and we test it on an extensive set of benchmarks, comparing
the approach with the main state-of-the-art tools available. Although the
encoding is necessarily worst-case exponential, from our experiments we notice
that, in practice, this approach can handle most or all the problems which are
at the reach of the other approaches, with performances which are comparable
with, or even better than, those of the current state-of-the-art tools.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 05:22:19 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Sebastiani",
"Roberto",
""
],
[
"Vescovi",
"Michele",
""
]
] | TITLE: Automated Reasoning in Modal and Description Logics via SAT Encoding:
the Case Study of K(m)/ALC-Satisfiability
ABSTRACT: In the last two decades, modal and description logics have been applied to
numerous areas of computer science, including knowledge representation, formal
verification, database theory, distributed computing and, more recently,
semantic web and ontologies. For this reason, the problem of automated
reasoning in modal and description logics has been thoroughly investigated. In
particular, many approaches have been proposed for efficiently handling the
satisfiability of the core normal modal logic K(m), and of its notational
variant, the description logic ALC. Although simple in structure, K(m)/ALC is
computationally very hard to reason on, its satisfiability being
PSPACE-complete.
In this paper we start exploring the idea of performing automated reasoning
tasks in modal and description logics by encoding them into SAT, so that to be
handled by state-of-the-art SAT tools; as with most previous approaches, we
begin our investigation from the satisfiability in K(m). We propose an
efficient encoding, and we test it on an extensive set of benchmarks, comparing
the approach with the main state-of-the-art tools available. Although the
encoding is necessarily worst-case exponential, from our experiments we notice
that, in practice, this approach can handle most or all the problems which are
at the reach of the other approaches, with performances which are comparable
with, or even better than, those of the current state-of-the-art tools.
|
1401.3466 | Talal Rahwan | Talal Rahwan, Sarvapali Dyanand Ramchurn, Nicholas Robert Jennings,
Andrea Giovannucci | An Anytime Algorithm for Optimal Coalition Structure Generation | null | Journal Of Artificial Intelligence Research, Volume 34, pages
521-567, 2009 | 10.1613/jair.2695 | null | cs.MA cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coalition formation is a fundamental type of interaction that involves the
creation of coherent groupings of distinct, autonomous, agents in order to
efficiently achieve their individual or collective goals. Forming effective
coalitions is a major research challenge in the field of multi-agent systems.
Central to this endeavour is the problem of determining which of the many
possible coalitions to form in order to achieve some goal. This usually
requires calculating a value for every possible coalition, known as the
coalition value, which indicates how beneficial that coalition would be if it
was formed. Once these values are calculated, the agents usually need to find a
combination of coalitions, in which every agent belongs to exactly one
coalition, and by which the overall outcome of the system is maximized.
However, this coalition structure generation problem is extremely challenging
due to the number of possible solutions that need to be examined, which grows
exponentially with the number of agents involved. To date, therefore, many
algorithms have been proposed to solve this problem using different techniques
ranging from dynamic programming, to integer programming, to stochastic search
all of which suffer from major limitations relating to execution time, solution
quality, and memory requirements.
With this in mind, we develop an anytime algorithm to solve the coalition
structure generation problem. Specifically, the algorithm uses a novel
representation of the search space, which partitions the space of possible
solutions into sub-spaces such that it is possible to compute upper and lower
bounds on the values of the best coalition structures in them. These bounds are
then used to identify the sub-spaces that have no potential of containing the
optimal solution so that they can be pruned. The algorithm, then, searches
through the remaining sub-spaces very efficiently using a branch-and-bound
technique to avoid examining all the solutions within the searched subspace(s).
In this setting, we prove that our algorithm enumerates all coalition
structures efficiently by avoiding redundant and invalid solutions
automatically. Moreover, in order to effectively test our algorithm we develop
a new type of input distribution which allows us to generate more reliable
benchmarks compared to the input distributions previously used in the field.
Given this new distribution, we show that for 27 agents our algorithm is able
to find solutions that are optimal in 0.175% of the time required by the
fastest available algorithm in the literature. The algorithm is anytime, and if
interrupted before it would have normally terminated, it can still provide a
solution that is guaranteed to be within a bound from the optimal one.
Moreover, the guarantees we provide on the quality of the solution are
significantly better than those provided by the previous state of the art
algorithms designed for this purpose. For example, for the worst case
distribution given 25 agents, our algorithm is able to find a 90% efficient
solution in around 10% of time it takes to find the optimal solution.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 05:23:56 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Rahwan",
"Talal",
""
],
[
"Ramchurn",
"Sarvapali Dyanand",
""
],
[
"Jennings",
"Nicholas Robert",
""
],
[
"Giovannucci",
"Andrea",
""
]
] | TITLE: An Anytime Algorithm for Optimal Coalition Structure Generation
ABSTRACT: Coalition formation is a fundamental type of interaction that involves the
creation of coherent groupings of distinct, autonomous, agents in order to
efficiently achieve their individual or collective goals. Forming effective
coalitions is a major research challenge in the field of multi-agent systems.
Central to this endeavour is the problem of determining which of the many
possible coalitions to form in order to achieve some goal. This usually
requires calculating a value for every possible coalition, known as the
coalition value, which indicates how beneficial that coalition would be if it
was formed. Once these values are calculated, the agents usually need to find a
combination of coalitions, in which every agent belongs to exactly one
coalition, and by which the overall outcome of the system is maximized.
However, this coalition structure generation problem is extremely challenging
due to the number of possible solutions that need to be examined, which grows
exponentially with the number of agents involved. To date, therefore, many
algorithms have been proposed to solve this problem using different techniques
ranging from dynamic programming, to integer programming, to stochastic search
all of which suffer from major limitations relating to execution time, solution
quality, and memory requirements.
With this in mind, we develop an anytime algorithm to solve the coalition
structure generation problem. Specifically, the algorithm uses a novel
representation of the search space, which partitions the space of possible
solutions into sub-spaces such that it is possible to compute upper and lower
bounds on the values of the best coalition structures in them. These bounds are
then used to identify the sub-spaces that have no potential of containing the
optimal solution so that they can be pruned. The algorithm, then, searches
through the remaining sub-spaces very efficiently using a branch-and-bound
technique to avoid examining all the solutions within the searched subspace(s).
In this setting, we prove that our algorithm enumerates all coalition
structures efficiently by avoiding redundant and invalid solutions
automatically. Moreover, in order to effectively test our algorithm we develop
a new type of input distribution which allows us to generate more reliable
benchmarks compared to the input distributions previously used in the field.
Given this new distribution, we show that for 27 agents our algorithm is able
to find solutions that are optimal in 0.175% of the time required by the
fastest available algorithm in the literature. The algorithm is anytime, and if
interrupted before it would have normally terminated, it can still provide a
solution that is guaranteed to be within a bound from the optimal one.
Moreover, the guarantees we provide on the quality of the solution are
significantly better than those provided by the previous state of the art
algorithms designed for this purpose. For example, for the worst case
distribution given 25 agents, our algorithm is able to find a 90% efficient
solution in around 10% of time it takes to find the optimal solution.
|
1401.3468 | Hector Geffner | Hector Palacios, Hector Geffner | Compiling Uncertainty Away in Conformant Planning Problems with Bounded
Width | null | Journal Of Artificial Intelligence Research, Volume 35, pages
623-675, 2009 | 10.1613/jair.2708 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conformant planning is the problem of finding a sequence of actions for
achieving a goal in the presence of uncertainty in the initial state or action
effects. The problem has been approached as a path-finding problem in belief
space where good belief representations and heuristics are critical for scaling
up. In this work, a different formulation is introduced for conformant problems
with deterministic actions where they are automatically converted into
classical ones and solved by an off-the-shelf classical planner. The
translation maps literals L and sets of assumptions t about the initial
situation, into new literals KL/t that represent that L must be true if t is
initially true. We lay out a general translation scheme that is sound and
establish the conditions under which the translation is also complete. We show
that the complexity of the complete translation is exponential in a parameter
of the problem called the conformant width, which for most benchmarks is
bounded. The planner based on this translation exhibits good performance in
comparison with existing planners, and is the basis for T0, the best performing
planner in the Conformant Track of the 2006 International Planning Competition.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 05:27:00 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Palacios",
"Hector",
""
],
[
"Geffner",
"Hector",
""
]
] | TITLE: Compiling Uncertainty Away in Conformant Planning Problems with Bounded
Width
ABSTRACT: Conformant planning is the problem of finding a sequence of actions for
achieving a goal in the presence of uncertainty in the initial state or action
effects. The problem has been approached as a path-finding problem in belief
space where good belief representations and heuristics are critical for scaling
up. In this work, a different formulation is introduced for conformant problems
with deterministic actions where they are automatically converted into
classical ones and solved by an off-the-shelf classical planner. The
translation maps literals L and sets of assumptions t about the initial
situation, into new literals KL/t that represent that L must be true if t is
initially true. We lay out a general translation scheme that is sound and
establish the conditions under which the translation is also complete. We show
that the complexity of the complete translation is exponential in a parameter
of the problem called the conformant width, which for most benchmarks is
bounded. The planner based on this translation exhibits good performance in
comparison with existing planners, and is the basis for T0, the best performing
planner in the Conformant Track of the 2006 International Planning Competition.
|
1401.3474 | Andreas Krause | Andreas Krause, Carlos Guestrin | Optimal Value of Information in Graphical Models | null | Journal Of Artificial Intelligence Research, Volume 35, pages
557-591, 2009 | 10.1613/jair.2737 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many real-world decision making tasks require us to choose among several
expensive observations. In a sensor network, for example, it is important to
select the subset of sensors that is expected to provide the strongest
reduction in uncertainty. In medical decision making tasks, one needs to select
which tests to administer before deciding on the most effective treatment. It
has been general practice to use heuristic-guided procedures for selecting
observations. In this paper, we present the first efficient optimal algorithms
for selecting observations for a class of probabilistic graphical models. For
example, our algorithms allow to optimally label hidden variables in Hidden
Markov Models (HMMs). We provide results for both selecting the optimal subset
of observations, and for obtaining an optimal conditional observation plan.
Furthermore we prove a surprising result: In most graphical models tasks, if
one designs an efficient algorithm for chain graphs, such as HMMs, this
procedure can be generalized to polytree graphical models. We prove that the
optimizing value of information is $NP^{PP}$-hard even for polytrees. It also
follows from our results that just computing decision theoretic value of
information objective functions, which are commonly used in practice, is a
#P-complete problem even on Naive Bayes models (a simple special case of
polytrees).
In addition, we consider several extensions, such as using our algorithms for
scheduling observation selection for multiple sensors. We demonstrate the
effectiveness of our approach on several real-world datasets, including a
prototype sensor network deployment for energy conservation in buildings.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 05:30:52 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Krause",
"Andreas",
""
],
[
"Guestrin",
"Carlos",
""
]
] | TITLE: Optimal Value of Information in Graphical Models
ABSTRACT: Many real-world decision making tasks require us to choose among several
expensive observations. In a sensor network, for example, it is important to
select the subset of sensors that is expected to provide the strongest
reduction in uncertainty. In medical decision making tasks, one needs to select
which tests to administer before deciding on the most effective treatment. It
has been general practice to use heuristic-guided procedures for selecting
observations. In this paper, we present the first efficient optimal algorithms
for selecting observations for a class of probabilistic graphical models. For
example, our algorithms allow to optimally label hidden variables in Hidden
Markov Models (HMMs). We provide results for both selecting the optimal subset
of observations, and for obtaining an optimal conditional observation plan.
Furthermore we prove a surprising result: In most graphical models tasks, if
one designs an efficient algorithm for chain graphs, such as HMMs, this
procedure can be generalized to polytree graphical models. We prove that the
optimizing value of information is $NP^{PP}$-hard even for polytrees. It also
follows from our results that just computing decision theoretic value of
information objective functions, which are commonly used in practice, is a
#P-complete problem even on Naive Bayes models (a simple special case of
polytrees).
In addition, we consider several extensions, such as using our algorithms for
scheduling observation selection for multiple sensors. We demonstrate the
effectiveness of our approach on several real-world datasets, including a
prototype sensor network deployment for energy conservation in buildings.
|
1401.3510 | Saurabh Varshney Mr. | Saurabh Varshney and Jyoti Bajpai | Improving Performance Of English-Hindi Cross Language Information
Retrieval Using Transliteration Of Query Terms | International Journal on Natural Language Computing (IJNLC) Vol. 2,
No.6, December 2013 http://airccse.org/journal/ijnlc/index.html | null | 10.5121/ijnlc.2013.2604 | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main issue in Cross Language Information Retrieval (CLIR) is the poor
performance of retrieval in terms of average precision when compared to
monolingual retrieval performance. The main reasons behind poor performance of
CLIR are mismatching of query terms, lexical ambiguity and un-translated query
terms. The existing problems of CLIR are needed to be addressed in order to
increase the performance of the CLIR system. In this paper, we are putting our
effort to solve the given problem by proposed an algorithm for improving the
performance of English-Hindi CLIR system. We used all possible combination of
Hindi translated query using transliteration of English query terms and
choosing the best query among them for retrieval of documents. The experiment
is performed on FIRE 2010 (Forum of Information Retrieval Evaluation) datasets.
The experimental result show that the proposed approach gives better
performance of English-Hindi CLIR system and also helps in overcoming existing
problems and outperforms the existing English-Hindi CLIR system in terms of
average precision.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2014 08:07:08 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Varshney",
"Saurabh",
""
],
[
"Bajpai",
"Jyoti",
""
]
] | TITLE: Improving Performance Of English-Hindi Cross Language Information
Retrieval Using Transliteration Of Query Terms
ABSTRACT: The main issue in Cross Language Information Retrieval (CLIR) is the poor
performance of retrieval in terms of average precision when compared to
monolingual retrieval performance. The main reasons behind poor performance of
CLIR are mismatching of query terms, lexical ambiguity and un-translated query
terms. The existing problems of CLIR are needed to be addressed in order to
increase the performance of the CLIR system. In this paper, we are putting our
effort to solve the given problem by proposed an algorithm for improving the
performance of English-Hindi CLIR system. We used all possible combination of
Hindi translated query using transliteration of English query terms and
choosing the best query among them for retrieval of documents. The experiment
is performed on FIRE 2010 (Forum of Information Retrieval Evaluation) datasets.
The experimental result show that the proposed approach gives better
performance of English-Hindi CLIR system and also helps in overcoming existing
problems and outperforms the existing English-Hindi CLIR system in terms of
average precision.
|
1401.3615 | Johannes Hofmann | Johannes Hofmann, Jan Treibig, Georg Hager, Gerhard Wellein | Performance Engineering for a Medical Imaging Application on the Intel
Xeon Phi Accelerator | null | null | null | null | cs.DC cs.CV cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examine the Xeon Phi, which is based on Intel's Many Integrated Cores
architecture, for its suitability to run the FDK algorithm--the most commonly
used algorithm to perform the 3D image reconstruction in cone-beam computed
tomography. We study the challenges of efficiently parallelizing the
application and means to enable sensible data sharing between threads despite
the lack of a shared last level cache. Apart from parallelization, SIMD
vectorization is critical for good performance on the Xeon Phi; we perform
various micro-benchmarks to investigate the platform's new set of vector
instructions and put a special emphasis on the newly introduced vector gather
capability. We refine a previous performance model for the application and
adapt it for the Xeon Phi to validate the performance of our optimized
hand-written assembly implementation, as well as the performance of several
different auto-vectorization approaches.
| [
{
"version": "v1",
"created": "Tue, 17 Dec 2013 14:46:19 GMT"
}
] | 2014-01-16T00:00:00 | [
[
"Hofmann",
"Johannes",
""
],
[
"Treibig",
"Jan",
""
],
[
"Hager",
"Georg",
""
],
[
"Wellein",
"Gerhard",
""
]
] | TITLE: Performance Engineering for a Medical Imaging Application on the Intel
Xeon Phi Accelerator
ABSTRACT: We examine the Xeon Phi, which is based on Intel's Many Integrated Cores
architecture, for its suitability to run the FDK algorithm--the most commonly
used algorithm to perform the 3D image reconstruction in cone-beam computed
tomography. We study the challenges of efficiently parallelizing the
application and means to enable sensible data sharing between threads despite
the lack of a shared last level cache. Apart from parallelization, SIMD
vectorization is critical for good performance on the Xeon Phi; we perform
various micro-benchmarks to investigate the platform's new set of vector
instructions and put a special emphasis on the newly introduced vector gather
capability. We refine a previous performance model for the application and
adapt it for the Xeon Phi to validate the performance of our optimized
hand-written assembly implementation, as well as the performance of several
different auto-vectorization approaches.
|
1401.2912 | Ragesh Jaiswal | Anup Bhattacharya, Ragesh Jaiswal, Nir Ailon | A tight lower bound instance for k-means++ in constant dimension | To appear in TAMC 2014. arXiv admin note: text overlap with
arXiv:1306.4207 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The k-means++ seeding algorithm is one of the most popular algorithms that is
used for finding the initial $k$ centers when using the k-means heuristic. The
algorithm is a simple sampling procedure and can be described as follows: Pick
the first center randomly from the given points. For $i > 1$, pick a point to
be the $i^{th}$ center with probability proportional to the square of the
Euclidean distance of this point to the closest previously $(i-1)$ chosen
centers.
The k-means++ seeding algorithm is not only simple and fast but also gives an
$O(\log{k})$ approximation in expectation as shown by Arthur and Vassilvitskii.
There are datasets on which this seeding algorithm gives an approximation
factor of $\Omega(\log{k})$ in expectation. However, it is not clear from these
results if the algorithm achieves good approximation factor with reasonably
high probability (say $1/poly(k)$). Brunsch and R\"{o}glin gave a dataset where
the k-means++ seeding algorithm achieves an $O(\log{k})$ approximation ratio
with probability that is exponentially small in $k$. However, this and all
other known lower-bound examples are high dimensional. So, an open problem was
to understand the behavior of the algorithm on low dimensional datasets. In
this work, we give a simple two dimensional dataset on which the seeding
algorithm achieves an $O(\log{k})$ approximation ratio with probability
exponentially small in $k$. This solves open problems posed by Mahajan et al.
and by Brunsch and R\"{o}glin.
| [
{
"version": "v1",
"created": "Mon, 13 Jan 2014 16:57:57 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Jan 2014 04:06:30 GMT"
}
] | 2014-01-15T00:00:00 | [
[
"Bhattacharya",
"Anup",
""
],
[
"Jaiswal",
"Ragesh",
""
],
[
"Ailon",
"Nir",
""
]
] | TITLE: A tight lower bound instance for k-means++ in constant dimension
ABSTRACT: The k-means++ seeding algorithm is one of the most popular algorithms that is
used for finding the initial $k$ centers when using the k-means heuristic. The
algorithm is a simple sampling procedure and can be described as follows: Pick
the first center randomly from the given points. For $i > 1$, pick a point to
be the $i^{th}$ center with probability proportional to the square of the
Euclidean distance of this point to the closest previously $(i-1)$ chosen
centers.
The k-means++ seeding algorithm is not only simple and fast but also gives an
$O(\log{k})$ approximation in expectation as shown by Arthur and Vassilvitskii.
There are datasets on which this seeding algorithm gives an approximation
factor of $\Omega(\log{k})$ in expectation. However, it is not clear from these
results if the algorithm achieves good approximation factor with reasonably
high probability (say $1/poly(k)$). Brunsch and R\"{o}glin gave a dataset where
the k-means++ seeding algorithm achieves an $O(\log{k})$ approximation ratio
with probability that is exponentially small in $k$. However, this and all
other known lower-bound examples are high dimensional. So, an open problem was
to understand the behavior of the algorithm on low dimensional datasets. In
this work, we give a simple two dimensional dataset on which the seeding
algorithm achieves an $O(\log{k})$ approximation ratio with probability
exponentially small in $k$. This solves open problems posed by Mahajan et al.
and by Brunsch and R\"{o}glin.
|
1401.3041 | Maxime Chevalier-Boisvert | Maxime Chevalier-Boisvert, Marc Feeley | Removing Dynamic Type Tests with Context-Driven Basic Block Versioning | 22 pages, 10 figures | null | null | null | cs.PL cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic typing is an important feature of dynamic programming languages.
Primitive operators such as those for performing arithmetic and comparisons
typically operate on a wide variety of in put value types, and as such, must
internally implement some form of dynamic type dispatch and type checking.
Removing such type tests is important for an efficient implementation.
In this paper, we examine the effectiveness of a novel approach to reducing
the number of dynamically executed type tests called context-driven basic block
versioning. This simple technique clones and specializes basic blocks in such a
way as to allow the compiler to accumulate type information while machine code
is generated, without a separate type analysis pass. The accumulated
information allows the removal of some redundant type tests, particularly in
performance-critical paths.
We have implemented intraprocedural context-driven basic block versioning in
a JavaScript JIT compiler. For comparison, we have also implemented a classical
flow-based type analysis operating on the same concrete types. Our results show
that basic block versioning performs better on most benchmarks and removes a
large fraction of type tests at the expense of a moderate code size increase.
We believe that this technique offers a good tradeoff between implementation
complexity and performance, and is suitable for integration in production JIT
compilers.
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2014 00:25:38 GMT"
}
] | 2014-01-15T00:00:00 | [
[
"Chevalier-Boisvert",
"Maxime",
""
],
[
"Feeley",
"Marc",
""
]
] | TITLE: Removing Dynamic Type Tests with Context-Driven Basic Block Versioning
ABSTRACT: Dynamic typing is an important feature of dynamic programming languages.
Primitive operators such as those for performing arithmetic and comparisons
typically operate on a wide variety of in put value types, and as such, must
internally implement some form of dynamic type dispatch and type checking.
Removing such type tests is important for an efficient implementation.
In this paper, we examine the effectiveness of a novel approach to reducing
the number of dynamically executed type tests called context-driven basic block
versioning. This simple technique clones and specializes basic blocks in such a
way as to allow the compiler to accumulate type information while machine code
is generated, without a separate type analysis pass. The accumulated
information allows the removal of some redundant type tests, particularly in
performance-critical paths.
We have implemented intraprocedural context-driven basic block versioning in
a JavaScript JIT compiler. For comparison, we have also implemented a classical
flow-based type analysis operating on the same concrete types. Our results show
that basic block versioning performs better on most benchmarks and removes a
large fraction of type tests at the expense of a moderate code size increase.
We believe that this technique offers a good tradeoff between implementation
complexity and performance, and is suitable for integration in production JIT
compilers.
|
1401.3056 | Yujian Pan | Yujian Pan and Xiang Li | Power of individuals -- Controlling centrality of temporal networks | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Temporal networks are such networks where nodes and interactions may appear
and disappear at various time scales. With the evidence of ubiquity of temporal
networks in our economy, nature and society, it's urgent and significant to
focus on structural controllability of temporal networks, which nowadays is
still an untouched topic. We develop graphic tools to study the structural
controllability of temporal networks, identifying the intrinsic mechanism of
the ability of individuals in controlling a dynamic and large-scale temporal
network. Classifying temporal trees of a temporal network into different types,
we give (both upper and lower) analytical bounds of the controlling centrality,
which are verified by numerical simulations of both artificial and empirical
temporal networks. We find that the scale-free distribution of node's
controlling centrality is virtually independent of the time scale and types of
datasets, meaning the inherent heterogeneity and robustness of the controlling
centrality of temporal networks.
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2014 03:02:20 GMT"
}
] | 2014-01-15T00:00:00 | [
[
"Pan",
"Yujian",
""
],
[
"Li",
"Xiang",
""
]
] | TITLE: Power of individuals -- Controlling centrality of temporal networks
ABSTRACT: Temporal networks are such networks where nodes and interactions may appear
and disappear at various time scales. With the evidence of ubiquity of temporal
networks in our economy, nature and society, it's urgent and significant to
focus on structural controllability of temporal networks, which nowadays is
still an untouched topic. We develop graphic tools to study the structural
controllability of temporal networks, identifying the intrinsic mechanism of
the ability of individuals in controlling a dynamic and large-scale temporal
network. Classifying temporal trees of a temporal network into different types,
we give (both upper and lower) analytical bounds of the controlling centrality,
which are verified by numerical simulations of both artificial and empirical
temporal networks. We find that the scale-free distribution of node's
controlling centrality is virtually independent of the time scale and types of
datasets, meaning the inherent heterogeneity and robustness of the controlling
centrality of temporal networks.
|
1401.3126 | Matteo Zignani | Matteo Zignani and Christian Quadri and Sabrina Gaitto and Gian Paolo
Rossi | Exploiting all phone media? A multidimensional network analysis of phone
users' sociality | 8 pages, 1 figure | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The growing awareness that human communications and social interactions are
assuming a stratified structure, due to the availability of multiple
techno-communication channels, including online social networks, mobile phone
calls, short messages (SMS) and e-mails, has recently led to the study of
multidimensional networks, as a step further the classical Social Network
Analysis. A few papers have been dedicated to develop the theoretical framework
to deal with such multiplex networks and to analyze some example of
multidimensional social networks. In this context we perform the first study of
the multiplex mobile social network, gathered from the records of both call and
text message activities of millions of users of a large mobile phone operator
over a period of 12 weeks. While social networks constructed from mobile phone
datasets have drawn great attention in recent years, so far studies have dealt
with text message and call data, separately, providing a very partial view of
people sociality expressed on phone. Here we analyze how the call and the text
message dimensions overlap showing how many information about links and nodes
could be lost only accounting for a single layer and how users adopt different
media channels to interact with their neighborhood.
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2014 10:27:10 GMT"
}
] | 2014-01-15T00:00:00 | [
[
"Zignani",
"Matteo",
""
],
[
"Quadri",
"Christian",
""
],
[
"Gaitto",
"Sabrina",
""
],
[
"Rossi",
"Gian Paolo",
""
]
] | TITLE: Exploiting all phone media? A multidimensional network analysis of phone
users' sociality
ABSTRACT: The growing awareness that human communications and social interactions are
assuming a stratified structure, due to the availability of multiple
techno-communication channels, including online social networks, mobile phone
calls, short messages (SMS) and e-mails, has recently led to the study of
multidimensional networks, as a step further the classical Social Network
Analysis. A few papers have been dedicated to develop the theoretical framework
to deal with such multiplex networks and to analyze some example of
multidimensional social networks. In this context we perform the first study of
the multiplex mobile social network, gathered from the records of both call and
text message activities of millions of users of a large mobile phone operator
over a period of 12 weeks. While social networks constructed from mobile phone
datasets have drawn great attention in recent years, so far studies have dealt
with text message and call data, separately, providing a very partial view of
people sociality expressed on phone. Here we analyze how the call and the text
message dimensions overlap showing how many information about links and nodes
could be lost only accounting for a single layer and how users adopt different
media channels to interact with their neighborhood.
|
1401.3222 | Alexander V. Mantzaris Dr | Alexander V. Mantzaris | Uncovering nodes that spread information between communities in social
networks | null | null | null | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/by/3.0/ | From many datasets gathered in online social networks, well defined community
structures have been observed. A large number of users participate in these
networks and the size of the resulting graphs poses computational challenges.
There is a particular demand in identifying the nodes responsible for
information flow between communities; for example, in temporal Twitter networks
edges between communities play a key role in propagating spikes of activity
when the connectivity between communities is sparse and few edges exist between
different clusters of nodes. The new algorithm proposed here is aimed at
revealing these key connections by measuring a node's vicinity to nodes of
another community. We look at the nodes which have edges in more than one
community and the locality of nodes around them which influence the information
received and broadcasted to them. The method relies on independent random walks
of a chosen fixed number of steps, originating from nodes with edges in more
than one community. For the large networks that we have in mind, existing
measures such as betweenness centrality are difficult to compute, even with
recent methods that approximate the large number of operations required. We
therefore design an algorithm that scales up to the demand of current big data
requirements and has the ability to harness parallel processing capabilities.
The new algorithm is illustrated on synthetic data, where results can be judged
carefully, and also on a real, large scale Twitter activity data, where new
insights can be gained.
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2014 15:30:27 GMT"
}
] | 2014-01-15T00:00:00 | [
[
"Mantzaris",
"Alexander V.",
""
]
] | TITLE: Uncovering nodes that spread information between communities in social
networks
ABSTRACT: From many datasets gathered in online social networks, well defined community
structures have been observed. A large number of users participate in these
networks and the size of the resulting graphs poses computational challenges.
There is a particular demand in identifying the nodes responsible for
information flow between communities; for example, in temporal Twitter networks
edges between communities play a key role in propagating spikes of activity
when the connectivity between communities is sparse and few edges exist between
different clusters of nodes. The new algorithm proposed here is aimed at
revealing these key connections by measuring a node's vicinity to nodes of
another community. We look at the nodes which have edges in more than one
community and the locality of nodes around them which influence the information
received and broadcasted to them. The method relies on independent random walks
of a chosen fixed number of steps, originating from nodes with edges in more
than one community. For the large networks that we have in mind, existing
measures such as betweenness centrality are difficult to compute, even with
recent methods that approximate the large number of operations required. We
therefore design an algorithm that scales up to the demand of current big data
requirements and has the ability to harness parallel processing capabilities.
The new algorithm is illustrated on synthetic data, where results can be judged
carefully, and also on a real, large scale Twitter activity data, where new
insights can be gained.
|
1401.3258 | Jeremy Kun | Rajmonda Caceres, Kevin Carter, Jeremy Kun | A Boosting Approach to Learning Graph Representations | null | null | null | null | cs.LG cs.SI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning the right graph representation from noisy, multisource data has
garnered significant interest in recent years. A central tenet of this problem
is relational learning. Here the objective is to incorporate the partial
information each data source gives us in a way that captures the true
underlying relationships. To address this challenge, we present a general,
boosting-inspired framework for combining weak evidence of entity associations
into a robust similarity metric. We explore the extent to which different
quality measurements yield graph representations that are suitable for
community detection. We then present empirical results on both synthetic and
real datasets demonstrating the utility of this framework. Our framework leads
to suitable global graph representations from quality measurements local to
each edge. Finally, we discuss future extensions and theoretical considerations
of learning useful graph representations from weak feedback in general
application settings.
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2014 17:07:01 GMT"
}
] | 2014-01-15T00:00:00 | [
[
"Caceres",
"Rajmonda",
""
],
[
"Carter",
"Kevin",
""
],
[
"Kun",
"Jeremy",
""
]
] | TITLE: A Boosting Approach to Learning Graph Representations
ABSTRACT: Learning the right graph representation from noisy, multisource data has
garnered significant interest in recent years. A central tenet of this problem
is relational learning. Here the objective is to incorporate the partial
information each data source gives us in a way that captures the true
underlying relationships. To address this challenge, we present a general,
boosting-inspired framework for combining weak evidence of entity associations
into a robust similarity metric. We explore the extent to which different
quality measurements yield graph representations that are suitable for
community detection. We then present empirical results on both synthetic and
real datasets demonstrating the utility of this framework. Our framework leads
to suitable global graph representations from quality measurements local to
each edge. Finally, we discuss future extensions and theoretical considerations
of learning useful graph representations from weak feedback in general
application settings.
|
1308.5835 | Sumudu Samarakoon Mr. | Sumudu Samarakoon and Mehdi Bennis and Walid Saad and Matti Latva-aho | Backhaul-Aware Interference Management in the Uplink of Wireless Small
Cell Networks | 14 pages, 9 figures, journal article to be appeared in Transaction of
Wireless Communication | null | 10.1109/TWC.2013.092413.130221 | null | cs.NI cs.GT cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The design of distributed mechanisms for interference management is one of
the key challenges in emerging wireless small cell networks whose backhaul is
capacity limited and heterogeneous (wired, wireless and a mix thereof). In this
paper, a novel, backhaul-aware approach to interference management in wireless
small cell networks is proposed. The proposed approach enables macrocell user
equipments (MUEs) to optimize their uplink performance, by exploiting the
presence of neighboring small cell base stations. The problem is formulated as
a noncooperative game among the MUEs that seek to optimize their delay-rate
tradeoff, given the conditions of both the radio access network and the --
possibly heterogeneous -- backhaul. To solve this game, a novel, distributed
learning algorithm is proposed using which the MUEs autonomously choose their
optimal uplink transmission strategies, given a limited amount of available
information. The convergence of the proposed algorithm is shown and its
properties are studied. Simulation results show that, under various types of
backhauls, the proposed approach yields significant performance gains, in terms
of both average throughput and delay for the MUEs, when compared to existing
benchmark algorithms.
| [
{
"version": "v1",
"created": "Tue, 27 Aug 2013 12:02:50 GMT"
}
] | 2014-01-14T00:00:00 | [
[
"Samarakoon",
"Sumudu",
""
],
[
"Bennis",
"Mehdi",
""
],
[
"Saad",
"Walid",
""
],
[
"Latva-aho",
"Matti",
""
]
] | TITLE: Backhaul-Aware Interference Management in the Uplink of Wireless Small
Cell Networks
ABSTRACT: The design of distributed mechanisms for interference management is one of
the key challenges in emerging wireless small cell networks whose backhaul is
capacity limited and heterogeneous (wired, wireless and a mix thereof). In this
paper, a novel, backhaul-aware approach to interference management in wireless
small cell networks is proposed. The proposed approach enables macrocell user
equipments (MUEs) to optimize their uplink performance, by exploiting the
presence of neighboring small cell base stations. The problem is formulated as
a noncooperative game among the MUEs that seek to optimize their delay-rate
tradeoff, given the conditions of both the radio access network and the --
possibly heterogeneous -- backhaul. To solve this game, a novel, distributed
learning algorithm is proposed using which the MUEs autonomously choose their
optimal uplink transmission strategies, given a limited amount of available
information. The convergence of the proposed algorithm is shown and its
properties are studied. Simulation results show that, under various types of
backhauls, the proposed approach yields significant performance gains, in terms
of both average throughput and delay for the MUEs, when compared to existing
benchmark algorithms.
|
1401.2503 | Tao Xiong | Tao Xiong, Yukun Bao, Zhongyi Hu | Does Restraining End Effect Matter in EMD-Based Modeling Framework for
Time Series Prediction? Some Experimental Evidences | 28 pages | Neurocomputing. 123, 2013: 174-184 | 10.1016/j.neucom.2013.07.004 | null | cs.AI stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Following the "decomposition-and-ensemble" principle, the empirical mode
decomposition (EMD)-based modeling framework has been widely used as a
promising alternative for nonlinear and nonstationary time series modeling and
prediction. The end effect, which occurs during the sifting process of EMD and
is apt to distort the decomposed sub-series and hurt the modeling process
followed, however, has been ignored in previous studies. Addressing the end
effect issue, this study proposes to incorporate end condition methods into
EMD-based decomposition and ensemble modeling framework for one- and multi-step
ahead time series prediction. Four well-established end condition methods,
Mirror method, Coughlin's method, Slope-based method, and Rato's method, are
selected, and support vector regression (SVR) is employed as the modeling
technique. For the purpose of justification and comparison, well-known NN3
competition data sets are used and four well-established prediction models are
selected as benchmarks. The experimental results demonstrated that significant
improvement can be achieved by the proposed EMD-based SVR models with end
condition methods. The EMD-SBM-SVR model and EMD-Rato-SVR model, in particular,
achieved the best prediction performances in terms of goodness of forecast
measures and equality of accuracy of competing forecasts test.
| [
{
"version": "v1",
"created": "Sat, 11 Jan 2014 06:08:04 GMT"
}
] | 2014-01-14T00:00:00 | [
[
"Xiong",
"Tao",
""
],
[
"Bao",
"Yukun",
""
],
[
"Hu",
"Zhongyi",
""
]
] | TITLE: Does Restraining End Effect Matter in EMD-Based Modeling Framework for
Time Series Prediction? Some Experimental Evidences
ABSTRACT: Following the "decomposition-and-ensemble" principle, the empirical mode
decomposition (EMD)-based modeling framework has been widely used as a
promising alternative for nonlinear and nonstationary time series modeling and
prediction. The end effect, which occurs during the sifting process of EMD and
is apt to distort the decomposed sub-series and hurt the modeling process
followed, however, has been ignored in previous studies. Addressing the end
effect issue, this study proposes to incorporate end condition methods into
EMD-based decomposition and ensemble modeling framework for one- and multi-step
ahead time series prediction. Four well-established end condition methods,
Mirror method, Coughlin's method, Slope-based method, and Rato's method, are
selected, and support vector regression (SVR) is employed as the modeling
technique. For the purpose of justification and comparison, well-known NN3
competition data sets are used and four well-established prediction models are
selected as benchmarks. The experimental results demonstrated that significant
improvement can be achieved by the proposed EMD-based SVR models with end
condition methods. The EMD-SBM-SVR model and EMD-Rato-SVR model, in particular,
achieved the best prediction performances in terms of goodness of forecast
measures and equality of accuracy of competing forecasts test.
|
1401.2504 | Tao Xiong | Yukun Bao, Tao Xiong, Zhongyi Hu | Multi-Step-Ahead Time Series Prediction using Multiple-Output Support
Vector Regression | 26 pages | null | 10.1016/j.neucom.2013.09.010 | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurate time series prediction over long future horizons is challenging and
of great interest to both practitioners and academics. As a well-known
intelligent algorithm, the standard formulation of Support Vector Regression
(SVR) could be taken for multi-step-ahead time series prediction, only relying
either on iterated strategy or direct strategy. This study proposes a novel
multiple-step-ahead time series prediction approach which employs
multiple-output support vector regression (M-SVR) with multiple-input
multiple-output (MIMO) prediction strategy. In addition, the rank of three
leading prediction strategies with SVR is comparatively examined, providing
practical implications on the selection of the prediction strategy for
multi-step-ahead forecasting while taking SVR as modeling technique. The
proposed approach is validated with the simulated and real datasets. The
quantitative and comprehensive assessments are performed on the basis of the
prediction accuracy and computational cost. The results indicate that: 1) the
M-SVR using MIMO strategy achieves the best accurate forecasts with accredited
computational load, 2) the standard SVR using direct strategy achieves the
second best accurate forecasts, but with the most expensive computational cost,
and 3) the standard SVR using iterated strategy is the worst in terms of
prediction accuracy, but with the least computational cost.
| [
{
"version": "v1",
"created": "Sat, 11 Jan 2014 06:14:53 GMT"
}
] | 2014-01-14T00:00:00 | [
[
"Bao",
"Yukun",
""
],
[
"Xiong",
"Tao",
""
],
[
"Hu",
"Zhongyi",
""
]
] | TITLE: Multi-Step-Ahead Time Series Prediction using Multiple-Output Support
Vector Regression
ABSTRACT: Accurate time series prediction over long future horizons is challenging and
of great interest to both practitioners and academics. As a well-known
intelligent algorithm, the standard formulation of Support Vector Regression
(SVR) could be taken for multi-step-ahead time series prediction, only relying
either on iterated strategy or direct strategy. This study proposes a novel
multiple-step-ahead time series prediction approach which employs
multiple-output support vector regression (M-SVR) with multiple-input
multiple-output (MIMO) prediction strategy. In addition, the rank of three
leading prediction strategies with SVR is comparatively examined, providing
practical implications on the selection of the prediction strategy for
multi-step-ahead forecasting while taking SVR as modeling technique. The
proposed approach is validated with the simulated and real datasets. The
quantitative and comprehensive assessments are performed on the basis of the
prediction accuracy and computational cost. The results indicate that: 1) the
M-SVR using MIMO strategy achieves the best accurate forecasts with accredited
computational load, 2) the standard SVR using direct strategy achieves the
second best accurate forecasts, but with the most expensive computational cost,
and 3) the standard SVR using iterated strategy is the worst in terms of
prediction accuracy, but with the least computational cost.
|
1401.2688 | Kiran Sree Pokkuluri Prof | Pokkuluri Kiran Sree, Inamupudi Ramesh Babu, SSSN Usha Devi N | PSMACA: An Automated Protein Structure Prediction Using MACA (Multiple
Attractor Cellular Automata) | 6 pages. arXiv admin note: substantial text overlap with
arXiv:1310.4342, arXiv:1310.4495 | Journal of Bioinformatics and Intelligent Control Vol 2, pp
211--215, 2013 | 10.1166/jbic.2013.1052 | null | cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Protein Structure Predication from sequences of amino acid has gained a
remarkable attention in recent years. Even though there are some prediction
techniques addressing this problem, the approximate accuracy in predicting the
protein structure is closely 75%. An automated procedure was evolved with MACA
(Multiple Attractor Cellular Automata) for predicting the structure of the
protein. Most of the existing approaches are sequential which will classify the
input into four major classes and these are designed for similar sequences.
PSMACA is designed to identify ten classes from the sequences that share
twilight zone similarity and identity with the training sequences. This method
also predicts three states (helix, strand, and coil) for the structure. Our
comprehensive design considers 10 feature selection methods and 4 classifiers
to develop MACA (Multiple Attractor Cellular Automata) based classifiers that
are build for each of the ten classes. We have tested the proposed classifier
with twilight-zone and 1-high-similarity benchmark datasets with over three
dozens of modern competing predictors shows that PSMACA provides the best
overall accuracy that ranges between 77% and 88.7% depending on the dataset.
| [
{
"version": "v1",
"created": "Mon, 13 Jan 2014 00:38:52 GMT"
}
] | 2014-01-14T00:00:00 | [
[
"Sree",
"Pokkuluri Kiran",
""
],
[
"Babu",
"Inamupudi Ramesh",
""
],
[
"N",
"SSSN Usha Devi",
""
]
] | TITLE: PSMACA: An Automated Protein Structure Prediction Using MACA (Multiple
Attractor Cellular Automata)
ABSTRACT: Protein Structure Predication from sequences of amino acid has gained a
remarkable attention in recent years. Even though there are some prediction
techniques addressing this problem, the approximate accuracy in predicting the
protein structure is closely 75%. An automated procedure was evolved with MACA
(Multiple Attractor Cellular Automata) for predicting the structure of the
protein. Most of the existing approaches are sequential which will classify the
input into four major classes and these are designed for similar sequences.
PSMACA is designed to identify ten classes from the sequences that share
twilight zone similarity and identity with the training sequences. This method
also predicts three states (helix, strand, and coil) for the structure. Our
comprehensive design considers 10 feature selection methods and 4 classifiers
to develop MACA (Multiple Attractor Cellular Automata) based classifiers that
are build for each of the ten classes. We have tested the proposed classifier
with twilight-zone and 1-high-similarity benchmark datasets with over three
dozens of modern competing predictors shows that PSMACA provides the best
overall accuracy that ranges between 77% and 88.7% depending on the dataset.
|
1401.2955 | Mahdi Pakdaman Naeini | Mahdi Pakdaman Naeini, Gregory F. Cooper, Milos Hauskrecht | Binary Classifier Calibration: Bayesian Non-Parametric Approach | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A set of probabilistic predictions is well calibrated if the events that are
predicted to occur with probability p do in fact occur about p fraction of the
time. Well calibrated predictions are particularly important when machine
learning models are used in decision analysis. This paper presents two new
non-parametric methods for calibrating outputs of binary classification models:
a method based on the Bayes optimal selection and a method based on the
Bayesian model averaging. The advantage of these methods is that they are
independent of the algorithm used to learn a predictive model, and they can be
applied in a post-processing step, after the model is learned. This makes them
applicable to a wide variety of machine learning models and methods. These
calibration methods, as well as other methods, are tested on a variety of
datasets in terms of both discrimination and calibration performance. The
results show the methods either outperform or are comparable in performance to
the state-of-the-art calibration methods.
| [
{
"version": "v1",
"created": "Mon, 13 Jan 2014 19:04:13 GMT"
}
] | 2014-01-14T00:00:00 | [
[
"Naeini",
"Mahdi Pakdaman",
""
],
[
"Cooper",
"Gregory F.",
""
],
[
"Hauskrecht",
"Milos",
""
]
] | TITLE: Binary Classifier Calibration: Bayesian Non-Parametric Approach
ABSTRACT: A set of probabilistic predictions is well calibrated if the events that are
predicted to occur with probability p do in fact occur about p fraction of the
time. Well calibrated predictions are particularly important when machine
learning models are used in decision analysis. This paper presents two new
non-parametric methods for calibrating outputs of binary classification models:
a method based on the Bayes optimal selection and a method based on the
Bayesian model averaging. The advantage of these methods is that they are
independent of the algorithm used to learn a predictive model, and they can be
applied in a post-processing step, after the model is learned. This makes them
applicable to a wide variety of machine learning models and methods. These
calibration methods, as well as other methods, are tested on a variety of
datasets in terms of both discrimination and calibration performance. The
results show the methods either outperform or are comparable in performance to
the state-of-the-art calibration methods.
|
1310.4495 | Kiran Sree Pokkuluri Prof | Pokkuluri Kiran Sree, Inampudi Ramesh Babu and SSSN Usha Devi Nedunuri | Multiple Attractor Cellular Automata (MACA) for Addressing Major
Problems in Bioinformatics | arXiv admin note: text overlap with arXiv:1310.4342 | Review of Bioinformatics and Biometrics (RBB) Volume 2 Issue 3,
September 2013 | null | null | cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | CA has grown as potential classifier for addressing major problems in
bioinformatics. Lot of bioinformatics problems like predicting the protein
coding region, finding the promoter region, predicting the structure of protein
and many other problems in bioinformatics can be addressed through Cellular
Automata. Even though there are some prediction techniques addressing these
problems, the approximate accuracy level is very less. An automated procedure
was proposed with MACA (Multiple Attractor Cellular Automata) which can address
all these problems. The genetic algorithm is also used to find rules with good
fitness values. Extensive experiments are conducted for reporting the accuracy
of the proposed tool. The average accuracy of MACA when tested with ENCODE,
BG570, HMR195, Fickett and Tongue, ASP67 datasets is 78%.
| [
{
"version": "v1",
"created": "Wed, 16 Oct 2013 15:01:19 GMT"
}
] | 2014-01-13T00:00:00 | [
[
"Sree",
"Pokkuluri Kiran",
""
],
[
"Babu",
"Inampudi Ramesh",
""
],
[
"Nedunuri",
"SSSN Usha Devi",
""
]
] | TITLE: Multiple Attractor Cellular Automata (MACA) for Addressing Major
Problems in Bioinformatics
ABSTRACT: CA has grown as potential classifier for addressing major problems in
bioinformatics. Lot of bioinformatics problems like predicting the protein
coding region, finding the promoter region, predicting the structure of protein
and many other problems in bioinformatics can be addressed through Cellular
Automata. Even though there are some prediction techniques addressing these
problems, the approximate accuracy level is very less. An automated procedure
was proposed with MACA (Multiple Attractor Cellular Automata) which can address
all these problems. The genetic algorithm is also used to find rules with good
fitness values. Extensive experiments are conducted for reporting the accuracy
of the proposed tool. The average accuracy of MACA when tested with ENCODE,
BG570, HMR195, Fickett and Tongue, ASP67 datasets is 78%.
|
1401.2224 | Alireza Goudarzi | Alireza Goudarzi, Peter Banda, Matthew R. Lakin, Christof Teuscher,
Darko Stefanovic | A Comparative Study of Reservoir Computing for Temporal Signal
Processing | null | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reservoir computing (RC) is a novel approach to time series prediction using
recurrent neural networks. In RC, an input signal perturbs the intrinsic
dynamics of a medium called a reservoir. A readout layer is then trained to
reconstruct a target output from the reservoir's state. The multitude of RC
architectures and evaluation metrics poses a challenge to both practitioners
and theorists who study the task-solving performance and computational power of
RC. In addition, in contrast to traditional computation models, the reservoir
is a dynamical system in which computation and memory are inseparable, and
therefore hard to analyze. Here, we compare echo state networks (ESN), a
popular RC architecture, with tapped-delay lines (DL) and nonlinear
autoregressive exogenous (NARX) networks, which we use to model systems with
limited computation and limited memory respectively. We compare the performance
of the three systems while computing three common benchmark time series:
H{\'e}non Map, NARMA10, and NARMA20. We find that the role of the reservoir in
the reservoir computing paradigm goes beyond providing a memory of the past
inputs. The DL and the NARX network have higher memorization capability, but
fall short of the generalization power of the ESN.
| [
{
"version": "v1",
"created": "Fri, 10 Jan 2014 03:39:28 GMT"
}
] | 2014-01-13T00:00:00 | [
[
"Goudarzi",
"Alireza",
""
],
[
"Banda",
"Peter",
""
],
[
"Lakin",
"Matthew R.",
""
],
[
"Teuscher",
"Christof",
""
],
[
"Stefanovic",
"Darko",
""
]
] | TITLE: A Comparative Study of Reservoir Computing for Temporal Signal
Processing
ABSTRACT: Reservoir computing (RC) is a novel approach to time series prediction using
recurrent neural networks. In RC, an input signal perturbs the intrinsic
dynamics of a medium called a reservoir. A readout layer is then trained to
reconstruct a target output from the reservoir's state. The multitude of RC
architectures and evaluation metrics poses a challenge to both practitioners
and theorists who study the task-solving performance and computational power of
RC. In addition, in contrast to traditional computation models, the reservoir
is a dynamical system in which computation and memory are inseparable, and
therefore hard to analyze. Here, we compare echo state networks (ESN), a
popular RC architecture, with tapped-delay lines (DL) and nonlinear
autoregressive exogenous (NARX) networks, which we use to model systems with
limited computation and limited memory respectively. We compare the performance
of the three systems while computing three common benchmark time series:
H{\'e}non Map, NARMA10, and NARMA20. We find that the role of the reservoir in
the reservoir computing paradigm goes beyond providing a memory of the past
inputs. The DL and the NARX network have higher memorization capability, but
fall short of the generalization power of the ESN.
|
1401.2258 | Benjamin Roth | Benjamin Roth | Assessing Wikipedia-Based Cross-Language Retrieval Models | 74 pages; MSc thesis at Saarland University | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work compares concept models for cross-language retrieval: First, we
adapt probabilistic Latent Semantic Analysis (pLSA) for multilingual documents.
Experiments with different weighting schemes show that a weighting method
favoring documents of similar length in both language sides gives best results.
Considering that both monolingual and multilingual Latent Dirichlet Allocation
(LDA) behave alike when applied for such documents, we use a training corpus
built on Wikipedia where all documents are length-normalized and obtain
improvements over previously reported scores for LDA. Another focus of our work
is on model combination. For this end we include Explicit Semantic Analysis
(ESA) in the experiments. We observe that ESA is not competitive with LDA in a
query based retrieval task on CLEF 2000 data. The combination of machine
translation with concept models increased performance by 21.1% map in
comparison to machine translation alone. Machine translation relies on parallel
corpora, which may not be available for many language pairs. We further explore
how much cross-lingual information can be carried over by a specific
information source in Wikipedia, namely linked text. The best results are
obtained using a language modeling approach, entirely without information from
parallel corpora. The need for smoothing raises interesting questions on
soundness and efficiency. Link models capture only a certain kind of
information and suggest weighting schemes to emphasize particular words. For a
combined model, another interesting question is therefore how to integrate
different weighting schemes. Using a very simple combination scheme, we obtain
results that compare favorably to previously reported results on the CLEF 2000
dataset.
| [
{
"version": "v1",
"created": "Fri, 10 Jan 2014 08:50:54 GMT"
}
] | 2014-01-13T00:00:00 | [
[
"Roth",
"Benjamin",
""
]
] | TITLE: Assessing Wikipedia-Based Cross-Language Retrieval Models
ABSTRACT: This work compares concept models for cross-language retrieval: First, we
adapt probabilistic Latent Semantic Analysis (pLSA) for multilingual documents.
Experiments with different weighting schemes show that a weighting method
favoring documents of similar length in both language sides gives best results.
Considering that both monolingual and multilingual Latent Dirichlet Allocation
(LDA) behave alike when applied for such documents, we use a training corpus
built on Wikipedia where all documents are length-normalized and obtain
improvements over previously reported scores for LDA. Another focus of our work
is on model combination. For this end we include Explicit Semantic Analysis
(ESA) in the experiments. We observe that ESA is not competitive with LDA in a
query based retrieval task on CLEF 2000 data. The combination of machine
translation with concept models increased performance by 21.1% map in
comparison to machine translation alone. Machine translation relies on parallel
corpora, which may not be available for many language pairs. We further explore
how much cross-lingual information can be carried over by a specific
information source in Wikipedia, namely linked text. The best results are
obtained using a language modeling approach, entirely without information from
parallel corpora. The need for smoothing raises interesting questions on
soundness and efficiency. Link models capture only a certain kind of
information and suggest weighting schemes to emphasize particular words. For a
combined model, another interesting question is therefore how to integrate
different weighting schemes. Using a very simple combination scheme, we obtain
results that compare favorably to previously reported results on the CLEF 2000
dataset.
|
1306.0186 | Iain Murray | Benigno Uria, Iain Murray, Hugo Larochelle | RNADE: The real-valued neural autoregressive density-estimator | 12 pages, 3 figures, 3 tables, 2 algorithms. Merges the published
paper and supplementary material into one document | Advances in Neural Information Processing Systems 26:2175-2183,
2013 | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce RNADE, a new model for joint density estimation of real-valued
vectors. Our model calculates the density of a datapoint as the product of
one-dimensional conditionals modeled using mixture density networks with shared
parameters. RNADE learns a distributed representation of the data, while having
a tractable expression for the calculation of densities. A tractable likelihood
allows direct comparison with other methods and training by standard
gradient-based optimizers. We compare the performance of RNADE on several
datasets of heterogeneous and perceptual data, finding it outperforms mixture
models in all but one case.
| [
{
"version": "v1",
"created": "Sun, 2 Jun 2013 09:37:53 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jan 2014 11:14:27 GMT"
}
] | 2014-01-10T00:00:00 | [
[
"Uria",
"Benigno",
""
],
[
"Murray",
"Iain",
""
],
[
"Larochelle",
"Hugo",
""
]
] | TITLE: RNADE: The real-valued neural autoregressive density-estimator
ABSTRACT: We introduce RNADE, a new model for joint density estimation of real-valued
vectors. Our model calculates the density of a datapoint as the product of
one-dimensional conditionals modeled using mixture density networks with shared
parameters. RNADE learns a distributed representation of the data, while having
a tractable expression for the calculation of densities. A tractable likelihood
allows direct comparison with other methods and training by standard
gradient-based optimizers. We compare the performance of RNADE on several
datasets of heterogeneous and perceptual data, finding it outperforms mixture
models in all but one case.
|
1401.1307 | Jiping Xiong | Jiping Xiong, Qinghua Tang, and Jian Zhao | 1-bit Compressive Data Gathering for Wireless Sensor Networks | null | null | null | null | cs.NI | http://creativecommons.org/licenses/by/3.0/ | Compressive sensing (CS) has been widely used for the data gathering in
wireless sensor networks for the purpose of reducing the communication overhead
recent years. In this paper, we first show that with simple modification, 1-bit
compressive sensing can also been used for the data gathering in wireless
sensor networks to further reduce the communication overhead. We also propose a
novel blind 1-bit CS reconstruction algorithm which outperforms other state of
the art blind 1-bit CS reconstruction algorithms. Experimental results on real
sensor datasets demonstrate the efficiency of our method.
| [
{
"version": "v1",
"created": "Tue, 7 Jan 2014 08:32:15 GMT"
}
] | 2014-01-08T00:00:00 | [
[
"Xiong",
"Jiping",
""
],
[
"Tang",
"Qinghua",
""
],
[
"Zhao",
"Jian",
""
]
] | TITLE: 1-bit Compressive Data Gathering for Wireless Sensor Networks
ABSTRACT: Compressive sensing (CS) has been widely used for the data gathering in
wireless sensor networks for the purpose of reducing the communication overhead
recent years. In this paper, we first show that with simple modification, 1-bit
compressive sensing can also been used for the data gathering in wireless
sensor networks to further reduce the communication overhead. We also propose a
novel blind 1-bit CS reconstruction algorithm which outperforms other state of
the art blind 1-bit CS reconstruction algorithms. Experimental results on real
sensor datasets demonstrate the efficiency of our method.
|
1401.1489 | Romain H\'erault | John Komar and Romain H\'erault and Ludovic Seifert | Key point selection and clustering of swimmer coordination through
Sparse Fisher-EM | Presented at ECML/PKDD 2013 Workshop on Machine Learning and Data
Mining for Sports Analytics (MLSA2013) | null | null | null | stat.ML cs.CV cs.LG physics.data-an stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To answer the existence of optimal swimmer learning/teaching strategies, this
work introduces a two-level clustering in order to analyze temporal dynamics of
motor learning in breaststroke swimming. Each level have been performed through
Sparse Fisher-EM, a unsupervised framework which can be applied efficiently on
large and correlated datasets. The induced sparsity selects key points of the
coordination phase without any prior knowledge.
| [
{
"version": "v1",
"created": "Tue, 7 Jan 2014 20:16:05 GMT"
}
] | 2014-01-08T00:00:00 | [
[
"Komar",
"John",
""
],
[
"Hérault",
"Romain",
""
],
[
"Seifert",
"Ludovic",
""
]
] | TITLE: Key point selection and clustering of swimmer coordination through
Sparse Fisher-EM
ABSTRACT: To answer the existence of optimal swimmer learning/teaching strategies, this
work introduces a two-level clustering in order to analyze temporal dynamics of
motor learning in breaststroke swimming. Each level have been performed through
Sparse Fisher-EM, a unsupervised framework which can be applied efficiently on
large and correlated datasets. The induced sparsity selects key points of the
coordination phase without any prior knowledge.
|
1108.3446 | Josef Urban | Jesse Alama, Tom Heskes, Daniel K\"uhlwein, Evgeni Tsivtsivadze, and
Josef Urban | Premise Selection for Mathematics by Corpus Analysis and Kernel Methods | 26 pages | null | 10.1007/s10817-013-9286-5 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Smart premise selection is essential when using automated reasoning as a tool
for large-theory formal proof development. A good method for premise selection
in complex mathematical libraries is the application of machine learning to
large corpora of proofs. This work develops learning-based premise selection in
two ways. First, a newly available minimal dependency analysis of existing
high-level formal mathematical proofs is used to build a large knowledge base
of proof dependencies, providing precise data for ATP-based re-verification and
for training premise selection algorithms. Second, a new machine learning
algorithm for premise selection based on kernel methods is proposed and
implemented. To evaluate the impact of both techniques, a benchmark consisting
of 2078 large-theory mathematical problems is constructed,extending the older
MPTP Challenge benchmark. The combined effect of the techniques results in a
50% improvement on the benchmark over the Vampire/SInE state-of-the-art system
for automated reasoning in large theories.
| [
{
"version": "v1",
"created": "Wed, 17 Aug 2011 11:18:55 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Apr 2012 18:52:58 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Alama",
"Jesse",
""
],
[
"Heskes",
"Tom",
""
],
[
"Kühlwein",
"Daniel",
""
],
[
"Tsivtsivadze",
"Evgeni",
""
],
[
"Urban",
"Josef",
""
]
] | TITLE: Premise Selection for Mathematics by Corpus Analysis and Kernel Methods
ABSTRACT: Smart premise selection is essential when using automated reasoning as a tool
for large-theory formal proof development. A good method for premise selection
in complex mathematical libraries is the application of machine learning to
large corpora of proofs. This work develops learning-based premise selection in
two ways. First, a newly available minimal dependency analysis of existing
high-level formal mathematical proofs is used to build a large knowledge base
of proof dependencies, providing precise data for ATP-based re-verification and
for training premise selection algorithms. Second, a new machine learning
algorithm for premise selection based on kernel methods is proposed and
implemented. To evaluate the impact of both techniques, a benchmark consisting
of 2078 large-theory mathematical problems is constructed,extending the older
MPTP Challenge benchmark. The combined effect of the techniques results in a
50% improvement on the benchmark over the Vampire/SInE state-of-the-art system
for automated reasoning in large theories.
|
1311.0768 | Bertrand Jeannet | Bertrand Jeannet and Peter Schrammel and Sriram Sankaranarayanan | Abstract Acceleration of General Linear Loops | Extended version with appendices of paper accepted to POPL'2014 | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present abstract acceleration techniques for computing loop invariants for
numerical programs with linear assignments and conditionals. Whereas abstract
interpretation techniques typically over-approximate the set of reachable
states iteratively, abstract acceleration captures the effect of the loop with
a single, non-iterative transfer function applied to the initial states at the
loop head. In contrast to previous acceleration techniques, our approach
applies to any linear loop without restrictions. Its novelty lies in the use of
the Jordan normal form decomposition of the loop body to derive symbolic
expressions for the entries of the matrix modeling the effect of n>=0
iterations of the loop. The entries of such a matrix depend on $n$ through
complex polynomial, exponential and trigonometric functions. Therefore, we
introduces an abstract domain for matrices that captures the linear inequality
relations between these complex expressions. This results in an abstract matrix
for describing the fixpoint semantics of the loop.
Our approach integrates smoothly into standard abstract interpreters and can
handle programs with nested loops and loops containing conditional branches. We
evaluate it over small but complex loops that are commonly found in control
software, comparing it with other tools for computing linear loop invariants.
The loops in our benchmarks typically exhibit polynomial, exponential and
oscillatory behaviors that present challenges to existing approaches. Our
approach finds non-trivial invariants to prove useful bounds on the values of
variables for such loops, clearly outperforming the existing approaches in
terms of precision while exhibiting good performance.
| [
{
"version": "v1",
"created": "Mon, 4 Nov 2013 17:03:17 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Jan 2014 14:15:50 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Jeannet",
"Bertrand",
""
],
[
"Schrammel",
"Peter",
""
],
[
"Sankaranarayanan",
"Sriram",
""
]
] | TITLE: Abstract Acceleration of General Linear Loops
ABSTRACT: We present abstract acceleration techniques for computing loop invariants for
numerical programs with linear assignments and conditionals. Whereas abstract
interpretation techniques typically over-approximate the set of reachable
states iteratively, abstract acceleration captures the effect of the loop with
a single, non-iterative transfer function applied to the initial states at the
loop head. In contrast to previous acceleration techniques, our approach
applies to any linear loop without restrictions. Its novelty lies in the use of
the Jordan normal form decomposition of the loop body to derive symbolic
expressions for the entries of the matrix modeling the effect of n>=0
iterations of the loop. The entries of such a matrix depend on $n$ through
complex polynomial, exponential and trigonometric functions. Therefore, we
introduces an abstract domain for matrices that captures the linear inequality
relations between these complex expressions. This results in an abstract matrix
for describing the fixpoint semantics of the loop.
Our approach integrates smoothly into standard abstract interpreters and can
handle programs with nested loops and loops containing conditional branches. We
evaluate it over small but complex loops that are commonly found in control
software, comparing it with other tools for computing linear loop invariants.
The loops in our benchmarks typically exhibit polynomial, exponential and
oscillatory behaviors that present challenges to existing approaches. Our
approach finds non-trivial invariants to prove useful bounds on the values of
variables for such loops, clearly outperforming the existing approaches in
terms of precision while exhibiting good performance.
|
1311.4276 | Michael (Micky) Fire | Michael Fire and Yuval Elovici | Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns
in Human Population | null | null | null | null | cs.SI q-bio.PE stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online genealogy datasets contain extensive information about millions of
people and their past and present family connections. This vast amount of data
can assist in identifying various patterns in human population. In this study,
we present methods and algorithms which can assist in identifying variations in
lifespan distributions of human population in the past centuries, in detecting
social and genetic features which correlate with human lifespan, and in
constructing predictive models of human lifespan based on various features
which can easily be extracted from genealogy datasets.
We have evaluated the presented methods and algorithms on a large online
genealogy dataset with over a million profiles and over 9 million connections,
all of which were collected from the WikiTree website. Our findings indicate
that significant but small positive correlations exist between the parents'
lifespan and their children's lifespan. Additionally, we found slightly higher
and significant correlations between the lifespans of spouses. We also
discovered a very small positive and significant correlation between longevity
and reproductive success in males, and a small and significant negative
correlation between longevity and reproductive success in females. Moreover,
our machine learning algorithms presented better than random classification
results in predicting which people who outlive the age of 50 will also outlive
the age of 80.
We believe that this study will be the first of many studies which utilize
the wealth of data on human populations, existing in online genealogy datasets,
to better understand factors which influence human lifespan. Understanding
these factors can assist scientists in providing solutions for successful
aging.
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2013 06:23:25 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Jan 2014 10:21:06 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Fire",
"Michael",
""
],
[
"Elovici",
"Yuval",
""
]
] | TITLE: Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns
in Human Population
ABSTRACT: Online genealogy datasets contain extensive information about millions of
people and their past and present family connections. This vast amount of data
can assist in identifying various patterns in human population. In this study,
we present methods and algorithms which can assist in identifying variations in
lifespan distributions of human population in the past centuries, in detecting
social and genetic features which correlate with human lifespan, and in
constructing predictive models of human lifespan based on various features
which can easily be extracted from genealogy datasets.
We have evaluated the presented methods and algorithms on a large online
genealogy dataset with over a million profiles and over 9 million connections,
all of which were collected from the WikiTree website. Our findings indicate
that significant but small positive correlations exist between the parents'
lifespan and their children's lifespan. Additionally, we found slightly higher
and significant correlations between the lifespans of spouses. We also
discovered a very small positive and significant correlation between longevity
and reproductive success in males, and a small and significant negative
correlation between longevity and reproductive success in females. Moreover,
our machine learning algorithms presented better than random classification
results in predicting which people who outlive the age of 50 will also outlive
the age of 80.
We believe that this study will be the first of many studies which utilize
the wealth of data on human populations, existing in online genealogy datasets,
to better understand factors which influence human lifespan. Understanding
these factors can assist scientists in providing solutions for successful
aging.
|
1401.0778 | Hua-Wei Shen | Hua-Wei Shen, Dashun Wang, Chaoming Song, Albert-L\'aszl\'o Barab\'asi | Modeling and Predicting Popularity Dynamics via Reinforced Poisson
Processes | 8 pages, 5 figure; 3 tables | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An ability to predict the popularity dynamics of individual items within a
complex evolving system has important implications in an array of areas. Here
we propose a generative probabilistic framework using a reinforced Poisson
process to model explicitly the process through which individual items gain
their popularity. This model distinguishes itself from existing models via its
capability of modeling the arrival process of popularity and its remarkable
power at predicting the popularity of individual items. It possesses the
flexibility of applying Bayesian treatment to further improve the predictive
power using a conjugate prior. Extensive experiments on a longitudinal citation
dataset demonstrate that this model consistently outperforms existing
popularity prediction methods.
| [
{
"version": "v1",
"created": "Sat, 4 Jan 2014 05:53:18 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Shen",
"Hua-Wei",
""
],
[
"Wang",
"Dashun",
""
],
[
"Song",
"Chaoming",
""
],
[
"Barabási",
"Albert-László",
""
]
] | TITLE: Modeling and Predicting Popularity Dynamics via Reinforced Poisson
Processes
ABSTRACT: An ability to predict the popularity dynamics of individual items within a
complex evolving system has important implications in an array of areas. Here
we propose a generative probabilistic framework using a reinforced Poisson
process to model explicitly the process through which individual items gain
their popularity. This model distinguishes itself from existing models via its
capability of modeling the arrival process of popularity and its remarkable
power at predicting the popularity of individual items. It possesses the
flexibility of applying Bayesian treatment to further improve the predictive
power using a conjugate prior. Extensive experiments on a longitudinal citation
dataset demonstrate that this model consistently outperforms existing
popularity prediction methods.
|
1401.0794 | Taraka Rama Kasicheyanula | Taraka Rama, Lars Borin | Properties of phoneme N -grams across the world's language families | null | null | null | null | cs.CL stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we investigate the properties of phoneme N-grams across half
of the world's languages. We investigate if the sizes of three different N-gram
distributions of the world's language families obey a power law. Further, the
N-gram distributions of language families parallel the sizes of the families,
which seem to obey a power law distribution. The correlation between N-gram
distributions and language family sizes improves with increasing values of N.
We applied statistical tests, originally given by physicists, to test the
hypothesis of power law fit to twelve different datasets. The study also raises
some new questions about the use of N-gram distributions in linguistic
research, which we answer by running a statistical test.
| [
{
"version": "v1",
"created": "Sat, 4 Jan 2014 09:50:55 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Rama",
"Taraka",
""
],
[
"Borin",
"Lars",
""
]
] | TITLE: Properties of phoneme N -grams across the world's language families
ABSTRACT: In this article, we investigate the properties of phoneme N-grams across half
of the world's languages. We investigate if the sizes of three different N-gram
distributions of the world's language families obey a power law. Further, the
N-gram distributions of language families parallel the sizes of the families,
which seem to obey a power law distribution. The correlation between N-gram
distributions and language family sizes improves with increasing values of N.
We applied statistical tests, originally given by physicists, to test the
hypothesis of power law fit to twelve different datasets. The study also raises
some new questions about the use of N-gram distributions in linguistic
research, which we answer by running a statistical test.
|
1401.0843 | Warren Powell | Warren R. Scott, Warren B. Powell, Somayeh Moazehi | Least Squares Policy Iteration with Instrumental Variables vs. Direct
Policy Search: Comparison Against Optimal Benchmarks Using Energy Storage | 37 pages, 9 figures | null | null | null | math.OC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies approximate policy iteration (API) methods which use
least-squares Bellman error minimization for policy evaluation. We address
several of its enhancements, namely, Bellman error minimization using
instrumental variables, least-squares projected Bellman error minimization, and
projected Bellman error minimization using instrumental variables. We prove
that for a general discrete-time stochastic control problem, Bellman error
minimization using instrumental variables is equivalent to both variants of
projected Bellman error minimization. An alternative to these API methods is
direct policy search based on knowledge gradient. The practical performance of
these three approximate dynamic programming methods are then investigated in
the context of an application in energy storage, integrated with an
intermittent wind energy supply to fully serve a stochastic time-varying
electricity demand. We create a library of test problems using real-world data
and apply value iteration to find their optimal policies. These benchmarks are
then used to compare the developed policies. Our analysis indicates that API
with instrumental variables Bellman error minimization prominently outperforms
API with least-squares Bellman error minimization. However, these approaches
underperform our direct policy search implementation.
| [
{
"version": "v1",
"created": "Sat, 4 Jan 2014 19:57:26 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Scott",
"Warren R.",
""
],
[
"Powell",
"Warren B.",
""
],
[
"Moazehi",
"Somayeh",
""
]
] | TITLE: Least Squares Policy Iteration with Instrumental Variables vs. Direct
Policy Search: Comparison Against Optimal Benchmarks Using Energy Storage
ABSTRACT: This paper studies approximate policy iteration (API) methods which use
least-squares Bellman error minimization for policy evaluation. We address
several of its enhancements, namely, Bellman error minimization using
instrumental variables, least-squares projected Bellman error minimization, and
projected Bellman error minimization using instrumental variables. We prove
that for a general discrete-time stochastic control problem, Bellman error
minimization using instrumental variables is equivalent to both variants of
projected Bellman error minimization. An alternative to these API methods is
direct policy search based on knowledge gradient. The practical performance of
these three approximate dynamic programming methods are then investigated in
the context of an application in energy storage, integrated with an
intermittent wind energy supply to fully serve a stochastic time-varying
electricity demand. We create a library of test problems using real-world data
and apply value iteration to find their optimal policies. These benchmarks are
then used to compare the developed policies. Our analysis indicates that API
with instrumental variables Bellman error minimization prominently outperforms
API with least-squares Bellman error minimization. However, these approaches
underperform our direct policy search implementation.
|
1401.0880 | Nick Gravin | Ning Chen and Nick Gravin and Pinyan Lu | Optimal Competitive Auctions | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the design of truthful auctions for selling identical items in
unlimited supply (e.g., digital goods) to n unit demand buyers. This classic
problem stands out from profit-maximizing auction design literature as it
requires no probabilistic assumptions on buyers' valuations and employs the
framework of competitive analysis. Our objective is to optimize the worst-case
performance of an auction, measured by the ratio between a given benchmark and
revenue generated by the auction.
We establish a sufficient and necessary condition that characterizes
competitive ratios for all monotone benchmarks. The characterization identifies
the worst-case distribution of instances and reveals intrinsic relations
between competitive ratios and benchmarks in the competitive analysis. With the
characterization at hand, we show optimal competitive auctions for two natural
benchmarks.
The most well-studied benchmark $\mathcal{F}^{(2)}(\cdot)$ measures the
envy-free optimal revenue where at least two buyers win. Goldberg et al. [13]
showed a sequence of lower bounds on the competitive ratio for each number of
buyers n. They conjectured that all these bounds are tight. We show that
optimal competitive auctions match these bounds. Thus, we confirm the
conjecture and settle a central open problem in the design of digital goods
auctions. As one more application we examine another economically meaningful
benchmark, which measures the optimal revenue across all limited-supply Vickrey
auctions. We identify the optimal competitive ratios to be
$(\frac{n}{n-1})^{n-1}-1$ for each number of buyers n, that is $e-1$ as $n$
approaches infinity.
| [
{
"version": "v1",
"created": "Sun, 5 Jan 2014 09:59:07 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Chen",
"Ning",
""
],
[
"Gravin",
"Nick",
""
],
[
"Lu",
"Pinyan",
""
]
] | TITLE: Optimal Competitive Auctions
ABSTRACT: We study the design of truthful auctions for selling identical items in
unlimited supply (e.g., digital goods) to n unit demand buyers. This classic
problem stands out from profit-maximizing auction design literature as it
requires no probabilistic assumptions on buyers' valuations and employs the
framework of competitive analysis. Our objective is to optimize the worst-case
performance of an auction, measured by the ratio between a given benchmark and
revenue generated by the auction.
We establish a sufficient and necessary condition that characterizes
competitive ratios for all monotone benchmarks. The characterization identifies
the worst-case distribution of instances and reveals intrinsic relations
between competitive ratios and benchmarks in the competitive analysis. With the
characterization at hand, we show optimal competitive auctions for two natural
benchmarks.
The most well-studied benchmark $\mathcal{F}^{(2)}(\cdot)$ measures the
envy-free optimal revenue where at least two buyers win. Goldberg et al. [13]
showed a sequence of lower bounds on the competitive ratio for each number of
buyers n. They conjectured that all these bounds are tight. We show that
optimal competitive auctions match these bounds. Thus, we confirm the
conjecture and settle a central open problem in the design of digital goods
auctions. As one more application we examine another economically meaningful
benchmark, which measures the optimal revenue across all limited-supply Vickrey
auctions. We identify the optimal competitive ratios to be
$(\frac{n}{n-1})^{n-1}-1$ for each number of buyers n, that is $e-1$ as $n$
approaches infinity.
|
1401.0987 | Chi Jin | Chi Jin, Ziteng Wang, Junliang Huang, Yiqiao Zhong, Liwei Wang | Differentially Private Data Releasing for Smooth Queries with Synthetic
Database Output | null | null | null | null | cs.DB stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider accurately answering smooth queries while preserving differential
privacy. A query is said to be $K$-smooth if it is specified by a function
defined on $[-1,1]^d$ whose partial derivatives up to order $K$ are all
bounded. We develop an $\epsilon$-differentially private mechanism for the
class of $K$-smooth queries. The major advantage of the algorithm is that it
outputs a synthetic database. In real applications, a synthetic database output
is appealing. Our mechanism achieves an accuracy of $O
(n^{-\frac{K}{2d+K}}/\epsilon )$, and runs in polynomial time. We also
generalize the mechanism to preserve $(\epsilon, \delta)$-differential privacy
with slightly improved accuracy. Extensive experiments on benchmark datasets
demonstrate that the mechanisms have good accuracy and are efficient.
| [
{
"version": "v1",
"created": "Mon, 6 Jan 2014 05:12:01 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Jin",
"Chi",
""
],
[
"Wang",
"Ziteng",
""
],
[
"Huang",
"Junliang",
""
],
[
"Zhong",
"Yiqiao",
""
],
[
"Wang",
"Liwei",
""
]
] | TITLE: Differentially Private Data Releasing for Smooth Queries with Synthetic
Database Output
ABSTRACT: We consider accurately answering smooth queries while preserving differential
privacy. A query is said to be $K$-smooth if it is specified by a function
defined on $[-1,1]^d$ whose partial derivatives up to order $K$ are all
bounded. We develop an $\epsilon$-differentially private mechanism for the
class of $K$-smooth queries. The major advantage of the algorithm is that it
outputs a synthetic database. In real applications, a synthetic database output
is appealing. Our mechanism achieves an accuracy of $O
(n^{-\frac{K}{2d+K}}/\epsilon )$, and runs in polynomial time. We also
generalize the mechanism to preserve $(\epsilon, \delta)$-differential privacy
with slightly improved accuracy. Extensive experiments on benchmark datasets
demonstrate that the mechanisms have good accuracy and are efficient.
|
1401.1003 | Nanditha Rao Ms | Nanditha P. Rao, Shahbaz Sarik and Madhav P. Desai | On the likelihood of multiple bit upsets in logic circuits | 6 pages | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Soft errors have a significant impact on the circuit reliability at nanoscale
technologies. At the architectural level, soft errors are commonly modeled by a
probabilistic bit-flip model. In developing such abstract fault models, an
important issue to consider is the likelihood of multiple bit errors caused by
particle strikes. This likelihood has been studied to a great extent in
memories, but has not been understood to the same extent in logic circuits. In
this paper, we attempt to quantify the likelihood that a single transient event
can cause multiple bit errors in logic circuits consisting of combinational
gates and flip-flops. In particular, we calculate the conditional probability
of multiple bit-flips given that a single bit flips as a result of the
transient. To calculate this conditional probability, we use a Monte Carlo
technique in which samples are generated using detailed post-layout circuit
simulations. Our experiments on the ISCAS'85 benchmarks and a few other
circuits indicate that, this conditional probability is quite significant and
can be as high as 0.31. Thus we conclude that multiple bit-flips must
necessarily be considered in order to obtain a realistic architectural fault
model for soft errors.
| [
{
"version": "v1",
"created": "Mon, 6 Jan 2014 07:36:13 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Rao",
"Nanditha P.",
""
],
[
"Sarik",
"Shahbaz",
""
],
[
"Desai",
"Madhav P.",
""
]
] | TITLE: On the likelihood of multiple bit upsets in logic circuits
ABSTRACT: Soft errors have a significant impact on the circuit reliability at nanoscale
technologies. At the architectural level, soft errors are commonly modeled by a
probabilistic bit-flip model. In developing such abstract fault models, an
important issue to consider is the likelihood of multiple bit errors caused by
particle strikes. This likelihood has been studied to a great extent in
memories, but has not been understood to the same extent in logic circuits. In
this paper, we attempt to quantify the likelihood that a single transient event
can cause multiple bit errors in logic circuits consisting of combinational
gates and flip-flops. In particular, we calculate the conditional probability
of multiple bit-flips given that a single bit flips as a result of the
transient. To calculate this conditional probability, we use a Monte Carlo
technique in which samples are generated using detailed post-layout circuit
simulations. Our experiments on the ISCAS'85 benchmarks and a few other
circuits indicate that, this conditional probability is quite significant and
can be as high as 0.31. Thus we conclude that multiple bit-flips must
necessarily be considered in order to obtain a realistic architectural fault
model for soft errors.
|
1401.1024 | Marius Lindauer | Holger Hoos and Roland Kaminski and Marius Lindauer and Torsten Schaub | Solver Scheduling via Answer Set Programming | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although Boolean Constraint Technology has made tremendous progress over the
last decade, the efficacy of state-of-the-art solvers is known to vary
considerably across different types of problem instances and is known to depend
strongly on algorithm parameters. This problem was addressed by means of a
simple, yet effective approach using handmade, uniform and unordered schedules
of multiple solvers in ppfolio, which showed very impressive performance in the
2011 SAT Competition. Inspired by this, we take advantage of the modeling and
solving capacities of Answer Set Programming (ASP) to automatically determine
more refined, that is, non-uniform and ordered solver schedules from existing
benchmarking data. We begin by formulating the determination of such schedules
as multi-criteria optimization problems and provide corresponding ASP
encodings. The resulting encodings are easily customizable for different
settings and the computation of optimum schedules can mostly be done in the
blink of an eye, even when dealing with large runtime data sets stemming from
many solvers on hundreds to thousands of instances. Also, the fact that our
approach can be customized easily enabled us to swiftly adapt it to generate
parallel schedules for multi-processor machines.
| [
{
"version": "v1",
"created": "Mon, 6 Jan 2014 09:58:02 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Hoos",
"Holger",
""
],
[
"Kaminski",
"Roland",
""
],
[
"Lindauer",
"Marius",
""
],
[
"Schaub",
"Torsten",
""
]
] | TITLE: Solver Scheduling via Answer Set Programming
ABSTRACT: Although Boolean Constraint Technology has made tremendous progress over the
last decade, the efficacy of state-of-the-art solvers is known to vary
considerably across different types of problem instances and is known to depend
strongly on algorithm parameters. This problem was addressed by means of a
simple, yet effective approach using handmade, uniform and unordered schedules
of multiple solvers in ppfolio, which showed very impressive performance in the
2011 SAT Competition. Inspired by this, we take advantage of the modeling and
solving capacities of Answer Set Programming (ASP) to automatically determine
more refined, that is, non-uniform and ordered solver schedules from existing
benchmarking data. We begin by formulating the determination of such schedules
as multi-criteria optimization problems and provide corresponding ASP
encodings. The resulting encodings are easily customizable for different
settings and the computation of optimum schedules can mostly be done in the
blink of an eye, even when dealing with large runtime data sets stemming from
many solvers on hundreds to thousands of instances. Also, the fact that our
approach can be customized easily enabled us to swiftly adapt it to generate
parallel schedules for multi-processor machines.
|
1401.1191 | Juri Ranieri | Zichong Chen and Juri Ranieri and Runwei Zhang and Martin Vetterli | DASS: Distributed Adaptive Sparse Sensing | Submitted to IEEE Transactions on Wireless Communications | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless sensor networks are often designed to perform two tasks: sensing a
physical field and transmitting the data to end-users. A crucial aspect of the
design of a WSN is the minimization of the overall energy consumption. Previous
researchers aim at optimizing the energy spent for the communication, while
mostly ignoring the energy cost due to sensing. Recently, it has been shown
that considering the sensing energy cost can be beneficial for further
improving the overall energy efficiency. More precisely, sparse sensing
techniques were proposed to reduce the amount of collected samples and recover
the missing data by using data statistics. While the majority of these
techniques use fixed or random sampling patterns, we propose to adaptively
learn the signal model from the measurements and use the model to schedule when
and where to sample the physical field. The proposed method requires minimal
on-board computation, no inter-node communications and still achieves appealing
reconstruction performance. With experiments on real-world datasets, we
demonstrate significant improvements over both traditional sensing schemes and
the state-of-the-art sparse sensing schemes, particularly when the measured
data is characterized by a strong intra-sensor (temporal) or inter-sensors
(spatial) correlation.
| [
{
"version": "v1",
"created": "Thu, 7 Nov 2013 10:40:47 GMT"
}
] | 2014-01-07T00:00:00 | [
[
"Chen",
"Zichong",
""
],
[
"Ranieri",
"Juri",
""
],
[
"Zhang",
"Runwei",
""
],
[
"Vetterli",
"Martin",
""
]
] | TITLE: DASS: Distributed Adaptive Sparse Sensing
ABSTRACT: Wireless sensor networks are often designed to perform two tasks: sensing a
physical field and transmitting the data to end-users. A crucial aspect of the
design of a WSN is the minimization of the overall energy consumption. Previous
researchers aim at optimizing the energy spent for the communication, while
mostly ignoring the energy cost due to sensing. Recently, it has been shown
that considering the sensing energy cost can be beneficial for further
improving the overall energy efficiency. More precisely, sparse sensing
techniques were proposed to reduce the amount of collected samples and recover
the missing data by using data statistics. While the majority of these
techniques use fixed or random sampling patterns, we propose to adaptively
learn the signal model from the measurements and use the model to schedule when
and where to sample the physical field. The proposed method requires minimal
on-board computation, no inter-node communications and still achieves appealing
reconstruction performance. With experiments on real-world datasets, we
demonstrate significant improvements over both traditional sensing schemes and
the state-of-the-art sparse sensing schemes, particularly when the measured
data is characterized by a strong intra-sensor (temporal) or inter-sensors
(spatial) correlation.
|
1305.1019 | Xiao-Lei Zhang | Xiao-Lei Zhang, Ji Wu | Simple Deep Random Model Ensemble | This paper has been withdrawn by the author due to a lack of full
empirical evaluation. More advanced method has been developed. This method
has been fully out of date | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Representation learning and unsupervised learning are two central topics of
machine learning and signal processing. Deep learning is one of the most
effective unsupervised representation learning approach. The main contributions
of this paper to the topics are as follows. (i) We propose to view the
representative deep learning approaches as special cases of the knowledge reuse
framework of clustering ensemble. (ii) We propose to view sparse coding when
used as a feature encoder as the consensus function of clustering ensemble, and
view dictionary learning as the training process of the base clusterings of
clustering ensemble. (ii) Based on the above two views, we propose a very
simple deep learning algorithm, named deep random model ensemble (DRME). It is
a stack of random model ensembles. Each random model ensemble is a special
k-means ensemble that discards the expectation-maximization optimization of
each base k-means but only preserves the default initialization method of the
base k-means. (iv) We propose to select the most powerful representation among
the layers by applying DRME to clustering where the single-linkage is used as
the clustering algorithm. Moreover, the DRME based clustering can also detect
the number of the natural clusters accurately. Extensive experimental
comparisons with 5 representation learning methods on 19 benchmark data sets
demonstrate the effectiveness of DRME.
| [
{
"version": "v1",
"created": "Sun, 5 May 2013 14:58:15 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Jan 2014 23:37:26 GMT"
}
] | 2014-01-06T00:00:00 | [
[
"Zhang",
"Xiao-Lei",
""
],
[
"Wu",
"Ji",
""
]
] | TITLE: Simple Deep Random Model Ensemble
ABSTRACT: Representation learning and unsupervised learning are two central topics of
machine learning and signal processing. Deep learning is one of the most
effective unsupervised representation learning approach. The main contributions
of this paper to the topics are as follows. (i) We propose to view the
representative deep learning approaches as special cases of the knowledge reuse
framework of clustering ensemble. (ii) We propose to view sparse coding when
used as a feature encoder as the consensus function of clustering ensemble, and
view dictionary learning as the training process of the base clusterings of
clustering ensemble. (ii) Based on the above two views, we propose a very
simple deep learning algorithm, named deep random model ensemble (DRME). It is
a stack of random model ensembles. Each random model ensemble is a special
k-means ensemble that discards the expectation-maximization optimization of
each base k-means but only preserves the default initialization method of the
base k-means. (iv) We propose to select the most powerful representation among
the layers by applying DRME to clustering where the single-linkage is used as
the clustering algorithm. Moreover, the DRME based clustering can also detect
the number of the natural clusters accurately. Extensive experimental
comparisons with 5 representation learning methods on 19 benchmark data sets
demonstrate the effectiveness of DRME.
|
1401.0561 | Janne Lindqvist | Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu
Modig, Janne Lindqvist, Antti Oulasvirta, Teemu Roos | User-Generated Free-Form Gestures for Authentication: Security and
Memorability | null | null | null | null | cs.CR cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the security and memorability of free-form multitouch
gestures for mobile authentication. Towards this end, we collected a dataset
with a generate-test-retest paradigm where participants (N=63) generated
free-form gestures, repeated them, and were later retested for memory. Half of
the participants decided to generate one-finger gestures, and the other half
generated multi-finger gestures. Although there has been recent work on
template-based gestures, there are yet no metrics to analyze security of either
template or free-form gestures. For example, entropy-based metrics used for
text-based passwords are not suitable for capturing the security and
memorability of free-form gestures. Hence, we modify a recently proposed metric
for analyzing information capacity of continuous full-body movements for this
purpose. Our metric computed estimated mutual information in repeated sets of
gestures. Surprisingly, one-finger gestures had higher average mutual
information. Gestures with many hard angles and turns had the highest mutual
information. The best-remembered gestures included signatures and simple
angular shapes. We also implemented a multitouch recognizer to evaluate the
practicality of free-form gestures in a real authentication system and how they
perform against shoulder surfing attacks. We conclude the paper with strategies
for generating secure and memorable free-form gestures, which present a robust
method for mobile authentication.
| [
{
"version": "v1",
"created": "Thu, 2 Jan 2014 23:15:27 GMT"
}
] | 2014-01-06T00:00:00 | [
[
"Sherman",
"Michael",
""
],
[
"Clark",
"Gradeigh",
""
],
[
"Yang",
"Yulong",
""
],
[
"Sugrim",
"Shridatt",
""
],
[
"Modig",
"Arttu",
""
],
[
"Lindqvist",
"Janne",
""
],
[
"Oulasvirta",
"Antti",
""
],
[
"Roos",
"Teemu",
""
]
] | TITLE: User-Generated Free-Form Gestures for Authentication: Security and
Memorability
ABSTRACT: This paper studies the security and memorability of free-form multitouch
gestures for mobile authentication. Towards this end, we collected a dataset
with a generate-test-retest paradigm where participants (N=63) generated
free-form gestures, repeated them, and were later retested for memory. Half of
the participants decided to generate one-finger gestures, and the other half
generated multi-finger gestures. Although there has been recent work on
template-based gestures, there are yet no metrics to analyze security of either
template or free-form gestures. For example, entropy-based metrics used for
text-based passwords are not suitable for capturing the security and
memorability of free-form gestures. Hence, we modify a recently proposed metric
for analyzing information capacity of continuous full-body movements for this
purpose. Our metric computed estimated mutual information in repeated sets of
gestures. Surprisingly, one-finger gestures had higher average mutual
information. Gestures with many hard angles and turns had the highest mutual
information. The best-remembered gestures included signatures and simple
angular shapes. We also implemented a multitouch recognizer to evaluate the
practicality of free-form gestures in a real authentication system and how they
perform against shoulder surfing attacks. We conclude the paper with strategies
for generating secure and memorable free-form gestures, which present a robust
method for mobile authentication.
|
1310.5288 | Andrew Wilson | Andrew Gordon Wilson, Elad Gilboa, Arye Nehorai, John P. Cunningham | GPatt: Fast Multidimensional Pattern Extrapolation with Gaussian
Processes | 13 Pages, 9 Figures, 1 Table. Submitted for publication | null | null | null | stat.ML cs.AI cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gaussian processes are typically used for smoothing and interpolation on
small datasets. We introduce a new Bayesian nonparametric framework -- GPatt --
enabling automatic pattern extrapolation with Gaussian processes on large
multidimensional datasets. GPatt unifies and extends highly expressive kernels
and fast exact inference techniques. Without human intervention -- no hand
crafting of kernel features, and no sophisticated initialisation procedures --
we show that GPatt can solve large scale pattern extrapolation, inpainting, and
kernel discovery problems, including a problem with 383400 training points. We
find that GPatt significantly outperforms popular alternative scalable Gaussian
process methods in speed and accuracy. Moreover, we discover profound
differences between each of these methods, suggesting expressive kernels,
nonparametric representations, and exact inference are useful for modelling
large scale multidimensional patterns.
| [
{
"version": "v1",
"created": "Sun, 20 Oct 2013 01:26:45 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Oct 2013 16:58:35 GMT"
},
{
"version": "v3",
"created": "Tue, 31 Dec 2013 14:10:34 GMT"
}
] | 2014-01-03T00:00:00 | [
[
"Wilson",
"Andrew Gordon",
""
],
[
"Gilboa",
"Elad",
""
],
[
"Nehorai",
"Arye",
""
],
[
"Cunningham",
"John P.",
""
]
] | TITLE: GPatt: Fast Multidimensional Pattern Extrapolation with Gaussian
Processes
ABSTRACT: Gaussian processes are typically used for smoothing and interpolation on
small datasets. We introduce a new Bayesian nonparametric framework -- GPatt --
enabling automatic pattern extrapolation with Gaussian processes on large
multidimensional datasets. GPatt unifies and extends highly expressive kernels
and fast exact inference techniques. Without human intervention -- no hand
crafting of kernel features, and no sophisticated initialisation procedures --
we show that GPatt can solve large scale pattern extrapolation, inpainting, and
kernel discovery problems, including a problem with 383400 training points. We
find that GPatt significantly outperforms popular alternative scalable Gaussian
process methods in speed and accuracy. Moreover, we discover profound
differences between each of these methods, suggesting expressive kernels,
nonparametric representations, and exact inference are useful for modelling
large scale multidimensional patterns.
|
1311.0536 | Nikos Bikakis | Nikos Bikakis, Chrisa Tsinaraki, Ioannis Stavrakantonakis, Nektarios
Gioldasis, Stavros Christodoulakis | The SPARQL2XQuery Interoperability Framework. Utilizing Schema Mapping,
Schema Transformation and Query Translation to Integrate XML and the Semantic
Web | To appear in World Wide Web Journal (WWWJ), Springer 2013 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Web of Data is an open environment consisting of a great number of large
inter-linked RDF datasets from various domains. In this environment,
organizations and companies adopt the Linked Data practices utilizing Semantic
Web (SW) technologies, in order to publish their data and offer SPARQL
endpoints (i.e., SPARQL-based search services). On the other hand, the dominant
standard for information exchange in the Web today is XML. The SW and XML
worlds and their developed infrastructures are based on different data models,
semantics and query languages. Thus, it is crucial to develop interoperability
mechanisms that allow the Web of Data users to access XML datasets, using
SPARQL, from their own working environments. It is unrealistic to expect that
all the existing legacy data (e.g., Relational, XML, etc.) will be transformed
into SW data. Therefore, publishing legacy data as Linked Data and providing
SPARQL endpoints over them has become a major research challenge. In this
direction, we introduce the SPARQL2XQuery Framework which creates an
interoperable environment, where SPARQL queries are automatically translated to
XQuery queries, in order to access XML data across the Web. The SPARQL2XQuery
Framework provides a mapping model for the expression of OWL-RDF/S to XML
Schema mappings as well as a method for SPARQL to XQuery translation. To this
end, our Framework supports both manual and automatic mapping specification
between ontologies and XML Schemas. In the automatic mapping specification
scenario, the SPARQL2XQuery exploits the XS2OWL component which transforms XML
Schemas into OWL ontologies. Finally, extensive experiments have been conducted
in order to evaluate the schema transformation, mapping generation, query
translation and query evaluation efficiency, using both real and synthetic
datasets.
| [
{
"version": "v1",
"created": "Sun, 3 Nov 2013 21:57:48 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Dec 2013 00:20:14 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Jan 2014 02:53:19 GMT"
}
] | 2014-01-03T00:00:00 | [
[
"Bikakis",
"Nikos",
""
],
[
"Tsinaraki",
"Chrisa",
""
],
[
"Stavrakantonakis",
"Ioannis",
""
],
[
"Gioldasis",
"Nektarios",
""
],
[
"Christodoulakis",
"Stavros",
""
]
] | TITLE: The SPARQL2XQuery Interoperability Framework. Utilizing Schema Mapping,
Schema Transformation and Query Translation to Integrate XML and the Semantic
Web
ABSTRACT: The Web of Data is an open environment consisting of a great number of large
inter-linked RDF datasets from various domains. In this environment,
organizations and companies adopt the Linked Data practices utilizing Semantic
Web (SW) technologies, in order to publish their data and offer SPARQL
endpoints (i.e., SPARQL-based search services). On the other hand, the dominant
standard for information exchange in the Web today is XML. The SW and XML
worlds and their developed infrastructures are based on different data models,
semantics and query languages. Thus, it is crucial to develop interoperability
mechanisms that allow the Web of Data users to access XML datasets, using
SPARQL, from their own working environments. It is unrealistic to expect that
all the existing legacy data (e.g., Relational, XML, etc.) will be transformed
into SW data. Therefore, publishing legacy data as Linked Data and providing
SPARQL endpoints over them has become a major research challenge. In this
direction, we introduce the SPARQL2XQuery Framework which creates an
interoperable environment, where SPARQL queries are automatically translated to
XQuery queries, in order to access XML data across the Web. The SPARQL2XQuery
Framework provides a mapping model for the expression of OWL-RDF/S to XML
Schema mappings as well as a method for SPARQL to XQuery translation. To this
end, our Framework supports both manual and automatic mapping specification
between ontologies and XML Schemas. In the automatic mapping specification
scenario, the SPARQL2XQuery exploits the XS2OWL component which transforms XML
Schemas into OWL ontologies. Finally, extensive experiments have been conducted
in order to evaluate the schema transformation, mapping generation, query
translation and query evaluation efficiency, using both real and synthetic
datasets.
|
1312.6158 | Mohammad Pezeshki | Mohammad Ali Keyvanrad, Mohammad Pezeshki, and Mohammad Ali
Homayounpour | Deep Belief Networks for Image Denoising | ICLR 2014 Conference track | null | null | null | cs.LG cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep Belief Networks which are hierarchical generative models are effective
tools for feature representation and extraction. Furthermore, DBNs can be used
in numerous aspects of Machine Learning such as image denoising. In this paper,
we propose a novel method for image denoising which relies on the DBNs' ability
in feature representation. This work is based upon learning of the noise
behavior. Generally, features which are extracted using DBNs are presented as
the values of the last layer nodes. We train a DBN a way that the network
totally distinguishes between nodes presenting noise and nodes presenting image
content in the last later of DBN, i.e. the nodes in the last layer of trained
DBN are divided into two distinct groups of nodes. After detecting the nodes
which are presenting the noise, we are able to make the noise nodes inactive
and reconstruct a noiseless image. In section 4 we explore the results of
applying this method on the MNIST dataset of handwritten digits which is
corrupted with additive white Gaussian noise (AWGN). A reduction of 65.9% in
average mean square error (MSE) was achieved when the proposed method was used
for the reconstruction of the noisy images.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 21:56:38 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Jan 2014 17:04:35 GMT"
}
] | 2014-01-03T00:00:00 | [
[
"Keyvanrad",
"Mohammad Ali",
""
],
[
"Pezeshki",
"Mohammad",
""
],
[
"Homayounpour",
"Mohammad Ali",
""
]
] | TITLE: Deep Belief Networks for Image Denoising
ABSTRACT: Deep Belief Networks which are hierarchical generative models are effective
tools for feature representation and extraction. Furthermore, DBNs can be used
in numerous aspects of Machine Learning such as image denoising. In this paper,
we propose a novel method for image denoising which relies on the DBNs' ability
in feature representation. This work is based upon learning of the noise
behavior. Generally, features which are extracted using DBNs are presented as
the values of the last layer nodes. We train a DBN a way that the network
totally distinguishes between nodes presenting noise and nodes presenting image
content in the last later of DBN, i.e. the nodes in the last layer of trained
DBN are divided into two distinct groups of nodes. After detecting the nodes
which are presenting the noise, we are able to make the noise nodes inactive
and reconstruct a noiseless image. In section 4 we explore the results of
applying this method on the MNIST dataset of handwritten digits which is
corrupted with additive white Gaussian noise (AWGN). A reduction of 65.9% in
average mean square error (MSE) was achieved when the proposed method was used
for the reconstruction of the noisy images.
|
1401.0077 | Sanket Kamthe | Sanket Kamthe, Jan Peters, Marc P Deisenroth | Multi-modal filtering for non-linear estimation | null | null | null | null | cs.SY | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Multi-modal densities appear frequently in time series and practical
applications. However, they cannot be represented by common state estimators,
such as the Extended Kalman Filter (EKF) and the Unscented Kalman Filter (UKF),
which additionally suffer from the fact that uncertainty is often not captured
sufficiently well, which can result in incoherent and divergent tracking
performance. In this paper, we address these issues by devising a non-linear
filtering algorithm where densities are represented by Gaussian mixture models,
whose parameters are estimated in closed form. The resulting method exhibits a
superior performance on typical benchmarks.
| [
{
"version": "v1",
"created": "Tue, 31 Dec 2013 03:13:53 GMT"
}
] | 2014-01-03T00:00:00 | [
[
"Kamthe",
"Sanket",
""
],
[
"Peters",
"Jan",
""
],
[
"Deisenroth",
"Marc P",
""
]
] | TITLE: Multi-modal filtering for non-linear estimation
ABSTRACT: Multi-modal densities appear frequently in time series and practical
applications. However, they cannot be represented by common state estimators,
such as the Extended Kalman Filter (EKF) and the Unscented Kalman Filter (UKF),
which additionally suffer from the fact that uncertainty is often not captured
sufficiently well, which can result in incoherent and divergent tracking
performance. In this paper, we address these issues by devising a non-linear
filtering algorithm where densities are represented by Gaussian mixture models,
whose parameters are estimated in closed form. The resulting method exhibits a
superior performance on typical benchmarks.
|
1401.0092 | Shraddha Shinde | Shraddha S. Shinde and Prof. Anagha P. Khedkar | A Novel Approach For Generating Face Template Using Bda | 11 pages, ITCSE 2013 conference | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In identity management system, commonly used biometric recognition system
needs attention towards issue of biometric template protection as far as more
reliable solution is concerned. In view of this biometric template protection
algorithm should satisfy security, discriminability and cancelability. As no
single template protection method is capable of satisfying the basic
requirements, a novel technique for face template generation and protection is
proposed. The novel approach is proposed to provide security and accuracy in
new user enrollment as well as authentication process. This novel technique
takes advantage of both the hybrid approach and the binary discriminant
analysis algorithm. This algorithm is designed on the basis of random
projection, binary discriminant analysis and fuzzy commitment scheme. Three
publicly available benchmark face databases are used for evaluation. The
proposed novel technique enhances the discriminability and recognition accuracy
by 80% in terms of matching score of the face images and provides high
security.
| [
{
"version": "v1",
"created": "Tue, 31 Dec 2013 04:48:43 GMT"
}
] | 2014-01-03T00:00:00 | [
[
"Shinde",
"Shraddha S.",
""
],
[
"Khedkar",
"Prof. Anagha P.",
""
]
] | TITLE: A Novel Approach For Generating Face Template Using Bda
ABSTRACT: In identity management system, commonly used biometric recognition system
needs attention towards issue of biometric template protection as far as more
reliable solution is concerned. In view of this biometric template protection
algorithm should satisfy security, discriminability and cancelability. As no
single template protection method is capable of satisfying the basic
requirements, a novel technique for face template generation and protection is
proposed. The novel approach is proposed to provide security and accuracy in
new user enrollment as well as authentication process. This novel technique
takes advantage of both the hybrid approach and the binary discriminant
analysis algorithm. This algorithm is designed on the basis of random
projection, binary discriminant analysis and fuzzy commitment scheme. Three
publicly available benchmark face databases are used for evaluation. The
proposed novel technique enhances the discriminability and recognition accuracy
by 80% in terms of matching score of the face images and provides high
security.
|
1401.0104 | Tao Xiong | Yukun Bao, Tao Xiong, Zhongyi Hu | PSO-MISMO Modeling Strategy for Multi-Step-Ahead Time Series Prediction | 14 pages. IEEE Transactions on Cybernetics. 2013 | null | 10.1109/TCYB.2013.2265084 | null | cs.AI cs.LG cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-step-ahead time series prediction is one of the most challenging
research topics in the field of time series modeling and prediction, and is
continually under research. Recently, the multiple-input several
multiple-outputs (MISMO) modeling strategy has been proposed as a promising
alternative for multi-step-ahead time series prediction, exhibiting advantages
compared with the two currently dominating strategies, the iterated and the
direct strategies. Built on the established MISMO strategy, this study proposes
a particle swarm optimization (PSO)-based MISMO modeling strategy, which is
capable of determining the number of sub-models in a self-adaptive mode, with
varying prediction horizons. Rather than deriving crisp divides with equal-size
s prediction horizons from the established MISMO, the proposed PSO-MISMO
strategy, implemented with neural networks, employs a heuristic to create
flexible divides with varying sizes of prediction horizons and to generate
corresponding sub-models, providing considerable flexibility in model
construction, which has been validated with simulated and real datasets.
| [
{
"version": "v1",
"created": "Tue, 31 Dec 2013 07:09:02 GMT"
}
] | 2014-01-03T00:00:00 | [
[
"Bao",
"Yukun",
""
],
[
"Xiong",
"Tao",
""
],
[
"Hu",
"Zhongyi",
""
]
] | TITLE: PSO-MISMO Modeling Strategy for Multi-Step-Ahead Time Series Prediction
ABSTRACT: Multi-step-ahead time series prediction is one of the most challenging
research topics in the field of time series modeling and prediction, and is
continually under research. Recently, the multiple-input several
multiple-outputs (MISMO) modeling strategy has been proposed as a promising
alternative for multi-step-ahead time series prediction, exhibiting advantages
compared with the two currently dominating strategies, the iterated and the
direct strategies. Built on the established MISMO strategy, this study proposes
a particle swarm optimization (PSO)-based MISMO modeling strategy, which is
capable of determining the number of sub-models in a self-adaptive mode, with
varying prediction horizons. Rather than deriving crisp divides with equal-size
s prediction horizons from the established MISMO, the proposed PSO-MISMO
strategy, implemented with neural networks, employs a heuristic to create
flexible divides with varying sizes of prediction horizons and to generate
corresponding sub-models, providing considerable flexibility in model
construction, which has been validated with simulated and real datasets.
|
1401.0116 | Dinesh Govindaraj | Dinesh Govindaraj, Raman Sankaran, Sreedal Menon, Chiranjib
Bhattacharyya | Controlled Sparsity Kernel Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple Kernel Learning(MKL) on Support Vector Machines(SVMs) has been a
popular front of research in recent times due to its success in application
problems like Object Categorization. This success is due to the fact that MKL
has the ability to choose from a variety of feature kernels to identify the
optimal kernel combination. But the initial formulation of MKL was only able to
select the best of the features and misses out many other informative kernels
presented. To overcome this, the Lp norm based formulation was proposed by
Kloft et. al. This formulation is capable of choosing a non-sparse set of
kernels through a control parameter p. Unfortunately, the parameter p does not
have a direct meaning to the number of kernels selected. We have observed that
stricter control over the number of kernels selected gives us an edge over
these techniques in terms of accuracy of classification and also helps us to
fine tune the algorithms to the time requirements at hand. In this work, we
propose a Controlled Sparsity Kernel Learning (CSKL) formulation that can
strictly control the number of kernels which we wish to select. The CSKL
formulation introduces a parameter t which directly corresponds to the number
of kernels selected. It is important to note that a search in t space is finite
and fast as compared to p. We have also provided an efficient Reduced Gradient
Descent based algorithm to solve the CSKL formulation, which is proven to
converge. Through our experiments on the Caltech101 Object Categorization
dataset, we have also shown that one can achieve better accuracies than the
previous formulations through the right choice of t.
| [
{
"version": "v1",
"created": "Tue, 31 Dec 2013 09:13:09 GMT"
}
] | 2014-01-03T00:00:00 | [
[
"Govindaraj",
"Dinesh",
""
],
[
"Sankaran",
"Raman",
""
],
[
"Menon",
"Sreedal",
""
],
[
"Bhattacharyya",
"Chiranjib",
""
]
] | TITLE: Controlled Sparsity Kernel Learning
ABSTRACT: Multiple Kernel Learning(MKL) on Support Vector Machines(SVMs) has been a
popular front of research in recent times due to its success in application
problems like Object Categorization. This success is due to the fact that MKL
has the ability to choose from a variety of feature kernels to identify the
optimal kernel combination. But the initial formulation of MKL was only able to
select the best of the features and misses out many other informative kernels
presented. To overcome this, the Lp norm based formulation was proposed by
Kloft et. al. This formulation is capable of choosing a non-sparse set of
kernels through a control parameter p. Unfortunately, the parameter p does not
have a direct meaning to the number of kernels selected. We have observed that
stricter control over the number of kernels selected gives us an edge over
these techniques in terms of accuracy of classification and also helps us to
fine tune the algorithms to the time requirements at hand. In this work, we
propose a Controlled Sparsity Kernel Learning (CSKL) formulation that can
strictly control the number of kernels which we wish to select. The CSKL
formulation introduces a parameter t which directly corresponds to the number
of kernels selected. It is important to note that a search in t space is finite
and fast as compared to p. We have also provided an efficient Reduced Gradient
Descent based algorithm to solve the CSKL formulation, which is proven to
converge. Through our experiments on the Caltech101 Object Categorization
dataset, we have also shown that one can achieve better accuracies than the
previous formulations through the right choice of t.
|
1205.0651 | Gaurav Pandey | Ambedkar Dukkipati, Gaurav Pandey, Debarghya Ghoshdastidar, Paramita
Koley, D. M. V. Satya Sriram | Generative Maximum Entropy Learning for Multiclass Classification | null | null | null | null | cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximum entropy approach to classification is very well studied in applied
statistics and machine learning and almost all the methods that exists in
literature are discriminative in nature. In this paper, we introduce a maximum
entropy classification method with feature selection for large dimensional data
such as text datasets that is generative in nature. To tackle the curse of
dimensionality of large data sets, we employ conditional independence
assumption (Naive Bayes) and we perform feature selection simultaneously, by
enforcing a `maximum discrimination' between estimated class conditional
densities. For two class problems, in the proposed method, we use Jeffreys
($J$) divergence to discriminate the class conditional densities. To extend our
method to the multi-class case, we propose a completely new approach by
considering a multi-distribution divergence: we replace Jeffreys divergence by
Jensen-Shannon ($JS$) divergence to discriminate conditional densities of
multiple classes. In order to reduce computational complexity, we employ a
modified Jensen-Shannon divergence ($JS_{GM}$), based on AM-GM inequality. We
show that the resulting divergence is a natural generalization of Jeffreys
divergence to a multiple distributions case. As far as the theoretical
justifications are concerned we show that when one intends to select the best
features in a generative maximum entropy approach, maximum discrimination using
$J-$divergence emerges naturally in binary classification. Performance and
comparative study of the proposed algorithms have been demonstrated on large
dimensional text and gene expression datasets that show our methods scale up
very well with large dimensional datasets.
| [
{
"version": "v1",
"created": "Thu, 3 May 2012 08:49:01 GMT"
},
{
"version": "v2",
"created": "Sat, 16 Jun 2012 09:38:47 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Dec 2013 08:27:53 GMT"
}
] | 2013-12-31T00:00:00 | [
[
"Dukkipati",
"Ambedkar",
""
],
[
"Pandey",
"Gaurav",
""
],
[
"Ghoshdastidar",
"Debarghya",
""
],
[
"Koley",
"Paramita",
""
],
[
"Sriram",
"D. M. V. Satya",
""
]
] | TITLE: Generative Maximum Entropy Learning for Multiclass Classification
ABSTRACT: Maximum entropy approach to classification is very well studied in applied
statistics and machine learning and almost all the methods that exists in
literature are discriminative in nature. In this paper, we introduce a maximum
entropy classification method with feature selection for large dimensional data
such as text datasets that is generative in nature. To tackle the curse of
dimensionality of large data sets, we employ conditional independence
assumption (Naive Bayes) and we perform feature selection simultaneously, by
enforcing a `maximum discrimination' between estimated class conditional
densities. For two class problems, in the proposed method, we use Jeffreys
($J$) divergence to discriminate the class conditional densities. To extend our
method to the multi-class case, we propose a completely new approach by
considering a multi-distribution divergence: we replace Jeffreys divergence by
Jensen-Shannon ($JS$) divergence to discriminate conditional densities of
multiple classes. In order to reduce computational complexity, we employ a
modified Jensen-Shannon divergence ($JS_{GM}$), based on AM-GM inequality. We
show that the resulting divergence is a natural generalization of Jeffreys
divergence to a multiple distributions case. As far as the theoretical
justifications are concerned we show that when one intends to select the best
features in a generative maximum entropy approach, maximum discrimination using
$J-$divergence emerges naturally in binary classification. Performance and
comparative study of the proposed algorithms have been demonstrated on large
dimensional text and gene expression datasets that show our methods scale up
very well with large dimensional datasets.
|
1306.2866 | Antoine Isaac | Shenghui Wang, Antoine Isaac, Valentine Charles, Rob Koopman, Anthi
Agoropoulou, and Titia van der Werf | Hierarchical structuring of Cultural Heritage objects within large
aggregations | The paper has been published in the proceedings of the TPDL
conference, see http://tpdl2013.info. For the final version see
http://link.springer.com/chapter/10.1007%2F978-3-642-40501-3_25 | null | 10.1007/978-3-642-40501-3_25 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Huge amounts of cultural content have been digitised and are available
through digital libraries and aggregators like Europeana.eu. However, it is not
easy for a user to have an overall picture of what is available nor to find
related objects. We propose a method for hier- archically structuring cultural
objects at different similarity levels. We describe a fast, scalable clustering
algorithm with an automated field selection method for finding semantic
clusters. We report a qualitative evaluation on the cluster categories based on
records from the UK and a quantitative one on the results from the complete
Europeana dataset.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2013 15:40:48 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Dec 2013 22:44:49 GMT"
}
] | 2013-12-31T00:00:00 | [
[
"Wang",
"Shenghui",
""
],
[
"Isaac",
"Antoine",
""
],
[
"Charles",
"Valentine",
""
],
[
"Koopman",
"Rob",
""
],
[
"Agoropoulou",
"Anthi",
""
],
[
"van der Werf",
"Titia",
""
]
] | TITLE: Hierarchical structuring of Cultural Heritage objects within large
aggregations
ABSTRACT: Huge amounts of cultural content have been digitised and are available
through digital libraries and aggregators like Europeana.eu. However, it is not
easy for a user to have an overall picture of what is available nor to find
related objects. We propose a method for hier- archically structuring cultural
objects at different similarity levels. We describe a fast, scalable clustering
algorithm with an automated field selection method for finding semantic
clusters. We report a qualitative evaluation on the cluster categories based on
records from the UK and a quantitative one on the results from the complete
Europeana dataset.
|
1308.3839 | Arko Banerjee | Tamal Chowdhury, Rabindra Rakshit and Arko Banerjee | Consensus Sequence Segmentation | This paper has been withdrawn by the authors. The paper has been
withdrawn due to error data input in table no. 1 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce a method to detect words or phrases in a given
sequence of alphabets without knowing the lexicon. Our linear time unsupervised
algorithm relies entirely on statistical relationships among alphabets in the
input sequence to detect location of word boundaries. We compare our algorithm
to previous approaches from unsupervised sequence segmentation literature and
provide superior segmentation over number of benchmarks.
| [
{
"version": "v1",
"created": "Sun, 18 Aug 2013 07:09:03 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Dec 2013 05:42:12 GMT"
}
] | 2013-12-31T00:00:00 | [
[
"Chowdhury",
"Tamal",
""
],
[
"Rakshit",
"Rabindra",
""
],
[
"Banerjee",
"Arko",
""
]
] | TITLE: Consensus Sequence Segmentation
ABSTRACT: In this paper we introduce a method to detect words or phrases in a given
sequence of alphabets without knowing the lexicon. Our linear time unsupervised
algorithm relies entirely on statistical relationships among alphabets in the
input sequence to detect location of word boundaries. We compare our algorithm
to previous approaches from unsupervised sequence segmentation literature and
provide superior segmentation over number of benchmarks.
|
1312.7511 | Shraddha Shinde | Shraddha S. Shinde and Prof. Anagha P. Khedkar | A Novel Scheme for Generating Secure Face Templates Using BDA | 07 pages,IJASCSE | null | null | null | cs.CV cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In identity management system, frequently used biometric recognition system
needs awareness towards issue of protecting biometric template as far as more
reliable solution is apprehensive. In sight of this biometric template
protection algorithm should gratify the basic requirements viz. security,
discriminability and cancelability. As no single template protection method is
capable of satisfying these requirements, a novel scheme for face template
generation and protection is proposed. The novel scheme is proposed to provide
security and accuracy in new user enrolment and authentication process. This
novel scheme takes advantage of both the hybrid approach and the binary
discriminant analysis algorithm. This algorithm is designed on the basis of
random projection, binary discriminant analysis and fuzzy commitment scheme.
Publicly available benchmark face databases (FERET, FRGC, CMU-PIE) and other
datasets are used for evaluation. The proposed novel scheme enhances the
discriminability and recognition accuracy in terms of matching score of the
face images for each stage and provides high security against potential attacks
namely brute force and smart attacks. In this paper, we discuss results viz.
averages matching score, computation time and security for hybrid approach and
novel approach.
| [
{
"version": "v1",
"created": "Sun, 29 Dec 2013 09:31:01 GMT"
}
] | 2013-12-31T00:00:00 | [
[
"Shinde",
"Shraddha S.",
""
],
[
"Khedkar",
"Prof. Anagha P.",
""
]
] | TITLE: A Novel Scheme for Generating Secure Face Templates Using BDA
ABSTRACT: In identity management system, frequently used biometric recognition system
needs awareness towards issue of protecting biometric template as far as more
reliable solution is apprehensive. In sight of this biometric template
protection algorithm should gratify the basic requirements viz. security,
discriminability and cancelability. As no single template protection method is
capable of satisfying these requirements, a novel scheme for face template
generation and protection is proposed. The novel scheme is proposed to provide
security and accuracy in new user enrolment and authentication process. This
novel scheme takes advantage of both the hybrid approach and the binary
discriminant analysis algorithm. This algorithm is designed on the basis of
random projection, binary discriminant analysis and fuzzy commitment scheme.
Publicly available benchmark face databases (FERET, FRGC, CMU-PIE) and other
datasets are used for evaluation. The proposed novel scheme enhances the
discriminability and recognition accuracy in terms of matching score of the
face images for each stage and provides high security against potential attacks
namely brute force and smart attacks. In this paper, we discuss results viz.
averages matching score, computation time and security for hybrid approach and
novel approach.
|
1312.7570 | Stefan Mathe | Stefan Mathe, Cristian Sminchisescu | Actions in the Eye: Dynamic Gaze Datasets and Learnt Saliency Models for
Visual Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Systems based on bag-of-words models from image features collected at maxima
of sparse interest point operators have been used successfully for both
computer visual object and action recognition tasks. While the sparse,
interest-point based approach to recognition is not inconsistent with visual
processing in biological systems that operate in `saccade and fixate' regimes,
the methodology and emphasis in the human and the computer vision communities
remains sharply distinct. Here, we make three contributions aiming to bridge
this gap. First, we complement existing state-of-the art large scale dynamic
computer vision annotated datasets like Hollywood-2 and UCF Sports with human
eye movements collected under the ecological constraints of the visual action
recognition task. To our knowledge these are the first large human eye tracking
datasets to be collected and made publicly available for video,
vision.imar.ro/eyetracking (497,107 frames, each viewed by 16 subjects), unique
in terms of their (a) large scale and computer vision relevance, (b) dynamic,
video stimuli, (c) task control, as opposed to free-viewing. Second, we
introduce novel sequential consistency and alignment measures, which underline
the remarkable stability of patterns of visual search among subjects. Third, we
leverage the significant amount of collected data in order to pursue studies
and build automatic, end-to-end trainable computer vision systems based on
human eye movements. Our studies not only shed light on the differences between
computer vision spatio-temporal interest point image sampling strategies and
the human fixations, as well as their impact for visual recognition
performance, but also demonstrate that human fixations can be accurately
predicted, and when used in an end-to-end automatic system, leveraging some of
the advanced computer vision practice, can lead to state of the art results.
| [
{
"version": "v1",
"created": "Sun, 29 Dec 2013 18:49:04 GMT"
}
] | 2013-12-31T00:00:00 | [
[
"Mathe",
"Stefan",
""
],
[
"Sminchisescu",
"Cristian",
""
]
] | TITLE: Actions in the Eye: Dynamic Gaze Datasets and Learnt Saliency Models for
Visual Recognition
ABSTRACT: Systems based on bag-of-words models from image features collected at maxima
of sparse interest point operators have been used successfully for both
computer visual object and action recognition tasks. While the sparse,
interest-point based approach to recognition is not inconsistent with visual
processing in biological systems that operate in `saccade and fixate' regimes,
the methodology and emphasis in the human and the computer vision communities
remains sharply distinct. Here, we make three contributions aiming to bridge
this gap. First, we complement existing state-of-the art large scale dynamic
computer vision annotated datasets like Hollywood-2 and UCF Sports with human
eye movements collected under the ecological constraints of the visual action
recognition task. To our knowledge these are the first large human eye tracking
datasets to be collected and made publicly available for video,
vision.imar.ro/eyetracking (497,107 frames, each viewed by 16 subjects), unique
in terms of their (a) large scale and computer vision relevance, (b) dynamic,
video stimuli, (c) task control, as opposed to free-viewing. Second, we
introduce novel sequential consistency and alignment measures, which underline
the remarkable stability of patterns of visual search among subjects. Third, we
leverage the significant amount of collected data in order to pursue studies
and build automatic, end-to-end trainable computer vision systems based on
human eye movements. Our studies not only shed light on the differences between
computer vision spatio-temporal interest point image sampling strategies and
the human fixations, as well as their impact for visual recognition
performance, but also demonstrate that human fixations can be accurately
predicted, and when used in an end-to-end automatic system, leveraging some of
the advanced computer vision practice, can lead to state of the art results.
|
1312.2877 | Mohammad H. Alomari | Mohammad H. Alomari, Aya Samaha, Khaled AlKamha | Automated Classification of L/R Hand Movement EEG Signals using Advanced
Feature Extraction and Machine Learning | 6 pages, 4 figures | International Journal of Advanced Computer Science and
Applications (ijacsa) 07/2013; 4(6):207-212 | 10.14569/IJACSA.2013.040628 | null | cs.NE cs.CV cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose an automated computer platform for the purpose of
classifying Electroencephalography (EEG) signals associated with left and right
hand movements using a hybrid system that uses advanced feature extraction
techniques and machine learning algorithms. It is known that EEG represents the
brain activity by the electrical voltage fluctuations along the scalp, and
Brain-Computer Interface (BCI) is a device that enables the use of the brain
neural activity to communicate with others or to control machines, artificial
limbs, or robots without direct physical movements. In our research work, we
aspired to find the best feature extraction method that enables the
differentiation between left and right executed fist movements through various
classification algorithms. The EEG dataset used in this research was created
and contributed to PhysioNet by the developers of the BCI2000 instrumentation
system. Data was preprocessed using the EEGLAB MATLAB toolbox and artifacts
removal was done using AAR. Data was epoched on the basis of Event-Related (De)
Synchronization (ERD/ERS) and movement-related cortical potentials (MRCP)
features. Mu/beta rhythms were isolated for the ERD/ERS analysis and delta
rhythms were isolated for the MRCP analysis. The Independent Component Analysis
(ICA) spatial filter was applied on related channels for noise reduction and
isolation of both artifactually and neutrally generated EEG sources. The final
feature vector included the ERD, ERS, and MRCP features in addition to the
mean, power and energy of the activations of the resulting independent
components of the epoched feature datasets. The datasets were inputted into two
machine-learning algorithms: Neural Networks (NNs) and Support Vector Machines
(SVMs). Intensive experiments were carried out and optimum classification
performances of 89.8 and 97.1 were obtained using NN and SVM, respectively.
| [
{
"version": "v1",
"created": "Tue, 10 Dec 2013 17:04:18 GMT"
}
] | 2013-12-30T00:00:00 | [
[
"Alomari",
"Mohammad H.",
""
],
[
"Samaha",
"Aya",
""
],
[
"AlKamha",
"Khaled",
""
]
] | TITLE: Automated Classification of L/R Hand Movement EEG Signals using Advanced
Feature Extraction and Machine Learning
ABSTRACT: In this paper, we propose an automated computer platform for the purpose of
classifying Electroencephalography (EEG) signals associated with left and right
hand movements using a hybrid system that uses advanced feature extraction
techniques and machine learning algorithms. It is known that EEG represents the
brain activity by the electrical voltage fluctuations along the scalp, and
Brain-Computer Interface (BCI) is a device that enables the use of the brain
neural activity to communicate with others or to control machines, artificial
limbs, or robots without direct physical movements. In our research work, we
aspired to find the best feature extraction method that enables the
differentiation between left and right executed fist movements through various
classification algorithms. The EEG dataset used in this research was created
and contributed to PhysioNet by the developers of the BCI2000 instrumentation
system. Data was preprocessed using the EEGLAB MATLAB toolbox and artifacts
removal was done using AAR. Data was epoched on the basis of Event-Related (De)
Synchronization (ERD/ERS) and movement-related cortical potentials (MRCP)
features. Mu/beta rhythms were isolated for the ERD/ERS analysis and delta
rhythms were isolated for the MRCP analysis. The Independent Component Analysis
(ICA) spatial filter was applied on related channels for noise reduction and
isolation of both artifactually and neutrally generated EEG sources. The final
feature vector included the ERD, ERS, and MRCP features in addition to the
mean, power and energy of the activations of the resulting independent
components of the epoched feature datasets. The datasets were inputted into two
machine-learning algorithms: Neural Networks (NNs) and Support Vector Machines
(SVMs). Intensive experiments were carried out and optimum classification
performances of 89.8 and 97.1 were obtained using NN and SVM, respectively.
|
1312.6506 | Prateek Singhal | Prateek Singhal, Aditya Deshpande, N Dinesh Reddy and K Madhava
Krishna | Top Down Approach to Multiple Plane Detection | 6 pages, 22 figures, ICPR conference | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting multiple planes in images is a challenging problem, but one with
many applications. Recent work such as J-Linkage and Ordered Residual Kernels
have focussed on developing a domain independent approach to detect multiple
structures. These multiple structure detection methods are then used for
estimating multiple homographies given feature matches between two images.
Features participating in the multiple homographies detected, provide us the
multiple scene planes. We show that these methods provide locally optimal
results and fail to merge detected planar patches to the true scene planes.
These methods use only residues obtained on applying homography of one plane to
another as cue for merging. In this paper, we develop additional cues such as
local consistency of planes, local normals, texture etc. to perform better
classification and merging . We formulate the classification as an MRF problem
and use TRWS message passing algorithm to solve non metric energy terms and
complex sparse graph structure. We show results on challenging dataset common
in robotics navigation scenarios where our method shows accuracy of more than
85 percent on average while being close or same as the actual number of scene
planes.
| [
{
"version": "v1",
"created": "Mon, 23 Dec 2013 10:09:12 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Dec 2013 04:35:01 GMT"
}
] | 2013-12-30T00:00:00 | [
[
"Singhal",
"Prateek",
""
],
[
"Deshpande",
"Aditya",
""
],
[
"Reddy",
"N Dinesh",
""
],
[
"Krishna",
"K Madhava",
""
]
] | TITLE: Top Down Approach to Multiple Plane Detection
ABSTRACT: Detecting multiple planes in images is a challenging problem, but one with
many applications. Recent work such as J-Linkage and Ordered Residual Kernels
have focussed on developing a domain independent approach to detect multiple
structures. These multiple structure detection methods are then used for
estimating multiple homographies given feature matches between two images.
Features participating in the multiple homographies detected, provide us the
multiple scene planes. We show that these methods provide locally optimal
results and fail to merge detected planar patches to the true scene planes.
These methods use only residues obtained on applying homography of one plane to
another as cue for merging. In this paper, we develop additional cues such as
local consistency of planes, local normals, texture etc. to perform better
classification and merging . We formulate the classification as an MRF problem
and use TRWS message passing algorithm to solve non metric energy terms and
complex sparse graph structure. We show results on challenging dataset common
in robotics navigation scenarios where our method shows accuracy of more than
85 percent on average while being close or same as the actual number of scene
planes.
|
1312.6948 | Sourish Dasgupta | Sourish Dasgupta, Rupali KaPatel, Ankur Padia, Kushal Shah | Description Logics based Formalization of Wh-Queries | Natural Language Query Processing, Representation | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of Natural Language Query Formalization (NLQF) is to translate a
given user query in natural language (NL) into a formal language so that the
semantic interpretation has equivalence with the NL interpretation.
Formalization of NL queries enables logic based reasoning during information
retrieval, database query, question-answering, etc. Formalization also helps in
Web query normalization and indexing, query intent analysis, etc. In this paper
we are proposing a Description Logics based formal methodology for wh-query
intent (also called desire) identification and corresponding formal
translation. We evaluated the scalability of our proposed formalism using
Microsoft Encarta 98 query dataset and OWL-S TC v.4.0 dataset.
| [
{
"version": "v1",
"created": "Wed, 25 Dec 2013 09:23:49 GMT"
}
] | 2013-12-30T00:00:00 | [
[
"Dasgupta",
"Sourish",
""
],
[
"KaPatel",
"Rupali",
""
],
[
"Padia",
"Ankur",
""
],
[
"Shah",
"Kushal",
""
]
] | TITLE: Description Logics based Formalization of Wh-Queries
ABSTRACT: The problem of Natural Language Query Formalization (NLQF) is to translate a
given user query in natural language (NL) into a formal language so that the
semantic interpretation has equivalence with the NL interpretation.
Formalization of NL queries enables logic based reasoning during information
retrieval, database query, question-answering, etc. Formalization also helps in
Web query normalization and indexing, query intent analysis, etc. In this paper
we are proposing a Description Logics based formal methodology for wh-query
intent (also called desire) identification and corresponding formal
translation. We evaluated the scalability of our proposed formalism using
Microsoft Encarta 98 query dataset and OWL-S TC v.4.0 dataset.
|
1312.7085 | Peng Lu | Peng Lu, Xujun Peng, Xinshan Zhu, Xiaojie Wang | Finding More Relevance: Propagating Similarity on Markov Random Field
for Image Retrieval | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To effectively retrieve objects from large corpus with high accuracy is a
challenge task. In this paper, we propose a method that propagates visual
feature level similarities on a Markov random field (MRF) to obtain a high
level correspondence in image space for image pairs. The proposed
correspondence between image pair reflects not only the similarity of low-level
visual features but also the relations built through other images in the
database and it can be easily integrated into the existing
bag-of-visual-words(BoW) based systems to reduce the missing rate. We evaluate
our method on the standard Oxford-5K, Oxford-105K and Paris-6K dataset. The
experiment results show that the proposed method significantly improves the
retrieval accuracy on three datasets and exceeds the current state-of-the-art
retrieval performance.
| [
{
"version": "v1",
"created": "Thu, 26 Dec 2013 10:55:14 GMT"
}
] | 2013-12-30T00:00:00 | [
[
"Lu",
"Peng",
""
],
[
"Peng",
"Xujun",
""
],
[
"Zhu",
"Xinshan",
""
],
[
"Wang",
"Xiaojie",
""
]
] | TITLE: Finding More Relevance: Propagating Similarity on Markov Random Field
for Image Retrieval
ABSTRACT: To effectively retrieve objects from large corpus with high accuracy is a
challenge task. In this paper, we propose a method that propagates visual
feature level similarities on a Markov random field (MRF) to obtain a high
level correspondence in image space for image pairs. The proposed
correspondence between image pair reflects not only the similarity of low-level
visual features but also the relations built through other images in the
database and it can be easily integrated into the existing
bag-of-visual-words(BoW) based systems to reduce the missing rate. We evaluate
our method on the standard Oxford-5K, Oxford-105K and Paris-6K dataset. The
experiment results show that the proposed method significantly improves the
retrieval accuracy on three datasets and exceeds the current state-of-the-art
retrieval performance.
|
1312.7326 | Hiqmet Kamberaj Dr. | Hiqmet Kamberaj | Replica Exchange using q-Gaussian Swarm Quantum Particle Intelligence
Method | 10 pages, 5 figures, 1 table | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a newly developed Replica Exchange algorithm using q -Gaussian
Swarm Quantum Particle Optimization (REX@q-GSQPO) method for solving the
problem of finding the global optimum. The basis of the algorithm is to run
multiple copies of independent swarms at different values of q parameter. Based
on an energy criterion, chosen to satisfy the detailed balance, we are swapping
the particle coordinates of neighboring swarms at regular iteration intervals.
The swarm replicas with high q values are characterized by high diversity of
particles allowing escaping local minima faster, while the low q replicas,
characterized by low diversity of particles, are used to sample more
efficiently the local basins. We compare the new algorithm with the standard
Gaussian Swarm Quantum Particle Optimization (GSQPO) and q-Gaussian Swarm
Quantum Particle Optimization (q-GSQPO) algorithms, and we found that the new
algorithm is more robust in terms of the number of fitness function calls, and
more efficient in terms ability convergence to the global minimum. In
additional, we also provide a method of optimally allocating the swarm replicas
among different q values. Our algorithm is tested for three benchmark
functions, which are known to be multimodal problems, at different
dimensionalities. In addition, we considered a polyalanine peptide of 12
residues modeled using a G\=o coarse-graining potential energy function.
| [
{
"version": "v1",
"created": "Sun, 17 Nov 2013 12:49:15 GMT"
}
] | 2013-12-30T00:00:00 | [
[
"Kamberaj",
"Hiqmet",
""
]
] | TITLE: Replica Exchange using q-Gaussian Swarm Quantum Particle Intelligence
Method
ABSTRACT: We present a newly developed Replica Exchange algorithm using q -Gaussian
Swarm Quantum Particle Optimization (REX@q-GSQPO) method for solving the
problem of finding the global optimum. The basis of the algorithm is to run
multiple copies of independent swarms at different values of q parameter. Based
on an energy criterion, chosen to satisfy the detailed balance, we are swapping
the particle coordinates of neighboring swarms at regular iteration intervals.
The swarm replicas with high q values are characterized by high diversity of
particles allowing escaping local minima faster, while the low q replicas,
characterized by low diversity of particles, are used to sample more
efficiently the local basins. We compare the new algorithm with the standard
Gaussian Swarm Quantum Particle Optimization (GSQPO) and q-Gaussian Swarm
Quantum Particle Optimization (q-GSQPO) algorithms, and we found that the new
algorithm is more robust in terms of the number of fitness function calls, and
more efficient in terms ability convergence to the global minimum. In
additional, we also provide a method of optimally allocating the swarm replicas
among different q values. Our algorithm is tested for three benchmark
functions, which are known to be multimodal problems, at different
dimensionalities. In addition, we considered a polyalanine peptide of 12
residues modeled using a G\=o coarse-graining potential energy function.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.